. 24/7 Space News .
CYBER WARS
Uncovering the Who, Why, and How Behind Manipulated Media
by Staff Writers
Washington DC (SPX) Sep 05, 2019

Program seeks to develop technologies capable of automating the detection, attribution, and characterization of falsified media assets

The threat of manipulated multi-modal media - which includes audio, images, video, and text - is increasing as automated manipulation technologies become more accessible, and social media continues to provide a ripe environment for viral content sharing. The creators of convincing media manipulations are no longer limited to groups with significant resources and expertise. Today, an individual content creator has access to capabilities that could enable the development of an altered media asset that creates a believable, but falsified, interaction or scene.

"At the intersection of media manipulation and social media lies the threat of disinformation designed to negatively influence viewers and stir unrest," said Dr. Matt Turek, a program manager in DARPA's Information Innovation Office (I2O).

"While this sounds like a scary proposition, the truth is that not all media manipulations have the same real-world impact. The film industry has used sophisticated computer generated editing techniques for years to create compelling imagery and videos for entertainment purposes.

"More nefarious manipulated media has also been used to target reputations, the political process, and other key aspects of society. Determining how media content was created or altered, what reaction it's trying to achieve, and who was responsible for it could help quickly determine if it should be deemed a serious threat or something more benign."

While statistical detection techniques have been successful in uncovering some media manipulations, purely statistical methods are insufficient to address the rapid advancement of media generation and manipulation technologies. Fortunately, automated manipulation capabilities used to create falsified content often rely on data-driven approaches that require thousands of training examples, or more, and are prone to making semantic errors. These semantic failures provide an opportunity for the defenders to gain an advantage.

The Semantic Forensics (SemaFor) program seeks to develop technologies that make the automatic detection, attribution, and characterization of falsified media assets a reality. The goal of SemaFor is to develop a suite of semantic analysis algorithms that dramatically increase the burden on the creators of falsified media, making it exceedingly difficult for them to create compelling manipulated content that goes undetected.

To develop analysis algorithms for use across media modalities and at scale, the SemaFor program will create tools that, when used in conjunction, can help identify, deter, and understand falsified multi-modal media. SemaFor will focus on three specific types of algorithms: semantic detection, attribution, and characterization.

Semantic detection algorithms will determine if multi-modal media assets were generated or manipulated, while attribution algorithms will infer if the media originated from a purported organization or individual. Determining how the media was created, and by whom could help determine the broader motivations or rationale for its creation, as well as the skillsets at the falsifier's disposal. Finally, characterization algorithms will reason about whether multi-modal media was generated or manipulated for malicious purposes.

"There is a difference between manipulations that alter media for entertainment or artistic purposes and those that alter media to generate a negative real-world impact. The algorithms developed on the SemaFor program will help analysts automatically identify and understand media that was falsified for malicious purposes," said Turek.

SemaFor will also develop technologies to enable human analysts to more efficiently review and prioritize manipulated media assets. This includes methods to integrate the quantitative assessments provided by the detection, attribution, and characterization algorithms to prioritize automatically media for review and response.

To help provide an understandable explanation to analysts, SemaFor will also develop technologies for automatically assembling and curating the evidence provided by the detection, attribution, and characterization algorithms. Throughout the life of the program, the SemaFor technologies will be evaluated against a set of increasingly difficult challenge problems that are representative of new or emerging threat scenarios.

More information about the program is available in the Broad Agency Announcement that is posted on FedBizOpps.gov


Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being there;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Monthly Supporter
$5+ Billed Monthly


paypal only
SpaceDaily Contributor
$5 Billed Once


credit card or paypal


CYBER WARS
Huawei denies US allegations of technology theft
Paris (AFP) Sept 3, 2019
Beleaguered Chinese telecom giant Huawei on Tuesday denied accusations reported in the Wall Street Journal that it stole technology from a Portuguese inventor, accusing him of "taking advantage of the current geopolitical situation." The US Department of Justice is looking into the claim, potentially adding to existing criminal cases against Huawei, the WSJ reported last week. Huawei - considered the world leader in superfast 5G equipment and the world's number two smartphone producer - was i ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Circus reinvented in Montreal, this time with high-tech vibe

China's satellite tests pulsar navigation for future deep space exploration

India not poor, has resources for space program says ISRO chief

Spacecraft carrying Russian humanoid robot docks at ISS

CYBER WARS
Arianespace will launch Ovzon-3 satellite

NASA prepares for green run testing, practices lifting SLS Core Stage

China's first medium-scale launcher with LOX LCH4 propellants ZQ-2 soliciting payloads worldwide

New Delhi in Talks With Moscow Over Rocket Engines for Indian Space Program

CYBER WARS
NASA engineers attach Mars Helicopter to Mars 2020 rover

NASA Invites Students to Name Next Mars Rover

NASA's Mars Helicopter Attached to Mars 2020 Rover

ExoMars rover ready for environment testing

CYBER WARS
China's KZ-1A rocket launches two satellites

China's newly launched communication satellite suffers abnormality

China launches first private rocket capable of carrying satellites

Chinese scientists say goodbye to Tiangong-2

CYBER WARS
Cutting-edge Chinese satellite malfunctions after launch

Private Chinese firms tapping international space market

ESA and GomSpace Luxembourg sign contract for continued constellation management development

New Iridium Certus transceiver for faster satellite data now in live testing

CYBER WARS
ESA spacecraft dodges large constellation

China's Tianhe-2 Supercomputer to Crunch Space Data From New Radio Telescope

Chipping away at how ice forms could keep windshields, power lines ice-free

In praise of the big pixel: Gaming is having a retro moment

CYBER WARS
Deep-sea sediments reveal solar system chaos: An advance in dating geologic archives

Exoplanets Can't Hide Their Secrets from Innovative New Instrument

Hints of a volcanically active exomoon

Canadian astronomers determine Earth's fingerprint

CYBER WARS
ALMA shows what's inside Jupiter's storms

Young Jupiter was smacked head-on by massive newborn planet

Mission to Jupiter's icy moon confirmed

Giant Impact Disrupted Jupiter's Core









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.