BNMC Blog

Deepfakes Make It Hard to Believe Your Eyes or Ears

Deepfakes Make It Hard to Believe Your Eyes or Ears

How would you feel if a video of you appeared online, saying things that you never actually said? While you may not be the one targeted by this kind of action, this situation is very real, thanks to a relatively recent development in machine learning and artificial intelligence. Known as “deepfakes,” these videos have made it crucial to examine media from a place of skepticism.

What is a Deepfake, and How Are They Made?

A deepfake is a fabricated video that makes it possible to literally put words in someone’s mouth. As demonstrated by multiple research teams, while this technology is not yet perfect, it can be used to create a very convincing video - or an even more convincing still shot.

Deepfakes can be made using a combination of techniques and tools. 

Video Deepfakes

Using a specialized software solution, a video is scanned to identify the phenomes (the different sounds that make up full words) that are vocalized. Once they are identified, the phenomes are matched with the facial expressions that produce those sounds (also known as visemes). A 3D model of the subject’s face is then built based on the original video.

With the right software solution, these three factors can be combined with a transcript to create new footage and superimpose it over the original, making it appear that the person depicted is saying something that they never said. This creates a video that is just different enough to be disconcerting.

A similar method, that relies on mapping the expressions a person makes in source footage and applying them to a second person’s face, can even be used to bring paintings and old photographs to life.

Still Image Deepfakes

While the still images of people that were produced by AI were initially low-quality and generally unconvincing back in 2014, today’s - just five short years later - are effectively indistinguishable from the real deal. This is thanks to a technique known as a generative adversarial network. Using this technique, one AI generates images of people’s faces, anticipating feedback on how it did. In order to reach the desired level of photo-realism, it could potentially take millions of repetitions - something that nobody has time for.

Instead of subjecting a human being to the process of critiquing millions of images, a second AI is used to guess whether the picture was actually created by the first AI, or is a legitimate picture. While neither is particularly effective when first starting out, they swiftly improve in their capabilities over time, and can soon make images that are effectively indistinguishable from actual photographs of real people.

Neither of the people pictured here actually exist - they were instead created by NVIDIA in one of their machine learning AI initiatives.

As a result, we can see a dramatic rise in the capability for people to spread falsehoods and generally make the Internet a misinformative place.

How Misinformative?

Let’s look at a relatively recent example of how impactful altered video can be. In May of this year, video of House Speaker Nancy Pelosi blew up on social media that made her appear to be making a speech while intoxicated. Edited to make her sound as though her words were slurred, the original footage had been reduced to 75 percent of its original speed, with the Speaker’s voice adjusted to make it sound more like her natural pitch. This wasn’t the only instance of this happening, either. In addition to this speech, originally delivered at an event for the Center of American Progress, Pelosi’s voice was also manipulated to make her, again, appear drunk as she spoke to the American Road & Transportation Builders Association earlier in May. A similar claim was made in yet another video posted last year.

Regardless of your political views, it cannot be denied that this kind of activity is dangerous. While there have not yet been deepfakes deployed as a part of a disinformation campaign, the Director of National Intelligence Dan Coats alerted Congress to the possibility that America’s rivals could leverage them in the future.

Take, for example, this practical demonstration provided in a TED Talk by Google engineer Supasorn Suwajanakorn. Using footage of President George W. Bush, Suwajanakorn was able to create maps of assorted public figures and celebrities and have them speak on his behalf. He was also able to create four different models of President Barack Obama, that all appeared to make an identical speech.

Now, Suwajanakorn is working on a browser plugin to help natively identify deepfake videos and stop the spread of disinformation.

How Could This Impact Your Business?

Sure, global politics and pop culture are significant to many people, but how much of a threat could it really be to your business? Unfortunately, it may not be long before it could have a significant impact upon you.

Let’s say you have a customer or client who, for whatever reason, left your services feeling disgruntled. Someday soon enough, deepfake technology could be accessible enough for them to leverage it as part of a smear campaign against you and your company. Consider Speaker Pelosi’s ongoing struggle with people using rudimentary deepfakes to discredit her. Do you want similar efforts to be leveraged against you, where you are misquoted or misrepresented, whenever this technology becomes widespread?

Probably not.

