fbpx
Connect with us

The Conversation

Events that never happened could influence the 2024 presidential election – a cybersecurity researcher explains situation deepfakes

Published

on

Events that never happened could influence the 2024 presidential election – a cybersecurity researcher explains situation deepfakes

The volatile mix of deepfakes and political campaigns is a good reason to be on guard.
Sean Anthony Eddy Creative/E+ via Getty Images

Christopher Schwartz, Rochester Institute of Technology

Imagine an October surprise like no other: Only a before Nov. 5, 2024, a video recording reveals a secret meeting between Joe Biden and Volodymyr Zelenskyy. The American and Ukrainian presidents agree to immediately initiate Ukraine into NATO under “the special emergency membership protocol” and prepare for a nuclear weapons strike against Russia. Suddenly, the world is on the cusp of Armageddon.

While journalists could point out that no such protocol exists and social users might notice odd video-gamelike qualities of the video, others might feel that their worst fears have been confirmed. When Election Day , these concerned citizens may let the video sway their votes, unaware that they have just been manipulated by a situation deepfake – an that never actually happened.

Situation deepfakes represent the next stage of technologies that have already shaken audiences' perceptions of reality. In our research at the DeFake Project, my colleagues at the Rochester Institute of Technology, the University of Mississippi, Michigan State University and I study how deepfakes are made and what measures voters can take to defend themselves from them.

Imagining events that never happened

A deepfake is created when someone uses an artificial intelligence tool, especially deep learning, to manipulate or generate a face, a voice or – with the rise of large language models like ChatGPTconversational language. These can be combined to form “situation deepfakes.”

Advertisement

The basic idea and technology of a situation deepfake are the same as with any other deepfake, but with a bolder ambition: to manipulate a real event or invent one from thin air. Examples include depictions of Donald Trump's perp walk and Trump hugging Anthony Fauci, neither of which happened. The hug shot was promoted by a Twitter account associated with the presidential campaign of Trump rival Ron DeSantis. An attack ad targeting Joe Biden's 2024 campaign published by the Republican National Committee was made entirely with AI.

At the DeFake Project, our research has found that deepfakes, situations, are typically created by some mixture of adding one piece of media with another; using a video to animate an image or alter another video, dubbed puppeteering; conjuring a piece of media into existence, typically using generative AI; or some combination of these techniques.

To be clear, many situation deepfakes are made for innocent purposes. For example, Infinite Odyssey Magazine produces fake stills from movies that were never produced or could never have existed. But even innocent deepfakes give reason for pause, as in the case of near-believable fake photographs depicting the Apollo Moon landing as a movie production.

Advertisement

Deepfaking an election

Now put yourself in the position of someone to influence the upcoming election. What are the possible situations you might want to create?

For starters, it would matter whether you wanted to tilt voting toward or away from a specific outcome. Maybe you would portray a candidate acting heroically by pulling a pedestrian out of the way of a speeding car or, conversely, doing something offensive or criminal. The format of the situation deepfake would also matter. Instead of a video, it could be a photograph, maybe with the blur and angles that simulate a smartphone camera or the forged of a agency.

Your target audience would be key. Rather than aiming for the general electorate or a party's base, you might target conspiracy theorists in key voting districts. You could portray the candidate or their members as engaging in a satanic ritual, participating in a festival at the exclusive and controversial Bohemian Grove, or a secret meeting with an extraterrestrial.

If you have the ambition and capabilities for it, you could even try to deepfake the election itself. In June 2023, Russia's television and radio stations were hacked and broadcast a full mobilization order by a deepfake of Russian President Vladimir Putin. While this would be more difficult to do in a U.S. election, in principle any news outlet could be hacked to broadcast deepfakes of their anchors announcing the wrong results or a candidate conceding.

Advertisement

Defending reality

There are a variety of technological and psychological ways to detect and defend against situation deepfakes.

On the technological front, all deepfakes contain some evidence of their true nature. Some of these tells can by seen by the human eye – like overly smooth skin or odd lighting or architecture – while others may be detectable only by a deepfake-hunting AI.

We are building DeFake's detector to use AI to catch the telltale signs of deepfakes, and we are working to try to have it ready in time for the 2024 election. But even if a sufficiently powerful deepfake detector like ours cannot be deployed by Election Day, there are psychological tools that you, the voter, can use to identify deepfakes: background knowledge, curiosity and healthy skepticism.

