Deep-Fake Information Warfare

The introduction of machine learning, and potentially Artificial Intelligence (AI), will vastly enhance capabilities for automating the reaching of mass audiences with tailored and plausible content. Consequently, they will render malicious actors even more powerful.

Information warfare, or targeted misinformation campaigns designed to confuse and obfuscate for political gain, are nothing new. Disinformation and so-called fake news have been around for generations.

Prior to the  invasion of Ukraine, there were suggestions that Russia was planning to produce a fake video showing a Ukrainian attack as a pretext for an invasion. At the time, US officials claimed to have evidence of a Russian plan to make a “very graphic” fake video of a Ukrainian attack on the Russian-speaking secessionist Donetsk region of Ukraine.

The alleged plot would involve using corpses, footage of blown-up buildings, fake Ukrainian military hardware, Turkish-made drones and actors playing the part of Russian-speaking mourners. 

The use of misleading “deepfakes” has risen dramatically across the globe. As with so much of emerging technology, deepfakes will inevitably become a part of armed conflict. While perfidious deepfakes like that would almost certainly violate the law of armed conflict, those that amount to ruses would not. Other considerations about the impact on the civilian population are also necessary to determine what uses of deepfakes in armed conflict would be legal.

Although this false flag operation did not materialise, deepfake technology is increasingly recognised as a potentially useful and effective tool in armed conflict.

Recent years have seen Deep-Fake technology become an effective weapon in times of war. In the recent war Russia has waged against Ukraine, suspicion has surfaced that Russia is planning to use fake videos as a pretext for invasion, using Deep-Fake, representing a Ukrainian attack.

Deep-Fake is a computer simulation of reality produced by AI, and it is capable of forging identities in videos. In the wake of Deep Fake videos being used for political purposes, concerns have grown that the technology might be harmful and affect democratic processes.

Deep-Fake technology has been described as a kind of information warfare when used to deceive the public or disrupt international relations.

As a result, this technology becomes a powerful tool for manipulating information by faking images, audio and creating materials that can be quickly shared via social media, thereby contributing to disinformation. In the absence of a policy of protection against Deep-Fake being used to disrupt international relations, the law provides a loophole which can be exploited.

According to the Lieber Institute at the US  West Point military academy it is hard to resolve the problem of a Deep-Fake campaign due to various psychological factors, and blocking or removing the content created with Deep-Fake technology may actually make things worse by attracting attention. In light of the data on Russia’s invasion plans for Ukraine, US President Biden chose to strategically share unclassified intelligence information about Russia’s plans with the public, in order to clear up any misinformation that might have spread. 

Deepfake technology will likely become too effective in armed conflicts to resist. While few uses of deepfakes would be prohibited by the law of armed conflict, any perfidious use would be unlawful. Other uses intended to terrorise the population or violate the constant care obligation would also violate the law.

Like the 2016 American Presidential Election, the 2017 French Presidential Election was the target of a Russian disinformation campaign that included the selected leaking of then-candidate Emmanuel Macron’s emails. While Macron still managed to win the election, a much more sinister future of information warfare is not far away.

University of Washington:    WestPoint:  WestPoint:     NATO CCDCOE:  Guardian:   CNN:   Hill Times

You Might Also Read: 

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’:

 

« Technology’s Impact On Cyber Security
Beware Crypto Donation Requests For Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.