Information warfare and propaganda resilience

During a crisis, misinformation travels faster than truth — and your brain is working against you. Under stress, the cortisol and adrenaline flooding your system narrow attention, accelerate judgment, and drive you toward familiar narratives. Social media platforms amplify the most emotionally provocative content regardless of accuracy. The result is a fog of competing claims arriving at exactly the moment you most need reliable information to make safe decisions.

This is not a media-literacy course. It is a triage protocol for an active high-stress event — a practical framework for deciding what to believe, what to act on, and what to set aside when the stakes are real.

Action block

Do this first: Print a one-page trusted-sources card (state emergency-management URL, NOAA Weather Radio frequency for your area, out-of-area contact phone number) and file it in your go-bag (15 min) Time required: Active: 15 min for the trusted-sources card; 30 min for the family protocol conversation; recurrence: annual review to update URLs and contacts Cost range: Inexpensive for a printed card; no equipment purchase required for the core protocol Skill level: Beginner for the triage rules and family protocols; intermediate for lateral reading under time pressure Tools and supplies: Tools: NOAA Weather Radio receiver, GMRS or FM radio as backup. Supplies: printed trusted-sources card (one per go-bag), out-of-area contact phone number in every family member's wallet. Safety warnings: See Acting on unverified evacuation information below — wrong evacuation routes or shelter locations are the most dangerous downstream consequences of acting on rumor during an active event

Educational use only

This page provides general information for emergency preparedness. Information environments vary significantly by event type, region, and political context. No triage protocol fully replaces critical judgment. Verify emergency instructions through official channels before acting on them.

Before you start

Skills: Recognize the difference between a Wireless Emergency Alert (WEA) — which arrives as a high-volume buzz to your phone — and a social-media post. Know your state emergency management agency's official website URL and bookmark it before an event. Know your NOAA Weather Radio station frequency for your county. See communications plan for building the full layered communications framework.

Materials: Printed trusted-sources card with: state emergency-management URL, NOAA Weather Radio frequency, one out-of-area contact number, and the family's designated fact-checker. Charged phone. NOAA Weather Radio receiver or a general-purpose AM/FM radio as fallback.

Conditions: These triage rules are calibrated for active high-stress conditions. They trade speed for accuracy on purpose — in a calm environment you would apply more rigorous verification. Use this protocol when an event is actively unfolding, not as a permanent replacement for slow, careful reading.

Time: Source-tier check: under 60 seconds. Full SIFT pass: 2–5 minutes. Family protocol conversation (pre-event): 30 minutes.

Choosing a method

Different verification methods work in different situations. Match the method to your current constraints.

Method When to use Time cost Confidence gain Common failure mode
Source-tier check Any new claim — should be your first step every time Under 60 seconds High when source is Tier 1 or Tier 4; medium for Tier 2–3 Assuming a professional-looking account equals Tier 1
Lateral reading Before forwarding anything from Tier 2–4 sources 2–5 minutes High — professional fact-checkers use this as their primary tool Giving up after one negative search result
SIFT (Stop / Investigate / Find / Trace) Ambiguous claims that feel urgent 2–5 minutes High — catches old-photo recycling, out-of-context quotes, impersonation Stopping at "I" (Investigate the source page) instead of going lateral
Official-channel confirmation Any claim calling for immediate physical action (evacuate, shelter, lock down) Depends on channel speed — WEA is instant Near-certain Channel itself may be overwhelmed; NOAA is most reliable offline fallback
Out-of-area contact When local internet and cellular are compromised Depends on call success Medium-high — they can access what you cannot Contact not reachable; need secondary out-of-area contact
5-minute cool-down rule Emotional, outrage-inducing claims 5 minutes of inaction Medium — breaks the share reflex triggered by outrage Telling yourself you'll wait but sharing while the emotion peaks

Source-tier verification under emotional load

Before you start:

  • Use this when: a new claim arrives during an active event and you need to decide whether to act on it, forward it, or set it aside
  • Do not use this when: routine, calm-environment information consumption — these rules prioritize speed over thoroughness
  • Stop and escalate if: a claim concerns imminent personal safety such as an evacuation order, shelter-in-place, or hostile threat to your location — verify through 911 or official emergency-alert channels first, not social media

Every claim has a source tier. Identifying that tier takes less than 60 seconds and is the single most useful thing you can do before acting or forwarding.

