This article is about the propaganda tactic. For the adversarial machine learning strategy, see Adversarial machine learning § Defenses.
Information laundering, narrative laundering[1] or disinformation laundering[2] is the surfacing of news, false or otherwise, from unverified sources into the mainstream.[3][4][5] By advancing disinformation to make it accepted as ostensibly legitimate information, information laundering resembles money laundering—the transforming of illicit funds into ostensibly legitimate funds.[6][7]
Descriptions
[edit]
Information laundering, as summarized by American comedian and commentator Jon Stewart, can happen when relatively reputable news organizations report on something that a blog or platform of unknown credibility has written. These news organizations may attribute the assertion, but another publication may omit its original source. "That piece of information [on where the news came from] has now been laundered," Stewart says, and the original assertion, whether or not its source was credible, gains credibility, especially if it is used by outlets known for high standards.[4]
Pace University's Adam Klein, who developed the theory, argues that information laundering is similar to how criminals launder illegal funds into financial institutions.[8] In the case of information laundering, illegitimate exchanges of information flow through social networks, political blogs, and search engines, where they intermix with mainstream ideas, and gradually become washed of their radical origins. According to Klein, "[c]onspiracies grow in communities like Reddit or Twitter, which can act as incubators. Then they graduate onto more respected websites and political blogs, until sometimes, they're picked up by mainstream news outlets as 'trusted information'."[5]
Digital platforms can be especially vulnerable to information laundering efforts; faked videos (deepfakes) and images (photograph manipulation), for instance, can create media moments and spread disinformation.[9] According to Karen Kornbluh, director of the German Marshall Fund's Digital Innovation Democracy initiative, and Ellen Goodman, director of the Rutgers Institute for Information Policy & Law, bots, fake accounts and click farms "pretend to be people they're not and create a false sense of consensus", and commercial platforms, "designed to keep users online to be served ads, end up privileging engagement over truth or the public interest. What drives engagement is often outrage and disgust, so this is what the algorithm rewards."[10]
According to a report by NATO in 2020, state actors that engage in information laundering, particularly Russia, "are generally supported by cyber capabilities that enhance the spread and amplification of a laundered piece, e.g. through the creation of fake personas and burner accounts, and sophisticated for manipulation of information, e.g. through the distribution of forged letters."[11]
Examples
[edit]
In 2013, WikiLeaks, which publishes secret information from anonymous sources, was said in a commentary by Jonathan Holmes on ABC Australia to be information laundering.[12]
Information laundering was alleged in the spreading of false news by social media in the 2018 Mexican election.[13]
American intelligence officials say China and Russia have used information laundering to spread disinformation in the West about the COVID-19 pandemic[14] and the 2020 elections in the United States.[15][16][17][18] The Russian effort has included a network of fake accounts on social media.[16] Russian propaganda using information laundering is also suspected in stoking fears about 5G technology.[19] The Alliance for Securing Democracy, an American group that opposes Russian efforts to undermine Western elections, cites maskirovka, a Soviet-era military doctrine that translates as 'mask' or 'masquerade', as a precursor to Russian information laundering.[6] Despite bans in multiple countries, content from Russian state media outlets such as RT and Sputnik continues to be laundered through third-party sites.[20]
Local "Save the Children" rallies in 2020 by supporters of QAnon, an American far-right conspiracy theory, were an example of information laundering, as QAnon hijacked a unifying cause in attempts to attract credulous local television news coverage, according to Brandy Zadrozny of NBC News.[21]
According to The Economist, the Independent Online of South Africa "often engages in 'information laundering' designed to make sentiment appear homegrown, says Herman Wasserman at the University of Cape Town. For instance, it will run a Chinese news-agency story on the biolab conspiracy, then get a left-wing student leader to write an article expressing concern about the supposed biolabs. Chinese news agencies will use that to write about how South Africans are worried, thus manufacturing a 'story' out of nothing at all."[22]
In 2023, the United States Department of State accused the Chinese government of information laundering by using "manufactured personas" such as a fictitious opinion columnist named "Yi Fan" to present state narratives as "organic sentiment".[23][24][25]
Detection
[edit]
In 2024, the Alliance for Securing Democracy, the University of Amsterdam, and the Institute for Strategic Dialogue jointly released an open-source tool for uncovering websites republishing content from Russian state media.[26]
Similar phrases
[edit]
A similar phrase, idea laundering, has described how academicians may advance non-scientific ideas as knowledge or fact.[27][28][29][30] A 2020 paper used the phrase idea laundering to describe plagiarism "in which ideas are plagiarized and then the plagiarism is hidden in plain sight".[29]
Similarly, citation laundering is a colloquial term used to refer to a number of practices including:[31][32][33]
Hiding a self-citation by citing someone who has referenced one's own work. (Sometimes also called "stealth citation".[34] Individual self-citation is not to be confused with journal self-citation, commonly known as coercive citation.[35][36])
Citing a number of more recent works that ultimately all pull their information from one flawed source. This can be intentional disinformation or an accidental lack of rigor.
Self-citation practices are usually done with the intent of increasing a scholar's research impact in terms of metrics such as the h-index; groups of scholars can form "citation farms" or "citation cartels" to aggrandize each other's work.[37][38] Self- or co-citation in this way can also contribute to information laundering as it increases the seeming authority of a claim without rigorously investigating its source.
