Difference between revisions of "Working Group on the Verification Tree"
From Responsible Data Wiki
(→Tree) |
(→Tree) |
||
Line 70: | Line 70: | ||
#@%%%%%:;; *other technical forensics (sand box, etc) | #@%%%%%:;; *other technical forensics (sand box, etc) | ||
%@@%%%::; *Shodan/network scanning | %@@%%%::; *Shodan/network scanning | ||
− | *primary source <---<strong>contextualization</strong> | + | *primary source <-----<strong>contextualization</strong> |
material %@@@o%;:(.,' | material %@@@o%;:(.,' | ||
*environment <strong>authenticated/falsified</strong> ------>*chain of custody | *environment <strong>authenticated/falsified</strong> ------>*chain of custody |
Revision as of 05:40, 22 March 2015
Goal
Steps of Verification
1. Provenance 2. Verify the source 3. Locate the video 4. Verify the date 5. Final check (real or fake?)
Word Bank
- Verifiability
- Corroboration
- Uncertainty
- Consistent with
- Not consistent with
- Indicates
- Proves
- Shows
- Source
- Implies
- Triangulation
- Source material
- Metadata
- Authenticate
- Integrity
- Forensics
- Big Data
Modifier Language
- May
- Suggests
- Could
Tree
cycle of verifying data is like a [http://www.publicdomainpictures.net/pictures/10000/velka/1081-1239831807kZ8Q.jpg | banyan tree]
. | . \ | / `. \ ' / .' `. .-*""*-. .' Use of data to support a claim "*-._ /.*" "*.\ _.-*" *conceptualization : PROOF/ ; ____ *primary source documentation """"': TRUTH ; *other aspects informing the environment _.-*" \ `.__.' / "*-._ *structured data/almanac .' `-.__.-' `. .' / . \ `. / | \ ' | `
.; Audio video documentation . ; *UniqueID search . . ;% ;; *Audio scanning and processing (does this exist?) , , :;% %; : ; :;%;' ., ,. %; %; ; %;' ,; ; ;%; %%; , %; ;%; ,%' Citizen/social media %; %;%; , ; %; ;%; ,%;' *original witness interview ;%; %; ;%; % ;%; ,%;' *call for input/secondary verification sources `%;. ;%; %;' `;%%;.%;' *profile users `:;%. ;%%. %@; %; ;@%;%' `:%;. :;bd%; %;@%;' `@%:. :;%. ;@@%;' %; Internet Traffic Data `@%. `;@%. ;@@%; %; *Header info analysis `@%%. `@%% ;@@%; %; *C2 analysis ;@%. :@%% %@@%;%; *IP address analysis - WhoIs lookup %@bd%%%bd%%:; *reverse engineering #@%%%%%:;; *other technical forensics (sand box, etc) %@@%%%::; *Shodan/network scanning *primary source <-----contextualization material %@@@o%;:(.,' *environment authenticated/falsified ------>*chain of custody *structured `)@@@o%::; *earliest instance data %@@(o)::; *track source .%@@@@%::; *triangulation/corroboration preserved *OSINT relevant data is *interviews ;%@@@@%%:;;;. *background on reliability of witness/source ...;%@@@@@%%:;;;;,.. -------filtered data is determined to berelevant acquired data is filtered
anonymous submission data is acquired: social media capture individual input
source material = original data + meta data
DIRT = REALITY ROOTS = INFORMATION ECOSYSTEM