
 
 
May 19, 2020
Considering the Source: Varieties of COVID-19 Information
Introduction 
exacerbating societal divisions and creating chaos, as the 
In common parlance, the terms propaganda, 
truth becomes more difficult to discern. 
misinformation, and disinformation are often used 
interchangeably, often with connotations of deliberate 
Disinformation Definition 
untruths of nefarious origin. In a national security context, 
Unlike misinformation, disinformation is intentionally 
however, these terms refer to categories of information that 
false, intending to deceive the recipient. In the international 
are created and disseminated with different intent and serve 
security context, governments and foreign actors seek to 
different strategic purposes. This primer examines these 
use disinformation to their advantage. Examples of 
categories to create a framework for understanding the 
disinformation include covertly planting deliberately false 
national security implications of information related to the 
news stories in the media, or altering private and/or 
Coronavirus Disease 2019 (COVID-19) pandemic. 
classified communications before their widespread public 
release. Coordinated disinformation campaigns often seek 
Categories of Information 
to exploit existing fissures within certain demographics, 
causing further political polarization and the erosion of trust 
Propaganda Definition 
in public institutions. These campaigns may cause decision 
There is no commonly accepted definition for what 
paralysis, where decisionmakers are overwhelmed with 
constitutes propaganda. To some, it connotes the spread of 
contradictory or otherwise unreliable information. Some 
false information from a governmental source, intended to 
disinformation may be easily detected and discredited, such 
have persuasive effects. For others, propaganda is merely 
as fraudulent accounts or suspicious news media websites 
any promotional material related to organizations both 
that may be full of typographical errors. Some viral videos 
public and commercial. For purposes of this discussion, 
and images give the appearance of documentation, but in 
propaganda is defined as the intentional propagation of an 
reality have been computer-generated or altered in a way 
idea or narrative in order to influence and persuade a target 
that is virtually undetectable to the naked eye. These “deep 
audience. Although it may contain factual information, 
fakes” are an example of disinformation that is increasingly 
propaganda is intended to persuade rather than merely to 
ubiquitous and particularly difficult to combat. 
inform. By this definition, an organization or government 
Psychological phenomenon such as confirmation bias, 
communicating its intent, policies, and values through 
defined as the tendency of individuals to interpret new 
speeches, press releases, and other public affairs can be 
information as confirmation of their existing beliefs, may 
considered propaganda. Some forms of propaganda present 
render attempts to discredit sources of disinformation 
selective information that is intended to manage perceptions 
ineffectual. Disinformation may continue to spread 
of the truth. Other forms may be unverifiable rhetorical 
throughout cyberspace even after it has been exposed as 
devices, such as slogans, illustrations, editorials, and 
false.   
opinion pieces that lack factual content. These 
communications can create perceptions that affect behavior 
Sources: Cyberspace as Medium for Transmission 
and steer decisionmakers toward a certain course of action. 
Cyberspace presents a force multiplier for groups in other 
countries seeking to amplify a message or narrative. 
Misinformation Definition  
Through the use of social media platforms, all three forms 
Misinformation is unintentionally false information. 
of information discussed here may proliferate throughout 
Examples include unfounded conspiracy theories, rumors, 
the internet, with the combined effect of fomenting discord 
and web hoaxes spread through social media by users 
and confusion. Much of today’s information is transmitted 
believing them to be true. Misinformation may be the result 
in cyberspace, leading many to associate information 
of laypersons’ misinterpretations of scientific material. In 
operations with cybersecurity. Yet on its own, 
some cases, misinformation results from theoretical 
cybersecurity, if defined as securing cyberspace from 
preliminary scientific research being interpreted as accepted 
attack, may be insufficient to prevent the spread of 
fact. In other cases, the scientific material may be well-
potentially harmful information. 
researched and documented, but later proven to rely on 
faulty premises. Major news outlets and governmental 
Cyberattacks on Information Sources 
sources sometimes unintentionally spread misinformation 
While cyberspace is the medium for information 
by reporting on rapidly changing events. While the 
transmission, cyberspace operations can be used to achieve 
reporting itself may be caveated as unconfirmed, the 
strategic goals. For example, an offensive cyberattack on 
information contained therein may then be widely 
sources of information may be used to create psychological 
disseminated by well-intended users and platforms. Though 
effects such as doubt and mistrust. A cyberattack may be a 
unintentional, misinformation can have the effect of 
demonstration of ability, intended to project power through 
cyberspace regardless of the level of sophistication evident 
https://crsreports.congress.gov 
Considering the Source: Varieties of COVID-19 Information 
in the attack methods. An unsophisticated cyberattack on a 
COVID-19 and Misinformation 
high-value target may give the appearance of vulnerabilities 
Reports of early medical studies on the communicability 
in the target and capabilities greater than what the attacker 
and prevention of COVID-19 may have had the 
may possess, thereby creating a false sense of panic. Some 
unintentional effect of misinforming the public, as such 
cyberattacks instill fear of worse attacks to come, or carry 
reporting was interpreted as having been scientifically 
threats of attacks in the physical world. Using this fear and 
proven. Examples include the efficacy of face masks in 
uncertainty, the cyberattacker may attempt coercion or 
preventing transmission, whether transmission occurs by 
other forms of exploitation. A cyberattacker may also deny 
airborne or droplet presence of the virus, whether younger 
