Combatting deepfakes: Policies to address national security threats and
rights violations
- URL: http://arxiv.org/abs/2402.09581v2
- Date: Mon, 19 Feb 2024 18:39:40 GMT
- Title: Combatting deepfakes: Policies to address national security threats and
rights violations
- Authors: Andrea Miotti and Akash Wasil
- Abstract summary: We describe how deepfakes are currently used to proliferate sexual abuse material, commit fraud, manipulate voter behavior, and pose threats to national security.
We present a comprehensive policy proposal that focuses on addressing multiple parts of the deepfake supply chain.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This paper provides policy recommendations to address threats from deepfakes.
First, we provide background information about deepfakes and review the harms
they pose. We describe how deepfakes are currently used to proliferate sexual
abuse material, commit fraud, manipulate voter behavior, and pose threats to
national security. Second, we review previous legislative proposals designed to
address deepfakes. Third, we present a comprehensive policy proposal that
focuses on addressing multiple parts of the deepfake supply chain. The deepfake
supply chain begins with a small number of model developers, model providers,
and compute providers, and it expands to include billions of potential deepfake
creators. We describe this supply chain in greater detail and describe how
entities at each step of the supply chain ought to take reasonable measures to
prevent the creation and proliferation of deepfakes. Finally, we address
potential counterpoints of our proposal. Overall, deepfakes will present
increasingly severe threats to global security and individual liberties. To
address these threats, we call on policymakers to enact legislation that
addresses multiple parts of the deepfake supply chain.
Related papers
- Examining the Implications of Deepfakes for Election Integrity [9.129491613898962]
It is becoming cheaper to launch disinformation operations at scale using AI-generated content, in particular 'deepfake' technology.
We discuss the threats from deepfakes in politics, highlight model specifications underlying different types of deepfake generation methods, and contribute an accessible evaluation of the efficacy of existing detection methods.
We highlight the limitations of existing detection mechanisms and discuss the areas where policies and regulations are required to address the challenges of deepfakes.
arXiv Detail & Related papers (2024-06-20T13:15:54Z) - Discussion Paper: The Threat of Real Time Deepfakes [7.714772499501984]
Deepfakes are being used to spread misinformation, enable scams, perform fraud, and blackmail the innocent.
In this paper, we discuss the implications of this emerging threat, identify the challenges with preventing these attacks and suggest a better direction for researching stronger defences.
arXiv Detail & Related papers (2023-06-04T21:40:11Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Deep Fake Detection, Deterrence and Response: Challenges and
Opportunities [3.411353611073677]
78% of Canadian organizations experienced at least one successful cyberattack in 2020.
Specialists predict that the global loss from cybercrime will reach 10.5 trillion US dollars annually by 2025.
Deepfakes garnered attention for their potential use in creating fake news, hoaxes, revenge porn, and financial fraud.
arXiv Detail & Related papers (2022-11-26T21:23:30Z) - Towards Automated Classification of Attackers' TTPs by combining NLP
with ML Techniques [77.34726150561087]
We evaluate and compare different Natural Language Processing (NLP) and machine learning techniques used for security information extraction in research.
Based on our investigations we propose a data processing pipeline that automatically classifies unstructured text according to attackers' tactics and techniques.
arXiv Detail & Related papers (2022-07-18T09:59:21Z) - Restricted Black-box Adversarial Attack Against DeepFake Face Swapping [70.82017781235535]
We introduce a practical adversarial attack that does not require any queries to the facial image forgery model.
Our method is built on a substitute model persuing for face reconstruction and then transfers adversarial examples from the substitute model directly to inaccessible black-box DeepFake models.
arXiv Detail & Related papers (2022-04-26T14:36:06Z) - CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for
Combating Deepfakes [74.18502861399591]
Malicious application of deepfakes (i.e., technologies can generate target faces or face attributes) has posed a huge threat to our society.
We propose a universal adversarial attack method on deepfake models, to generate a Cross-Model Universal Adversarial Watermark (CMUA-Watermark)
Experimental results demonstrate that the proposed CMUA-Watermark can effectively distort the fake facial images generated by deepfake models.
arXiv Detail & Related papers (2021-05-23T07:28:36Z) - MagDR: Mask-guided Detection and Reconstruction for Defending Deepfakes [46.07140326726742]
MagDR is a mask-guided detection and reconstruction pipeline for defending deepfakes from adversarial attacks.
In experiments, MagDR defends three main tasks of deepfakes, and the learned reconstruction pipeline transfers across input data, showing promising performance.
arXiv Detail & Related papers (2021-03-26T01:57:04Z) - WildDeepfake: A Challenging Real-World Dataset for Deepfake Detection [82.42495493102805]
We introduce a new dataset WildDeepfake which consists of 7,314 face sequences extracted from 707 deepfake videos collected completely from the internet.
We conduct a systematic evaluation of a set of baseline detection networks on both existing and our WildDeepfake datasets, and show that WildDeepfake is indeed a more challenging dataset, where the detection performance can decrease drastically.
arXiv Detail & Related papers (2021-01-05T11:10:32Z) - The Emerging Threats of Deepfake Attacks and Countermeasures [0.0]
Deepfake technology (DT) has taken a new level of sophistication.
Highlights the threats that are presented by deepfakes to businesses, politics, and judicial systems worldwide.
arXiv Detail & Related papers (2020-12-14T22:40:49Z) - Fake News, Disinformation, and Deepfakes: Leveraging Distributed Ledger
Technologies and Blockchain to Combat Digital Deception and Counterfeit
Reality [0.0]
Digital deception raises concerns over role of Internet and social media in democratic societies.
This overview aims to explore the potential of Distributed Ledger Technologies (DLTs) and blockchain to combat digital deception.
Some recommendations are enumerated to guide future researchers on issues that will have to be tackled to face fake news, disinformation and deepfakes.
arXiv Detail & Related papers (2019-04-10T18:42:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.