New Law Bans Intimate Deepfake Images

President Donald Trump has officially signed the Take It Down Act into law, marking a significant step in the fight against non-consensual intimate images and deepfake content. The legislation targets both real and AI-generated "nonconsensual intimate images" (NCCI), criminalising their distribution and demanding swift removal from social media platforms.

The law received broad support in Congress, with endorsements from major technology companies, advocates for victims of image-based abuse. However, critics warn that the law presents serious risks, including overreach and potential suppression of free expression.

Key Provisions of the Law

The law stipulates that:

  • Publishing NCII, whether genuine or AI-generated, is criminally punishable by up to three years in prison and fines.
  • Social media platforms are required to remove reported NCII within 48 hours and make "reasonable efforts" to eliminate all copies.
  • The Federal Trade Commission (FTC) is responsible for enforcement, and companies have one year to comply with these requirements.

President Trump stated, "I’m going to use that bill for myself, too,” highlighting his personal stance on online treatment and implying potential use against political opponents and critics. 

Supporters & Opponents

While the bill has received backing from some advocacy groups, including the Cyber Civil Rights Initiative (CCRI), concerns have been raised about its implications. CCRI announced it could not endorse the legislation, warning it might give survivors "false hope" and potentially do more harm than good.

Mary Anne Franks, CCRI President, criticised the law, calling the takedown process a "poison pill" that could overwhelm platforms with false reports and discourage effective action against genuine victims. She argued that platforms might become "emboldened" to ignore reports, hampering efforts to combat abuse.

Concerns About Free Speech

Critics also fear the law could be exploited by political figures, as the law’s broad scope might be used, intentionally or otherwise, to stifle speech or target dissent. In particular, social media platforms could face lawsuits or legal challenges if users believe their lawful content was wrongly removed, or if courts overturn the law itself.

Enforcement Challenges 

Implementation of the law coud turn out to be comlicated. Since enforcement will be carried out by the FTC, and given the law’s ambiguous language, companies may delay complying or challenge enforcement in courts. As the law states, "users may eventually seek legal action if their lawful content is removed" and could challenge the law’s constitutionality.

Critics are also warning that the law could set a precedent for government overreach, especially if the current administration’s intent is misused for political control. As enforcement begins, legal battles are expected to unfold, shaping the future of content regulation in the digital age.

Conclusion

The Take It Down Act is a major legislative effort to combat the proliferation of deepfake images and non-consensual content online. While intended to protect victims, critics warn that its vague language and potential for misuse could threaten free speech and privacy rights.

As enforcement measures take shape, ongoing legal challenges and public debate are likely to influence how the law is applied and interpreted in the coming years.

The White House  |   BBC      |   The Verge   |   The Guardian   

Image: Ideogram

You Might Also Read:

There Are Ways You Can Detect A Deepfake:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Major Cyber Attack On British Legal Aid Agency
British Research & Innovation Faces Serious Cyber Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Cyber Security for Europe (CyberSec4Europe)

Cyber Security for Europe (CyberSec4Europe)

CyberSec4Europe is designing, testing and demonstrating potential governance structures for a European Cybersecurity Competence Network.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies.

VCI Global

VCI Global

VCI Global is a diversified holding company. Through its subsidiaries, it focuses on consulting, fintech, AI, robotics, and cybersecurity.