Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Imagine a scenario: It's already been a long week, but on Thursday night you receive an invite from your company's CFO asking for an early morning videoconference the next day. While this is an unexpected meeting, your company has been doing more and more meetings over video. On Friday morning you wake up and log on to the videoconference. You recognize everyone in attendance: your CFO and colleagues from your tax and accounts payable departments. The CFO instructs you to send several wires to pay vendor invoices arising from the company's recent retreat. While you find the request a bit strange, you comply because, after all, it is the CFO giving the instructions. You feel more comfortable because your tax colleague confirmed receipt of a W-9 for each vendor, and your accounts payable colleague provided the wire information. Several weeks later, you find out that the CFO never requested the video conference, neither of your colleagues have any recollection of attending such a meeting, and the wires you sent were never authorized.
While this may sound like an elaborate plot from a whodunit film, it is in fact based on a recent, real-life wire fraud scheme perpetrated by a cyber-criminal using "deepfakes" generated by artificial intelligence (AI) technology. In the real scenario, the victim — a financial employee in a multinational company — received an email from the CFO regarding a "secret business transaction." The victim then joined a video conference with the CFO and other corporate executives, who all looked and sounded legitimate. During the meeting the victim was instructed to wire $25.5 million to multiple accounts. About a week later, after calling the corporate office, the victim learned this was all a scam. By then, the $25.5 million were gone.
The video images and voices of the CFO and other executives in this scam were "deepfakes," or video/audio of an individual in which their face/body and voice have been digitally altered so that they look and sound like someone else. These efforts are sometimes referred to as "synthetic media" and are being increasingly used maliciously by cyber criminals to spread false information, engage in social engineering attacks or obtain unauthorized monetary transfers (often through wires or cryptocurrencies).
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.