Tier 1 — accept with high confidence: Official emergency channels. Wireless Emergency Alerts (WEAs) delivered directly to your phone by FEMA's Integrated Public Alert and Warning System. NOAA Weather Radio All Hazards, which broadcasts continuously from more than 1,000 transmitters across all 50 states. State and county Office of Emergency Management websites and verified social accounts. Local emergency services (fire, police, public health) posting from their official accounts. When these sources conflict, the most geographically specific Tier 1 source generally knows most — your county OEM knows more about local road conditions than the national feed.

Tier 2 — accept with medium confidence after lateral check: Established news organizations with reporters physically on the ground in the affected area. Local TV stations with newsrooms in the region. Regional newspapers with verifiable bylines. Accept Tier 2 for situation awareness but run a lateral check (see below) before treating any single claim as confirmed.

Tier 3 — useful for early signal only; require cross-confirmation: Social-media posts from named, verified accounts who have direct first-hand observation of the event. "I can see fire on the ridge two blocks east" from a neighbor with a known identity is useful early signal. It is not a basis for action without Tier 1 or Tier 2 confirmation.

Tier 4 — treat as rumor until confirmed: Unverified social-media posts. Anonymous forwards. Group-chat messages with no traceable original source. Screenshots of screenshots. These are frequently the first way information about an emerging event appears — which is why they feel credible. They are also the primary vector for misinformation during disasters. Treat Tier 4 as a lead to verify, never as a basis for action.

The 60-second triage: When a claim arrives, ask four questions: Who is the source? What did they directly observe versus what did they hear from someone else? Is there a named, accountable human behind this claim? When was it timestamped, and does that timestamp match the event timeline? A claim that fails two or more of these questions is Tier 4 regardless of how authoritative the account looks.

Acting on unverified evacuation information

Evacuation routes and shelter locations that turn out to be wrong can send people into danger. Before moving your family based on an evacuation instruction, confirm the route and destination through at least one Tier 1 source (county OEM, WEA, NOAA, or direct call to local emergency services). If Tier 1 is unreachable, call your out-of-area contact who may have internet access to verify.

Lateral reading and SIFT

Before you start:

  • Use this when: you have a Tier 2–4 claim and 2–5 minutes to verify before forwarding or acting
  • Do not use this when: a Tier 1 WEA or NOAA broadcast is active — those do not require lateral verification
  • Stop and escalate if: every source you find is citing the same original source (this is "source laundering" — the claim has not actually been independently confirmed)

Professional fact-checkers do not evaluate a source by reading it carefully. They leave the source page immediately and look at what other reliable sources say about it. This is called lateral reading — named for the Stanford History Education Group research that showed expert fact-checkers and experienced journalists routinely open multiple tabs and look sideways across the information landscape rather than drilling down into a single source.

The "open a second tab" rule: Before sharing, forwarding, or acting on any claim from a Tier 2–4 source, open a new browser tab and search for the event using the key terms from the claim. What are other reliable sources saying? If the claim is real and significant, multiple Tier 1 and Tier 2 sources will be covering it within minutes. If only the original source makes the claim, that silence is data.

