AI Generated Images Shake The Stock Market

A fake image and video that apparently shows an explosion near the Pentagon raises concerns about Artificial Intelligence’s (AI) ability to produce misinformation. Dozens of verified accounts, including national news organisations, shared images that shows black smoke billowing up from the ground next to a white building. 

The fake images of an explosion were most likely created using AI tools and caused a brief market slump in the NYSE and other stock markets. US officials later confirmed that no such incident had occurred.

Open source intelligence investigators at Bellingcat, a social media verification group, were quick to point out some notable problems with the image. Not least that the building in the image looks noticeably different from the Pentagon - which can easily be verified by using tools like Google Street View to compare the two images.

There were no other firsthand witnesses to corroborate the event, especially in a busy area like the Pentagon. Other details include an odd-looking floating lamp post and black pole protruding from the pavement were another giveaway that the image was not what it seemed. “This is why it’s so difficult (I’d argue effectively impossible) to create a believable fake of such an event,” a Belligcat investigator Nick Waters tweeted.  

There are several generative AI tools including Midjourney, Dall-e 2 and Stable Diffusion that can create life-like images , yet AI evidently still has a difficult time recreating locations without introducing random artefacts

These tools are trained by looking at large volumes of real images but fill in the gaps with their own interpretation when training data is missing. This can result in people having extra limbs and objects that are morphed with their surroundings.

Always look for clues in the image like nearby landmarks, road signs and even the weather conditions to help you place where or when the purported event could have taken place.

YouTube:      Bellingcat:    Nick Waters:     Al Jazeera:      Daily Mail:     News Australia:     Independent

You Might Also Read: 

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’:   

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cybersecurity & The Military
The Security Risks Of ChatGPT »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Security Alliance

Security Alliance

Security Alliance provide bespoke cyber intelligence consulting and research services.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.

Superna

Superna

Superna is the global leader in data security and cyberstorage solutions for unstructured data, both on-prem and in the hybrid multi-cloud.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.