SlideShare a Scribd company logo
1 of 2
Download to read offline
The Dark Side of AI: Deep-
Fake Technology Threatens
Trust

(Source – World Tech Festival)
The Rise of AI Manipulation
Artificial intelligence (AI) has reached a new frontier, and its power is more accessible than
ever before. Manipulating recorded sounds and images isn’t a novel concept, but the ease
with which individuals can alter information is a recent development. Generative AI, a subset
of AI, enables the creation of hyper-realistic images, videos, and audio clips. This Deepfake
technology, once reserved for experts, is now within reach of anyone with an internet
connection. Professor Hany Farid of the University of California, Berkeley, emphasizes that
the past year has seen a significant surge in the accessibility and affordability of this
technology. With just a few bucks a month, anyone can upload snippets of someone’s voice
and generate cloned speech from typed words, marking a concerning democratization of
manipulation capabilities.
Maryland Case Highlights Dangers
Last week, a troubling incident unfolded in a Maryland high school, shedding light on the
dark potential of AI manipulation. Authorities in Baltimore County revealed that the principal
of Pikesville High, Eric Eiswert, became a victim of AI-generated deception. The school’s
athletic director, Dazhon Darien, allegedly cloned Eiswert’s voice to create a fake recording
containing racist and antisemitic comments. The doctored audio, initially circulated via email
among teachers, quickly spread across social media platforms. The emergence of this
recording coincided with Eiswert raising concerns about Darien’s job performance and
possible financial misconduct, leading to the principal being placed on leave. As the incident
unfolded, police guarded Eiswert’s residence while the school faced a barrage of angry calls
and hate-fueled messages. Forensic analysis indicated traces of AI-generated content with
human editing, signaling a worrying trend in the misuse of advanced Deepfake technology
for nefarious purposes.
Addressing the Threat and Moving Forward
The prevalence of AI-generated disinformation, particularly in audio form, underscores the
urgent need for proactive measures. While some companies implementing AI voice-
generating technology claim to enforce prohibitions against harmful usage, self-regulation
remains inconsistent. Suggestions for mitigating risks include requiring users to provide
identifying information and implementing digital watermarks on recordings and images.
Additionally, increased law enforcement action against criminal misuse of AI, coupled with
enhanced consumer education, could serve as effective interventions. However, navigating
the ethical complexities surrounding AI regulation presents challenges, with considerations
for positive applications of the Deepfake technology, such as translation services. Achieving
international consensus on ethical standards further complicates the landscape, given varying
cultural attitudes toward AI usage. As society grapples with the implications of AI
manipulation, addressing these multifaceted challenges is paramount to safeguarding trust
and integrity in the digital age.

More Related Content

Similar to The Dark Side of AI: Deepfake Technology Threatens Trust | CyberPro Magazine

Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
UltraUploader
 

Similar to The Dark Side of AI: Deepfake Technology Threatens Trust | CyberPro Magazine (20)

IL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastIL CTO Presentation at Tech Feast
IL CTO Presentation at Tech Feast
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
 
Who Will Be the Most Influential Data Scientists in 2022.pdf
Who Will Be the Most Influential Data Scientists in 2022.pdfWho Will Be the Most Influential Data Scientists in 2022.pdf
Who Will Be the Most Influential Data Scientists in 2022.pdf
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
ETHICAL ISSUES IN SCIENCE AND TECHNOLOGY.pdf
ETHICAL ISSUES IN SCIENCE AND TECHNOLOGY.pdfETHICAL ISSUES IN SCIENCE AND TECHNOLOGY.pdf
ETHICAL ISSUES IN SCIENCE AND TECHNOLOGY.pdf
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy
 
ICT and Citizenship
ICT and CitizenshipICT and Citizenship
ICT and Citizenship
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Evolution of Bias in Artificial Intelligence and Solution the big problem
Evolution of Bias in Artificial Intelligence and Solution the big problemEvolution of Bias in Artificial Intelligence and Solution the big problem
Evolution of Bias in Artificial Intelligence and Solution the big problem
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 

More from cyberprosocial

More from cyberprosocial (20)

A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro MagazineA Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
 
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro MagazinePentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
 
Mastering Hierarchical Clustering: A Comprehensive Guide
Mastering Hierarchical Clustering: A Comprehensive GuideMastering Hierarchical Clustering: A Comprehensive Guide
Mastering Hierarchical Clustering: A Comprehensive Guide
 
Vulnerabilities in AI-as-a-Service Pose Threats to Data Security
Vulnerabilities in AI-as-a-Service Pose Threats to Data SecurityVulnerabilities in AI-as-a-Service Pose Threats to Data Security
Vulnerabilities in AI-as-a-Service Pose Threats to Data Security
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
The Looming Security Threat: AI-Powered Coding Tools
The Looming Security Threat: AI-Powered Coding ToolsThe Looming Security Threat: AI-Powered Coding Tools
The Looming Security Threat: AI-Powered Coding Tools
 
Vulnerability in Ray AI Framework Exploited, Hundreds of Clusters Compromised
Vulnerability in Ray AI Framework Exploited, Hundreds of Clusters CompromisedVulnerability in Ray AI Framework Exploited, Hundreds of Clusters Compromised
Vulnerability in Ray AI Framework Exploited, Hundreds of Clusters Compromised
 
