Fake news, conspiracy theories, and lies: an information laundering model for homeland security
Korta, Samantha M.
MetadataShow full item record
The purpose of this research, broadly speaking, is to expose the threat that fake news poses to our national security. This thesis answers the question: Can the information laundering model, or a modified version of it, be used to explain how the internet is exploited to spread fake news, and the resulting threat to the United States? I assert that a well-crafted narrative, whether true or false, can be spread rapidly online due to the accessibility and interconnectedness of the internet ecosystem. I then articulate how these narratives can be further accelerated and disseminated when propagandists take advantage of existing processes that improve the customization, ease of access, and availability of information online. I do this by modifying the information laundering model, and then using the new model to examine the interconnectedness of search engines, blogs, social networking platforms, and media/academic outlets, and how these connections can be exploited to launder false or purposefully misleading information into public discourse. Finally, I demonstrate how this process allows adversarial nations, criminals, and malicious actors to increase public discord, undermine democracy, and threaten Americans’ physical and cognitive security.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Mutisya, Carolyne M. (Monterey, California: Naval Postgraduate School, 2017-06);In response to Kenyan citizens' growing uneasiness with regard to the cross-border violence from Somalia-based terrorists, the government of Kenya has begun to erect a barrier along its shared border with Somalia. This ...
Ogren, Joel G.; Langevin, James R. (Monterey, California: Naval Postgraduate School, 1999-06);The number of people connecting to the Internet is growing at an astounding rate: estimates range from 100% to 400% annually over the next five years. This unprecedented level of interconnectedness has brought with it the ...
Moon, David B. (2007);The internet has many characteristics that support extremists' information operations, such as being able to reach large audiences. Yet the internet also has inherent weaknesses that can be exploited. One of these weaknesses ...