The Threat | The Six Domains | The Taxonomy | CTSS Scoring | Command Center | Roadmap | Contributing
โ CSF Learning Hub
โ Threat Explorer
โ Command Center
The Cognitive Sovereignty Framework (CSF) is an open-source, doctrine-grade resilience model designed to protect human cognition against the full spectrum of AI-era threats.
The primary battlefield of the 21st century is human cognition, not territory. The nation that loses cognitive sovereignty loses the ability to govern itself, fight wars, or sustain its civilization. This is not a metaphor. It is an operational reality.
The CSF was developed by the Cyber Strategy Institute as the direct response to its companion Cognitive Threat Assessment โ a first-principles analysis of what is actually happening to human cognition, and why current frameworks are structurally insufficient to address it.
Every U.S. military branch operates a resilience program. All of them share a four-domain core: mental, physical, social, and spiritual fitness.
None of them contain a domain for digital, cognitive, or informational resilience.
A warfighter can score perfectly on every existing resilience metric and still be fully vulnerable to AI-driven deception, algorithmic manipulation, cognitive offloading atrophy, and identity destabilization. The CSF closes that gap โ for military personnel, their families, organizations, and civilian society.
The threat to human cognition operates in five causal layers. Most current defenses target only one.
| Layer | Designation | Function |
|---|---|---|
| Layer -2 | Civilizational Drivers (CD) | Root forces generating vulnerability conditions |
| Layer -1 | Substrate Threats (ST) | Pre-manipulation foundations that make manipulation succeed |
| Layer 0 | Manipulation Techniques (T-CT) | 18 active cognitive technique families |
| Layer +1 | Delivery & Scale (DS) | Amplification mechanisms reaching populations |
| Layer +2 | Human Outcomes (HO) | Observable effects when threats succeed |
Critical Insight: If the substrate conditions (Layer -1) are not addressed, new techniques will always find new pathways. Tactical defense without substrate resilience is an infinite regression.
The complete threat taxonomy โ 41 classified entries across all five layers, plus 10 newly identified threat classes and 3 edge domain additions โ is maintained in /taxonomy.
The CSF proposes six interdependent domains of human resilience. Domains 1โ4 align with the universal military core. Domain 5 refines the purpose dimension. Domain 6 is entirely new and the missing pillar across all branches.
| # | Domain | Core Definition | Primary Threats | New? |
|---|---|---|---|---|
| 1 | Biological | Sleep, metabolism, nervous system regulation, neurophysiological integrity | Dopamine engineering, sleep disruption, neuro-intrusion via BCIs | No |
| 2 | Cognitive | Attention control, deep thinking, memory, learning agility, reasoning capacity | Attention capture, cognitive load flooding, offloading atrophy | No |
| 3 | Emotional | Stress tolerance, emotional regulation, identity stability, trauma recovery | Micro-targeted emotional priming, anxiety engineering, identity fragmentation | No |
| 4 | Social | Trust networks, belonging, family continuity, community cohesion, civic identity | Social trust fragmentation, synthetic persona infiltration, micro-tribe reinforcement | No |
| 5 | Purpose & Moral | Values, meaning, service beyond self, moral reasoning capacity, ethical judgment | Moral displacement through automation, legitimized narrative capture, ethics outsourcing | Refined |
| 6 | Digital & AI Symbiosis | Working with AI without cognitive erosion; maintaining agency in automated environments; resisting manipulation by synthetic media | Decision automation capture, guardrail bias exploitation, model drift degradation, psychographic microtargeting | โ NEW |
Every other domain assumes the human is the primary agent. Domain 6 recognizes that in the AI era, the human operates within a human-AI system. If the AI side of that system is compromised, biased, or adversary-controlled, the human's resilience in Domains 1โ5 may be irrelevant.
Domain 6 is also the only resilience domain backed by both human training and technical enforcement architecture โ specifically, the Ethical Functionality without Agency (EFA) paradigm and the EFA/AI-SAFEยฒ 7-Layer Protocol Stack (E7), which ensure that human authority over AI systems is not a preference but an architectural guarantee.
