BNMC Blog

Deepfakes Make It Hard to Believe Your Eyes or Ears

Deepfakes Make It Hard to Believe Your Eyes or Ears

How would you feel if a video of you appeared online, saying things that you never actually said? While you may not be the one targeted by this kind of action, this situation is very real, thanks to a relatively recent development in machine learning and artificial intelligence. Known as “deepfakes,” these videos have made it crucial to examine media from a place of skepticism.

What is a Deepfake, and How Are They Made?

A deepfake is a fabricated video that makes it possible to literally put words in someone’s mouth. As demonstrated by multiple research teams, while this technology is not yet perfect, it can be used to create a very convincing video - or an even more convincing still shot.

Deepfakes can be made using a combination of techniques and tools. 

Video Deepfakes

Using a specialized software solution, a video is scanned to identify the phenomes (the different sounds that make up full words) that are vocalized. Once they are identified, the phenomes are matched with the facial expressions that produce those sounds (also known as visemes). A 3D model of the subject’s face is then built based on the original video.

With the right software solution, these three factors can be combined with a transcript to create new footage and superimpose it over the original, making it appear that the person depicted is saying something that they never said. This creates a video that is just different enough to be disconcerting.

A similar method, that relies on mapping the expressions a person makes in source footage and applying them to a second person’s face, can even be used to bring paintings and old photographs to life.

Still Image Deepfakes

While the still images of people that were produced by AI were initially low-quality and generally unconvincing back in 2014, today’s - just five short years later - are effectively indistinguishable from the real deal. This is thanks to a technique known as a generative adversarial network. Using this technique, one AI generates images of people’s faces, anticipating feedback on how it did. In order to reach the desired level of photo-realism, it could potentially take millions of repetitions - something that nobody has time for.

Instead of subjecting a human being to the process of critiquing millions of images, a second AI is used to guess whether the picture was actually created by the first AI, or is a legitimate picture. While neither is particularly effective when first starting out, they swiftly improve in their capabilities over time, and can soon make images that are effectively indistinguishable from actual photographs of real people.

Neither of the people pictured here actually exist - they were instead created by NVIDIA in one of their machine learning AI initiatives.

As a result, we can see a dramatic rise in the capability for people to spread falsehoods and generally make the Internet a misinformative place.

How Misinformative?

Let’s look at a relatively recent example of how impactful altered video can be. In May of this year, video of House Speaker Nancy Pelosi blew up on social media that made her appear to be making a speech while intoxicated. Edited to make her sound as though her words were slurred, the original footage had been reduced to 75 percent of its original speed, with the Speaker’s voice adjusted to make it sound more like her natural pitch. This wasn’t the only instance of this happening, either. In addition to this speech, originally delivered at an event for the Center of American Progress, Pelosi’s voice was also manipulated to make her, again, appear drunk as she spoke to the American Road & Transportation Builders Association earlier in May. A similar claim was made in yet another video posted last year.

Regardless of your political views, it cannot be denied that this kind of activity is dangerous. While there have not yet been deepfakes deployed as a part of a disinformation campaign, the Director of National Intelligence Dan Coats alerted Congress to the possibility that America’s rivals could leverage them in the future.

Take, for example, this practical demonstration provided in a TED Talk by Google engineer Supasorn Suwajanakorn. Using footage of President George W. Bush, Suwajanakorn was able to create maps of assorted public figures and celebrities and have them speak on his behalf. He was also able to create four different models of President Barack Obama, that all appeared to make an identical speech.

Now, Suwajanakorn is working on a browser plugin to help natively identify deepfake videos and stop the spread of disinformation.

How Could This Impact Your Business?

Sure, global politics and pop culture are significant to many people, but how much of a threat could it really be to your business? Unfortunately, it may not be long before it could have a significant impact upon you.

Let’s say you have a customer or client who, for whatever reason, left your services feeling disgruntled. Someday soon enough, deepfake technology could be accessible enough for them to leverage it as part of a smear campaign against you and your company. Consider Speaker Pelosi’s ongoing struggle with people using rudimentary deepfakes to discredit her. Do you want similar efforts to be leveraged against you, where you are misquoted or misrepresented, whenever this technology becomes widespread?

Probably not.

