added starter docs
Этот коммит содержится в:
родитель
81c995e7ef
Коммит
095c154a42
21
ADMIN_HOWTO run a deployment using slack channels
Обычный файл
21
ADMIN_HOWTO run a deployment using slack channels
Обычный файл
@ -0,0 +1,21 @@
|
||||
ADMIN_HOWTO run a deployment using slack channels
|
||||
|
||||
= Lifecycle of a new rumour
|
||||
|
||||
A new rumour has started online. You’ve seen it yourself, someone has sent you an example of it, you’ve seen another group tracking it - there are a bunch of ways to spot something new happening. Now what?
|
||||
|
||||
Tell people:
|
||||
* Put a message in #repository, telling people about this new rumour. <Use the words [NEW RUMOR] so it’s easy to find later?>
|
||||
|
||||
Decide whether to start a response:
|
||||
* Do a quick check that it’s a rumour. One sighting doesn’t make an incident. 15 copies of the same message on Twitter, or 3 friends sending you the same strange DM, and you’re probably onto something.
|
||||
* Then, find someone to be responsible for this. It’s probably going to be you, but if you don’t have the time to set up a response, ping the #general slack channel and ask for a volunteer. All instructions below here are for whoever takes on this responsibility.
|
||||
|
||||
Start a slack channel for the rumor:
|
||||
* Name it rumor-xxx where xxx is a short description of the rumor, like gaspumps-infected or stafford-act. Make the first message in the channel a description of the rumor
|
||||
* Put a message into #general and #repository, telling people there’s a new rumor channel and asking them to look for data on it
|
||||
|
||||
Collect data
|
||||
|
||||
|
||||
Report
|
||||
41
ADMIN_HOWTO set up a disinformation deployment
Обычный файл
41
ADMIN_HOWTO set up a disinformation deployment
Обычный файл
@ -0,0 +1,41 @@
|
||||
ADIN_HOWTO: set up a disinformation deployment
|
||||
|
||||
= You’re going to need:
|
||||
|
||||
* People
|
||||
** Leads
|
||||
** Specialists
|
||||
** Team to keep the engines running
|
||||
|
||||
* Processes
|
||||
** Data ingests
|
||||
** Starting investigations
|
||||
** Ending investigations
|
||||
** All the human stuff
|
||||
|
||||
* Technology
|
||||
** Storage
|
||||
** Communications
|
||||
** Search and analysis tools
|
||||
|
||||
* Culture
|
||||
** Empowerment - and not just as a shiny buzzword
|
||||
** Code of conduct (if we’re not embedding into a team that already has one)
|
||||
|
||||
* Data
|
||||
** Feeds in
|
||||
** Feeds out
|
||||
|
||||
= Things to do when you start
|
||||
|
||||
* Find 2 people to work with you as leads. Nobody leads a full-on deployment on their own, and everyone has to sleep, or step away, or handle a screaming child/cat/partner/self sometimes. Also Covid - you might get sick too, and should always have a good succession plan: all links and passwords to critical stuff should be with 3 people etc.
|
||||
* Create a google account, and start a googledrive with it. Add two folders: one for admins, one for the team. If you think you’re going to have multiple subteams, add a folder for the team captains. You’re not doing this to enforce hierarchy: you’re doing this to limit the number of people who have to see each piece of PII or sensitive material (this is disinformation work - work as though your team will get breached).
|
||||
* In the admin folder, start a readme. Make sure every admin has the contact details of all the other admins, and any key people on the team.
|
||||
* Create a slack for the team. Create a private channel for the admins, and a private channel for the team captains (if you have team captains).
|
||||
* You’ve got someone who’s asked you to do this, yes? Or a set of organisations or people who can do something with the end products of this deployment? Talk to them about what they want you to do, the formats they want (or can handle) outputs in, any restrictions on how you can work with them/ what areas to cover/ which areas or topics they want to focus on. This will steer your planning.
