Methodology (v1.2.0)
ReliefSignal aggregates publicly available information into structured, timestamped records with source references. It is non-political, non-military, and non-operational.
Governance: events may be auto-flagged for human review based on confidence, ambiguity, severity, and source restrictions. Rejected events are excluded from scoring.
Language safeguard: summaries are normalized to neutral tone using a rule-based filter before storage.
Risk Model (V1)
Risk score (0–100) is a weighted composite:
- 0.35 MilitaryIntensity
- 0.15 AirspaceImpact
- 0.15 MaritimeImpact
- 0.20 CommoditySignal
- 0.15 DiplomaticEscalation
V1 is conservative: it reports observed signals and drivers from public sources. It does not predict outcomes.
- Five-second understanding
- Public transparency and method
- Continuity and fallback awareness
- Benchmark accountability
- Read the public benchmark defense layer first
- Read the live dashboard first fold
- Inspect the methodology
- Inspect source provenance
- Inspect corrections
- 1. Front-door stress scanCheck whether world → local reading remains understandable in one compressed pass.Open this proof surface
- 2. Pocket brief under degraded attentionVerify that the compact brief still explains what changed, why it matters and what to check next.Open this proof surface
- 3. Methodology under pressureCheck whether the product still explains how it forms outputs and where its limits remain.Open this proof surface
- 4. Corrections and trust pathVerify that uncertainty, corrections and trust-impacting revisions remain inspectable.Open this proof surface
Global watchlist model (v1.2.0)
- Watchlists are configurable by environment (not hardcoded in product logic).
- Each watchlist has explicit scope (ISO3 + term matcher) and weighted priority boost.
- Review queue priority combines severity, confidence risk, freshness, and watchlist weights.
Notification methodology
- User-controlled preferences: channel, destination, language, severity, watchlists, delivery mode, quiet hours.
- Dispatch respects quiet-hours and minimum severity before any alert is considered.
- Dedupe + cooldown logic prevents repeated spam for equivalent alert payloads.
- Dispatch logging keeps auditable records of sent/skipped/failed decisions.
Data sources transparency
See the complete public source directory and links used by the ingestion pipeline.
Tier policy: A=official/IGO/government, B=established media, C=auxiliary weak signals.
Official social channels may be monitored as weak signals, but scoring prioritizes corroborated web/official sources.
Safeguard: weak-signal-only evidence is capped and cannot alone drive the highest risk tier in Telegram local summaries.
Update Frequency
Events are ingested on a scheduled basis. Risk scores are computed and stored as current values and daily snapshots.
Limitations
- Coverage depends on public availability and language reach.
- Not an official authority guidance product.
- No tactical precision: choropleths only; coarse location model enforced at DB level.