If you encounter media content about a person, place or event that seems uncharacteristic, trust your background knowledge. For example, in a recent hoax of a fire at the Pentagon, the building shown looks more square than pentagonal, which could be a giveaway.

Advertisement

However, try not to rely entirely on your background knowledge, which could be mistaken or patchy. Never be afraid to learn more from reliable sources, like fact-checked news reports, peer-reviewed academic articles or interviews with credentialed experts.

Additionally, be aware that deepfakes can be used to take advantage of what you are inclined to believe about a person, place or event. One of the best ways to deal with this is to simply be aware of your biases and be a bit guarded about any media content that seems to confirm them.

Even if it becomes possible to create perfect situation deepfakes, how believable their subject matter is, is likely to remain their Achilles' heel. So, with or without a technological solution, you still have the power to defend the election from the influence of fake events.The Conversation

Christopher Schwartz, Postdoctoral Research Associate of Computing Security, Rochester Institute of Technology

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Advertisement

The Conversation

Under the influence and under arrest − what happens if you’re drunk in the interrogation room?

Published

on

theconversation.com – Jacqueline R. Evans, Associate Professor of Psychology, Florida International – 2024-04-26 07:28:33

In the U.S., if you waive your Miranda rights, you'll be interrogated – whether you're drunk or sober.

Photoboyko/iStock via Getty Images Plus

Jacqueline R. Evans, Florida International University

Imagine it's Friday night. You're enjoying happy hour with friends after a long . You're relaxed, having indulged in several of your preferred adult beverages. Now imagine that as you the bar, a officer approaches. You're under arrest.

Advertisement

Flash forward to the police station. The officer takes you to a cramped room and reads you your Miranda rights: You have the right to remain silent, to an attorney, and all the rest. Let's say you waive those rightsmost people do – and the officer questions you for several hours.

While under the influence, would you understand your Miranda rights and appreciate the consequences of choosing to invoke or waive them? Would the statements you made during questioning be more or less reliable than how you'd respond sober? Would a jury take what the drunken you said seriously? These are the questions that legal psychologists like me and my colleagues seek to address in our research.

Suspects get similar treatment, drunk or not

When we've surveyed police, they revealed it's common to question intoxicated suspects and that they tend to use the same interrogation techniques with drunken suspects that they normally use. Surveys of community members about their experience with interrogation confirm that questioning drunken suspects is common. In fact, sometimes police even interrogate drunken juveniles.

Of course, police in the U.S. cannot legally question anyone in custody unless that person has waived their Miranda rights and chosen to to the investigator. It's a common misperception that drunken people cannot legally waive their Miranda rights and that statements given while intoxicated cannot be used against them in court. But the reality is that from a legal perspective the police can Mirandize you while you're under the influence, interrogate you, and use your statements against you.

Advertisement

arrow upwards with text describing expected impairments at increasing BAC levels

Level of impairment rises along with how much you've had to drink.

NIH National Institute on Alcohol Abuse and Alcoholism, CC BY

Consider the case of Travis Jewell. When he was for fleeing a police officer in his truck, his blood alcohol level was .29, more than three times the legal limit of .08 in the U.S. The interrogator reported Jewell was slurring words and struggling to stand. Nonetheless, the court accepted his Miranda waiver, making Jewell's statements admissible during trial.

While Miranda waivers from intoxicated people may be legally valid, research from my lab suggests that when with sober individuals, someone under the influence of or alcohol – even at low levels of intoxication – may be less able to comprehend their rights.

Testing how drunken ‘suspects' behave

Critically, researchers know almost nothing about how intoxicated people behave during interrogation.

Advertisement

To address this need, my colleagues and I brought university student volunteers into the lab, where we have safeguards in place to minimize health risks. We had some of our participants drink enough vodka to reach a breath alcohol level of .08%, a level consistent with the legal driving limit in the U.S.

Then we set the participants up to be guilty or innocent of cheating, and interrogated each of them about potential academic misconduct. We were interested in whether, impaired or sober, they said anything incriminating or suspicious during questioning.

