Solar Energy News  
CYBER WARS
Uncovering the Who, Why, and How Behind Manipulated Media
by Staff Writers
Washington DC (SPX) Sep 05, 2019

Program seeks to develop technologies capable of automating the detection, attribution, and characterization of falsified media assets

The threat of manipulated multi-modal media - which includes audio, images, video, and text - is increasing as automated manipulation technologies become more accessible, and social media continues to provide a ripe environment for viral content sharing. The creators of convincing media manipulations are no longer limited to groups with significant resources and expertise. Today, an individual content creator has access to capabilities that could enable the development of an altered media asset that creates a believable, but falsified, interaction or scene.

"At the intersection of media manipulation and social media lies the threat of disinformation designed to negatively influence viewers and stir unrest," said Dr. Matt Turek, a program manager in DARPA's Information Innovation Office (I2O).

"While this sounds like a scary proposition, the truth is that not all media manipulations have the same real-world impact. The film industry has used sophisticated computer generated editing techniques for years to create compelling imagery and videos for entertainment purposes.

"More nefarious manipulated media has also been used to target reputations, the political process, and other key aspects of society. Determining how media content was created or altered, what reaction it's trying to achieve, and who was responsible for it could help quickly determine if it should be deemed a serious threat or something more benign."

While statistical detection techniques have been successful in uncovering some media manipulations, purely statistical methods are insufficient to address the rapid advancement of media generation and manipulation technologies. Fortunately, automated manipulation capabilities used to create falsified content often rely on data-driven approaches that require thousands of training examples, or more, and are prone to making semantic errors. These semantic failures provide an opportunity for the defenders to gain an advantage.

The Semantic Forensics (SemaFor) program seeks to develop technologies that make the automatic detection, attribution, and characterization of falsified media assets a reality. The goal of SemaFor is to develop a suite of semantic analysis algorithms that dramatically increase the burden on the creators of falsified media, making it exceedingly difficult for them to create compelling manipulated content that goes undetected.

To develop analysis algorithms for use across media modalities and at scale, the SemaFor program will create tools that, when used in conjunction, can help identify, deter, and understand falsified multi-modal media. SemaFor will focus on three specific types of algorithms: semantic detection, attribution, and characterization.

Semantic detection algorithms will determine if multi-modal media assets were generated or manipulated, while attribution algorithms will infer if the media originated from a purported organization or individual. Determining how the media was created, and by whom could help determine the broader motivations or rationale for its creation, as well as the skillsets at the falsifier's disposal. Finally, characterization algorithms will reason about whether multi-modal media was generated or manipulated for malicious purposes.

"There is a difference between manipulations that alter media for entertainment or artistic purposes and those that alter media to generate a negative real-world impact. The algorithms developed on the SemaFor program will help analysts automatically identify and understand media that was falsified for malicious purposes," said Turek.

SemaFor will also develop technologies to enable human analysts to more efficiently review and prioritize manipulated media assets. This includes methods to integrate the quantitative assessments provided by the detection, attribution, and characterization algorithms to prioritize automatically media for review and response.

To help provide an understandable explanation to analysts, SemaFor will also develop technologies for automatically assembling and curating the evidence provided by the detection, attribution, and characterization algorithms. Throughout the life of the program, the SemaFor technologies will be evaluated against a set of increasingly difficult challenge problems that are representative of new or emerging threat scenarios.

More information about the program is available in the Broad Agency Announcement that is posted on FedBizOpps.gov


Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Huawei denies US allegations of technology theft
Paris (AFP) Sept 3, 2019
Beleaguered Chinese telecom giant Huawei on Tuesday denied accusations reported in the Wall Street Journal that it stole technology from a Portuguese inventor, accusing him of "taking advantage of the current geopolitical situation." The US Department of Justice is looking into the claim, potentially adding to existing criminal cases against Huawei, the WSJ reported last week. Huawei - considered the world leader in superfast 5G equipment and the world's number two smartphone producer - was i ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Researchers use AI to plot green route to nylon

New catalytic reactor turns CO2 into liquid fuel

Dangerous wild grass will be used in batteries

Biomaterials smarten up with CRISPR

CYBER WARS
'Sense of urgency', as top tech players seek AI ethical rules

CIMON back on Earth after 14 months on the ISS

NASA Robots Compete Underground in DARPA Challenge

Russian humanoid robot boards space station after delay

CYBER WARS
Colombia's biggest wind power portfolio purchased by AES Colombia

Growth of wind energy points to future challenges, promise

Scout obtains construction permit for 200MW Sweetland Wind Farm

E.ON announces 440 MW southern Texas windfarm

CYBER WARS
DLR at IAA New Mobility World 2019

Brussels mulls car use tax to cut traffic jams

Singapore to trial driverless buses booked with an app

Seoul to fine Volkswagen over 'illicit' emissions devices

CYBER WARS
Breakthrough enables storage and release of mechanical waves without energy loss

Physicists' study demonstrates silicon's energy-harvesting power

Ammonia for fuel cells

New technique could streamline design of intricate fusion device

CYBER WARS
Russia launches floating nuclear reactor in Arctic despite warnings

US Govt issues new safety rules for launching nuclear systems into space

Slovenia PM backs building second nuclear reactor

Seven bidders compete to fund Bulgaria nuclear project

CYBER WARS
Macro-energy systems and the science of the energy transition

Oslo wants to reduce its emissions by 95 percent by 2030

Northern Irish pensioner thrives in off grid cottage

Global warming = more energy use = more warming

CYBER WARS
Brazil president will make video call to Amazon summit

Fires not the only threat facing Amazon

Defiant Bolsonaro vows to defend Amazon policy 'in wheelchair' at UN

G7 pledges millions to fight Amazon fires









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.