General overview of AFP's work in the region, examples of disinformation and how the team debunked them, work with Facebook to take enforcement action to prevent their further spread online.
The wealth of content available on social networks and video platforms means that we all have to be verification ninjas with a procedure to identify accurate content and debunk hoaxes. Learn how to set up your toolbox to verify user-generated content (UCG) on deadline. – Kelly Jones, Storyful
Periscope & Youtube for Real Estate AgentsCharlie Allred
How & why real estate agents should be using Periscope.
Discover:
Why to use Periscope
How to reuse the Periscope videos to be found online
How to combine Periscope & YouTube for big web presence
Charlie Allred, real estate broker & online expert presented this on February 10, 2016 in Chandler AZ.
If you are serious about your online efforts join the Killer Online Mastermind: http://www.charlieallred.com
"Vertical" is not an unhappy consequence of phone design but a fundamentally new way of storytelling, requiring strategies for maximizing top- and bottom-frame and a shift away from aspect-ratio re-cutting and toward content that is built and designed for mobile video consumers.
A video search engine is a web-based search engine that crawls the Internet to find video content. There are two types of video search engines: those that only search for content posted elsewhere and those that allow content to be uploaded and hosted on their servers. So, how do you go about finding a video that delights you? And how can you make sure that people can find your video content if you’re making it?
https://www.temok.com/blog/best-video-search-engines/
The wealth of content available on social networks and video platforms means that we all have to be verification ninjas with a procedure to identify accurate content and debunk hoaxes. Learn how to set up your toolbox to verify user-generated content (UCG) on deadline. – Kelly Jones, Storyful
Periscope & Youtube for Real Estate AgentsCharlie Allred
How & why real estate agents should be using Periscope.
Discover:
Why to use Periscope
How to reuse the Periscope videos to be found online
How to combine Periscope & YouTube for big web presence
Charlie Allred, real estate broker & online expert presented this on February 10, 2016 in Chandler AZ.
If you are serious about your online efforts join the Killer Online Mastermind: http://www.charlieallred.com
"Vertical" is not an unhappy consequence of phone design but a fundamentally new way of storytelling, requiring strategies for maximizing top- and bottom-frame and a shift away from aspect-ratio re-cutting and toward content that is built and designed for mobile video consumers.
A video search engine is a web-based search engine that crawls the Internet to find video content. There are two types of video search engines: those that only search for content posted elsewhere and those that allow content to be uploaded and hosted on their servers. So, how do you go about finding a video that delights you? And how can you make sure that people can find your video content if you’re making it?
https://www.temok.com/blog/best-video-search-engines/
PRSA National Conference Presentation - Video Commuications and the New Reali...Eric Wright
A revealing look at the way individuals, companies and corporations can utilize video in their marketing communications efforts and the elements that make compelling stories. Part of the discussion focuses on effective strategies to use video to gain media coverage and achieve business goals, while also including case studies and providing storytelling and production tips. This presentation was delivered to an SRO crowd on October 28, 2013 at the PRSA International Conference in Philadelphia, PA.
How to make your content go viral on InstagramSocioBlend
No, there’s no surefire way to make something go viral on Instagram. But you can do a few things to increase your chances that we will discuss in this article as we go further.
Source : https://socioblend.com/blog/how-to-make-your-content-go-viral-on-instagram/19/11/
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...REVULN
The rapid development of information and communication technology brings significant change to human life. In the past, people have been getting information through conventional media such as newspapers, radio, and television. Today, the public relies heavily on digital media consisting of social media and online media that are in the grip within the internet network which provides wide-ranging information in speedy manner. The phenomenon of hoaxes in social media is part of the information warfare in the cyberspace dimension. Hoaxes as tactic of choice in propaganda defined as misleading information attacks to various aspects, covering to include health, economy, disaster-events, and politics. People who are lacking in understanding propaganda tactics like how the news and information addressed in the digital media are often fooled by hoaxes that maybe appear as texts, pictures or videos. The spread of hoaxes may get uncontrollable due to the many parties who deliberately spread the hoaxes for a particular interest with anonymous accounts, fake accounts and so-called bots. The transmission of hoaxes as global phenomenon today, affecting many countries. Hoaxes that are spread in cyberspace are difficult to control without solid cooperation between government and society. This means of bad intension today by spreading news used as an asymmetric weapon extensively exercised during any political election period. This paper is about an analysis of hoax cases occurred in the time of Jakarta Gubernatorial Election 2017 as a case study.
