Этот коммит содержится в:
Sara Terp 2020-04-10 23:28:46 -07:00
родитель 81c995e7ef
Коммит 095c154a42
12 изменённых файлов: 315 добавлений и 0 удалений

Просмотреть файл

@ -0,0 +1,21 @@
ADMIN_HOWTO run a deployment using slack channels
= Lifecycle of a new rumour
A new rumour has started online. Youve seen it yourself, someone has sent you an example of it, youve seen another group tracking it - there are a bunch of ways to spot something new happening. Now what?
Tell people:
* Put a message in #repository, telling people about this new rumour. <Use the words [NEW RUMOR] so its easy to find later?>
Decide whether to start a response:
* Do a quick check that its a rumour. One sighting doesnt make an incident. 15 copies of the same message on Twitter, or 3 friends sending you the same strange DM, and youre probably onto something.
* Then, find someone to be responsible for this. Its probably going to be you, but if you dont have the time to set up a response, ping the #general slack channel and ask for a volunteer. All instructions below here are for whoever takes on this responsibility.
Start a slack channel for the rumor:
* Name it rumor-xxx where xxx is a short description of the rumor, like gaspumps-infected or stafford-act. Make the first message in the channel a description of the rumor
* Put a message into #general and #repository, telling people theres a new rumor channel and asking them to look for data on it
Collect data
Report

Просмотреть файл

@ -0,0 +1,41 @@
ADIN_HOWTO: set up a disinformation deployment
= Youre going to need:
* People
** Leads
** Specialists
** Team to keep the engines running
* Processes
** Data ingests
** Starting investigations
** Ending investigations
** All the human stuff
* Technology
** Storage
** Communications
** Search and analysis tools
* Culture
** Empowerment - and not just as a shiny buzzword
** Code of conduct (if were not embedding into a team that already has one)
* Data
** Feeds in
** Feeds out
= Things to do when you start
* Find 2 people to work with you as leads. Nobody leads a full-on deployment on their own, and everyone has to sleep, or step away, or handle a screaming child/cat/partner/self sometimes. Also Covid - you might get sick too, and should always have a good succession plan: all links and passwords to critical stuff should be with 3 people etc.
* Create a google account, and start a googledrive with it. Add two folders: one for admins, one for the team. If you think youre going to have multiple subteams, add a folder for the team captains. Youre not doing this to enforce hierarchy: youre doing this to limit the number of people who have to see each piece of PII or sensitive material (this is disinformation work - work as though your team will get breached).
* In the admin folder, start a readme. Make sure every admin has the contact details of all the other admins, and any key people on the team.
* Create a slack for the team. Create a private channel for the admins, and a private channel for the team captains (if you have team captains).
* Youve got someone whos asked you to do this, yes? Or a set of organisations or people who can do something with the end products of this deployment? Talk to them about what they want you to do, the formats they want (or can handle) outputs in, any restrictions on how you can work with them/ what areas to cover/ which areas or topics they want to focus on. This will steer your planning.
* Start setting up the technologies you need for the deployment. At a minimum, youll need a way to get results to their users, and a way to store artifacts and information about narratives and incidents. On a small deployment, these could be slack channels.
* Your team will want to tell you about interesting articles etc; create a place to put these, or links to these (again, this might be a slack channel; it might also be a google folder or googledoc).
* Write (or import) advice notes for the team. Hopefully soon CogSecCollab will have a set of these up and available to anyone.

22
ADMIN_HOWTOdecide on Tool Needs Обычный файл
Просмотреть файл

@ -0,0 +1,22 @@
ADMIN_Howto decide on Tool Needs
We will have n people distributed around the world, adding data to our system. That data is:
* Instances of disinformation. Those instances are mostly going to be single examples of text, images, video or audio, with associated metadata, but could be groups of examples. The meta will need to include the date & time that an instance appeared, where it appeared (twitter, facebook, etc), user, group, etc it appeared from/in, hashtags and other information added to the instance (e.g. image descriptions), and a URL to the original instance if possible.
* New disinformation narratives, e.g. “black people cant catch Covid19”.
* New hashtags and other high-level information associated with disinformation incidents.
We would like to take these instances into our system as raw data, and:
* Add them to our datastore
* Triage them
* Where possible, add them to external storage, e.g. archive.org, archive.is so a record is kept if the original data is removed from e.g. social media
We will also have people in our communities who will add datasets to our system. That data is:
* Results of searches for messages, images, video and audio associated with disinformation-related phrases, images, groups etc. Much of this data will be in a format specific to the social media channel it was scraped from, which is often json or csv formatted.
* Datasets provided by external disinformation researchers, relevant to Covid19; e.g. datasets released by social media platforms and other providers.
We would like to take these datasets into our system as raw datasets, and:
* Add them to our datastore
* Convert them to a common format for analysis
After that, we still have analysis, action and dissemination (e.g. making data and results available to journalists and other researchers, in a way that the provenance is clear and the data is reasonably clean but raw data is still accessible to them if they need it)

