[PDF] Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security | Semantic Scholar (2024)

Skip to search formSkip to main contentSkip to account menu

Semantic ScholarSemantic Scholar's Logo
@article{Chesney2018DeepFA, title={Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security}, author={Robert M. Chesney and Danielle Keats Citron}, journal={California Law Review}, year={2018}, volume={107}, pages={1753}, url={https://api.semanticscholar.org/CorpusID:158865631}}
  • Robert M. Chesney, D. Citron
  • Published 14 July 2018
  • Political Science, Computer Science, Law
  • California Law Review

The aim is to provide the first in-depth assessment of the causes and consequences of this disruptive technological change, and to explore the existing and potential tools for responding to it.

View PDF

423 Citations

Highly Influential Citations


Background Citations


Methods Citations


Results Citations


423 Citations

Protecting World Leaders Against Deep Fakes
    S. AgarwalH. FaridYuming GuMingming HeKoki NaganoHao Li

    Political Science, Computer Science

    CVPR Workshops

  • 2019

A forensic technique is described that models facial expressions and movements that typify an individual’s speaking pattern that can be used for authentication in the creation of deepfake videos.

  • 404
  • PDF
Combating Fake News, Misinformation, and Machine Learning Generated Fakes: Insight's from the Islamic Ethical Tradition
    Talat ZubairAmana RaquibJunaid Qadir

    Computer Science, Political Science

    ICR Journal

  • 2019

This paper discusses the technologies that have led to the rise of problems such as fake news articles, filter bubbles, social media bots, and deep-fake videos, and their implications, while providing insights from the Islamic ethical tradition that can aid in mitigating them.

  • 9
  • PDF
The Future of Deep Fakes: Analyzing the Potential Future The Future of Deep Fakes: Analyzing the Potential Future Consequences of the Widespread Use of Deepfakes on the Consequences of the Widespread Use of Deepfakes on the Policing Sector Policing Sector

    Political Science, Law

The future outlook for deepfakes is illustrated and analyzed using future foresight methods, including; the futures wheel, a swot analysis and scenario planning, and the complex ethical, legal, and social issues surrounding the use of deepfake on the policing sector are examined through an interdisciplinary method.

The Distinct Wrong of Deepfakes
    A. de Ruiter

    Computer Science, Law

  • 2021

The main argument is that deepfake technology and deepfakes are morally suspect, but not inherently morally wrong, and if so, why.

  • 49
  • PDF
Free Speech in the Digital Age: Deepfakes and the Marketplace of Ideas
    Suyoung Baek

    Law, Political Science

  • 2020

The threat of deepfakes is well-documented in the existing literature. Deepfake technology has emerged as a powerful tool with which vulnerable individuals could easily become targets of novel forms

  • 2
Big Data Analytics: From Threatening Privacy to Challenging Democracy
    Paola MavrikiMaria Karyda

    Political Science, Computer Science


  • 2019

This paper identifies long-term privacy implications which may undermine fundamental features of democracy such as fair elections and political equality of all citizens and argues that big data analytics raises the need to develop alternative narratives to the concept of privacy.

  • 2
Deepfakes: A Digital Transformation Leads to Misinformation
    Nour and GelfandNika NourJ. Gelfand

    Computer Science

  • 2022

A portmanteau combines deep learning aspects of AI with the doctored or falsified enhancements that deem the content fake and now deepfake or misinformation results.

  • 6
  • PDF
Using Blockchain to Rein in the New Post-Truth World and Check the Spread of Fake News
    A. QayyumJunaid QadirM. JanjuaFalak Sher

    Computer Science, Political Science

    IT Professional

  • 2019

A high-level overview of a blockchain-based framework for fake news prevention is proposed and the various design issues and consideration of such a Blockchain- based framework for tackling fake news are highlighted.

A Residual Fingerprint-Based Defense Against Adversarial Deepfakes
    Jianguo JiangBoquan Li Min Yu

    Computer Science

    2021 IEEE 23rd Int Conf on High Performance…

  • 2021

To defend against adversarial Deepfakes, this work proposes a residual fingerprint-based defense customized for Deepfake detectors, and constructs a reconstruction network, and proposes novel strategies to degrade the adversarial efficacy as well as extract discriminative residual fingerprints.

