1 of 12

Amplification Mechanisms of Disinformation in �Nuclear Emergencies

Seungtae Han

Internet Governance Project

The Jimmy and Rosalyn Cater School of Public Policy

Georgia Institute of Technology

2 of 12

Research Design

Key Question

How does disinformation gain influence during nuclear emergencies?

  • What structural mechanisms transform false claims into “credible” information?
  • How do these mechanisms operate across different media entities?
  • How can we counter these amplification pathways?

Jowett & O’Donnell’s Propaganda Framework

LSM (Legitimating Source Model)

Authority and credibility building through source validation

Research Scope

  • 568 propaganda instances
  • Multiple media platforms
  • Cross-national analysis

Case Studies

  • Disinformation surrounding Fukushima Daiichi

Nuclear Power Plant’s treated water release

3 of 12

The Central Thesis

Moving from “what is false?” to “how does falsehood gain power?”

“The amplification mechanism, not content sophistication, determines disinformation impact”

Key Insight

  • Simple falsehoods with proper amplification networks gain more traction than sophisticated false contents.
  • Understanding structural pathways is more critical than detecting and identifying individual disinformation contents.
  • The Legitimating Source Model (LSM) reveals how false information gains credibility through systematic reinforcement.
  • To counter disinformation effectively, we must target the amplification infrastructure, not chase individual messages.

4 of 12

Legitimating Source Model (LSM)

Core Concept

  • Uses authoritative sources to legitimize messages
  • Creates networks of mutual reinforcement
  • Builds credibility through cross-validation

Key Mechanisms

  • Source (P) → Initial Message (M1)
  • Validating Source (P2) → Modified Message (M2)
  • Final Message (M3) with enhanced credibility

How Disinformation Gains Credibility

5 of 12

National Emergency Information Environment

Vulnerabilities:

Information Asymmetry: State/operator has greater access to critical data.

Time Pressure: rapid decisions with incomplete information.

Public Anxiety: heightened emotions reduce critical thinking.

Technical Complexity: easy to mislead on technical/scientific information.

Trust Deficit: crisis raises skepticisms of official sources.

The perfect storm:

Crisis + Uncertainty + Technical Complexity + Trust Deficit

= Ideal conditions for LSM exploitation

Nuclear emergencies exemplify these conditions at their extreme

6 of 12

Amplification Case 1

The Mutual Reinforcement Pattern

Actors:

P1: Civic Group (P1.1) + Legacy Media (P1.2)

P2: State Media and Government

R: Publics in East Asia

How It Worked:

  1. Initial Seeding: Civic group publishes allegation about international organization [M1]

2. Cross-Border Legitimation: State media in neighboring region picks up story, reframes as "civic groups raise concerns..." [M1→M2]

3.Distribution:

P2 directly broadcasts to public (R) [M2]

P1 media cites P2's coverage as "international confirmation" [M2→M3]

7 of 12

Amplification Case 2

The Echo Chamber Effect

Actors:

P1: Government (P1.1) + Legacy Media (P1.2)

P2: Legacy Media (P2.1) + Social Media (P2.2)

R1/R2: Public A and Public B

How It Worked:

  1. Official Claims: Government makes comparative claims, media amplifies [M1]
  2. Cross-Border Echo: Neighboring region's media responds with analysis [M1→M2]
  3. Recursive Amplification:
    1. P1 cites P2 coverage as validation [M2→M3→R1]
    2. P2 continues evolution [M4→M5→R2]
    3. Each iteration adds "verification"

8 of 12

Observed Amplification Mechanism

What Makes LSM Effective?

1. Institutional Credibility > Content Sophistication

  • Source reputation matters more than message complexity
  • Simple falsehoods from "credible" sources spread faster

2. Traditional Media's Legitimizing Role

  • Still viewed as more trustworthy than social media
  • Critical node in amplification networks

3. Alignment with Existing Beliefs

  • Confirmation bias accelerates acceptance
  • Pre-existing narratives provide fertile ground

4. Contextual Legitimacy

  • Messages that "make sense" in current context
  • Emotional resonance trumps factual accuracy

9 of 12

Key Implications

1. Chasing individual messages = treating symptoms, not the disease

  • 568 cases show: each debunked claim spawns multiple variants
  • By the time you fact-check M1, M2 and M3 are already circulating

2. Amplification mechanism is the Target

  • Disinformation's power comes from the network, not the message
  • Simple falsehoods + strong amplification > sophisticated disinformation alone
  • Multiple voices saying false > single authoritative source

3. Speed and Scale Require Structural Response

  • Traditional reactive approaches can't match digital amplification speed
  • Proactive infrastructure beats reactive fact-checking

4. Trust Networks Can Be Built and Deployed

  • If propagandists can create LSM networks, so can legitimate actors
  • Key: establish your legitimating sources BEFORE crisis hits

10 of 12

Strategic Counter-LSM Approach

Neutralizing Amplification Mechanisms is the key.

"Fight networks with networks, not individual messages"

1. Disrupt Feedback Loops

  • Identify and expose circular citations
  • Real-time network analysis
  • Preemptive credibility warnings

2. Build Alternative LSM Networks

  • Government + Academia + Civil Society + Media
  • Create legitimate verification chains
  • Proactive information ecosystems

3. Strengthen Source Diversity

  • Multiple independent channels
  • Cross-verification protocols
  • Transparency in sourcing

11 of 12

Practical Implementation

1. Multi-Layer Verification System

  • Government → Academic institutions → Professional associations → Media
  • Each layer independently validates and amplifies factual information
  • Example: IAEA findings → University nuclear experts → Science journalists → Public

3. Platform-Specific Amplification

  • Traditional media: Regular briefings with science journalists, not just crisis moments
  • Social media: Build networks of trusted experts who can quickly share/validate
  • Academic channels: Pre-established expert panels ready to provide rapid commentary

Building Counter-Amplification Infrastructure

Create Your Own LSM Networks:

2. Geographic Counter-Networks

  • Establish partnerships with credible voices in neighboring regions
  • Pre-position translated fact sheets with regional partners
  • Counter cross-border legitimation with cross-border truth networks

12 of 12

��

THANK YOU!