By accepting you will be accessing a service provided by a third-party external to

Deepfakes Make It Hard to Believe Your Eyes or Ears

Deepfakes Make It Hard to Believe Your Eyes or Ears

How would you feel if a video of you appeared online, saying things that you never actually said? While you may not be the one targeted by this kind of action, this situation is very real, thanks to a relatively recent development in machine learning and artificial intelligence. Known as “deepfakes,” these videos have made it crucial to examine media from a place of skepticism.

What is a Deepfake, and How Are They Made?

A deepfake is a fabricated video that makes it possible to literally put words in someone’s mouth. As demonstrated by multiple research teams, while this technology is not yet perfect, it can be used to create a very convincing video - or an even more convincing still shot.

Deepfakes can be made using a combination of techniques and tools. 

Video Deepfakes

Using a specialized software solution, a video is scanned to identify the phenomes (the different sounds that make up full words) that are vocalized. Once they are identified, the phenomes are matched with the facial expressions that produce those sounds (also known as visemes). A 3D model of the subject’s face is then built based on the original video.

With the right software solution, these three factors can be combined with a transcript to create new footage and superimpose it over the original, making it appear that the person depicted is saying something that they never said. This creates a video that is just different enough to be disconcerting.

A similar method, that relies on mapping the expressions a person makes in source footage and applying them to a second person’s face, can even be used to bring paintings and old photographs to life.

Still Image Deepfakes

While the still images of people that were produced by AI were initially low-quality and generally unconvincing back in 2014, today’s - just five short years later - are effectively indistinguishable from the real deal. This is thanks to a technique known as a generative adversarial network. Using this technique, one AI generates images of people’s faces, anticipating feedback on how it did. In order to reach the desired level of photo-realism, it could potentially take millions of repetitions - something that nobody has time for.

Instead of subjecting a human being to the process of critiquing millions of images, a second AI is used to guess whether the picture was actually created by the first AI, or is a legitimate picture. While neither is particularly effective when first starting out, they swiftly improve in their capabilities over time, and can soon make images that are effectively indistinguishable from actual photographs of real people.

Neither of the people pictured here actually exist - they were instead created by NVIDIA in one of their machine learning AI initiatives.

As a result, we can see a dramatic rise in the capability for people to spread falsehoods and generally make the Internet a misinformative place.

How Misinformative?

Let’s look at a relatively recent example of how impactful altered video can be. In May of this year, video of House Speaker Nancy Pelosi blew up on social media that made her appear to be making a speech while intoxicated. Edited to make her sound as though her words were slurred, the original footage had been reduced to 75 percent of its original speed, with the Speaker’s voice adjusted to make it sound more like her natural pitch. This wasn’t the only instance of this happening, either. In addition to this speech, originally delivered at an event for the Center of American Progress, Pelosi’s voice was also manipulated to make her, again, appear drunk as she spoke to the American Road & Transportation Builders Association earlier in May. A similar claim was made in yet another video posted last year.

Regardless of your political views, it cannot be denied that this kind of activity is dangerous. While there have not yet been deepfakes deployed as a part of a disinformation campaign, the Director of National Intelligence Dan Coats alerted Congress to the possibility that America’s rivals could leverage them in the future.

Take, for example, this practical demonstration provided in a TED Talk by Google engineer Supasorn Suwajanakorn. Using footage of President George W. Bush, Suwajanakorn was able to create maps of assorted public figures and celebrities and have them speak on his behalf. He was also able to create four different models of President Barack Obama, that all appeared to make an identical speech.

Now, Suwajanakorn is working on a browser plugin to help natively identify deepfake videos and stop the spread of disinformation.

How Could This Impact Your Business?

Sure, global politics and pop culture are significant to many people, but how much of a threat could it really be to your business? Unfortunately, it may not be long before it could have a significant impact upon you.

Let’s say you have a customer or client who, for whatever reason, left your services feeling disgruntled. Someday soon enough, deepfake technology could be accessible enough for them to leverage it as part of a smear campaign against you and your company. Consider Speaker Pelosi’s ongoing struggle with people using rudimentary deepfakes to discredit her. Do you want similar efforts to be leveraged against you, where you are misquoted or misrepresented, whenever this technology becomes widespread?

Probably not.

