Fraud Management & Cybercrime , Fraud Risk Management , Social Engineering

The Challenge of Detecting 'Deepfakes'

Avivah Litan of Gartner on Countering the Next Generation of Socially Engineered Fraud
Avivah Litan, vice president and distinguished analyst, Gartner Research

Detecting “deepfake” images used by fraudsters is challenging, says Gartner Research analyst Avivah Litan. And determined adversaries will keep pace with deepfake detection efforts by using artificial intelligence network learning processes, she says.

See Also: Fireside Chat | Levers of Human Deception: The Science and Methodology Behind Social Engineering

Nevertheless, security pros can use a combination of deepfake detection algorithms, internet whitelisting and fraud detection techniques to fight socially engineered attacks fueled by deepfakes, she says.

In a video interview with Information Security Media Group, Litan discusses:

  • Current benign and malicious use cases for deepfakes;
  • Strategies for increasing deepfake detection rates;
  • The use of technology to determine the provenance of news sources.

Litan, vice president and distinguished analyst at Gartner Research, is a member of the firm’s ITL application innovation team that covers blockchain, artificial intelligence and IoT. She specializes in blockchain innovation, securing and protecting AI, trustworthy AI and how to detect fake content and goods using a variety of technologies and methods. She chairs Gartner's blockchain research community of analysts and also helps manage the company’s research for application leaders.


About the Author

Nick Holland

Nick Holland

Director, Banking and Payments

Holland, an experienced security analyst, has spent the last decade focusing on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times. He holds an MSc degree in information systems management from the University of Stirling, Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.