Deep Fakes, Privacy, Protection & Misinformation

Deep Fakes, Privacy, Protection & Misinformation

Updated May 18, 2024

How Can We Protect Ourselves Against Deep Fakes?

That's what this brief article discusses. The short version is it requires a new legal identity architecture, laws/regulations and ability to enforce laws across different jurisdictions.

To see the results in a short story form, skim to the section titled, "Jane Defends Herself Against a Malicious Deep Fake Video" in “An Identity Day in the Life of Jane Doe”.

Now, for the long version...

Deep Fakes Are Rapidly Rising

Skim these to see but two examples:

National Security Risk - Speed of Evil Inc. Leveraging AI Systems Producing Digital Bots

The Evil Inc.'s of the planet will leverage AI to produce, in one jurisdiction on the planet, malicious digital bots at speeds of thousands per second. In the next second, they can be operating in all other jurisdictions on the planet. Worse, these bots can troll the internet for people, creating deep fake images, videos and misinformation.

It's something for which our old laws, regulations, and enforcement aren't even remotely prepared for i.e. we're sitting ducks. Thus, each of us requires a new legal identity toolkit.

Skim “National Security – Reduce Risk By Instantly Determining Entity Friend From Foe”.

Then Consider The Arrival Of AI Agents

Skim these articles to see what's rapidly coming at us:

It Starts From Birth With Us Being Able To Have Our Own Digital Signature

In the story above, Jane Doe is able to digitally sign images and videos of her. The new legal identity architecture gives each of us, from birth on, this ability. Yet, this is complicated. Why?

It Requires Legal Authorization

  • Jane Doe might have a young son, John Doe, who requires his mom to be able to digitally sign things on his behalf
  • Or, it could be Jane Doe's mom whom Jane has power of attorney over

All of this requires new legal toolkit allowing Jane to be legally authorized to do this, digitally and physically, which works locally and globally. The architecture gives Jane this ability from the new age CRVS (Civil Registration Vital Statistics) system. It cross-links Jane and John's registry entries in the database showing Jane is the legal guardian of John. Skim “Legal Identity Relationships”.

Yet, how can Jane be in control of this?

SOLICT (Source of Legal Identity & Credential Truth)

The SOLICT is a database each of us controls. The CRVS pushes out our legal identity information to our SOLICT leveraging a TODA capability file. To learn more about TODA skim this.

The SOLICT gives each of us control over our legal identity information. It allows each of us to prove who we are and to digitally sign things. Yet, how's Jane going to leverage this?

LSSI (Legal Self-Sovereign Identity) Devices

There are five different types of Legal Self-Sovereign Identity devices:

  • Physical smart card
  • Digital legal identity application
  • Physical wristband biometrically tied to each of us
  • Chip implanted into a person
  • Legal identity information written to the entity's chip/software code

Real life is messy:

  • There's lots of very poor people on the planet without access to tech
  • Infants or people who can't operate tech
  • People who still want to use physical ID type cards
  • People who might want to have a chip implanted into them
  • etc.

Thus, the architecture addresses this. Jane's SOLICT pushes out her legal identity information to her LSSI device. Jane can now use this, at her discretion, to prove her legal identity, digitally sign things, etc.

Yet, this on it's own isn't enough. Why? Speed. As described above, Evil Inc.'s AI systems can produce bots at awesome speeds per second, creating havoc in our lives. How can Jane defend herself against this?

PIAM (Personal Identity Access Management) System

Jane has an AI leveraged, personal IAM (Identity Access Management) system. It gives her the ability to preconfigure it. Thus, for any image or video taken of her, she will digitally sign them leveraging her PIAM/LSSI device.

Anyone wanting to use these, must obtain her consent. Jane's PIAM can instantly either refuse or, grant her consent. The consents are legal agreements, to new global standards, which are stored in Jane's SOLICT. So, now she has one place from cradle to grave, to refer to for any consents given.

Yet, this on its own isn't enough. Why?

Requires New Laws and Regulations

To protect Jane, jurisdictions will have to create new laws and regulations requiring Jane's consent for use of any image or video of her. Thus, Jane hypothetically has the law, backing her, protecting her from malicious use of things like deep fakes.

Yet, this on it's own isn't enough. Why?

Speed At Which Deep Fakes Occur

it can easily happen in seconds. Our old law enforcement isn't anywhere near ready for this. Thus, in the story above, the police and courts leverage AI to quickly verify Jane's claim she didn't give her consent and digitally sign the malicious deep fake video her ex-boyfriend produced.

Yet, this on it's own isn't enough. Why?

Requires Cross-Jurisdiction Enforcement

Here's the bottom line reality on enforcing a jurisdiction's laws and regulations against the Evil Inc.'s of the planet - TODAY IT'S PATHETIC. The current rate of success in prosecuting cybercrime is a pathetic, paltry 0.05%. Why? The Evil Inc.'s operate out of jurisdictions where they can't be prosecuted against.

So, all the above will come to naught protecting Jane if the laws and regulations aren't enforceable across jurisdictions. There isn't a magic bullet for this.

I've written that the way to move forward on this is likely via trade agreements between countries. They'd be changed stipulating agreement between jurisdictions to cross-prosecute cyber-crimes like deep fakes. The jurisdictions would have to change there laws and regulations agreeing to this.

Now, a practical, cynical person reading this might think to themselves the chances of this happening anytime soon are remote. Looking backwards judging the pace of international agreement, this makes good sense. Yet, I believe there's hope on the horizon. Why?

The Pace of Change

Look at this curve. It shows a logarithmic shaped tech change curve. It also shows the slowest rate of change is governments. EACH DAY NEW TECH IS BEING CREATED. It creates what I call in my head "Whopper sized change".

Thus, governments are going to be forced into rapid change structures. Which is why the legal identity architecture has a new, global, independent, well-funded, non-profit.

One of its jobs is to do 24x7x365 threat analysis for new attack vectors against the governance, business processes, tech and end users in legal identity. Thus, a very high threat must be responded to by governments, companies and people within hours. This brings industry best practices to the world of legal identity.

This type of thinking will be forced on jurisdictions in other areas like laws, regulations and enforcement. They're going to very quickly find out the old glacial change of jurisdictional and cross-jurisdictional management no longer works.

Companies & Enterprises Can Also Use Similar Tech to Defend Themselves

As part of a reformed corporate registration process, companies could be given one or more digital signatures to use. They can then use this to digitally sign things, just like Jane did. If misinformation, deep fakes, etc. are used against a company or government, hypothetically, the same process Jane used can be done at warp speed.

HOWEVER, this isn't a magical solution. Recall Solar Winds where the Evil Inc.'s gained access to digital signatures affecting 17,000 enterprises.

Readers might want to skim these two articles aimed at CISO's advising them on what to do today in the absence of a legal identity architecture:

Enterprise Architectures Addressing This

Skim:

Legal Identity Architectures Addressing The Above

Skim these docs:

To See My Message To Government & Industry Leaders

Budgetary Costs to Deploy a New Learning Architecture Leveraging a Rethought Legal Identity

Summary

We're entering a major paradigm shift where our old ways won't work well anymore. Thus, it requires out of the box thinking for our out of the box times. That's what the architectures deliver.

The new legal identity architecture, delivers the core new toolkit, which Jane Doe can use to protect herself and her family.

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT


要查看或添加评论,请登录

社区洞察

其他会员也浏览了