Просмотреть файл

@ -0,0 +1,96 @@
Covid19 Teams collecting and processing Covid19 disinformation data
This note is here to list all the other teams tracking covid19 disinformation that we know about, our connections to them, whether they have data feeds etc.
<action: add links from Mis/Disinformation Metasearch (Nate)>
= Teams with data
== EU Stratcom
https://euvsdisinfo.eu/disinformation-cases/?offset=0
Tracks and publishes Kremlin and Chinese COVID-19 disinformation
Weve scraped EuVsDisinfo in DKAN
== Peacetechlabs
Site: Peacetechlab.org/coronavirus
== Carnegie Endowment
Site: https://carnegieendowment.org/specialprojects/coronavirus
Weve scraped Carnegies list of narratives
== Alliance for Security Democracy (Hamilton2.0)
Runs the Hamilton2.0 dashboard, monitoring accounts connected to various governments (Russia, China etc) https://securingdemocracy.gmfus.org/hamilton-dashboard/
Covid19 weekly reports on messaging from Russian and Chinese state-backed media / diplomatic actors and analysis pieces are in https://securingdemocracy.gmfus.org/coronavirus-and-information-manipulation
== Kate Starbird group, UW
== UALR COSMOS (Nitin Agarwal group)
List of narratives at http://cosmos.ualr.edu/covid-19
https://arkansasag.gov/media-center/news-releases/rutledge-to-partner-with-ualr-tracking-false-covid-19-websites-and-scams-online/
== Ryerson University misinfowatch
https://covid19misinfo.org/misinfowatch/
A project from the Social Media Lab at Ryerson University to provide reliable information and real-time information visualization dashboards to track false claims related to the spread of the virus from around the web (announcement).
== Correctiv
https://forms.crowdnewsroom.org/corona-fakenews/corona-fakenews/slide0
German Fake News Tracking form
== Centre for Countering Digital Hate
https://twitter.com/Imi_Ahmed/status/1241714991927091201?s=20
info@counterhate.co.uk
CCDH are asking people to send in examples of fakenews around the coronavirus. If you see examples of Covid-19 misinformation & fake cures, esp on Facebook/ WhatsApp, please send URLs/ screenshots to info@counterhate.co.uk
== CTI League
cti-league.com
https://www.reuters.com/article/us-coronavirus-cyber/cybersecurity-experts-come-together-to-fight-coronavirus-related-hacking-idUSKBN21D049?feedType=RSS&feedName=technologyNews
= Processing teams
== WHO EPI-WIN
https://www.who.int/docs/default-source/coronaviruse/risk-comms-updates/update-14--epi-win-covid19.pdf?sfvrsn=5809b632_2
The 2019 corona virus disease (COVID-19) epidemic and response has been accompanied by a massive infodemic - an over-abundance of information – some accurate and some not – that makes it hard for people to find trustworthy sources and reliable guidance when they need it. Due to the high demand for timely and trustworthy information about COVID-19, the World Health Organization (WHO) has established the Information Network for Epidemics (EPI-WIN) that unites technical and social media teams working closely to disseminate and amplify the evidence-based information about COVID-19, and to track and respond to misinformation, myths and rumours.
https://who.zoom.us/webinar/register/WN_ldu0GKGhTsq6m83FYZkyKg lists Tim Nguyen (nguyent@who.int) and Tina Purnat (purnatt@who.int)
COVID-19 website: https://www.who.int/health-topics/coronavirus
WHO Travel Advice:https://www.who.int/ith/en/
Email: EPI-WIN@who.int
Website:www.EPI-WIN.com
== Bellingcat
https://www.bellingcat.com/tag/covid19/
https://www.bellingcat.com/news/2020/03/13/monitoring-and-debunking-covid-19-panic-the-haarlem-aldi-hoax/
== NATO Brussels
== NATO Riga
== Canada government (forget which group)
== CMU
== Princeton ESOC
Works with Microsoft. Collects data on teams working on Covid19 misinformation
https://esoc.princeton.edu/files/covid-019-disinformation-data
Resources list (useful for fact-checking): https://drive.google.com/file/d/1y6W3fw46R40dQM1wyNFofIsZrlPnq_or/view
= Fact-Checking teams
== Agence France Presse
https://factcheck.afp.com/busting-coronavirus-myths
(Action: 287 myths to scrape...)