The six domains form a reinforcing system. Degradation in one domain creates vulnerability in others:
Biological Degradation Cascade (upward):
Domain 1 โ Domain 2 โ Domain 3 โ Domain 4 โ Domain 5 โ Domain 6
Sleep loss โ Impaired cognition โ Reduced emotional regulation โ
Strained relationships โ Eroded purpose โ AI discipline failure
Digital Compromise Cascade (downward):
Domain 6 โ Domain 2 โ Domain 3 โ Domain 4 โ Domain 5 โ Domain 1
Compromised AI โ Poisoned information โ Triggered emotions โ
Fragmented social trust โ Eroded purpose โ Biological stress
/
โโโ .github/ # CI/CD Workflows & Issue Templates
โ โโโ ISSUE_TEMPLATE/
โ โ โโโ new-threat-entry.md
โ โ โโโ technique-update.md
โ โโโ workflows/
โ โโโ taxonomy-lint.yml
โ
โโโ 01-biological/ # Domain 1: Biological Resilience
โ โโโ README.md
โโโ 02-cognitive/ # Domain 2: Cognitive Resilience
โ โโโ README.md
โโโ 03-emotional/ # Domain 3: Emotional Resilience
โ โโโ README.md
โโโ 04-social/ # Domain 4: Social Resilience
โ โโโ README.md
โโโ 05-purpose-moral/ # Domain 5: Purpose & Moral Resilience
โ โโโ README.md
โโโ 06-digital-ai-symbiosis/ # Domain 6: Digital & AI Symbiosis (NEW)
โ โโโ README.md
โ
โโโ taxonomy/ # Complete Threat Taxonomy Registry
โ โโโ registry.json # Machine-readable full registry (41+ entries)
โ โโโ threat-architecture.md # Five-layer causal stack overview
โ โโโ civilizational-drivers.md # Layer -2: CD-001 through CD-006
โ โโโ substrate-threats.md # Layer -1: ST-001 through ST-007
โ โโโ manipulation-techniques.md # Layer 0: T-CT-001 through T-CT-018
โ โโโ delivery-scale.md # Layer +1: DS-001 through DS-005
โ โโโ human-outcomes.md # Layer +2: HO-001 through HO-005
โ โโโ threat-classes.md # TC-01 through TC-10 (newly identified)
โ โโโ ctss-scoring.md # Cognitive Threat Severity Scoring model
โ
โโโ command-center/ # Interactive HTML5 + JSON Command Center
โ โโโ index.html # Visual threat map and domain dashboard
โ
โโโ research/ # Deep Dive Evidence & Justifications
โ โโโ 001_cognitive_offloading.md
โ โโโ 002_swarm_threat_scaling.md
โ โโโ 003_guardrail_drift.md
โ โโโ 004_efa_enforcement_architecture.md
โ
โโโ resources/ # Free Community Tools
โ โโโ assessment-template.md # Reusable Threat Assessment Template
โ โโโ ctss-calculator.md # Manual CTSS scoring worksheet
โ โโโ domain6-checklist.md # Domain 6 self-assessment checklist
โ
โโโ examples/ # Operational Examples
โ โโโ ctss_calculator.py # Python CTSS scoring tool
โ โโโ technique_entry_T-CT-004.md # Full operational template example
โ โโโ unit_readiness_assessment.md # Sample unit-level cognitive readiness assessment
โ
โโโ assets/ # Visual Maps & Diagrams
โ
โโโ CITATION.cff # Academic Citation
โโโ CODE_OF_CONDUCT.md
โโโ CODEOWNERS
โโโ CONTRIBUTING.md
โโโ EVOLUTION.md # Version history
โโโ LICENSE # Dual License: MIT + CC-BY-SA 4.0
โโโ MAINTAINERS.md
โโโ README.md # You are here
โโโ SECURITY.md
โโโ SENTINEL_PROGRAM.md # Community tiers & contributor recognition
The CSF threat taxonomy contains 41 classified entries across five causal layers, designed as a living system at the technique layer (T-CT) while maintaining structural stability at the foundation layers.
| Rank | ID | Technique | CTSS |
|---|---|---|---|
| 1 | T-CT-008 | Memetic Swarm Orchestration | 90 |
| 2 | T-CT-010 | Economic Coercion & Incentive Corruption | 88 |
| 3 | T-CT-004 | Personalized Narrative Injection | 85 |
| 4 | T-CT-013 | Social Scoring & Behavioral Governance | 83 |
| 5 | T-CT-006 | Decision Automation Capture | 82 |
Key Finding: Memetic Swarm Orchestration (T-CT-008) scores highest due to high likelihood (already operational with UGC farms), high impact on agency, and global reach. Neurotech (T-CT-012) scores lowest today but will climb rapidly as the technology matures.
