Criminal Response to Crimes Stemming from the Use of Deepfake Technology
DOI:
https://doi.org/10.35246/9sjgyd13Keywords:
Deepfake, Publicity, Revenge Porn, Legal ConfrontationAbstract
Cybercrime is rapidly evolving as technology advances and reaches new dimensions in a way that blurs the lines between what is real and what is simulated. Deepfake technology has become part of cybercrime. Deepfake technology has similar features to CGI technology (Computer Generated Image) in the film industry, making it possible to create videos - images and audio using artificial intelligence arms in a way that is so realistic and difficult for humans to recognize it as fake. This poses serious risks, with potential consequences ranging from unfair electoral practices to the use of forged evidence in court. This technology first emerged in 2017 on a social media platform called Reddit. Although this technology has many legitimate uses, its illegitimate uses are more prominent, resulting in the infringement of legally protected interests. Therefore, the emergence of this technology calls for serious thinking about the serious violations of legally protected interests. Therefore, the criminal legislature must re-adapt the legal rules with a realistic-material meaning, in order to deal with an intangible virtual reality and attempt to criminalize the behaviors resulting from this technology. In addition, the legislature must pay attention to the policies of prevention and protection from crimes arising from deepfake.
Downloads
References
First: Book
I. Pantserev, K.A., The Malicious Use of AI-Based Deepfake Technology as the New Threat to Psychological Security and Political Stability. In: Jahankhani, H., Kendzierskyj, S., Chelvachandran, N., Ibarra, J. (eds) Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. Advanced Sciences and Technologies for Security Applications. Springer, Cham. (2020). ( last seen in 3-11-2024) https://doi.org/10.1007/978-3-030-35746-7_3
Second: Legal Research
I. Aarti Karandikar, Vedita Deshpande, Sanjana Singh, Sayali Nagbhidkar, Saurabh Agrawal,Deepfake Video Detection Using Convolutional Neural Network,International Journal of Advanced Trends in Computer Science and Engineering ,Volume 9 No.2, March -April 2020. https://doi.org/10.30534/ijatcse/2020/62922020
II. Ahmed Lotfy El-Sayed Marai, Implications of Artificial Intelligence Technologies on the Theory of Criminal Liability: A Comparative Study, Journal of Legal and Economic Research, Mansoura University - Faculty of Law, Issue 80, 2022, Pages 399-244.
III. Alaa El-Din Mansour Maghareya, Artificial Intelligence Crimes and Ways to Confront Them: Deep Forgery Crimes as a Model, International Journal of Law - Qatar University - Volume 13 - Regular Issue 2, 2024
IV. Ashraf Sayed Abu El-Ela, Criminal Confrontation of Deep Fake Technology, Journal of Legal and Economic Sciences, Issue 66, Issue 3, 2024, Pages 477-511, DOI: 10.21608/jelc.2024.342112.
V. Bobby Chesney Danielle Citron, Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security, California Law Review, Volume 107 , December (2019). in the link https://www.californialawreview.org/print/deep-fakes-a-looming-challenge-for-privacy-democracy-and-national-security
VI. Chahal, Prabhjot & Singh, Amritpal & Singh, Palwinder.). Digital Watermarking Techniques. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. 11. 2903-2909. 10.24297/ijct.v11i8.3009. (2012).
VII. Chesney, Bobby, and Danielle Citron. “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security.” California Law Review 107, no. 6 (2019): 1753–1820. https://www.jstor.org/stable/26891938
VIII. Claire Langlais-Fontaine: Démêler le vrai du faux: étude de la capacité dudroit actuel à lutter contre les deepfakes, La Revue des droits de l’homme, N°18, 2020. On website https://journals.openedition.org/revdh/9747 last seen 3-10-2024
IX. Edvinas Meskys, Aidas Liaudanskas, Julija Kalpokiene, Paulius Jurcys, Regulating deep fakes: legal and ethical considerations, Journal of Intellectual Property Law & Practice, Volume 15, Issue 1, January 2020, Pages 24–31https://doi.org/10.1093/jiplp/jpz167
X. Europol, Facing reality? Law enforcement and the challenge of deepfakes, an observatory report from the Europol Innovation Lab, Publications Office of the European Union, Luxembourg.(2022).
