Sources are not interchangeable CORE
A research agent that returns eight sources has not done research. It has done retrieval. What turns retrieval into research is the part where a human — you — treats those eight sources as eight different kinds of evidence and weighs them differently.
Three source tiers cover most of what you will see. Learn the distinctions; they will shape every triangulation call you make.
Primary sources are the original record of the thing. A bill’s actual text. A scientific paper reporting original research. A product’s own pricing page. A court’s opinion. An interview transcript. A dataset. Primary sources are the closest you can get to the thing itself; they are not interpretations of the thing. When you can cite a primary source, you usually should — it is the most defensible evidence.
Secondary sources are competent interpretations of primary sources by a human or institution that did real work: an investigative news article, a literature review, a reputable industry report, a well-researched book. They are not the thing, but they are close readers of the thing, and they explain it. Most good secondary sources cite the primary sources they are reading. A well-written brief usually relies on a mix of primary sources (for claims you need to stand behind) and secondary sources (for context and interpretation).
Tertiary sources summarize secondary and primary sources without original analysis. Wikipedia, encyclopedia entries, textbooks, overview sites. Useful for orientation — getting you into the shape of a topic fast — but rarely the right place to end. A research brief whose footnotes are all tertiary is a brief resting on interpretations of interpretations.
The rule of thumb: orient with tertiary, work with secondary, land on primary when it matters. If a claim is load-bearing — if its being wrong would sink the brief — chase it back to a primary source. If it is background color, a secondary source is fine. If it is a single term definition, tertiary is fine.
This is not a hierarchy of trustworthiness — a careful secondary source is often more useful than a sloppy primary one, and a clear tertiary source beats a confused primary one. It is a hierarchy of closeness to the claim. The closer you are, the more the claim you make is yours to defend; the farther, the more you are borrowing someone else’s defense.
Triangulation: the three questions CORE
Once you have a set of retrieved sources sorted into tiers, triangulation is the move that turns the set into an answer. Triangulation answers three questions about every important claim.
Is this supported by more than one independent source? Independent matters. If three news articles all cite the same press release, you have one source pretending to be three. If two academic papers from the same lab report the same finding, that is weaker than two papers from two unrelated labs. Count independent sources.
Do the sources agree? If they agree, note it and move on. If they disagree, do not paper over it — the disagreement is the story. Name it in the brief. Say which sources take which position and why (often the why is methodological — they measured different things — or temporal — one is newer). A research brief that pretends disagreement does not exist is less useful than one that names it honestly.
If a claim rests on only one source, what kind of source is it? A single primary source can be enough for some claims (the product’s pricing page for what the product costs). A single secondary source is rarely enough for a contested claim. A single tertiary source is almost never enough. If a load-bearing claim rests on one source, your job is either to find another or to mark the claim as “per [Source X]” so the reader knows the weight.
The triangulation output looks something like this in your notes:
Claim: The four-day school week is associated with lower academic outcomes in middle school.
Supported by: two studies in peer-reviewed journals (Thompson 2023, Garcia & Lee 2024); one RAND brief summarizing both.
Disagreement: the Oklahoma State Department of Education report (2024) argues the effect disappears when district-level controls are added.
Weight: moderate — two independent studies support it; one methodological critique complicates it; a careful brief should name both.
That is triangulation. Not “I found some sources.” This is the claim; this is what is under it; this is where it disagrees with itself. A research agent can produce a rough draft of this. You check every line by opening the sources.
Four patterns of a fabricated citation CORE
Language models confidently produce citations that do not exist. This is well documented, happens in the Cowork tab and in every comparable research-agent tool, and is the number-one failure mode of research agents. You must assume it will happen in your own work and build the habit that catches it.
Four patterns cover most fabrications.
1. The completely invented source. A fake paper title, by a fake author, in a real-sounding journal, with a year and page numbers. Sometimes the DOI or URL will even resolve to something — rarely the claimed paper. The smell test: you cannot find the source when you search its exact title. The agent occasionally produces a quote from this non-existent paper that is rhetorically perfect for the claim, which is another tell — real sources rarely contain a single sentence that ideally supports a specific argument.
2. The real source, fabricated quote. The paper exists. The author exists. The year and journal are correct. The quotation the agent produces is not in the paper. This one is especially insidious because the reader who checks the top of the citation and does not read the paper itself will see a real title-author-year combination and trust the quote. Defense: open the source and find the quote. If you cannot find it, it is not in there.
3. The real source, misrepresented finding. The paper exists. The citation is correct. But the claim the brief attributes to it is not what the paper says — or is what the paper explicitly argues against. This is the hardest fabrication to catch because it requires reading the source carefully enough to see what it actually claims. Defense: read the abstract and the conclusion at minimum.
4. The URL that does not exist, or the URL that is not what was claimed. The agent cites https://example.gov/report-2024.pdf as supporting a claim. The URL 404s. Or the URL loads a page that is not about the claimed topic at all. Defense: open every URL. This is cheap and fast.
Pattern 1 is catchable by search. Pattern 4 is catchable by clicking. Patterns 2 and 3 require opening and reading — which is, again, why the rule is you do not cite what you have not opened.
