More and more, nation-states are leveraging sophisticated cyber influence campaigns and digital propaganda to sway public opinion. Their goal? To decrease trust, increase polarization, and undermine democracies around the world.
In particular, synthetic media is becoming more commonplace thanks to an increase in tools that easily create and disseminate realistic artificial images, videos, and audio. This technology is advancing so quickly that soon anyone will be able to create a synthetic video of anyone saying or doing anything the creator wants. According to Sentinel, there was a 900% year-over-year increase in the proliferation of deepfakes in 2020.
It's up to organizations to protect against these cyber influence operations. But strategies are available for organizations to detect, disrupt, deter, and defend against online propaganda. Read on to learn more.
[...] As technology advances, tools that have traditionally been used in cyberattacks are now being applied to cyber influence operations. Nation-states have also begun collaborating to amplify each other's fake content.
These trends point to a need for greater consumer education on how to accurately identify foreign influence operations and avoid engaging with them. We believe the best way to promote this education is to increase collaboration between the federal government, the private sector, and end users in business and personal contexts.
There are four key ways to ensure the effectiveness of such training and education. First, we must be able to detect foreign cyber influence operations. No individual organization will be able to do this on its own. Instead, we will need the support of academic institutions, nonprofit organizations, and other entities to better analyze and report on cyber influence operations.
Next, defenses must be strengthened to account for the challenges and opportunities that technology has created for the world's democracies — especially when it comes to the disruption of independent journalism, local news, and information accuracy.
Another element in combating this widespread deception is radical transparency. We recommend increasing both the volume and dissemination of geopolitical analysis, reporting, and threat intelligence to better inform effective responses and protection.
Finally, there have to be consequences when nation-states violate international rules. While it often falls on state, local, and federal governments to enforce these penalties, multistakeholder action can be leveraged to strengthen and extend international norms. For example, Microsoft recently signed onto the European Commission's Code of Practice on Disinformation along with more than 30 online businesses to collectively tackle this growing challenge. Governments can build on these norms and laws to advance accountability.
Ultimately, threat actors are only going to continue getting better at evading detection and influencing public opinion. The latest nation-state threats and emerging trends show that threat actors will keep evolving their tactics. However, there are things organizations can do to improve their defenses. We just need to create holistic policies that public and private entities alike can use to combat digital propaganda and protect our collective operations against false narratives.
(Score: 2) by PiMuNu on Monday March 20 2023, @04:26PM (1 child)
> The traditional watermarks are trivial to remove with ML
You got it the wrong way around. "Authoritative news source" embeds a watermark in its stuff, posts to server. Client decodes and presents the watermark to the user. If watermark cannot be decoded, the information is considered low quality and should be discounted. Of course, a bad actor can spam whatever junk they want around the web, but if it is not watermarked, it gets put on the junk pile.
> You'd have to embed a crypto signature into each frame
Watermarking is a thing technically. Video codecs, for example, do not work "frame by frame" as you suggest, and adding a rsa key or whatever to each frame is probably not a big deal anyway.
https://en.wikipedia.org/wiki/Digital_watermarking [wikipedia.org]
(Score: 2) by aafcac on Monday March 20 2023, @06:25PM
Depends what kind your dealing with, but if it doesn't include a visible component, good luck with that As far as frame by frame or not, it doesn't much matter as the technology has been around and there are issues. If you use the same keys, then it can be poisoned to not play or be stripped, if you use different ones, the information can be found and stripped.
But in any case, if you're not directly running the stream, there's the potential for either mitm spoofing or only authorized players being allowed.
Really, this is a case of Pandora's box being opened by people too arrogant to see this coming. The equivalent technology does get cracked and it just takes one misplaced root key to reek havoc.