Stories
Slash Boxes
Comments

SoylentNews is people

posted by chromas on Friday August 28 2020, @04:50PM   Printer-friendly
from the operation-google-2:-electric...google-fu dept.

One Database to Rule Them All: The Invisible Content Cartel that Undermines the Freedom of Expression Online:

Every year, millions of images, videos and posts that allegedly contain terrorist or violent extremist content are removed from social media platforms like YouTube, Facebook, or Twitter. A key force behind these takedowns is the Global Internet Forum to Counter Terrorism (GIFCT), an industry-led initiative that seeks to "prevent terrorists and violent extremists from exploiting digital platforms."

[...] Hashes are digital "fingerprints" of content that companies use to identify and remove content from their platforms. They are essentially unique, and allow for easy identification of specific content. When an image is identified as "terrorist content," it is tagged with a hash and entered into a database, allowing any future uploads of the same image to be easily identified.

This is exactly what the GIFCT initiative aims to do: Share a massive database of alleged 'terrorist' content, contributed voluntarily by companies, amongst members of its coalition. The database collects 'hashes', or unique fingerprints, of alleged 'terrorist', or extremist and violent content, rather than the content itself. GIFCT members can then use the database to check in real time whether content that users want to upload matches material in the database. While that sounds like an efficient approach to the challenging task of correctly identifying and taking down terrorist content, it also means that one single database might be used to determine what is permissible speech, and what is taken down—across the entire Internet.

Countless examples have proven that it is very difficult for human reviewers—and impossible for algorithms—to consistently get the nuances of activism, counter-speech, and extremist content itself right. The result is that many instances of legitimate speech are falsely categorized as terrorist content and removed from social media platforms. Due to the proliferation of the GIFCT database, any mistaken classification of a video, picture or post as 'terrorist' content echoes across social media platforms, undermining users' right to free expression on several platforms at once. And that, in turn, can have catastrophic effects on the Internet as a space for memory and documentation.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by JoeMerchant on Friday August 28 2020, @07:28PM

    by JoeMerchant (3937) on Friday August 28 2020, @07:28PM (#1043484)

    wouldn't this be fairly easy to defeat, just add or remove

    I came here to comment on this... yes, if you subtly alter the image in any way, it will defeat the simplest of hashes. Then it becomes an arms race where the hash algorithm tries more to identify the "essence" of the image like music fingerprinting software does to identify what song your phone can hear, but the image tweakers keep changing the image enough to get a different hash code, and as this arms race continues false-positive matches between banned images and legitimate images will become a significant problem.

    I think the hash works well enough for today's purposes because the social media retweeters, etc. all use exact copies, and probably intend to continue to do so to support this hash-id filter scheme. The vast unwashed masses generally don't edit before forwarding, that would be a rare bird in the social media flock who even knows how to alter the image before resharing it onto other platforms.

    --
    🌻🌻 [google.com]
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2