Ministry of National Security: alert to security risks posed by deep forgery techniques

PRC Ministry of State SecurityThe WeChat public posting on Nov. 23 said that with theAIThe rapid development of technology.Deep Counterfeiting TechniquesGradually enter our lives, in bringing surprise and convenience at the same time, but also exposed a series of risks and hidden dangers, such as not pay attention to prevent, and may even jeopardize the national security.1AI collated the main content of the article as follows:

Ministry of National Security: alert to security risks posed by deep forgery techniques

seeing is not necessarily believing, hearing is not necessarily telling the truth

Deepfake technology (Deepfake) is a combination of "Deep Learning" (Deep Learning) and "Fake" (Fake), the use of artificial intelligence deep learning algorithms for automated data processing, to realize the picture, Audio and video intelligent simulation and forgery, including video forgery technology, audio forgery technology, false network identity forgery technology and so on. Its emergence makes it possible to tamper with or generate highly realistic and difficult-to-screen audio and video content, making it difficult for observers to recognize authenticity.

  • Video forgery techniquesThe purpose of the "makeover" is to The purpose of the "makeover" is to "transform" the provided facial features of a person into another person's image.
  • Audio forgery techniques(c) The use of "voice cloning" technology. Utilizes "voice cloning" technology to simulate the voice of the target person with a high degree of simulation.
  • False Network Identity Counterfeiting Techniques.. When creating a fake profile, it becomes a means of hiding your identity by generating a fake face to attach to your identity information.

Smart change is real, risky challenges are real

Deep forgery technology is rapidly becoming an emerging technology tool due to its superior capabilities in image, audio and video generation. However, it is a double-edged sword, with easy operation, low application threshold, highly deceptive visual and auditory forged content that is difficult to detect, and potential destructive and security risks that are becoming more and more prominent.

  • Deep Counterfeiting Techniques May Violate Individuals' Rights(b) The use of in-depth forgery technology. People with ulterior motives can easily steal the identity of others by using in-depth forgery technology, infringing on the rights of others, such as the right to portrait and the right to privacy, and some lawbreakers may even use in-depth forgery technology to commit fraud, posing a real danger to the security of property.
  • Deep Fake Technology May Trigger Social Concerns and Crisis of Confidence.. Deep-fake technology can create a large amount of fake news anytime, anywhere, influencing the direction of public opinion and causing panic among the public. As the public becomes aware of the dangers of "deep fakes", they may become lost in the midst of true and false information and become skeptical of the facts.
  • Deep counterfeiting techniques may threaten national security and public safetyDeep forgery technology will not only be used in the general industry. Deep forgery technology will not only be used in the general industry, but may also become a new tool for espionage and intelligence agencies to carry out "cognitive warfare". With the emergence of in-depth counterfeiting technology, certain foreign espionage and intelligence agencies may further utilize this technology to iterate their intelligence techniques and carry out activities such as recruitment and counter-insurgency, smear campaigns and obfuscation of the public.

Tips from State Security Agencies

In the face of the opportunities and challenges posed by deep forgeries, it is necessary to integrate development and security, raise security awareness and work together to maintain national security and social stability.

  • Use of technology to be aware of. Citizens should pay attention to the protection of personal privacy, especially the core classified positions, do not enter state secrets, commercial secrets or personal privacy and other sensitive information into the relevant technical software, do not use the network to disseminate classified content.
  • Information security should be prevented. Relevant platform enterprises should strengthen information security management and take the necessary technical measures to protect the safe storage and transmission of relevant information, so as to prevent it from being leaked, lost or illegally used. At the same time, they should strengthen the screening of content released by in-depth forgery techniques, so that they comply with the legal "red line" and the "bottom line" of morality.
  • Be wary of suspicious informationThe following is a summary of the information that has been published on the Internet. Be careful with relevant audiovisual content, verify the reliability of information from multiple sources before forwarding online information, do not be a rumor spreader, and take the information released by official channels as the standard.

According to the Ministry of State Security, safeguarding national security is a duty and obligation incumbent on every citizen, and the general public who find clues to the problem of jeopardizing national security through the use of deep counterfeiting techniques can report to the local state security authorities through the 12339 State Security Organs Reporting and Acceptance Phone Number, the Internet Reporting Platform (www.12339.gov.cn), and the WeChat public reporting and acceptance channel of the Ministry of State Security or directly to the local state security authorities. The people can report through the 12339 national security organs report acceptance telephone number (), network report platform (), the Ministry of State Security WeChat public number report acceptance channel or directly to the local national security organs.

statement:The content is collected from various media platforms such as public websites. If the included content infringes on your rights, please contact us by email and we will deal with it as soon as possible.
Information

Global AI Power Rankings are out: Stanford University releases global AI power rankings

2024-11-24 10:12:54

Information

NVIDIA's Jen-Hsun Huang says three types of robots are expected to be mass-produced in the future: cars, drones and humanoid robots.

2024-11-25 10:22:08

Search