Cognitive Warfare & PSYOPS MCP avatar

Cognitive Warfare & PSYOPS MCP

Pricing

Pay per event + usage

Go to Apify Store
Cognitive Warfare & PSYOPS MCP

Cognitive Warfare & PSYOPS MCP

Adversarial narrative operation detection and counter-narrative optimization for AI agents via the Model Context Protocol.

Pricing

Pay per event + usage

Rating

0.0

(0)

Developer

ryan clinton

ryan clinton

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

7 days ago

Last modified

Share

Cognitive Warfare Psyops MCP Server

Adversarial narrative operation detection and counter-narrative optimization for AI agents via the Model Context Protocol. This MCP server orchestrates 16 Apify actors and applies 8 mathematical frameworks -- SIR-Hawkes epidemiological modeling, DeGroot social learning, Bayesian Stackelberg games, persistent homology, doubly-robust causal inference, Price equation evolutionary dynamics, Morlet wavelet analysis, and q-state Potts statistical physics -- to detect, model, and counter information warfare operations.

What data can you access?

Data PointSourceCoverage
Social media posts and engagementBluesky SocialBluesky network
Community discussions and trendsHacker NewsTech community
Encyclopedic context and historyWikipedia6M+ articles
US federal regulatory activityFederal RegisterAll federal actions
International wanted personsInterpol Red NoticesGlobal notices
Global sanctions and watchlistsOpenSanctions100+ programs
Website content changesWebsite Change MonitorTracked sites
Historical content evolutionWayback MachineWeb Archive
Country profiles and demographicsREST CountriesAll nations
Global disaster eventsGDACS Disaster AlertsWorldwide
Congressional legislationCongress BillsCurrent sessions
Weather events (crisis context)NOAA WeatherUS and global
Open-source tools and codeGitHub Repo SearchAll public repos
Policy documents (full text)Website Content to MarkdownAny webpage
DNS recordsDNS LookupAny domain
IP geolocationIP GeolocationGlobal coverage

MCP Tools

ToolPriceDescription
detect_narrative_operations$0.04Detect coordinated narrative operations via coupled SIR-Hawkes epidemiological model. Classifies operation type (amplification/suppression/distortion/fabrication/polarization) with coordination scores.
model_belief_dynamics$0.04Model belief propagation via DeGroot social learning on influence networks. Returns agent belief states, eigenvector centrality, convergence rate (spectral gap), and polarization index.
optimize_counter_narrative$0.04Optimize counter-narrative strategy via Bayesian Stackelberg game with cognitive hierarchy truncation. Returns optimal actions, timing (secretary problem), and Stackelberg payoffs.
map_influence_topology$0.04Map influence network topology via persistent homology (Vietoris-Rips filtration). Returns Betti numbers, persistence diagrams, cluster structure, and Wasserstein distance.
attribute_narrative_causation$0.04Attribute narrative effects to actors via doubly-robust causal inference. Returns causal effects (ATE), propensity scores, Rosenbaum sensitivity, and submodular information gain.
simulate_memetic_evolution$0.04Simulate memetic evolution via Price equation evolutionary dynamics. Returns variant fitness landscape, selection vs transmission bias decomposition, and dominant meme trajectory.
detect_cross_scale_coordination$0.04Detect cross-scale coordinated behavior via Morlet wavelet multi-resolution analysis at individual/group/network/population scales with wavelet power spectra.
forecast_polarization_phase_transition$0.04Forecast polarization phase transitions via q-state Potts model from statistical physics. Returns order parameter, critical temperature, susceptibility, and regime classification.

Data Sources

  • Bluesky Social -- Social media posts, engagement metrics, and network connections for narrative propagation analysis
  • Hacker News -- Community discussions and trending topics for narrative velocity measurement
  • Wikipedia -- Encyclopedic context for historical baseline and edit war detection
  • Federal Register -- US regulatory activity for government narrative framing analysis
  • Interpol Red Notices -- International wanted persons for threat actor attribution
  • OpenSanctions -- Global sanctions and PEP data for state actor identification
  • Website Change Monitor -- Content change tracking on media and government websites
  • Wayback Machine -- Historical content for narrative evolution and revision detection
  • REST Countries -- Country profiles for geopolitical context in narrative analysis
  • GDACS Disaster Alerts -- Crisis events that amplify narrative vulnerability
  • Congress Bills -- Legislative activity for political narrative context
  • NOAA Weather -- Weather events creating narrative exploitation windows
  • GitHub Repo Search -- Open-source disinformation detection tools and datasets
  • Website Content to Markdown -- Full-text extraction from policy and media pages
  • DNS Lookup -- Infrastructure attribution for narrative source identification
  • IP Geolocation -- Geographic attribution of digital narrative infrastructure

How the scoring works

Eight mathematical frameworks provide different analytical lenses on information warfare.

