Homeland Defense

Total Page:16

File Type:pdf, Size:1020Kb

Homeland Defense Joint Publication 3-27 OF TH NT E E A W E' L L D R I S E F E N M H D T M T Y R • A P E A C D I U • R N E I T M E A D F S O TAT E S Homeland Defense 10 April 2018 PREFACE 1. Scope This publication provides joint doctrine for homeland defense. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations, and it provides considerations for military interaction with governmental and nongovernmental agencies, multinational forces, and other interorganizational partners. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs), and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing and executing their plans and orders. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of objectives. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subordinate unified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the CJCS, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the US, commanders should evaluate and follow the multinational command’s doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff: KEVIN D. SCOTT Vice Admiral, USN Director, Joint Force Development i Preface Intentionally Blank ii JP 3-27 SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 3-27 DATED 29 JULY 2013 • Reorganizes Chapter I, “Fundamentals of Homeland Defense,” to describe homeland security (HS), defense support of civil authorities (DSCA), and homeland defense (HD) as a unified approach; adds more information on Department of Homeland Security’s mission with respect to HS and the transregional, multi-domain, and multifunctional nature of the transnational threat environment; adds information on unmanned aircraft systems, global campaign plans, and incident awareness and assessment; updates laws, policies, and terminology; and enhances the succinctness of the chapter. • Adds information to Chapter II, “Command Relationships and Interorganizational Cooperation,” on unified action and properly defines United States Coast Guard’s (USCG’s) HD roles and the differences between maritime homeland security (MHS) and maritime homeland defense (MHD) tasks, as well as the required coordination between US Navy and USCG. • Adds to Chapter II, “Command Relationships and Interorganizational Cooperation,” US Alaskan Command and removes Joint Task Force–Alaska; clarifies US Pacific Command’s role in HD and the MHD execute order; and updates terminology and references to other joint publications. • Covers Chapter III, “Planning and Operations for Homeland Defense,” operations in all domains for homeland defense; adds paragraph on MHS support to strategic sealift; aligns information operations as one of the seven joint functions; clarifies roles and responsibilities for homeland ballistic missile defense; expands cyberspace operations and critical infrastructure protection; and moves joint reception, staging, onward movement, and integration verbiage to more pertinent location. • Updates Appendix A, “Relationships Betweeen Homeland Security, Homeland Defense and Defense Support of civil Authorities,” to reflect changes made by National Defense Authorization Act Fiscal Year 2017 and adds a more concise diagram depicting the relationship between HS, HD, and DSCA. • Revises the explanation and mission of multiple interorganizational agencies within the United States Government in Appendix B, “Facilitating Interorganizational Cooperation.” • Updates Appendix C, “North American Aerospace Defense Command Missions, Organization, and Structure,” definitions and provides for a more succinct document. • Updates references used throughout the document and removes extraneous descriptors for Appendix D, “References.” iii Summary of Changes Intentionally Blank iv JP 3-27 TABLE OF CONTENTS EXECUTIVE SUMMARY .............................................................................................. vii CHAPTER I FUNDAMENTALS OF HOMELAND DEFENSE General ........................................................................................................................ I-1 Threats......................................................................................................................... I-4 Homeland Defense Policy and Legal Considerations ................................................. I-5 Active, Layered Defense ............................................................................................. I-9 The Homeland Defense Operational Framework ..................................................... I-10 CHAPTER II COMMAND RELATIONSHIPS AND INTERORGANIZATIONAL COOPERATION General .......................................................................................................................II-1 Unified Action ...........................................................................................................II-1 Command and Control Relationships and Responsibilities .......................................II-3 Interagency Coordination .........................................................................................II-16 Interorganizational Cooperation Considerations .....................................................II-21 Multinational Forces ................................................................................................II-21 CHAPTER III PLANNING AND OPERATIONS FOR HOMELAND DEFENSE General ..................................................................................................................... III-1 Strategic Guidance ................................................................................................... III-1 Operational Factors .................................................................................................. III-1 Intelligence Sharing for Homeland Defense ............................................................ III-3 Joint Fires ................................................................................................................. III-4 Movement and Maneuver in the Conduct of Homeland Defense ............................ III-5 Protection ............................................................................................................... III-19 Sustainment ............................................................................................................ III-26 Other Activities and Efforts ................................................................................... III-31 APPENDIX A Relationships Between Homeland Security, Homeland Defense, and Defense Support of Civil Authorities ................................................. A-1 B Facilitating Interorganizational Cooperation .............................................B-1 C North American Aerospace Defense Command Missions, Organization, and Structure ........................................................................C-1 D Joint Task Force Headquarters Enabling Capabilities Points of Contact ..... D-1 E References ................................................................................................. E-1 F Administrative Instructions ....................................................................... F-1 v Table of Contents GLOSSARY Part I Abbreviations, Acronyms, and Initialisms .............................................. GL-1 Part II Terms and Definitions ............................................................................. GL-8 FIGURE I-1 Homeland Defense Transnational Threat Environment .............................. I-5 I-2 Guidance and Policy for the Intelligence Oversight Program ..................... I-7 II-1 United States Northern Command Homeland Defense Command Relationships ..............................................................................................II-7 II-2 Maritime Homeland Defense and Maritime Homeland Security Command Relationships ............................................................................II-9 III-1 Homeland Defense Land Operations Rapid Response Process ............... III-7 III-2 Homeland Defense Land Operations Sustained Response Process ......... III-9 A-1 Relationships Between Homeland Defense, Defense Support of Civil Authorities, and Homeland Security Missions ............................ A-2 vi JP 3-27 EXECUTIVE SUMMARY COMMANDER’S OVERVIEW • Discusses
Recommended publications
  • Event. Location
    12th Annual A remarkable CHAMBER EVENT. MUSIC FESTIVAL A remarkable of the LOCATION. BLUEGRASS 2018 Overview Festival Program Now in its 12th year, the FRIDAY, MAY 25, 2018 Chamber Music Festival of the Bluegrass is a premier The Meeting House Central Kentucky cultural destination. Join CMS Artistic Directors David Haydn Finckel and Wu Han for Trio in C major for Piano, Violin, and Cello, Hob. XV:27 (1797) special performances in the Allegro 1820 Meeting House and the Wu Han, Huang, Finckel Meadow View Barn. Chamber music enthusiasts will also Schumann enjoy two educational lectures, Quartet in E-flat major for Piano, Violin, Viola, and Cello, Op. 47 (1842) led by Patrick Castillo, Andante cantabile exploring the history of each Wu Han, Keefe, Lipman, Atapine featured piece of music. Waxman 2018 ARTISTS Carmen Fantasie for Viola and Piano (1947) Lipman, Pohjonen JUHO POHJONEN, Piano WU HAN, Piano Brahms Trio in E-flat major for Horn, Violin, and Piano, Op. 40 (1865) PAUL HUANG, Violin Finale: Allegro con brio ERIN KEEFE, Violin Vlatkovic, Pohjonen MATTHEW LIPMAN, Viola DMITRI ATAPINE, Cello DAVID FINCKEL, Cello RADOVAN VLATKOVIC´ , Horn Friday, May 25 at 6:30pm: Patrons’ Gala and Dinner 12th Annual CHAMBER MUSIC FESTIVAL of the BLUEGRASS SATURDAY, MAY 26, 2018 AT 11:00 AM Dvorák, 14’ SUNDAY, MAY 27, 2018 AT 5:00 PM THE MEETING HOUSE Drobnosti (Miniatures) for Two Violins and Viola, MEADOW VIEW BARN Op. 75a (1887) Haydn, 16’ Cavatina: Moderato Mozart, 26’ Trio in C major for Piano, Violin, and Cello, Capriccio: Poco allegro Quartet in G minor for Piano, Violin, Viola, and Hob.
