SlideShare a Scribd company logo
DEEPFAKES
A NEWCYBER THREAT
UNDERSTANDING “DEEPFAKES”
• Uses Machine learning an aspect of Artificial Intelligence .
• It manipulates Video or Audio clips to fabricate reality, to prompt
negative response from the target audience.
• Fraudsters too are using Deepfakes to commit their frauds.
• The user name Deepfakes come from the notorious website Reddit in
2017 though now impersonations are forbidden on this site.
• As of 2019 it is estimated 14,600Deepfake Videos existed and posted
online.
• Deepfake tools are many.
• Fraudsters might have used the Deepfake technology .
• Deepfake technology is going to be the future threat by fraudsters as
it is easy to use many tools that are available to do voice cloning etc.
• Fraudsters cheat people through deepfake apps. By impersonating
voice, images etc of public figures and celebrities.
• Deepfakes are also used to manipulate Biometrics-like-Face
recognition, Voice recognition and Finger prints.
• It is at times very difficult too to prove in courts of law a Deepfake
instances besides involves costs too.
• Thus deepfakes are used by fraudsters for stock profiteering,
extortion and virtual kidnapping etc.
Possible Remedies:
1.Training
2.Awareness of deepfake usage and consequences
3. Good procedures in place
4. Good controls.

More Related Content

Similar to Deepfakes

workers participation in management
workers participation in managementworkers participation in management
workers participation in management
lily004
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdf
IMRAN SIDDIQ
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
BbAOC
 

Similar to Deepfakes (20)

What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdf
 
Cyber crime ppt college.pptx
Cyber crime ppt college.pptxCyber crime ppt college.pptx
Cyber crime ppt college.pptx
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming Concerns
 
DeepFake_Seminar.pptx
DeepFake_Seminar.pptxDeepFake_Seminar.pptx
DeepFake_Seminar.pptx
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
TH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingTH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishing
 
Phishing
PhishingPhishing
Phishing
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Deep fakes and beyond
Deep fakes and beyondDeep fakes and beyond
Deep fakes and beyond
 
DeepFake: Trick or Treat
DeepFake: Trick or TreatDeepFake: Trick or Treat
DeepFake: Trick or Treat
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensics
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guide
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
 

More from CA.Kolluru Narayanarao

More from CA.Kolluru Narayanarao (16)

Alumni Meetinfg2022-August.pptx
Alumni Meetinfg2022-August.pptxAlumni Meetinfg2022-August.pptx
Alumni Meetinfg2022-August.pptx
 
Do you know..006
Do you know..006Do you know..006
Do you know..006
 
Do u know 001-ROMANCE FRAUDS
Do u know 001-ROMANCE FRAUDSDo u know 001-ROMANCE FRAUDS
Do u know 001-ROMANCE FRAUDS
 
Do you know..series 05
Do you know..series 05Do you know..series 05
Do you know..series 05
 
Do u know 002
Do u know 002Do u know 002
Do u know 002
 
Deepfakes
DeepfakesDeepfakes
Deepfakes
 
Ponzi schemes-lesson vii
Ponzi  schemes-lesson viiPonzi  schemes-lesson vii
Ponzi schemes-lesson vii
 
Ponzi schemes
Ponzi  schemes Ponzi  schemes
Ponzi schemes
 
Whistle Blowers
Whistle BlowersWhistle Blowers
Whistle Blowers
 
Lesson 08-red flags
Lesson 08-red flagsLesson 08-red flags
Lesson 08-red flags
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lessons on fraud awareness-PART-II
Lessons on fraud awareness-PART-IILessons on fraud awareness-PART-II
Lessons on fraud awareness-PART-II
 
Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1
 
Fraudsdetection
FraudsdetectionFraudsdetection
Fraudsdetection
 

Recently uploaded

Recently uploaded (20)

Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Deepfakes

  • 3.
  • 4. UNDERSTANDING “DEEPFAKES” • Uses Machine learning an aspect of Artificial Intelligence . • It manipulates Video or Audio clips to fabricate reality, to prompt negative response from the target audience.
  • 5. • Fraudsters too are using Deepfakes to commit their frauds. • The user name Deepfakes come from the notorious website Reddit in 2017 though now impersonations are forbidden on this site. • As of 2019 it is estimated 14,600Deepfake Videos existed and posted online.
  • 6. • Deepfake tools are many. • Fraudsters might have used the Deepfake technology . • Deepfake technology is going to be the future threat by fraudsters as it is easy to use many tools that are available to do voice cloning etc. • Fraudsters cheat people through deepfake apps. By impersonating voice, images etc of public figures and celebrities.
  • 7. • Deepfakes are also used to manipulate Biometrics-like-Face recognition, Voice recognition and Finger prints. • It is at times very difficult too to prove in courts of law a Deepfake instances besides involves costs too. • Thus deepfakes are used by fraudsters for stock profiteering, extortion and virtual kidnapping etc.
  • 8. Possible Remedies: 1.Training 2.Awareness of deepfake usage and consequences 3. Good procedures in place 4. Good controls.