From Creating to Engineering: Conspiracy Theories in Information Warfare

Modern armed conflict is often used to shape battlefields before violence occurs. Influence is decided by how people interpret uncertainty, threat and intent. In How to Create a Conspiracy Theory: What Information Warriors Need to Know, I argued that conspiracy theories function as cognitive environments rather than collections of false claims. They impose order on ambiguity, assign agency to events and stabilize belief under perceived existential threat. This follow on essay moves from explanation to application. It continues to rely on the Existential Threat Model (ETM) and the conspiracy belief formation model to explain how belief environments are constructed and why they persist in information warfare contexts. This essay will walk the reader through how these theoretical frameworks can be applied by information warriors to engineer an actual weaponized conspiracy theory.
Theoretical Models
Before we proceed, a concise review of the relevant theoretical frameworks is required. The ETM explains the narrative structure that allows conspiracy theories to function as stable belief systems. It identifies five elements that must be present. First, events are organized into a pattern that suggests coordination rather than coincidence. Second, that pattern is attributed to intentional agents rather than error or chance. Third, the agents are linked to a meaningful threatthat endangers the group’s safety, identity or moral order. Fourth, the threat is understood as involving a coalition rather than a single actor, which signals power and reach. Finally, secrecy explains gaps in evidence and preempts counterarguments. When these elements align, uncertainty is transformed into perceived design and ambiguity becomes threatening rather than neutral.
The conspiracy belief formation model explains why individuals become receptive to conspiratorial narratives and why belief persists over time. It emphasizes sustained anxiety rather than sudden shock, since unresolved uncertainty creates demand for explanation. Belief adoption is socially mediated, with people relying on trusted peers rather than authorities to judge credibility. Synergy is achieved when multiple reinforcing cues work together, so no single claim carries the full burden of persuasion. Plausibility matters more than proof, as narratives must fit existing experiences and grievances. Finally, conspiracy beliefs resist falsification because contradictory information is reframed as manipulation or concealment. Once belief becomes tied to identity and social belonging, disengagement becomes costly and belief stabilizes.
Introducing the Case
As we walk through the scenario that will explain how a specific conspiracy theory is constructed, we will use a secret bioweapons laboratory as the case. This conspiracy is at least partially true as illicit and unregulated biolaboratory programs researching dangerous biomatter have been discovered. Legal biolaboratories conduct biosecurity research to prevent or mitigate the occurrence of infectious diseases. However, they often engage in dual-use research, where disease mitigation programs could be weaponized. The features of this case create uncertainty by design. This analysis does not claim that these programs conceal hostile intent or coordinated wrongdoing. Instead, it examines how a conspiratorial interpretation of such programs can plausibly emerge when uncertainty, secrecy and existential threat are present. The conspiracy theory examined here is therefore hypothetical.
The hypothetical conspiracy narrative centers on the belief that a hidden network of state security agencies, military research institutions and private contractors is conducting covert biological research under the cover of public health and scientific cooperation. In this narrative, biolaboratories are framed not as defensive or regulatory facilities, but as sites of concealed experimentation and strategic preparation. Routine secrecy, classified funding and limited public oversight are interpreted as deliberate concealment rather than procedural necessity. Disease outbreaks, accidents or unexplained health events are treated as signals of testing or leakage rather than coincidence. International agreements and denials are recast as coordination and narrative management. Together, these elements produce a belief environment in which biological research is understood as an intentional and hostile program operating beyond public control.
Applying ETM
Patternicity
The process begins with pattern construction. For clarity, this example focuses on geography. Biolaboratories are described as located along strategic frontiers in areas of instability such as Ukraine rather than in the sponsoring state’s own territory. Facilities are framed as clustered near geopolitical rivals like Russia. Maps display laboratory sites in Kharkiv, Odesa, and Lviv alongside nearby airfields, rail corridors and Black Sea access points. Timelines align the renovation of these facilities with Ukraine’s post-2014 security cooperation with Western states and expanded military aid. Disease outbreaks or livestock infections are inserted into the same chronology. Individually, each element reflects routine public health or security policy. When displayed together, in spatial and temporal proximity, correlation is reframed as coordination. The repetition of overlap reduces the perceived likelihood of coincidence. Geography and timing become interpreted as evidence of deliberate design.
Agency Attribution
The constructed pattern does not remain neutral. It generates a demand for explanation. When laboratories appear positioned near strategic frontiers, aligned with security timelines, and supported by opaque funding streams, coincidence becomes psychologically insufficient. The narrative asks who benefits from this alignment. Agency is inferred to restore causal clarity. Responsibility is attributed to a hidden network of defense ministries, intelligence agencies, military medical units and private contractors. Civilian health institutions are reframed as administrative fronts rather than decision makers. Funding routed through restricted channels and oversight limited by classification are interpreted as signs of centralized control rather than procedural norm.
