How the National Security Council Fights Foreign Disinformation Campaigns

GovFacts

Last updated 4 days ago. Our resources are updated regularly but please keep in mind that links, programs, policies, and contact information do change.

The National Security Council coordinates America’s defense against foreign disinformation operations that target democratic institutions through social media manipulation, fake news campaigns, and sophisticated influence operations designed to undermine public trust and electoral integrity.

This presidential advisory body, originally created to manage Cold War nuclear threats, now orchestrates the nation’s response to information warfare conducted by adversaries like Russia and China who target platforms and digital technologies to sow division and weaken democratic governance.

What Is the National Security Council?

The NSC operates as the central coordination hub for national security policy. Rather than conducting operations directly, its power lies in orchestrating the vast capabilities of different government agencies into unified strategies against threats that cross traditional bureaucratic boundaries.

From Truman’s Vision to Digital Warfare

The National Security Council was born from the chaos of World War II and early Cold War challenges. Before the war, American presidents managed foreign and military policy through informal arrangements that proved dangerously inadequate for global leadership.

The attack on Pearl Harbor and subsequent challenges of managing worldwide conflict revealed a critical need for structured coordination among the instruments of national power. Officials like Clark Clifford were dismayed by the “disorder among agencies taking major post-war policy-making decisions” and sought institutional stability for national security policy-making.

The solution came through the National Security Act of 1947, landmark legislation that fundamentally reshaped the U.S. government. The act established the NSC with a clear statutory mission: to advise the President on “integration of domestic, foreign, and military policies relating to national security.”

Alongside the NSC, the act created the Central Intelligence Agency (CIA) and unified the armed services under a single Secretary of Defense, establishing the core architecture of modern American national security apparatus.

The NSC was designed to solve a coordination problem. The U.S. government encompasses powerful departments—State, Defense, Treasury, Justice, and others—each with distinct cultures, priorities, and perspectives. Left to operate independently, their actions can be disjointed or contradictory. The NSC serves as the institutional forum where competing interests can be reconciled, ensuring diplomatic, military, and economic strategies work in concert rather than at cross-purposes.

This foundational purpose makes it the natural venue for leading the fight against foreign disinformation, a threat that cuts across nearly every major government agency’s responsibilities and cannot be defeated by any single entity acting alone.

Who’s in the Room

The formal National Security Council is a cabinet-level body chaired by the President. By law, statutory members include the President, Vice President, Secretary of State, Secretary of Defense, Secretary of the Treasury, and Secretary of Energy. These officials represent the core pillars of American foreign, military, and economic power.

Two statutory advisors provide specialized counsel. The Chairman of the Joint Chiefs of Staff serves as military advisor, offering perspective on operational implications of policy decisions. The Director of National Intelligence serves as intelligence advisor, bringing collective analysis from the 18 agencies that comprise the U.S. Intelligence Community.

NSC meeting composition is not rigid. Each President can invite other senior officials to attend regularly, and these choices often signal administration priorities. The Biden-Harris administration expanded regular attendees to include the Attorney General, Secretary of Homeland Security, and U.S. Representative to the United Nations, among others. It also invites officials like the Special Presidential Envoy for Climate when appropriate.

This reflects a deliberate effort to embrace a “new and broader understanding of national security” that recognizes interconnections between traditional foreign policy and challenges like global public health, climate change, and cybersecurity.

How Policy Gets Made

While the formal NSC convenes for the most significant decisions, daily organizational work is driven by the National Security Advisor and National Security Staff (NSS). The National Security Advisor is a presidentially appointed assistant who directs NSC staff and the overall policy process. The NSS comprises experts, typically under 200, including both permanent employees and detailees from departments like State, Defense, and CIA, who bring subject-matter expertise to the White House.

Policy development follows a structured, hierarchical process designed to vet issues, build consensus among agencies, and present clear options to the President. This system has remained largely consistent since the George H.W. Bush administration and involves three main committee levels:

Interagency Policy Committees (IPCs): These serve as the ground floor of policy-making. IPCs are working-level groups composed of experts from relevant agencies, chaired by a senior director from NSC staff. Dozens of IPCs can operate simultaneously, each focused on specific geographic regions (like “Indo-Pacific Affairs”) or functional topics (like “Counterterrorism” or “Cybersecurity”). An IPC tasked with countering foreign disinformation would bring together specialists from the State Department, DHS, FBI, and intelligence community to study threats and formulate initial courses of action.

