Representatives from CNI member organizations gather twice annually to explore new technologies, content, and applications; to further collaboration; to analyze technology policy issues, and to catalyze the development and deployment of new projects. Each member organization may send two representatives. Visit https://www.cni.org/mm/spring-2019 for more information.
Twitter: #cni19s
Back To Schedule
Tuesday, April 9 • 2:15pm - 3:30pm
Closing Plenary: Web Archives at the Nexus of Good Fakes and Flawed Originals: “You’re in a Desert Walking Along in the Sand When All of a Sudden You Look Down, and You See a Tortoise…”

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
The authenticity, integrity, and provenance of resources we encounter on the web are increasingly in question. While many people are inured to the possibility of altered images, the easy accessibility of powerful software tools that synthesize audio and video will unleash a torrent of convincing “deepfakes” into our social discourse. Archives will no longer be monopolized by a countable number of institutions such as governments and publishers, but will become a competitive space filled with social engineers, propagandists, conspiracy theorists, and aspiring Hollywood directors. While the historical record has never been singular nor unmalleable, current technologies empower an unprecedented number of skillful would-be editors of history.

Web archives have a role to play in verifying the integrity and priority of resources. Unfortunately, web archives have a 1990s, ad-hoc approach to trust, interoperability, and audit.  We implicitly trust the Internet Archive in the same way we used to trust email, Google, Apple, and Facebook. That we do not currently associate web archives with surveillance, spam, and subterfuge does not mean they are somehow immune in a way the other tools and services are not; it only means that the theatre of conflict has yet to encompass web archives. As the political, cultural, and economic stakes of disinformation rise, we can expect two primary changes.

First, existing, trusted web archives will be attacked. Obvious targets will be the machines and facilities themselves, but more subtle attacks will involve legitimately crawled pages, which then masquerade as pages with fake URLs and date stamps, thereby obfuscating the provenance of otherwise untrustworthy sources.
Second, the number of web archives will proliferate, and not all will be trustworthy. When web archives required custom tools and expensive hardware, there were a limited number of people capable of their operation and they were well-known in our community. We now have a dynamic marketplace of web archives, many of which are short-lived, and at least some of which could be operated by replicants (distinguishable from humans only by their empathetic responses to questions about tortoises).

In summary, is that really an archived tweet from 2016 with a video of your favorite politician in an unflattering situation? Or is it a backdated deepfake, injected into a trusted archive, and then replicated across several less established archives, all of which are secretly operated by the same entity?


Michael L. Nelson

Professor, Old Dominion University

Tuesday April 9, 2019 2:15pm - 3:30pm
Ballroom-Salon II