In the meantime, there are plenty of other threats that you also have to contend with that could easily damage your business and its reputation just as much as some fabricated video footage could. BNMC can help to protect your operations from these threats. Give us a call at 978-482-2020 to learn more about what we have to offer.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Business Computing Privacy Microsoft User Tips Software Network Security Google Malware Hackers Productivity Business Hosted Solutions Computer Communication Tech Term Internet Data Ransomware Small Business IT Services Mobile Devices Efficiency Cloud Computing Hardware Smartphone IT Support Data Recovery Workplace Tips Backup Innovation Saving Money Android Business Continuity Windows Office 365 Managed IT Services Microsoft Office Information Users Social Media Mobile Device Data Backup Windows 10 Data Management Upgrade Managed IT Services Internet of Things Browser App Cybersecurity Vulnerability Passwords Productivity Business Management Facebook Server Phishing Word Gmail Outsourced IT Windows 10 Disaster Recovery Encryption Remote Monitoring Miscellaneous Smartphones communications Chrome Artificial Intelligence Network Money IT Support Employer-Employee Relationship Tip of the week Save Money Website Virtual Reality Infrastructure VoIP Analytics Managed Service Managed Service Provider Gadgets BYOD Applications Risk Management Company Culture Robot Antivirus Paperless Office Office Tips Automation Google Drive Content Filtering Bandwidth Development Big Data Unified Threat Management Apps VPN Access Control Government Apple Employee-Employer Relationship IT Management Education Settings Maintenance Router Hacker Data storage Display YouTube Vendor Management Outlook Monitors Spam Two-factor Authentication Computing Bring Your Own Device Operating System Hard Disk Drive Chromebook Avoiding Downtime WiFi LiFi Augmented Reality Scam Managing Stress Hosted Solution End of Support Administration Laptop Mouse Networking The Internet of Things Data loss Telephone Systems Downtime desktop HIPAA SaaS Data Security Server Management Business Technology Storage Holiday Virtual Private Network Computers Virtualization Touchscreen Printing Collaboration Firewall Mobile Security OneNote Quick Tips Tablet Document Management Retail Alert Business Intelligence Solid State Drive Wireless Samsung Bluetooth Comparison Staff Leominster Slack Hard Disk Drives Private Cloud Firefox Superfish Identity Theft Modem FinTech Print Toner Office Language Value Messaging Tech Support Address Alt Codes Permissions Training Corporate Profile Regulations Content Scary Stories Entertainment Patch Management Managed IT Service G Suite Mirgation Recycling Digital Signage Data Warehouse User Error Running Cable Automobile IoT Social Engineering Specifications Budget Buisness Dell K-12 Schools Monitoring Solid State Drives Customer Relationship Management Social Cookies MSP Shortcuts Cabling Computing Infrastructure Professional Services Employee-Employer Relationships Websites Typing Humor Virtual Desktop WannaCry Social Networking Streaming Heating/Cooling Multi-Factor Security Information Technology Sports iOS Best Practice Break Fix Chatbots eWaste Troubleshooting Business Analysis Time Management Printer Current Events Google Maps Star Wars Safety Search Black Friday Wearable Technology Network upgrade Spying National Security Nanotechnology Security Cameras Alerts USB Analysis Students Emergency Cryptocurrency Motherboard Cables Human Error Remote Computing Servers Google Calendar Scalability Dark Web Google Docs Identity Continuity Network Congestion Network Management IT solutions Going Green Fraud Cost Management Cyber Monday Smart Office Updates Hacks Cybercrime Digital Payment Screen Reader Charging Managed Services Marketing Legislation Google Wallet Disaster Licensing Dongle Mixed Reality Wi-Fi Bitcoin Digital Wires Device Writing Migration Business Growth Microsoft Excel Solar LED SharePoint Assessment Managed IT Smart Technology Legal Work PowerPoint Dark Data Update Techology Password Smart Tech Laptops Statistics Unified Communications Drones Uninterrupted Power Supply Cooperation Service Level Agreement Data Breach How To Lenovo Windows 8 Spyware Voice over Internet Protocol Mobility Hotspot Internet Exlporer Politics Mail Merge Blockchain Computer Care IBM Compliance Co-Managed IT Downloads Halloween File Sharing Software as a Service Shortcut Deep Learning Distributed Denial of Service IT Technicians Optimization Onboarding GDPR Customer Service VoIP Unified Threat Management Mobile Device Management Connectivity Point of Sale Ben McDonald shares Health Black Market Travel Law Enforcement Mobile Computing Notifications Electronic Medical Records Supercomputer CrashOverride Motion Sickness Physical Security Staffing Twitter Upgrades Gadget Taxes Emoji Administrator Crowdsourcing Web Server what was your? IT Budget Personal Information Botnet GPS 3D Printing IT Consultant Printers Cortana Cameras Meetings Machine Learning Tracking BDR Processors Unsupported Software Cleaning CCTV Regulation Webcam Computer Repair Relocation Windows 7 Mobile Data How To Work/Life Balance Recovery Error

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3