๐ View the complete CTSS ranking โ ๐ Interactive Command Center โ
The CTSS is the weighted severity model enabling threat prioritization and resource allocation.
| Component | Description | Weight |
|---|---|---|
| Likelihood (L) | Probability of occurrence (0โ5 scale) | 0.25 |
| Impact on Agency (Ia) | Effect on human autonomy (0โ5 scale) | 0.30 |
| Population Reach (R) | Scale of affected people (0โ5 scale) | 0.20 |
| Detection Difficulty (D) | How hard to identify (0โ5; higher = harder) | 0.15 |
| Recovery Difficulty (RecD) | How hard to reverse (0โ5; higher = harder) | 0.10 |
Formula: CTSS = (Lร0.25 + Iaร0.30 + Rร0.20 + Dร0.15 + RecDร0.10) ร 20
Range: 0โ100 | Critical โฅ 80 | High โฅ 70 | Elevated โฅ 60
The CSF includes an interactive HTML5 Command Center โ a visual threat map and domain dashboard deployable locally or as a GitHub Pages site.
Features:
- Live CTSS heatmap across all 18 technique families
- Five-layer causal stack visualization
- Six-domain resilience status dashboard
- Edge case coverage matrix
- Swarm threat phase progression tracker
- JSON-driven โ all data sourced from
taxonomy/registry.json
# Run locally
cd command-center
open index.html
# or
python3 -m http.server 8080The CSF deploys in three phases across 36 months.
- Develop Domain 6 assessment tools and training curriculum
- Conduct baseline cognitive resilience assessments across pilot units
- Integrate CSF concepts into existing resilience training programs
- Establish CTSS scoring and threat monitoring protocols
- Develop measurement protocols for the five outcome indicators
- Expand Domain 6 training to initial accession training across services
- Integrate cognitive resilience metrics into unit readiness assessments
- Deploy inoculation training based on identified manipulation techniques
- Establish family and dependent cognitive resilience programs
- Begin cross-service coordination for standardized assessment tools
- Full integration with PME curricula across all services
- Operational cognitive readiness assessments comparable in rigor to physical fitness testing
- Commander accountability for unit cognitive resilience
- Continuous red-teaming of CSF effectiveness against evolving threats
- Extension of CSF principles to defense industrial base and public programs
Resilience must be observable, not inspirational. Five outcome indicators determine success or failure:
| Indicator | What It Measures | Success Threshold |
|---|---|---|
| Sustained Attention Span | Ability to maintain deep focus without platform-driven interruption | 20โ30% improvement in controlled studies |
| Resistance to False Narratives | Ability to identify and reject manipulative content including deepfakes | ~40% reduction in false narrative adoption |
| Stable Moral Reasoning Under Pressure | Maintaining ethical judgment when social pressure or automation suggests compliance | Audit-verified maintenance in AI-augmented environments |
| Ability to Act Against Social Manipulation | Recognizing and resisting synthetic consensus and manufactured outrage | Measurable independence in red-team pressure exercises |
| Preservation of Personal Agency | Independent decision-making despite AI recommendation systems | Sustained or improved critical thinking scores despite increasing AI usage |
The true metric is not misinformation detected or propaganda countered. The true metric is the preservation or loss of self-directed cognition.
The CSF protects the human cognitive layer. It does not secure the AI system the human is operating.
An AI infrastructure with prompt injection vulnerabilities, misconfigured agent scoping, or compromised memory systems can undermine human cognitive sovereignty regardless of how well-trained the operator is. The CSF covers the human side. AI SAFEยฒ covers the machine side.
| CSF | AI SAFEยฒ | |
|---|---|---|
| Layer | Human | Machine |
| Defends | The human operator | The AI system |
| Governs | The capacity to govern the tool | The tool |
| Prevents | Cognitive offloading, attention capture, decision automation capture, identity fragmentation | Prompt injection, data leakage, unsafe autonomy, swarm governance failures |
| Ensures | The human stays capable of defining the lane | AI stays in its lane |
| Repo | https://github.com/CyberStrategyInstitute/cognitive-sovereignty | https://github.com/CyberStrategyInstitute/ai-safe2-framework |
The shared principle: Both frameworks enforce the same core commitment โ AI is always a tool, never a moral agent. Human authority is non-negotiable. The CSF's EFA paradigm and E7 Protocol Stack enforce this at the human-AI interface layer. AI SAFEยฒ's runtime governors and circuit breakers enforce it at the technical infrastructure layer.