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...REVULN
Hacktivism, commonly known as actions by individuals or groups that using hacking skills to spread a specific message and bring attention to a political or social cause, has risen and then fallen globally in the past five years. In the meantime, hacktivist activities have evolved, with an increase in state-sponsored hacktivism using false hacktivist personas, and the appearance of hacktivists who could also be described as "entrepreneurial geeks." Not all hacktivists break into network systems; some perform troll activities to create online disruptions on social media to accomplish their goals. The recent phenomenon of fandom nationalists turned trolls adds another layer to the many roles of hacktivism.
This talk will discuss the role of hacktivism in information operations through case studies of hacktivist activities from various regions and countries, and provide insight into the structure, organization, motivations, goals, tactics, techniques, and procedures (TTPs) of these hacktivist groups. The talk will also analyze how other threat actors utilize hacktivists to conduct information operations. Lastly, the talk will reflect on the future direction of global hacktivism in information operations as geopolitical tensions among major powers increase and nation-states reposition their cyber defense posture.
Hacktivism is evolving in the disinformation age with traditional hacktivist activities of breaking into systems and emerging hacktivist activities of creating online disruptions without breaking into systems. Hacktivist actors are not only non-state actors, but also nation state actors who use false hacktivist personas conducting information operations.
More Related Content
Similar to Rachel BLUNDY - Overview of AFP Fact Check
PRSA National Conference Presentation - Video Commuications and the New Reali...Eric Wright
A revealing look at the way individuals, companies and corporations can utilize video in their marketing communications efforts and the elements that make compelling stories. Part of the discussion focuses on effective strategies to use video to gain media coverage and achieve business goals, while also including case studies and providing storytelling and production tips. This presentation was delivered to an SRO crowd on October 28, 2013 at the PRSA International Conference in Philadelphia, PA.
How to make your content go viral on InstagramSocioBlend
No, there’s no surefire way to make something go viral on Instagram. But you can do a few things to increase your chances that we will discuss in this article as we go further.
Source : https://socioblend.com/blog/how-to-make-your-content-go-viral-on-instagram/19/11/
Similar to Rachel BLUNDY - Overview of AFP Fact Check (20)
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...REVULN
The rapid development of information and communication technology brings significant change to human life. In the past, people have been getting information through conventional media such as newspapers, radio, and television. Today, the public relies heavily on digital media consisting of social media and online media that are in the grip within the internet network which provides wide-ranging information in speedy manner. The phenomenon of hoaxes in social media is part of the information warfare in the cyberspace dimension. Hoaxes as tactic of choice in propaganda defined as misleading information attacks to various aspects, covering to include health, economy, disaster-events, and politics. People who are lacking in understanding propaganda tactics like how the news and information addressed in the digital media are often fooled by hoaxes that maybe appear as texts, pictures or videos. The spread of hoaxes may get uncontrollable due to the many parties who deliberately spread the hoaxes for a particular interest with anonymous accounts, fake accounts and so-called bots. The transmission of hoaxes as global phenomenon today, affecting many countries. Hoaxes that are spread in cyberspace are difficult to control without solid cooperation between government and society. This means of bad intension today by spreading news used as an asymmetric weapon extensively exercised during any political election period. This paper is about an analysis of hoax cases occurred in the time of Jakarta Gubernatorial Election 2017 as a case study.
