Verification Mechanism

Our priority is accuracy over speed. Before any evacuation notice or threat is published to the public map, it goes through a multi-step verification process.

1Collection

We monitor official military broadcasts, raw Telegram channels, and local verified reports in real-time using automated scrapers.

2Human Review

Every collected threat is routed to a secure dashboard where a verified team member cross-references the location data, satellite imagery, and timestamp before it can be pushed to the site.

Why are some threats missing? If a threat is unconfirmed, lacks concrete geographic coordinates, or comes from an unreliable source, we hold it back. We strictly avoid panic-inducing misinformation.