AI Generated Images Shake The Stock Market

A fake image and video that apparently shows an explosion near the Pentagon raises concerns about Artificial Intelligence’s (AI) ability to produce misinformation. Dozens of verified accounts, including national news organisations, shared images that shows black smoke billowing up from the ground next to a white building. 

The fake images of an explosion were most likely created using AI tools and caused a brief market slump in the NYSE and other stock markets. US officials later confirmed that no such incident had occurred.

Open source intelligence investigators at Bellingcat, a social media verification group, were quick to point out some notable problems with the image. Not least that the building in the image looks noticeably different from the Pentagon - which can easily be verified by using tools like Google Street View to compare the two images.

There were no other firsthand witnesses to corroborate the event, especially in a busy area like the Pentagon. Other details include an odd-looking floating lamp post and black pole protruding from the pavement were another giveaway that the image was not what it seemed. “This is why it’s so difficult (I’d argue effectively impossible) to create a believable fake of such an event,” a Belligcat investigator Nick Waters tweeted.  

There are several generative AI tools including Midjourney, Dall-e 2 and Stable Diffusion that can create life-like images , yet AI evidently still has a difficult time recreating locations without introducing random artefacts

These tools are trained by looking at large volumes of real images but fill in the gaps with their own interpretation when training data is missing. This can result in people having extra limbs and objects that are morphed with their surroundings.

Always look for clues in the image like nearby landmarks, road signs and even the weather conditions to help you place where or when the purported event could have taken place.

YouTube:      Bellingcat:    Nick Waters:     Al Jazeera:      Daily Mail:     News Australia:     Independent

You Might Also Read: 

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’:   

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cybersecurity & The Military
The Security Risks Of ChatGPT »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

LiveVault

LiveVault

LiveVault delivers fully automated, turnkey, backup over the Internet or a private network connection for uninterrupted remote data protection.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

TechMD

TechMD

TechMD (formerly ICS) is an award-winning IT solutions firm that specializes in cloud solutions, managed cybersecurity services, strategic IT consulting, and managed IT services.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

GlitchSecure

GlitchSecure

GlitchSecure helps companies secure their products and infrastructure through real-time continuous security testing.