Difference between revisions of "Working Group on the Verification Tree"

From Responsible Data Wiki
Jump to: navigation, search
(Created page with "==Goal== ==Next steps== ==Participants==")
 
(Word Bank)
 
(25 intermediate revisions by the same user not shown)
Line 2: Line 2:
  
  
 +
==Steps of Verification==
 +
1. Provenance
 +
2. Verify the source
 +
3. Locate the video
 +
4. Verify the date
 +
5. Final check (real or fake?)
 +
 +
==Word Bank==
 +
*Verifiability
 +
*Corroboration
 +
*Uncertainty
 +
*Consistent with
 +
*Not consistent with
 +
*Indicates
 +
*Proves
 +
*Shows
 +
*Source
 +
*Implies
 +
*Triangulation
 +
*Source material
 +
*Metadata
 +
*Authenticate
 +
*Integrity
 +
*Forensics
 +
*Big Data
 +
*Structured Data
 +
 +
<strong>Modifier Language </strong>
 +
*May
 +
*Suggests
 +
*Could
 +
 +
==Tree==
 +
cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg
 +
| banyan tree]
 +
                      .    |    .   
 +
                        \  |    /     
 +
                    `.  \  '  /  .' 
 +
                      `. .-*""*-. .'                        <strong>Use of data to support a claim</strong>
 +
                  "*-._ /.*"  "*.\ _.-*"                        *conceptualization
 +
                      : PROOF/  ; ____                            *primary source documentation
 +
                  """"':  TRUTH  ;                                *other aspects informing the environment
 +
                  _.-*" \ `.__.' / "*-._                            *structured data/almanac
 +
                      .' `-.__.-' `.   
 +
                    .'  /  .  \  `. 
 +
                        /    |  \     
 +
                      '    |    `   
 +
 +
 +
 +
                                                        .; <strong>Audio video documentation</strong>
 +
                                              .        ;    *UniqueID search
 +
                .              .              ;%    ;;      *Audio scanning and processing (does this exist?)
 +
                  ,          ,                :;%  %; 
 +
                    :        ;                  :;%;'    ., 
 +
          ,.        %;    %;            ;        %;'    ,;
 +
            ;      ;%;  %%;        ,    %;    ;%;    ,%' <strong>Citizen/social media</strong>
 +
              %;      %;%;      ,  ;      %;  ;%;  ,%;'    *original witness interview
 +
              ;%;      %;        ;%;        % ;%;  ,%;'      *call for input/secondary verification sources
 +
                `%;.    ;%;    %;'        `;%%;.%;'        *profile users
 +
                `:;%.    ;%%. %@;        %; ;@%;%'
 +
                    `:%;.  :;bd%;          %;@%;'
 +
                      `@%:.  :;%.        ;@@%;'  %; <strong>Internet Traffic Data</strong>
 +
                        `@%.  `;@%.      ;@@%;  %;      *Header info analysis
 +
                          `@%%. `@%%    ;@@%; %;        *C2 analysis
 +
                            ;@%. :@%%  %@@%;%;          *IP address analysis - WhoIs lookup
 +
                              %@bd%%%bd%%:;              *reverse engineering
 +
                                #@%%%%%:;;              *other technical forensics (sand box, etc)
 +
                                %@@%%%::;                *Shodan/network scanning
 +
*primary source  <----------<strong>contextualized</strong>       
 +
  material                      %@@@o%;:(.,'       
 +
*environment          <strong>authenticated/falsified</strong> ------>*chain of custody
 +
*structured                  `)@@@o%::;                *earliest instance
 +
  data                          %@@(o)::;                *track source
 +
                              .%@@@@%::;                *triangulation/corroboration
 +
                          <strong>preserved & secured</strong>                *OSINT
 +
                            relevant data is                *interviews
 +
                              ;%@@@@%%:;;;.                *background on reliability of witness/source
 +
                          ...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be <strong>relevant</strong>
 +
                         
 +
                          acquired data is <strong>filtered</strong>
 +
 +
                                            anonymous submission
 +
                          data is <strong>acquired</strong>: social media capture
 +
                                            individual input
 +
 +
                    source material = original data + meta data
 +
 +
                                <strong>DIRT</strong> = REALITY
 +
                        <strong>ROOTS</strong> = INFORMATION ECOSYSTEM
  
 
==Next steps==
 
==Next steps==
  
 
==Participants==
 
==Participants==

Latest revision as of 05:48, 22 March 2015

Goal

Steps of Verification

1. Provenance 2. Verify the source 3. Locate the video 4. Verify the date 5. Final check (real or fake?)

Word Bank

  • Verifiability
  • Corroboration
  • Uncertainty
  • Consistent with
  • Not consistent with
  • Indicates
  • Proves
  • Shows
  • Source
  • Implies
  • Triangulation
  • Source material
  • Metadata
  • Authenticate
  • Integrity
  • Forensics
  • Big Data
  • Structured Data

Modifier Language

  • May
  • Suggests
  • Could

Tree

cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg | banyan tree]

                      .    |     .     
                       \   |    /      
                   `.   \  '   /   .'  
                     `. .-*""*-. .'                         Use of data to support a claim
                 "*-._ /.*"  "*.\ _.-*"                         *conceptualization
                      : PROOF/   ; ____                            *primary source documentation
                 """"':  TRUTH   ;                                 *other aspects informing the environment
                 _.-*" \ `.__.' / "*-._                            *structured data/almanac
                     .' `-.__.-' `.    
                   .'   /   .  \   `.  
                       /    |   \      
                      '     |    `     


                                                        .; Audio video documentation
                                             .         ;     *UniqueID search
                .              .              ;%     ;;      *Audio scanning and processing (does this exist?) 
                  ,           ,                :;%  %;   
                   :         ;                   :;%;'     .,   
          ,.        %;     %;            ;        %;'    ,;
            ;       ;%;  %%;        ,     %;    ;%;    ,%' Citizen/social media
             %;       %;%;      ,  ;       %;  ;%;   ,%;'    *original witness interview
              ;%;      %;        ;%;        % ;%;  ,%;'      *call for input/secondary verification sources
               `%;.     ;%;     %;'         `;%%;.%;'        *profile users
                `:;%.    ;%%. %@;        %; ;@%;%'
                   `:%;.  :;bd%;          %;@%;'
                     `@%:.  :;%.         ;@@%;'  %; Internet Traffic Data
                       `@%.  `;@%.      ;@@%;  %;       *Header info analysis
                         `@%%. `@%%    ;@@%; %;         *C2 analysis
                           ;@%. :@%%  %@@%;%;           *IP address analysis - WhoIs lookup
                             %@bd%%%bd%%:;              *reverse engineering
                               #@%%%%%:;;               *other technical forensics (sand box, etc)
                               %@@%%%::;                *Shodan/network scanning
*primary source  <----------contextualized         
 material                      %@@@o%;:(.,'         
*environment          authenticated/falsified ------>*chain of custody
*structured                   `)@@@o%::;                *earliest instance
 data                          %@@(o)::;                *track source
                              .%@@@@%::;                *triangulation/corroboration
                         preserved & secured                *OSINT
                           relevant data is                *interviews
                             ;%@@@@%%:;;;.                 *background on reliability of witness/source
                         ...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be relevant
                         
                          acquired data is filtered
                                           anonymous submission
                          data is acquired: social media capture
                                           individual input
                   source material = original data + meta data
                               DIRT = REALITY
                        ROOTS = INFORMATION ECOSYSTEM

Next steps

Participants