SIFT is a four-move framework developed by Mike Caulfield, a research scientist at the University of Washington's Center for an Informed Public, for fast evaluation of online claims. The four moves take under five minutes total:

  1. Stop. Before sharing or acting, pause. Notice if you feel urgency or emotional heat. That feeling is often a manipulation signal, not a signal of credibility.
  2. Investigate the source. Not by reading the source article — by leaving it. Search for the name of the outlet, author, or account. What do other sources say about their reliability and history?
  3. Find better coverage. Search for what Tier 1 and 2 sources are saying about the same event. If better coverage exists, use it. If no coverage exists from reliable sources, treat the original claim as unconfirmed.
  4. Trace the claim back to its original context. Images, quotes, and videos travel far from their origins. What is the actual original context? An image labeled "flooding in [your city] today" may be a years-old photo from another country. A video clip labeled "National Guard blocking roads" may be unrelated law-enforcement footage.

Reverse-image check: When an image is being used to support a claim, use Google Lens, TinEye, or DuckDuckGo's reverse-image search to trace where it originally appeared. Old photos and videos recycled into new events are the single most common misinformation vector during major disasters. This check takes under 30 seconds on a smartphone.

Date-stamp discipline: Check when a post, photo, or video was originally published — not when you received it. Screenshots lose timestamps. A post from three years ago shared without context can look like breaking news. When the original timestamp is absent or suspicious, treat the content as unverified.

Field note

The most convincing misinformation during a disaster usually contains one accurate anchor — a real place name, a real official's name, a real event — surrounded by false or exaggerated claims. That accurate anchor is what makes the claim feel credible. When something feels "almost right," that is exactly when to run a lateral check, not skip it.

Social-engineering recognition

Before you start:

  • Use this when: a message arrives that creates a strong emotional reaction and urges you to share or act immediately
  • Do not use this when: a Tier 1 emergency alert — those are designed to be urgent because the urgency is real
  • Stop and escalate if: a phone caller claims to be from FEMA, IRS, or a utility company and asks for your Social Security Number, banking details, or upfront payment

Manipulation tactics used in misinformation campaigns follow predictable patterns. Recognizing the pattern breaks the mechanism.

Urgency manipulation. Messages that say "share this NOW before they take it down" or "forward immediately before the window closes" are using manufactured urgency to bypass your verification reflex. Real emergencies communicate urgency through official channels with specific, actionable instructions. Claims that urgency is evidence of suppression are inverted — real suppression targets content that has already spread widely, not content that needs your help to spread.

Outrage amplification. False news spreads roughly six times faster than true news on social platforms (Vosoughi, Roy & Aral, Science 2018, ~126,000 Twitter stories), and high-arousal emotions — particularly anger and moral outrage — are the strongest drivers of that spread per behavioral research on information diffusion (Berger & Milkman, JPSP 2012). This is not incidental — engagement-based algorithms reward content that triggers strong emotional reactions. If your first response to a claim is rage, that response is working as the platform intended, not as a signal that the claim is true. The outrage reflex is the entry point for much of the most harmful misinformation.

Identity confirmation. Claims framed as "people like us know that..." or "they don't want people like us to hear this..." appeal to group identity rather than to evidence. This is a structure, not a content feature — the same framing appears across the political spectrum and across different identity groups. When you recognize the structure, the specific content becomes secondary.

Fake-authority impersonation. Social-media accounts can be created with official-looking names, logos, and profile pictures that closely resemble legitimate government or news accounts. A "verified" checkmark is not a guarantee of identity on most platforms. Before trusting a social-media account from an official source, verify it by navigating directly to that agency's official home website (FEMA.gov, weather.gov, your county's official site) and confirming the social-media handle from there, not the other direction.

Disaster telephone scams. After every significant disaster, fraudsters impersonate FEMA, the IRS, utility restoration crews, and insurance adjusters. Per FEMA's own published guidance and FTC data: real government disaster-assistance agencies do not call you to ask for your Social Security Number, banking account details, or upfront fees. Reported losses to imposter scams in the US exceeded $3.5 billion in 2025, with government-impersonation scams up 40% year over year. If a caller claims to be a federal official and requests financial or personal information, end the call. Look up the agency's published phone number independently and call back.

Family disinformation protocols

The most dangerous misinformation is not the post you see from a stranger — it is the message you receive from someone you trust, who received it from someone they trust, who received it from an unverified source three links back. Family and social networks are the primary amplification channel for disaster misinformation.