About two-thirds of sober participants said something suggestive of guilt, while even more intoxicated participants did. The difference in suspicious statements between the groups was not statistically significant, but our findings do indicate that intoxicated people – just like the rest of the public – are at a high risk of self-incrimination. And remember, in our study, half of the participants were innocent of the infraction they were being questioned about.

man in striped clothes sits across table from woman in suit jacket

Standard legal advice is to keep your mouth shut until you are able to meet with a lawyer.

AP Photo/Steve Helber

Advertisement

Suspicious remarks can have immediate consequences during interrogation. When a says something suggestive of guilt, it tends to increase an interrogator's belief that they're guilty. When interrogators have a stronger belief in guilt, they then tend to be more accusatory, an approach associated with false confessions.

Intoxicated suspects – guilty or innocent – are very likely to make a guilt-suggestive statement, which in turn is likely to invite more coercive interrogation approaches. This could potentially explain our recent real-world findings in Sweden that police interrogators used more confrontational techniques with intoxicated suspects than with sober suspects.

On a positive note, our work has also shown that potential jurors seem to recognize that intoxication may to less reliable statements during interrogation. They tend to give less weight to a confession from an intoxicated suspect than from a sober suspect. While that may sound reassuring, should you find yourself in that cramped interrogation room, sober or intoxicated, exercise your rights and ask for an attorney.The Conversation

Jacqueline R. Evans, Associate Professor of Psychology, Florida International University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Advertisement
Continue Reading

The Conversation

Cybersecurity researchers spotlight a new ransomware threat – be careful where you upload files

Published

on

theconversation.com – Selcuk Uluagac, Professor of Computing and Information Science, Florida International University – 2024-04-26 07:28:18

Avoiding iffy downloads is no longer enough to ensure this doesn't happen.

Olemedia/iStock via Getty Images

Selcuk Uluagac, Florida International University

You probably know better than to click on links that download unknown files onto your computer. It turns out that uploading files can get you into trouble, too.

Advertisement

's web browsers are much more powerful than earlier generations of browsers. They're able to manipulate data within both the browser and the computer's local file system. Users can send and receive email, listen to music or watch a movie within a browser with the click of a button.

Unfortunately, these capabilities also mean that hackers can find clever ways to abuse the browsers to trick you into letting ransomware lock up your files when you think that you're simply doing your usual tasks online.

I'm a computer scientist who studies cybersecurity. My colleagues and I have shown how hackers can gain access to your computer's files via the File System Access Application Programming Interface (API), which enables web applications in modern browsers to interact with the users' local file .

The threat applies to Google's Chrome and Microsoft's Edge browsers but not Apple's Safari or Mozilla's Firefox. Chrome accounts for 65% of browsers used, and Edge accounts for 5%. To the best of my knowledge, there have been no reports of hackers using this method so far.

Advertisement

My colleagues, who include a Google security researcher, and I have communicated with the developers responsible for the File System Access API, and they have expressed for our work and interest in our approaches to defending against this kind of attack. We also filed a security to Microsoft but have not heard from them.

Double-edged sword

Today's browsers are almost operating systems unto themselves. They can software programs and encrypt files. These capabilities, combined with the browser's access to the host computer's files – ones in the cloud, shared folders and external drives – via the File System Access API creates a new opportunity for ransomware.

Imagine you want to edit photos on a benign-looking free online editing tool. When you upload the photos for editing, any hackers who control the malicious editing tool can access the files on your computer via your browser. The hackers would gain access to the folder you are uploading from and all subfolders. Then the hackers could encrypt the files in your file system and demand a ransom payment to decrypt them.

Today's web browsers are more powerful – and in some ways more vulnerable – than their predecessors.

Ransomware is a growing problem. Attacks have hit individuals as well as , including Fortune 500 companies, banks, cloud service providers, cruise operators, threat-monitoring services, chip manufacturers, governments, medical centers and hospitals, insurance companies, schools, universities and even departments. In 2023, organizations paid more than US$1.1 billion in ransomware payments to attackers, and 19 ransomware attacks targeted organizations every second.

Advertisement

It is no wonder ransomware is the No. 1 arms race today between hackers and security specialists. Traditional ransomware runs on your computer after hackers have tricked you into downloading it.

