Working Group on the Verification Tree
From Responsible Data Wiki
Goal
Steps of Verification
1. Provenance 2. Verify the source 3. Locate the video 4. Verify the date 5. Final check (real or fake?)
Word Bank
- Verifiability
- Corroboration
- Uncertainty
- Consistent with
- Not consistent with
- Indicates
- Proves
- Shows
- Source
- Implies
- Triangulation
- Source material
- Metadata
- Authenticate
- Integrity
- Forensics
- Big Data
Modifier Language
- May
- Suggests
- Could
Tree
cycle of verifying data is like a banyan tree
. | . \ | / `. \ ' / .' `. .-*""*-. .' "*-._ /.*" "*.\ _.-*" : PROOF/ ; ____ """"': TRUTH ; _.-*" \ `.__.' / "*-._ .' `-.__.-' `. .' / . \ `. / | \ ' | `
.; Audio video documentation . ; *UniqueID search . . ;% ;; *Audio scanning and processing (does this exist?) , , :;% %; : ; :;%;' ., ,. %; %; ; %;' ,; ; ;%; %%; , %; ;%; ,%' Citizen/social media %; %;%; , ; %; ;%; ,%;' *original witness interview ;%; %; ;%; % ;%; ,%;' *call for input/secondary verification sources `%;. ;%; %;' `;%%;.%;' *profile users `:;%. ;%%. %@; %; ;@%;%' `:%;. :;bd%; %;@%;' `@%:. :;%. ;@@%;' %; Internet Traffic Data `@%. `;@%. ;@@%; %; *Header info analysis `@%%. `@%% ;@@%; %; *C2 analysis ;@%. :@%% %@@%;%; *IP address analysis - WhoIs lookup %@bd%%%bd%%:; *reverse engineering #@%%%%%:;; *other technical forensics (sand box, etc) %@@%%%::; *Shodan/network scanning %@@@%(o); . ' %@@@o%;:(.,' `.. %@@@o%::; `)@@@o%::; %@@(o)::; .%@@@@%::; ;%@@@@%::;. ;%@@@@%%:;;;. ...;%@@@@@%%:;;;;,.. -------data is relevant data is filtered
anonymous submission data is acquired: social media capture individual input