{"id":96039,"date":"2024-07-25T07:45:42","date_gmt":"2024-07-25T15:45:42","guid":{"rendered":"https:\/\/www.trendmicro.com\/internet-safety?p=96039"},"modified":"2024-08-05T03:06:52","modified_gmt":"2024-08-05T11:06:52","slug":"deepfakes-101","status":"publish","type":"post","link":"https:\/\/www.trendmicro.com\/internet-safety\/blog\/deepfakes-101\/","title":{"rendered":"Deepfakes 101: What are Deepfakes and How to Spot Them\u00a0"},"content":{"rendered":"\n<p>The term, &#8220;<strong>deepfake<\/strong>&#8220;, is a blend of &#8220;deep learning&#8221; and &#8220;fake&#8221;, and was coined in 2017 by a Reddit user. A deepfake is a fake image, video, or voice recording where one person\u2019s likeness is replaced with another&#8217;s. These are made to deceive or entertain people. With advanced machine learning, deepfakes can look very realistic. Previously, deepfakes were primarily known for their humorous use on social media. However, their potential for abuse quickly became apparent and deepfakes are now a significant concern for privacy, security, and information. In a recent Trend Micro study conducted in June 2024, <strong>71% of people reported they feel negatively about deepfakes<\/strong>, with a belief that the top reason anyone creates deepfakes is for fraud.<sup><strong>1<\/strong><\/sup>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Are Deepfakes Made?&nbsp;<\/h2>\n\n\n\n<p>Creating deepfakes involves using advanced computer programs called Generative Adversarial Networks (GANs) to make fake images that look real. There are four main steps:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Data Collection<\/strong>: Firstly, media content (images, videos, or audios) of the target person is gathered. This collection is used to train the computer program.&nbsp;<br><\/li>\n\n\n\n<li><strong>Training the Model<\/strong>: The GAN is trained with the collected data. One part of the GAN creates fake images, while the other part checks if they look real.&nbsp;<br><\/li>\n\n\n\n<li><strong>Refinement<\/strong>: Techniques like facial landmarks and motion capture are used to make the deepfake look natural, with realistic expressions and movements.&nbsp;<br><\/li>\n\n\n\n<li><strong>Final Production<\/strong>: The finished deepfake is then combined with the original media, creating a seamless and convincing piece of fake content.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>While the above may sound somewhat complex, the fact is anyone can make a deepfake, given the huge number of software applications accessible to the public, from DeepFaceLab to&nbsp;<strong>DALL-E<\/strong>&nbsp;and Midjourney (though the latter has safeguards in place).&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"700\" src=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/deepfakes-are-everywhere-trend-micro-deepfake-inspector-banner.webp\" alt=\"Illustration of video call screenshots on mobile phones with text 'Deepfakes are everywhere' promoting the free Trend Micro Deepfake Inspector\" class=\"wp-image-96273\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" srcset=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/deepfakes-are-everywhere-trend-micro-deepfake-inspector-banner.webp 700w, https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/deepfakes-are-everywhere-trend-micro-deepfake-inspector-banner-480x480.webp 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 700px, 100vw\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Care About Deepfakes?<\/h2>\n\n\n\n<p>It is easy to think of cybersecurity as an abstract concept, removed from everyday life \u2014 but the implications of malicious deepfake use affect the individual and society at large:&nbsp;<\/p>\n\n\n\n<style>\n#left-area .entry-content ol>li {\n    margin: 0 0 15px 0;\n    padding: 0px;\n    text-indent: -1em;\n    margin-left: 1em;\n}\n#left-area .entry-content ul>li {\n    margin: 0 0 15px 0;\n    padding: 0px;\n}\n@media screen and (max-width:767px) {\n.btn > small {display:block}\n}\n<\/style>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Your personal privacy:&nbsp;<\/strong>&nbsp;<br>Deepfakes can violate your personal privacy by creating non-consensual and often harmful content. This is particularly concerning in cases of deepfake pornography, where individuals&#8217; faces are superimposed onto explicit content without their consent.&nbsp;<br><\/li>\n\n\n\n<li><strong>Your security and finances:<\/strong>&nbsp;<br>Deepfake video calls may be used to impersonate people, often with the intent to deceive you into giving away money or sensitive information. Anyone can fall victim to a deepfake scam \u2014 and suffer grave consequences like financial fraud and identity theft.&nbsp;<br><\/li>\n\n\n\n<li><strong>Political stability:&nbsp;<\/strong>&nbsp;<br>Deepfakes can be weaponized to create political turmoil. Fabricated videos of politicians making inflammatory statements or engaging in illicit activities can influence public opinion and disrupt democratic processes.&nbsp;<br><\/li>\n\n\n\n<li><strong>Legal and ethical concerns:&nbsp;<\/strong>&nbsp;<br>The creation and distribution of deepfakes raise significant legal and ethical questions. Issues of consent, intellectual property, and the right to one&#8217;s likeness are at the center of ongoing societal debates.