AI Generated Images Shake The Stock Market

A fake image and video that apparently shows an explosion near the Pentagon raises concerns about Artificial Intelligence’s (AI) ability to produce misinformation. Dozens of verified accounts, including national news organisations, shared images that shows black smoke billowing up from the ground next to a white building. 

The fake images of an explosion were most likely created using AI tools and caused a brief market slump in the NYSE and other stock markets. US officials later confirmed that no such incident had occurred.

Open source intelligence investigators at Bellingcat, a social media verification group, were quick to point out some notable problems with the image. Not least that the building in the image looks noticeably different from the Pentagon - which can easily be verified by using tools like Google Street View to compare the two images.

There were no other firsthand witnesses to corroborate the event, especially in a busy area like the Pentagon. Other details include an odd-looking floating lamp post and black pole protruding from the pavement were another giveaway that the image was not what it seemed. “This is why it’s so difficult (I’d argue effectively impossible) to create a believable fake of such an event,” a Belligcat investigator Nick Waters tweeted.  

There are several generative AI tools including Midjourney, Dall-e 2 and Stable Diffusion that can create life-like images , yet AI evidently still has a difficult time recreating locations without introducing random artefacts

These tools are trained by looking at large volumes of real images but fill in the gaps with their own interpretation when training data is missing. This can result in people having extra limbs and objects that are morphed with their surroundings.

Always look for clues in the image like nearby landmarks, road signs and even the weather conditions to help you place where or when the purported event could have taken place.

YouTube:      Bellingcat:    Nick Waters:     Al Jazeera:      Daily Mail:     News Australia:     Independent

You Might Also Read: 

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’:   

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cybersecurity & The Military
The Security Risks Of ChatGPT »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

CyberArrow

CyberArrow

CyberArrow (formerly EBDAA) is a consultancy company providing high quality consultancy services in Risk & Compliance and Awareness & Education.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

White Bullet

White Bullet

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising.

Injazat

Injazat

Injazat Data Systems is an industry recognized market leader in the Gulf region for Information Technology, Data Center and Managed Services.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

National Cryptologic Foundation (NCF)

National Cryptologic Foundation (NCF)

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.