[PDF] Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security | Semantic Scholar (2024)

Skip to search formSkip to main contentSkip to account menu

Semantic ScholarSemantic Scholar's Logo
@article{Chesney2018DeepFA, title={Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security}, author={Robert M. Chesney and Danielle Keats Citron}, journal={California Law Review}, year={2018}, volume={107}, pages={1753}, url={https://api.semanticscholar.org/CorpusID:158865631}}
  • Robert M. Chesney, D. Citron
  • Published 14 July 2018
  • Political Science, Computer Science, Law
  • California Law Review

The aim is to provide the first in-depth assessment of the causes and consequences of this disruptive technological change, and to explore the existing and potential tools for responding to it.

View PDF

423 Citations

Highly Influential Citations

20

Background Citations

221

Methods Citations

15

Results Citations

2

423 Citations

Protecting World Leaders Against Deep Fakes
    S. AgarwalH. FaridYuming GuMingming HeKoki NaganoHao Li

    Political Science, Computer Science

    CVPR Workshops

  • 2019

A forensic technique is described that models facial expressions and movements that typify an individual’s speaking pattern that can be used for authentication in the creation of deepfake videos.

  • 404
  • PDF
Combating Fake News, Misinformation, and Machine Learning Generated Fakes: Insight's from the Islamic Ethical Tradition
    Talat ZubairAmana RaquibJunaid Qadir

    Computer Science, Political Science

    ICR Journal

  • 2019

This paper discusses the technologies that have led to the rise of problems such as fake news articles, filter bubbles, social media bots, and deep-fake videos, and their implications, while providing insights from the Islamic ethical tradition that can aid in mitigating them.

  • 9
  • PDF
The Future of Deep Fakes: Analyzing the Potential Future The Future of Deep Fakes: Analyzing the Potential Future Consequences of the Widespread Use of Deepfakes on the Consequences of the Widespread Use of Deepfakes on the Policing Sector Policing Sector

    Political Science, Law

The future outlook for deepfakes is illustrated and analyzed using future foresight methods, including; the futures wheel, a swot analysis and scenario planning, and the complex ethical, legal, and social issues surrounding the use of deepfake on the policing sector are examined through an interdisciplinary method.

The Distinct Wrong of Deepfakes
    A. de Ruiter

    Computer Science, Law

  • 2021

The main argument is that deepfake technology and deepfakes are morally suspect, but not inherently morally wrong, and if so, why.

  • 49
  • PDF
Free Speech in the Digital Age: Deepfakes and the Marketplace of Ideas
    Suyoung Baek

    Law, Political Science

  • 2020

The threat of deepfakes is well-documented in the existing literature. Deepfake technology has emerged as a powerful tool with which vulnerable individuals could easily become targets of novel forms

  • 2
Big Data Analytics: From Threatening Privacy to Challenging Democracy
    Paola MavrikiMaria Karyda

    Political Science, Computer Science

    e-Democracy

  • 2019

This paper identifies long-term privacy implications which may undermine fundamental features of democracy such as fair elections and political equality of all citizens and argues that big data analytics raises the need to develop alternative narratives to the concept of privacy.

  • 2
Deepfakes: A Digital Transformation Leads to Misinformation
    Nour and GelfandNika NourJ. Gelfand

    Computer Science

  • 2022

A portmanteau combines deep learning aspects of AI with the doctored or falsified enhancements that deem the content fake and now deepfake or misinformation results.

  • 6
  • PDF
Using Blockchain to Rein in the New Post-Truth World and Check the Spread of Fake News
    A. QayyumJunaid QadirM. JanjuaFalak Sher

    Computer Science, Political Science

    IT Professional

  • 2019

A high-level overview of a blockchain-based framework for fake news prevention is proposed and the various design issues and consideration of such a Blockchain- based framework for tackling fake news are highlighted.

