When identifying disinformation online, it’s important to verify—to the best of your ability—where the disinformation originated. This tip sheet runs through four different verification methods: assessing provenance; geolocation analysis; investigating the source; and checking for automated or coordinated inauthentic behavior. It also explains the limitations to each approach.
One take-away: Once disinformation is verified, it doesn’t always mean that you should share it publicly; always use a threat classification model to assess whether or not you would be unnecessarily amplifying problematic information. You should, however, flag the content to platforms so that they can take steps to remove the content if it violates their policies.
Download the tip sheet here.