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...REVULN
Hacktivism, commonly known as actions by individuals or groups that using hacking skills to spread a specific message and bring attention to a political or social cause, has risen and then fallen globally in the past five years. In the meantime, hacktivist activities have evolved, with an increase in state-sponsored hacktivism using false hacktivist personas, and the appearance of hacktivists who could also be described as "entrepreneurial geeks." Not all hacktivists break into network systems; some perform troll activities to create online disruptions on social media to accomplish their goals. The recent phenomenon of fandom nationalists turned trolls adds another layer to the many roles of hacktivism.
This talk will discuss the role of hacktivism in information operations through case studies of hacktivist activities from various regions and countries, and provide insight into the structure, organization, motivations, goals, tactics, techniques, and procedures (TTPs) of these hacktivist groups. The talk will also analyze how other threat actors utilize hacktivists to conduct information operations. Lastly, the talk will reflect on the future direction of global hacktivism in information operations as geopolitical tensions among major powers increase and nation-states reposition their cyber defense posture.
Hacktivism is evolving in the disinformation age with traditional hacktivist activities of breaking into systems and emerging hacktivist activities of creating online disruptions without breaking into systems. Hacktivist actors are not only non-state actors, but also nation state actors who use false hacktivist personas conducting information operations.
Isao MATSUNAMI - Digital security in japanese journalismREVULN
Massive leaks such as Wikileaks, Panama Papers and Snowden have made journalists realize that good old "just-meet-people-shoot-photo" days are gone.
Getting leak documents over the internet, grappling with data format, processing text with machine learning and protecting sources from surveillance are all getting new-norm for journalism.
However reporters, generally and historically, would be the last species to understand digital technology and data-oriented thinking.
I would like to share my experiences of teaching digital security to journalists and discuss difficulties of journalism in this post-truth world.
Chung-Jui LAI - Polarization of Political Opinion by News MediaREVULN
In 2016 US election, social media played a vital role in shaping public opinions as expressed by the news media that have created the phenomenon of polarization in the United States. Because social media gave people the ability to follow, share, post, comment below everything, the phenomenon of political opinions being spread easily and quickly on social media by the news agencies is bringing out a significantly polarized populace.
Consequently, it’s very important to understand the language differences on Twitter and figure out how propaganda spread by different political parties that influence or perhaps mislead public opinion. This talk will introduce the relationship among the social media, public opinion, and news media, then suggests the method to collect the tweets from Twitter and conduct sentimental and logistic regression analysis on them. Furthermore, this talk points out the special aspect on the relationship between the polarization and the topic of this conference (fake news, disinformation and propaganda).
Main points:
- situation in Taiwan
- research on fake news
- methods for fighting fake news
Stewart MACKENZIE - The edge of the Internet is becoming the centerREVULN
The edge of the Internet is growing exponentially. NetFutures predicts by 2027 we'll have 1000+ devices per person.
Data is generated on the edge of the Internet and due to sociological and technical reasons the Internet, in the form of social networks, amplifies any voice no matter how small. Leading to the bombardment of information, thus filtering out manipulations and fake news from relevant information becomes harder.
This talk discusses the circumstances leading up to the current situation we're in and unveils a new internet protocol implementation designed to operate at the edge of the internet which builds the concept of provenance into data. A potential solution to the problem of fake news as proving data provenance allows you to authenticate the source or publisher of images, videos and text.
Masayuki HATTA - Debunking toxic "Matome sites" in JapanREVULN
"Matome" sites (pronounced "maa-tou-mee", roughly means "edited / curated") is a unique byproduct of Japanese online culture.
They aggregate comments from other sources including anonymous BBSs (typically 2ch / 5ch) and present them in a readable way (with online ads).
Matome sites have been known as sources of disinformation and defamation, and in recent years some of them became go-to places for "Netouyo" (Japanese internet far-rightists) and quite influential.
In this presentation, I will give you a brief introduction of Japanese matome sites and their influences, then explain the recent efforts to debunk some of the most notorious ones.
Based on the judicial records, leaked internal documents, etc., the presentation will explain the entire ecosystem of Japanese matome sites.
Main points:
- The business model of matome sites
- The rise and fall of "Hoshu Sokuhou", one of the most influential matome sites.
