<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Computer technology that threatens democracy in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Computer-technology-that-threatens-democracy/m-p/37710#M41</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;&amp;nbsp; The issue is whether the person is a) real b) or a pseudo generated figment of someone's imagination.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where is the digital fingerprint and traceability, if it is generated by a algorithm - somewhere somehow, it must have been developed, programmed and instructed to execute.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It could take a lot of effort, if they have executed this remotely via various proxies to hide their presence or attempted to remove their presence.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jul 2020 22:47:12 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2020-07-29T22:47:12Z</dc:date>
    <item>
      <title>Computer technology that threatens democracy</title>
      <link>https://community.isc2.org/t5/Threats/Computer-technology-that-threatens-democracy/m-p/37642#M34</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We all know it exists, so how do we deal with it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.rnz.co.nz/programmes/the-detail/story/2018755718/the-deep-fake-threat" target="_blank"&gt;https://www.rnz.co.nz/programmes/the-detail/story/2018755718/the-deep-fake-threat&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:35:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Computer-technology-that-threatens-democracy/m-p/37642#M34</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: Computer technology that threatens democracy</title>
      <link>https://community.isc2.org/t5/Threats/Computer-technology-that-threatens-democracy/m-p/37653#M36</link>
      <description>&lt;P&gt;Courts have long dealt with this by requiring "real evidence", original documents and first-party testimony.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traditional news media deas with this by checking sources and by attributing articles to the reporter (or paper).&amp;nbsp; Reporters with a history of "getting it wrong" learned the meaning of unemployment.&amp;nbsp;&amp;nbsp;Nowadays, amateurs can post "news", even anomalously, which has cost us the ability to weed out the un-reputable.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The way to deal with deep-fakes is the same... attribution and fact-checking.&amp;nbsp; There was always someone behind the camera.&amp;nbsp; They just need to be identified so they can earn the reputation they deserve (good or bad).&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2020 12:53:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Computer-technology-that-threatens-democracy/m-p/37653#M36</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2020-07-27T12:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: Computer technology that threatens democracy</title>
      <link>https://community.isc2.org/t5/Threats/Computer-technology-that-threatens-democracy/m-p/37710#M41</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;&amp;nbsp; The issue is whether the person is a) real b) or a pseudo generated figment of someone's imagination.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where is the digital fingerprint and traceability, if it is generated by a algorithm - somewhere somehow, it must have been developed, programmed and instructed to execute.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It could take a lot of effort, if they have executed this remotely via various proxies to hide their presence or attempted to remove their presence.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 22:47:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Computer-technology-that-threatens-democracy/m-p/37710#M41</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-07-29T22:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: Computer technology that threatens democracy</title>
      <link>https://community.isc2.org/t5/Threats/Computer-technology-that-threatens-democracy/m-p/37723#M43</link>
      <description>&lt;P&gt;the bigger problem is in our hyper connected society, even if a deep fake is latter proven to be that, the damage may be done and the tribal truth already decided.&lt;/P&gt;&lt;P&gt;e.g. nancy pelosi slurred speech video, which some trump supporters still holding as fact she was drunk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and once they are released to the world its difficult to get rid of them, just ask any victim of "revenge" images&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if the platform introduces a signature, there are someone will re-create the tools without it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way to tackle it is at the first posting, so it comes down to platforms to have a better AI/ML than was used to stich the video together and tag it as a possible deepfake, and peoples definitions of reputable news organisations to stop including those posting clickbate.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 13:42:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Computer-technology-that-threatens-democracy/m-p/37723#M43</guid>
      <dc:creator>EnviableOne</dc:creator>
      <dc:date>2020-07-30T13:42:08Z</dc:date>
    </item>
  </channel>
</rss>