In the meantime, there are plenty of other threats that you also have to contend with that could easily damage your business and its reputation just as much as some fabricated video footage could. BNMC can help to protect your operations from these threats. Give us a call at 978-482-2020 to learn more about what we have to offer.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 18 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy Computer User Tips Microsoft Network Security Malware Hackers Productivity Google Software Hosted Solutions Business Data Communication Hardware Tech Term Ransomware Mobile Devices Internet Small Business IT Services Efficiency Cloud Computing Data Recovery Smartphone IT Support Workplace Tips Backup Upgrade Android Saving Money Innovation Windows Managed IT Services Users Data Backup Social Media Business Continuity Office 365 Managed IT Services Microsoft Office Information Server Data Management Miscellaneous Outsourced IT Mobile Device Browser Windows 10 Windows 10 Smartphones Internet of Things Business Management Facebook Phishing Word communications Vulnerability Gmail App Cybersecurity Passwords Productivity Remote Monitoring Artificial Intelligence Network Disaster Recovery Encryption VoIP Infrastructure Chrome Tip of the week Gadgets Managed Service Provider Apps Save Money Analytics Employer-Employee Relationship Virtual Reality Website Money IT Support Managed Service BYOD Applications Content Filtering Bandwidth Maintenance Antivirus Company Culture Apple Robot Education Storage YouTube Automation Risk Management Development Access Control VPN IT Management Office Tips Hacker Data storage Government Employee-Employer Relationship Paperless Office Quick Tips Big Data Unified Threat Management Router Settings Google Drive Display Mouse Two-factor Authentication desktop Avoiding Downtime Scam Vendor Management Collaboration Firewall Monitors Chromebook MSP Document Management Augmented Reality Printing Networking Search Managing Stress Solid State Drive Wireless End of Support Data Security Hard Disk Drive Server Management Business Technology Touchscreen Laptop HIPAA SaaS Virtual Private Network Spam Computing The Internet of Things Outlook Mobile Security Bring Your Own Device Holiday Operating System Tablet Computers WiFi Virtualization LiFi OneNote Retail Hosted Solution Alert Data loss Downtime Telephone Systems Business Intelligence Administration Connectivity Software as a Service Digital Payment IT Technicians Optimization Onboarding GDPR Customer Service Address Permissions FinTech Print Toner Office Samsung User Error Digital Staff Leominster Slack Hard Disk Drives Cryptocurrency Private Cloud Patch Management Managed IT Service Disaster Modem Going Green Customer Relationship Management Language Value Messaging Tech Support Google Docs Specifications Regulations Content Huawei IT solutions IoT Entertainment Heating/Cooling Multi-Factor Security Halloween Mirgation Recycling Digital Signage Data Warehouse Hacks Cookies Shortcuts Social Engineering Google Wallet Time Management Printer Spyware K-12 Schools Monitoring Solid State Drives Bitcoin Break Fix Uninterrupted Power Supply Computer Care IBM Computing Infrastructure Professional Services Employee-Employer Relationships Business Growth Websites Black Friday File Sharing Social Networking Streaming Processor Star Wars iOS Legal Servers Google Calendar Scary Stories Chatbots eWaste Troubleshooting Business Analysis Password Emergency Nanotechnology Security Cameras Safety Unified Communications Drones Network Management Running Cable Identity Theft Wearable Technology Network upgrade Spying National Security Windows 8 Dark Web Memory Remote Computing Training Corporate Profile Alerts USB Analysis Students Cyber Monday Buisness Motherboard Cables Human Error Virtual Desktop G Suite Fraud Cost Management Scalability Deep Learning Legislation Sports Automobile Identity Continuity Virus Network Congestion Mobile Device Management Screen Reader Charging Managed Services SharePoint Smart Office Updates Microsoft Excel Dell Device Reducing Cost Writing Techology WannaCry Licensing Dongle Mixed Reality Wi-Fi Alt Codes Managed IT Smart Technology Cabling BDR Wires Assessment Migration Statistics Google Maps Solar LED Threats How To Lenovo Smart Tech Laptops Budget Downloads Work PowerPoint Dark Data Update Social Mail Merge Blockchain Mobility Batteries Information Technology VoIP Unified Threat Management Cybercrime Cooperation Service Level Agreement Data Breach Typing Humor Shortcut Distributed Denial of Service Voice over Internet Protocol Superfish Hotspot Internet Exlporer Windows 7 Best Practice Politics Bluetooth Comparison Marketing Compliance Co-Managed IT Current Events Firefox How To Work/Life Balance Recovery Cameras Myths Tracking Health Meetings Black Market Cleaning CCTV Law Enforcement Notifications Electronic Medical Records Webcam Twitter Physical Security Upgrades Gadget Error Emoji Crowdsourcing Point of Sale Ben McDonald shares Personal Information Botnet Travel 3D Printing Printers Cortana Supercomputer CrashOverride Processors Staffing Machine Learning Motion Sickness Taxes Unsupported Software Administrator Mobile Computing Regulation IT Budget Web Server what was your? GPS Computer Repair Relocation IT Consultant Mobile Data Financial

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3