A Residual Fingerprint-Based Defense Against Adversarial Deepfakes
    Jianguo JiangBoquan Li Min Yu

    Computer Science

    2021 IEEE 23rd Int Conf on High Performance…

  • 2021

To defend against adversarial Deepfakes, this work proposes a residual fingerprint-based defense customized for Deepfake detectors, and constructs a reconstruction network, and proposes novel strategies to degrade the adversarial efficacy as well as extract discriminative residual fingerprints.

  • 1
Exploding AI-Generated Deepfakes and Misinformation: A Threat to Global Concern in the 21st Century
    Dr. Bharat Dhiman

    Computer Science, Political Science

    Qeios

  • 2023

This review paper examines the multifaceted landscape of deepfakes, encompassing their technological underpinnings, societal implications, detection methodologies, and ethical considerations, and culminates in an overview of future directions and recommendations, advocating for proactive measures to counter the escalating threat posed by AI-generatedDeepfake.

...

...

52 References

The Rise and Fall of Invasive ISP Surveillance
    Paul Ohm

    Computer Science, Law

  • 2008

An innovative new theory of communications privacy is proposed to help policymakers strike the proper balance between user privacy and ISP need and injects privacy into the network neutrality debate - a debate about who gets to control innovation on the Internet.

  • 47
  • PDF
    Scott R. Peppet

    Computer Science, Law

  • 2010

It is argued that informational privacy law must focus on the economics of signaling and its unraveling of privacy, which creates new types of privacy harms.

  • 88
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization
    Paul Ohm

    Computer Science

  • 2009

It is necessary to respond to the surprising failure of anonymization, and this Article provides the tools to do so.

  • 1,011
  • PDF
Intermediaries and Hate Speech: Fostering Digital Citizenship for Our Information Age
    D. CitronHelen L. Norton

    Sociology, Computer Science

  • 2011

This work believes that a thoughtful and nuanced intermediary-based approach to hate speech can foster respectful online discourse without suppressing valuable expression and urges intermediaries to help address cyber hate by adopting accessible and transparent policies that educate users about their rights and responsibilities as digital citizens.

  • 146
  • PDF
Dealing with Disinformation: Evaluating the Case for CDA 230 Amendment
    Tim Hwang

    Political Science, Law

  • 2017

Recent revelations surrounding Russian interference in the 2016 US presidential election and the role that "fake news" may have played in shaping voter preferences have sparked a broad conversation

  • 5
  • PDF
The Scope and Potential of FTC Data Protection
    Woodrow HartzogDaniel J. Solove

    Law, Computer Science

  • 2015

It is argued that the FTC not only has the authority to regulate data protection to the extent it has been doing, but that its granted jurisdiction can expand its reach much more and should be fully embraced to respond to the privacy harms unaddressed.

  • 32
  • PDF
The FTC and the New Common Law of Privacy
    Daniel J. SoloveWoodrow Hartzog

    Law

  • 2013

One of the great ironies about information privacy law is that the primary regulation of privacy in the United States has barely been studied in a scholarly way. Since the late 1990s, the Federal

  • 164
  • PDF
The Third-Party Doctrine and the Future of the Cloud
    Neil M. Richards

    Law, Computer Science

  • 2017

The debate over the Third-Party Doctrine is put in historical, jurisprudential, and technological context, and a normative and civil-liberties-protective way forward for Fourth Amendment law in the age of the cloud is offered.

  • 2
The spread of true and false news online
    Soroush VosoughiD. RoySinan Aral

    Political Science, Computer Science

    Science

  • 2018

A large-scale analysis of tweets reveals that false rumors spread further and faster than the truth, and false news was more novel than true news, which suggests that people were more likely to share novel information.

  • 4,857
  • PDF
The Privacy Policymaking of State Attorneys General
    D. Citron

    Law, Political Science

  • 2016

Accounts of privacy law have focused on legislation, federal agencies, and the self-regulation of privacy professionals. Crucial agents of regulatory change, however, have been ignored: the state

  • 23
  • PDF

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    [PDF] Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security | Semantic Scholar (2024)

    FAQs

    How deep fakes could be used to impact national security? ›

    For instance, deepfake videos could be used to impersonate high-ranking officials or military leaders, disseminate false intelligence, or manipulate decision-making processes, compromising national security and endangering the safety of citizens.