- How "netgeek" operates, a notorious viral media.
- Debunking "Anonymous Post", or how to find out the anonymous operator of a matome site.
Dominic WAI - When would using a computer be a crime?REVULN
An analysis of section 161 of the Crimes Ordinance and sharing of case law on this offence.
http://www.onc.hk/wp-content/uploads/2018/09/1809_Criminal_EN.pdf
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
TWCSIRT is a full member of FIRST and mainly focuses on the protection of NARLabs, TANet and TWAREN. We are defense cyber-attack from internet and according to government policy to handling incident every day. I am a research fellow with National Center for High-performance Computing and lead cyber security team to operation security operation center to handling incident in Taiwan Academic Network.
In our research project from government, we are deployed the biggest honeynet in Taiwan and used over 6000 IP address to detection malicious network attack come from internet.
We have published our malware knowledge base to sharing malware samples and reports for many researchers, students, research center and sharing our data set for deep tracking about cyber security.
There are many new types of cyber-attack that’s is include ransomware, website mining, DDoS and hybrid malicious attack.
Main Points:
- What’s TWCSIRT Mission and Scope
- How to coordinate in National level with ISAC, CERT and SOC
- Cyber-attack and threat hunting in Taiwan Academic Network
- How to develop cyber security platform for incident handling
- How to do red team and blue team training by CDX
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...REVULN
The Data Privacy Act of the Philippines was enacted into law in March of 2012. Thus, the creation of the National Privacy Commission (NPC) last 2016, which is mandated to administer its implementation. After more than two years after its creation, NPC had successfully championed its cause from awareness, compliance and enforcement with the registration of more than 30,000 Data Protection Officers (DPO), accepted more than 1,000 complaints and cases and has made headlines in the Philippines as one of the most popular government because of its strict implementation of the law. Among its most popular implementation is its Five Pillars of Compliance which was regarded as one of the most successful implementation among other countries. Republic Act 10173, otherwise known as the Data Privacy Act (DPA) of 2012 was passed into law last 2012 in the Philippines. The law requires that all Personal Information Controllers (PIC) and Personal Information Processors (PIP) must appoint a Data Protection Officer (DPO) to manage compliance with the DPA and other applicable laws and policies. In addition, having a DPO will ensure the protection of personal data collection and processing in accordance with the requirement of the law.
Having a DPO will also ensure the organization’s competitive advantage in this digital age of data protection.
As a data protection officer, he/she must be must monitor the organization’s compliance with the DPA, its implementing rules and regulations and other issuances by the National Privacy Commission. Including the conduct of Privacy Impact Assessment, creation of a Privacy Management Program and Privacy Manual and the conduct of Breach Reporting Procedure.
In addition, a DPO should cultivate awareness to promote the culture of privacy not only within the organization, but as well as for the entire country.
The presentation will also present some issues surrounding the digital world. Including some potential breaches that may affect each individual and organization. Will also present a compilation of the most common breaches that has happened in the Philippines and how to avoid them. Technical, physical and organization security measures will also be discussed in the presentation.
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
In July 2016, the ATM heist of Taiwan First bank is based on well-known Carberp malware family. The threat of cybercrime is becoming increasingly complex and diverse on putting citizen’s data or money in danger. Cybercrime threats are often originating from trusted, malicious, or negligent insiders, who have excessive access privileges to sensitive data. The analysis of ATM heist threats presents many opportunities for improving the quality and value of digital evidence. This talk will introduce some OSINT methods that can help investigators to perform a cybercrime investigation process in a forensically sound and timely fashion manner. This talk further points out cybercrime investigation, digital forensics, and ICT governance for fighting against cybercrime issues. It requires the sincere examination of all available data volumes at a crime scene or in a lab to present digital evidence in a court of law.
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...REVULN
Phishing, an old and traditional attack, is still a thing.
Hundreds of phishing website are launched every day and it threats people around the world. Anti-Phishing Working Group (APWG) says that APWG detected 150,000+ phishing websites for the 3rd quarter of 2018.
