Cybersecurity

Will 2023 be the year of dynamite disinfo deepfakes, cooked up by rogue states?

Foreign adversaries are expected to use AI algorithms to create increasingly realistic deepfakes and sow disinformation as part of military and intelligence operations as the technology improves.

Deepfakes describe a class of content generated by machine learning models capable of pasting someone’s face onto another person’s body realistically. They can be in the form of images or videos, and are designed to make people believe someone has said or done something they haven’t. The technology is often used to make false pornographic videos of female celebrities.

As the technology advances, however, the synthetic media has also been used to spread disinformation to fuel political conflicts. A video of Ukrainian President Volodymyr Zelensky urging soldiers to lay down their weapons and surrender, for example, surfaced shortly after Russia invaded the country, last year.

Zelensky denied he had said such things in a video posted on Facebook. Social media companies removed the videos in an attempt to stop false information from spreading.

But efforts to create deepfakes will continue to increase from enemy states, according to AI and foreign policy researchers from Northwestern University and the Brookings Institute in America.

A team of computer scientists from Northwestern University previously developed the Terrorism Reduction with Artificial Intelligence Deepfakes (TREAD) algorithm demonstrating a counterfeit video featuring the dead ISIS terrorist Mohammed al Adnani.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

L’IA : opportunité ou menace ? Les DSI de la finance s’interrogent

L'IA : opportunité ou menace ? Les DSI de la finance s'interrogent Alors que l'intelligence…

1 mois ago

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le secteur financier

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le…

1 mois ago

Règlement DORA : implications contractuelles pour les entités financières et les prestataires informatiques

La transformation numérique du secteur financier n'a pas que du bon : elle augmente aussi…

1 mois ago

Telegram menace de quitter la France : le chiffrement de bout en bout en ligne de mire

Telegram envisage de quitter la France : le chiffrement de bout en bout au cœur…

1 mois ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

2 mois ago

LES DIFFÉRENCES ENTRE ISO 27001 ET TISAX®

TISAX® et ISO 27001 sont toutes deux des normes dédiées à la sécurité de l’information. Bien qu’elles aient…

2 mois ago

This website uses cookies.