Record summary
A quick snapshot of what this page covers.
Techniques6Attack methods connected to this risk.
Mitigations3Defenses that may help with related attacks.
Domain4. Malicious Actors & MisuseThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain4. Malicious Actors & Misuse
Subdomain4.3 > Fraud, scams, and targeted manipulation
Entity3 - Other
Intent1 - Intentional
Timing2 - Post-deployment
CategoryPersonal Loss and Identity Theft
SubcategoryPropaganda - Digital impersonations
Suggested mitigations
Defenses that may help with related attacks.
Use Multi-Modal Sensors
Business and Data UnderstandingData Preparation+1 more
Deepfake Detection
DeploymentMonitoring and Maintenance+2 more
User Training
Business and Data UnderstandingData Preparation+4 more
Source
Research source for this risk, when available.
Included resource
GenAI against humanity: nefarious applications of generative artificial intelligence and large language models
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.