Difference between revisions of "Working Group on the Verification Tree"
From Responsible Data Wiki
(→Tree) |
(→Tree) |
||
| Line 70: | Line 70: | ||
#@%%%%%:;; *other technical forensics (sand box, etc) | #@%%%%%:;; *other technical forensics (sand box, etc) | ||
%@@%%%::; *Shodan/network scanning | %@@%%%::; *Shodan/network scanning | ||
| − | *primary source <-----<strong>contextualization</strong> | + | *primary source <--------<strong>contextualization</strong> |
material %@@@o%;:(.,' | material %@@@o%;:(.,' | ||
*environment <strong>authenticated/falsified</strong> ------>*chain of custody | *environment <strong>authenticated/falsified</strong> ------>*chain of custody | ||
Revision as of 05:40, 22 March 2015
Goal
Steps of Verification
1. Provenance 2. Verify the source 3. Locate the video 4. Verify the date 5. Final check (real or fake?)
Word Bank
- Verifiability
- Corroboration
- Uncertainty
- Consistent with
- Not consistent with
- Indicates
- Proves
- Shows
- Source
- Implies
- Triangulation
- Source material
- Metadata
- Authenticate
- Integrity
- Forensics
- Big Data
Modifier Language
- May
- Suggests
- Could
Tree
cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg | banyan tree]
. | .
\ | /
`. \ ' / .'
`. .-*""*-. .' Use of data to support a claim
"*-._ /.*" "*.\ _.-*" *conceptualization
: PROOF/ ; ____ *primary source documentation
""""': TRUTH ; *other aspects informing the environment
_.-*" \ `.__.' / "*-._ *structured data/almanac
.' `-.__.-' `.
.' / . \ `.
/ | \
' | `
.; Audio video documentation
. ; *UniqueID search
. . ;% ;; *Audio scanning and processing (does this exist?)
, , :;% %;
: ; :;%;' .,
,. %; %; ; %;' ,;
; ;%; %%; , %; ;%; ,%' Citizen/social media
%; %;%; , ; %; ;%; ,%;' *original witness interview
;%; %; ;%; % ;%; ,%;' *call for input/secondary verification sources
`%;. ;%; %;' `;%%;.%;' *profile users
`:;%. ;%%. %@; %; ;@%;%'
`:%;. :;bd%; %;@%;'
`@%:. :;%. ;@@%;' %; Internet Traffic Data
`@%. `;@%. ;@@%; %; *Header info analysis
`@%%. `@%% ;@@%; %; *C2 analysis
;@%. :@%% %@@%;%; *IP address analysis - WhoIs lookup
%@bd%%%bd%%:; *reverse engineering
#@%%%%%:;; *other technical forensics (sand box, etc)
%@@%%%::; *Shodan/network scanning
*primary source <--------contextualization
material %@@@o%;:(.,'
*environment authenticated/falsified ------>*chain of custody
*structured `)@@@o%::; *earliest instance
data %@@(o)::; *track source
.%@@@@%::; *triangulation/corroboration
preserved *OSINT
relevant data is *interviews
;%@@@@%%:;;;. *background on reliability of witness/source
...;%@@@@@%%:;;;;,.. -------filtered data is determined to berelevant
acquired data is filtered
anonymous submission
data is acquired: social media capture
individual input
source material = original data + meta data
DIRT = REALITY
ROOTS = INFORMATION ECOSYSTEM