Intake
Signals arrive from public submissions (/community/report), our own monitoring of public data sources, and tips from editorial partners. Pseudonyms are accepted at intake; provenance is tracked separately from identity.
Methodology
Every signal DriveAwareness publishes follows the same shape: intake, verification, editorial review, publication, correction. The pages below document what we count as a source, what we don't, and where our limits are.
Signal lifecycle
Signals arrive from public submissions (/community/report), our own monitoring of public data sources, and tips from editorial partners. Pseudonyms are accepted at intake; provenance is tracked separately from identity.
We confirm at least one independent primary source before publishing. Where claims rest on platform behavior, we capture screenshots, URLs, and timestamps; where they rest on documents, we keep originals on file.
Each filed case passes legal and editorial review. We separate verified claims from allegations explicitly. We redact what could harm a source. We name what we are sure of.
Stories ship to the blog with their receipts attached. Patterns are catalogued in /suppression-methods. The signal feed at /feed shows recent verified items in near real time.
When a published claim turns out wrong or incomplete, we correct it visibly — see /legal/corrections. We do not silently edit. Original-state archives are kept.
Source policy
Honest about limits
Some platforms keep no public record of moderation actions. We document what we can observe; we are explicit when something is inferred from outcomes rather than disclosed.
A statistical pattern is a question, not an answer. We surface patterns, then we go look for the documented instances that explain them.
Verified is not the same as proven. Every published case names what we are confident about and what we are not.
The methodology is theoretical until it ships. Read the published cases on the blog or browse the documented patterns in methods.