healthcarereimagined

Envisioning healthcare for the 21st century

  • About
  • Economics

Introduction: Disinformation as a multiplier of existential threat – Bulletin of the Atomic Scientists

Posted by timmreardon on 03/12/2026
Posted in: Uncategorized.

By Dan Drollette Jr | March 12, 2026

Deception, disinformation, and fakery are nothing new in the world.

Long before the current era (BCE), the ancient Greeks used deceptive tactics against their enemies during the Trojan War, when they constructed a gigantic, hollow wooden statue of a horse with a small, select team of soldiers hidden inside. Sometime in the 12th or 13th century BCE, they left the horse—with its hidden cargo—immediately outside the gates of Troy, their enemy’s capital city, and pretended to sail away. The city’s defenders then hauled the horse inside the city walls as a victory trophy—and later that night, the hidden soldiers crept out of the horse and opened the gates of the city to the rest of the Greek army (which had returned under the cover of night), allowing them to enter and utterly destroy the city.

They were so successful, in fact, that the phrase “Trojan horse” entered the lexicon, to describe any strategy that tricks a target into letting an enemy enter a protected inner sanctum.

Thousands of years later, that phrase is still used; in the world of computing, a “Trojan horse attack” describes how a certain type of malicious computer program is designed to disguise itself as a harmless, legitimate piece of software—and trick users into willingly letting it into a secure system where it can then steal data, create backdoors, install other malware, or spy on user activity. In the cyber world, Trojan horse attacks have likely been around since at least 1971, which is when they were mentioned in passing in one of the first Unix software manuals.

But while trickery is old, what is new is the very high level at which realistic -looking and -sounding  “deepfake” photos and videos, synthetic feeds, and fabricated accounts can now be made—and the sheer volume that can be produced, on relatively short notice. With the rapid advance of artificial intelligence or AI, the situation is likely to only get worse, overwhelming any timely evidence-based effort to sort out what is real and what is not in the information ecosystem. “Consequently, AI brings a significant possibility of elevating nuclear escalation risks by amplifying disinformation, overloading analysts, compressing decision timelines, and exploiting cognitive and institutional vulnerabilities in sociotechnical systems for nuclear command and control,” writes analyst (and former Bulletin Science and Security Board member) Herb Lin in his essay for this issue of the magazine.

Lin lays out three hypothetical scenarios where AI could have a role in nuclear escalation and  act as a threat multiplier—by shaping perceptions, contaminating intelligence, and destabilizing the nuclear “signaling” that nuclear-armed countries use to indicate their intentions to one another. His article, “AI in the information ecosystem and its impact on nuclear escalation,” is chilling in its graphic, specific, concrete detail, showing how this technology could cause events to rapidly spiral out of control.

And while the scenarios Lin portrays may seem implausible at first, recent history shows otherwise—as can be seen in “At the brink: How Moscow’s ‘dirty bomb’ disinformation campaign risked a NATO-Russia war in October 2022.” The author, Polina Sinovets, argues that Russian president Vladimir Putin used deepfakes and other disinformation to promote phony allegations that Ukraine was going to detonate a “dirty bomb” on the battlefield in the autumn of 2022, in order to justify in advance his own possible use of a Russian tactical nuclear weapon. His goal was to intimidate the Ukrainians and their allies, so that Russian forces would not be wiped out at a particularly critical juncture of the war, when Russia was attempting—and initially bungling—the withdrawal of 20,000 to 30,000 of its troops from a large part of southern Kherson and across the Dnipro River to safety.

And the role of modern disinformation is not just confined to warfare. The deepfake zeitgeist is percolating throughout society, leading to a general distrust of evidence and expertise—which seriously imperils just about everything, from healthcare to climate change to journalism and democracy. In such an environment, conspiracy theories flourish, even when they are unsupported by any hard facts. And without a basic shared reality, it is hard to get much accomplished: “The US Department of Health and Human Services is now run by conspiracy theorists who believe that the American public health system is hiding key data on vaccine safety and who spend their days spreading health misinformation,” as Lisa Fazio notes in her article “How to counter health misinformation when it’s coming from the top.”

But all is not lost. Disinformation and misinformation may be a complex problem with no simple solutions—made particularly difficult when it is spread by people in power (and at a time when social media companies seem to be abandoning any effort at fact-checking). But by targeting the supply, demand, distribution, and uptake of misinformation, it is possible to improve the information environment and help people make informed decisions.

