Deep-Fake Information Warfare

The introduction of machine learning, and potentially Artificial Intelligence (AI), will vastly enhance capabilities for automating the reaching of mass audiences with tailored and plausible content. Consequently, they will render malicious actors even more powerful.

Information warfare, or targeted misinformation campaigns designed to confuse and obfuscate for political gain, are nothing new. Disinformation and so-called fake news have been around for generations.

Prior to the  invasion of Ukraine, there were suggestions that Russia was planning to produce a fake video showing a Ukrainian attack as a pretext for an invasion. At the time, US officials claimed to have evidence of a Russian plan to make a “very graphic” fake video of a Ukrainian attack on the Russian-speaking secessionist Donetsk region of Ukraine.

The alleged plot would involve using corpses, footage of blown-up buildings, fake Ukrainian military hardware, Turkish-made drones and actors playing the part of Russian-speaking mourners. 

The use of misleading “deepfakes” has risen dramatically across the globe. As with so much of emerging technology, deepfakes will inevitably become a part of armed conflict. While perfidious deepfakes like that would almost certainly violate the law of armed conflict, those that amount to ruses would not. Other considerations about the impact on the civilian population are also necessary to determine what uses of deepfakes in armed conflict would be legal.

Although this false flag operation did not materialise, deepfake technology is increasingly recognised as a potentially useful and effective tool in armed conflict.

Recent years have seen Deep-Fake technology become an effective weapon in times of war. In the recent war Russia has waged against Ukraine, suspicion has surfaced that Russia is planning to use fake videos as a pretext for invasion, using Deep-Fake, representing a Ukrainian attack.

Deep-Fake is a computer simulation of reality produced by AI, and it is capable of forging identities in videos. In the wake of Deep Fake videos being used for political purposes, concerns have grown that the technology might be harmful and affect democratic processes.

Deep-Fake technology has been described as a kind of information warfare when used to deceive the public or disrupt international relations.

As a result, this technology becomes a powerful tool for manipulating information by faking images, audio and creating materials that can be quickly shared via social media, thereby contributing to disinformation. In the absence of a policy of protection against Deep-Fake being used to disrupt international relations, the law provides a loophole which can be exploited.

According to the Lieber Institute at the US  West Point military academy it is hard to resolve the problem of a Deep-Fake campaign due to various psychological factors, and blocking or removing the content created with Deep-Fake technology may actually make things worse by attracting attention. In light of the data on Russia’s invasion plans for Ukraine, US President Biden chose to strategically share unclassified intelligence information about Russia’s plans with the public, in order to clear up any misinformation that might have spread. 

Deepfake technology will likely become too effective in armed conflicts to resist. While few uses of deepfakes would be prohibited by the law of armed conflict, any perfidious use would be unlawful. Other uses intended to terrorise the population or violate the constant care obligation would also violate the law.

Like the 2016 American Presidential Election, the 2017 French Presidential Election was the target of a Russian disinformation campaign that included the selected leaking of then-candidate Emmanuel Macron’s emails. While Macron still managed to win the election, a much more sinister future of information warfare is not far away.

University of Washington:    WestPoint:  WestPoint:     NATO CCDCOE:  Guardian:   CNN:   Hill Times

You Might Also Read: 

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’:

 

« Technology’s Impact On Cyber Security
Beware Crypto Donation Requests For Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

State e-Government Agency (SEGA) - Bulgaria

State e-Government Agency (SEGA) - Bulgaria

The State e-Government Agency (SEGA) is responsible for matters relating to electronic governance in Bulgaria.

ePLDT

ePLDT

ePLDT delivers best-in-class digital business solutions that include Cloud, Cyber Security, purpose-built Data Center facilities and Managed IT Services.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.