|
||||
* Start setting up the technologies you need for the deployment. At a minimum, you’ll need a way to get results to their users, and a way to store artifacts and information about narratives and incidents. On a small deployment, these could be slack channels.
|
||||
* Your team will want to tell you about interesting articles etc; create a place to put these, or links to these (again, this might be a slack channel; it might also be a google folder or googledoc).
|
||||
* Write (or import) advice notes for the team. Hopefully soon CogSecCollab will have a set of these up and available to anyone.
|
||||
|
||||
|
||||
|
||||
22
ADMIN_HOWTOdecide on Tool Needs
Обычный файл
22
ADMIN_HOWTOdecide on Tool Needs
Обычный файл
@ -0,0 +1,22 @@
|
||||
ADMIN_Howto decide on Tool Needs
|
||||
|
||||
We will have n people distributed around the world, adding data to our system. That data is:
|
||||
|
||||
* Instances of disinformation. Those instances are mostly going to be single examples of text, images, video or audio, with associated metadata, but could be groups of examples. The meta will need to include the date & time that an instance appeared, where it appeared (twitter, facebook, etc), user, group, etc it appeared from/in, hashtags and other information added to the instance (e.g. image descriptions), and a URL to the original instance if possible.
|
||||
* New disinformation narratives, e.g. “black people can’t catch Covid19”.
|
||||
* New hashtags and other high-level information associated with disinformation incidents.
|
||||
|
||||
We would like to take these instances into our system as raw data, and:
|
||||
* Add them to our datastore
|
||||
* Triage them
|
||||
* Where possible, add them to external storage, e.g. archive.org, archive.is so a record is kept if the original data is removed from e.g. social media
|
||||
|
||||
We will also have people in our communities who will add datasets to our system. That data is:
|
||||
* Results of searches for messages, images, video and audio associated with disinformation-related phrases, images, groups etc. Much of this data will be in a format specific to the social media channel it was scraped from, which is often json or csv formatted.
|
||||
* Datasets provided by external disinformation researchers, relevant to Covid19; e.g. datasets released by social media platforms and other providers.
|
||||
|
||||
We would like to take these datasets into our system as raw datasets, and:
|
||||
* Add them to our datastore
|
||||
* Convert them to a common format for analysis
|
||||
|
||||
After that, we still have analysis, action and dissemination (e.g. making data and results available to journalists and other researchers, in a way that the provenance is clear and the data is reasonably clean but raw data is still accessible to them if they need it)
|
||||
96
Covid19 Teams collecting and processing Covid19 di
Обычный файл
96
Covid19 Teams collecting and processing Covid19 di
Обычный файл
@ -0,0 +1,96 @@
|
||||
Covid19 Teams collecting and processing Covid19 disinformation data
|
||||
|
||||
This note is here to list all the other teams tracking covid19 disinformation that we know about, our connections to them, whether they have data feeds etc.
|
||||
|
||||
<action: add links from Mis/Disinformation Metasearch (Nate)>
|
||||
|
||||
= Teams with data
|
||||
|
||||
== EU Stratcom
|
||||
https://euvsdisinfo.eu/disinformation-cases/?offset=0
|
||||
Tracks and publishes Kremlin and Chinese COVID-19 disinformation
|
||||
We’ve scraped EuVsDisinfo in DKAN
|
||||
|
||||
== Peacetechlabs
|
||||
Site: Peacetechlab.org/coronavirus
|
||||
|
||||
== Carnegie Endowment
|
||||
Site: https://carnegieendowment.org/specialprojects/coronavirus
|
||||
|
||||
We’ve scraped Carnegie’s list of narratives
|
||||
|
||||
== Alliance for Security Democracy (Hamilton2.0)
|
||||
|
||||
Runs the Hamilton2.0 dashboard, monitoring accounts connected to various governments (Russia, China etc) https://securingdemocracy.gmfus.org/hamilton-dashboard/
|
||||
|
||||
Covid19 weekly reports on messaging from Russian and Chinese state-backed media / diplomatic actors and analysis pieces are in https://securingdemocracy.gmfus.org/coronavirus-and-information-manipulation
|
||||
|
||||
== Kate Starbird group, UW
|
||||
|
||||
== UALR COSMOS (Nitin Agarwal group)
|
||||
List of narratives at http://cosmos.ualr.edu/covid-19
|
||||
https://arkansasag.gov/media-center/news-releases/rutledge-to-partner-with-ualr-tracking-false-covid-19-websites-and-scams-online/
|
||||
|
||||
== Ryerson University misinfowatch
|
||||
https://covid19misinfo.org/misinfowatch/
|
||||
|
||||
A project from the Social Media Lab at Ryerson University to provide reliable information and real-time information visualization dashboards to track false claims related to the spread of the virus from around the web (announcement).
