English

Original text in English by Tactical Tech, translations & adaptations by partners:

Examining and Sharing Your Findings

Now that you’ve collected and documented the data, you’re ready to examine your findings--and that’s exactly what you’ll do in this module. You’ll also explore whether reporting and sharing your findings is right for you.


  • Lesson 1

    Be a Mindful Digital Enquirer

    Learn how to become a careful Digital Enquirer by being aware of your thought patterns and biases.


  • Lesson 2

    Expose the Invisible

    Explore and preserve the behind-the-scenes information (metadata) of photos, videos, and documents.


  • Lesson 3

    Dive Deeper Into Data

    Responsibly and verifiably draw conclusions from your data and save your digital evidence.


  • Lesson 4

    Report and Share Your Digital Enquiry

    Decide whether reporting and sharing your findings is right for you and get some fresh ideas to reach your audiences.


  • Lesson 5

    Put It All Together

    Take a short quiz and test your examination skills.



  • Resource Center


    Digital Enquirer Kit

    • Guidebook: This is a how-to guide to equip educators, community leaders, and civil society organizations with tips on using and adapting the resource to train Digital Enquirers in their own local community.
    • Video: Instructional strategies for digital security training: In this session, we will dig deeper into Digital Security trainings, answering questions such as: what are the particularities of this topic? What do learners often fear or are sceptical about? What could be the different ways to approach it?

    Bias:

    Conspiracy theories on social media:

    Exposing the Invisible: The Kit:

    Save evidence:

    Metadata:

    Tools to keep/view metadata: 

    • ExifTool 
    • ProofMode 
    • Exif viewers (caution: do not upload potentially sensitive content, as the website operator may be able to view anything uploaded to their site) such as VerExifMetadata2GoJeffrey's Image Metadata Viewer (caution: this website does not use HTTPS, so anyone on the network can see what images are being uploaded)

    Tools to remove metadata: 

    Geolocation and Maps:

    Data:

    Databases:

    WHOIS:

    Free WHOIS data services:

    • IANA WHOIS Service (works via Tor Browser and doesn’t have CAPTCHA)
    • WHO.IS  (works via Tor Browser and doesn’t have CAPTCHA)
    • WHOIS.com (works via Tor Browser and has CAPTCHA)
    • GoDaddy WHOIS  (works via Tor Browser and has CAPTCHA)
    • WHOIS Lookup (limited free search, works via Tor Browser and doesn’t have CAPTCHA)

    Reporting:

    Fact-checking resources:

    Therapy and psycho-social resources:


    Learn more