Publishing Organisation:European Journalism Center
Languages:English, German, Italian, Turkish, Arabic
Audience experience level
Disaster Management Phase
This handbook builds on the foundations of the first edition of the Verification Handbook and the Verification Handbook for Investigative Reporting. Each offers fundamental skills for monitoring social media, verifying images, video and social media accounts, and using search engines to identify people, companies and other entities. Many of the chapters and case studies in this handbook are written with the assumption that readers possess the basic knowledge laid out in these previous publications, particularly the first handbook. If you are struggling to follow along, you should start with the first handbook.
- Think like an adversary.
- Each new feature of a platform or digital service can be exploited in some way.
- It’s critical to put yourself in the shoes of someone looking to manipulate the environment for ideological, political, financial or other reasons.
- When you look at digital content and messages, you should consider the motivations driving its creation and propagation.
- It’s also essential to stay abreast of the latest techniques being used by bad actors, digital marketers and others whose livelihood relies on finding new ways to gain attention and earn revenue the digital environment.
- Focus on actors, content, behavior and networks.
- The goal is to analyze the actors, content and behavior and how they are to document how they might be working in unison as a network.
- By comparing and contrasting these four things with each other, you can begin to understand what you’re seeing.
- A fundamental approach is to start with one piece of content or an entity such as a website and pivot on it to identify a larger network through behavior and other connections.
- This can involve examining the flow of content and actors across platforms, and occasionally into different languages.
- Monitor and collect
- The best way to identify media manipulation and disinformation is to look for it all the time.
- Ongoing monitoring and tracking of known actors, topics and communities of interest is essential.
- Keep and organize what you find, whether in spreadsheets, screenshot folders or by using paid tools like Hunchly.
- Be careful with attribution
- It’s sometimes impossible to say exactly who’s behind a particular account, piece of content, or a larger information operation.
- One reason is that actors with different motives can behave in similar ways, and produce or amplify the same kind of content.
- Even the platforms themselves — which have far better access to data and more resources — make attribution mistakes.
- The most successful and compelling evidence usually combines digital proof with information from inside sources — an ideal mix of online and traditional investigative work.
- That’s becoming even more difficult as state actors and others evolve and find new ways to hide their fingerprints.
- Attribution is difficult; getting it wrong will undermine all of the careful work that led up to it.