Journalists Aim To Detect Deepfakes

Artificial intelligence is fueling the next phase of misinformation. The new type of synthetic media known as Deepfakes poses major challenges for newsrooms when it comes to verification.

Journalists have an important role in informing the public about the dangers and challenges of artificial intelligence technology. Reporting on these issues is a way to raise awareness and inform the public.

How can you detect Deepfakes?

Across the industry, news organisations can consider multiple approaches to help authenticate media if they suspect alterations.

“There are technical ways to check if the footage has been altered, such as going through it frame by frame in a video editing program to look for any unnatural shapes and added elements, or doing a reverse image search,” said Natalia V. Osipova, a senior video journalist at the Wall St. Journal. 

But the best option is often traditional reporting: “Reach out to the source and the subject directly, and use your editorial judgment.”

Examining the source

If someone has sent in suspicious footage, a good first step is to try to contact the source. How did that person obtain it? Where and when was it filmed? Getting as much information as possible, asking for further proof of the claims, and then verifying is key.

If the video is online and the uploader is unknown, other questions are worth exploring: Who allegedly filmed the footage? Who published and shared it, and with whom? Checking the metadata of the video or image with tools like InVID or other metadata viewers can provide answers. 

In addition to going through this process internally, we collaborate with content verification organizations such as Storyful and the Associated Press. This is a fast-moving landscape with emerging solutions appearing regularly in the market. 

For example, new tools including TruePic and Serelay use blockchain to authenticate photos. Regardless of the technology used, the humans in the newsroom are at the center of the process.

“Technology alone will not solve the problem,” said Rajiv Pant, chief technology officer at the Journal. “The way to combat Deepfakes is to augment humans with artificial intelligence tools.”

Finding older versions of the footage

Deepfakes are often based on footage that is already available online. Reverse image search engines like Tineye or Google Image Search are useful to find possible older versions of the video to suss out whether an aspect of it was manipulated. 

Examining the footage

Editing programs like Final Cut enable journalists to slow footage down, zoom the image, and look at it frame by frame or pause multiple times. This helps reveal obvious glitches: glimmering and fuzziness around the mouth or face, unnatural lighting or movements, and differences between skin tones are telltale signs of a Deepfake.

In addition to these facial details, there might also be small edits in the foreground or background of the footage. Does it seem like an object was inserted or deleted into a scene that might change the context of the video (e.g. a weapon, a symbol, a person, etc.)? Again, glimmering, fuzziness, and unnatural light can be indicators of faked footage.

In the case of audio, watch out for unnatural intonation, irregular breathing, metallic sounding voices, and obvious edits. These are all hints that the audio may have been generated by artificial intelligence. 

However, it’s important to note that image artifacts, glitches, and imperfections can also be introduced by video compression. That’s why it is sometimes hard to conclusively determine whether a video has been forged or not.

The democratisation of deepfake creation adds to the challenge

A number of companies are creating technologies, often for innocuous reasons, that nonetheless could eventually end up being used to create Deepfakes. Some examples:

Object extraction

Adobe is working on Project Cloak, an experimental tool for object removal in video, which makes it easy for users to take people or other details out of the footage. The product could be helpful in motion picture editing. But some experts think that micro-edits like these, the removal of small details in a video, might be even more dangerous than blatant fakes since they are harder to spot.

Weather alteration

There are algorithms for image translation that enable users to alter the weather or time of day in a video, like this example developed by chip manufacturer Nvidia by using generative adversarial networks. These algorithms could be used for post-production of movie scenes shot during days with different weather. 

But this could be problematic for newsrooms and others, because in order to verify footage and narrow down when videos were filmed, it is common to examine the time of day, weather, position of the sun, and other indicators for clues to inconsistencies.

Artificial voices

Audio files can also be manipulated automatically: One company, Lyrebird, creates artificial voices based on audio samples of real people. One minute of audio recordings is enough to generate an entire digital replica that can say any sentence the user types into the system. Applications of this technology include allowing video game developers to add voices to characters. 

Off-the-shelf consumer tools that make video and audio manipulation easier may hasten the proliferation of Deepfakes. Some of the companies behind these tools are already considering safeguards to prevent misuse of their tech. 

“We are exploring different directions including crypto-watermarking techniques, new communication protocols, as well developing partnerships with academia to work on security and authentication,” said Alexandre de Brébisson, CEO and cofounder of Lyrebird. 

Deepfakes’ ramifications for society

While these techniques can be used to significantly lower costs of movie, gaming, and entertainment production, they represent a risk for news media as well as society more broadly. 

For example, fake videos could place politicians in meetings with foreign agents or even show soldiers committing crimes against civilians. False audio could make it seem like government officials are privately planning attacks against other nations.

“We know Deepfakes and other image manipulations are effective — this kind of fakery can have immediate repercussions,” said Roy Azoulay, founder and CEO of Serelay, a platform that enables publishers to protect their content against forgeries. “The point we need to really watch is when they become cheap, because cheap and effective drives diffusion.”

Lawmakers like senators Mark Warner and Marco Rubio are already warning of scenarios like these and working on possible strategies to avoid them. What’s more, Deepfakes could be used to deceive news organizations and undermine their trustworthiness. 

Publishing an unverified fake video in a news story could stain a newsroom’s reputation and ultimately lead to citizens further losing trust in media institutions. Another danger for journalists: personal deepfake attacks showing news professionals in compromising situations or altering facts, again aimed at discrediting or intimidating them. 

As Deepfakes make their way into social media, their spread will likely follow the same pattern as other fake news stories. In a MIT study investigating the diffusion of false content on Twitter published between 2006 and 2017, researchers found that “falsehood diffused significantly farther, faster, deeper, and more broadly than truth in all categories of information.” 

False stories were 70 percent more likely to be retweeted than the truth and reached 1,500 people six times more quickly than accurate articles.

What’s next

Deepfakes are not going away anytime soon. It’s safe to say that these elaborate forgeries will make verifying media harder, and this challenge could become more difficult over time. 

“We have seen this rapid rise in deep learning technology and the question is: Is that going to keep going, or is it plateauing? What’s going to happen next?” said Hany Farid, a photo-forensics expert, who will join the University of California, Berkeley faculty next year. He said the next 18 months will be critical: “I do think that the issues are coming to a head,” adding that he expects researchers will have made advances before the 2020 election cycle.

Despite the current uncertainty, newsrooms can and should follow the evolution of this threat by conducting research, by partnering with academic institutions, and by training their journalists how to leverage new tools.

NiemanLab:

You Might Also Read:

Realistic Fake Videos Threaten Democracy

« AI For Cyber - You Don’t Need To Know The Threat, Just The Network
South Korea To Triple Investment In Blockchain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Mantodea Security

Mantodea Security

Mantodea Security is an industry-agnostic powerhouse backed by extensive experience and expertise in the realm of IT security.