Verification Mechanism
Our priority is accuracy over speed. Before any evacuation notice or threat is published to the public map, it goes through a multi-step verification process.
1Collection
We monitor official military broadcasts, raw Telegram channels, and local verified reports in real-time using automated scrapers.
2Human Review
Every collected threat is routed to a secure dashboard where a verified team member cross-references the location data, satellite imagery, and timestamp before it can be pushed to the site.
Why are some threats missing? If a threat is unconfirmed, lacks concrete geographic coordinates, or comes from an unreliable source, we hold it back. We strictly avoid panic-inducing misinformation.