And sometimes, the act of improving the information environment means calling out misinformation, disinformation, and conspiracy-mongering—even when it comes from one’s nearest and dearest. It can feel awkward but still must be done says Joseph Uscinski, a political science professor at the University of Miami who organized the first international conference on conspiracy theories more than a decade ago, and has written two books on the topic: American Conspiracy Theories,  and Conspiracy Theories and the People Who Believe Them.In his Bulletin interview, Uscinski argues that “Being tolerant and compassionate [about disinformation-riddled conspiracy thinking] isn’t the same as pretending that their behavior isn’t their behavior… I have compassion for them, but I hold them responsible for their beliefs and behaviors.”

Article link: https://thebulletin.org/premium/2026-03/introduction-disinformation-as-a-multiplier-of-existential-threat/

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Related

Posts navigation

← AI is reinventing hiring — with the same old biases. Here’s how to avoid that trap – MIT Sloan
  • Search site

  • Follow healthcarereimagined on WordPress.com
  • Recent Posts

    • Introduction: Disinformation as a multiplier of existential threat – Bulletin of the Atomic Scientists 03/12/2026
    • AI is reinventing hiring — with the same old biases. Here’s how to avoid that trap – MIT Sloan 03/08/2026
    • Fiscal Year 2025 Year In Review – PEO DHMS 02/26/2026
    • “𝗦𝗼𝗰𝗶𝗮𝗹 𝗠𝗲𝗱𝗶𝗮 𝗠𝗮𝗻𝗶𝗽𝘂𝗹𝗮𝘁𝗶𝗼𝗻 𝗳𝗼𝗿 𝗦𝗮𝗹𝗲” – NATO Strategic Communications COE 02/26/2026
    • Claude Can Now Do 40 Hours of Work in Minutes. Anthropic Says Its Safety Systems Can’t Keep Up – AJ Green 02/19/2026
    • Agentic AI, explained – MIT Sloan 02/18/2026
    • Anthropic’s head of AI safety Mrinank Sharma resigns, says ‘world is in peril’ in resignation letter 02/10/2026
    • Moltbook was peak AI theater 02/09/2026
    • WHAT A QUBIT IS AND WHAT IT IS NOT. 01/25/2026
    • Governance Before Crisis We still have time to get this right. 01/21/2026
  • Categories

    • Accountable Care Organizations
    • ACOs
    • AHRQ
    • American Board of Internal Medicine
    • Big Data
    • Blue Button
    • Board Certification
    • Cancer Treatment
    • Data Science
    • Digital Services Playbook
    • DoD
    • EHR Interoperability
    • EHR Usability
    • Emergency Medicine
    • FDA
    • FDASIA
    • GAO Reports
    • Genetic Data
    • Genetic Research
    • Genomic Data
    • Global Standards
    • Health Care Costs
    • Health Care Economics
    • Health IT adoption
    • Health Outcomes
    • Healthcare Delivery
    • Healthcare Informatics
    • Healthcare Outcomes
    • Healthcare Security
    • Helathcare Delivery
    • HHS
    • HIPAA
    • ICD-10
    • Innovation
    • Integrated Electronic Health Records
    • IT Acquisition
    • JASONS
    • Lab Report Access
    • Military Health System Reform
    • Mobile Health
    • Mobile Healthcare
    • National Health IT System
    • NSF
    • ONC Reports to Congress
    • Oncology
    • Open Data
    • Patient Centered Medical Home
    • Patient Portals
    • PCMH
    • Precision Medicine
    • Primary Care
    • Public Health
    • Quadruple Aim
    • Quality Measures
    • Rehab Medicine
    • TechFAR Handbook
    • Triple Aim
    • U.S. Air Force Medicine
    • U.S. Army
    • U.S. Army Medicine
    • U.S. Navy Medicine
    • U.S. Surgeon General
    • Uncategorized
    • Value-based Care
    • Veterans Affairs
    • Warrior Transistion Units
    • XPRIZE
  • Archives

