• Skip to main content
  • Skip to secondary menu
  • Skip to footer

OSINT.org

Intelligence Matters

  • Sponsored Post
    • Make a Contribution
  • Market Intelligence
    • Technologies
    • Events
  • Domain Intelligence
  • About
    • GDPR
  • Contact

Deconstructing Deepfakes: How do they work and what are the risks?

October 21, 2020 By admin Leave a Comment

Last month, Microsoft introduced a new deepfake detection tool. Weeks ago, Intel launched another. As more and more companies follow suit and more concerns arise about the use of this technology, we take a look in today’s WatchBlog at how this technology works and the policy questions it raises.

What is a deepfake?
A deepfake is a video, photo, or audio recording that seems real but has been manipulated using artificial intelligence (AI). The underlying technology can replace faces, manipulate facial expressions, synthesize faces, and synthesize speech. These tools are used most often to depict people saying or doing something they never said or did.

How do deepfakes work?
Deepfake videos commonly swap faces or manipulate facial expressions. The image below illustrates how this is done. In face swapping, the face on the left is placed on another person’s body. In facial manipulation, the expressions of the face on the left are imitated by the face on the right.

Face Swapping and Facial Manipulation
Deepfakes rely on artificial neural networks, which are computer systems that recognize patterns in data. Developing a deepfake photo or video typically involves feeding hundreds or thousands of images into the artificial neural network, “training” it to identify and reconstruct patterns—usually faces.

How can you spot a deepfake?
The figure below illustrates some of the ways you can identify a deepfake from the real thing. To learn more about how to identify a deepfake, and to learn about the underlying technology used, check out GAO recent Spotlight on this technology.

What are the benefits of these tools?
Voices and likenesses developed using deepfake technology can be used in movies to achieve a creative effect or maintain a cohesive story when the entertainers themselves are not available. For example, in the latest Star Wars movies, this technology was used to replace characters who had died or to show characters as they appeared in their youth. Retailers have also used this technology to allow customers to try on clothing virtually.

What risks do they pose?
In spite of such benign and legitimate applications like films and commerce, deepfakes are more commonly used for exploitation. Some studies have shown that much of deepfake content online is pornographic, and deepfake pornography disproportionately victimizes women.

There is also concern about potential growth in the use of deepfakes for disinformation. Deepfakes could be used to influence elections or incite civil unrest, or as a weapon of psychological warfare. They could also lead to disregard of legitimate evidence of wrongdoing and, more generally, undermine public trust.

What can be done to protect people?
As discussed above, researchers and internet companies, such as Microsoft and Intel, have experimented with several methods to detect deepfakes. These methods typically use AI to analyze videos for digital artifacts or details that deepfakes fail to imitate realistically, such as blinking or facial tics. But even with these interventions by tech companies, there are a number of policy questions about deepfakes that still need to be answered. For example:

What can be done to educate the public about deepfakes to protect them and help them identify real from fake?
What rights do individuals have to privacy when it comes to the use of deepfake technology?
What First Amendment protections do creators of deepfake videos, photos, and more have?
Deepfakes are powerful tools that can be used for exploitation and disinformation. With advances making them more difficult to detect, these technologies require a deeper look.

Sources:
SCIENCE & TECH SPOTLIGHT: DEEPFAKES
Deepfake Technology, Market Analysis

Filed Under: Workflow

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • Tadaweb Secures $20M to Expand Human-Centric OSINT Platform
  • The Collapse of Assad’s Regime: The Beginning of the End for Iran’s So-Called Axis of Resistance
  • Cognyte Intelligence Summit 2024: Transforming Global Security with AI-Powered Insights
  • Strategic Concerns Over Peru’s New Port: A Growing Debate on China’s Influence
  • Entry instructions to Nasrallah’s bunker containing more than half a billion dollars in gold and dollars
  • The former Obama AG suing U.S. government on behalf of Chinese military company DJI
  • The Cowardice of Sinwar: Fleeing Accountability and Meeting a Fitting End
  • Deployment of missile interceptor system to Israel in preparation for strike on Iran
  • In 2024, Qatar pledged to invest €10B in the French economy.
  • Eliminated the terrorist Hader Ali Taweel, who served as the Kfarkela Company Commander of the Hezbollah

Media Partners

  • Analysis.org
  • Opinion.org
Synopsys Stock Plunge: Anatomy of a 35% Collapse
GameStop Posts Surprise Profit, Strong Balance Sheet, and Rekindles Meme Stock Debate
AeroVironment Delivers Record Q1 Revenue But AeroVironment’s Stock Story Rests on Execution
AI Stocks Rise While Job Reports Sour: The Uneasy Balance
Oracle’s After-Hours Surge and the Signal It Sends Across the AI Sector
The Cult of Musk and the $8.5 Trillion Mirage
Resetting AMD Exposure: A Tactical Rotation into AMUU
China: When Invasive Species Come With the Cargo
OpenAI’s Bid to Challenge LinkedIn
Tesla’s Trillion-Dollar Absurdity
Poland Invokes NATO Article 4: The First Since Russia’s Invasion of Ukraine
Poland as the Catalyst: Overthrowing Lukashenko and Reframing the Balance of Power in Eastern Europe
Israel’s Strike in Qatar Sends a Direct Message
Why Muslim-Majority Countries in the Middle East Reject Democracy
China: The Fleet That Eats the Sea
Why Trump May Blink First in a Trade War with the EU
Breaking the Axis: How a Defeat of Iran Would Shatter the China–Russia–Iran Power Triangle
China’s Middle East Fantasy Falters Under Israeli Fire
Global Jihad: A Timeline of Terror That Refutes the Islamophobia Myth
Iran’s Strategic Infrastructure: The Fragile Pillars of a Regional Power

Media Partners

  • Market Analysis
  • Market Research Media
AI Funding Surge: Enterprise Search, Cloud Infrastructure, and Chip Design Attract Fresh Capital
The March of the Humanoids: How Close Are We to Robots Doing Menial Work?
AI Eats the Software Layer
The Dawn of Multi-Trillion Dollar AI Titans
Tesla: Inflated Valuation, Hollow Promises
The AI Disruption of Search and the Endangered Web
The Growing Gap Between Foreign Ownership of U.S. Stocks and Debt: What It Means for Markets
EU Blinks First: Temporary Suspension of Tariff Countermeasures Signals Strategic Caution in U.S. Trade Conflict
AMD Set to Surge: $250 Target Within Reach as AI Momentum Accelerates
China’s Strategic Shift to RISC-V: Market Implications and Growth Prospects
Mistral AI: Europe’s Rising $14 Billion AI Powerhouse
Motion Raises $60M to Build the AI-Native Work Suite for SMBs
The Afterlife of Print and the Coming AI Storm for Digital Editions
AI Delivers the Death Blow to Low-Quality Indian Outsourcing
AI and the Fragile Social Contract
Warner Bros. Discovery: Restructuring for a Comeback?
Can Unity Software Inc Rise to Become a Gaming Media Giant?
Netflix’s Ad-Supported Strategy: Is a Free Tier the Next Frontier?
Adobe Set to Hit $640: AI Growth and Financial Strength Signal Imminent Breakout
The Rise of Headless Content Frameworks in Distributed Media Projects

Copyright © 2022 OSINT.org

Technologies, Market Analysis & Market Research and Exclusive Domains