    [Show full text]
  • The Arctic Is... a Homeland Page 1 Cycles As They Follow the Animals with Which Their Lives Are Closely Involved
    A HOMELAND landscape and people It is late winter and the temperature is minus 40 degrees Celsius. The sea is frozen over for a mile from the shore. Far out on the ice a solitary hunter inches forwards towards a seal which has come up for air through a hole in the ice and is resting on the surface. In front of him he pushes a rifle hidden behind a white screen of canvas. There is no sign that there is anyone hidden behind the screen, except for a small cloud of condensation above him as he breathes. If he is skilful and lucky, the seal will not notice him until it is too late. Meanwhile, thousands of miles away inland, three reindeer herders wait on a windswept hilltop, scanning the surrounding mountains with binoculars. In the distance, they see two other herders riding reindeer and weaving their way through the thin larch trees which seem drawn with black ink against the snow on the ground. They have found part of the herd and are driving it toward the waiting men. At last, the sound of men whistling and deer grunting can be heard. The first reindeer filter through the Figure 1 Kyrnysh-Di forest island near surrounding trees, the camouflage of their fur blending closely with the Kolva-Vis river, Nenets Autonomous snow and the tress’ rough, grey-brown bark. Suddenly, the waiting men District.Photo taken by Joachim Otto Habeck, May 1999 burst into action with their lassos, separating some deer and bunching others in order to drive them off later to different pastures.
    [Show full text]
  • Key Factors That Enable the Pandemic Potential of RNA Viruses and Inter-Species Transmission: a Systematic Review
    viruses Review Key Factors That Enable the Pandemic Potential of RNA Viruses and Inter-Species Transmission: A Systematic Review Santiago Alvarez-Munoz , Nicolas Upegui-Porras , Arlen P. Gomez and Gloria Ramirez-Nieto * Microbiology and Epidemiology Research Group, Facultad de Medicina Veterinaria y de Zootecnia, Universidad Nacional de Colombia, Bogotá 111321, Colombia; [email protected] (S.A.-M.); [email protected] (N.U.-P.); [email protected] (A.P.G.) * Correspondence: [email protected]; Tel.: +57-1-3-16-56-93 Abstract: Viruses play a primary role as etiological agents of pandemics worldwide. Although there has been progress in identifying the molecular features of both viruses and hosts, the extent of the impact these and other factors have that contribute to interspecies transmission and their relationship with the emergence of diseases are poorly understood. The objective of this review was to analyze the factors related to the characteristics inherent to RNA viruses accountable for pandemics in the last 20 years which facilitate infection, promote interspecies jump, and assist in the generation of zoonotic infections with pandemic potential. The search resulted in 48 research articles that met the inclusion criteria. Changes adopted by RNA viruses are influenced by environmental and host-related factors, which define their ability to adapt. Population density, host distribution, migration patterns, and the loss of natural habitats, among others, have been associated as factors in the virus–host interaction. This review also included a critical analysis of the Latin American context, considering its diverse and unique social, cultural, and biodiversity characteristics. The scarcity of scientific information is Citation: Alvarez-Munoz, S.; striking, thus, a call to local institutions and governments to invest more resources and efforts to the Upegui-Porras, N.; Gomez, A.P.; study of these factors in the region is key.