    • March 2026 (2)
    • February 2026 (6)
    • January 2026 (8)
    • December 2025 (11)
    • November 2025 (9)
    • October 2025 (10)
    • September 2025 (4)
    • August 2025 (7)
    • July 2025 (2)
    • June 2025 (9)
    • May 2025 (4)
    • April 2025 (11)
    • March 2025 (11)
    • February 2025 (10)
    • January 2025 (12)
    • December 2024 (12)
    • November 2024 (7)
    • October 2024 (5)
    • September 2024 (9)
    • August 2024 (10)
    • July 2024 (13)
    • June 2024 (18)
    • May 2024 (10)
    • April 2024 (19)
    • March 2024 (35)
    • February 2024 (23)
    • January 2024 (16)
    • December 2023 (22)
    • November 2023 (38)
    • October 2023 (24)
    • September 2023 (24)
    • August 2023 (34)
    • July 2023 (33)
    • June 2023 (30)
    • May 2023 (35)
    • April 2023 (30)
    • March 2023 (30)
    • February 2023 (15)
    • January 2023 (17)
    • December 2022 (10)
    • November 2022 (7)
    • October 2022 (22)
    • September 2022 (16)
    • August 2022 (33)
    • July 2022 (28)
    • June 2022 (42)
    • May 2022 (53)
    • April 2022 (35)
    • March 2022 (37)
    • February 2022 (21)
    • January 2022 (28)
    • December 2021 (23)
    • November 2021 (12)
    • October 2021 (10)
    • September 2021 (4)
    • August 2021 (4)
    • July 2021 (4)
    • May 2021 (3)
    • April 2021 (1)
    • March 2021 (2)
    • February 2021 (1)
    • January 2021 (4)
    • December 2020 (7)
    • November 2020 (2)
    • October 2020 (4)
    • September 2020 (7)
    • August 2020 (11)
    • July 2020 (3)
    • June 2020 (5)
    • April 2020 (3)
    • March 2020 (1)
    • February 2020 (1)
    • January 2020 (2)
    • December 2019 (2)
    • November 2019 (1)
    • September 2019 (4)
    • August 2019 (3)
    • July 2019 (5)
    • June 2019 (10)
    • May 2019 (8)
    • April 2019 (6)
    • March 2019 (7)
    • February 2019 (17)
    • January 2019 (14)
    • December 2018 (10)
    • November 2018 (20)
    • October 2018 (14)
    • September 2018 (27)
    • August 2018 (19)
    • July 2018 (16)
    • June 2018 (18)
    • May 2018 (28)
    • April 2018 (3)
    • March 2018 (11)
    • February 2018 (5)
    • January 2018 (10)
    • December 2017 (20)
    • November 2017 (30)
    • October 2017 (33)
    • September 2017 (11)
    • August 2017 (13)
    • July 2017 (9)
    • June 2017 (8)
    • May 2017 (9)
    • April 2017 (4)
    • March 2017 (12)
    • December 2016 (3)
    • September 2016 (4)
    • August 2016 (1)
    • July 2016 (7)
    • June 2016 (7)
    • April 2016 (4)
    • March 2016 (7)
    • February 2016 (1)
    • January 2016 (3)
    • November 2015 (3)
    • October 2015 (2)
    • September 2015 (9)
    • August 2015 (6)
    • June 2015 (5)
    • May 2015 (6)
    • April 2015 (3)
    • March 2015 (16)
    • February 2015 (10)
    • January 2015 (16)
    • December 2014 (9)
    • November 2014 (7)
    • October 2014 (21)
    • September 2014 (8)
    • August 2014 (9)
    • July 2014 (7)
    • June 2014 (5)
    • May 2014 (8)
    • April 2014 (19)
    • March 2014 (8)
    • February 2014 (9)
    • January 2014 (31)
    • December 2013 (23)
    • November 2013 (48)
    • October 2013 (25)
  • Tags

    Business Defense Department Department of Veterans Affairs EHealth EHR Electronic health record Food and Drug Administration Health Health informatics Health Information Exchange Health information technology Health system HIE Hospital IBM Mayo Clinic Medicare Medicine Military Health System Patient Patient portal Patient Protection and Affordable Care Act United States United States Department of Defense United States Department of Veterans Affairs
  • Upcoming Events

Blog at WordPress.com.
  • Reblog
  • Subscribe Subscribed
    • healthcarereimagined
    • Join 153 other subscribers
    • Already have a WordPress.com account? Log in now.
    • healthcarereimagined
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d