Thomas Roccia :verified:<p>🎁 GenAI x Sec Advent #10</p><p>Sora, the video generator, has just been released, so I think this is a good opportunity to discuss about influence operations through the usage of Generative AI!</p><p>☠️ We’ve already seen threat actors leveraging GenAI for misinformation that fuels disinformation campaigns, erodes trust, and amplifies societal divides. Some recent examples such as Russian Threat Actor Storm-1679 spreading misinformation powered by GenAI during the Olympic Games in Paris (<a href="https://blogs.microsoft.com/on-the-issues/2024/06/02/russia-cyber-bots-disinformation-2024-paris-olympics/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.microsoft.com/on-the-iss</span><span class="invisible">ues/2024/06/02/russia-cyber-bots-disinformation-2024-paris-olympics/</span></a>) or the Iranian Threat Actor Storm-2035 influencing the US election using AI-enabled services to plagiarize content (<a href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cdn-dynmedia-1.microsoft.com/i</span><span class="invisible">s/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf</span></a>).</p><p>In the paper "Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data", ten distinct tactics have been identified: 👇</p><p>1️⃣ Impersonation: Assume the identity of a real person to act on their behalf.<br>2️⃣ Appropriated Likeness: Use or alter a person's likeness or identifying features.<br>3️⃣ Sockpuppeting: Create synthetic online personas or accounts.<br>4️⃣ NCII: Generate non-consensual intimate imagery using someone's likeness.<br>5️⃣ CSAM: Create child sexually explicit material<br>6️⃣ Falsification: Fabricate or falsely represent evidence, reports, or documents.<br>7️⃣ IP Infringement: Use someone’s intellectual property without permission.<br>8️⃣ Counterfeit: Reproduce or imitate original work, brand, or style to pass as real.<br>9️⃣ Scaling & Amplification: Automate, amplify, or scale workflows.<br>🔟 Targeting: Refine outputs to craft highly tailored attacks.</p><p>These tactics are not new, but GenAI lowers the barriers, it makes them easier, faster, and more scalable than ever.</p><p>I think the implications are beyond democracy, freedom, and security. They challenge trust in information, fuel economic harm through scams and counterfeits, intensify social polarization, and even threaten psychological well-being.</p><p>What do you think? Are we facing another turning point where technology redefines trust and societal norms? 🤔</p><p>Also are we really running in a simulation? 😁 (The video has been generated with Sora) <a href="https://infosec.exchange/tags/Genai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Genai</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/influenceOperation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>influenceOperation</span></a></p>