Deepfakes, Artificial Intelligence, and Corporate Espionage

King & Spalding
Contact

This is the third alert in our series on the risks to corporations, including financial services firms, posed by “deepfakes”—a type of technology, powered by artificial intelligence and machine learning, that can be used to create increasingly realistic, but false, audio and video. As discussed in our previous alerts, “deepfakes” have already successfully provided cybercriminals with novel ways to commit corporate fraud, generating new challenges for corporate compliance programs. Criminal enterprises can also build on earlier schemes and use deep fakes to illegally manipulate public markets, highlighting the need for companies to consider such deepfake scenarios in crisis management planning. As deepfake technology becomes simultaneously more sophisticated and widely available, malign actors will be interested in using deepfakes to do much more than commit traditional cybercrimes: nation-states are also keen to leverage this technology to commit corporate espionage, affect competitors or the commercial ecosystem, or otherwise benefit their governments or domestic companies.

Over the past few years, there has been a landmark uptick in state-sponsored corporate espionage. Since 2015, the Office of the Director of National Intelligence has reported that the cost of Chinese intellectual property and trade secret theft alone reaches into the hundreds of billions per year. FBI Director Wray similarly noted earlier this year that the Bureau has over a 1,000 open cases of attempted theft of U.S. intellectual property, across a range of industries and spanning its offices around the country.

Foreign governments have used nearly every possible tactic to gain access and commit such economic espionage, ranging from classic human influence techniques to sophisticated digital attacks—and everything in between. Deepfakes are fast becoming another vector to enable access and commit a variety of malicious acts. Indeed, McAfee Labs earlier this month predicted that in 2020 less skilled actors would gain greater access to more effective deepfake technology. As we previously discussed, criminals have already used these techniques this year to successfully commit fraud. Press reports from earlier this year also suggest that foreign spies are beginning to use deepfakes to enable their espionage efforts through enhanced false social media personas.

Ultimately, foreign nation-states, criminals, and even business competitors, could use deep fakes against a corporate target in several ways, including to:

  • Steal money, commit financial fraud, or enable cyberattacks like ransomware;
  • Facilitate destructive malware attacks, particularly against industries in critical infrastructure, such as energy, defense contractors, or life sciences;
  • Steal PII or other sensitive data either for criminal or foreign intelligence purposes;
  • Gain access and steal crown jewel IP, sensitive technologies, and trade secrets;
  • Disrupt business operations, for either ideological or commercial reasons;
  • Assist in securing the support of key business constituencies, such as customer or supplier relationships;
  • Create false “evidence” to affect legal or regulatory proceedings;
  • Perpetrate disinformation campaigns targeting particular companies;
  • Manipulate market conditions;
  • Manufacture a damaging public relations crisis, such as tainted products.

It is only a matter of time until adversaries make more widespread use of deepfakes. In an industry forecast released this month, the credit-reporting company Experian identified deepfakes as a top data breach trend for 2020, predicting that they would be used to “disrupt the operations of large commercial enterprises, and potentially create geo-political confusion among nation states, in addition to disruption in financial markets.”

Against this dynamic threat landscape, corporations need to take a holistic, forward-leaning approach that accounts for AI-enabled attempts to target them with technologies like deepfakes. A successful strategy should, at a minimum, examine and update existing threat awareness capabilities, cybersecurity measures, training and compliance programs, tabletop exercises, crisis management planning, and resilience protocols.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© King & Spalding | Attorney Advertising

Written by:

King & Spalding
Contact
more
less

King & Spalding on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide