Deep-Fake Information Warfare

The introduction of machine learning, and potentially Artificial Intelligence (AI), will vastly enhance capabilities for automating the reaching of mass audiences with tailored and plausible content. Consequently, they will render malicious actors even more powerful.

Information warfare, or targeted misinformation campaigns designed to confuse and obfuscate for political gain, are nothing new. Disinformation and so-called fake news have been around for generations.

Prior to the  invasion of Ukraine, there were suggestions that Russia was planning to produce a fake video showing a Ukrainian attack as a pretext for an invasion. At the time, US officials claimed to have evidence of a Russian plan to make a “very graphic” fake video of a Ukrainian attack on the Russian-speaking secessionist Donetsk region of Ukraine.

The alleged plot would involve using corpses, footage of blown-up buildings, fake Ukrainian military hardware, Turkish-made drones and actors playing the part of Russian-speaking mourners. 

The use of misleading “deepfakes” has risen dramatically across the globe. As with so much of emerging technology, deepfakes will inevitably become a part of armed conflict. While perfidious deepfakes like that would almost certainly violate the law of armed conflict, those that amount to ruses would not. Other considerations about the impact on the civilian population are also necessary to determine what uses of deepfakes in armed conflict would be legal.

Although this false flag operation did not materialise, deepfake technology is increasingly recognised as a potentially useful and effective tool in armed conflict.

Recent years have seen Deep-Fake technology become an effective weapon in times of war. In the recent war Russia has waged against Ukraine, suspicion has surfaced that Russia is planning to use fake videos as a pretext for invasion, using Deep-Fake, representing a Ukrainian attack.

Deep-Fake is a computer simulation of reality produced by AI, and it is capable of forging identities in videos. In the wake of Deep Fake videos being used for political purposes, concerns have grown that the technology might be harmful and affect democratic processes.

Deep-Fake technology has been described as a kind of information warfare when used to deceive the public or disrupt international relations.

As a result, this technology becomes a powerful tool for manipulating information by faking images, audio and creating materials that can be quickly shared via social media, thereby contributing to disinformation. In the absence of a policy of protection against Deep-Fake being used to disrupt international relations, the law provides a loophole which can be exploited.

According to the Lieber Institute at the US  West Point military academy it is hard to resolve the problem of a Deep-Fake campaign due to various psychological factors, and blocking or removing the content created with Deep-Fake technology may actually make things worse by attracting attention. In light of the data on Russia’s invasion plans for Ukraine, US President Biden chose to strategically share unclassified intelligence information about Russia’s plans with the public, in order to clear up any misinformation that might have spread. 

Deepfake technology will likely become too effective in armed conflicts to resist. While few uses of deepfakes would be prohibited by the law of armed conflict, any perfidious use would be unlawful. Other uses intended to terrorise the population or violate the constant care obligation would also violate the law.

Like the 2016 American Presidential Election, the 2017 French Presidential Election was the target of a Russian disinformation campaign that included the selected leaking of then-candidate Emmanuel Macron’s emails. While Macron still managed to win the election, a much more sinister future of information warfare is not far away.

University of Washington:    WestPoint:  WestPoint:     NATO CCDCOE:  Guardian:   CNN:   Hill Times

You Might Also Read: 

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’:

 

« Technology’s Impact On Cyber Security
Beware Crypto Donation Requests For Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

Netregistry

Netregistry

Safeguard your website with our range of website security products that help prevent, detect and recover from a hacking attack.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

3wSecurity

3wSecurity

3wSecurity provides visibility to your company’s internet facing systems throughout the security life cycle, allowing for a more thorough approach to vulnerability management.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.