NICCS LISTED · DISINFORMATION DEFENSE · IDENTITY FUSION · INFLUENCE OPERATIONS · IAFIE ALIGNED

Disinformation — Cognitive Warfare — Misinformation & Influence Operations Including the Identity Fusion Module

Disinformation is not just false information. It is deliberately fabricated content propagated with intent to deceive, distinct from misinformation (false but not intentionally deceptive) and malinformation (true but weaponized through selective deployment). Modern adversary cog-war operations use all three categories in combination — building narrative environments where defenders cannot trust source, message, or amplifier without structured analytic discipline.

This $799 flagship-tier specialty course covers aspects of disinformation, narrative manipulation, and influence operations defense, including the distinctive Identity Fusion module that examines how adversaries weaponize group identity for narrative attacks. The most substantive defensive cognitive-warfare module in the Treadstone 71 catalog, designed for practitioners who need to recognize, characterize, and counter influence operations across cyber, social, and traditional media channels.

Course Price$799 USD
TierFlagship Specialty
LevelIntermediate-Adv.
IncludesIdentity Fusion

What You'll Learn

Disinformation, narrative manipulation, influence operations — recognition and defense

  • The Disinfo / Misinfo / Malinfo Distinction — three categories of weaponized information, their different operational purposes, different detection signatures, and different counter-strategies. Why conflating them produces bad analysis and worse counter-operations.
  • Identity Fusion Module — distinctive Treadstone 71 module on how adversaries weaponize group identity (national, religious, political, ethnic, ideological) for narrative attacks. The cognitive mechanism of identity fusion, how it gets exploited, and how to recognize identity-fusion-based operations in the wild.
  • Influence Operations Defense Framework — structured approach for recognizing, characterizing, attributing, and countering influence operations across cyber, social, and traditional media channels.
  • Narrative Manipulation TTPs — specific tradecraft adversaries use: narrative seeding, amplification, source laundering, persona networks, controlled-opposition techniques, and the markers analysts can use to identify them.
  • Multi-Adversary Pattern Recognition — how Russian, Chinese, Iranian, and non-state adversary disinformation operations differ in signature; the differences matter for attribution and counter-strategy.
  • Cognitive Warfare Defense Posture — how disinformation defense fits within the broader cognitive warfare arc; the boundary between disinformation defense, counter-psyops, and information environment management.

Course Content

A Substantive Defensive Cognitive-Warfare Module

Disinformation operations are not new, but the digital information environment has dramatically scaled both the volume of adversary disinformation activity and the speed at which it can propagate. Modern adversary cog-war operations exploit the structural conditions of the contemporary information environment — platform algorithms optimized for engagement over truth, audience fragmentation across thousands of micro-communities, lowered cost of producing convincing fabricated content, and the asymmetric burden facing defenders who must identify and counter at scale what adversaries can produce in volume. The course examines the resulting operational landscape and the analytic tradecraft needed to operate within it effectively.

The Identity Fusion module is a distinctive component — examining the cognitive mechanism by which group identity gets weaponized for narrative attacks. When adversaries can frame an operation as an attack on group identity rather than on an issue, the defender's task becomes substantially harder because target audiences process identity-attack framing differently from issue framing. The Identity Fusion module gives analysts the analytic tools to recognize identity-fusion operations and counter them without inadvertently amplifying the underlying frame.

Part Of A Larger Curriculum

One of the Flagship Components in the AI-Infused Cognitive Stack

This $799 disinformation defense course is one of the higher-value specialty components of the AI-Infused Cognitive Stack ($6,999), alongside PEOPINT ($2,499) and Cyber Warfare ($1,999) as the three flagship-tier modules. The Stack delivers all three plus the multi-adversary doctrine modules (Russia, China, Iran) plus NATO doctrine and the Seven Radicals adversary HUMINT methodology — comprehensive cognitive warfare capability at substantial bundle savings versus enrolling individually.

Common Questions

Disinformation / Cognitive Warfare — FAQ

Who is this course designed for?

Cognitive warfare practitioners, influence operations analysts, IO and PA officers, strategic communications teams, foreign service personnel countering narrative threats, IC analysts working influence operations portfolios, journalists and researchers covering disinformation, and platform trust-and-safety teams. Intermediate-to-advanced level; assumes baseline cyber intelligence or strategic communications context.

What is the Identity Fusion module?

A distinctive Treadstone 71 module covering how adversaries weaponize group identity (national, religious, political, ethnic, ideological) for narrative attacks. Examines the cognitive mechanism of identity fusion, the operational patterns of identity-fusion exploitation, and the defensive tradecraft for recognizing and countering identity-fusion-based operations without inadvertently amplifying the underlying frame.

How does disinformation differ from misinformation and malinformation?

Disinformation is deliberately fabricated content propagated with intent to deceive. Misinformation is false content propagated without deceptive intent. Malinformation is true content weaponized through selective deployment, decontextualization, or hostile framing. The three categories have different detection signatures and require different counter-strategies. Conflating them produces analytic confusion.

Is there a prerequisite?

Recommended prerequisite is Cognitive Warfare Definitions Part 1 ($99) for vocabulary grounding. Familiarity with one or more adversary doctrine modules (Russian, Chinese, Iranian) is helpful but not required. The course is intermediate-to-advanced level.

Why is this course more expensive than other Tier 2 specialty courses?

At $799 this is a flagship-tier specialty course reflecting both the analytic depth of the content (most substantive defensive cognitive-warfare module in the catalog) and the distinctive Identity Fusion module. Comparable in scope and depth to PEOPINT ($2,499) and Cyber Warfare ($1,999), the three flagship-tier modules in the AI-Infused Cognitive Stack. The Stack bundles all three plus 10 adversary doctrine and methodology modules at substantial savings.

About The Provider
Treadstone 71
We See What Others Cannot

Treadstone 71 has worked disinformation analysis and counter-influence operations since the early 2000s. Foundational capability spans USAF Arabic and Russian cryptologic linguistics, Middle East and Russian academic studies, two decades of strategic adversary work, and operational engagements supporting FBI OSINT during the 2013 Boston Marathon investigation. The firm is veteran-owned, woman-led, NICCS-listed, IAFIE-aligned, and has briefed senior leaders at NATO CCDCOE, USNA, AFIT, and Johns Hopkins on disinformation analysis, influence operations, and narrative defense.

FBI OSINT Support (2013 Boston Marathon)
NATO CCDCOE Briefings
NICCS Listed Provider
Two Decades of Counter-Influence Work

Build Substantive Disinformation Defense Capability

Self-paced. Intermediate-to-advanced. Includes the distinctive Identity Fusion module. Scroll up to enroll, or consider the AI-Infused Cognitive Stack to combine this with the multi-adversary doctrine curriculum.

$799 USD Self-paced · Flagship specialty · Lifetime access · CPE credits

Get started now!



Course Curriculum


  Disinformation - Misinformation - Influence Operations
Available in days
days after you enroll
  Disinformation 101
Available in days
days after you enroll
  Disinformation 102
Available in days
days after you enroll
  Disinformation 103
Available in days
days after you enroll
  Disinformation 104
Available in days
days after you enroll