Difference between revisions of "Working Group on the Verification Tree"
From Responsible Data Wiki
(→Tree) |
(→Word Bank) |
||
(4 intermediate revisions by the same user not shown) | |||
Line 27: | Line 27: | ||
*Forensics | *Forensics | ||
*Big Data | *Big Data | ||
+ | *Structured Data | ||
<strong>Modifier Language </strong> | <strong>Modifier Language </strong> | ||
Line 70: | Line 71: | ||
#@%%%%%:;; *other technical forensics (sand box, etc) | #@%%%%%:;; *other technical forensics (sand box, etc) | ||
%@@%%%::; *Shodan/network scanning | %@@%%%::; *Shodan/network scanning | ||
− | *primary source <--------<strong> | + | *primary source <----------<strong>contextualized</strong> |
material %@@@o%;:(.,' | material %@@@o%;:(.,' | ||
*environment <strong>authenticated/falsified</strong> ------>*chain of custody | *environment <strong>authenticated/falsified</strong> ------>*chain of custody | ||
Line 76: | Line 77: | ||
data %@@(o)::; *track source | data %@@(o)::; *track source | ||
.%@@@@%::; *triangulation/corroboration | .%@@@@%::; *triangulation/corroboration | ||
− | + | <strong>preserved & secured</strong> *OSINT | |
relevant data is *interviews | relevant data is *interviews | ||
;%@@@@%%:;;;. *background on reliability of witness/source | ;%@@@@%%:;;;. *background on reliability of witness/source | ||
− | ...;%@@@@@%%:;;;;,.. -------filtered data is determined to be<strong>relevant</strong> | + | ...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be <strong>relevant</strong> |
acquired data is <strong>filtered</strong> | acquired data is <strong>filtered</strong> |
Latest revision as of 05:48, 22 March 2015
Goal
Steps of Verification
1. Provenance 2. Verify the source 3. Locate the video 4. Verify the date 5. Final check (real or fake?)
Word Bank
- Verifiability
- Corroboration
- Uncertainty
- Consistent with
- Not consistent with
- Indicates
- Proves
- Shows
- Source
- Implies
- Triangulation
- Source material
- Metadata
- Authenticate
- Integrity
- Forensics
- Big Data
- Structured Data
Modifier Language
- May
- Suggests
- Could
Tree
cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg | banyan tree]
. | . \ | / `. \ ' / .' `. .-*""*-. .' Use of data to support a claim "*-._ /.*" "*.\ _.-*" *conceptualization : PROOF/ ; ____ *primary source documentation """"': TRUTH ; *other aspects informing the environment _.-*" \ `.__.' / "*-._ *structured data/almanac .' `-.__.-' `. .' / . \ `. / | \ ' | `
.; Audio video documentation . ; *UniqueID search . . ;% ;; *Audio scanning and processing (does this exist?) , , :;% %; : ; :;%;' ., ,. %; %; ; %;' ,; ; ;%; %%; , %; ;%; ,%' Citizen/social media %; %;%; , ; %; ;%; ,%;' *original witness interview ;%; %; ;%; % ;%; ,%;' *call for input/secondary verification sources `%;. ;%; %;' `;%%;.%;' *profile users `:;%. ;%%. %@; %; ;@%;%' `:%;. :;bd%; %;@%;' `@%:. :;%. ;@@%;' %; Internet Traffic Data `@%. `;@%. ;@@%; %; *Header info analysis `@%%. `@%% ;@@%; %; *C2 analysis ;@%. :@%% %@@%;%; *IP address analysis - WhoIs lookup %@bd%%%bd%%:; *reverse engineering #@%%%%%:;; *other technical forensics (sand box, etc) %@@%%%::; *Shodan/network scanning *primary source <----------contextualized material %@@@o%;:(.,' *environment authenticated/falsified ------>*chain of custody *structured `)@@@o%::; *earliest instance data %@@(o)::; *track source .%@@@@%::; *triangulation/corroboration preserved & secured *OSINT relevant data is *interviews ;%@@@@%%:;;;. *background on reliability of witness/source ...;%@@@@@%%:;;;;,.. -------> filtered data is determined to be relevant acquired data is filtered
anonymous submission data is acquired: social media capture individual input
source material = original data + meta data
DIRT = REALITY ROOTS = INFORMATION ECOSYSTEM