Deputies Committee (DC): The next level up is chaired by the Deputy National Security Advisor and comprised of second-in-command officials from key departments—Deputy Secretary of State, Deputy Secretary of Defense, and others. The DC serves as the primary forum for interagency debate and consensus-building. It reviews IPC work, resolves disagreements between departments, and refines policy options before sending them to cabinet secretaries. Most heavy lifting of interagency coordination happens at this level.

Principals Committee (PC): This senior sub-Cabinet forum is chaired by the National Security Advisor and attended by cabinet secretaries (the “Principals”) themselves. The PC provides final review before issues are presented to the President. Its purpose is ensuring remaining points of contention are addressed and policy options brought for final decision reflect maximum possible consensus and coordination.

This process culminates in formal NSC meetings held in the White House Situation Room, a secure complex in the West Wing basement equipped with advanced communications technology for monitoring global events and supporting real-time crisis decision-making. This structured flow ensures presidential decisions are based on the best information and thorough vetting of options across the entire government.

Cold War Roots in Counter-Propaganda

The modern battle against digital disinformation represents the latest evolution of a conflict that began with the NSC’s inception. From its earliest days, the Council grappled with state-sponsored propaganda and covert influence challenges, developing foundational strategies and authorizing secret tools that continue shaping U.S. information operations today.

Recognizing the Soviet Threat

Almost immediately after its 1947 creation, the NSC identified Soviet information warfare as a primary threat to U.S. national security. A declassified 1947 memorandum, NSC 4, starkly warned that the USSR was waging an “intensive propaganda campaign directed primarily against the US.”

The Council recognized this was not mere rhetoric but a sophisticated campaign employing “coordinated psychological, political and economic measures designed to undermine non-Communist elements in all countries.” The ultimate Soviet objective was to weaken and divide world opinion until effective opposition to its designs would no longer be possible.

The NSC’s assessment was that the United States was not adequately countering this threat and that immediate “strengthening and coordination of all foreign information measures” was required.

Forging the Tools of Influence

The NSC moved beyond diagnosis to create instruments for fighting back. In a pivotal 1948 directive, NSC 10/2, the Council noted “vicious covert activities of the USSR” and formally charged the Central Intelligence Agency with conducting broad secret operations abroad. This directive served as the foundational charter for U.S. covert action during the Cold War.

Authorized activities were sweeping and explicitly included information warfare. The CIA was empowered to conduct operations related to “propaganda, economic warfare; preventive direct action, including sabotage, anti-sabotage, demolition… [and] subversion against hostile states, including assistance to underground resistance movements, guerrillas and refugee” groups.

This directive firmly established the NSC’s role as the body responsible for authorizing and providing top-level oversight for the nation’s most sensitive influence campaigns. The Council’s role in shaping the information battlespace extended to technical realms as well; in 1952, a presidential directive issued through the NSC officially established the National Security Agency (NSA), the nation’s premier signals intelligence organization.

The Active Measures Working Group

During the Reagan administration, the NSC orchestrated one of the most successful counter-disinformation efforts of the Cold War. It coordinated creation of the interagency Active Measures Working Group, a body led by the State Department and U.S. Information Agency (USIA) specifically to expose and counter Soviet “active measures”—a KGB term for covert influence operations, including disinformation and forgeries.

This group became a model of effective interagency collaboration. It fused intelligence reporting from the CIA, domestic investigations from the FBI, and on-the-ground reporting from diplomats and USIA officers at embassies worldwide. This integrated approach allowed the U.S. government to analyze Soviet campaigns, identify their techniques, and systematically expose them to global audiences.

The group published reports, held international press conferences, and sent “squads” of experts to over 20 countries to brief journalists and officials on Soviet tactics.

The group’s most celebrated victory was its takedown of “Operation Infektion.” This sophisticated and pernicious Soviet disinformation campaign began in the early 1980s, falsely alleging that the United States had created the AIDS virus as a biological weapon at Fort Detrick, Maryland. The narrative was planted in obscure foreign newspapers and amplified by Soviet intelligence through a global network of front organizations, communist parties, and state-controlled media.