XI. Fatih ARSLAN,Deepfake Technology: A Criminological Literature Review,The Sakarya Journal of Law (The SJL), v. 11 section. 1 .p 701-720.p 704. file:///C:/Users/QAA/Downloads/DOC-20240827-WA0002..pdfhttps://www.researchgate.net/publication/324988952_Digital_Watermarking_Techniques
XII. Ki Chan, C. C., Kumar, V., Delaney, S., & Gochoo, M. (2020). Combating Deepfakes: Multi-LSTM and Blockchain as Proof of Authenticity for Digital Media. In 2020 IEEE / ITU International Conference on Artificial Intelligence for Good, AI4G 2020 (pp. 55-62). Article 9311067 (2020 IEEE / ITU International Conference on Artificial Intelligence for Good, AI4G 2020). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/AI4G50087.2020.9311067
XIII. Mahmoud Salama Abdel Moneim El-Sherif, The Crime of Revenge Pornography Through Deep Forgery Technology and Criminal Liability for It, Journal of Law for Legal and Economic Research, Alexandria University, Volume 5, Issue 1, 2022, pp. 366-485. On the link, https://lalexu.journals.ekb.eg/article_266089.html . last seen in 27-10-2024.
XIV. Mariëtte van Huijstee , Pieter van Boheemen ,Djurre Das and etal., Tackling deepfakes in European policy, Panel for the Future of Science and Technology, European Parliamentary Research Service, Scientific Foresight Unit (STOA), PE 690.039 – July 2021.
XV. Matthew B. Kugler and Carly Pace, Deepfake Privacy: Attitudes and Regulation, 116 Nw. U. L. Rev. 611 (2021).
https://scholarlycommons.law.northwestern.edu/nulr/vol116/iss3/1
XVI. Meskys, Edvinas and Kalpokiene, Julija and Jurcys, Paul and Liaudanskas, Aidas, Regulating Deep Fakes: Legal and Ethical Considerations (December 2, 2019). Journal of Intellectual Property Law & Practice, Volume 15, Issue 1, January 2020, Pages 24–31., Available at SSRN: https://ssrn.com/abstract=3497144
XVII. Mohamed Chawki (2024) Navigating legal challenges of deepfakes in the American context: a call to action, Cogent Engineering, 11:1, 2320971, DOI: 10.1080/23311916.2024.2320971
XVIII. Sandeep Singh Mankoo. “DeepFakes- The Digital Threat in the Real World.” Gyan Management Journal 17/1 (2023), 71-77. https://doi.org/10.48165/gmj.2022.17.1.8
XIX. Sunkari, Venkateswarlu; Srinagesh, A. Journal of Electrical Systems; Paris Vol. 20, Iss. 5s, (2024): 10-18. P.10 in the link https://www.proquest.com/openview/a08b5fc48939be68905b2c66e2976f78/1?pq-origsite=gscholar&cbl=4433095
XX. Timothy Cha, Federal or State Statutes: Which is the Better Legislative Measure to Combat Deepfake Pornography? The Department of Engineering and Society, School of Engineering. University of Virginia,2022. on the link file:///C:/Users/SFM/Downloads/3_Cha_Timothy_2022_BS.pdf last seen 1-11-2024.