The open-before-cite checklist CORE
This is the operational drill for Module 4 and the heart of the module’s safety norm. For every source that will appear in a final research output, run the following four-step check. On every source. Every time.
1. Open it. Actually open the URL in a browser, or actually read the file. If the URL does not load, or the file does not exist, the source is dropped from the brief. (Do not “keep looking” for the right URL — the agent may have invented the whole thing.)
2. Confirm the source is what it says it is. Is the author real? Is the publication real? Is the date real? A thirty-second sanity check: search the author’s name, see if the publication exists and is reputable, check the page is actually on the publication’s real site and not a typo-squat.
3. Find the claim the brief attributes to this source. Skim the source for the specific sentence or finding the brief is using it for. If the claim is not in the source, the source is dropped. If the claim is partially in the source but the brief is overstating it, rewrite the brief’s sentence to match what the source actually says.
4. Mark the source in your notes. In your source list (the folder you are saving sources to, per the recipe below), mark each source as opened-and-confirmed, opened-and-dropped, or not-yet-opened. A source that is not-yet-opened at the time of shipping does not get cited. Full stop.
This is a short, bounded investment per research output. It is the only investment in this module that cannot be delegated to the agent. And it is the one that decides whether your work is trustworthy or is plausible-looking fiction.
The fact-check memo CORE
Your capstone entry 2 is a fact-check memo on your own topic. A fact-check memo is a short, source-anchored document that answers one bounded question: “Is claim X, as stated, actually true?”
Fact-check memos are useful in a way that full briefs are not: they force you to take one claim seriously, open every source that bears on it, and deliver a verdict rather than a summary. They also demonstrate the open-before-cite habit at its sharpest, because the whole point of the document is whether the evidence holds.
The shape:
- The claim under check, quoted or paraphrased in one sentence, with its source (where you first heard it).
- Verdict, in one word: true, partially true, unclear, false, or unsupported.
- Evidence, 300–600 words, in which you list every source you checked (by tier), describe what each one says about the claim, triangulate, and explain your verdict.
- Confidence, one line: low, medium, or high. Say why.
- What would change your mind. One sentence: what piece of evidence, if it appeared, would move you off the verdict.
That last line is the integrity line. It forces you to name the thing you would need to see to change your answer. If you cannot name anything, your verdict is religious, not research.
Pick one specific contested claim inside your Module 4 topic. Not the topic itself — one claim inside it. For the solar-panels topic it might be “Ohio utilities will buy back excess generation at the full retail rate.” For the curriculum topic it might be “Beast Academy covers the 7th-grade math standards by the end of its sequence.” For the Reconstruction paper it might be “The Civil Rights Cases of 1883 were decided 8–1.” Claims with a yes / no / partially answer make the best fact-check memos.
Run the checklist on every source. Drop sources the checklist fails. Write the memo against the sources that remain.
Saving sources to a local folder RECIPE
| Tool | Claude desktop app — Cowork tab (primary). Optional advanced: Claude Code CLI. |
| Last verified | 2026-04-17 |
| Next review | 2026-07-17 |
| OSes | macOS, Windows |
Full versioned walkthrough lives in the Recipe Book under saving-sources-to-a-local-folder. The convention for Module 4: every source you actually open goes into a folder you own — not just a link inside the agent’s conversation. A source the student has not saved is a source the student has not opened.
Folder layout
Initialize source-list.md from the template. Copy /resources/module-04/source-list-template.md to source-list.md in your topic folder before you start saving sources — that template has the right column structure (URL, title, author, date, tier, status) so you don't have to invent it.
Saving a web page to your sources folder
The mechanic varies a little by browser. Pick the path for the browser you actually use:
- Chrome / Edge: right-click the page → Save as… → pick “Webpage, Complete” (or “Webpage, Single File .mhtml” for one-file portability) → save into the right sources/ subfolder.
- Safari (Mac): File → Save As… → format “Web Archive” (saves the page as a single .webarchive file) or “Page Source” (HTML only) → save into the right subfolder.
- Firefox: Ctrl-S / Cmd-S → format “Web Page, complete” → save into the right subfolder.
For PDFs, just download the PDF directly. For pages that resist saving (paywalls, JavaScript-heavy apps), copy the URL and the relevant excerpt into a .md file you create yourself in the right sources/ subfolder — a Markdown note with the quote and the URL is also a valid record.
In the Cowork tab
- When the agent retrieves a source you want to keep, copy the URL, open it in your browser, and use your browser's Save Page As → Webpage Complete to save a local copy to sources/primary/, secondary/, or tertiary/ depending on tier.
- Ask the Cowork tab to update your source-list.md with the new entry: URL, title, author, date, tier, and status (not-yet-opened, opened-and-confirmed, opened-and-dropped). Check that it wrote the row correctly.
- After you open-and-confirm a source, update its status yourself — do not let the agent update it for you. The status field is your attestation that you read it.
Optional advanced — In the Claude Code CLI. Same shape, terminal interface. Click to expand if you set up the CLI in Lesson 2.4.