The threat that connects both frameworks: The highest-scoring threat in the CSF taxonomy is T-CT-008: Memetic Swarm Orchestration (CTSS 90) โ coordinated AI agent campaigns that test, evolve, and amplify narratives at non-human speed. AI SAFEยฒ defends AI system integrity against adversarial swarm techniques. The CSF defends human populations against the cognitive effects of swarm-delivered narratives. Defending only one layer leaves the other entirely exposed.
Together, CSF + AI SAFEยฒ cover the full human-AI system: CSF for the human, AI SAFEยฒ for the machine. Neither is sufficient without the other.
โ AI SAFEยฒ Repository โ The Universal GRC Operating System for Agentic AI, Non-Human Identities, and Swarm Governance
โ AI SAFEยฒ Companion Release Note โ How the two frameworks fit together in practice
| Principle | CSF Alignment |
|---|---|
| Responsible | Domain 5 (Purpose & Moral) builds the moral reasoning capacity required for responsible AI use |
| Equitable | Domain 4 (Social) addresses algorithmic bias and access equity |
| Traceable | Domain 6 (Digital & AI Symbiosis) mandates provenance verification and HEAR accountability |
| Reliable | Domain 2 (Cognitive) builds independent verification capacity to detect model drift |
| Governable | E7 Layer 7 ensures human authority remains at the top of every system |
The framework is not valid until it passes four empirical tests.
| Test | Requirement | Failure Condition |
|---|---|---|
| 1. Threat Surface Coverage | Framework must map and mitigate 90%+ of identified threat vectors | Coverage drops below 90% = structural gaps adversaries will exploit |
| 2. Measurable Human Outcomes | All five resilience indicators show measurable improvement | No measurable improvement = aspirational, not operational |
| 3. Edge-Case Stress Testing | Framework survives extreme propaganda, total information saturation, AI-generated reality indistinguishability | Breaks under edge-case stress = below 90% coverage |
| 4. Long-Arc Historical Consistency | Model holds across all historical eras from pre-industrial to AI swarm era | Only works in current era = time-bound ideology, not doctrine |
| Version | Focus | Key Addition | Classification Entries |
|---|---|---|---|
| v2.0 | Complete AI-Era Architecture | Domain 6, EFA integration, E7 Stack, HEAR Doctrine | 41 entries + 10 threat classes + 3 edge domains |
| v1.0 | Foundation | Six-domain model proposal, CTSS scoring baseline | 18 technique families, 4-layer stack |
๐ Read the full evolution history โ
This is a living doctrine. Contributions follow the same red-team standard used to develop the framework itself.
How to contribute:
- New Threat Entry: Use the New Threat Entry Template to propose additions to the T-CT layer
- Technique Update: Use the Technique Update Template to revise CTSS scores or detection methods
- Research Submission: Add peer-testable evidence to
/research/with full sourcing
The taxonomy is designed to grow at the T-CT layer. The CD and ST layers are designed to be stable but expandable. All contributions must pass the Adversarial Reproduction Test: opponents using the same data and methodology must arrive at the same measurements.
๐ Read the full Contributing Guide โ
Recognize and reward the contributors who help harden this doctrine.
- โญ Star the Repo: Unlock
Supporterstatus - ๐ก Contribute a Technique Entry: Earn
Analyststatus - ๐ฌ Submit Validated Research: Earn
Researcherstatus - ๐ The Sentinel Tier: Priority access to upcoming CSI tools and assessment platforms
๐ Read the Sentinel Program Details โ
@misc{csf_framework_2026,
title = {Cognitive Sovereignty Framework v2.0: A Six-Domain Model for Human Resilience in the AI Era},
author = {{Cyber Strategy Institute}},
year = {2026},
month = {February},
publisher = {Cyber Strategy Institute},
url = {https://github.com/CyberStrategyInstitute/cognitive-sovereignty-framework},
note = {Version 2.0. Companion to the Cognitive Threat Assessment and Cognitive Threat Taxonomy.}
}This project uses a Dual-License Model.
Applies to: Command Center HTML/JS, CTSS calculator scripts, JSON registry, and all code files. You may use this code commercially, modify it, and build products on top of it.
Applies to: The CSF methodology text, domain definitions, threat taxonomy, and all documentation. You may share, adapt, and redistribute. You must attribute the Cyber Strategy Institute and share derivatives under the same license.
Managed by Cyber Strategy Institute | Copyright ยฉ 2026. All Rights Reserved.
"The question is not whether we build the defenses. The question is whether we build them before the substrate is too degraded to support them."