{"id":28506,"date":"2024-06-04T09:23:27","date_gmt":"2024-06-04T13:23:27","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=28506"},"modified":"2024-06-04T09:23:27","modified_gmt":"2024-06-04T13:23:27","slug":"criminals-are-using-deepfakes-to-turn-social-media-photos-x","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/criminals-are-using-deepfakes-to-turn-social-media-photos-x\/","title":{"rendered":"Criminals Are Using Deepfakes to Turn Social Media Photos X"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p data-sourcepos=\"1:1-1:66\">\n<p data-sourcepos=\"1:1-1:66\"><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">Criminals Are Using Deepfakes to Turn Social Media Photos X<\/span><\/strong><\/p>\n<p data-sourcepos=\"3:1-3:74\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-28507 alignleft\" src=\"https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2024\/06\/deep.png\" alt=\"Be wary of deepfakes - Cloudeight InfoAve\" width=\"90\" height=\"90\" srcset=\"https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2024\/06\/deep.png 162w, https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2024\/06\/deep-150x150.png 150w\" sizes=\"(max-width: 90px) 100vw, 90px\" \/>Criminals are weaponizing Artificial Intelligence (AI) in disturbing ways, one of which involves manipulating innocent social media photos into compromising or illegal images.<\/span><\/p>\n<p data-sourcepos=\"5:1-5:87\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">This crime is perpetrated through AI-powered software that creates deepfakes. Deepfakes are synthetic media where a person in an existing image or video is replaced with someone else&#8217;s likeness. Criminals achieve this by training an AI model on a large collection of images and videos from both targets. Once trained, the model can generate entirely new images or videos where a person&#8217;s face is swapped.<\/span><\/p>\n<p data-sourcepos=\"7:1-7:330\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Social media photos become targets for these criminals who use deepfakes to create embarrassing or even illegal content. Imagine a deepfake of you or someone you know in a compromising situation, or even one depicting criminal activity.\u00a0 These fabricated images can be used for blackmail, extortion, or simply to humiliate the victim online.<\/span><\/p>\n<p data-sourcepos=\"9:1-9:28\"><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Fight Back Against Deepfakes<\/span><\/strong><\/p>\n<p data-sourcepos=\"11:1-11:158\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">There are steps you can take to protect yourself from this emerging threat. First, be careful of the photos you share on social media. Use the social media platform&#8217;s settings to restrict who can see your photos. Stay vigilant for any suspicious activity on your accounts. If you spot something that appears to be a deepfake, report it immediately to the social media platform.<\/span><\/p>\n<p data-sourcepos=\"13:1-13:110\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Deepfakes aren&#8217;t just a celebrity problem; anyone can be a target. Here are tips to help you stay safe.<br \/>\n<\/span><\/p>\n<ul data-sourcepos=\"15:1-20:0\">\n<li data-sourcepos=\"15:1-15:54\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Be cautious about what information you share online.<\/span><\/li>\n<li data-sourcepos=\"15:1-15:54\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Be careful when sharing photos online. <\/span><\/li>\n<li data-sourcepos=\"16:1-16:53\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Use strong passwords and two-factor authentication when available.<br \/>\n<\/span><\/li>\n<li data-sourcepos=\"17:1-17:45\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Don&#8217;t trust unsolicited emails or messages and always think before you click.<\/span><\/li>\n<li data-sourcepos=\"18:1-18:66\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Report any suspicious activity to the platform where you saw it.<\/span><\/li>\n<li data-sourcepos=\"19:1-20:0\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Stay informed about the latest deepfake news and trends.<\/span><\/li>\n<\/ul>\n<p data-sourcepos=\"21:1-21:168\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">By following these tips and exercising common sense, you can protect yourself from this type of crime. AI is changing the world, but don&#8217;t let it be used to ruin yours.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Criminals Are Using Deepfakes to Turn Social Media Photos X Criminals are weaponizing Artificial Intelligence (AI) in disturbing ways, one of which involves manipulating innocent social media photos into compromising or illegal images. This crime is perpetrated through AI-powered software that creates deepfakes. Deepfakes are synthetic media where a person in an existing image or video is\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/criminals-are-using-deepfakes-to-turn-social-media-photos-x\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":26753,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4421,4500,1678,1670],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28506"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=28506"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28506\/revisions"}],"predecessor-version":[{"id":28510,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28506\/revisions\/28510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/26753"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=28506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=28506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=28506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}