    [Show full text]
  • DEPARTMENT of HOMELAND SECURITY the Civilian Component of the U.S
    DEPARTMENT OF HOMELAND SECURITY The civilian component of the U.S. Coast Guard Authorized by Congress in 1939 WebWatch Division 8, 5NR November, 2013 A. SELECTION OF DEPUTY ASSISTANT COMMANDANT FOR ENGINEERING AND LOGISTICS (CG-4D) ADM Bob Papp, Commandant 1. I am pleased to announce the selection of Mr. Albert Curry, Jr., as Deputy Assistant Commandant for Engineering and Logistics. Mr. Curry assumed these duties on 22 September 2013. In this capacity, Mr. Curry provides leadership and management for the Coast Guard engineering and logistics program. 2. Mr. Curry most recently served as the Acting Deputy Assistant Commandant for Engineering and Logistics. Previously, he served as the Deputy Program Manager for C4ISR Major System Acquisitions program and the Deputy Program Manager for the Coast Guard Rescue 21 acquisition program. Mr. Curry retired as a Captain from the U.S. Navy in 2006. His distinguished naval career included service as the Commanding Officer of the USS PENSACOLA, Chief of Staff for the Aircraft Carriers Program Executive Office, Deputy for Naval Sea Systems Commands (NAVSEA) Task Force Total Force, and Director of the NAVSEA Total Force Development Office. Mr. Curry holds a Bachelor of Science degree in Electronic Engineering Technology from Savannah State University and a Master of Science degree in Systems Engineering (Electronic Warfare) from the Naval Postgraduate School, Monterey, CA. Mr. Curry is a graduate of the Advanced Program Managers course at the Defense Systems Management College, Fort Belvoir, VA. B. THE INTEGRITY OF THE MILITARY JUSTICE PROCESS ADM Bob Papp, Commandant 1. Recently, the Acting Secretary of Homeland Security issued a memorandum to me which addressed his devotion to the military justice process.
    [Show full text]
  • Threnody Amy Fitzgerald Macalester College, [email protected]
    Macalester College DigitalCommons@Macalester College English Honors Projects English Department 2012 Threnody Amy Fitzgerald Macalester College, [email protected] Follow this and additional works at: http://digitalcommons.macalester.edu/english_honors Part of the English Language and Literature Commons Recommended Citation Fitzgerald, Amy, "Threnody" (2012). English Honors Projects. Paper 21. http://digitalcommons.macalester.edu/english_honors/21 This Honors Project - Open Access is brought to you for free and open access by the English Department at DigitalCommons@Macalester College. It has been accepted for inclusion in English Honors Projects by an authorized administrator of DigitalCommons@Macalester College. For more information, please contact [email protected]. Threnody By Amy Fitzgerald English Department Honors Project, May 2012 Advisor: Peter Bognanni 1 Glossary of Words, Terms, and Institutions Commissie voor Oorlogspleegkinderen : Commission for War Foster Children; formed after World War II to relocate war orphans in the Netherlands, most of whom were Jewish (Dutch) Crèche : nursery (French origin) Fraulein : Miss (German) Hervormde Kweekschool : Reformed (religion) teacher’s training college Hollandsche Shouwberg : Dutch Theater Huppah : Jewish wedding canopy Kaddish : multipurpose Jewish prayer with several versions, including the Mourners’ Kaddish KP (full name Knokploeg): Assault Group, a Dutch resistance organization LO (full name Landelijke Organasatie voor Hulp aan Onderduikers): National Organization
    [Show full text]
  • The Alt-Right on Campus: What Students Need to Know
    THE ALT-RIGHT ON CAMPUS: WHAT STUDENTS NEED TO KNOW About the Southern Poverty Law Center The Southern Poverty Law Center is dedicated to fighting hate and bigotry and to seeking justice for the most vulnerable members of our society. Using litigation, education, and other forms of advocacy, the SPLC works toward the day when the ideals of equal justice and equal oportunity will become a reality. • • • For more information about the southern poverty law center or to obtain additional copies of this guidebook, contact [email protected] or visit www.splconcampus.org @splcenter facebook/SPLCenter facebook/SPLConcampus © 2017 Southern Poverty Law Center THE ALT-RIGHT ON CAMPUS: WHAT STUDENTS NEED TO KNOW RICHARD SPENCER IS A LEADING ALT-RIGHT SPEAKER. The Alt-Right and Extremism on Campus ocratic ideals. They claim that “white identity” is under attack by multicultural forces using “politi- An old and familiar poison is being spread on col- cal correctness” and “social justice” to undermine lege campuses these days: the idea that America white people and “their” civilization. Character- should be a country for white people. ized by heavy use of social media and memes, they Under the banner of the Alternative Right – or eschew establishment conservatism and promote “alt-right” – extremist speakers are touring colleges the goal of a white ethnostate, or homeland. and universities across the country to recruit stu- As student activists, you can counter this movement. dents to their brand of bigotry, often igniting pro- In this brochure, the Southern Poverty Law Cen- tests and making national headlines. Their appear- ances have inspired a fierce debate over free speech ter examines the alt-right, profiles its key figures and the direction of the country.
