. Military Space News .
CYBER WARS
Software unveiled to tackle online extremism, violence
By Rob Lever
Washington (AFP) June 17, 2016


A software tool unveiled Friday aims to help online firms quickly find and eliminate extremist content used to spread and incite violence and attacks.

The Counter Extremism Project, a nongovernment group based in Washington, proposed its software be used in a system similar to one used to prevent the spread on online child pornography.

The software was developed by Dartmouth University computer scientist Hany Farid, who also worked on the PhotoDNA system now widely used by Internet companies to stop the spread of content showing sexual exploitation or pornography involving children.

But social media firms have yet to commit to using the tool for extremist content, and some are skeptical about it, according to an industry source.

The announcement comes amid growing concerns about radical jihadists using social networks to diffuse violent and gruesome content and recruit people for attacks.

"We think this is the technological solution to combat online extremism," said Mark Wallace, chief executive of the organization that includes former diplomats and public officials from the United States and other countries.

The group proposed the creation of an independent "National Office for Reporting Extremism" that would operate in a similar fashion to the child pornography center -- identifying and flagging certain content to enable online firms to automatically remove it.

This system, if adopted by Internet firms, "would go a long way to making sure than online extremist is no longer pervasive," Wallace said during a conference call with journalists.

He said it could be useful in stopping the "viral" spread of videos of beheadings and killings such as those produced by the Islamic State group.

Wallace said he expects "robust debate" on what is acceptable content but added that "I think we could agree that the beheading videos, the drowning videos, the torture videos... should be removed."

- Faster action -

Farid, who also spoke on the call, said he believes the new system would be an effective tool for companies that must now manually review each complaint on objectionable content.

"We are simply developing a technology that allows companies to accurately and effectively enforce their terms of service," Farid said.

"They do it anyway, but it's slow."

Farid said he developed the software with a grant from Microsoft, and that he and the Counter Extremism Project would work to provide it to online companies.

The system is based on "robust hashing" or finding so-called digital signatures of content of text, images, audio and video that can be tracked to enable platforms to identify and stop content from being posted or reposted.

"The technology has been developed, it has been tested and we are in the final stages of engineering to get it ready for deployment," Farid said. "We're talking about a matter of months."

Social networks have long stressed they will help legitimate investigations of crimes and attacks, but have resisted efforts to police or censor the vast amounts content flowing through them.

But governments in the United States, France and elsewhere have been pressing online firms to do more to curb extremist content.

And a lawsuit filed on behalf of a victim in the 2015 Paris attacks seeks to hold Facebook, Google and Twitter liable for the violence.

"Without defendants Twitter, Facebook and Google (YouTube), the explosive growth of (the Islamic State group) over the last few years into the most-feared terrorist group in the world would not have been possible," said the lawsuit filed by the family of Nohemi Gonzalez, killed in Paris.

A tech industry representative, who asked not to be identified, said social media firms had concerns, including about privacy and the effectiveness of the tool.

"Child pornography is very different from extremist content," according to the source, summarizing tech firms' views.

"Participants were understandably concerned about which governments would be able to impose their definition of terrorist. Saudi Arabia? Russia? China?" the industry representative said.

Discussions were held earlier this year in a conference call, the source said, but no agreement was reached with the tech firms before Friday's announcement.

"That tells us that they weren't able to build a consensus among the companies, and that CEP is more interested in grandstanding for press coverage than actually getting something done," the source said.

"They can't accuse the tech companies of treason and then expect to get invited over for dinner the next day."

rl/oh

Twitter

GOOGLE

MICROSOFT

Facebook


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
'Hack the Pentagon' program reveals 138 security flaws: US
Washington (AFP) June 18, 2016
Hackers invited by the US government as part of a pilot program to find flaws with five Pentagon websites discovered 138 security vulnerabilities, Defense Secretary Ash Carter said Friday. The "Hack the Pentagon" event, the first "bug bounty" in the history of the federal government, attracted 1,410 computer-savvy Americans, according to the Defense Department. The program cost $150,000, wit ... read more


CYBER WARS
Japan Plans to Improve Defense Against N Korean Missiles Within 5 Years

Raytheon awarded $365 million Aegis contract

Lockheed receives Aegis development contract

Harris continues support services for missile defense systems

CYBER WARS
Roketsan, Airbus sign MOU on Cirit missiles for H145M

Below the Radar: Russia's S-400, S-500 Set to Become Invisible to Enemies

Lockheed gets $331.8 million GMLRS rocket contract

Javelin missile scores perfect in U.K. land vehicle tests

CYBER WARS
Gabon set to order Nexter UAV and recon robots

Russian Top Secret Hypersonic Glider Can Penetrate Any Missile Defense

Predator C Avenger gets boost in ISR capabilities

Johns Hopkins team makes hobby drones crash to expose design flaws

CYBER WARS
MUOS-5 Secure Communications Satellite Encapsulated for June 24 Launch

Saab debuts Giraffe 1X antenna at Eurosatory

Thales debuts new Synaps combat radio system

Air Force receives Rockwell Collins receivers

CYBER WARS
New laser range finder makes debut

Telephonics gets Oshkosh JLTV contract

Rheinmetall intros new Lynx infantry fighting vehicle

Logos' Serenity threat system now tower mounted

CYBER WARS
CAE gets $111 million in UAE defense contracts

Guns, not roses: Conflicts fire up Bulgaria arms trade

Senators look to block U.S. sale of bombs to Saudis for bombing of Yemen

US Navy admiral admits he lied in massive bribery scandal

CYBER WARS
China promotes EU ambitions of key trade partner Serbia

Indonesia cites error as ASEAN meeting ends in confusion

Germany slams NATO 'warmongering' on Russia

Norway aims to boost defences against 'unpredictable' Russia

CYBER WARS
DNA shaping up to be ideal framework for rationally designed nanostructures

New 'ukidama' nanoparticle structure revealed

Shaping atomically thin materials in suspended structures

Nanoparticles and bioremediation can decontaminate polluted soils









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.