fbpx
Question? Call Us 858-777-0040
Logo 01

What in the World is a Deepfake?

Deep fakes image
Download the accountant's guide to the safeguards ruleGet your CPA firm aquainted with new FTC rules.

Read our latest eBook "The Accountant's Guide to the FTC Safeguards Rule"

Mark was having a typical workday when he played his voicemails back. One of them was from his boss Tom, who was on vacation and asked him to transfer company funds to another account.

The voicemail was accompanied by an email thread that corroborated the audio, and Mark performed the transfer.

But the audio turned out to be a “deepfake” vishing call from a cybercriminal, audio almost indistinguishable from real audio of Tom’s boss.

Anyone Can Do It

You can have a hard time recognizing what is or is not valid in the news–and the internet has democratized fakery.

Anyone can now use machine learning (ML) and artificial intelligence (AI) to create deepfakes–videos or phone calls using the likeness of someone’s actual, existing image, audio, or video to say or do things the targets never said or did.

Creating these videos now take days versus what used to be weeks or years and can be done with available apps.

And famous people have often been the subject of this misleading content: the Kardashians, Nancy Pelosi, Donald Trump, Barack Obama, Kim Jong-un, Vladimir Putin, Tom Cruise, and Volodymyr Zelenskyy have all been victims of videos of them saying or doing things they did not say or do.

Cybercriminals and scammers can manipulate visual and audio content to easily create fake child abuse material, celebrity and revenge porn, fake news, hoaxes, and fraud (Wikipedia).

A study in the Netherlands found that 96% of deepfakes online involve the non-consensual, digital placement of persons in porn videos.

Governments and the IT industry have been playing whack-a-mole with this never-ending content stream. As the next election approaches, staying on top of deepfakes has become a national security issue. 

As the barrier to entry in creating this material has decreased, Google, Meta (Facebook), and Microsoft are taking active roles in analyzing these media to improve detection. Twitter has placed warnings on deepfake media, and Meta has taken measures to decrease fake media on its platform.

In 2019, Meta hosted the “Deepfake Detection Challenge (DFDC),” which had over 2,000 participants and 3,500 paid actors, to “accelerate the development of new ways to detect deepfake videos” (Meta).

The Problem Appears to be Growing

Recently, deepfake technologies have been used to apply for remote technical jobs. Cybercriminals and scammers use stolen personally identifiable information (PII) and involve other Business Email Compromise (BEC) tactics to spy on email accounts and threads, learning about the impersonated individuals to carry out the crime.

These crooks have actively exploited these methods in the wild. In 2019, a cyber scammer used a deepfaked voice to trick a U.K.-based energy firm’s CEO into transferring €220,000 into a Hungarian bank account belonging to the scammer.

The FBI has alerted companies to these problems: “we will continue to investigate any violations of federal law and actors that may use them for nefarious acts.”

The UN and Europol are also looking into how to combat the threat of these media (Al Jazeera).

As is always the case, evaluation of new technology comes down to the weight of the benefits versus misuse or abuse.

In this case, the tech appears more prone to misuse than to a morally neutral use.

In December 2021, Today presented the opposite view, that the benefits will be more significant than the misuse. Some software developers are only taking on deepfake projects that are considered ethical.

How Can You Tell?

How to expose deepfakes? Though the technology is improving, audio that does not sync with the video–with the mouth or facial expressions of the individual while they speak–has exposed the ruse.

From the FBI: “At times, actions such as coughing, sneezing, or other auditory actions are not aligned with what is presented visually.”

Watch for problems with the video resolution, blurring around ears or hairline, and ghosting around the face (Al Jazeera).

So how could these developments affect your business? Cybercriminals and scammers could use your likeness to extort (blackmail) you through a video or audio clip with you or another target at your organization saying or doing something objectionable.

The cybercriminals could also damage your reputation through fake pornography using your likeness or, again, blackmailing you with the threat of publicly releasing it.

Social media and internet memes could spread through destructive deepfakes. An artificial voice could ask an employee to transfer funds (BEC).

Conclusion: You Can Protect Yourself

As always, staying on top of threats with threat intelligence, verifying email senders, and requiring vetting of new applicants are just some of the precautions you should take.

Human resources may have their hands full detecting what is a legitimate applicant but should realize that crooks and scammers can steal information to pass background checks of prospective employees.

ZDNet has one recommendation for recognizing deepfakes: the model in a deepfake video can be exposed through he/she turning to a profile shot. The quality for the video in this case may not be up to par.

Be aware and maintain a healthy skepticism.

***

Tech Kahunas is a San Diego Managed IT Services provider which provides IT support and services like 24/7 monitoring, data backup and restore, and malware protection.

Tech Kahunas will help you Defend Your Island. Set up a free 30-minute Strategy Session with us now.

The four elements of the KahunaVision Technology Assessment are:

– Outsourcing –
Upgrade with our Kahunas. We’ll take your concerns (and problems) so you can do what you do best.

– Modernization –
Throw away that old tech! Take advantage of artificial intelligence, cloud apps, and fortified backups.

– Cybersecurity –
Don’t understand cybersecurity? Strengthen your IT systems with your personal Tech Kahuna.

– Compliance –
Compliance is boring–but many businesses still need to do it! We’ll help you with that, too.

Kahuna Shield will tie it all together.

Get your CPA firm aquainted with new FTC rules.

Read our latest eBook "The Accountant's Guide to the FTC Safeguards Rule"

Leave a comment

Your email address will not be published. Required fields are marked *

Peter Bondaryk
Peter Bondaryk
Facebook
Twitter
LinkedIn
Pinterest

– Outsourcing –
Upgrade with our Kahunas. We’ll take your concerns (and problems) so you can do what you do best.

– Modernization –
Throw away that old tech! Take advantage of artificial intelligence, cloud apps, and fortified backups.

– Cybersecurity –
Don’t understand cybersecurity? Strengthen your IT systems with your personal Tech Kahuna.

– Compliance –
Compliance is boring–but many businesses still need to do it! We’ll help you with that, too.

Wield the Kahuna Shield

Schedule a strategy session

Get Our FREE C-Suite and Business Owner's Guide
to Cybersecurity
csuite-ebook-homesplash
Latest posts
Follow us

Get Our FREE Accountant's Guide to the FTC Safeguards Rule Ebook!

The New FTC Requirements
That Will Change the Way You
Do Business

Get Your FREE Copy!​

Sign up to learn how you can protect against cybercrime

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

If today your business was hacked and you were at risk of losing it all...
Do you have a plan?
We will not spam, rent, or sell your information.

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

Join our newsletter and get a 20% discount
Promotion nulla vitae elit libero a pharetra augue