    [Show full text]
  • National Strategy for Homeland Security 2007
    national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 My fellow Americans, More than 6 years after the attacks of September 11, 2001, we remain at war with adversar- ies who are committed to destroying our people, our freedom, and our way of life. In the midst of this conflict, our Nation also has endured one of the worst natural disasters in our history, Hurricane Katrina. As we face the dual challenges of preventing terrorist attacks in the Homeland and strengthening our Nation’s preparedness for both natural and man-made disasters, our most solemn duty is to protect the American people. The National Strategy for Homeland Security serves as our guide to leverage America’s talents and resources to meet this obligation. Despite grave challenges, we also have seen great accomplishments. Working with our part- ners and allies, we have broken up terrorist cells, disrupted attacks, and saved American lives. Although our enemies have not been idle, they have not succeeded in launching another attack on our soil in over 6 years due to the bravery and diligence of many. Just as our vision of homeland security has evolved as we have made progress in the War on Terror, we also have learned from the tragedy of Hurricane Katrina. We witnessed countless acts of courage and kindness in the aftermath of that storm, but I, like most Americans, was not satisfied with the Federal response. We have applied the lessons of Katrina to thisStrategy to make sure that America is safer, stronger, and better prepared.
    [Show full text]
  • The Dynamics of Syria's Civil
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Browse Reports & Bookstore TERRORISM AND Make a charitable contribution HOMELAND SECURITY For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. RAND perspectives (PEs) present informed perspective on a timely topic that address the challenges facing the public and private sectors. All RAND perspectives undergo rigorous peer review to ensure high standards for research quality and objectivity. Perspective C O R P O R A T I O N Expert insights on a timely policy issue The Dynamics of Syria’s Civil War Brian Michael Jenkins Principal Observations One-third of the population has fled the country or has been displaced internally.
    [Show full text]
  • A Schema of Right-Wing Extremism in the United States
    ICCT Policy Brief October 2019 DOI: 10.19165/2019.2.06 ISSN: 2468-0486 A Schema of Right-Wing Extremism in the United States Author: Sam Jackson Over the past two years, and in the wake of deadly attacks in Charlottesville and Pittsburgh, attention paid to right-wing extremism in the United States has grown. Most of this attention focuses on racist extremism, overlooking other forms of right-wing extremism. This article presents a schema of three main forms of right-wing extremism in the United States in order to more clearly understand the landscape: racist extremism, nativist extremism, and anti-government extremism. Additionally, it describes the two primary subcategories of anti-government extremism: the patriot/militia movement and sovereign citizens. Finally, it discusses whether this schema can be applied to right-wing extremism in non-U.S. contexts. Key words: right-wing extremism, racism, nativism, anti-government A Schema of Right-Wing Extremism in the United States Introduction Since the public emergence of the so-called “alt-right” in the United States—seen most dramatically at the “Unite the Right” rally in Charlottesville, Virginia, in August 2017—there has been increasing attention paid to right-wing extremism (RWE) in the United States, particularly racist right-wing extremism.1 Violent incidents like Robert Bowers’ attack on the Tree of Life synagogue in Pittsburgh, Pennsylvania in October 2018; the mosque shooting in Christchurch, New Zealand in March 2019; and the mass shooting at a Walmart in El Paso, Texas in August
    [Show full text]
  • A Governor's Guide to Homeland Security