The Active Measures Working Group meticulously tracked the campaign’s spread and publicly exposed the Soviet hand behind it, presenting evidence of forgeries and debunking scientific claims. By relentlessly exposing the lies, the U.S. government discredited the campaign and inflicted a major propaganda defeat on Moscow.

The success of the Active Measures Working Group provides a powerful historical lesson. The “whole-of-government” approach that defines modern U.S. strategy for countering disinformation is not a recent invention. It directly descends from successful interagency models pioneered during the Cold War and coordinated at the highest levels by the National Security Council.

The fusion of intelligence, law enforcement, and public diplomacy seen in the 1980s is mirrored in collaborative efforts of today’s State Department Global Engagement Center, ODNI’s Foreign Malign Influence Center, and the FBI. The U.S. government draws from a proven historical playbook.

The profound difference, and core of the modern challenge, is the battlespace itself. The telex machines and printed pamphlets of the Cold War have been replaced by the instantaneous, global reach of the internet and social media, creating a threat that moves at speed and scale the Active Measures Working Group architects could have scarcely imagined.

The 2016 Wake-Up Call

The 2016 U.S. presidential election marked a seismic shift in information warfare landscape. While the United States had decades of experience countering Soviet propaganda, it was unprepared for the speed, scale, and sophistication of the digital assault launched by the Russian Federation. This event served as both catastrophic intelligence failure and powerful catalyst, fundamentally reshaping the U.S. government’s understanding of the threat and forcing the NSC to elevate counter-disinformation from secondary concern to top-tier national security priority.

“Sweeping and Systematic”: The Russian Playbook

The landmark “Report on the Investigation into Russian Interference in the 2016 Presidential Election,” produced by Special Counsel Robert S. Mueller III, provided the definitive public account of Moscow’s actions. The report’s opening sentence left no ambiguity: “The Russian government interfered in the 2016 presidential election in sweeping and systematic fashion.”

This interference was not a single action but a multi-pronged, integrated intelligence operation with two main lines of effort:

Hacking and Strategic Leaking: The first component was a classic cyber-espionage operation with a modern twist. Hackers from Russia’s military intelligence agency, the GRU, successfully penetrated computer networks of the Democratic National Committee (DNC), Democratic Congressional Campaign Committee (DCCC), and personal email accounts of senior officials from Hillary Clinton’s presidential campaign.

They stole hundreds of thousands of documents and emails. Instead of using this information solely for traditional intelligence purposes, the GRU weaponized it, strategically releasing stolen material through front organizations like “DCLeaks” and “Guccifer 2.0,” and most notably through WikiLeaks. These releases, timed for maximum political impact, were designed to damage the Clinton campaign and sow discord within the Democratic Party.

Social Media Warfare: The second component was a vast and insidious social media influence campaign conducted by a St. Petersburg-based troll farm called the Internet Research Agency (IRA). The IRA created thousands of fake accounts on platforms like Facebook, Twitter, and Instagram, posing as American individuals and grassroots organizations.

These accounts pushed divisive content on hot-button issues like race, immigration, and gun control, organized real-world political rallies, and spread derogatory information about candidate Clinton while promoting candidate Trump. The explicit goal was to “sow social discord” and interfere with the election by exacerbating existing political and social divisions within American society.

The ultimate objective went beyond favoring one candidate over another. As the Obama administration later stated, Russia’s actions were intended to “erode faith in U.S. democratic institutions, sow doubt about the integrity of our electoral process, and undermine confidence in the institutions of the U.S. government.”

The White House Response

The U.S. government was not entirely blind to the attack as it unfolded. Evidence began surfacing in mid-2016, when the DNC publicly announced it had been hacked by Russian actors. Within the White House, the National Security Council under President Obama began coordinating the U.S. government’s response.

The NSC convened a series of high-level meetings involving the CIA, Department of Homeland Security (DHS), and FBI to assess the threat. This process led President Obama to direct the intelligence community to produce a formal Intelligence Community Assessment (ICA) on Russian activities. The final ICA, drafted by the CIA, NSA, and FBI, concluded with high confidence that Russian President Vladimir Putin had personally ordered an influence campaign to harm Clinton’s electoral chances and undermine public faith in the democratic process.

