Share This Article
Artificial intelligence can be used to create deep fake and deep nude images leading to major legal issues in different fields.
Artificial intelligence is an ever-evolving technology that significantly impacts how we live and interact with the world around us, bringing several innovations in many fields while simultaneouslyย bringing new challenges for privacy and personal data protection.
Among these challenges, deep fakes and deep nude represent a topic of increasing prevalence and relevance for artificial intelligence, entailing several risks and critical issues. In this article, we will explore the main issues and possible negative consequences of these technologies, with particular reference to identity theft, cyberbullying, revenge porn, and the right to be forgotten.
What are deep fakes and deep nudes?
Deep fakes are videos or images created using AI to replace one personโs face with anotherโs, often so verisimilarly that they are almost indistinguishable from reality.ย The term “deep fake” is a neologism created by merging the terms โfakeโ and โdeep learning,โ a particular AI technology.ย The starting point is always the real faces, real bodies, and real voices of people (all โpersonal dataโ under the GDPR), but transformed into digital โfakes.โย Unfortunately, deep fakes are not created for purely goliardic purposes but can also be used for illicit purposes, such as spreading fake news or compromising a personโs reputation.
On the other hand, deep nudes are a subcategory of deep fakes, consisting of images manipulated by artificial intelligence to remove a personโs clothing and create fake, sexually explicit images.ย This technology has been used to make pornographic images of celebrities and other people without their consent, and it seems clear that deep nudes can also be used for extortion or defamatory purposes.
The main risks of artificial intelligence used to create deep fakes
The ease with which sensitive attributes of an individualโs personal sphere can be manipulated using technologies such as deep fakes is evident.ย The situation is further complicated by the increasing availability of Apps and software that enable the creation of highly sophisticated deep fakes with everyday devices such
as smartphones, which are now within reach of everyone, including minors.
1. Identity theft
As also pointed out in the Italian Data Protection Authority chart on the topic, deep fakes can give rise to severe forms of identity theft, as the people involved completely lose control over their image and public representation of themselves.
Not only the physical representation of the people involved in the deep fake can be manipulated, but also the context in which they are placed, the people around them, and the situations they represent.ย Moreover, the possible negative consequences can extend beyond the victimโs personal sphere, for example, by damaging the reputation of a company or organization with which the person is associated.
2. Cyberbullying and revenge porn
Deep fake videos can be created with the intent to engage in actual acts of cyberbullying or even revenge porn, that is, the online sharing โ for the purpose of blackmail, denigration, or revenge, by former partners, lovers, or rejected admirers โ of photos and videos with sexual or even pornographic content, which, in the case of deep nude, are obviously fake.
In the specific case of deep nudes, the faces of people (including minors) can be โgrafted,โ using special software, onto the bodies of other subjects, either naked or engaged in poses or acts of an explicitly sexual nature. It is also possible to take images of clothed bodies and โundressโ them, reconstructing what the body would look like under clothing and creating highly realistic images.
Initially, the phenomenon mainly involved famous people in discrediting or blackmailing them.ย But in recent times, with the increasing spread of software using this technology, the risk also involves โordinaryโ people, who can become the object of psychologically and socially very damaging actions.ย Deep nude videos can also be used, without the complete knowledge of the subjects depicted in the images, to fuel the practice of illegal pornography and, unfortunately, even grave crimes such as child pornography.
3. Right to be forgotten
The right to be forgotten is a crucial provision of the GDPR: this right aims to ensure that data subjects
can have their personal data deleted under certain circumstances, such as when such data are no longer needed for the purposes for which they were collected or when the data subject withdraws their consent to their processing.
However, the right to be forgotten may encounter difficulties in practical application in certain cases.ย Indeed, since images and videos created through deep fakes can be shared on multiple online platforms and quickly go viral, the data subject who wishes to avail himself of this right (and the data controller who has to follow up on the relevant request) may not see their claim fully satisfied. Nevertheless, there are also significant difficulties in identifying the origin of the manipulated image.ย This can make it difficult to determine who created the image and with what intent, making it difficult to identify those responsible and take appropriate legal action.
The issues addressed above are just some of the significant challenges arising from the spread and exploitation of deep fakes and deep nudes.ย It is essential, therefore, that data controllers, data protection authorities, and companies implementing AI technologies work together to develop practical solutions to address the risks associated with the use of deep fakes and deep nudes to ensure the protection of data subjectsโ personal data and guarantee the exercise of the rights recognized by the GDPR. Only through concerted and coordinated action will it be possible to successfully address these challenges and protect the rights of individuals in the digital society in which we live.
Deep fakes are often used as part of cyber attacks, and you may find the following article interesting on the topic “The Fake CEO cyber attack and How to be ready for It!“.