HevrutAI · Forensic Verification Framework · v5.0
censorship Forensics.
narrative control Verification.
certainty Adversarial Scrutiny.
The credibility is in the process.
The process is the product.
[ Examine the Framework ] [ Enter the Dashboard ↗ ]
hevrutai.org/verify  ·  Main Site
The Problem

When amplification moves faster
than verification, the lie sets the record.

Three structural failure modes that make high-stakes claims nearly impossible to correct once they circulate.

01 ·
The Viral Claim
A video, a post, a quote spreads across platforms in hours. The emotional narrative forms. Corrections arrive days later, reach a fraction of the original audience, and are framed as partisan. Most people never see them.
02 ·
The Citation Loop
Source A cites Source B. Source B cites Source A. Neither cites a primary document. The loop presents as evidence. It is self-referential amplification dressed in citation formatting. It fails under one layer of scrutiny.
03 ·
Narrative Inversion
Context is removed. Chronology is reversed. Passive constructions erase accountable actors. The result is a claim that is grammatically intact and historically inverted simultaneously — designed to survive casual checking.
The Methodology

Five principles. One standard.
No exceptions.

The HevrutAI verification framework applies adversarial interrogation to claims before they enter the record. Click each principle to expand.

FAC-09 Chronological Precedence — Lex Prior
Earlier documented evidence governs later-claimed narratives.

When a timeline is constructed — rather than discovered — the construction reveals itself. Lex Prior means: show me the earliest primary source for this claim, or acknowledge that your narrative begins after the fact it purports to explain. A claim that can only be sustained by ignoring its own chronological record is a claim that fails the first test.
FAC-01 Adversarial Friction — The Machloket Protocol
Every claim is submitted to structured opposition before it is accepted.

Agreement is not the goal. Survival under pressure is. The Machloket Protocol runs 28 structured objections against the submitted testimony — passive voice patterns, false equivalencies, credential overreach, source tier mismatches, institutional sycophancy signals. A claim that survives is not declared true. It is declared defensible. That is the only standard that holds.
FAC-11 Source Tier Verification — The RWI Scale
Not all sources are equal. Every source receives a Reliability Weighted Index score.

Tier 1 — Primary documents: official records, archived correspondence, institutional designations, photographic evidence with documented chain of custody.
Tier 2 — Corroborated: major investigative journalism with documented methodology, verified primary data.
Tier 3 — Secondary: academic analysis, commentary with cited primary sourcing.
Tier 4 — Contested: political framing, post-facto revisionism, claims that fail chronological precedence.

A narrative built on Tier 4 sources cited as Tier 1 is source credibility laundering. The RWI detects it.
FAC-03 Passive Construction Audit — The By-Zombies Test
Passive voice is the grammatical instrument of agentless claims.

If you can append "by zombies" to a sentence and it remains grammatically coherent — "civilians were killed by zombies," "the village was destroyed by zombies" — the sentence has erased its actor. Accountability requires agency. The passive audit tests every major claim for its actor. Anonymous passive constructions are flagged; the corrected version names the accountable party explicitly. This is not stylistic editing. It is evidentiary discipline.
FAC-08 Continuity Testing — The Chazakah Principle
Established behavioral patterns carry evidentiary weight beyond any single statement.

An institution with a documented pattern of distortion is not reformed by a single corrective statement. A source that has consistently misframed chronology on one set of issues is not credibly neutral on related issues simply by asserting neutrality. Chazakah means: the pattern is the data. A single data point does not override an established pattern. This principle governs how HevrutAI evaluates institutional reform claims, source credibility assertions, and expertise claims from known-pattern actors.
The Adversarial Engine
מַחֲלֹקֶת לְשֵׁם שָׁמַיִם
Machloket l'shem shamayim
Argument for the sake of heaven. The Talmudic principle that rigorous disagreement, conducted with integrity, produces deeper truth than agreement ever could.

HevrutAI is named for the relationship between Rabbi Yochanan and Reish Lakish — intellectual sparring partners whose structured opposition defined the standard of Talmudic reasoning. When Reish Lakish died, Rabbi Yochanan said: "Bar Lakisha would raise 24 objections to everything I said." No other student could replace him. Agreement was easy. Adversarial rigor was the irreplaceable thing.

That is the engine.
The Machloket Protocol

28-Facet Objection Library

The Machloket Protocol is not debate. It is not fact-checking. It is structured adversarial interrogation applied systematically to submitted claims, with a documented record of every objection raised and every ruling issued.

The 28 facets include: Chronological Precede Test, Passive Sycophancy Detection, Institutional Authority Check, False Reform Identification, Financial Conflict Screening, FTO Designation Verification, Credential Domain Testing, Archaeological Record Cross-Reference, Source Credibility Laundering Detection, and nineteen additional structured objections.

When a claim survives the protocol, it is not declared true. It is declared defensible under adversarial pressure. That is the only standard that holds.

[ Open the Audit Dashboard ↗ ]
Case File · OPP-LIB-001

The framework in practice.

