A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit <a rel="external noopener" href="https://scholarship.law.bu.edu/cgi/viewcontent.cgi?article=1640&context=faculty_scholarship">the original URL</a>. The file type is <code>application/pdf</code>.
Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security
<span title="">2018</span>
<i title="Elsevier BV">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tol7woxlqjeg5bmzadeg6qrg3e" style="color: black;">Social Science Research Network</a>
</i>
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with "deep fake" technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology's sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion,
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2139/ssrn.3213954">doi:10.2139/ssrn.3213954</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/njtauzwpdzb4hp5kd3qd4yrp4i">fatcat:njtauzwpdzb4hp5kd3qd4yrp4i</a>
</span>
more »
... ng it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace of ideas already suffers from truth decay as our networked information environment interacts in toxic ways with our cognitive biases. Deep fakes will exacerbate this problem significantly. Individuals and businesses will face novel forms of exploitation, intimidation, and personal sabotage. The risks to our democracy and to national security are profound as well. Our aim is to provide the first in-depth assessment of the causes and consequences of this disruptive technological change, and to explore the existing and potential tools for responding to it. We survey a broad array of responses, including: the role of technological solutions; criminal penalties, civil liability, and regulatory action; military and covert-action responses; economic sanctions; and market developments. We cover the waterfront from immunities to immutable authentication trails, offering recommendations to improve law and policy and anticipating the pitfalls embedded in various solutions.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191030234702/https://scholarship.law.bu.edu/cgi/viewcontent.cgi?article=1640&context=faculty_scholarship" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/18/ef/18efa0e60fe51cb8f9b8db7665627cf3f4ead6b0.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2139/ssrn.3213954">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
ssrn.com
</button>
</a>