XXI. Vig, Shinu. "Regulating Deepfakes: An Indian perspective." Journal of Strategic Security 17, no. 3 (2024) : 70-93.DOI: https://doi.org/10.5038/1944-0472.17.3.2245 Available at: https://digitalcommons.usf.edu/jss/vol17/iss3/5
Third: Thesies
I. S. Bates, ‘“Stripped”: An Analysis of Revenge Porn Victims’ Lives after Victimization’, Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts/ SIMON FRASER UNIVERSITY. 2012. (available at: https://summit.sfu.ca/item/15668)
Forth: Articles
I. Abdullah bin Hussein Al-Asmari, Deep Forgery Technology and Artificial Intelligence, Ministry of the National Guard - Saudi Arabia, 5-25-2023, on the link https://kkmag.sang.gov.sa/Technicalarticles/Pages/%D8%AA%D9%82%D9%86%D9%8A%D8%A9-%D8%A7%D9%84%D8%AA%D8%B2%D9%8A%D9%8A%D9%81-%D8%A7%D9%84%D8%B9%D9%85%D9%8A%D9%82-%D9%88%D8%A7%D9%84%D8%B0%D9%83%D8%A7%D8%A1-%D8%A7%D9%84%D8%A7%D8%B5%D8%B7%D9%86%D8%A7%D8%B9%D9%8A.aspx
II. Adi Robertson, 3- Adobe and Twitter are designing a system for permanently attaching artists’ names to pictures ,The Verge. ,(2019-11-04) on lthe link https://www.theverge.com/2019/11/4/20948229/adobe-twitter-nyt-company-content-authenticity-initiative-attribution-misinformation-tool
III. Ambrose, T. UK’s enemies could use AI deepfakes to try to rig election, says James Cleverly. (2024, February 25). . The Guardian. https://www.theguardian.com/uk-news/2024/feb/25/uks-enemies-could-use-ai-deepfakes-to-try-to-rig-election-says-james-cleverly
IV. Anna Maria Collard, 4 ways to future-proof against deepfakes in 2024 and beyond, Centre for the Fourth Industrial Revolution, Feb 12, 2024 https://www.weforum.org/stories/2024/02/4-ways-to-future-proof-against-deepfakes-in-2024-and-beyond/ last seen 8-11-2024.
V. Durbin, R. J., & Graham, L., The DEFIANCE Act of 2024. https://www.durbin.senate.gov/imo/media/doc/defiance_act_of_2024.pdf
VI. EM Ellis, ‘People Can Put Your Face on Porn—and the Law Can't Help You’, (available at: https://www.wired.com/story/face-swap-porn-legal-limbo) .
VII. EM Ellis, ‘People Can Put Your Face on Porn—and the Law Can't Help You’, (available at: https://www.wired.com/story/face-swap-porn-legal-limbo).
VIII. Emily Hallas, How battleground states are targeting AI and ‘deepfakes’ in
IX. Europol , Facing reality? Law enforcement and the challenge of deepfakes, an observatory report from the Europol Innovation Lab, Publications Office of the European Union, Luxembourg.(2022).
X. Geller, E., & Vinocur, N. (2017, May 5). French presidential candidate confirms ‘massive’ hack days before election. Politico. https://www.politico.com/story/2017/05/05/emmanuel-macron-french-election-hack-cyber-238059
XI. Jason C. Chipman, Stephen W. Preston, First Federal Legislation on Deepfakes Signed Into Law, Wilmer Cutler Pickering Hale and Dorr LLP® DECEMBER 23, 2019. https://www.wilmerhale.com/insights/client-alerts/20191223-first-federal-legislation-on-deepfakes-signed-into-law
XII. Lewrence Norden,Niyti Narang,Laura J. States Take the Lead in Regulation AI in Elections Within Limits, Brennan Center For Justices, published in Augest 7,2024. Last seen 29-2024 on the link below https://www.brennancenter.org/our-work/research-reports/states-take-lead-regulating-ai-elections-within-limits
XIII. Matthew F. Ferraro, Deepfake Legislation: A Nationwide Survey, WilmerHale Client Alert, September 25, 2019. At 10-12 (discussing Calif. AB-602 and AB-730)
XIV. Oliver Lock , Artificial Intelligence Guidance on Lexis+,Produced in partnership with Oliver Lock of Farrer & Co,2024, https://www.lexisnexis.co.uk/legal/guidance/deepfakes last seen in 11-11-2024
XV. P Hayward, A Rahn, ‘Opening Pandora's Box: pleasure, consent and consequence in the production and circulation of celebrity sex videos’ (2015) 2(1) Porn Studies 49. https://doi.org/10.1080/23268743.2014.984951
XVI. Piper Hudspeth Blackburn, Piper Hudspeth Blackburn, CNNوWed July 31, 2024 https://edition.cnn.com/2024/07/31/politics/state-laws-election-ai-deepfakes/index.html.