|
||||
|
||||
== Correctiv
|
||||
https://forms.crowdnewsroom.org/corona-fakenews/corona-fakenews/slide0
|
||||
German Fake News Tracking form
|
||||
|
||||
== Centre for Countering Digital Hate
|
||||
https://twitter.com/Imi_Ahmed/status/1241714991927091201?s=20
|
||||
info@counterhate.co.uk
|
||||
CCDH are asking people to send in examples of fakenews around the coronavirus. If you see examples of Covid-19 misinformation & fake cures, esp on Facebook/ WhatsApp, please send URLs/ screenshots to info@counterhate.co.uk
|
||||
|
||||
== CTI League
|
||||
cti-league.com
|
||||
https://www.reuters.com/article/us-coronavirus-cyber/cybersecurity-experts-come-together-to-fight-coronavirus-related-hacking-idUSKBN21D049?feedType=RSS&feedName=technologyNews
|
||||
|
||||
|
||||
= Processing teams
|
||||
|
||||
== WHO EPI-WIN
|
||||
|
||||
https://www.who.int/docs/default-source/coronaviruse/risk-comms-updates/update-14--epi-win-covid19.pdf?sfvrsn=5809b632_2
|
||||
|
||||
The 2019 corona virus disease (COVID-19) epidemic and response has been accompanied by a massive ‘infodemic’ - an over-abundance of information – some accurate and some not – that makes it hard for people to find trustworthy sources and reliable guidance when they need it. Due to the high demand for timely and trustworthy information about COVID-19, the World Health Organization (WHO) has established the Information Network for Epidemics (EPI-WIN) that unites technical and social media teams working closely to disseminate and amplify the evidence-based information about COVID-19, and to track and respond to misinformation, myths and rumours.
|
||||
|
||||
https://who.zoom.us/webinar/register/WN_ldu0GKGhTsq6m83FYZkyKg lists Tim Nguyen (nguyent@who.int) and Tina Purnat (purnatt@who.int)
|
||||
|
||||
COVID-19 website: https://www.who.int/health-topics/coronavirus
|
||||
WHO Travel Advice:https://www.who.int/ith/en/
|
||||
Email: EPI-WIN@who.int
|
||||
Website:www.EPI-WIN.com
|
||||
|
||||
== Bellingcat
|
||||
|
||||
https://www.bellingcat.com/tag/covid19/
|
||||
https://www.bellingcat.com/news/2020/03/13/monitoring-and-debunking-covid-19-panic-the-haarlem-aldi-hoax/
|
||||
|
||||
== NATO Brussels
|
||||
|
||||
== NATO Riga
|
||||
|
||||
== Canada government (forget which group)
|
||||
|
||||
== CMU
|
||||
|
||||
== Princeton ESOC
|
||||
|
||||
Works with Microsoft. Collects data on teams working on Covid19 misinformation
|
||||
https://esoc.princeton.edu/files/covid-019-disinformation-data
|
||||
|
||||
Resources list (useful for fact-checking): https://drive.google.com/file/d/1y6W3fw46R40dQM1wyNFofIsZrlPnq_or/view
|
||||
|
||||
|
||||
= Fact-Checking teams
|
||||
|
||||
== Agence France Presse
|
||||
|
||||
https://factcheck.afp.com/busting-coronavirus-myths
|
||||
(Action: 287 myths to scrape...)
