Deep Fake Images of Taylor Swift Taken Down

Sexually explicit AI-generated images of Taylor Swift have been circulating on X Twitter) recently in the latest example of the proliferation of fake pornography. 

The spread of AI-generated sexually explicit images of the internationally popular singer / songwriter Taylor Swift is bad enough and she is perhaps th e most well-known example of what is happening to women every day. 

Now, US politicians are calling for new laws to criminalise the creation of deepfake images and videos, after the Taylor Swift  images were posted on social media sites, including X and Telegram, attracting more than 45m views.

In a statement, X Twitter said it was "actively removing" the images and taking "appropriate actions" against the accounts involved in spreading them. It added: "We're closely monitoring the situation to ensure that any further violations are immediately addressed, and the content is removed."While many of the images appear to have been removed at the time of publication, one photo of Swift was viewed a reported to have been viewed 47 million times before being taken down.

The name "Taylor Swift" is no longer searchable on X, alongside terms such as "Taylor Swift AI" and "Taylor AI"  

Deepfakes use Artificial Intelligence (AI) to make a video of someone by manipulating their face or body.  A study in 2023 found that there has been a 550% rise in the creation of doctored images since 2019, fuelled by the emergence of AI.  The exploitation of generative AI tools to create potentially harmful content targeting all types of public figures is increasing quickly and spreading faster than ever across social media.

In the US no federal laws against the sharing or creation of deepfake images, though there have been moves at state level to tackle the issue. In the UK, the sharing of deepfake pornography became illegal as part of its Online Safety Act in 2023.

US congressman Joe Morelle described the fake pictures as “appalling”. “The spread of AI-generated explicit images of Taylor Swift is appalling and sadly, it’s happening to women everywhere, every day,” he said on X.
“It’s sexual exploitation, and I’m fighting to make it a federal crime with my legislation: the Preventing Deepfakes of Intimate Images Act.”

Today, 404Media are reporting that Microsoft has closed a loophole in its AI tool, Designer, which allowed users to generate AI nude images of celebrities. Microsoft's changes come after 404 Media first reported that the Swift images that went viral on Twitter came from 4chan and Telegram, where people used Designer to make nude images of Swift and other celebrities.

This is not going to stop flow of  AI - generated deepfake images on the internet, but it is a very positive development in fighting back against this form of abuse.

404Media:   Joe Morelle:     ITV:       BBC:      Herald Scotland:   WHTimes:      MSN:    The Verge:    Vogue:  

You Might Also Read: 

Sharing Deepfakes To Be Made  Illegal In Britain:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Navigating Cloud-Native Application Security With CWPP
What Lessons Have We Learnt From Recent Ransomware Group Attacks? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

HardSecure

HardSecure

Hardsecure supports organizations to face security threats through the adoption of cybersecurity capabilities that guarantee 360º monitoring, visibility, mitigation, and blocking.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Identifid

Identifid

Identifid offers a suite of fraud prevention and identity authentication solutions to businesses and governments using the latest advances in AI, vision processing, and biometric recognition.

HYCU

HYCU

HYCU was born of the need to simplify data protection and provide equivalent levels of backup and recovery support across on premises, public cloud, and SaaS workloads.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.