-
Ask the CLI to fetch the source content into the right folder:
Save the content of <url> to sources/secondary/<short-title>.mdand add an entry to source-list.md with status ‘not-yet-opened’.
- Open the saved file in your editor and read it. (The CLI can summarize the file for you, but the confirm step is still yours.)
- Update the status in source-list.md to opened-and-confirmed or opened-and-dropped. Commit the change to git if you initialized git in your topic folder — the commit log is your audit trail for the brief.
Safe default
When in doubt, drop the source. A three-source brief with all three opened is worth more than a ten-source brief where seven were trusted on the agent’s word.
Try it — Find the fabricated citation CORE
interactive drill · launch the fabricated-citation drill →
The course ships a deliberately adversarial activity. Three short research briefs have been pre-generated on three topics — none of them your topic; these are the drill topics. Each brief is about 400 words and has between 5 and 8 footnotes. At least one fabricated citation is present across the three briefs. You are not told which brief or which citation.
Using nothing but the open-before-cite checklist:
- For each of the three briefs, open each citation.
- For each citation, record: does the URL resolve? Is the source what it claims to be? Is the quoted or paraphrased claim actually in the source?
- Flag every citation that fails any of the four checks. Write a one-sentence note explaining the specific failure.
At the end of the activity, check your flags against the answer key (shipped with the activity). If you missed a fabrication, read the one you missed and ask yourself: what check would have caught it? Add that failure mode to the Open-Before-Cite checklist you keep in your notes.
Deliverable. Your flagged list and your one-sentence explanations. Save as fabricated-citation-drill-results.md in your Module 4 portfolio — it is a useful reference when you run open-before-cite on your own topic’s sources.
Done with the hands-on?
When the recipe steps and any activity above are complete, mark this stage to unlock the assessment, reflection, and project checkpoint.
Quick check
Five questions. Tap a question to reveal the answer and the reasoning.
Show explanation
Answer: C. The three articles are not independent; they are the same source repeated. Independence is what gives triangulation its strength. The press release is the one independent source here, and a careful brief would cite it directly rather than citing the articles that quote it. A is the error the lesson warns against. B counts the press release separately from the articles but still overcounts. D has no principled basis.
Show explanation
Answer: C. All four fabrication patterns are real and all four need defenses, but misrepresented finding is the one that survives the most casual checks. Searching the title finds the paper. Checking the author finds a real person. Opening the URL resolves. Only reading the paper carefully enough to compare its actual argument to the brief’s claim catches the misrepresentation. A is catchable by title search. B is catchable by searching the quote in the paper. D is catchable by clicking. C is catchable only by reading.
Show explanation
Answer: B. This is the honest response. Tertiary sources are fine for orientation and can be fine for bounded claims (a date, a definition), but a load-bearing claim — one whose being wrong would sink the brief — should rest on something closer to the thing itself. The fix is to chase the claim into a primary or secondary source, or to name the limitation in the brief. A is the credulity trap. C is needlessly destructive. D hands the call to the agent, which cannot weigh it.
Show explanation
Answer: C. The rule — you do not cite what you have not opened — is uniform and without exception. A is the failure the rule exists to prevent. B is self-defeating: a citation that says “I did not read this” is not a citation, it is an admission. D would create a tier-based exception that the rule does not have. If you are time-pressed, ship with fewer sources, not with unopened ones.
Show explanation
Answer: C. This is the integrity check of the fact-check memo. A student who can name exactly what would change their verdict is holding the verdict on evidentiary grounds; a student who cannot is holding it religiously, and the memo should be redrafted until the student can name the change condition. A is decorative. B misreads it — it is not a hedge, it is a commitment. D misses the purpose.
Reflection prompt
How many fabrications did you miss — and what is your honest open count?
In 6–8 sentences: In the fabricated-citation drill, did you miss any fabrications on your first pass? If so, which pattern was it — invented source, fake quote, misrepresented finding, or dead URL — and what check would have caught it? If you caught them all, which pattern felt closest to slipping past? For your own topic: how many of the sources the agent has retrieved for your fact-check memo have you actually opened by this point? What is the honest number?
The honest-number line is the one that matters. Most students arrive at this point with more sources than they have opened, and that is the gap the module is here to close. The rest of Module 4 treats the honest number as the only number that counts.
Project checkpoint
Ship capstone-entry-2-draft.md with a clean source list.
You now have:
- capstone-entry-1-draft.md — your scoping brief from Lesson 4.2.
- capstone-entry-2-draft.md — your fact-check memo from this lesson, with every source run through the open-before-cite checklist.
- A source-list.md file in your Module 4 topic folder, with every source marked as opened-and-confirmed or opened-and-dropped. No not-yet-opened entries survived into the memo.
Confirm all three before moving on to Lesson 4.4. If your source list still has unopened entries that the memo relies on, fix it now. This is the non-negotiable habit of the module.
Next in Module 4
Lesson 4.4 — Synthesis: from findings to usable output.
The synthesis move — turning a triangulated set of findings into a brief a real reader can use, without smoothing the disagreement out of the data. You will write the synthesis plan and first draft as capstone-entry-3-draft.md.