In the meantime, there are plenty of other threats that you also have to contend with that could easily damage your business and its reputation just as much as some fabricated video footage could. BNMC can help to protect your operations from these threats. Give us a call at 978-482-2020 to learn more about what we have to offer.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 03 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Email Network Security Microsoft Hosted Solutions Software Hackers Computer Business Malware Efficiency Communication Google Data Small Business Workplace Tips IT Services IT Support Mobile Devices Hardware Cloud Computing Tech Term Internet Managed IT Services Data Recovery Innovation Backup Ransomware Smartphone Outsourced IT Users Upgrade Windows Smartphones Android Saving Money Mobile Device Miscellaneous Data Backup Disaster Recovery Business Management communications VoIP Facebook Server Browser Phishing Microsoft Office Windows 10 Information Business Continuity Productivity Office 365 Network Managed IT Services Cybersecurity Social Media Data Management Windows 10 Passwords Internet of Things Vulnerability Remote Monitoring Gmail Word Gadgets App Apps Infrastructure Encryption Artificial Intelligence Chrome Mobile Office Managed Service Quick Tips Tip of the week Save Money Company Culture Analytics Networking Virtual Reality Settings Managed Service Provider Access Control VPN Money IT Support Employer-Employee Relationship BYOD Remote Workers Information Technology Applications Website Router Content Filtering Office Tips Bandwidth Unified Threat Management Avoiding Downtime Robot Apple Antivirus Education Automation Storage Big Data Collaboration Firewall Maintenance Development Hacker Data storage IT Management Data Security Government Employee-Employer Relationship Computers Virtual Private Network HIPAA YouTube BDR WiFi Risk Management Paperless Office Display Google Drive Business Intelligence Software as a Service Social Network Mouse Vendor Management Two-factor Authentication Monitors Going Green Chromebook Laptop Data loss Managed IT Service Customer Relationship Management Scam The Internet of Things Telephone Systems desktop Printing MSP End of Support Augmented Reality Break Fix Managing Stress iOS Search Password Downtime Remote Computing Marketing Document Management Conferencing SaaS Managed Services Wi-Fi Solid State Drive Server Management Wireless Business Technology Holiday Spam Computing Touchscreen Virtualization Outlook Bring Your Own Device Operating System Training Managed IT LiFi Hard Disk Drive Mobile Security Tablet OneNote Retail Alert Social Hosted Solution Data Breach Humor Windows 7 Best Practice IT Administration Firefox Superfish Compliance Managed Services Provider Health Private Cloud Bluetooth Hotspot Comparison Internet Exlporer Onboarding GDPR Office Samsung Buisness Google Maps Tech Support Virtual Desktop Connectivity Slack Hard Disk Drives Cryptocurrency COVID-19 Sports Address IT Technicians Permissions Optimization Print Toner Myths User Error Modem FinTech Messaging Holidays Google Docs Patch Management Staff Leominster Content Huawei IT solutions Regulations Entertainment Vendor Distribution Language Specifications Value Digital Signage Data Warehouse Social Engineering Hacks Websites Google Wallet Heating/Cooling Multi-Factor Security IoT Monitoring Solid State Drives Bitcoin Remote Work Digital Payment Mirgation Recycling Shortcuts Mobile Management Disaster Time Management Printer Cookies Employee-Employer Relationships Business Growth Payment Card Digital K-12 Schools Streaming Processor Social Networking Hybrid Cloud Logistics Legal Cybercrime Computing Infrastructure Black Friday Professional Services Troubleshooting Business Analysis Safety Security Cameras Profiles Unified Communications Drones Servers Google Calendar Star Wars Spying National Security Windows 8 Emergency Chatbots eWaste Uninterrupted Power Supply Network Management Nanotechnology Analysis Students Network Congestion Inventory Spyware Wearable Technology Dark Web Network upgrade Human Error Memory File Sharing Motherboard Cables Scalability Deep Learning Asset Management Computer Care IBM Alerts Cyber Monday USB Virus Mobile Device Management Continuity Utility Computing Fraud Legislation Cost Management Updates Writing Peripheral Identity SharePoint Screen Reader Charging Mixed Reality Alt Codes Shadow IT Halloween Identity Theft Microsoft Excel Smart Office Device Reducing Cost Techology Wires Migration Consulting Dark Data Update Memes Corporate Profile Licensing Smart Technology Dongle LED Threats Solar Laptops Budget G Suite Statistics Assessment PowerPoint Automobile How To Lenovo Politics Dell Downloads Smart Tech Typing Gamification Scary Stories Mail Merge Blockchain Work Mobility Batteries Cabling VoIP Unified Threat Management Voice over Internet Protocol Customer Service Running Cable WannaCry Shortcut Cooperation Distributed Denial of Service Service Level Agreement Co-Managed IT Work/Life Balance Current Events Taxes Administrator Web Server what was your? Black Market IT Budget GPS Law Enforcement Electronic Medical Records IT Consultant Notifications Physical Security Cameras Twitter Meetings Emoji Tracking Upgrades Gadget Cleaning Crowdsourcing Personal Information Botnet CCTV Webcam Cortana 3D Printing Printers Machine Learning Processors Error Unsupported Software Point of Sale Ben McDonald shares Travel Mobile Computing Computer Repair Relocation Mobile Data Regulation Supercomputer CrashOverride Motion Sickness Recovery Staffing Financial How To

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3