|
||||
|
||||
|
||||
50
Covid19 data sources
Обычный файл
50
Covid19 data sources
Обычный файл
@ -0,0 +1,50 @@
|
||||
Covid19 data sources
|
||||
These are the data sources that we know about for Covid19 disinformation.
|
||||
|
||||
= Disinformation Datasets
|
||||
|
||||
== Wikipedia list of rumours
|
||||
|
||||
https://en.wikipedia.org/wiki/Misinformation_related_to_the_2019%E2%80%9320_coronavirus_pandemic
|
||||
|
||||
= Disinformation Datastreams
|
||||
|
||||
== OSOME decahose
|
||||
https://osome.iuni.iu.edu/tools/
|
||||
|
||||
== Ryerson University Covid19 misinfo portal
|
||||
Covid19misinfo.org
|
||||
|
||||
“The COVID19MisInfo Portal is a rapid response project of the Ryerson Social Media Lab at Ted Rogers School of Management. The project is funded by the Government of Canada via the Canadian Institutes of Health Research (CIHR). The aim of this project is two-fold: (1) put a spotlight on COVID-19 related misinformation and (2) to provide Canadians with timely and actionable information that we all can use to protect ourselves and our communities. Our team of computational social scientists, communications professionals and developers are hard at work curating trusted information about COVID-19 and developing additional real-time information visualization dashboards to keep track of false claims related to COVID-19 from around the web.”
|
||||
|
||||
== Uni Arkansas Little Rock COSMOS
|
||||
Nitin Agarwal’s group - has place to submit new data
|
||||
http://cosmos.ualr.edu/misinformation
|
||||
|
||||
== Hamilton2.0
|
||||
Hamilton 2.0 Dashboard
|
||||
|
||||
== WHO myths list
|
||||
Narratives list
|
||||
https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public/myth-busters
|
||||
|
||||
== Carnegie Endowment IDEAS
|
||||
Narratives list
|
||||
EuVsDisinfo Covid19/ Coronavirus tagged data
|
||||
|
||||
= Information datasets
|
||||
(as in where we look for the true stuff)
|
||||
|
||||
== Snopes.com
|
||||
|
||||
== WHO EPI-WIN
|
||||
Produces dataset: https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public/myth-busters
|
||||
COVID-19 website: https://www.who.int/health-topics/coronavirus
|
||||
WHO Travel Advice:https://www.who.int/ith/en/
|
||||
Website:www.EPI-WIN.com
|
||||
|
||||
== Coronavirus Tech Handbook
|
||||
|
||||
“Fighting Misinformation and Disinformation Trust, Verification, Fact Checking & Beyond”
|
||||
https://coronavirustechhandbook.com/misinformation
|
||||
|
||||
15
Covid19 disinformation funding sources
Обычный файл
15
Covid19 disinformation funding sources
Обычный файл
@ -0,0 +1,15 @@
|
||||
C19 disinformation funding sources
|
||||
|
||||
== NSF
|
||||
|
||||
https://www.nsf.gov/funding/
|
||||
NSF 20-052 Dear Colleague Letter on the Coronavirus Disease 2019 (COVID-19)
|
||||
“In addition, we invite researchers to use the Rapid Response Research (RAPID) funding mechanism, which allows NSF to receive and review proposals having a severe urgency with regard to availability of or access to data, facilities or specialized equipment as well as quick-response research on natural or anthropogenic disasters and similar unanticipated events. Requests for RAPID proposals may be for up to $200K and up to one year in duration. Well-justified proposals that exceed these limits may be entertained.”
