Deep-Fake Information Warfare

The introduction of machine learning, and potentially Artificial Intelligence (AI), will vastly enhance capabilities for automating the reaching of mass audiences with tailored and plausible content. Consequently, they will render malicious actors even more powerful.

Information warfare, or targeted misinformation campaigns designed to confuse and obfuscate for political gain, are nothing new. Disinformation and so-called fake news have been around for generations.

Prior to the  invasion of Ukraine, there were suggestions that Russia was planning to produce a fake video showing a Ukrainian attack as a pretext for an invasion. At the time, US officials claimed to have evidence of a Russian plan to make a “very graphic” fake video of a Ukrainian attack on the Russian-speaking secessionist Donetsk region of Ukraine.

The alleged plot would involve using corpses, footage of blown-up buildings, fake Ukrainian military hardware, Turkish-made drones and actors playing the part of Russian-speaking mourners. 

The use of misleading “deepfakes” has risen dramatically across the globe. As with so much of emerging technology, deepfakes will inevitably become a part of armed conflict. While perfidious deepfakes like that would almost certainly violate the law of armed conflict, those that amount to ruses would not. Other considerations about the impact on the civilian population are also necessary to determine what uses of deepfakes in armed conflict would be legal.

Although this false flag operation did not materialise, deepfake technology is increasingly recognised as a potentially useful and effective tool in armed conflict.

Recent years have seen Deep-Fake technology become an effective weapon in times of war. In the recent war Russia has waged against Ukraine, suspicion has surfaced that Russia is planning to use fake videos as a pretext for invasion, using Deep-Fake, representing a Ukrainian attack.

Deep-Fake is a computer simulation of reality produced by AI, and it is capable of forging identities in videos. In the wake of Deep Fake videos being used for political purposes, concerns have grown that the technology might be harmful and affect democratic processes.

Deep-Fake technology has been described as a kind of information warfare when used to deceive the public or disrupt international relations.

As a result, this technology becomes a powerful tool for manipulating information by faking images, audio and creating materials that can be quickly shared via social media, thereby contributing to disinformation. In the absence of a policy of protection against Deep-Fake being used to disrupt international relations, the law provides a loophole which can be exploited.

According to the Lieber Institute at the US  West Point military academy it is hard to resolve the problem of a Deep-Fake campaign due to various psychological factors, and blocking or removing the content created with Deep-Fake technology may actually make things worse by attracting attention. In light of the data on Russia’s invasion plans for Ukraine, US President Biden chose to strategically share unclassified intelligence information about Russia’s plans with the public, in order to clear up any misinformation that might have spread. 

Deepfake technology will likely become too effective in armed conflicts to resist. While few uses of deepfakes would be prohibited by the law of armed conflict, any perfidious use would be unlawful. Other uses intended to terrorise the population or violate the constant care obligation would also violate the law.

Like the 2016 American Presidential Election, the 2017 French Presidential Election was the target of a Russian disinformation campaign that included the selected leaking of then-candidate Emmanuel Macron’s emails. While Macron still managed to win the election, a much more sinister future of information warfare is not far away.

University of Washington:    WestPoint:  WestPoint:     NATO CCDCOE:  Guardian:   CNN:   Hill Times

You Might Also Read: 

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’:

 

« Technology’s Impact On Cyber Security
Beware Crypto Donation Requests For Ukraine »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

Crypto4A Technologies

Crypto4A Technologies

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Sigma IT

Sigma IT

SIGMA IT is one of the largest IT services organizations in EMEA region providing a full range of solutions and services including cybersecurity, data protection and business continuity.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.