SIR-Hawkes Epidemiological Model couples compartmental epidemic dynamics (Susceptible-Infected-Recovered) with Hawkes self-exciting point process intensity. Infection rate is modulated by narrative intensity, enabling detection of coordinated amplification campaigns.

DeGroot Social Learning models belief propagation through influence networks. Eigenvector centrality identifies key opinion leaders; spectral gap measures convergence speed; polarization index tracks belief divergence.

Bayesian Stackelberg Game models counter-narrative as a leader-follower game with cognitive hierarchy truncation. Optimal timing follows the secretary problem framework. Returns Stackelberg payoffs for attacker and defender.

Persistent Homology via Vietoris-Rips filtration reveals topological features (clusters, loops, voids) in influence networks at multiple scales. Betti numbers quantify structural complexity.

Doubly-Robust Causal Inference estimates Average Treatment Effect (ATE) of narrative interventions with Rosenbaum sensitivity analysis for hidden confounders. Submodular information gain identifies optimal measurement points.

Price Equation Evolutionary Dynamics decomposes narrative evolution into selection differential and transmission bias, identifying which narrative variants are winning in the memetic fitness landscape.

Morlet Wavelet Analysis detects coordination patterns at individual, group, network, and population scales simultaneously. Cross-scale coherence reveals hierarchical coordination structures.

q-State Potts Model from statistical physics forecasts polarization phase transitions. The order parameter and susceptibility measure how close a population is to a critical transition between consensus and fragmentation.

How to connect this MCP server

Claude Desktop

{
"mcpServers": {
"cognitive-warfare-psyops": {
"url": "https://cognitive-warfare-psyops-mcp.apify.actor/mcp"
}
}
}

Programmatic (HTTP)

curl -X POST https://cognitive-warfare-psyops-mcp.apify.actor/mcp \
-H "Content-Type: application/json" \
-H "Authorization: Bearer YOUR_APIFY_TOKEN" \
-d '{"jsonrpc":"2.0","method":"tools/call","params":{"name":"detect_narrative_operations","arguments":{"query":"election interference social media"}},"id":1}'

This MCP server also works with Cursor, Windsurf, Cline, and any other MCP-compatible client.

Use cases for cognitive warfare intelligence

Government STRATCOM Analysis

Detect coordinated narrative operations targeting national narratives with detect_narrative_operations. Classify operation type and assess threat level for strategic communications response.

Counter-Disinformation Strategy

Optimize counter-narrative timing and content with optimize_counter_narrative. The Bayesian Stackelberg framework identifies optimal response actions against modeled adversary strategies.

Social Media Platform Integrity

Detect cross-scale coordination patterns with detect_cross_scale_coordination. Morlet wavelet analysis reveals bot networks and coordinated inauthentic behavior at multiple organizational levels.

Academic Information Warfare Research

Model belief dynamics with model_belief_dynamics and simulate memetic evolution with simulate_memetic_evolution for academic research on information ecosystems and narrative competition.

Crisis Communication Vulnerability Assessment

Forecast polarization phase transitions with forecast_polarization_phase_transition to identify when populations are near critical points where information interventions have outsized impact.

Attribution and Causal Analysis

Attribute narrative effects to specific actors with attribute_narrative_causation. Doubly-robust estimation with Rosenbaum sensitivity analysis provides defensible causal claims.

How much does it cost?

All tools cost $0.04 per call. The Apify Free plan includes $5 of monthly credits -- enough for 125 tool calls. Each call queries up to 16 actors in parallel.

FAQ

Q: Is this for offensive or defensive use? A: This is designed for defensive narrative intelligence -- detecting adversarial operations, modeling threats, and optimizing counter-narratives. Responsible use is essential.

Q: How accurate are the mathematical models? A: The models provide quantitative frameworks for analysis. Results should be interpreted by domain experts. Model accuracy depends on data availability and quality.

Q: Is it legal to use this? A: All data sources are publicly available. See Apify's guide on web scraping legality.

Q: What social platforms are covered? A: Currently Bluesky for social data, Hacker News for community discussions, and Website Change Monitor for media/government content changes.

Q: Can this detect deepfakes? A: No. This analyzes narrative patterns and coordination structures, not media content. Deepfake detection requires specialized visual analysis tools.

MCP ServerFocus
brand-narrative-intelligence-mcpBrand-level narrative and reputation monitoring
corporate-political-exposure-mcpPolitical influence and lobbying analysis
ai-model-governance-mcpAI governance and bias research monitoring

Integrations

This MCP server runs on the Apify platform and supports scheduling, webhooks, API access, and dataset export for STRATCOM and OSINT platform integration.