Sometimes phishing actors make OPSEC failures and, thanks to that, researchers can obtain a phishing kit (a kit to deploy a phishing website).
We have collected 18,000+ phishing kits based on OSINT and analyzed mechanisms of phishing websites and phishing actors themselves.
In this presentation, we will show the following findings.
- How to collect phishing kits based on OSINT data.
- Analysis of phishing actors:
- Who develops a phishing kit, How to distribute it, etc.
- Including a methodology to find out a phishing actor based on information (email, username and signature) inside a phishing kit.
- We will show an analysis of Indonesian phishing actors who target Asian countries.
- Especially focusing on an actor named DevilScream/Z1Coder who develops an infamous phishing kit“16shop”.
Finally, we will show countermeasures we have taken against phishing websites and actors.
04062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
‘वोटर्स विल मस्ट प्रीवेल’ (मतदाताओं को जीतना होगा) अभियान द्वारा जारी हेल्पलाइन नंबर, 4 जून को सुबह 7 बजे से दोपहर 12 बजे तक मतगणना प्रक्रिया में कहीं भी किसी भी तरह के उल्लंघन की रिपोर्ट करने के लिए खुला रहेगा।
Here is Gabe Whitley's response to my defamation lawsuit for him calling me a rapist and perjurer in court documents.
You have to read it to believe it, but after you read it, you won't believe it. And I included eight examples of defamatory statements/
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
An astonishing, first-of-its-kind, report by the NYT assessing damage in Ukraine. Even if the war ends tomorrow, in many places there will be nothing to go back to.
El Puerto de Algeciras continúa un año más como el más eficiente del continente europeo y vuelve a situarse en el “top ten” mundial, según el informe The Container Port Performance Index 2023 (CPPI), elaborado por el Banco Mundial y la consultora S&P Global.
El informe CPPI utiliza dos enfoques metodológicos diferentes para calcular la clasificación del índice: uno administrativo o técnico y otro estadístico, basado en análisis factorial (FA). Según los autores, esta dualidad pretende asegurar una clasificación que refleje con precisión el rendimiento real del puerto, a la vez que sea estadísticamente sólida. En esta edición del informe CPPI 2023, se han empleado los mismos enfoques metodológicos y se ha aplicado un método de agregación de clasificaciones para combinar los resultados de ambos enfoques y obtener una clasificación agregada.
03062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
4. AFP Fact Check
● AFP Fact Check launched in early 2018
● Now 20+ countries globally. In Asia:
Australia, Hong Kong, India, Indonesia,
Malaysia, Philippines, Pakistan,
Singapore, Sri Lanka, Thailand
● Eight languages including French,
Arabic, Indonesian
● Fake news global -- see same content
multiple languages eg HK facial
recognition. This video was circulated
in English and Polish.
5. AFP + Facebook
● Facebook Third Party Fact
Checker
● Facebook provide AFP Fact
check with feeds of
potentially misleading
content
● AFP fact checks on merit
● Once fact check is written,
add back to FB ecosystem
● Facebook take steps to
stop fake news spreading
12. Why is online fact-checking becoming more important?
● Increasing amounts of unverified
content online globally
● Media job cuts can lead to decline in
standards
● Pressure to be first can result in
mistakes
● Increasing scrutiny on media
accuracy/scepticism about
mainstream media
13. Fact checks on our wire
● Asia fact check
reporters add value to
AFP’s regional
coverage -- writing
sidebars, focus pieces,
contributing key info to
breaking news wraps
● Eg -- Indian elections
Christchurch shooter
video verification; Hong
Kong disinformation
analysis
16. Key tools for fact checking: Reverse image search
● Upload the image to Google
Image Search, Yandex or try
the RevEye extension
● Google will provide you with a
list of search results which
you can analyse to try to
establish where and when the
image first appeared online
● Example: Hong Kong protest
pictures?