Pre-event conversation. Hold a 30-minute household conversation before the next potential event. The agenda is simple: "If something major happens, we will check [specific channel] together before sharing or acting. We will not forward anything to family members without checking it first." This conversation works best during a calm period — not while an event is unfolding.

Designate a calm adult as family fact-checker. One person agrees to be the household's verification step. Other members agree to route questionable claims through that person before acting. The designated fact-checker does not need to be the most knowledgeable person — they need to be the least emotionally reactive person in the household, because the mechanism they are defending against is emotional.

Group-chat hygiene. Agree on a household rule: "I'll verify before I forward." A single sentence — "I'm checking on this" — posted to the family group chat before forwarding a claim buys five minutes for lateral checking and signals to other members that verification is the norm, not the exception.

Children and information shielding. Children under 12 process threat information differently than adults. Detailed, graphic, or ambiguous crisis information presented without adult framing causes measurable anxiety without providing actionable protection. During an active event, limit children's exposure to unfiltered social-media feeds. Use age-appropriate framing: "We're getting information from official sources and we'll tell you what you need to know." "We don't know yet" is a complete and honest answer.

Elders and cognitive-load considerations. Cognitive load increases under stress for everyone, and existing cognitive differences are amplified. Elders living alone are among the highest-risk groups for disaster telephone scams. Before an event, brief elders directly: "No government agency will call you and ask for your Social Security Number or banking details. If anyone calls claiming to be from FEMA or the IRS, hang up and call me." Do not assume this message lands from a pamphlet alone — a direct conversation is necessary.

Ignore vs amplify

Not everything requires verification, and not everything worth verifying should be shared even after you confirm it. The practical framework is a three-category sort: ignore, wait-and-watch, or amplify.

Ignore — do not spend time verifying and do not forward:

  • Anonymous claims about death tolls or casualty counts during an active, unresolved event (these are almost always inflated or speculative in the first hours)
  • Anonymous claims about the specific identity of perpetrators or the specific cause of an incident before authorities have released official findings
  • "Leaked documents" with no verifiable chain of custody and no named source accountable for their content
  • Detailed predictive claims about what authorities or hostile actors "will do next" — these are usually projection, not intelligence
  • "Government doesn't want you to know" framings, regardless of the content attached

Wait and watch — monitor from Tier 1–2 sources as they develop:

  • Official statements that are still marked as preliminary or still pending (wait for the confirmed update before acting or forwarding)
  • Emerging-event details in the first 30–120 minutes — this window has the highest error rate in both official and unofficial channels
  • Weather predictions beyond 72 hours out — beyond that horizon, confidence intervals are wide enough that specific action planning is premature

Amplify — forward, speak aloud, share with your network:

  • Wireless Emergency Alerts and NOAA Weather Radio broadcasts from Tier 1 sources
  • Verified evacuation orders and routes from official local emergency management
  • Verified shelter locations, hours, and requirements from local emergency management or Red Cross
  • Verified resource distribution times and locations (food, water, medical) from official or established-organization sources
  • Corrections to dangerous misinformation already circulating — when you have confirmed through Tier 1/2 sources that a widely-shared claim is false, a single correction message to your group is worth sending

Information-blackout scenarios

When power is out, cellular towers are overloaded or down, and your internet connection is unavailable, your normal information-verification toolkit fails. The blackout scenario is also when misinformation is most dangerous, because people are most stressed and least able to verify.

NOAA Weather Radio as the primary fallback. NOAA's network of more than 1,000 transmitters operates independently of the commercial internet and commercial cellular infrastructure. A battery-powered or hand-crank NOAA Weather Radio receiver is inexpensive and works during extended power outages. Program your local station frequency in advance — frequencies vary by region and can be found at weather.gov/nwr. This is your most reliable Tier 1 source when everything else fails.

