Deep Fake Images of Taylor Swift Taken Down

Sexually explicit AI-generated images of Taylor Swift have been circulating on X Twitter) recently in the latest example of the proliferation of fake pornography. 

The spread of AI-generated sexually explicit images of the internationally popular singer / songwriter Taylor Swift is bad enough and she is perhaps th e most well-known example of what is happening to women every day. 

Now, US politicians are calling for new laws to criminalise the creation of deepfake images and videos, after the Taylor Swift  images were posted on social media sites, including X and Telegram, attracting more than 45m views.

In a statement, X Twitter said it was "actively removing" the images and taking "appropriate actions" against the accounts involved in spreading them. It added: "We're closely monitoring the situation to ensure that any further violations are immediately addressed, and the content is removed."While many of the images appear to have been removed at the time of publication, one photo of Swift was viewed a reported to have been viewed 47 million times before being taken down.

The name "Taylor Swift" is no longer searchable on X, alongside terms such as "Taylor Swift AI" and "Taylor AI"  

Deepfakes use Artificial Intelligence (AI) to make a video of someone by manipulating their face or body.  A study in 2023 found that there has been a 550% rise in the creation of doctored images since 2019, fuelled by the emergence of AI.  The exploitation of generative AI tools to create potentially harmful content targeting all types of public figures is increasing quickly and spreading faster than ever across social media.

In the US no federal laws against the sharing or creation of deepfake images, though there have been moves at state level to tackle the issue. In the UK, the sharing of deepfake pornography became illegal as part of its Online Safety Act in 2023.

US congressman Joe Morelle described the fake pictures as “appalling”. “The spread of AI-generated explicit images of Taylor Swift is appalling and sadly, it’s happening to women everywhere, every day,” he said on X.
“It’s sexual exploitation, and I’m fighting to make it a federal crime with my legislation: the Preventing Deepfakes of Intimate Images Act.”

Today, 404Media are reporting that Microsoft has closed a loophole in its AI tool, Designer, which allowed users to generate AI nude images of celebrities. Microsoft's changes come after 404 Media first reported that the Swift images that went viral on Twitter came from 4chan and Telegram, where people used Designer to make nude images of Swift and other celebrities.

This is not going to stop flow of  AI - generated deepfake images on the internet, but it is a very positive development in fighting back against this form of abuse.

404Media:   Joe Morelle:     ITV:       BBC:      Herald Scotland:   WHTimes:      MSN:    The Verge:    Vogue:  

You Might Also Read: 

Sharing Deepfakes To Be Made  Illegal In Britain:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Navigating Cloud-Native Application Security With CWPP
What Lessons Have We Learnt From Recent Ransomware Group Attacks? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

National Institute of Standards & Technology (NIST)

National Institute of Standards & Technology (NIST)

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

PureCyber

PureCyber

PureCyber (formerly Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

SafetyDetectives

SafetyDetectives

SafetyDetectives mission is to give our readers accurate and valuable information so they can make informed decisions about staying safe, secure and protected on the internet.

CSIOS Corp.

CSIOS Corp.

At CSIOS we help our customers achieve and sustain information and cyberspace superiority through a full range of defensive and offensive cyberspace operations and cybersecurity consulting services.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.