    A GOVERNOR’S GUIDE TO HOMELAND SECURITY THE NATIONAL GOVERNORS ASSOCIATION (NGA), founded in 1908, is the instrument through which the nation’s governors collectively influence the development and implementation of national policy and apply creative leadership to state issues. Its members are the governors of the 50 states, three territories and two commonwealths. The NGA Center for Best Practices is the nation’s only dedicated consulting firm for governors and their key policy staff. The NGA Center’s mission is to develop and implement innovative solutions to public policy challenges. Through the staff of the NGA Center, governors and their policy advisors can: • Quickly learn about what works, what doesn’t and what lessons can be learned from other governors grappling with the same problems; • Obtain specialized assistance in designing and implementing new programs or improving the effectiveness of current programs; • Receive up-to-date, comprehensive information about what is happening in other state capitals and in Washington, D.C., so governors are aware of cutting-edge policies; and • Learn about emerging national trends and their implications for states, so governors can prepare to meet future demands. For more information about NGA and the Center for Best Practices, please visit www.nga.org. A GOVERNOR’S GUIDE TO HOMELAND SECURITY NGA Center for Best Practices Homeland Security & Public Safety Division FEBRUARY 2019 Acknowledgements A Governor’s Guide to Homeland Security was produced by the Homeland Security & Public Safety Division of the National Governors Association Center for Best Practices (NGA Center) including Maggie Brunner, Reza Zomorrodian, David Forscey, Michael Garcia, Mary Catherine Ott, and Jeff McLeod.
    [Show full text]
  • Worldwide Attacks Against Dams
    Worldwide Attacks Against Dams A Historical Threat Resource for Owners and Operators 2012 i ii Preface This product is a compilation of information related to incidents that occurred at dams or related infrastructure world-wide. The information was gathered using domestic and foreign open-source resources as well as other relevant analytical products and databases. This document presents a summary of real-world events associated with physical attacks on dams, hydroelectric generation facilities and other related infrastructure between 2001 and 2011. By providing an historical perspective and describing previous attacks, this product provides the reader with a deeper and broader understanding of potential adversarial actions against dams and related infrastructure, thus enhancing the ability of Dams Sector-Specific Agency (SSA) partners to identify, prepare, and protect against potential threats. The U.S. Department of Homeland Security (DHS) National Protection and Programs Directorate’s Office of Infrastructure Protection (NPPD/IP),which serves as the Dams Sector- Specific Agency (SSA), acknowledges the following members of the Dams Sector Threat Analysis Task Group who reviewed and provided input for this document: Jeff Millenor – Bonneville Power Authority John Albert – Dominion Power Eric Martinson – Lower Colorado River Authority Richard Deriso – Federal Bureau of Investigation Larry Hamilton – Federal Bureau of Investigation Marc Plante – Federal Bureau of Investigation Michael Strong – Federal Bureau of Investigation Keith Winter – Federal Bureau of Investigation Linne Willis – Federal Bureau of Investigation Frank Calcagno – Federal Energy Regulatory Commission Robert Parker – Tennessee Valley Authority Michael Bowen – U.S. Department of Homeland Security, NPPD/IP Cassie Gaeto – U.S. Department of Homeland Security, Office of Intelligence and Analysis Mark Calkins – U.S.
    [Show full text]
  • Countering False Information on Social Media in Disasters and Emergencies, March 2018
    Countering False Information on Social Media in Disasters and Emergencies Social Media Working Group for Emergency Services and Disaster Management March 2018 Contents Executive Summary ...................................................................................................................... 2 Introduction ................................................................................................................................... 2 Motivations .................................................................................................................................... 4 Problem ......................................................................................................................................... 5 Causes and Spread ................................................................................................................... 6 Incorrect Information .............................................................................................................. 6 Insufficient Information ........................................................................................................... 7 Opportunistic Disinformation .................................................................................................. 8 Outdated Information ............................................................................................................. 8 Case Studies ............................................................................................................................... 10
    [Show full text]