Check Desks Forensic Data Teams
This is a partnership between DW Akademie and Code for Africa to further expand East Africa’s first network of newsroom-based verification teams/desks, which are structured as an investigative observatory to counter the digital war against truth.
Click on the numbered tabs to navigate this lesson.
Resources for Participants
Week 1
Session 1 : Introduction to Fact-Checking and Verification
Date: 09 August 2021
Slides : CfA | Pesa-Check | Training | Introduction to Fact-Checking & Verification
QUIZ – Fact-Checking and Verification
0 of 5 questions completed Questions: You have already completed the quiz before. Hence you can not start it again.
Quiz is loading… You must sign in or sign up to start the quiz. You must first complete the following:
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0) Which of the following correctly describes sources of misinformation and how they spread?
Do you think misinformation causes direct harm to individuals and the societies they live in?
Which of the following is not a PesaCheck rating for misinformation?
Which of the following definitions of misinformation ratings is not correct?
What are some of the negative consequences of misinformation? Select all that apply
DWA | PC KE : FACT-CHECKING AND VERIFICATION
Quiz Summary
Information
Results
Results
0 Essay(s) Pending (Possible Point(s): 0)
Categories
1. Question
2. Question
3. Question
4. Question
5. Question
Week 2
Session 2 : What is fact-checkable? setting criteria for what is eligible to be fact-checked
Date: 16 August 2021
Slide: CfA| Knowledge| Pesa-Check| Training| DWA KE
What is fact-checkable?
Setting criteria for what is eligible to be fact-checked
QUIZ: CfA | DWA Training | What is fact-checkable? setting criteria for what is eligible to be fact-checked
0 of 7 questions completed Questions: You have already completed the quiz before. Hence you can not start it again.
Quiz is loading… You must sign in or sign up to start the quiz. You must first complete the following:
0 of 7 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0) While claims may come in varied forms, which of the following categories do they usually fall under? Select all that apply
Rate this statement as TRUE or FALSE: Posts can share false information that the publisher believes to be true, or they could also have an agenda that the publisher seeks to achieve.
Claims are suitable for fact-checking if: Select all that apply
Can a quote obtained during a one-on-one interview be fact-checked?
To get you started in identifying potential fact-check worthy claims, you should ask all the following questions except _
A fact-checker should avoid checking claims that __ Select all that apply
The fact-checking process involves establishing all of the following except:
Quiz Summary
Information
Results
Results
0 Essay(s) Pending (Possible Point(s): 0)
Categories
1. Question
2. Question
3. Question
4. Question
5. Question
6. Question
7. Question
Week 3
Session 3 : Fundamentals of Influence Operation and Understanding Coordinated Behaviour
Date: 23 August, 2021
Slides : Slide: CfA| Knowledge| Pesa-Check| Training| DWA KE
What is an Influence Operation? Understanding coordinated behaviour (basic)
QUIZ: Influence Operations
0 of 4 questions completed Questions: You have already completed the quiz before. Hence you can not start it again.
Quiz is loading… You must sign in or sign up to start the quiz. You must first complete the following:
0 of 4 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0) What is Coordinated Inauthentic Behaviour?
The following are examples of internet bots, except ?
The following are tools used in visual media forensics, except?
The following are tools used in website forensics, except?
Quiz Summary
Information
Results
Results
0 Essay(s) Pending (Possible Point(s): 0)
Categories
1. Question
2. Question
3. Question
4. Question
Week 4
Session 4 : Finding content: Identifying claims to fact-check and sources to validate the facts and 5-step Fact-Checking: IFCN’s elements for credible fact-checking
Date: 30 August, 2021
Slides : Slide: CfA| Knowledge| Pesa-Check| Training| DWA KE
Finding claims: The 5-stage fact-checking process
QUIZ: Finding claims: The 5-stage fact-checking process
0 of 7 questions completed Questions: You have already completed the quiz before. Hence you can not start it again.
Quiz is loading… You must sign in or sign up to start the quiz. You must first complete the following:
0 of 7 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0) Is this statement TRUE or FALSE: Not all statements make a suitable fact-check.
Which of the following describes the process of selecting suitable claims? Select all that apply.