Based on these NSC-coordinated findings, the Obama administration took several public actions. In October 2016, DHS and the Office of the Director of National Intelligence (ODNI) issued a joint statement officially attributing the DNC hacks to the Russian government.

Then, in late December 2016, after the election, the administration announced a more forceful response. It imposed sanctions on Russian intelligence agencies and affiliated individuals, expelled 35 Russian government officials from the United States, and released a Joint Analysis Report (JAR) from DHS and the FBI. The JAR contained declassified technical information about Russian military and civilian intelligence services’ malicious cyber activity, including malware signatures, intended to help network defenders in the U.S. and abroad identify and block Russian intrusions.

Despite these actions, the response was largely reactive and came too late to prevent the interference from achieving many of its goals. The 2016 election laid bare a critical vulnerability in American national security. It demonstrated that the nation’s election infrastructure was now a prime target for foreign adversaries and that social media had become a primary battlefield for covert influence.

The shock of this attack forced painful but necessary re-evaluation across the U.S. government. In the years that followed, lessons from 2016 would directly lead to creation of new organizations like the ODNI’s Foreign Malign Influence Center and expanded mandate for the State Department’s Global Engagement Center, all part of a belated effort to build defenses that had been absent when the digital tsunami first made landfall.

The Modern Counter-Disinformation Strategy

In the wake of the 2016 election, the U.S. government undertook a significant overhaul of its approach to countering foreign malign influence. Guided by the NSC, the strategy that emerged is a complex, multi-layered effort that seeks to integrate every tool of national power. It represents a “whole-of-government” approach recognizing no single agency can defeat this threat alone, requiring unprecedented coordination across the national security enterprise and deep partnerships with the private sector.

The “Whole-of-Government” Approach

Contemporary U.S. strategy is built on the principle of integrating diplomatic, informational, military, and economic (DIME) instruments of power. In practice, this means a U.S. response to foreign disinformation campaigns is not a single action but a synchronized set of moves orchestrated through the NSC’s committee process.

For example, upon detecting a Russian influence operation aimed at an allied nation’s election, the NSC could coordinate a response including:

  • Diplomatic: The State Department issues public statements condemning the activity and works with targeted allies to build resilience.
  • Informational: The State Department’s Global Engagement Center (GEC) publicly exposes Russian tactics and narratives, sharing analysis with international partners.
  • Military: U.S. Cyber Command conducts “defend forward” operations to disrupt adversary network infrastructure before campaigns can achieve full effect.
  • Economic: The Treasury Department imposes sanctions on individuals and entities involved, cutting them off from the U.S. financial system.
  • Law Enforcement: The Department of Justice unseals indictments against Russian intelligence officers responsible for campaigns.

This integrated approach is designed to impose costs on adversaries and deter future activity. However, government reports note a key challenge remains the lack of a single, clear lead agency for all counter-disinformation efforts and the need to mature existing coordination mechanisms—precisely the problem the NSC’s structure is intended to solve.

The Key Players

The U.S. counter-disinformation ecosystem is a complex web of agencies and departments, each with distinct roles and responsibilities. The NSC sits at the center, serving as coordinator and strategic director.

Agency/EntityCore MissionPrimary FocusKey Authorities/Tools
National Security Council (NSC)Strategic Coordination & Policy IntegrationGlobal/PresidentialPresidential Directives, Interagency Coordination (IPC/DC/PC Process)
State Dept. (Global Engagement Center – GEC)Counter Foreign Disinformation AbroadForeignDiplomacy, Grants, Public Attribution, Analytics (GEC-IQ)
DHS (Cybersecurity & Infrastructure Security Agency – CISA)Critical Infrastructure & Domestic ResilienceDomesticTechnical Assistance, Public Education, Partnerships with State/Local Officials
ODNI (Foreign Malign Influence Center – FMIC)Intelligence Analysis & IntegrationForeignIntelligence Assessments, Election Threat Analysis (Election Threats Executive)
Dept. of Defense (U.S. Cyber Command)Disrupt Adversary OperationsForeign NetworksCyber Operations (“Defend Forward”)
Dept. of Justice (FBI)Investigation & ProsecutionForeign & Domestic (Criminal)Indictments, Foreign Agents Registration Act (FARA) Enforcement

Building Public-Private Partnerships

The U.S. government quickly realized it could not fight the disinformation war alone. The digital platforms where these campaigns unfold are owned and operated by private companies, and the most effective research into adversary tactics is often conducted by academics and civil society organizations. Consequently, a central pillar of the NSC-coordinated strategy is building public-private partnerships.

