Energy News  
CYBER WARS
Software unveiled to tackle online extremism, violence
By Rob Lever
Washington (AFP) June 17, 2016


A software tool unveiled Friday aims to help online firms quickly find and eliminate extremist content used to spread and incite violence and attacks.

The Counter Extremism Project, a nongovernment group based in Washington, proposed its software be used in a system similar to one used to prevent the spread on online child pornography.

The software was developed by Dartmouth University computer scientist Hany Farid, who also worked on the PhotoDNA system now widely used by Internet companies to stop the spread of content showing sexual exploitation or pornography involving children.

But social media firms have yet to commit to using the tool for extremist content, and some are skeptical about it, according to an industry source.

The announcement comes amid growing concerns about radical jihadists using social networks to diffuse violent and gruesome content and recruit people for attacks.

"We think this is the technological solution to combat online extremism," said Mark Wallace, chief executive of the organization that includes former diplomats and public officials from the United States and other countries.

The group proposed the creation of an independent "National Office for Reporting Extremism" that would operate in a similar fashion to the child pornography center -- identifying and flagging certain content to enable online firms to automatically remove it.

This system, if adopted by Internet firms, "would go a long way to making sure than online extremist is no longer pervasive," Wallace said during a conference call with journalists.

He said it could be useful in stopping the "viral" spread of videos of beheadings and killings such as those produced by the Islamic State group.

Wallace said he expects "robust debate" on what is acceptable content but added that "I think we could agree that the beheading videos, the drowning videos, the torture videos... should be removed."

- Faster action -

Farid, who also spoke on the call, said he believes the new system would be an effective tool for companies that must now manually review each complaint on objectionable content.

"We are simply developing a technology that allows companies to accurately and effectively enforce their terms of service," Farid said.

"They do it anyway, but it's slow."

Farid said he developed the software with a grant from Microsoft, and that he and the Counter Extremism Project would work to provide it to online companies.

The system is based on "robust hashing" or finding so-called digital signatures of content of text, images, audio and video that can be tracked to enable platforms to identify and stop content from being posted or reposted.

"The technology has been developed, it has been tested and we are in the final stages of engineering to get it ready for deployment," Farid said. "We're talking about a matter of months."

Social networks have long stressed they will help legitimate investigations of crimes and attacks, but have resisted efforts to police or censor the vast amounts content flowing through them.

But governments in the United States, France and elsewhere have been pressing online firms to do more to curb extremist content.

And a lawsuit filed on behalf of a victim in the 2015 Paris attacks seeks to hold Facebook, Google and Twitter liable for the violence.

"Without defendants Twitter, Facebook and Google (YouTube), the explosive growth of (the Islamic State group) over the last few years into the most-feared terrorist group in the world would not have been possible," said the lawsuit filed by the family of Nohemi Gonzalez, killed in Paris.

A tech industry representative, who asked not to be identified, said social media firms had concerns, including about privacy and the effectiveness of the tool.

"Child pornography is very different from extremist content," according to the source, summarizing tech firms' views.

"Participants were understandably concerned about which governments would be able to impose their definition of terrorist. Saudi Arabia? Russia? China?" the industry representative said.

Discussions were held earlier this year in a conference call, the source said, but no agreement was reached with the tech firms before Friday's announcement.

"That tells us that they weren't able to build a consensus among the companies, and that CEP is more interested in grandstanding for press coverage than actually getting something done," the source said.

"They can't accuse the tech companies of treason and then expect to get invited over for dinner the next day."

rl/oh

Twitter

GOOGLE

MICROSOFT

Facebook


Thanks for being here;
We need your help. The Space Media Network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceMediaNetwork Contributor
$5 Billed Once


credit card or paypal
SpaceMediaNetwork Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
'Hack the Pentagon' program reveals 138 security flaws: US
Washington (AFP) June 18, 2016
Hackers invited by the US government as part of a pilot program to find flaws with five Pentagon websites discovered 138 security vulnerabilities, Defense Secretary Ash Carter said Friday. The "Hack the Pentagon" event, the first "bug bounty" in the history of the federal government, attracted 1,410 computer-savvy Americans, according to the Defense Department. The program cost $150,000, wit ... read more


CYBER WARS
Bioenergy integrated in the bio-based economy crucial to meet climate targets

Chemicals from wood waste

New 3-D printed polymer can convert methane to methanol

Nissan bets on ethanol for fuel-cell vehicles

CYBER WARS
OPDE builds three community solar farms in UK with a total capacity of 15 MW

New generation of high-efficiency solar thermal absorbers developed

World Bank finds cash moving to renewables

Novel capping strategy improves stability of perovskite nanocrystals

CYBER WARS
Renewables getting cheaper, report finds

Gamesa, Siemens join forces to create global wind power leader

Germany slows pace of green energy transition

Ireland aims for greener future

CYBER WARS
Norway MPs vote to go carbon neutral by 2030

Algorithm could help detect and reduce power grid faults

It pays to increase energy consumption

Changing the world, 1 fridge at a time

CYBER WARS
Loofah-based material could give lithium batteries a boost

A new way to control oxygen for electronic properties

Efficient hydrogen production made easy

Storage technologies for renewable energy can pay off

CYBER WARS
New planet is largest discovered that orbits 2 suns

Cloudy Days on Exoplanets May Hide Atmospheric Water

Likely new planet may be in slow death spiral

On exoplanets, atmospheric water may be hiding behind clouds

CYBER WARS
USS Zumwalt completes acceptance trials

Less is More: Russia Opts for Lower-Cost but More Capable Navy

Jacobs Engineering conducts T4S work for Navy

Spanish frigate heads to Norfolk for combat tests

CYBER WARS
Musk explains his 'cargo route' to Mars

Remarkably diverse flora in Utah, USA, trains scientists for future missions on Mars

NASA Mars Orbiters Reveal Seasonal Dust Storm Pattern

Study of Opportunity Wheel Scuff Continues









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.