{"id":7659,"date":"2020-04-25T13:14:06","date_gmt":"2020-04-25T07:44:06","guid":{"rendered":"https:\/\/triumphias.com\/blog\/?p=7659"},"modified":"2020-04-25T13:14:06","modified_gmt":"2020-04-25T07:44:06","slug":"deep-nudes-cybercrimes","status":"publish","type":"post","link":"https:\/\/triumphias.com\/blog\/deep-nudes-cybercrimes\/","title":{"rendered":"Deep Nudes &#038; Cybercrimes"},"content":{"rendered":"<p><span style=\"color: #0000ff;\"><strong>Relevance: Prelims\/Mains: G.S paper III: Challenges to internal security through communication networks, role of media and social networking\u00a0sites in internal security challenges, basics of cyber security; money-laundering and its prevention\u00a0<\/strong><\/span><\/p>\n<h3><span style=\"text-decoration: underline; color: #ff0000;\"><em>Context:<\/em><\/span><\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/image.slidesharecdn.com\/cybercrimeppt-160421074211\/95\/cyber-crime-ppt-1-638.jpg?cb=1461224608\" alt=\"Cyber crime ppt\" \/><\/p>\n<p>\u2022 Cybercrime officials in India have been tracking certain apps and websites that produce nude photographs of innocent persons using Artificial Intelligence (AI) algorithms.<\/p>\n<h3><span style=\"text-decoration: underline; color: #ff0000;\"><em>So, what is a deep nude?<\/em><\/span><\/h3>\n<p>\u2022 Cybercriminals use Artificial Intelligence (AI) software \u2014 now easily available on apps and websites \u2014 to superimpose a digital composite (assembling multiple media files to make a final one) on to an existing video, photo, or audio.<br \/>\n\u2022 Deep nudes are computer-generated images and videos. Essentially, using AI algorithms a person\u2019s words, head movements and expressions are transferred onto another person in a seamless fashion that makes it difficult to tell that it is a deepfake unless one closely observes the media file.<\/p>\n<h3><span style=\"text-decoration: underline; color: #ff0000;\"><em>When did deep nudes first surface?<\/em><\/span><\/h3>\n<p>\u2022 In 2017, a Reddit user with the name \u201cdeepfakes\u201d posted explicit videos of celebrities. Since then, several instances have been reported along with the development of apps and websites that were easily accessible to an average user.<br \/>\n\u2022 The debate around \u201cdeep nudes\u201d and \u201cdeep fakes\u201d was rekindled in July 2019 with the popularity of applications such as FaceApp (used for photo-editing) and DeepNude that produces fake nudes of women.<\/p>\n<h3><span style=\"text-decoration: underline; color: #ff0000;\"><em>The objections:<\/em><\/span><\/h3>\n<p>\u2022 Because of how realistic deepfake images, audio, and videos can be, the technology is vulnerable for use by cybercriminals who could spread misinformation to intimidate or blackmail people.<br \/>\n\u2022 In a presentation, the Fayetteville State University in North Carolina called it one of the \u201cmodern\u201d frauds of cyberspace, along with fake news, spam\/phishing attacks, social engineering fraud, catfishing, and academic fraud.<\/p>\n<h3><span style=\"text-decoration: underline; color: #ff0000;\"><em>Can anyone produce a deep nude?<\/em><\/span><\/h3>\n<p>\u2022 According to a CSIRO Scope article from August 2019, Creating a convincing deepfake is an unlikely feat for the general computer user. But an individual with advanced knowledge of machine learning and access to the victim\u2019s publicly-available social media profile for photographic, video and audio content, could do so.<br \/>\n\u2022 Even so, there are various websites and applications that have AI built into them and have made it much easier for lay users to create deepfakes and deep nudes. As technology improves, the quality of deepfakes is also expected to get better.<\/p>\n<h3><span style=\"text-decoration: underline; color: #ff0000;\"><em><span>Are deepfakes legal?<\/span><\/em><\/span><\/h3>\n<p>\u2022 At least in the US, the legality of deepfakes is complicated.<br \/>\n\u2022 While a person being harassed by deepfakes may claim defamation, removing such content could be considered censorship, a violation of the First Amendment which guarantees Americans the freedom concerning religion, expression, assembly, and the right to petition.<br \/>\n\u2022 According to the Cyber Civil Rights Initiative, 46 states in the US have \u201crevenge porn\u201d laws.<br \/>\n\u2022 Revenge porn refers to the creation of sexually explicit videos or images that are posted on the Internet without the consent of the subject as a way to harass them.<\/p>\n<h3><span style=\"text-decoration: underline; color: #ff0000;\"><em>What are the catfish accounts?<\/em><\/span><\/h3>\n<p>\u2022 According to the Cyberbullying Research Centre (CRC), catfishing refers to the practice of setting up fictitious online profiles, \u201cmost often for the purpose of luring another into a fraudulent romantic relationship.\u201d<br \/>\n\u2022 An article on CRC says that to \u201ccatfish\u201d someone, \u201cis to set up a fake social media profile with the goal of duping that person into falling for the false persona.\u201d<\/p>\n<h3><img decoding=\"async\" src=\"https:\/\/cdn.slidesharecdn.com\/ss_cropped_thumbnails\/phishing-attacks-170828055714\/thumbnail-large.jpg?cb=1503899854\" alt=\"Phishing Attacks\" \/><\/h3>\n<h3><span style=\"text-decoration: underline; color: #ff0000;\"><em>What can you do to protect yourself?<\/em><\/span><\/h3>\n<p>\u2022 While it is not easy to keep track of who downloads or misuses your images, the best way to protect yourself is to ensure you are using privacy settings on your social media profiles that suit you.<br \/>\n\u2022 If you feel your image has been used without your permission, you could use freely available reverse image search tools to find images that are similar to yours.<br \/>\n\u2022 You can also be mindful of who you are conversing with on the web.<br \/>\n\u2022 A basic check of their social media profiles, comments on their images, and whether similar profiles exist could help you determine if the person is genuine.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff;\"><strong>For more such notes, Articles, News &amp; Views Join our Telegram Channel.<\/strong><\/span><\/p>\n<p><a title=\"Telegram link\" href=\"https:\/\/t.me\/triumphias\" target=\"_blank\"><span style=\"color: #ff0000;\"><strong>https:\/\/t.me\/triumphias<\/strong><\/span><\/a><\/p>\n<p><span style=\"color: #0000ff;\"><strong>Click the link below to see the details about the UPSC \u2013Civils courses offered by Triumph IAS.<\/strong> <\/span><span style=\"color: #ff0000;\"><strong><a style=\"color: #ff0000;\" title=\"Courses available\" href=\"https:\/\/triumphias.com\/pages-all-courses.php\">https:\/\/triumphias.com\/pages-all-courses.php<\/a><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Relevance: Prelims\/Mains: G.S paper III: Challenges to internal security through communication networks, role of media and social networking\u00a0sites in internal<\/p>\n","protected":false},"author":1,"featured_media":4849,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[123,42,43,72,69],"tags":[392],"class_list":["post-7659","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","category-general-studies-iii-technology-economic-development-bio-diversity-environment-security-and-disaster-management","category-indian-economy","category-internal-security","category-science-and-technology","tag-union-public-service-commission-upsc"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/7659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/comments?post=7659"}],"version-history":[{"count":1,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/7659\/revisions"}],"predecessor-version":[{"id":7660,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/7659\/revisions\/7660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media\/4849"}],"wp:attachment":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media?parent=7659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/categories?post=7659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/tags?post=7659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}