AM/FM broadcast as secondary fallback. Local AM and FM radio stations often maintain emergency power and continue broadcasting official guidance during major events. Know in advance which local station carries official emergency programming — most regions have a designated Emergency Alert System (EAS) station listed in local emergency-management plans.

Out-of-area contact as your remote fact-checker. Identify one trusted person who lives far enough away to be outside your likely event zone. This contact has working internet, working power, and access to Tier 1 and Tier 2 sources. When you cannot verify a rumor locally, call your out-of-area contact and ask them to look it up. This is a standard element of a layered communications plan and one of the most underused verification resources during local disasters.

Local-network verification at community level. When no external channel is working, your immediate community becomes a verification resource. Neighbors with firsthand observation of an area you cannot see are Tier 3 — useful signal that requires cross-confirmation. A community information point (a neighborhood meeting, a mutual-aid check-in) can serve as a collective triage step: rumors that arrive from multiple independent sources with consistent details carry more weight than rumors from a single source. See mutual aid organization for the structure to make this work before it is needed.

When all digital channels fail and official radio is unavailable, fall back to the pre-arranged physical protocol from your communications plan: walk to the local rally point, leave written notes in the pre-agreed format, and use runner-based information exchange. Physical visits to the nearest fire station or police station are the universal recovery path when all else fails.

For mesh-radio fallback when internet is down, see mesh networks.

Tools and substitutes

Ideal tool Specs / sizing Field-expedient substitute Notes / limits
NOAA Weather Radio receiver Dedicated receiver with SAME alert capability; battery or hand-crank backup power AM/FM portable radio tuned to local EAS station EAS broadcasts are intermittent; NOAA is continuous — the dedicated receiver is worth the investment
Out-of-area contact A specific, pre-designated person with your agreement to serve this role Any out-of-area contact reachable by phone A contact who has not agreed to the role in advance may not be available or may not understand what you need
State emergency-management bookmarked URL Bookmarked on phone browser and on a printed card in go-bag Google search for "[your state] emergency management" Search results may surface unofficial or outdated pages first; the bookmark is faster and more reliable
Printed trusted-sources card Laminated, one per go-bag Wallet card or folded paper Paper card survives phone battery death; lamination survives water
Reverse-image search app Google Lens or DuckDuckGo app on a charged phone TinEye website on any browser All require working internet; no substitute during full blackout — defer image verification until connectivity restored
Family fact-checker protocol Pre-agreed household role with standing Ad-hoc agreement during an event Pre-agreement works; ad-hoc agreements rarely hold under emotional pressure

Failure modes

Operator: did not pause before forwarding. Outcome: spread a false death toll or perpetrator claim to 40 family members via group chat. Recovery: Send a correction message as soon as the error is identified — "Earlier I forwarded a claim about [X]. I've confirmed from [Tier 1 source] that this was incorrect. Please don't act on it." Brief but direct. The failure of not correcting known misinformation compounds the original error.

Operator: relied on group-chat consensus to confirm a claim. Outcome: eight household members all believed the same false rumor because all eight were drawing from the same original unverified source. Recovery: introduce the concept of independent source confirmation to the household. One source shared eight times is still one source, regardless of the apparent consensus.

Operator: trusted a "verified" social-media account that turned out to be an impersonator. Outcome: acted on false evacuation or shelter information. Recovery: before the next event, identify the official social-media handles for your county OEM, local fire department, and local police by visiting those agencies' official home websites directly. Note those handles on your trusted-sources card. Verify official announcements via the agency's home website when stakes are high.

Operator: shared outrage-amplified content during emotional peak. Outcome: spread an identity-confirmation false claim to a wider audience; subsequent correction reached fewer people. Recovery: implement the 5-minute rule — before forwarding any emotionally charged content, wait five minutes. If the content still seems worth forwarding after five minutes of deliberate thought, apply the source-tier check and lateral read first. The correction rarely reaches as many people as the original false claim; the 5-minute pause is the only reliable prevention.