New defenses for a new threat

A team of researchers I lead at the Cyber-Physical Systems Security Lab at Florida International University, including postdoctoral researcher Abbas Acar and Ph.D. candidate Harun Oz, in collaboration with Google Senior Research Scientist Güliz Seray Tuncay, have been investigating this new type of potential ransomware for the past two years. Specifically, we have been exploring how powerful modern web browsers have become and how they can be weaponized by hackers to create novel forms of ransomware.

In our paper, RøB: Ransomware over Modern Web Browsers, which was presented at the USENIX Security Symposium in August 2023, we showed how this emerging ransomware strain is easy to design and how damaging it can be. In particular, we designed and implemented the first browser-based ransomware called RøB and analyzed its use with browsers running on three different major operating systems – Windows, Linux and MacOS – five cloud providers and five antivirus products.

Our evaluations showed that RøB is capable of encrypting numerous types of files. Because RøB runs within the browser, there are no malicious payloads for a traditional antivirus program to catch. This means existing ransomware detection systems face several issues against this powerful browser-based ransomware.

Advertisement

We proposed three different defense approaches to mitigate this new ransomware type. These approaches operate at different levels – browser, file system and user – and complement one another.

The first approach temporarily halts a web application – a program that runs in the browser – in order to detect encrypted user files. The second approach monitors the activity of the web application on the user's computer to identify ransomware-like patterns. The third approach introduces a new permission dialog box to inform users about the risks and implications associated with allowing web applications to access their computer's file system.

When it to protecting your computer, be careful about where you upload as well as download files. Your uploads could be giving hackers an “in” to your computer.The Conversation

Selcuk Uluagac, Professor of Computing and Information Science, Florida International University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Advertisement
Continue Reading

The Conversation

How bird flu virus fragments get into milk sold in stores, and what the spread of H5N1 in cows means for the dairy industry and milk drinkers

Published

on

theconversation.com – Noelia Silva del Rio, Associate Specialist in Cooperative Extension, Production Medicine and Food Safety, of California, Davis – 2024-04-25 14:04:50

Cows typically get over avian flu in a couple of weeks, but it's an economic blow for farms.

AP Photo/Charlie Litchfield

Noelia Silva del Rio, University of California, Davis; Richard V. Pereira, University of California, Davis; Robert B. Moeller, University of California, Davis; Terry W. Lehenbauer, University of California, Davis, and Todd Cornish, University of California, Davis

The discovery of viral fragments of avian flu virus in milk sold in U.S. stores suggests that the H5N1 virus may be more widespread in U.S. dairy cattle than previously realized.

Advertisement

The Food and Drug Administration was quick to stress on April 24, 2024, that it believes the commercial milk supply is safe. However, highly pathogenic avian influenza virus can make cows sick, and the flu virus's presence in herds in several states and now new federal restrictions on the movement of dairy cows between states are putting economic pressure on farmers.

Five experts in infectious diseases in cattle from the University of California, Davis – Noelia Silva del Rio, Terry Lehenbauer, Richard Pereira, Robert Moeller and Todd Cornish – explain what the test results mean, how bird flu can spread to cattle and the impact on the industry.

What are viral fragments of avian flu, and can they pose risks to people?

It's crucial to understand that the presence of viral fragments of H5N1 doesn't indicate the presence of intact virus particles that could cause disease.

The commercial milk supply maintains safety through two critical measures:

Advertisement
  • First, milk sourced from sick animals is promptly diverted or disposed of, ensuring it does not enter the food chain.

  • Second, all milk at grocery stores is heat treated to reduce pathogen load to safe levels, mainly by pasteurization. Pasteurization has been shown to effectively inactivate H5N1 in eggs, and that occurs at a lower temperature than is used for milk.

The viral fragments were detected using quantitative polymerase chain reaction testing, which is known for its exceptional sensitivity in detecting even trace amounts of viral genetic material. These fragments are only evidence that the virus was present in the milk. They aren't evidence that the virus is biologically active.

To evaluate whether the presence of the viral fragments corresponds to a virus with the capacity to replicate and cause disease, a different testing approach is necessary. Tests such as embryonated egg viability studies allow scientists to assess the virus's ability to replicate by injecting a sample into an embryonated chicken egg. That type of testing is underway.