  • 1
Exploding AI-Generated Deepfakes and Misinformation: A Threat to Global Concern in the 21st Century
    Dr. Bharat Dhiman

    Computer Science, Political Science


  • 2023

This review paper examines the multifaceted landscape of deepfakes, encompassing their technological underpinnings, societal implications, detection methodologies, and ethical considerations, and culminates in an overview of future directions and recommendations, advocating for proactive measures to counter the escalating threat posed by AI-generatedDeepfake.



52 References

The Rise and Fall of Invasive ISP Surveillance
    Paul Ohm

    Computer Science, Law

  • 2008

An innovative new theory of communications privacy is proposed to help policymakers strike the proper balance between user privacy and ISP need and injects privacy into the network neutrality debate - a debate about who gets to control innovation on the Internet.

  • 47
  • PDF
    Scott R. Peppet

    Computer Science, Law

  • 2010

It is argued that informational privacy law must focus on the economics of signaling and its unraveling of privacy, which creates new types of privacy harms.

  • 88
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization
    Paul Ohm

    Computer Science

  • 2009

It is necessary to respond to the surprising failure of anonymization, and this Article provides the tools to do so.

  • 1,011
  • PDF
Intermediaries and Hate Speech: Fostering Digital Citizenship for Our Information Age
    D. CitronHelen L. Norton

    Sociology, Computer Science

  • 2011

This work believes that a thoughtful and nuanced intermediary-based approach to hate speech can foster respectful online discourse without suppressing valuable expression and urges intermediaries to help address cyber hate by adopting accessible and transparent policies that educate users about their rights and responsibilities as digital citizens.

  • 146
  • PDF
Dealing with Disinformation: Evaluating the Case for CDA 230 Amendment
    Tim Hwang

    Political Science, Law

  • 2017

Recent revelations surrounding Russian interference in the 2016 US presidential election and the role that "fake news" may have played in shaping voter preferences have sparked a broad conversation

  • 5
  • PDF
The Scope and Potential of FTC Data Protection
    Woodrow HartzogDaniel J. Solove

    Law, Computer Science

  • 2015

It is argued that the FTC not only has the authority to regulate data protection to the extent it has been doing, but that its granted jurisdiction can expand its reach much more and should be fully embraced to respond to the privacy harms unaddressed.

  • 32
  • PDF
The FTC and the New Common Law of Privacy
    Daniel J. SoloveWoodrow Hartzog


  • 2013

One of the great ironies about information privacy law is that the primary regulation of privacy in the United States has barely been studied in a scholarly way. Since the late 1990s, the Federal

  • 164
  • PDF
The Third-Party Doctrine and the Future of the Cloud
    Neil M. Richards

    Law, Computer Science

  • 2017

The debate over the Third-Party Doctrine is put in historical, jurisprudential, and technological context, and a normative and civil-liberties-protective way forward for Fourth Amendment law in the age of the cloud is offered.

  • 2
The spread of true and false news online
    Soroush VosoughiD. RoySinan Aral

    Political Science, Computer Science


  • 2018

A large-scale analysis of tweets reveals that false rumors spread further and faster than the truth, and false news was more novel than true news, which suggests that people were more likely to share novel information.

  • 4,857
  • PDF
The Privacy Policymaking of State Attorneys General
    D. Citron

    Law, Political Science

  • 2016

Accounts of privacy law have focused on legislation, federal agencies, and the self-regulation of privacy professionals. Crucial agents of regulatory change, however, have been ignored: the state

  • 23
  • PDF



Related Papers

Showing 1 through 3 of 0 Related Papers

    [PDF] Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security | Semantic Scholar (2024)


    Top Articles
    Latest Posts
    Article information

    Author: Margart Wisoky

    Last Updated:

    Views: 5621

    Rating: 4.8 / 5 (78 voted)

    Reviews: 85% of readers found this page helpful

    Author information

    Name: Margart Wisoky

    Birthday: 1993-05-13

    Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

    Phone: +25815234346805

    Job: Central Developer

    Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

    Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.