17. STEP 1: Choose your image to
investigate, save it on your desktop
STEP 2: Run it through an image
search on Google
18. STEP 3: Check the results, look
for examples of the image being
used in the correct context
STEP 4: If the
image is credited
to AFP, check our
archive to
confirm!
19. Verifying after reverse image search
● Check date news report was published;
does it make sense in the context of the
image? Try this handy tool if you can’t
find the web page date.
● Check the web page source; is it reliable?
● Does the image appear on other pages
which will help you verify it?
● Can you geo-locate the image?
20. Geo-location of UGC
Key clues to look for:
● Shop signs
● Landmarks
● Style of buildings
● Logos
● Street signs
● Ethnicity of the people featured
● Clothing/props
● Languages spoken
● Background music
● Terrain/style of cityscape
21. We can geolocate the
image to here on Google
Street View, on Rue Arsène
Houssaye.
22. ● For videos, eg this misleading tweet,
use InVid -- breaks down videos into
keyframes then runs a reverse
image search
You will often locate news
reports about the video, or at
least clues about where and
when it was filmed and what it
features.
Video verification: InVID/WeVerify
23. STEP 1: Download the InVID/WeVerify Google
Chrome extension
STEP 2: Open the video you want
to verify in Google Chrome. Click
the InVID extension (top right)
and select ‘Open in InVID’.
STEP 3: Select ‘Keyframes’.
Input the video URL and
click ‘Submit’.
24. STEP 4: InVID will give
you a selection of
keyframes. Click on a
keyframe to reverse
image search it on Google
STEP 5: Analyse the results
as you would do for a
normal reverse image
search. If you get no results
for one keyframe, try
another
25. More video verification tips
● Is the video high quality footage? If not, it is less
likely to be an original source
● On YouTube/ Facebook, you can toggle on the video
settings to check if the video is available in high
definition
● Is the purported video taker based in the country
where the video was filmed? If not, is there a
reasonable explanation for why they would have
been there? Can they send you the original file to
check the metadata?
● Does the clip play a continuous scene or has it been
edited? Is the audio consistent with what you can
see on the clip?
26. Establishing when photos/videos were uploaded
● YouTube data viewer:
provides specific time video
was uploaded to YouTube
● Instagram posts: choose
public image/video, select
‘embed’ and find the time it
was uploaded at the very end
of the code
● Twitter/Facebook: expand
post and hover over date to
see the upload time.
Remember it will normally be
set to your timezone.
27. Establishing when photos/videos were captured
● Can you find corroborating
sources/witnesses to pin down when the
photo/video was taken?
● Can you find local media reports from the
time the photo/video was taken?
● Have you found the original photo/video
source? If so, can they send you the original
file to check the metadata?
● Is the photo/video consistent with other
photos/videos of the same incident shared
on social media?
28. What if I still can’t verify the image/video?
● Sometimes social media footage is
scraped (copied and re-shared) so
many times, that you will struggle to
find who filmed it through reverse
image search alone
● This clip went viral in Indonesia
shortly after the Lion Air flight 610
crash in October 2018 near Jakarta
● Google Image search for this video
screengrab only suggested this was a
Boeing 747 plane, but gave no detail
about the location
29. ● Conducting a quick
search for Boeing 747
crashes suggests there
have been many over
the years
● But how many have
been filmed crashing into
the sea? Perhaps worth
conducting a search for
‘plane crashes into sea’
on YouTube?
● News reports and other
archive footage tally with
this news footage from
the event
30. Other handy online fact-checking tools
● Checkusernames.com; gives an assessment of which platforms a particular username is used on
● The WayBack Machine: online archive, useful for finding web pages which have been removed
● Trendsmap.com or Google Trends show you to what extent certain keywords are trending worldwide
● Carbon Dating the Web: free tool which gives you an estimated date that a web page was published
● Get-Metadata.com: check the metadata of a video or photo to see if it is an original file
31. Contact me
Rachel Blundy, fact-check editor for AFP in Asia
Twitter: @rachelblundy
Email: rachel.blundy@afp.com