THE HSWAGATA BUDDHA TOOTH RELIC PRESERVATION MUSEUM
FOR INTERNAL USE ONLY
Template No.: T230
Template Title: Evidence Assessment & Verification Record (Anti-Fake / Anti-Forgery)
Related Research Case IDs / Cluster: Cluster F – HGT Conflicts & Security (Cases 66–85)
Linked Templates / Policies: T229 (Document & Media Index), T227 (Chronology), T233 (Official Communication Verification), T232 (Risk Sheet), Confidentiality & Access Policy
Date of form: ____ / ____ / ______
Prepared by / Role: _______________________
Office / Unit: ____________________________
Country / Location: _______________________
Confidentiality Level:
Internal only [ ] Restricted [ ] Sacred-Restricted / Sensitive [ ]
Use of this form (tick):
New case / action [ ] Follow-up [ ] Annual review [ ] Archive only [ ]
A) Item being assessed
Case ID: ___________________________
Evidence ID (from T229): ___________________________
Item type: Letter [ ] Email [ ] Screenshot [ ] Audio [ ] Video [ ] Photo [ ] Other: ______
Short label/title: _________________________________________________
Claim made by the item (1–2 lines):
B) Source and context
Received date/time: //______ Time: ______
Received by (role): _______________________
Received from (role/code): _______________________
Channel: Official email [ ] Personal email [ ] Chat app [ ] Social media [ ] Hand delivered [ ] Other: ____
Linked T227 Timeline No.: ________
Urgency level: Low [ ] Med [ ] High [ ]
C) First screen (red flags) – tick all that apply
Forwarded many times / unclear origin [ ]
Screenshot only (no original file/letter) [ ]
No reference number / no official header [ ]
Strange language, spelling, or wrong office titles [ ]
Pressure words: “urgent”, “secret order”, “do now” [ ]
Asks for money, keys, access, or relic movement [ ]
Threats or intimidation [ ]
Sender identity cannot be confirmed [ ]
File looks edited (cropped, blurred, changed text) [ ]
Other red flags: _____________________________________________________
D) Basic checks (what we can confirm)
D1) Identity check
Sender name/title written: ___________________________________________
Claimed organization: _______________________________________________
Known/verified contact exists in register (T228)? Yes [ ] No [ ]
If Yes, verified channel used to confirm? Yes [ ] No [ ]
D2) Document checks (letters/emails)
Reference number present? Yes [ ] No [ ]
Date present? Yes [ ] No [ ]
Signature/stamp present? Yes [ ] No [ ]
Matches known format from same office? Yes [ ] No [ ] Unsure [ ]
Attachments included? Yes [ ] No [ ] If Yes, list: _____________________
D3) Media checks (screenshots/photos/videos)
Original file available (not only screenshot)? Yes [ ] No [ ]
Metadata checked (if available)? Yes [ ] No [ ] Not possible [ ]
Signs of editing/cutting? Yes [ ] No [ ] Unsure [ ]
Matches other evidence/time/place? Yes [ ] No [ ] Unsure [ ]
E) Verification actions taken (record clearly)
(Use official channels when possible. One line per step.)
| Step no. | Date/time | What was done | Who did it (role) | Result (confirmed / not confirmed / pending) | Notes |
|---|---|---|---|---|---|
| 1 | //____ ____ | __________________________ | __________ | __________ | __________ |
| 2 | //____ ____ | __________________________ | __________ | __________ | __________ |
| 3 | //____ ____ | __________________________ | __________ | __________ | __________ |
F) Assessment outcome (tick one)
Verified genuine (safe to use for decisions) [ ]
Partly verified (some parts true, some unknown) [ ]
Not verified / likely false (do not rely on it) [ ]
Unknown (cannot verify yet) [ ]
Reason (simple, 3–6 lines):
G) Decision control (important)
Was any action taken based on this item before verification? Yes [ ] No [ ]
If Yes, what action and why: _________________________________________
Does this item require escalation? (tick)
Board review [ ]
Security team action [ ]
Legal/authority contact [ ]
Public misinformation response plan [ ]
Staff safety plan (harassment/threat) [ ]
H) Next steps
Next step 1: _______________________ Owner (role): ______ Due: //____
Next step 2: _______________________ Owner (role): ______ Due: //____
Next step 3: _______________________ Owner (role): ______ Due: //____
I) Filing and confidentiality
Confidentiality for this item:
Internal [ ] Restricted [ ] Sacred-Restricted [ ]
Stored at (cabinet/folder): ___________________________________________
Access allowed for roles (list): _______________________________________
J) Sign-off
Assessed by (Name): _________________________ Role: ___________________
Signature: _________________________________ Date: //______
Reviewed by (Supervisor/Head): ________________________________
Signature: _________________________________ Date: //______