or degrade access to information, overwhelming a website 
persons are relatively less susceptible, and whether certain 
with internet traffic and rendering it unusable. Some 
blood types are more susceptible to contracting the disease. 
attackers tamper with legitimate websites through 
The proliferation of conflicting reports and studies that 
defacement and placement of other forms of propaganda. 
were later disproven could cause individuals to disregard all 
Websites and other platforms of online communication may 
medical advice or to take measures that may in fact be 
be compromised when an attacker covertly implants 
counterproductive. Another potentially dangerous aspect of 
malicious code to infect the computers of anyone using 
misinterpreting information is the “paradox of warning,” 
those services. Similarly, the communications themselves 
where alerts of an imminent crisis lead to policies and 
may be compromised, such as by emails containing 
behavior changes that prevent or slow the crisis. This in 
attachments and links with malicious code that downloads 
turn leads some observers to conclude that the initial risks 
to the receiver’s computer when opened.  
were overstated. This interpretation can encourage risky 
behavior capable of contributing to a resurgence in 
The COVID-19 Information Case 
infection rates. 
COVID-19 and Propaganda 
COVID-19 and Disinformation 
In large part, propaganda efforts center on controlling the 
Disinformation around COVID-19 may closely resemble 
narrative around the origin of the virus and management of 
propaganda, making it difficult to distinguish between the 
the outbreak. Chinese and Russian media manipulation, for 
two. As part of their disinformation efforts, foreign powers 
example, has exploited uncertainties in the origin of 
may be fabricating stories of COVID-19’s creation by the 
COVID-19, encouraging conspiracy theories on the 
United States as a weapon of war and deliberately planting 
coronavirus as a deliberately engineered creation brought to 
false accusations in online media. Governments may 
China by the United States rather than a naturally occurring 
likewise be fabricating their own crisis handling and rates 
phenomenon. Other state-sponsored propaganda places a 
of infection, or they may be exaggerating, manipulating, or 
positive spin on the government’s positive crisis response, 
presenting incomplete sets of facts in an attempt to control 
participation in global relief efforts, and ability to contain 
the narrative. As a propaganda technique, selective 
infection rates compared with other nations. This is often 
omission of factual information can have the same effects 
aided by suppression of information that complicates a 
as that of commission or active fabrication. 
preferred narrative. 
On March 23, 2020, the U.S. State Department released a 
According to CRS Report R46354, COVID-19 and China: 
fact sheet documenting Iran’s disinformation attempts, 
A Chronology of Events (December 2019-January 2020), it 
which include false claims of having evidence of COVID-
appears that Chinese officials and state-controlled media 
19 as a “biological attack.” Russia and China have 
initially downplayed the severity and scope of the outbreak, 
reportedly attempted to support and amplify Iranian claims 
releasing incomplete information on the spread and 
that COVID-19 was created by the U.S. government as a 
prevention of the disease and blocking access to some 
biological weapon. In a convergence of messaging, all three 
Chinese and foreign news reports. At least eight individuals 
governments have criticized the U.S. government’s inability 
who attempted to share early information were reprimanded 
to contain the pandemic.   
by public security officials for “spreading rumors” and 
creating “negative social influence.” After elevating 
Cyberattacks on COVID-19 Information Sources 
containment to a national priority, Chinese officials and 
In a time of crisis, government and citizen decisionmaking 
media shifted to public claims of successful crisis 
requires timely information. Cyberattackers can capitalize 
management, with official numbers released to media 
on this need using cyber tools to suppress information on a 
outlets showing the epidemic coming under control. As 
large scale, gain intelligence, and compromise users and 
other countries have struggled to contain the disease, the 
devices. One attack method is to implant malware in factual 
Chinese government appears to promote the narrative of 
sources such as government websites and trusted viral 
China as world leader and the Chinese system of 
information materials. Another method is to target the 
government as superior. Human rights groups such as 
platforms of producers and disseminators of information 
Reporters Without Borders allege that China monitors and 
through attacks that inhibit access to these resources. For 
suppresses independent news sources that depart from this 
example, recent reported denial-of-service attacks on the 
narrative.  
Department of Health and Human Service’s public-facing 
website could have been intended to suppress information 
The accuracy of China’s COVID-19 statistics, as well as 
flow on COVID-19. Such attacks may have other effects, 
those from Russia, Iran, and North Korea, has been 
such as undermining source credibility and eroding trust in 
questioned by U.S. officials. 
otherwise accurate sources of information.
https://crsreports.congress.gov 
Considering the Source: Varieties of COVID-19 Information 
 
Catherine A. Theohary, Specialist in National Security 
Policy, Cyber and Information Operations   
IF11552
 
 
Disclaimer 
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff to 
congressional committees and Members of Congress. It operates solely at the behest of and under the direction of Congress. 
Information in a CRS Report should not be relied upon for purposes other than public understanding of information that has 
been provided by CRS to Members of Congress in connection with CRS’s institutional role. CRS Reports, as a work of the 
United States Government, are not subject to copyright protection in the United States. Any CRS Report may be 
reproduced and distributed in its entirety without permission from CRS. However, as a CRS Report may include 
copyrighted images or material from a third party, you may need to obtain the permission of the copyright holder if you 
wish to copy or otherwise use copyrighted material. 
 
https://crsreports.congress.gov | IF11552 · VERSION 1 · NEW