Working Group on the Verification Tree

From Responsible Data Wiki
Revision as of 05:09, 22 March 2015 by Alixtrot (Talk | contribs)

Jump to: navigation, search

Goal

Steps of Verification

1. Provenance 2. Verify the source 3. Locate the video 4. Verify the date 5. Final check (real or fake?)

Word Bank

  • Verifiability
  • Corroboration
  • Uncertainty
  • Consistent with
  • Not consistent with
  • Indicates
  • Proves
  • Shows
  • Source
  • Implies
  • Triangulation
  • Source material
  • Metadata
  • Authenticate
  • Integrity
  • Forensics
  • Big Data

Modifier Language

  • May
  • Suggests
  • Could

Tree

cycle of verifying data is like a banyan tree

Example.jpg

                      .    |     .     
                       \   |    /      
                   `.   \  '   /   .'  
                     `. .-*""*-. .'    
                 "*-._ /.*"  "*.\ _.-*"
                      : PROOF/   ; ____
                 """"':  TRUTH   ;     
                 _.-*" \ `.__.' / "*-._
                     .' `-.__.-' `.    
                   .'   /   .  \   `.  
                       /    |   \      
                      '     |    `     


                                                        .; Audio video documentation
                                             .         ;     *UniqueID search
                .              .              ;%     ;;      *Audio scanning and processing (does this exist?) 
                  ,           ,                :;%  %;   
                   :         ;                   :;%;'     .,   
          ,.        %;     %;            ;        %;'    ,;
            ;       ;%;  %%;        ,     %;    ;%;    ,%' Citizen/social media
             %;       %;%;      ,  ;       %;  ;%;   ,%;'    *original witness interview
              ;%;      %;        ;%;        % ;%;  ,%;'      *call for input/secondary verification sources
               `%;.     ;%;     %;'         `;%%;.%;'        *profile users
                `:;%.    ;%%. %@;        %; ;@%;%'
                   `:%;.  :;bd%;          %;@%;'
                     `@%:.  :;%.         ;@@%;'  %; Internet Traffic Data
                       `@%.  `;@%.      ;@@%;  %;       *Header info analysis
                         `@%%. `@%%    ;@@%; %;         *C2 analysis
                           ;@%. :@%%  %@@%;%;           *IP address analysis - WhoIs lookup
                             %@bd%%%bd%%:;              *reverse engineering
                               #@%%%%%:;;               *other technical forensics (sand box, etc)
                               %@@%%%::;                *Shodan/network scanning
                               %@@@%(o);  . '         
                               %@@@o%;:(.,'         
                           `.. %@@@o%::;         
                              `)@@@o%::;         
                               %@@(o)::;        
                              .%@@@@%::;         
                              ;%@@@@%::;.          
                             ;%@@@@%%:;;;. 
                         ...;%@@@@@%%:;;;;,.. -------data is relevant
                         
                           data is filtered
                                           anonymous submission
                          data is acquired: social media capture
                                           individual input

Next steps

Participants