&nbsp;<br><\/li>\n\n\n\n<li><strong>Media integrity:&nbsp;<\/strong>&nbsp;<br>Journalists and media organizations face new challenges in verifying the authenticity of content. Deepfakes can undermine the credibility of news outlets and contribute to the spread of fake news.&nbsp;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"468\" src=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/man-browsing-smartphone-and-holding-credit-card-on-street_700.webp\" alt=\"Man browsing his smartphone and holding a credit card on street\" class=\"wp-image-96215 img-fluid\" srcset=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/man-browsing-smartphone-and-holding-credit-card-on-street_700.webp 700w, https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/man-browsing-smartphone-and-holding-credit-card-on-street_700-480x321.webp 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 700px, 100vw\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Threats &amp; Consequences of Deepfakes&nbsp;<\/h2>\n\n\n\n<p>Deepfakes pose several threats to cybersecurity:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Impersonation and video call scams:<\/strong>&nbsp;&nbsp;<br>Cybercriminals can use deepfakes during video calls to impersonate individuals. Whether it\u2019s a friend, family member, potential partner, or a job interview online \u2014 video calls provide a perfect opportunity for the scammer to conduct a deepfake attack, impersonating the target and tricking you into giving money or personal information.&nbsp;<br><\/li>\n\n\n\n<li><strong>Misinformation\/disinformation:<\/strong>&nbsp;<br>Deepfakes can be used to create convincing but false content, spreading misinformation\/disinformation. This can undermine public trust in media, influence elections, and destabilize societies.&nbsp;<br><\/li>\n\n\n\n<li><strong>Identity theft:<\/strong>&nbsp;&nbsp;<br>Deepfakes can facilitate identity theft by creating realistic fake identities or compromising existing ones, leading to financial and reputational damage.&nbsp;<br><\/li>\n\n\n\n<li><strong>Blackmail and extortion:<\/strong>&nbsp;&nbsp;<br>Malicious actors can create compromising deepfake videos to blackmail or extort individuals, leveraging the power of fabricated evidence.&nbsp;<br><\/li>\n\n\n\n<li><strong>Erosion of trust:<\/strong>&nbsp;&nbsp;<br>The existence of deepfakes can erode trust in digital content. People are beginning to doubt the authenticity of legitimate media, leading to a broader crisis of confidence in digital communications.&nbsp;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"700\" src=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/real-or-fake-trend-micro-deepfake-inspector-banner.webp\" alt=\"Illustration of video call screenshots on mobile phones with text 'Real or fake? Can you tell the difference?' promoting the free Trend Micro Deepfake Inspector\" class=\"wp-image-96293\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" srcset=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/real-or-fake-trend-micro-deepfake-inspector-banner.webp 700w, https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/real-or-fake-trend-micro-deepfake-inspector-banner-480x480.webp 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 700px, 100vw\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Spot a Deepfake Video&nbsp;<\/h2>\n\n\n\n<p>Detecting deepfakes is becoming increasingly challenging as the technology improves. Whether you\u2019re watching a video online, listening to an audio clip, or having a video call with someone, follow your instincts and be on the lookout for the following:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unnatural facial movements:&nbsp;<\/strong>&nbsp;<br>Deepfakes may exhibit subtle inconsistencies in facial expressions and movements. Look for unnatural blinking, lip-syncing issues, or odd facial tics.&nbsp;<br><\/li>\n\n\n\n<li><strong>Inconsistent lighting:&nbsp;<\/strong>&nbsp;<br>Pay attention to lighting and shadows. If the lighting on the face does not match the lighting in the rest of the scene, it could be a deepfake.&nbsp;<br><\/li>\n\n\n\n<li><strong>Sound issues:&nbsp;<\/strong>&nbsp;<br>Be on the lookout for sudden changes in tone, and unusual pauses or intonation that doesn\u2019t reflect the speaker\u2019s normal speech. Inconsistencies in background noise or sudden shifts in ambient sounds can also indicate a deepfake.&nbsp;<br><\/li>\n\n\n\n<li><strong>Blurring:&nbsp;<\/strong>&nbsp;<br>Deepfakes often have slight blurring around the edges of the face, particularly during quick movements.&nbsp;<br><\/li>\n\n\n\n<li><strong>Audio-visual mismatches:&nbsp;<\/strong>&nbsp;<br>Listen for discrepancies between the audio and visual elements. Mismatched lip movements and audio can be a sign of a deepfake.&nbsp;<br><\/li>\n\n\n\n<li><strong>Contextual inconsistencies:&nbsp;<\/strong>&nbsp;<br>If the content seems out of character for the person or implausible given the circumstances, it may be a deepfake. For example, if the person you know well has an urgent, unusual request, such as money or personal information, and you\u2019re feeling pressured to act quickly, this is a red flag.