    How does deepfake affect privacy? ›

    Deepfakes represent a significant threat to personal privacy as they can be manipulated for personal and financial gain. With the ability to convincingly alter digital media to depict individuals saying or doing things they never did; malicious actors can exploit deepfakes for various purposes.

    What is deepfake in terms of cyber security terms? ›

    Deepfakes, an emergent type of threat falling under the greater and more pervasive umbrella of synthetic media, utilize a form of artificial intelligence/machine learning (AI/ML) to create believable, realistic videos, pictures, audio, and text of events which never happened.

    Are deepfakes really a security threat? ›

    Even scarier are the AI-generated deepfakes that can mimic a person's voice, face and gestures. New cyber attack tools can deliver disinformation and fraudulent messages at a scale and sophistication not seen before. Simply put, AI-generated fraud is harder than ever to detect and stop.

    How is AI a threat to national security? ›

    Cyberattacks: AI models can be trained to identify and exploit vulnerabilities in software and systems, potentially leading to major breaches. Deepfakes: The ability to create realistic audio, photo, and video forgeries through AI, or deepfakes, threatens not only biometric-based systems but also public trust.

    What states are deepfakes illegal? ›

    Five states—California, Texas, Michigan, Washington, and Minnesota—already have such laws in place, with lawmakers in Sacramento contemplating additional action that could include a full ban on AI in political communications. On the federal level, Congress has lagged on tackling the subject compared to the states.

    What is the most common deepfake? ›

    A common example of a deepfake video is 'face swap' in which the face of the victim is placed on a different body. This could create a scene which is embarrassing or even illegal. Another deepfake is known as 'face puppetry' in which the victim's lip movements are manipulated to literally put words into their mouths.

    Why is AI hurting society? ›

    If AI algorithms are biased or used in a malicious manner — such as in the form of deliberate disinformation campaigns or autonomous lethal weapons — they could cause significant harm toward humans. Though as of right now, it is unknown whether AI is capable of causing human extinction.

    Are deepfakes a crime? ›

    Beginning in 2019, several states passed legislation aimed at the use of deepfakes. These laws do not apply exclusively to deepfakes created by AI. Rather, they more broadly apply to deceptive manipulated audio or visual images, created with malice, that falsely depict others without their consent.

    How does deepfake affect our society? ›

    Social impact

    Deepfake videos can also manipulate public opinion and erode trust in media and public sources. The ability to fabricate realistic videos of public figures, politicians, or celebrities saying or doing things they never actually did can have far-reaching consequences for society and democratic processes.

    Can software detect deepfakes? ›

    It typically utilizes various methods to analyze digital content and determine whether it has been manipulated or generated by AI. With the growing number of deepfakes, Deepfake detection software is becoming increasingly popular to protect against the harmful effects of fake videos and audios.

    What are the dangers of deep fakes? ›

    Not only has this technology created confusion, skepticism, and the spread of misinformation, deepfakes also pose a threat to privacy and security. With the ability to convincingly impersonate anyone, cybercriminals can orchestrate phishing scams or identity theft operations with alarming precision.

    What can deep fakes be used for? ›

    Deepfakes are videos, picture or audio clips made with artificial intelligence to look real. They can be used for fun, or even for scientific research, but sometimes they're used to impersonate people like politicians or world leaders, in order to deliberately mislead people.

    What is a positive impact of deep fakes? ›

    Individuals can gain autonomy and expand their purpose, ideas, and beliefs by using a personal digital avatar. Synthetic avatars of people with physical or mental disabilities will help express themselves online. Deepfakes can give individuals new tools for self-expression and integration in the digital world.

    References

    Top Articles
    Latest Posts
    Article information

    Author: Margart Wisoky

    Last Updated:

    Views: 5621

    Rating: 4.8 / 5 (78 voted)

    Reviews: 85% of readers found this page helpful

    Author information

    Name: Margart Wisoky

    Birthday: 1993-05-13

    Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

    Phone: +25815234346805

    Job: Central Developer

    Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

    Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.