Difference between revisions of "Working Group on the Verification Tree"

From Responsible Data Wiki
Jump to: navigation, search
(Tree)
(Word Bank)
 
(5 intermediate revisions by the same user not shown)
Line 27: Line 27:
 
*Forensics
 
*Forensics
 
*Big Data
 
*Big Data
 +
*Structured Data
  
 
<strong>Modifier Language </strong>
 
<strong>Modifier Language </strong>
Line 70: Line 71:
 
                                 #@%%%%%:;;              *other technical forensics (sand box, etc)
 
                                 #@%%%%%:;;              *other technical forensics (sand box, etc)
 
                                 %@@%%%::;                *Shodan/network scanning
 
                                 %@@%%%::;                *Shodan/network scanning
  *primary source  <-----<strong>contextualization</strong>         
+
  *primary source  <----------<strong>contextualized</strong>         
 
   material                      %@@@o%;:(.,'         
 
   material                      %@@@o%;:(.,'         
 
  *environment          <strong>authenticated/falsified</strong> ------>*chain of custody
 
  *environment          <strong>authenticated/falsified</strong> ------>*chain of custody
Line 76: Line 77:
 
   data                          %@@(o)::;                *track source
 
   data                          %@@(o)::;                *track source
 
                               .%@@@@%::;                *triangulation/corroboration
 
                               .%@@@@%::;                *triangulation/corroboration
                                <strong>preserved</strong>                *OSINT
+
                          <strong>preserved & secured</strong>                *OSINT
 
                             relevant data is                *interviews
 
                             relevant data is                *interviews
 
                               ;%@@@@%%:;;;.                *background on reliability of witness/source
 
                               ;%@@@@%%:;;;.                *background on reliability of witness/source
                           ...;%@@@@@%%:;;;;,.. -------filtered data is determined to be<strong>relevant</strong>
+
                           ...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be <strong>relevant</strong>
 
                            
 
                            
 
                           acquired data is <strong>filtered</strong>
 
                           acquired data is <strong>filtered</strong>

Latest revision as of 05:48, 22 March 2015

Goal

Steps of Verification

1. Provenance 2. Verify the source 3. Locate the video 4. Verify the date 5. Final check (real or fake?)

Word Bank

  • Verifiability
  • Corroboration
  • Uncertainty
  • Consistent with
  • Not consistent with
  • Indicates
  • Proves
  • Shows
  • Source
  • Implies
  • Triangulation
  • Source material
  • Metadata
  • Authenticate
  • Integrity
  • Forensics
  • Big Data
  • Structured Data

Modifier Language

  • May
  • Suggests
  • Could

Tree

cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg | banyan tree]

                      .    |     .     
                       \   |    /      
                   `.   \  '   /   .'  
                     `. .-*""*-. .'                         Use of data to support a claim
                 "*-._ /.*"  "*.\ _.-*"                         *conceptualization
                      : PROOF/   ; ____                            *primary source documentation
                 """"':  TRUTH   ;                                 *other aspects informing the environment
                 _.-*" \ `.__.' / "*-._                            *structured data/almanac
                     .' `-.__.-' `.    
                   .'   /   .  \   `.  
                       /    |   \      
                      '     |    `     


                                                        .; Audio video documentation
                                             .         ;     *UniqueID search
                .              .              ;%     ;;      *Audio scanning and processing (does this exist?) 
                  ,           ,                :;%  %;   
                   :         ;                   :;%;'     .,   
          ,.        %;     %;            ;        %;'    ,;
            ;       ;%;  %%;        ,     %;    ;%;    ,%' Citizen/social media
             %;       %;%;      ,  ;       %;  ;%;   ,%;'    *original witness interview
              ;%;      %;        ;%;        % ;%;  ,%;'      *call for input/secondary verification sources
               `%;.     ;%;     %;'         `;%%;.%;'        *profile users
                `:;%.    ;%%. %@;        %; ;@%;%'
                   `:%;.  :;bd%;          %;@%;'
                     `@%:.  :;%.         ;@@%;'  %; Internet Traffic Data
                       `@%.  `;@%.      ;@@%;  %;       *Header info analysis
                         `@%%. `@%%    ;@@%; %;         *C2 analysis
                           ;@%. :@%%  %@@%;%;           *IP address analysis - WhoIs lookup
                             %@bd%%%bd%%:;              *reverse engineering
                               #@%%%%%:;;               *other technical forensics (sand box, etc)
                               %@@%%%::;                *Shodan/network scanning
*primary source  <----------contextualized         
 material                      %@@@o%;:(.,'         
*environment          authenticated/falsified ------>*chain of custody
*structured                   `)@@@o%::;                *earliest instance
 data                          %@@(o)::;                *track source
                              .%@@@@%::;                *triangulation/corroboration
                         preserved & secured                *OSINT
                           relevant data is                *interviews
                             ;%@@@@%%:;;;.                 *background on reliability of witness/source
                         ...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be relevant
                         
                          acquired data is filtered
                                           anonymous submission
                          data is acquired: social media capture
                                           individual input
                   source material = original data + meta data
                               DIRT = REALITY
                        ROOTS = INFORMATION ECOSYSTEM

Next steps

Participants