Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Are You For Real? Dealing with the Proliferation of Deepfakes

By Matt White
June 01, 2024

Imagine a scenario: It's already been a long week, but on Thursday night you receive an invite from your company's CFO asking for an early morning videoconference the next day. While this is an unexpected meeting, your company has been doing more and more meetings over video. On Friday morning you wake up and log on to the videoconference. You recognize everyone in attendance: your CFO and colleagues from your tax and accounts payable departments. The CFO instructs you to send several wires to pay vendor invoices arising from the company's recent retreat. While you find the request a bit strange, you comply because, after all, it is the CFO giving the instructions. You feel more comfortable because your tax colleague confirmed receipt of a W-9 for each vendor, and your accounts payable colleague provided the wire information. Several weeks later, you find out that the CFO never requested the video conference, neither of your colleagues have any recollection of attending such a meeting, and the wires you sent were never authorized.

While this may sound like an elaborate plot from a whodunit film, it is in fact based on a recent, real-life wire fraud scheme perpetrated by a cyber-criminal using "deepfakes" generated by artificial intelligence (AI) technology. In the real scenario, the victim — a financial employee in a multinational company — received an email from the CFO regarding a "secret business transaction." The victim then joined a video conference with the CFO and other corporate executives, who all looked and sounded legitimate. During the meeting the victim was instructed to wire $25.5 million to multiple accounts. About a week later, after calling the corporate office, the victim learned this was all a scam. By then, the $25.5 million were gone.

The video images and voices of the CFO and other executives in this scam were "deepfakes," or video/audio of an individual in which their face/body and voice have been digitally altered so that they look and sound like someone else. These efforts are sometimes referred to as "synthetic media" and are being increasingly used maliciously by cyber criminals to spread false information, engage in social engineering attacks or obtain unauthorized monetary transfers (often through wires or cryptocurrencies).

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

Fresh Filings Image

Notable recent court filings in entertainment law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.