Our Blog: Stuff we think you should know

Deepfakes Make It Hard to Believe Your Eyes or Ears

Deepfakes Make It Hard to Believe Your Eyes or Ears

How would you feel if a video of you appeared online, saying things that you never actually said? While you may not be the one targeted by this kind of action, this situation is very real, thanks to a relatively recent development in machine learning and artificial intelligence. Known as “deepfakes,” these videos have made it crucial to examine media from a place of skepticism.

What is a Deepfake, and How Are They Made?

A deepfake is a fabricated video that makes it possible to literally put words in someone’s mouth. As demonstrated by multiple research teams, while this technology is not yet perfect, it can be used to create a very convincing video - or an even more convincing still shot.

Deepfakes can be made using a combination of techniques and tools. 

Video Deepfakes

Using a specialized software solution, a video is scanned to identify the phenomes (the different sounds that make up full words) that are vocalized. Once they are identified, the phenomes are matched with the facial expressions that produce those sounds (also known as visemes). A 3D model of the subject’s face is then built based on the original video.

With the right software solution, these three factors can be combined with a transcript to create new footage and superimpose it over the original, making it appear that the person depicted is saying something that they never said. This creates a video that is just different enough to be disconcerting.

A similar method, that relies on mapping the expressions a person makes in source footage and applying them to a second person’s face, can even be used to bring paintings and old photographs to life.

Still Image Deepfakes

While the still images of people that were produced by AI were initially low-quality and generally unconvincing back in 2014, today’s - just five short years later - are effectively indistinguishable from the real deal. This is thanks to a technique known as a generative adversarial network. Using this technique, one AI generates images of people’s faces, anticipating feedback on how it did. In order to reach the desired level of photo-realism, it could potentially take millions of repetitions - something that nobody has time for.

Instead of subjecting a human being to the process of critiquing millions of images, a second AI is used to guess whether the picture was actually created by the first AI, or is a legitimate picture. While neither is particularly effective when first starting out, they swiftly improve in their capabilities over time, and can soon make images that are effectively indistinguishable from actual photographs of real people.

Neither of the people pictured here actually exist - they were instead created by NVIDIA in one of their machine learning AI initiatives.

As a result, we can see a dramatic rise in the capability for people to spread falsehoods and generally make the Internet a misinformative place.

How Misinformative?

Let’s look at a relatively recent example of how impactful altered video can be. In May of this year, video of House Speaker Nancy Pelosi blew up on social media that made her appear to be making a speech while intoxicated. Edited to make her sound as though her words were slurred, the original footage had been reduced to 75 percent of its original speed, with the Speaker’s voice adjusted to make it sound more like her natural pitch. This wasn’t the only instance of this happening, either. In addition to this speech, originally delivered at an event for the Center of American Progress, Pelosi’s voice was also manipulated to make her, again, appear drunk as she spoke to the American Road & Transportation Builders Association earlier in May. A similar claim was made in yet another video posted last year.

Regardless of your political views, it cannot be denied that this kind of activity is dangerous. While there have not yet been deepfakes deployed as a part of a disinformation campaign, the Director of National Intelligence Dan Coats alerted Congress to the possibility that America’s rivals could leverage them in the future.

Take, for example, this practical demonstration provided in a TED Talk by Google engineer Supasorn Suwajanakorn. Using footage of President George W. Bush, Suwajanakorn was able to create maps of assorted public figures and celebrities and have them speak on his behalf. He was also able to create four different models of President Barack Obama, that all appeared to make an identical speech.

Now, Suwajanakorn is working on a browser plugin to help natively identify deepfake videos and stop the spread of disinformation.

How Could This Impact Your Business?

Sure, global politics and pop culture are significant to many people, but how much of a threat could it really be to your business? Unfortunately, it may not be long before it could have a significant impact upon you.

Let’s say you have a customer or client who, for whatever reason, left your services feeling disgruntled. Someday soon enough, deepfake technology could be accessible enough for them to leverage it as part of a smear campaign against you and your company. Consider Speaker Pelosi’s ongoing struggle with people using rudimentary deepfakes to discredit her. Do you want similar efforts to be leveraged against you, where you are misquoted or misrepresented, whenever this technology becomes widespread?

Probably not.