XVII. RESEARCH PROJECT ,Misinformation and Misinformation and Deepfakes,on the website of university of Essex/Human Rights Big Data and Technology Law Enforcement. ( without name and date) last seen in 11-11-2024. https://www.essex.ac.uk/research-projects/human-rights-big-data-and-technology/misinformation-and-disinformation-and-deep-fakes
XVIII. Şeymanur Yönt, The Deepfake Menace: Legal Challenges in the Age of AI, TRT TRAINING AND RESEARCH DEPARTMENT ,March 2024,p6. Last seen in 5-10=2024 on file:///C:/Users/QAA/Downloads/The-Deepfake-Menace_v2.pdf
XIX. Terrence Matsuo, Deepfakes and Korean Society: Navigating Risks and Dilemmas,October 3, 2024
XX. Vincent, J. Watch Jordan Peele use AI to make Barack Obama deliver a PSA about fake news. (2018, April 17). The Verge. https://www.theverge.com/tldr/2018/4/17/17247334/ai-fake-news-video-barack-obama-jordan-peele-buzzfeed
XXI. Vítor Bernardo , Deepfake detection,EUROPEAN DATA PROTECTION SUPERVISOR, https://www.edps.europa.eu/data-protection/technology-monitoring/techsonar/deepfake-detection_en
XXII. Weatherbad, J. Trolls have flooded X with graphic Taylor Swift AI fakes. , January, 2024. The Verge. https://www.theverge.com/2024/1/25/24050334/x-twitter-taylor-swift-ai-fake-images-trending
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright and Licensing:
For all articles published in Journal of Legal Sciences, copyright is retained by the authors. Articles are licensed under an open access Creative Commons CC BY 4.0 license, meaning that anyone may download and read the paper for free. In addition, the article may be reused and quoted provided that the original published version is cited. These conditions allow for maximum use and exposure of the work.
Reproducing Published Material from other Publishers: It is absolutely essential that authors obtain permission to reproduce any published material (figures, schemes, tables or any extract of a text) which does not fall into the public domain, or for which they do not hold the copyright. Permission should be requested by the authors from the copyrightholder (usually the Publisher, please refer to the imprint of the individual publications to identify the copyrightholder).
Permission is required for: Your own works published by other Publishers and for which you did not retain copyright.
Substantial extracts from anyones' works or a series of works.
Use of Tables, Graphs, Charts, Schemes and Artworks if they are unaltered or slightly modified.
Photographs for which you do not hold copyright.
Permission is not required for: Reconstruction of your own table with data already published elsewhere. Please notice that in this case you must cite the source of the data in the form of either "Data from..." or "Adapted from...".
Reasonably short quotes are considered fair use and therefore do not require permission.
Graphs, Charts, Schemes and Artworks that are completely redrawn by the authors and significantly changed beyond recognition do not require permission.
Obtaining Permission
In order to avoid unnecessary delays in the publication process, you should start obtaining permissions as early as possible. If in any doubt about the copyright, apply for permission. Journal of Legal Sciences cannot publish material from other publications without permission.
The copyright holder may give you instructions on the form of acknowledgement to be followed; otherwise follow the style: "Reproduced with permission from [author], [book/journal title]; published by [publisher], [year].' at the end of the caption of the Table, Figure or Scheme.