Agency is reinforced through control over information. Delays in disclosure, partial transparency and tightly bounded admissions are framed as managed outputs rather than bureaucratic friction. Uniform messaging across institutions suggests coordination rather than compliance. Complexity becomes suspicious when it appears disciplined and insulated from error. In this narrative, randomness disappears because randomness cannot explain sustained alignment. The pattern is constructed so that intentional direction becomes the only explanation that feels coherent.
Existential Threat
Once agency is inferred, the narrative specifies concrete biological threats rather than a general risk of disease. The hidden network is accused of developing pathogens designed for targeted effects rather than mass outbreaks. For instance, pathogens that are tailored to genetic markers common to specific populations. Diseases are engineered to reduce fertility over time or to weaken a population’s immune systems. Harm is framed as subtle and cumulative. Effects appear as rising chronic illness, unexplained reproductive decline or increased vulnerability to common infections. Because these outcomes unfold slowly, they are treated as difficult to detect and easy to dismiss, which reinforces suspicion rather than reducing it.
The narrative also frames these threats as tools of strategic disruption rather than weapons of immediate destruction. Outbreaks are interpreted as stress tests on healthcare systems and military readiness. Livestock disease, crop failures or regional health anomalies are folded into the same pattern and treated as indicators of experimentation or leakage. Biological harm is framed as irreversible once exposure occurs and nearly impossible to attribute due to incubation periods and plausible natural explanations. This transforms uncertainty into urgency. If damage may already be occurring, delay feels dangerous. Skepticism is reframed as vulnerability and belief becomes a form of self-protection.
Coalitions
Presence of a coalition is inferred when multiple actors appear to benefit from the same outcome in ways that cannot be explained by coincidence. In this narrative, biological effects such as fertility decline or long term health degradation create identifiable strategic advantages. States facing demographic pressure or labor shortages would benefit from suppressing rival population growth. Military planners would benefit from weakening adversary resilience without overt conflict. Economic actors would benefit from increased dependence on medical treatments, pharmaceuticals and reproductive technologies. These aligned incentives suggest shared interest rather than isolated behavior.
Coalitions are further inferred from stake based role alignment. Public health institutions appear to manage access and legitimacy. Military and security actors appear to control classification and strategic framing. Research institutions provide technical capability. Private firms profit from diagnostics, treatments and long term care associated with chronic biological effects. International organizations are framed as normalizing cooperation and dampening scrutiny. None of these roles alone implies conspiracy. Together, they form a system in which reproduction suppression, health degradation and demographic control generate overlapping benefits. The coalition is inferred not from explicit coordination, but from converging interests that would be reinforced if such outcomes were occurring.
Secrecy
Secrecy emerges as a functional requirement once aligned interests and roles are assumed. Indicators include compartmentalized access to data, narrow disclosure authorities and reliance on classified annexes rather than public reporting. Oversight appears procedural rather than substantive, with reviews focused on compliance instead of outcomes. Audits are delayed, redacted or conducted by bodies linked to the same institutions under scrutiny. Information is released in fragments and on different timelines, preventing a single, complete picture from forming. These practices are framed as normal for biosecurity and defense, but within the narrative they signal deliberate containment of knowledge.
Secrecy is further inferred from consistency in denial and narrative management across institutions. Public statements converge on similar language while avoiding operational detail. Independent inquiries encounter jurisdictional limits or national security exemptions. Data gaps persist at key points, such as incident attribution, funding purpose or experimental scope. Whistleblowers are portrayed as marginal or unreliable, while credentialed critics face procedural barriers rather than direct refutation. The absence of definitive proof is reframed as expected in a system designed to conceal outcomes that benefit multiple stakeholders. At this stage, secrecy completes the narrative loop. It explains why evidence is partial, why accountability is diffuse, and why challenges to the theory are interpreted as confirmation rather than contradiction.
Conspiracy Beliefs Formation Model
The Existential Threat Model explains how the biolaboratories narrative becomes coherent and threatening. The conspiracy belief formation model explains how audiences absorb that narrative and why belief persists once it takes hold. The focus shifts from narrative structure to psychological and social uptake. At this stage, the question is no longer whether the story fits the facts. The question is why it feels compelling and difficult to abandon.
