APromptRiskDBThreat intelligence atlas
AI Risk

Privacy and consent

"Even when a victim of targeted, AIgenerated harms successfully identifies a deepfake creator with malicious intent, they may still struggle to redress many harms because the generated image or video isn’t the victim, but instead a composite image or video using aspects of multiple sources to create a believable, yet fictional, scene. At their core, these AI-generated images and videos circumvent traditional notio...

AI Risk4. Malicious Actors & Misuse4.3 > Fraud, scams, and targeted manipulation2 - Post-deployment

Record summary

A quick snapshot of what this page covers.

Techniques7Attack methods connected to this risk.
Mitigations11Defenses that may help with related attacks.
Domain4. Malicious Actors & MisuseThe broad risk area this belongs to.

Risk profile

How this risk is described and categorized.

"Even when a victim of targeted, AIgenerated harms successfully identifies a deepfake creator with malicious intent, they may still struggle to redress many harms because the generated image or video isn’t the victim, but instead a composite image or video using aspects of multiple sources to create a believable, yet fictional, scene. At their core, these AI-generated images and videos circumvent traditional notions of privacy and consent: because they rely on public images and videos, like those posted on social media websites, they often don’t rely on any private information."

Domain4. Malicious Actors & Misuse
Subdomain4.3 > Fraud, scams, and targeted manipulation
Entity1 - Human
Intent1 - Intentional
Timing2 - Post-deployment
CategoryHarassment, Impersonation, and Extortion
SubcategoryPrivacy and consent

Suggested mitigations

Defenses that may help with related attacks.

Use Multi-Modal Sensors

Business and Data UnderstandingData Preparation+1 more
LifecycleBusiness and Data Understanding + 2 moreCategoryTechnical - Cyber

Deepfake Detection

DeploymentMonitoring and Maintenance+2 more
LifecycleDeployment + 3 moreCategoryTechnical - ML

User Training

Business and Data UnderstandingData Preparation+4 more
LifecycleBusiness and Data Understanding + 5 moreCategoryPolicy

Sanitize Training Data

Business and Data UnderstandingData Preparation+1 more
LifecycleBusiness and Data Understanding + 2 moreCategoryTechnical - ML

Verify AI Artifacts

Business and Data UnderstandingData Preparation+1 more
LifecycleBusiness and Data Understanding + 2 moreCategoryTechnical - Cyber

Validate AI Model

ML Model EvaluationMonitoring and Maintenance
LifecycleML Model Evaluation + 1 moreCategoryTechnical - ML

Code Signing

Deployment
LifecycleDeploymentCategoryTechnical - Cyber

Source

Research source for this risk, when available.