This collaboration takes several forms. Government agencies like the FBI and CISA share technical indicators of malicious activity with social media companies to help them identify and remove inauthentic accounts linked to foreign intelligence services. The NSC has encouraged major tech companies to sign voluntary accords, pledging to develop technology like watermarking to identify AI-generated content and to increase transparency around their efforts to combat deceptive election content.

The State Department’s GEC funds and collaborates with independent researchers and organizations like the Atlantic Council’s Digital Forensic Research Lab (DFRLab), which use open-source techniques to expose influence operations.

However, this reliance on partnership creates a fundamental structural vulnerability in the U.S. strategy. The government’s ability to act directly against disinformation is severely constrained by the First Amendment. It cannot order companies like Meta or Google to remove content. Therefore, the entire strategy is critically dependent on voluntary cooperation of these private sector actors.

This dependency means the nation’s defenses can be weakened by a single company’s business decision. If a major platform decides to scale back its content moderation teams or change its policies on labeling state-controlled media—as was seen with X (formerly Twitter)—it can single-handedly create a gaping hole in the national strategy.

The NSC can convene meetings, share intelligence, and publicly applaud corporate responsibility, but it has very limited leverage over the private digital territory where the information war is actually being fought. This makes the partnership both essential and precarious, a constant balancing act at the heart of the U.S. counter-disinformation effort.

The Constitutional Challenge

The single greatest challenge facing the NSC and the entire U.S. government in fighting foreign disinformation is not technological or bureaucratic; it is constitutional. The First Amendment’s robust protection of free speech creates a complex legal and political landscape that foreign adversaries have learned to expertly exploit. This forces U.S. policymakers to walk a perilous tightrope, balancing urgent need to defend national security against profound commitment to upholding civil liberties.

Why the Government Can’t Just Ban “Fake News”

In the United States, there is no federal law against lying. The First Amendment protects speech from government censorship, and the Supreme Court has consistently ruled that this protection extends to false statements of fact. In the landmark 2012 case United States v. Alvarez, the Court struck down the Stolen Valor Act, which criminalized falsely claiming to have received military medals. The ruling affirmed that there is no general exception to the First Amendment for false speech.

The reasoning behind this broad protection is deep-seated fear that empowering the government to be the arbiter of truth would inevitably lead to suppression of dissent and unpopular ideas. The Court has recognized that allowing the government to punish falsehoods would create a “chilling effect,” causing people to self-censor out of fear of prosecution and stifling the “breathing space” necessary for open debate.

Exceptions to this rule are narrow and well-defined. The government can regulate false speech in specific contexts, such as defamation (knowingly false statements that harm a person’s reputation), fraud (false statements for material gain), and incitement to imminent lawless action.

However, most foreign disinformation campaigns are carefully crafted to avoid falling into these categories. They often consist of misleading narratives, half-truths, and inflammatory opinions that, while harmful to democratic discourse, are generally protected under the First Amendment. This legal reality is the primary constraint on the U.S. government’s ability to act and forces the NSC to coordinate strategies that focus on exposure and resilience rather than prohibition.

The Foreign-Domestic Dilemma

While the government has more legal authority to act against foreign governments and their intelligence agents, the nature of modern disinformation blurs the line between foreign and domestic speech. The primary tactic of adversaries like Russia and China is not simply broadcasting propaganda from their own state-media channels. Instead, they covertly seed their narratives into the online ecosystem, designing them to be picked up and amplified by authentic American voices.

A Russian intelligence operative creating a fake social media account to spread lies about election fraud is a foreign agent engaged in hostile influence operations. However, when an American citizen sees that post and shares it, believing it to be true, their action is constitutionally protected domestic speech. This laundering of information presents an enormous challenge. Any government effort to trace and counter the foreign source risks being perceived as an attempt to censor the American citizen who amplified it.

This dynamic is a central concern for civil liberties organizations like the American Civil Liberties Union (ACLU). The ACLU has long challenged government surveillance programs, such as the NSA’s “Upstream” collection of internet traffic, arguing that in hunting for foreign intelligence, these programs inevitably sweep up private communications of innocent Americans. They contend such mass surveillance creates a chilling effect on free speech, making journalists, activists, and ordinary citizens fearful that their communications are being monitored, thereby discouraging them from engaging in sensitive but legitimate conversations.

