New Law Bans Intimate Deepfake Images

President Donald Trump hs officially signed the Take It Down Act into law, marking a significant step in the fight against non-consensual intimate images and deepfake content. The legislation targets both real and AI-generated "nonconsensual intimate images" (NCCI), criminalising their distribution and demanding swift removal from social media platforms.

The law received broad support in Congress, with endorsements from major technology companies, advocates for victims of image-based abuse. However, critics warn that the law presents serious risks, including overreach and potential suppression of free expression.

Key Provisions of the Law

The law stipulates that:

  • Publishing NCII, whether genuine or AI-generated, is criminally punishable by up to three years in prison and fines.
  • Social media platforms are required to remove reported NCII within 48 hours and make "reasonable efforts" to eliminate all copies.
  • The Federal Trade Commission (FTC) is responsible for enforcement, and companies have one year to comply with these requirements.

President Trump stated, "I’m going to use that bill for myself, too,” highlighting his personal stance on online treatment and implying potential use against political opponents and critics. 

Supporters & Opponents

While the bill has received backing from some advocacy groups, including the Cyber Civil Rights Initiative (CCRI), concerns have been raised about its implications. CCRI announced it could not endorse the legislation, warning it might give survivors "false hope" and potentially do more harm than good.

Mary Anne Franks, CCRI President, criticised the law, calling the takedown process a "poison pill" that could overwhelm platforms with false reports and discourage effective action against genuine victims. She argued that platforms might become "emboldened" to ignore reports, hampering efforts to combat abuse.

Concerns About Free Speech

Critics also fear the law could be exploited by political figures, as the law’s broad scope might be used, intentionally or otherwise, to stifle speech or target dissent. In particular, social media platforms could face lawsuits or legal challenges if users believe their lawful content was wrongly removed, or if courts overturn the law itself.

Enforcement Challenges 

Implementation of the law coud turn out to be comlicated. Since enforcement will be carried out by the FTC, and given the law’s ambiguous language, companies may delay complying or challenge enforcement in courts. As the law states, "users may eventually seek legal action if their lawful content is removed" and could challenge the law’s constitutionality.

Critics are also warning that the law could set a precedent for government overreach, especially if the current administration’s intent is misused for political control. As enforcement begins, legal battles are expected to unfold, shaping the future of content regulation in the digital age.

Conclusion

The Take It Down Act is a major legislative effort to combat the proliferation of deepfake images and non-consensual content online. While intended to protect victims, critics warn that its vague language and potential for misuse could threaten free speech and privacy rights.

As enforcement measures take shape, ongoing legal challenges and public debate are likely to influence how the law is applied and interpreted in the coming years.

The White House  |   BBC      |   The Verge   |   The Guardian   

Image: Ideogram

You Might Also Read:

There Are Ways You Can Detect A Deepfake:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Major Cyber Attack On British Legal Aid Agency

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

Apex iQ (ApexiQ)

Apex iQ (ApexiQ)

ApexiQ is a continuous asset assurance platform that empowers you with the confidence to make better data-driven decisions and take automated action to reduce your risk.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.