BitDepthFeatured

The deepfake challenge to truth

3 Mins read
  • Deepfakes, created using AI to mimic real people, pose a significant risk to businesses, with at least 26% experiencing attacks.
  • Studies show that people struggle to distinguish between real and fake content.
  • To protect against deepfakes, organizations should expose their employees to a range of deepfake examples.

Above: Deepfake concept image. Illustration created using the Flux model on 123RF.com

BitDepth#1516 for June 23, 2025

When the conversation turns to the impact of AI on society, the strip-mining of intellectual property by Large Language Models (LLMs) and the impact on future jobs tends to dominate.

Much of what’s at stake in the future of artificial intelligence development is nothing less than a shared understanding of what is true and what is not.

Nowhere is that being put to the test more dramatically than in the rapidly advancing field of deepfakes, which use AI technology to map facial characteristics and voice patterns then use that information to create increasingly convincing facsimiles of real people apparently saying real things.

According to Perry Carpenter, chief human risk management strategist of KnowBe4, a cybersecurity investigation firm, the risk to companies is real.

In a recent online webinar, he referenced a Deloitte study that found that at least 26 per cent of businesses are experiencing deepfake-related attacks, a number that is set to rise sharply.

The era of casually dismissing deepfakes is definitely behind us. Carpenter notes that studies assessing the ability of focus groups to pick deepfakes from original media discovered that 80 per cent of the time, participants picked incorrectly, despite being primed to look out for falsehoods.

“I think we’re already past the time that anyone will be able to reliably tell what is real and what is not real when it comes to voice and video, when it comes to imagery, and then we’ll not be able to tell what’s real or AI generated when it comes to text,” Carpenter said.

“We all see tells for those things right now, but again, those may be artifacts of the past or they may be artifacts of a lazy attacker.”

“As security people and as people who think about this a lot, we usually [think of] nation-state or APT (Advanced Persistent Threat, nation state attack) level of thinking when it comes to creating these types of attacks. There are very few of those APT level attacks but there’s are a flood of [deepfakes that are] very effective and are tricking people today.”

“When you’re starting to find ways to inoculate your people to this through simulations or through awareness exercises, you need to give them the full range. They need to see the bad stuff. They need to see the scary stuff, and they need to see the nation-state level stuff, so that they see the spectrum.”

But deepfakes on their own, while persuasive, depend to a great deal on context. How they are used and implemented to influence thinking or urge action, whether it is political persuasion, sharing sensitive company information or just weaponising defamation of character.

Perry Carpenter.

Carpenter argues that the narrative framing and targeting of deepfakes is as important as the improving technology that generates them.

He outlines four steps that everyone should take and, I’d argue, journalists must take before accepting information delivered by provocative videos or acting on unusual phone calls, which he describes as the FAIK framework for evaluating these messages (book available here).

F Freeze & Feel.
A Analyze the Narrative & Emotional Triggers.
I Investigate (claims, sources, etc.)
K Know, confirm, and keep vigilant.

Specifically, he encourages netizens to cross-examine online media snippets by asking why the message exists, what’s the story it tells, who benefits from the story’s distribution and what the goal of sharing might be.

Deepfakes have been used in recent elections globally. There was even one in TT’s April election which altered Mrs Persad-Bissessar and Roger Alexander’s greeting after his onstage political introduction to manufacture a fake kiss from the footage.

A 2018 BuzzFeed video faking a Barack Obama address (link.technewstt.com/fake) was state of the art then, not anymore.

Expect more of this kind of thing to play a part in political jousting, cybersecurity infiltrations and general muddying of the waters of fact in favour of agenda-driven fiction.

The tools are becoming more powerful, are more widely available and accessible and are becoming simpler to use.

With a sufficiently powerful computer system, it is already possible to do live deepfakes, contemporaneously replacing the face of a live speaker with a deepfake mask that matches their movements and expressions while altering voice to match previously sampled vocal patterns.

This is now.

With the reliability of truth crumbling in real time, the need for greater awareness of these pervasive digital deceptions is growing exponentially greater, and a commitment to reporting truth in the face of persuasive and widespread falsehoods may be the last great differentiator for journalism.

The UNESCO Artificial Intelligence Policy Roadmap for the Caribbean.

Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
How AI summaries will break knowledge

How AI summaries will break knowledge

Google has been indexing the collective wisdom of the open internet for the last two-and-a-half decades.
Read More
Drifting to data-driven decisions

Drifting to data-driven decisions

"Many organizations are collecting data, but few are converting it into action."
Read More
What .POST means for secure communications

What .POST means for secure communications

Posts are not just offering digital postal services, they are offering digital services across multiple sectors.
Read More
Samsung launches new Z series Flip, Fold

Samsung launches new Z series Flip, Fold

A foldable phone looks like a standard smartphone when shut and usually has a functional screen on its face.
Read More
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us
How AI summaries will break knowledge How AI summaries will break knowledge
Drifting to data-driven decisions Drifting to data-driven decisions
What .POST means for secure communications What .POST means for secure communications
Samsung launches new Z series Flip, Fold Samsung launches new Z series Flip,...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
Opinion

How AI is transforming KYC for businesses

3 Mins read
The contribution of AI to KYC is in its early developmental stage.
BitDepthFeatured

AI and the jobs of the future

3 Mins read
Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Press Releases

Samsung's AI for travellers

2 Mins read
AI helps travellers stay prepared and avoid overspending.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
5 months ago

[…] Caribbean – When the conversation turns to the impact of AI on society, the strip-mining of intellectual property by Large Language Models (LLMs) and the impact on future jobs tends to dominate… more […]

1
0
Share your perspective in the comments!x
()
x