Perspectives from Civil Liberties Advocates

The debate over how to respond to disinformation is deeply polarized, reflecting broader political divisions in the country. This polarization is not an accidental byproduct of the debate; it is an explicit goal of foreign adversaries conducting influence operations.

On one side, organizations like the Brennan Center for Justice highlight tangible harms of disinformation. They document how false narratives about election fraud erode public trust, lead to threats and harassment against election officials, and are weaponized by lawmakers to justify new laws that make it harder for people to vote. They advocate for a multi-faceted response that includes congressional action, greater transparency from social media platforms, and robust voter education.

On the other side, critics argue that government efforts to counter disinformation are a Trojan horse for censorship. The Heritage Foundation’s Project 2025 plan, for example, sends a clear message that a future conservative administration would punish social media companies for moderating content that reflects “core political viewpoints,” including election denial. This perspective frames government coordination with tech companies and researchers as a “censorship-industrial complex” designed to silence conservative voices.

This politicization of the issue makes a bipartisan, whole-of-society response incredibly difficult to achieve and maintain.

This complex interplay of law, technology, and politics creates a profound strategic paradox. The First Amendment is the bedrock of American democracy, a shield that protects the free exchange of ideas necessary for self-governance. Yet, in the information age, it has also become the nation’s primary vulnerability. Foreign adversaries have weaponized America’s commitment to free speech, skillfully exploiting its protections to inject poison into the body politic.

They understand they do not need to defeat the U.S. military; they only need to convince a segment of the American population to lose faith in their own democratic institutions. This places the NSC in an extraordinarily difficult position. If it coordinates aggressive action to counter a foreign-seeded narrative, it risks being accused of unconstitutional censorship. If it stands by to protect the letter of the law, it risks allowing the very foundations of that law to be eroded from within.

Russia and China are not merely attacking U.S. policies; they are attacking the operating system of American democracy by turning its greatest strength into a weapon against itself.

Case Studies: The NSC in Action

The NSC’s role in coordinating the U.S. government’s response to foreign disinformation is not theoretical. In recent years, it has directed complex, interagency efforts against a range of threats, from Russian military aggression and Chinese strategic influence to global pandemic misinformation. These cases illustrate evolving tactics and strategies the U.S. employs on the modern information battlefield.

Countering Russian Narratives on Ukraine

The lead-up to Russia’s full-scale invasion of Ukraine in February 2022 marked a significant evolution in U.S. counter-disinformation strategy. Learning lessons from the reactive posture of 2016, the NSC, under the Biden administration, coordinated an unprecedented campaign of proactive intelligence disclosure, a tactic that came to be known as “pre-bunking.”

Instead of waiting for Russia to create a false pretext for war, the White House authorized rapid, repeated declassification and public release of U.S. intelligence about Moscow’s plans. Over several weeks, U.S. officials publicly detailed Russia’s military buildup on Ukraine’s borders, exposed plans for “false flag” operations designed to fabricate a Ukrainian attack, and warned that Russia was preparing to install a puppet government in Kyiv.

This strategy was a deliberate departure from traditional secrecy surrounding intelligence matters. The goal was to spoil Russian President Vladimir Putin’s playbook in real time, strip him of the element of surprise, and preemptively debunk the lies he intended to use to justify invasion.

By sharing this information with the world, the NSC helped build a strong international coalition to condemn the invasion and impose severe costs on Russia from day one. In a statement shortly after the invasion began, the NSC applauded the global effort by governments and private companies to “call out and contest the Russian Government’s further efforts to undermine the free press and spread disinformation.”

Confronting Chinese Information Manipulation

The challenge posed by the People’s Republic of China (PRC) is different in character from Russia’s but no less significant. The NSC coordinates a long-term, strategic effort to counter what it sees as a pervasive campaign of information manipulation by Beijing. According to U.S. government reports, China’s goal is to reshape the global information environment to be more favorable to its authoritarian model, suppress criticism of its policies, and undermine U.S. alliances.