Anxiety
From an intelligence perspective, sustained anxiety is observable through patterns of unresolved uncertainty, not isolated fear messages. Analysts would expect to see repeated emphasis on risk without closure. Signals include recurring references to biological danger paired with incomplete explanations, shifting timelines or open ended investigations. Information streams amplify anomalies such as isolated outbreaks, redacted documents or conflicting statements, but give little attention to resolved inquiries, inspection reports or policy clarifications. Official processes are framed as slow, constrained or conflicted. Messaging returns to the same unresolved questions across weeks or months. The key indicator is persistence. Anxiety remains active because no authoritative resolution is allowed to settle. The environment encourages vigilance rather than panic.
While it is possible for adversaries to create an environment of sustained anxiety, it is rarely invented from nothing. Adversarial propagandists usually identify preexisting collective concerns and tailor narratives to fit them. In the biolabs context, these concerns include fear of pandemics, distrust of opaque science, demographic decline and unease with dual use research. Analysts would observe messaging that selectively amplifies these anxieties while avoiding claims that could be conclusively disproven. Content aligns with lived experience such as prior outbreaks, visible secrecy or institutional complexity. The narrative adapts to local sensitivities. In some audiences it emphasizes fertility and reproduction. In others it emphasizes chronic illness or healthcare strain. This tailoring is an indicator of deliberate exploitation rather than organic rumor. When anxiety cues consistently map to audience specific vulnerabilities, belief formation is likely being shaped rather than merely reflected.
Social Influence
Conspiracy belief adoption is strongly shaped by social context rather than direct persuasion. Analysts would expect belief to spread first through peer networks, not official channels. Early signals include repetition of similar concerns across small communities, online groups or trusted interpersonal spaces rather than mass broadcasts. Claims are framed as personal realizations or shared worries rather than arguments. Phrases such as “many people are starting to notice” or “everyone is asking the same questions” signal social normalization. Credibility is derived from familiarity, not expertise. When belief circulates through trusted peers, skepticism carries social cost.
Adversaries exploit social influence by positioning conspiracy narratives as socially discovered rather than authoritatively asserted. Messaging encourages discussion, speculation and mutual reinforcement rather than instruction. Analysts would observe content that prompts audiences to connect dots themselves or to share interpretations within their networks. Influential figures are framed as concerned insiders or reluctant truth tellers rather than leaders. Disagreement is recast as naivety or isolation. Over time, belief becomes a marker of group awareness and belonging. Once social validation takes hold, individuals rely less on external evidence and more on the perceived consensus of their community. At this stage, belief persistence is driven by relational pressure rather than narrative strength.
Plausibility, Synergy and Unfalsifiability
Plausibility anchors conspiracy belief by tying interpretation to real and familiar features of the biolabs environment. Analysts would expect narratives to rely on the weaponization of dual use research, classified oversight, international cooperation and technical complexity. Claims do not need proof. They need to align with existing distrust, past outbreaks or visible secrecy. Verified facts are blended with speculation so that rejection feels like rejecting lived experience. Belief is then reinforced through accumulation rather than argument. Small cues such as anecdotes, partial documents, expert language, and repeated questions appear across sources. No single signal is decisive. Together, they create an environment where the conclusion feels obvious. Repetition increases familiarity, and disbelief requires more effort than acceptance.
Unfalsifiability emerges when the narrative is structured so that no evidence can resolve it. Analysts would expect counterevidence to be reinterpreted rather than evaluated. Official denials are framed as scripted responses and transparency is recast as selective disclosure. Data gaps are treated as expected outcomes of secrecy rather than uncertainty. Absence of evidence becomes evidence of concealment, while new information is dismissed as partial or manipulated. Over time, the narrative absorbs every challenge. Belief no longer depends on verification but on maintaining interpretive coherence, and the conspiracy functions as a closed belief system rather than a testable claim.
Conclusion
This essay has shown how conspiracy theories can be engineered as belief environments in information warfare. Using a biolaboratory focused case, the analysis demonstrated how narrative structure and psychological uptake work together to shape cognitive terrain. The ETM explains how patterns, agency, threat, coalition, and secrecy transform uncertainty into perceived design. The belief formation model explains how anxiety, social validation, plausibility, reinforcement and unfalsifiability stabilize that design over time. Together, they show that influence is rarely achieved through persuasion alone. It is achieved by shaping interpretation upstream.
For information warfare and intelligence professionals, the implication is clear. Conspiracy theories should be analyzed as systems, not claims. Detection should focus on sustained anxiety, social propagation, and narrative closure rather than factual accuracy. Countering such belief environments requires reducing unresolved uncertainty and restoring interpretive alternatives before narratives harden. In modern conflict, the decisive struggle often occurs long before action. It occurs in how meaning is structured, shared, and defended.