On April 24, 2024, the FDA said it had found no reason to change its assessment that the U.S. milk supply is safe. The agency does strongly advise against consuming raw milk and products derived from it because of its inherent risks of contamination with harmful pathogens, avian flu viruses.

How does an avian flu virus get into cow's milk?

Currently, cows confirmed to have H5N1 have different symptoms than the typical flu-like symptoms observed in birds.

Advertisement

Abnormal milk and mastitis, an inflammatory response to infection, are common. While there is speculation that other bodily secretions, such as saliva, respiratory fluids, urine or feces, may also harbor the virus, that has yet to be confirmed.

The legs of a cow showing a milking device attached to the udder and tubes for the milk to flow.

Milking equipment can help viruses spread.

Loic Venance/AFP via Getty Images

How waterfowl or other birds transmitted H5N1 to cattle is still under investigation. In 2015, an outbreak of highly pathogenic avian influenza in commercial poultry farms reached its peak in April and May, the same time birds migrated north. Birds can shed the virus through their oral, nasal, urine and fecal secretions. So the virus could potentially be transmitted through direct contact, ingesting contaminated feed or , or inhaling the virus.

Infected dairy cows can shed the virus in milk, and they likely can transmit it to other cows, but that still needs to be proven.

Advertisement

Contagious pathogens that cause mastitis can be transmitted through milking equipment or contaminated milker's gloves. Ongoing research will help determine whether this is also a potential transmission route for H5N1, and if so, what makes the virus thrive on mammary tissue.

If H5N1 is found to be widespread in milk, what risks can that pose for the dairy industry?

For the dairy industry, infection of cattle with H5N1 avian influenza virus creates challenges at two levels.

The overriding concern is always for the safety and healthfulness of milk and dairy products.

Existing state and federal regulations and industry practices require sick cows or cows with abnormal milk to be segregated so that their milk does not enter the food supply. Proper pasteurization should kill the virus so that it cannot cause infection.

Advertisement

The American Association of Bovine Practitioners has also developed biosecurity guidelines for H5N1, focusing on key practices. These include minimizing wild birds' contact with cattle and their , managing the movement of cattle between farms, isolating affected animals, avoiding feeding unpasteurized (raw) colostrum or milk to calves and other mammals, and ensuring the use of protective personal equipment for animal caretakers.

The other major concern is for the of the dairy herd and the people who take care of the dairy cattle. A farm worker who handled dairy cows contracted H5N1 in in March 2024, but such cases are rare.

No vaccines or specific therapies are available for avian influenza infections in dairy cattle. But following good sanitation and biosecurity practices for both people and cows will help to reduce risk of exposure and spread of the avian influenza virus among dairy cattle.

Advertisement

For cows that get the virus, providing supportive care, including fluids and fever reducers as needed, can help them get through the illness, which can also cause loss of appetite and affect their milk production.

Dairy farms facing an outbreak will have economic losses from caring for sick animals and the temporary reduction in milk sales. Approximately 5% to 20% of the animals in the affected herds have become ill, according to early estimates. Affected animals typically recover within 10 to 20 days.

At least 21 states have restricted importing dairy cattle to prevent the virus's spread, and the federal announced it will require that lactating dairy cattle be tested before they can be moved between states starting April 29, 2024. While the overall impact on U.S. milk production is projected to be minor on an annual basis, it could to short-lived supply disruptions.

How worried should people be about avian flu?

The federal government's monitoring and food safety measures, along with pasteurization, important safeguards to protect the public from potential exposure to avian influenza virus through the food chain.

Advertisement

Drinking raw milk, however, does represent a risk for exposure to multiple diseases, including H5N1. This is why the FDA and Centers for Disease Control and Prevention strongly recommend drinking only pasteurized milk and dairy products.The Conversation

Noelia Silva del Rio, Associate Specialist in Cooperative Extension, Production Medicine and Food Safety, University of California, Davis; Richard V. Pereira, Associate Professor of Veterinary Medicine and Associate Agronomist, University of California, Davis; Robert B. Moeller, Professor of Veterinary Medicine, University of California, Davis; Terry W. Lehenbauer, Professor of Veterinary Medicine, University of California, Davis, and Todd Cornish, Professor of Veterinary Medicine, University of California, Davis

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading

News from the South

Trending