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Being aware of these signs will help you detect a deepfake \u2014 to better protect yourself against the threat of deepfakes, be sure to follow the advice in &#8220;<a href=\"https:\/\/www.trendmicro.com\/internet-safety\/blog\/how-to-protect-yourself-from-deepfakes\" target=\"_blank\" rel=\"noopener\" title=\"\"><strong>How to Protect Yourself from Deepfakes: Tips and Best Practices<\/strong><\/a>&#8220;. The fact is, however, as deepfake technology continues to advance, it\u2019s becoming much harder for the human eye to reliably detect a deepfake.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Introducing Trend Micro Deepfake Inspector&nbsp;<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><br>Deepfake video calls are on the rise, making it hard to know if the person you\u2019re talking with is who they say they are. You could be chatting with a friend, family member, potential partner, or having a job interview online \u2014 scammers can use these opportunities to impersonate the person you <em>think<\/em> you are talking to and trick you into giving away money or sensitive information.\u00a0<\/p>\n\n\n\n<p>Protect yourself with our <strong>FREE<\/strong> tool, <strong><a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&amp;source=iskf&amp;platform=windows\" target=\"_blank\" rel=\"noopener\" title=\"\">Trend Micro Deepfake Inspector<\/a><\/strong>. Designed for live video calls on Windows PCs, it scans for AI face-swapping content in real time, alerting you if you\u2019re talking with a potential deepfake scammer and protecting you from harm. To learn more about <a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&amp;source=iskf&amp;platform=windows\" target=\"_blank\" rel=\"noopener\" title=\"\">Deepfake Inspector<\/a> and how it can help you spot people using AI to alter their appearance on video calls, click the button below.\u00a0<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"700\" src=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/identify-deepfake-in-real-time-trend-micro-deepfake-inspector-banner.webp\" alt=\"Picture of an ongoing video call on a laptop with texts 'Anomalies detected' and 'Identify deepfakes in real time' promoting the free Trend Micro Deepfake Inspector\" class=\"wp-image-96253\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" srcset=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/identify-deepfake-in-real-time-trend-micro-deepfake-inspector-banner.webp 700w, https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/identify-deepfake-in-real-time-trend-micro-deepfake-inspector-banner-480x480.webp 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 700px, 100vw\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p class=\"text-center\">\n<a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&#038;source=iskf&#038;platform=windows\" target=\"_blank\" class=\"btn btn-danger btn-lg btn-block w-100 d-none d-lg-block interstate\" rel=\"noopener\">Download Trend Micro Deepfake Inspector &nbsp;&nbsp;<small style=\"font-size:12px\">It&#8217;s free<\/small><\/a>\n<a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&#038;source=iskf&#038;platform=windows\" target=\"_blank\" class=\"btn btn-danger btn-block w-100 d-md-block d-lg-none interstate\" rel=\"noopener\">Download Trend Micro Deepfake Inspector <span class=\"d-none d-md-inline\">&nbsp;&nbsp;<\/span><small style=\"font-size:12px\">It&#8217;s free<\/small><\/a>\n<\/p>\n\n\n\n    <div class=\"row\">\n        <div class=\"col-md-8 offset-md-2\">\n            <div class=\"ratio ratio-16x9\">\n                <iframe src=\"https:\/\/www.youtube.com\/embed\/Z2mj-9htCJ0\" allowfullscreen><\/iframe>\n            <\/div>\n        <\/div>\n    <\/div>\n<br>\n\n\n\n<p>Don\u2019t risk a deepfake disaster \u2014 download Trend Micro Deepfake Inspector today! If you\u2019ve found this article\u202finteresting or helpful, please\u202fSHARE\u202fit with friends and family to help keep the online community secure and protected. Here\u2019s to a secure 2024!\u00a0<\/p>\n\n\n\n<p><sup><strong>1<\/strong><\/sup> <small>Trend Micro Snap Study \u2013 Consumers and Deepfakes, Conducted June \u2013 July 2024, US &amp; Australia, N=2097<\/small>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn what deepfakes are, how they are made, its consequences, and how to spot them. Get the latest tool in detecting deepfake videos for your online safety.<\/p>\n","protected":false},"author":17,"featured_media":96040,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[762,3,4],"tags":[747,758,755,757,746],"class_list":["post-96039","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-adults","category-for-parents","category-for-teachers","tag-deepfake-2","tag-deepfake-detector","tag-deepfake-scam","tag-deepfake-video","tag-scam","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/96039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=96039"}],"version-history":[{"count":2,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/96039\/revisions"}],"predecessor-version":[{"id":96483,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/96039\/revisions\/96483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media\/96040"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=96039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/categories?post=96039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/tags?post=96039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}