Fact-checking relies on __ Select all that apply
Which of these explains when to use anonymous sources? Select all that apply
Which of these questions does a fact-checker consider when determining what to fact-check? Select all that apply
The following shows accurate ratings used in various claims. Which one is NOT?
Fact-checkers are expected to adhere to IFCN’s commitment to uphold __ Select all that apply
Quiz Summary
Information
Results
Results
0 Essay(s) Pending (Possible Point(s): 0)
Categories
1. Question
2. Question
3. Question
4. Question
5. Question
6. Question
7. Question
Week 5
Session 5 : Staying Safe: Guidelines for keeping yourself safe from harassment and threat
Date: 6 September, 2021
Slides : Slide: CfA| Knowledge| Pesa-Check| Training| DWA KE
Staying Safe
QUIZ: Staying Safe
0 of 5 questions completed Questions: You have already completed the quiz before. Hence you can not start it again.
Quiz is loading… You must sign in or sign up to start the quiz. You must first complete the following:
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0) Which of the following is NOT among major security protocol
Online preventive security measures include:
Which of the following does NOT represent an act of doxing
The measures you would take if your are being harassed online include:
Which of the following is NOT among crisis management steps when online threat is reported
Quiz Summary
Information
Results
Results
0 Essay(s) Pending (Possible Point(s): 0)
Categories
1. Question
2. Question
3. Question
4. Question
5. Question
Week 6
Session 6 : How to Write a Fact-Check
Date: 13 September, 2021
Slides : Slide: CfA| Knowledge| Pesa-Check| Training| DWA KE
How to Write a Fact-Check
QUIZ: How to Write a Fact-Check
0 of 5 questions completed Questions: You have already completed the quiz before. Hence you can not start it again.
Quiz is loading… You must sign in or sign up to start the quiz. You must first complete the following:
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0) Which of these questions does a fact-checker consider when determining what to fact-check? Select all that apply
The following are the three main rules to observe in the fact-checking process. Which one is NOT?
The following shows accurate ratings used in various claims. Which one is NOT?
Where do we present the ruling and the final findings?
At what stage do you explain the claim details?
Quiz Summary
Information
Results
Results
0 Essay(s) Pending (Possible Point(s): 0)
Categories
1. Question
2. Question
3. Question
4. Question
5. Question
Week 7
Session 7 : Network analysis: Account profiling using tools like CrowdTangle + Bots & sock-puppets: Identifying inauthentic behaviour
Date: 20 September, 2021
Slides : Slide: CfA| Knowledge| Pesa-Check| Training| DWA KE
Account profiling using tools like CrowdTangle + Bots & sock-puppets
QUIZ: Account profiling using tools like CrowdTangle + Bots & sock-puppets
0 of 5 questions completed Questions: You have already completed the quiz before. Hence you can not start it again.
Quiz is loading… You must sign in or sign up to start the quiz. You must first complete the following:
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0) Using CrowdTangle, we can collect data from the following social media platforms(select all that apply):
We can analyse the following using CrowdTangle(select all that apply):
We can collect data on private Facebook pages and groups using CrowdTangle
The following are examples of internet bots, except:
Generally, bot accounts:
Quiz Summary
Information
Results
Results
0 Essay(s) Pending (Possible Point(s): 0)
Categories
1. Question
2. Question
3. Question
4. Question
5. Question
Week 8
Session 8 : Monitoring ‘dark social’: how to analyse WhatsApp, Telegram & other messenger platforms
Date: 04 October, 2021
Slides : Slide: CfA| Knowledge| Pesa-Check| Training| DWA KE
Monitoring Dark Socials
QUIZ: Monitoring “Dark Social”
0 of 6 questions completed Questions: You have already completed the quiz before. Hence you can not start it again.
Quiz is loading… You must sign in or sign up to start the quiz. You must first complete the following:
0 of 6 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0) Why are Whatsapp and Telegram referred to as “Dark Social Media”?
Which of these sites does CrowdTangle grant you access to?
CrowdTangle grants access to information from ___ on Whatsapp?
What Telegram search engine was discussed in the training?
Metadata can be simply defined as___?
Which of the following are examples of Metadata (pick as many as apply)
Quiz Summary
Information
Results
Results
0 Essay(s) Pending (Possible Point(s): 0)
Categories
1. Question
2. Question
3. Question
4. Question
5. Question
6. Question