Operator: dismissed an actual official safety alert as "probably a rumor." Outcome: missed the evacuation window because legitimate WEA and NOAA alerts were filtered out along with misinformation. Recovery: before the next event, train your household to recognize the specific visual and audible signatures of Wireless Emergency Alerts (full-screen government alert with distinctive alarm sound), NOAA Weather Radio broadcasts (tone alarm followed by official weather-service voice), and local EAS broadcasts (tri-tone alert followed by an official announcement). These have distinct signatures that differentiate them from social-media posts. The skill is pattern recognition, not skepticism — apply skepticism to Tier 3–4 content; apply deference to Tier 1 channels.

Operator: received a disaster-related phone call from an apparent FEMA or IRS official and provided personal information. Outcome: identity theft or financial fraud in the immediate post-disaster period. Recovery: end the call immediately. Call the agency back using the phone number from their official website (FEMA.gov/contact, IRS.gov/contact). Report to the FTC at ReportFraud.ftc.gov and to the FEMA Disaster Fraud Hotline at 1-866-720-5721. Per FEMA: no legitimate government disaster-assistance official will call you asking for SSN, banking details, or upfront fees.

Resilience checklist

  • Bookmark your state emergency-management website on your phone and laptop
  • Find your NOAA Weather Radio frequency (weather.gov/nwr) and program it or note it on your trusted-sources card
  • Identify and confirm a dedicated out-of-area contact who understands the role
  • Print one trusted-sources card (Tier 1 URLs, NOAA frequency, out-of-area contact, family fact-checker name) per go-bag
  • Hold a 30-minute pre-event household conversation about the family protocol
  • Designate one calm adult as the household fact-checker
  • Practice the "I'll verify before I forward" rule in your family group chat at least once before an event
  • Brief any elders in your household or network on disaster phone scams: no government agency will call asking for SSN or banking details
  • Test your NOAA Weather Radio receiver on battery power at least once a year
  • Confirm your out-of-area contact's phone number is current and saved in your phone contacts under a memorable label

Good information discipline closes the loop on your broader communications plan. Knowing which channels to trust and which to triage is the complement to knowing how to reach people — pair this page with your communications plan for the full household information framework. For the signals and radio fallbacks that keep information flowing when digital channels fail, see visual and audible signals and mesh networks.

Sources and next steps

Last reviewed: 2026-05-23

Source hierarchy:

  1. FEMA — Protect Your Identity: Be Alert to Fraud and Scams After a Disaster (Tier 1, federal agency — FEMA's official guidance on disaster scam recognition, impersonation patterns, reporting channels)
  2. NOAA Weather Radio All Hazards — Network Overview (Tier 1, federal agency — transmitter coverage, frequencies, alert types, offline use)
  3. CISA — Misinformation, Disinformation, and Malinformation Framework (Tier 1, federal agency — MDM definitions, recognition framework)
  4. FTC — Imposter Scams Trend Report 2025 (Tier 1, federal agency — 2025 loss data, government-impersonation scam trends)
  5. Mike Caulfield / University of Washington Center for an Informed Public — SIFT Framework (Tier 2, expert practitioner — SIFT methodology, lateral reading technique)

Legal/regional caveats: Emergency alert systems (WEA, EAS, NOAA) operate under federal FCC and FEMA authority in the United States. Alert delivery depends on cellular carrier participation for WEA — verify with your carrier that WEA is enabled on your specific device. Outside the United States, equivalent systems exist (e.g., Canada's National Alert Aggregation and Dissemination system, EU Alert) but Tier 1 channels differ by country.

Safety stakes: high-criticality topic — recommended to verify thresholds before acting.

Next 3 links:

  • → Communications planpair this with your trusted-sources card and out-of-area contact to build the full household information architecture
  • → Mesh networksfor local text-based communication fallback when cellular and internet fail, removing the dependency on information channels you cannot verify
  • → Mutual aid organizationfor building the neighborhood-level trust infrastructure that makes community-sourced information more reliable during an event