news

don’t post these kinds of photos casually.

2024-09-13

한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina

with the rapid development of artificial intelligence technology, related applications are entering every aspect of our lives. however, this also brings new challenges to the protection of personal information.

a "portrait photo" or a close-up video of a person may become a new means and tool for criminals to commit crimes. for example, "ai face-changing" technology,all you need is a static photo of the target person to make the person in the photo move.

"it is originally a static picture that does not move. after the presenter makes some movements, the ai ​​face-changing software collects the dynamic features of the presenter's face and integrates the features into the static picture. the picture then moves according to the presenter's movements and can also form a video." zhang bo, a member of the artificial intelligence security governance professional committee of the china cyberspace security association, introduced.

zhang bo introduced that although ai face-changing and voice-changing technologies have certain technical barriers and operating costs, if they are obtained by criminals, they may be used to impersonate others and carry out related criminal activities. "the current ai face-changing technology is relatively mature and can support real-time face-changing during video calls, which can achieve a level of authenticity that is indistinguishable from the real thing. in addition to face-changing, combined with changing the background environment and voice, the realism will be higher and more difficult to distinguish."

forging indecent photos by "changing faces"

blackmail by criminals

once ai face-changing, voice-changing and other technologies are used by criminals, they will also become tools for extortion. such cases have occurred frequently in recent years.

not long ago, the shenzhen police cracked down on a criminal gang that collected victims' pictures and information from various channels including the internet, and then synthesized them for extortion.

it is reported that mr. wu, a shenzhen citizen, suddenly received a mms from an unknown mobile phone number. when he opened it, he found indecent photos of him and a strange woman in a hotel room.

"at that time, i received a color message with a nude photo of me. he threatened me that i had to contact him and transfer money before a certain time. i thought something was wrong, so i called the police," recalled mr. wu.

after receiving the report, the shenzhen police immediately investigated the clues provided by mr. wu.by combing through the police report records, the police found that mr. wu was not the only one who had suffered such an experience in shenzhen, and the criminal suspects' extortion methods were exactly the same.

as the investigation deepened, the police discovered that this was a criminal gang.there is a clear division of labor within the gang. some are responsible for photo editing, some are responsible for finding targets, and some are responsible for sending text messages and making phone calls for extortion.after obtaining a large number of clues, the shenzhen police launched a unified crackdown operation and successfully arrested more than 10 criminal suspects led by wang.

in the suspect’s computer, the police found a large number of indecent photos with synthetic faces changed.

at present, wang and others have been prosecuted by the procuratorate, and the case is under further trial.

expert:

accelerate the development and application of relevant countermeasure technologies

using advanced ai technology to create face-changing videos or simulated voices for illegal activities can indeed easily deceive people.this not only poses new challenges to personal privacy protection, but also highlights the importance of relevant laws and regulations and counter-measures.

it is understood that various acts of infringing personal information using ai face-changing technology are occurring from time to time, and are being abused in the gray area or even in the criminal field. cybersecurity experts suggest that the development and application of relevant countermeasure technologies should be accelerated.

expert introduction:artificial intelligence detection technology can be used to identify the authenticity of the video and whether it contains forged content. in addition, identity authentication and digital watermarking can be combined to increase the difficulty of forgery.from the management perspective,it is necessary to accelerate the formulation and implementation of relevant laws, regulations and regulatory measures to regulate the use and application scenarios of ai applications.

cybersecurity experts advise:the most critical reason for illegal activities such as ai face-changing is the leakage of personal privacy information.therefore, when we surf the internet in our daily lives, we should try to avoid excessive disclosure and sharing of personal biometric information such as faces and fingerprints.

if you receive a video of money transfer or remittance from "family" or "leader", you must carefully distinguish the authenticity."if necessary, you can ask the other party to quickly raise their head, nod, or turn their head to further determine whether there are any abnormal details in the video to confirm that the video is real."

alert!

don't post these kinds of photos casually.

in daily life, many people like to share delicious food and beautiful scenery on wechat moments and short videos, but if you are not careful, your personal information may be indirectly leaked. if it is obtained by someone with ulterior motives, it may endanger the property and even personal safety of yourself and your family.

so, which photos should we be careful with and never post online casually?

do not publish photos of you holding your id card or a blank piece of paper.

these photos contain sensitive information such as personal name, id number, address, etc. once leaked, criminals may use this information to steal identities, apply for credit cards, loans and other financial services, or even conduct illegal activities. in addition, photos of holding white paper or newspapers are often used to verify identity. if obtained by criminals, they may be used to make false documents or conduct online fraud, which will cause economic losses and reputation damage to individuals.

do not post photos of various receipts.

many people like to take photos of their train tickets or flight boarding passes when they are on business trips or traveling, and share them on their social media. these tickets not only contain information such as name, departure place, and destination, but also contain passengers' personal information in the barcode or qr code, which may be cracked and stolen by criminals.

don't post photos of your house keys, license plates, etc.

criminals use big data and other technical means to analyze the specific location of the publisher at a specific time through these photos, and also obtain the publisher's related living habits. therefore, the best way is to avoid having obvious items in the photos, such as house keys, license plate numbers, etc.

expert reminder:

protecting personal privacy is of vital importance.

be vigilant in your daily life!