Difference between revisions of "Working Group on the Verification Tree"
From Responsible Data Wiki
(Created page with "==Goal== ==Next steps== ==Participants==") |
(→Word Bank) |
||
| (25 intermediate revisions by the same user not shown) | |||
| Line 2: | Line 2: | ||
| + | ==Steps of Verification== | ||
| + | 1. Provenance | ||
| + | 2. Verify the source | ||
| + | 3. Locate the video | ||
| + | 4. Verify the date | ||
| + | 5. Final check (real or fake?) | ||
| + | |||
| + | ==Word Bank== | ||
| + | *Verifiability | ||
| + | *Corroboration | ||
| + | *Uncertainty | ||
| + | *Consistent with | ||
| + | *Not consistent with | ||
| + | *Indicates | ||
| + | *Proves | ||
| + | *Shows | ||
| + | *Source | ||
| + | *Implies | ||
| + | *Triangulation | ||
| + | *Source material | ||
| + | *Metadata | ||
| + | *Authenticate | ||
| + | *Integrity | ||
| + | *Forensics | ||
| + | *Big Data | ||
| + | *Structured Data | ||
| + | |||
| + | <strong>Modifier Language </strong> | ||
| + | *May | ||
| + | *Suggests | ||
| + | *Could | ||
| + | |||
| + | ==Tree== | ||
| + | cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg | ||
| + | | banyan tree] | ||
| + | . | . | ||
| + | \ | / | ||
| + | `. \ ' / .' | ||
| + | `. .-*""*-. .' <strong>Use of data to support a claim</strong> | ||
| + | "*-._ /.*" "*.\ _.-*" *conceptualization | ||
| + | : PROOF/ ; ____ *primary source documentation | ||
| + | """"': TRUTH ; *other aspects informing the environment | ||
| + | _.-*" \ `.__.' / "*-._ *structured data/almanac | ||
| + | .' `-.__.-' `. | ||
| + | .' / . \ `. | ||
| + | / | \ | ||
| + | ' | ` | ||
| + | |||
| + | |||
| + | |||
| + | .; <strong>Audio video documentation</strong> | ||
| + | . ; *UniqueID search | ||
| + | . . ;% ;; *Audio scanning and processing (does this exist?) | ||
| + | , , :;% %; | ||
| + | : ; :;%;' ., | ||
| + | ,. %; %; ; %;' ,; | ||
| + | ; ;%; %%; , %; ;%; ,%' <strong>Citizen/social media</strong> | ||
| + | %; %;%; , ; %; ;%; ,%;' *original witness interview | ||
| + | ;%; %; ;%; % ;%; ,%;' *call for input/secondary verification sources | ||
| + | `%;. ;%; %;' `;%%;.%;' *profile users | ||
| + | `:;%. ;%%. %@; %; ;@%;%' | ||
| + | `:%;. :;bd%; %;@%;' | ||
| + | `@%:. :;%. ;@@%;' %; <strong>Internet Traffic Data</strong> | ||
| + | `@%. `;@%. ;@@%; %; *Header info analysis | ||
| + | `@%%. `@%% ;@@%; %; *C2 analysis | ||
| + | ;@%. :@%% %@@%;%; *IP address analysis - WhoIs lookup | ||
| + | %@bd%%%bd%%:; *reverse engineering | ||
| + | #@%%%%%:;; *other technical forensics (sand box, etc) | ||
| + | %@@%%%::; *Shodan/network scanning | ||
| + | *primary source <----------<strong>contextualized</strong> | ||
| + | material %@@@o%;:(.,' | ||
| + | *environment <strong>authenticated/falsified</strong> ------>*chain of custody | ||
| + | *structured `)@@@o%::; *earliest instance | ||
| + | data %@@(o)::; *track source | ||
| + | .%@@@@%::; *triangulation/corroboration | ||
| + | <strong>preserved & secured</strong> *OSINT | ||
| + | relevant data is *interviews | ||
| + | ;%@@@@%%:;;;. *background on reliability of witness/source | ||
| + | ...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be <strong>relevant</strong> | ||
| + | |||
| + | acquired data is <strong>filtered</strong> | ||
| + | |||
| + | anonymous submission | ||
| + | data is <strong>acquired</strong>: social media capture | ||
| + | individual input | ||
| + | |||
| + | source material = original data + meta data | ||
| + | |||
| + | <strong>DIRT</strong> = REALITY | ||
| + | <strong>ROOTS</strong> = INFORMATION ECOSYSTEM | ||
==Next steps== | ==Next steps== | ||
==Participants== | ==Participants== | ||
Latest revision as of 05:48, 22 March 2015
Goal
Steps of Verification
1. Provenance 2. Verify the source 3. Locate the video 4. Verify the date 5. Final check (real or fake?)
Word Bank
- Verifiability
- Corroboration
- Uncertainty
- Consistent with
- Not consistent with
- Indicates
- Proves
- Shows
- Source
- Implies
- Triangulation
- Source material
- Metadata
- Authenticate
- Integrity
- Forensics
- Big Data
- Structured Data
Modifier Language
- May
- Suggests
- Could
Tree
cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg | banyan tree]
. | .
\ | /
`. \ ' / .'
`. .-*""*-. .' Use of data to support a claim
"*-._ /.*" "*.\ _.-*" *conceptualization
: PROOF/ ; ____ *primary source documentation
""""': TRUTH ; *other aspects informing the environment
_.-*" \ `.__.' / "*-._ *structured data/almanac
.' `-.__.-' `.
.' / . \ `.
/ | \
' | `
.; Audio video documentation
. ; *UniqueID search
. . ;% ;; *Audio scanning and processing (does this exist?)
, , :;% %;
: ; :;%;' .,
,. %; %; ; %;' ,;
; ;%; %%; , %; ;%; ,%' Citizen/social media
%; %;%; , ; %; ;%; ,%;' *original witness interview
;%; %; ;%; % ;%; ,%;' *call for input/secondary verification sources
`%;. ;%; %;' `;%%;.%;' *profile users
`:;%. ;%%. %@; %; ;@%;%'
`:%;. :;bd%; %;@%;'
`@%:. :;%. ;@@%;' %; Internet Traffic Data
`@%. `;@%. ;@@%; %; *Header info analysis
`@%%. `@%% ;@@%; %; *C2 analysis
;@%. :@%% %@@%;%; *IP address analysis - WhoIs lookup
%@bd%%%bd%%:; *reverse engineering
#@%%%%%:;; *other technical forensics (sand box, etc)
%@@%%%::; *Shodan/network scanning
*primary source <----------contextualized
material %@@@o%;:(.,'
*environment authenticated/falsified ------>*chain of custody
*structured `)@@@o%::; *earliest instance
data %@@(o)::; *track source
.%@@@@%::; *triangulation/corroboration
preserved & secured *OSINT
relevant data is *interviews
;%@@@@%%:;;;. *background on reliability of witness/source
...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be relevant
acquired data is filtered
anonymous submission
data is acquired: social media capture
individual input
source material = original data + meta data
DIRT = REALITY
ROOTS = INFORMATION ECOSYSTEM