A documented case from the HevrutAI Opposition Library, presented in full. The methodology is visible. The sourcing is traceable. The ruling is issued below.

OPP-LIB-001 · UNIVERSALIST ERASURE / ANACHRONISM INVERSION
MECHANISM: ANACHRONISM INVERSION TIER-1 SOURCES: 3 LEX PRIOR APPLIED
The Claim Under Audit
"The Israeli flag doesn't belong in Warsaw Ghetto Uprising commemorations — it is a modern political symbol that was retrospectively imposed on a universal human rights struggle."

Mechanism: Retroactive identity reassignment via passive erasure of documented actor self-description.
Passive constructions flagged: 3 of 4 key phrases
Forensic Record — Tier-1 Sourcing
The Blue and White Zionist flag was physically raised on Muranowski Square on April 19, 1943 — four years before the State of Israel existed. The "modern symbol" claim is factually inverted. [Yad Vashem photographic archive — Tier 1, RWI 9.4]
The Jewish Fighting Organization (ZOB) and Jewish Military Union (ZZW) were Zionist youth movements. Their organizational records confirm this. Removing Zionist symbols from their commemoration is posthumous identity reassignment. [ZOB/ZZW records, Yad Vashem — Tier 1, RWI 9.1]
Mordechai Anielewicz's final letter, April 23, 1943, explicitly frames the uprising within the Zionist project. The connection to Jewish statehood is not a modern projection — it is documented in the fighters' own words. [Anielewicz final letter, Yad Vashem archive — Tier 1, RWI 9.2]
Counter-claim source: Polish political commentary, 2025–2026. Classification: Tier 3 — political assertion, no primary source citation. Status: REJECTED.
Machloket Ruling CLAIM FAILS EVIDENTIARY STANDARD — CONTRADICTS THREE TIER-1 SOURCES
Opposition Library contains OPP-LIB-001 through OPP-LIB-015 with full sourcing. OPP-LIB-016 through OPP-LIB-020 in progress. [ Run an Audit ↗ ]
Reference Glossary

Know what you're reading.

Key terms in the HevrutAI forensic framework, defined precisely.

Adversarial Verification
Testing a claim by constructing the strongest possible case against it, not by seeking corroboration. Corroboration confirms. Adversarial pressure reveals structural weakness.
Chazakah Continuity
The principle that established behavioral patterns carry evidentiary weight beyond any single statement. A source that has consistently distorted does not earn neutrality by assertion.
Citation Loop
A sourcing structure in which Source A cites Source B and Source B cites Source A, with neither tracing to a primary document. Presents as evidence. Fails under one layer of scrutiny.
Credential Laundering
The use of valid credentials in a domain they do not govern to authorize claims outside their jurisdiction. The credentials are real; the authority they are being used to claim is fabricated.
Institutional Sycophancy
The tendency of institutions to affirm popular narratives rather than apply consistent evidentiary standards. Distinct from deliberate distortion — it is the structural failure of comfort over rigor.
Lex Prior
Chronological precedence. Earlier documented evidence governs later-claimed narratives. A claim that requires ignoring its own chronological record fails the first test of evidentiary honesty.
Narrative Inversion
The structural reordering of chronology or context to produce a false causal impression while remaining technically quotable. Not the same as lying — it is the manipulation of sequence.
Passive Erasure
The use of passive-voice constructions to remove identifiable actors from claims, making accountability untraceable. "Civilians were killed" is not evidence. Named actor + documented date + primary source is evidence.
RWI — Reliability Weighted Index
A four-tier evidence classification system. Each source is scored on proximity to primary documentation and independence from the claim it supports. Tier 1 governs. Tier 4 is flagged.
Source Credibility Laundering
Embedding contested claims within credible-appearing institutional sourcing to borrow legitimacy without earning it. Each step in the chain presents as credible. None announces itself as advocacy.
זִכּוֹר · ZICHOR · REMEMBER

Forensic verification is not the opposite of memory. It is memory's defense.

The most dangerous epistemic threat to historical truth is not the outright lie — it is the well-sourced, institutionally laundered, emotionally resonant distortion that presents itself as scholarship.

HevrutAI was built in the tradition of hevruta — paired adversarial study — because the Talmudic sages understood something that modern media literacy is only beginning to recover: truth is not asserted. It is stress-tested. It survives pressure, or it doesn't survive at all.

The forensic work and the covenantal work are the same work. The only question is which door you came through.

Enter the Full Site →

Enter the Framework

The HevrutAI forensic dashboard is in active development at hevrutai.lovable.app. The methodology documentation, Opposition Library case files, and workshop curriculum are available now. The verification protocol does not require software to function — it requires rigor. That exists.

Development status: The forensic dashboard is live and operational at hevrutai.lovable.app with the full 28-Facet Machloket Protocol and Opposition Library cases OPP-LIB-001 through OPP-LIB-015. OPP-LIB-016 through OPP-LIB-020 are documented and in queue for integration. This page reflects the methodology as it exists — no vaporware, no overpromise.