50
Covid19 data sources Обычный файл
Просмотреть файл

@ -0,0 +1,50 @@
Covid19 data sources
These are the data sources that we know about for Covid19 disinformation.
= Disinformation Datasets
== Wikipedia list of rumours
https://en.wikipedia.org/wiki/Misinformation_related_to_the_2019%E2%80%9320_coronavirus_pandemic
= Disinformation Datastreams
== OSOME decahose
https://osome.iuni.iu.edu/tools/
== Ryerson University Covid19 misinfo portal
Covid19misinfo.org
“The COVID19MisInfo Portal is a rapid response project of the Ryerson Social Media Lab at Ted Rogers School of Management. The project is funded by the Government of Canada via the Canadian Institutes of Health Research (CIHR). The aim of this project is two-fold: (1) put a spotlight on COVID-19 related misinformation and (2) to provide Canadians with timely and actionable information that we all can use to protect ourselves and our communities. Our team of computational social scientists, communications professionals and developers are hard at work curating trusted information about COVID-19 and developing additional real-time information visualization dashboards to keep track of false claims related to COVID-19 from around the web.”
== Uni Arkansas Little Rock COSMOS
Nitin Agarwals group - has place to submit new data
http://cosmos.ualr.edu/misinformation
== Hamilton2.0
Hamilton 2.0 Dashboard
== WHO myths list
Narratives list
https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public/myth-busters
== Carnegie Endowment IDEAS
Narratives list
EuVsDisinfo Covid19/ Coronavirus tagged data
= Information datasets
(as in where we look for the true stuff)
== Snopes.com
== WHO EPI-WIN
Produces dataset: https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public/myth-busters
COVID-19 website: https://www.who.int/health-topics/coronavirus
WHO Travel Advice:https://www.who.int/ith/en/
Website:www.EPI-WIN.com
== Coronavirus Tech Handbook
“Fighting Misinformation and Disinformation Trust, Verification, Fact Checking & Beyond”
https://coronavirustechhandbook.com/misinformation

15
Covid19 disinformation funding sources Обычный файл
Просмотреть файл

@ -0,0 +1,15 @@
C19 disinformation funding sources
== NSF
https://www.nsf.gov/funding/
NSF 20-052 Dear Colleague Letter on the Coronavirus Disease 2019 (COVID-19)
“In addition, we invite researchers to use the Rapid Response Research (RAPID) funding mechanism, which allows NSF to receive and review proposals having a severe urgency with regard to availability of or access to data, facilities or specialized equipment as well as quick-response research on natural or anthropogenic disasters and similar unanticipated events. Requests for RAPID proposals may be for up to $200K and up to one year in duration. Well-justified proposals that exceed these limits may be entertained.”
https://www.nsf.gov/pubs/2020/nsf20052/nsf20052.pdf
== Poynter
International Fact-checking network@Poynter
🔗https://ifcn.submittable.com/submit
Grant for fact-checking projects

9
Covid19 disinformation reading list Обычный файл
Просмотреть файл

@ -0,0 +1,9 @@
C19 disinformation reading list
= Countries
== China
https://www.realclearinvestigations.com/articles/2020/03/30/unpacking_chinas_viral_propaganda_war_122988.html

7
LIST Disinformation reading Обычный файл
Просмотреть файл

@ -0,0 +1,7 @@
LIST: Disinformation reading
= Lists of lists
== Awesome misinformation
https://github.com/bodacea/misinfolinks

8
LIST Disinformation teams Обычный файл
Просмотреть файл

@ -0,0 +1,8 @@
LIST Disinformation teams
= Active teams
== Indiana University OSoMe
OSoMe (awe•some) is a joint project of the Network Science Institute (IUNI), the Center for Complex Networks and Systems Research (CNetS) at SICE, and the Media School at Indiana University. OSoMe unites data scientists and journalists in studying the role of media and technology in society, and curbing the spread of misinformation online and the manipulation of social media. Here we highlight tools, findings, publications, and resources.

34
LIST disinformation tools Обычный файл
Просмотреть файл

@ -0,0 +1,34 @@
LIST disinformation tools
= Storage
== DKAN
- data.co https://data.cogsec-collab.org/ (example DKAN: https://data.humdata.org/)
= Collection
==Ushahidi
https://chvolunteer.ushahidi.io/ / http://PPENeeds.com - USHAHIDI instance for Coordinating PPE
== Disinfo Reports
== Requests for project
= Analysis
== Bellingcat tools
https://www.bellingcat.com/resources/2020/03/27/investigating-coronavirus-fakes-and-disinfo-here-are-some-tools-for-you/
==Osome tools
“OSoMe (awe•some) is a joint project of the Network Science Institute (IUNI), the Center for Complex Networks and Systems Research (CNetS) at SICE, and the Media School at Indiana University. OSoMe unites data scientists and journalists in studying the role of media and technology in society, and curbing the spread of misinformation online and the manipulation of social media. Here we highlight tools, findings, publications, and resources.“”https://osome.iuni.iu.edu/”
= Dissemination
= LINK DUMP (for sorting later)
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material

Просмотреть файл

@ -1,2 +1,5 @@
# documentation
Where we write stuff about writing stuff
Advice notes and useful lists for people running and working on disinformation deployments.

Просмотреть файл

@ -0,0 +1,9 @@
TECH_HOWTO Save an audio file from Facebook Messenger
If you need to do this, here's the workaround trick:
* Using Chrome browser (but NOT on mobile)
* Access facebook via m.facebook.com
* Then click on the messenger icon
* Go to the chat that has the audio
* Right mouseclick on the (...) at the end of the message and you'll have the option to "Save Audio As"