Saga VII · The Archive · Series 38

The Influence Architecture

The extraction machine creates the captured audience. The influence architecture targets that audience with engineered apparent consensus. Together they constitute the complete capture pipeline.

6 Papers · Series IA · ICS-2026
Series Thesis

The Semantic Record (Series 37) documented how the content of cognitive priors is installed through language. This series documents how those installed priors are reinforced at population scale — through three mechanisms: affective engineering (content designed to produce emotional states that bypass analytical evaluation), consensus engineering (coordinated inauthentic behaviour that manufactures the appearance of distributed agreement), and source laundering (intermediary entities that conceal the origin, funding, and strategic intent of information).

Together with the Semantic Record and the Neuroscience Integration (Phase 14), this series completes the Institute's mechanistic turn: the full capture pipeline from neurotransmitter to population-level epistemic failure, at every layer.

3
Influence architecture mechanisms documented: affective engineering, consensus engineering, and source laundering
81
Countries in which organised social media manipulation campaigns had been identified by 2020 (Oxford Internet Institute)
87M
Facebook profiles whose data was extracted by Cambridge Analytica for psychographic targeting in democratic elections
Six Papers
1
ICS-2026-IA-001
The Emotional Trigger Record
Named condition: Affective Engineering
Content designed to produce emotional states that bypass analytical evaluation. The Facebook internal research documented that outrage-triggering content received algorithmic amplification because it maximised engagement. The emotion is the distribution mechanism. The content is the payload. Includes the Red Flag Filter: "What emotional state is this designed to evoke, and who benefits?"
ICS-2026-IA-001 · Series 38 · 18 min read
2
ICS-2026-IA-002
The Computational Propaganda Record
Named condition: Consensus Engineering
Bots, sock puppets, troll farms creating the appearance of broad organic agreement. The IRA operated with hundreds of employees and $1.25M monthly budget. By 2020, manipulation campaigns identified in 81 countries. Three techniques: volume flooding, origin diversity, and timing coordination. The target is not reasoning — it is the social proof heuristic.
ICS-2026-IA-002 · Series 38 · 20 min read
3
ICS-2026-IA-003
Source Laundering
Named condition: The Origin Opacity
Front organisations, captured academics, fictitious news agencies, paid influencer networks — four laundering architectures that make it impossible for the end-user to trace content to its actual origin. The media literacy paradox: the more effectively a population is trained to evaluate sources, the more valuable source laundering becomes.
ICS-2026-IA-003 · Series 38 · 17 min read
4
ICS-2026-IA-004
The Snowden Disclosure Record
Named condition: The Invisible Infrastructure
Three mechanisms operating simultaneously: the Invisible Infrastructure (classification preventing public consent), the Panopticon Effect (knowledge of possible surveillance producing self-censorship at population scale), and Ad Hominem Diversion (character assassination substituted for constitutional evaluation). The democratic deliberation the Deliberative Problem series specified as the foundation of democratic legitimacy did not occur.
ICS-2026-IA-004 · Series 38 · 22 min read
5
ICS-2026-IA-005
The Cambridge Analytica Record
Named condition: The Psychographic Weapon
The documented case in which all three influence mechanisms were combined with psychographic targeting derived from 87 million Facebook profiles. Four-layer data pipeline from personality quiz to targeted election content. The REBUS model explains why psychographic targeting is the most efficient prior-tightening mechanism yet documented. The regulatory response addressed privacy. The democratic function harm was not addressed.
ICS-2026-IA-005 · Series 38 · 19 min read
6
ICS-2026-IA-006
The Detection Standard
Named condition: The Organic-Synthetic Distinction
Three forensic criteria for distinguishing organic information environments from manufactured ones: volume signature (posting frequency, account-age, engagement-to-follower distributions), origin diversity (linguistic clustering, social network isolation, content convergence), and temporal pattern (spike-without-build-up, sustained-without-decay, cross-platform synchronisation). The information-operations equivalent of the forensic audit methodology.
ICS-2026-IA-006 · Series 38 · 15 min read
Series-Level Named Condition · IA
The Distribution Architecture
The full configuration of affective engineering (content designed to produce emotional states that bypass analytical evaluation), consensus engineering (coordinated inauthentic behaviour that manufactures apparent agreement), and source laundering (intermediary entities that conceal the origin and intent of information) — operating as an integrated system to reinforce installed priors at population scale, completing the capture pipeline from linguistic installation (Semantic Record) to social reinforcement (Influence Architecture).