The PRC employs a five-part playbook: (1) leveraging overt propaganda and heavy censorship; (2) promoting its surveillance technology and norms for digital governance; (3) exploiting international organizations to legitimize its narratives; (4) co-opting and coercing foreign political and business elites; and (5) using covert and deceptive means, such as fake social media accounts, to create artificial appearance of popular support for its positions.

These tactics are used to deflect blame for COVID-19 pandemic origins, deny human rights abuses against Uyghurs in Xinjiang, and intimidate nations like the Philippines in disputes over the South China Sea.

The NSC-coordinated response is multifaceted. The State Department’s GEC publicly exposes China’s tactics, publishing detailed reports on its global media manipulation efforts. The U.S. engages in diplomatic efforts to build coalitions of like-minded nations to resist Beijing’s influence.

The intelligence community, through the National Counterintelligence and Security Center (NCSC), warns U.S. tech startups about risks of accepting Chinese investment, which can be a vector for stealing sensitive technology and data. This represents a long-term strategic competition in the information domain, managed and synchronized by the NSC.

The COVID-19 “Infodemic”

The COVID-19 pandemic demonstrated how quickly a public health crisis can become a national security crisis, fueled by what the World Health Organization termed an “infodemic” of false and misleading information. This flood of bad information came from both domestic sources and foreign adversaries.

Foreign state actors, particularly Russia and China, exploited global fear and uncertainty to advance their strategic goals. They spread disinformation to deflect blame for the virus’s origins, promote conspiracy theories about Western vaccines to undermine public confidence, and portray democratic governments as chaotic and incompetent in their response.

The impact of this infodemic was severe. It led to “reduced trust in public health responders, increased belief in false medical cures, and politicization of public health measures” like masking and vaccination. This directly translated into more infections, hospitalizations, and deaths, dangerously undermining the national response to the pandemic.

The crisis highlighted urgent need for a coordinated national strategy to combat health-related disinformation. In a prominent report, the Johns Hopkins Center for Health Security called for the National Security Council to be given formal responsibility for developing and overseeing such a strategy, arguing that damage done by the infodemic constituted a clear and present threat to national security.

This recommendation underscores the NSC’s expanding mandate, as it is increasingly called upon to coordinate complex threats that blur traditional lines between foreign policy, domestic public health, and information security.

Ongoing Challenges and Future Threats

The NSC continues to face fundamental challenges in coordinating America’s response to foreign disinformation. These range from structural limitations within government to emerging technologies that promise to make the information warfare landscape even more complex and dangerous.

The Speed of Digital Warfare

One persistent challenge is the mismatch between the speed at which disinformation spreads online and the deliberative pace of government decision-making. False narratives can reach millions of people in hours, while the NSC’s committee process—designed for thorough analysis and consensus-building—can take days or weeks to produce coordinated responses.

This creates a structural disadvantage. By the time agencies have analyzed a disinformation campaign, coordinated a response, and implemented counter-measures, the false narrative may have already achieved its intended effect of sowing confusion and doubt.

Emerging Technologies

The advent of sophisticated AI-generated content poses new challenges for counter-disinformation efforts. “Deepfake” videos and audio recordings can create convincing but false evidence of events that never occurred. AI-powered text generation can produce massive volumes of seemingly authentic but artificially created social media posts.

These technologies lower the barrier to entry for disinformation campaigns while making detection more difficult. The NSC must coordinate government responses to threats that are becoming more sophisticated and accessible to a broader range of adversaries.

International Coordination

As disinformation campaigns become increasingly global, the NSC must work to build international partnerships and shared responses. However, different countries have varying legal frameworks, cultural norms, and political systems that affect their approach to countering disinformation.

Building consensus among allies on appropriate responses while respecting sovereignty and differing approaches to free speech remains an ongoing diplomatic challenge that the NSC must navigate carefully.

The battle against foreign disinformation represents one of the most complex challenges the National Security Council has faced in its decades of existence. Unlike traditional national security threats, information warfare exploits the very openness and freedom that democratic societies are designed to protect.

Our articles make government information more accessible. Please consult a qualified professional for financial, legal, or health advice specific to your circumstances.

Follow:
Our articles are created and edited using a mix of AI and human review. Learn more about our article development and editing process.We appreciate feedback from readers like you. If you want to suggest new topics or if you spot something that needs fixing, please contact us.