HackerSecret.com - The Most Authoritative Site in the World on the Hacking Tools and Techniques, Penetration Testing and CyberSecurity

  • Home
  • Visit Our Shop
  • Download the free App
  • Contact us for Info
VISIT OUR SHOP! CLICK HERE !

Thinking of Deepfakes as Malicious Advertising

by / Friday, 14 June 2019 / Published in Hacking
Share
Tweet
Pin
0 Shares

With global leaders the implications are potentially severe

Someone released a video recently that seemed to show Nancy Pelosi slurring and mangling her speech. The video spread virally in right-leaning circles, but it soon turned out to be fake.

I commented on this in my most recent newsletter, saying:

What this shows us is that it’s not the machine learning that makes Deepfakes dangerous; it’s the willingness of a massive percentage of the US population to believe total garbage without an ounce of scrutiny.

Unsupervised Learning, No. 179

But a reader on Twitter named David Scrobonia had an even more interesting point about this.

This is a really interesting point about deepfakes.

Seeing them can detonate in your brain and affect your emotional view of the subject, even if your logical brain learns/knows it’s false.

That’s the same mechanism as advertising, i.e., target the emotions, not the logic. https://t.co/VrPlV7Defa

— Daniel Miessler ☕? (@DanielMiessler) May 29, 2019

Type-1 vs. Type-2 deepfake attacks

What struck me most about David’s comment is that it’s an emotional attack that’s designed specifically to bypass one’s reason, and that it still works even if you know or learn that it’s false. This immediately made me think of advertising, and then malicious advertising.

Ads also work in both modes.

Just like ads, deepfakes can be used in two independently useful ways, which—until I’m made aware of existing nomenclature—I’ll call Type-1 and Type-2 influence attacks:


Type-1: You create a piece of media that is designed to convince people that something false is true, e.g., this pill will reverse your biological age.

Type-2: You create a piece of media that’s still effective even if people know it’s untrue, e.g., Axe body spray will attract women like insects to lanterns.


What used to cost millions now can be done for pennies

What’s fascinating is that you can create a single campaign that works for both attacks, and the Pelosi video is a perfect example. If you are a Fox News regular, and you see the video on Facebook, you’re likely to believe it’s real and it will lower your opinion of her greatly based on “evidence”.

How much intact likely depends on many factors.

But even if you’re shown by your liberal friend that the video was fake, the emotional impact of that negative impression remains mostly intact.

Nobody is immune

Consumerism and advertising were arguably weapons released on the American public, with tremendous effect.

The other remarkable thing about this type of influence campaign is that it works on virtually everyone. With advertising, it often works best on the people who think they’re immune. Yes, of course ads don’t work on you: I’m sure the reason you own zero generic brands is purely due to quality concerns.

For some, reputation is their most valuable asset

Another similarity with advertising is that the best defense to these types of dual-impact (Type-1 and Type-2) influence campaigns is not exposing yourself in the first place.

Ads work on people that see them, and we might be dealing with the same potency with deepfakes.

We can only hope that the platforms, the public, and yes—the government—realizes that they’re dealing not just with a Type-1 threat here. It’s not enough to highlight that the content is not real.

If something is truly damaging—like a smoking ad that targets children—the answer isn’t a label on the commercial playing during cartoons. The solution is to ban it.

GAN generation of realistic video from a single image

But where does that leave us in a free and open society? I can see no faster ramp to a first amendment collision, since it’s 100% ok to have and voice negative opinions about a person, or to engage in satire.

So where’s the line between that and malicious influence campaigns designed to harm reputations and shape public opinion? And how does that line shift given the combination of provenly potent techniques used to sell products and new technologies that can be used to falsely mimic real and trusted people?

I don’t know the answer, but I do know that we better figure it out quickly.

—
Become a direct supporter of my content for less than a latte a month ($ 50/year) and get the Unsupervised Learning podcast and newsletter every week instead of just twice a month, plus access to the member portal that includes all member content.

Daniel Miessler

Share
Tweet
Pin
0 Shares
Tagged under: Advertising, Deepfakes, Malicious, Thinking

Click here now to visit our Shop!

Click here now to visit our Shop!

Other 2300 users like you have already done it this year!

Choose the product you need here!

  • THE FIRST TRUE ANDROID SMARTPHONE FOR HACKING WITHOUT ROOT UNIQUE IN THE WORLD WITH ALL THE APPS !!! 499,99€ 249,99€
  • HACKER LIBRARY THE LARGEST COLLECTION OF BOOKS AND MANUALS ON HACKING + 100 !!! 99,99€ 49,99€
  • HACK SOCIAL THE GUIDE TO HACK ALL THE SOCIAL ACCOUNTS 99,99€ 49,99€
  • HACKER PACK FOR YOUR SMARTPHONE AND YOUR TABLET WITH ROOT GUIDE AND + 100 PROGRAMS !!! 99,99€ 49,99€
  • THE FIRST TRUE ANDROID SMARTPHONE FOR HACKING UNIQUE IN THE WORLD WITH ALL THE APPS !!! 599,99€ 299,99€
  • HACKER PACK FOR YOUR COMPUTER AND NOTEBOOK + 1000 PROGRAMS 5 GB OF STUFF !!! 99,99€ 49,99€

Our customers say

Annabel M. – Systems Engineer

 
Samuel D. – Ethical Hacker

 
Karola M. – Influencer

 
Marcus P. – Private Investigator

 
Rosemary S. – Housewife

 
Amit V. – IT Consultant

 
Matthew C. – Entrepreneur

 
Aisha B. – Computer Science student

 
Li W. – IT Analyst

 
Robert C. – Programmer

 

DOWNLOADED 1316 TIMES!

DOWNLOADED 1316 TIMES!

Download now Hacker Secret our free Android app.

CONTACT US NOW FOR IMMEDIATE SUPPORT!

Contact Us
Write your email address here
Write here how we can help you - we support you immediately for all your needs!

## Are you looking for products for hacking, computer security and penetration testing? Do you need to clean up your smartphone, your PC or your site from viruses and malware? Do you need to track down someone or retrieve urgent information? Do you want to buy devices already configured to experiment all the hacking techniques quickly and easily? Do you have special needs in software or hardware? ##

Contact us now … another 2300 users like you have already done it this year!

Click here now!

 

Search on the site

Latest posts

  • Veracode CEO on the Relationship Between Security and Business Functions: Security Can’t Be Effective in a Silo

  • Half a million stolen French medical records, drowned in feeble excuses

  • Google looks at bypass in Chromium’s ASLR security defense, throws hands up, won’t patch garbage issue

  • Announcing Veracode in AWS Marketplace: Streamlining Secure Software Development for AWS Customers

  • Imperva pretty adamant that security analytics aggregator product Sonar is not ‘one dashboard to rule them all’

All the techniques, products and services described or contained on this site are intendend for exclusive use of study and professional training and to test the security of own's computer network in accordance with the national legislations on access to computer and online systems. All the services provided on this site (penetration testing, social accounts hardening, Incident Response & CSIRT, MSSP, Cybersecurity Consultancy, etc.) can be provided only with prior written and documented authorization from the owners or their legitimate representatives in accordance with current national regulations .

TOP