Difference between revisions of "Working Group on the Verification Tree"
From Responsible Data Wiki
(→Word Bank) |
|||
(24 intermediate revisions by the same user not shown) | |||
Line 26: | Line 26: | ||
*Integrity | *Integrity | ||
*Forensics | *Forensics | ||
+ | *Big Data | ||
+ | *Structured Data | ||
<strong>Modifier Language </strong> | <strong>Modifier Language </strong> | ||
Line 31: | Line 33: | ||
*Suggests | *Suggests | ||
*Could | *Could | ||
+ | |||
+ | ==Tree== | ||
+ | cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg | ||
+ | | banyan tree] | ||
+ | . | . | ||
+ | \ | / | ||
+ | `. \ ' / .' | ||
+ | `. .-*""*-. .' <strong>Use of data to support a claim</strong> | ||
+ | "*-._ /.*" "*.\ _.-*" *conceptualization | ||
+ | : PROOF/ ; ____ *primary source documentation | ||
+ | """"': TRUTH ; *other aspects informing the environment | ||
+ | _.-*" \ `.__.' / "*-._ *structured data/almanac | ||
+ | .' `-.__.-' `. | ||
+ | .' / . \ `. | ||
+ | / | \ | ||
+ | ' | ` | ||
+ | |||
+ | |||
+ | |||
+ | .; <strong>Audio video documentation</strong> | ||
+ | . ; *UniqueID search | ||
+ | . . ;% ;; *Audio scanning and processing (does this exist?) | ||
+ | , , :;% %; | ||
+ | : ; :;%;' ., | ||
+ | ,. %; %; ; %;' ,; | ||
+ | ; ;%; %%; , %; ;%; ,%' <strong>Citizen/social media</strong> | ||
+ | %; %;%; , ; %; ;%; ,%;' *original witness interview | ||
+ | ;%; %; ;%; % ;%; ,%;' *call for input/secondary verification sources | ||
+ | `%;. ;%; %;' `;%%;.%;' *profile users | ||
+ | `:;%. ;%%. %@; %; ;@%;%' | ||
+ | `:%;. :;bd%; %;@%;' | ||
+ | `@%:. :;%. ;@@%;' %; <strong>Internet Traffic Data</strong> | ||
+ | `@%. `;@%. ;@@%; %; *Header info analysis | ||
+ | `@%%. `@%% ;@@%; %; *C2 analysis | ||
+ | ;@%. :@%% %@@%;%; *IP address analysis - WhoIs lookup | ||
+ | %@bd%%%bd%%:; *reverse engineering | ||
+ | #@%%%%%:;; *other technical forensics (sand box, etc) | ||
+ | %@@%%%::; *Shodan/network scanning | ||
+ | *primary source <----------<strong>contextualized</strong> | ||
+ | material %@@@o%;:(.,' | ||
+ | *environment <strong>authenticated/falsified</strong> ------>*chain of custody | ||
+ | *structured `)@@@o%::; *earliest instance | ||
+ | data %@@(o)::; *track source | ||
+ | .%@@@@%::; *triangulation/corroboration | ||
+ | <strong>preserved & secured</strong> *OSINT | ||
+ | relevant data is *interviews | ||
+ | ;%@@@@%%:;;;. *background on reliability of witness/source | ||
+ | ...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be <strong>relevant</strong> | ||
+ | |||
+ | acquired data is <strong>filtered</strong> | ||
+ | |||
+ | anonymous submission | ||
+ | data is <strong>acquired</strong>: social media capture | ||
+ | individual input | ||
+ | |||
+ | source material = original data + meta data | ||
+ | |||
+ | <strong>DIRT</strong> = REALITY | ||
+ | <strong>ROOTS</strong> = INFORMATION ECOSYSTEM | ||
==Next steps== | ==Next steps== | ||
==Participants== | ==Participants== |
Latest revision as of 05:48, 22 March 2015
Goal
Steps of Verification
1. Provenance 2. Verify the source 3. Locate the video 4. Verify the date 5. Final check (real or fake?)
Word Bank
- Verifiability
- Corroboration
- Uncertainty
- Consistent with
- Not consistent with
- Indicates
- Proves
- Shows
- Source
- Implies
- Triangulation
- Source material
- Metadata
- Authenticate
- Integrity
- Forensics
- Big Data
- Structured Data
Modifier Language
- May
- Suggests
- Could
Tree
cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg | banyan tree]
. | . \ | / `. \ ' / .' `. .-*""*-. .' Use of data to support a claim "*-._ /.*" "*.\ _.-*" *conceptualization : PROOF/ ; ____ *primary source documentation """"': TRUTH ; *other aspects informing the environment _.-*" \ `.__.' / "*-._ *structured data/almanac .' `-.__.-' `. .' / . \ `. / | \ ' | `
.; Audio video documentation . ; *UniqueID search . . ;% ;; *Audio scanning and processing (does this exist?) , , :;% %; : ; :;%;' ., ,. %; %; ; %;' ,; ; ;%; %%; , %; ;%; ,%' Citizen/social media %; %;%; , ; %; ;%; ,%;' *original witness interview ;%; %; ;%; % ;%; ,%;' *call for input/secondary verification sources `%;. ;%; %;' `;%%;.%;' *profile users `:;%. ;%%. %@; %; ;@%;%' `:%;. :;bd%; %;@%;' `@%:. :;%. ;@@%;' %; Internet Traffic Data `@%. `;@%. ;@@%; %; *Header info analysis `@%%. `@%% ;@@%; %; *C2 analysis ;@%. :@%% %@@%;%; *IP address analysis - WhoIs lookup %@bd%%%bd%%:; *reverse engineering #@%%%%%:;; *other technical forensics (sand box, etc) %@@%%%::; *Shodan/network scanning *primary source <----------contextualized material %@@@o%;:(.,' *environment authenticated/falsified ------>*chain of custody *structured `)@@@o%::; *earliest instance data %@@(o)::; *track source .%@@@@%::; *triangulation/corroboration preserved & secured *OSINT relevant data is *interviews ;%@@@@%%:;;;. *background on reliability of witness/source ...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be relevant acquired data is filtered
anonymous submission data is acquired: social media capture individual input
source material = original data + meta data
DIRT = REALITY ROOTS = INFORMATION ECOSYSTEM