Understanding Decision Trees in Machine Learning: A Comprehensive Guide
Understanding Decision Trees in Machine Learning: A Comprehensive GuideUnderstanding Decision Trees in Machine Learning: A Comprehensive Guide
Understanding Decision Trees in Machine Learning: A Comprehensive Guide
 
Demystifying Natural Language Processing: A Beginner’s Guide
Demystifying Natural Language Processing: A Beginner’s GuideDemystifying Natural Language Processing: A Beginner’s Guide
Demystifying Natural Language Processing: A Beginner’s Guide
 
Understanding and Defending Against Prompt Injection Attacks in AI Systems
Understanding and Defending Against Prompt Injection Attacks in AI SystemsUnderstanding and Defending Against Prompt Injection Attacks in AI Systems
Understanding and Defending Against Prompt Injection Attacks in AI Systems
 
Revolutionizing Industries: A Deep Dive into the Technology in Robots
Revolutionizing Industries: A Deep Dive into the Technology in RobotsRevolutionizing Industries: A Deep Dive into the Technology in Robots
Revolutionizing Industries: A Deep Dive into the Technology in Robots
 
Blockchain: Revolutionizing Industries and Transforming Transactions
Blockchain: Revolutionizing Industries and Transforming TransactionsBlockchain: Revolutionizing Industries and Transforming Transactions
Blockchain: Revolutionizing Industries and Transforming Transactions
 
Cryptocurrency: Revolutionizing the Financial Landscape
Cryptocurrency: Revolutionizing the Financial LandscapeCryptocurrency: Revolutionizing the Financial Landscape
Cryptocurrency: Revolutionizing the Financial Landscape
 
Artificial Intelligence: Shaping the Future of Technology
Artificial Intelligence: Shaping the Future of TechnologyArtificial Intelligence: Shaping the Future of Technology
Artificial Intelligence: Shaping the Future of Technology
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
 
The Evolution of Cyber Threats: Past, Present, and Future Trends
The Evolution of Cyber Threats: Past, Present, and Future TrendsThe Evolution of Cyber Threats: Past, Present, and Future Trends
The Evolution of Cyber Threats: Past, Present, and Future Trends
 
Explain the Role of Microservices in Cloud-native Architecture
Explain the Role of Microservices in Cloud-native ArchitectureExplain the Role of Microservices in Cloud-native Architecture
Explain the Role of Microservices in Cloud-native Architecture
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
 

Recently uploaded

MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
Krashi Coaching
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 

The Dark Side of AI: Deepfake Technology Threatens Trust | CyberPro Magazine

  • 1. The Dark Side of AI: Deep- Fake Technology Threatens Trust  (Source – World Tech Festival) The Rise of AI Manipulation Artificial intelligence (AI) has reached a new frontier, and its power is more accessible than ever before. Manipulating recorded sounds and images isn’t a novel concept, but the ease with which individuals can alter information is a recent development. Generative AI, a subset of AI, enables the creation of hyper-realistic images, videos, and audio clips. This Deepfake technology, once reserved for experts, is now within reach of anyone with an internet connection. Professor Hany Farid of the University of California, Berkeley, emphasizes that the past year has seen a significant surge in the accessibility and affordability of this technology. With just a few bucks a month, anyone can upload snippets of someone’s voice and generate cloned speech from typed words, marking a concerning democratization of manipulation capabilities. Maryland Case Highlights Dangers Last week, a troubling incident unfolded in a Maryland high school, shedding light on the dark potential of AI manipulation. Authorities in Baltimore County revealed that the principal of Pikesville High, Eric Eiswert, became a victim of AI-generated deception. The school’s
  • 2. athletic director, Dazhon Darien, allegedly cloned Eiswert’s voice to create a fake recording containing racist and antisemitic comments. The doctored audio, initially circulated via email among teachers, quickly spread across social media platforms. The emergence of this recording coincided with Eiswert raising concerns about Darien’s job performance and possible financial misconduct, leading to the principal being placed on leave. As the incident unfolded, police guarded Eiswert’s residence while the school faced a barrage of angry calls and hate-fueled messages. Forensic analysis indicated traces of AI-generated content with human editing, signaling a worrying trend in the misuse of advanced Deepfake technology for nefarious purposes. Addressing the Threat and Moving Forward The prevalence of AI-generated disinformation, particularly in audio form, underscores the urgent need for proactive measures. While some companies implementing AI voice- generating technology claim to enforce prohibitions against harmful usage, self-regulation remains inconsistent. Suggestions for mitigating risks include requiring users to provide identifying information and implementing digital watermarks on recordings and images. Additionally, increased law enforcement action against criminal misuse of AI, coupled with enhanced consumer education, could serve as effective interventions. However, navigating the ethical complexities surrounding AI regulation presents challenges, with considerations for positive applications of the Deepfake technology, such as translation services. Achieving international consensus on ethical standards further complicates the landscape, given varying cultural attitudes toward AI usage. As society grapples with the implications of AI manipulation, addressing these multifaceted challenges is paramount to safeguarding trust and integrity in the digital age.