|
||||
https://www.nsf.gov/pubs/2020/nsf20052/nsf20052.pdf
|
||||
|
||||
== Poynter
|
||||
|
||||
International Fact-checking network@Poynter
|
||||
🔗https://ifcn.submittable.com/submit
|
||||
Grant for fact-checking projects
|
||||
|
||||
9
Covid19 disinformation reading list
Обычный файл
9
Covid19 disinformation reading list
Обычный файл
@ -0,0 +1,9 @@
|
||||
C19 disinformation reading list
|
||||
|
||||
= Countries
|
||||
|
||||
== China
|
||||
|
||||
https://www.realclearinvestigations.com/articles/2020/03/30/unpacking_chinas_viral_propaganda_war_122988.html
|
||||
|
||||
|
||||
7
LIST Disinformation reading
Обычный файл
7
LIST Disinformation reading
Обычный файл
@ -0,0 +1,7 @@
|
||||
LIST: Disinformation reading
|
||||
= Lists of lists
|
||||
|
||||
== Awesome misinformation
|
||||
|
||||
https://github.com/bodacea/misinfolinks
|
||||
|
||||
8
LIST Disinformation teams
Обычный файл
8
LIST Disinformation teams
Обычный файл
@ -0,0 +1,8 @@
|
||||
LIST Disinformation teams
|
||||
|
||||
= Active teams
|
||||
|
||||
== Indiana University OSoMe
|
||||
|
||||
OSoMe (awe•some) is a joint project of the Network Science Institute (IUNI), the Center for Complex Networks and Systems Research (CNetS) at SICE, and the Media School at Indiana University. OSoMe unites data scientists and journalists in studying the role of media and technology in society, and curbing the spread of misinformation online and the manipulation of social media. Here we highlight tools, findings, publications, and resources.
|
||||
|
||||
34
LIST disinformation tools
Обычный файл
34
LIST disinformation tools
Обычный файл
@ -0,0 +1,34 @@
|
||||
LIST disinformation tools
|
||||
|
||||
= Storage
|
||||
|
||||
== DKAN
|
||||
- data.co https://data.cogsec-collab.org/ (example DKAN: https://data.humdata.org/)
|
||||
|
||||
= Collection
|
||||
==Ushahidi
|
||||
https://chvolunteer.ushahidi.io/ / http://PPENeeds.com - USHAHIDI instance for Coordinating PPE
|
||||
|
||||
== Disinfo Reports
|
||||
== Requests for project
|
||||
|
||||
|
||||
= Analysis
|
||||
|
||||
== Bellingcat tools
|
||||
https://www.bellingcat.com/resources/2020/03/27/investigating-coronavirus-fakes-and-disinfo-here-are-some-tools-for-you/
|
||||
|
||||
==Osome tools
|
||||
|
||||
“OSoMe (awe•some) is a joint project of the Network Science Institute (IUNI), the Center for Complex Networks and Systems Research (CNetS) at SICE, and the Media School at Indiana University. OSoMe unites data scientists and journalists in studying the role of media and technology in society, and curbing the spread of misinformation online and the manipulation of social media. Here we highlight tools, findings, publications, and resources.“”https://osome.iuni.iu.edu/”
|
||||
|
||||
= Dissemination
|
||||
|
||||
|
||||
= LINK DUMP (for sorting later)
|
||||
|
||||
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material
|
||||
|
||||
|
||||
|
||||
|
||||
@ -1,2 +1,5 @@
|
||||
# documentation
|
||||
Where we write stuff about writing stuff
|
||||
|
||||
Advice notes and useful lists for people running and working on disinformation deployments.
|
||||
|
||||
|
||||
9
TECH_HOWTO Save an audio file from Facebook Messen
Обычный файл
9
TECH_HOWTO Save an audio file from Facebook Messen
Обычный файл
@ -0,0 +1,9 @@
|
||||
TECH_HOWTO Save an audio file from Facebook Messenger
|
||||
|
||||
If you need to do this, here's the workaround trick:
|
||||
* Using Chrome browser (but NOT on mobile)
|
||||
* Access facebook via m.facebook.com
|
||||
* Then click on the messenger icon
|
||||
* Go to the chat that has the audio
|
||||
* Right mouseclick on the (...) at the end of the message and you'll have the option to "Save Audio As"
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user