In the meantime, there are plenty of other threats that you also have to contend with that could easily damage your business and its reputation just as much as some fabricated video footage could. Haber Group can help to protect your operations from these threats. Give us a call at 866.625.3560 to learn more about what we have to offer.

Businesses Can Expect These 5 Benefits from Confer...
Tip of the Week: How to Keep Control of Your Cloud
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, July 18 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Business Computing Malware Network Security Hosted Solutions Computer Productivity Software Google Internet Tech Term Communication Data Small Business Backup Mobile Devices Efficiency IT Services Ransomware Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Android Saving Money Data Recovery IT Support Microsoft Office Upgrade Productivity Office 365 Social Media Information Managed IT Services Gmail Windows Data Management Facebook Browser Business Continuity Users Phishing Internet of Things Word Innovation Managed IT Services Mobile Device Data Backup Server Miscellaneous Disaster Recovery Smartphones Outsourced IT App Passwords Windows 10 communications Artificial Intelligence Business Management Managed Service Provider Employer-Employee Relationship VoIP Remote Monitoring Encryption Network Chrome Vulnerability Cybersecurity Managed Service Money Government Apps Applications Infrastructure BYOD Office Tips Save Money Apple Virtual Reality Hacker Gadgets Content Filtering Tip of the week Analytics Spam IT Support Website Big Data Unified Threat Management VPN Education Access Control Robot Risk Management Router Wireless Printing Development Automation Firewall IT Management Customer Service Augmented Reality WiFi Avoiding Downtime Maintenance The Internet of Things Settings Two-factor Authentication Tablet Data storage Paperless Office Virtualization Display Bandwidth Antivirus YouTube Employee-Employer Relationship Outlook Hard Disk Drive Monitors Holiday Search HIPAA IBM Data Security Data loss Business Technology Administration Operating System Chromebook Mobile Device Management Virtual Private Network Collaboration Customer Relationship Management End of Support Hacking OneNote Server Management Bring Your Own Device Wi-Fi Computing Touchscreen Google Drive Laptop Password Mobile Security Document Management Mouse Vendor Management Presentation Telephone Systems LiFi Safety Quick Tips Computers Office Wireless Technology Business Intelligence Storage Downtime Scam Hosted Solution Recovery Retail SaaS Solid State Drive Company Culture Networking Knowledge Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Remote Computing Sports Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Time Management Legislation Identity Update Mobile Office MSP Scalability Social Hard Drives Permissions Assessment Managing Stress Managed Services Cabling Typing FCC Smart Tech PowerPoint Updates Firefox Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Mixed Reality LED Network Management User Comparison Running Cable Migration Hacks Refrigeration Fraud Internet Exlporer Politics Budget Public Speaking SharePoint Cables Laptops Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Techology Licensing Private Cloud Continuity Mobility Google Maps sip Managed IT Service Modem Buisness Slack Data Breach Digital Lenovo How To Competition IT solutions Smart Office Co-Managed IT Specifications Compliance Lithium-ion battery Charging Mail Merge Value Tech Support Unified Threat Management Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage GDPR Cooperation Solar Print Toner Statistics Best Practice telephony Break Fix Cookies Samsung 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Cortana Work Content Google Docs Black Friday Regulations Halloween Messaging Address Writing Undo Hotspot Professional Services Websites Identity Theft User Error Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Marketing Microsoft Excel Star Wars Training Fun Desktop Data Warehouse Staff Automobile Shortcuts Bluetooth Business Growth Application Dark Web Nanotechnology G Suite Spying Solid State Drives Google Wallet Optimization Streaming Cyber Monday Social Networking Scary Stories Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB VoIP Legal Google Calendar Chatbots IP Address Cybercrime FinTech iOS Blockchain Cost Management Troubleshooting Business Analysis Printer Wearable Technology Security Cameras Alt Codes Dark Data Net Neutrality Screen Reader National Security How To Drones Machine Learning IT Budget Web Server Emergency Printers GPS Unsupported Software Domains Computer Repair IT Consultant Relocation Processors Cameras Meetings Tracking Mobile Data Health Cleaning Alert CCTV Emoji Webcam Windows 7 Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Regulation Mobile Computing Physical Security Travel Law Enforcement Notifications CrashOverride Upgrades Botnet Supercomputer Twitter Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes 3D Printing