Machine learning definition
[edit]
In adversarial machine learning, information laundering refers to a general strategy that purposely alters the information released to adversaries, with the goal of alleviating model stealing attacks.[39]
^Klein, Adam G. (2017). "A theory of information laundering". Fanaticism, racism, and rage online: corrupting the digital sphere. Cham: Palgrave Macmillan. ISBN 978-3-319-51423-9.
^Klein, Adam (2012). "Slipping Racism into the Mainstream: A Theory of Information Laundering". Communication Theory. 22 (4): 427–448. doi:10.1111/j.1468-2885.2012.01415.x.
^Smith, Hannah; Mansted, Katherine (2020). Weaponised deep fakes(PDF) (Report). Australian Strategic Policy Institute. JSTOR resrep25129. Archived(PDF) from the original on January 18, 2023. Retrieved June 16, 2024.
^"Information Laundering in Germany". NATO Strategic Communications Centre of Excellence. October 2020. Archived from the original on March 18, 2023. Retrieved December 19, 2020.
^"How the People's Republic of China Seeks to Reshape the Global Information Environment". United States Department of State. September 28, 2023. Archived from the original on September 28, 2023. Retrieved September 29, 2023. PRC officials sometimes attribute relevant content to specific authors under false names, likely to conceal the PRC's role in producing it and falsely purporting to represent legitimate, organic sentiment in a given region. In addition, PRC officials are known in some cases to attribute such manufactured commentaries to "international affairs commentators" and then use other individual, non-official accounts to promote these commentaries. As one example, the PRC Ministry of Foreign Affairs (MFA) uses a manufactured persona named Yi Fan, often credited as a "Beijing-based international affairs commentator," to deceptively promote pro-Beijing views on a wide variety of topics and regions.
^Roach, Joseph (2017). "The Serendipity Tango: "Volume 1, Number 1"". Journal of Dramatic Theory and Criticism. 31 (2): 141–152. doi:10.1353/dtc.2017.0007. ISSN 2165-2686. S2CID 201777959.
^Hyland, Ken (February 1, 2003). "Self-citation and self-reference: Credibility and promotion in academic publication". Journal of the American Society for Information Science and Technology. 54 (3): 251–259. doi:10.1002/asi.10204. ISSN 1532-2882.
^Wang, Xinran; Xiang, Yu; Gao, Jun; Ding, Jie (2020). "Information Laundering for Model Privacy". arXiv:2009.06112 [cs.CR].
v
t
e
Media manipulation
Context
Bias
Crowd psychology
Deception
Dumbing down
False balance
Half-truths
Media
Obfuscation
Persuasion
Manipulation (psychology)
Activism
Advocacy
group
Alternative media
Boycott
Call-out culture
Cancel culture
Civil disobedience
Culture jamming
Demonstrations
Deplatforming
Grassroots
Guerrilla communication
Hacktivism
Internet
Media
Occupations
Petitions
Protests
Youth
Advertising
Advertorial/Native advertising
Billboards
False
Infomercials
Mobiles
Modeling
Radio
Sex
Slogans
Testimonials
TV
Criticism of advertising
Annoyance factor
Censorship and mass media regulation
Books
Broadcast law
Burying of scholars
Catch and kill
Corporate
Cover-ups
Euphemism
Films
Historical negationism
Internet
Political
Religious
Self
Hoaxing
Alternative facts
April Fools'
Deepfake
audio
Fake news
websites
Fakelore
Fictitious entries
Firehose of falsehood
Forgery
Gaslighting
List
Literary
Lying press
Photograph manipulation
Racial
Urban legend
Virus
Video manipulation
Marketing
Branding
Loyalty
Product
Product placement
Publicity
Research
Word of mouth
News media
Agenda-setting
Broadcasting
Circus
Cycle
Emotive conjugation
False balance
Infotainment
Managing
Narcotizing dysfunction
Newspeak
Pseudo-event
Scrum
Sensationalism
Tabloid journalism
Political campaigning
Advertising
Astroturfing
Attack ad
Canvassing
Character assassination
Dog whistle
Election promises
Lawn signs
Party platforms (or manifestos)
Name recognition
Negative
Push polling
Smear campaign
Wedge issue
Propaganda
Bandwagon
Big lie
Crowd manipulation
Disinformation
Fearmongering
Framing
Indoctrination
Loaded language
National mythology
Rally 'round the flag effect
Techniques
Psychological warfare
Airborne leaflets
False flag
Fifth column
Information (IT)
Lawfare
Political
Public diplomacy
Sedition
Subversion
Public relations
Cult of personality
Doublespeak
Non-apology apology
Reputation management
Slogans
Sound bites
Spin
Transfer
Understatement
Weasel words
Corporate propaganda
Sales
Cold calling
Door-to-door
Pricing
Product demonstrations
Promotion
Spaving
Promotional merchandise
Telemarketing
Related
Influence-for-hire
Media bias
United States
Media concentration
Media democracy
Media ecology
Media ethics
Media franchise
Media influence
Media proprietor
This article is licensed under CC BY-SA 3.0. Original source: https://en.wikipedia.org/wiki/Information laundering Status: article is cached