Back to the MIT repository
4. Malicious Actors & Misuse2 - Post-deployment

Deception - Synthetic identities

GenAI can produce images of people that look very real, as if they could be seen on platforms like Facebook, Twitter, or Tinder. Although these individuals do not exist in reality, these synthetic identities are already being used in malicious activities (see Table 1D).

Source: MIT AI Risk Repositorymit708

ENTITY

1 - Human

INTENT

1 - Intentional

TIMING

2 - Post-deployment

Risk ID

mit708

Domain lineage

4. Malicious Actors & Misuse

223 mapped risks

4.3 > Fraud, scams, and targeted manipulation

Mitigation strategy

1. Implement advanced, multi-layered identity verification protocols that incorporate real-time biometric liveness detection and deepfake analysis to nullify the efficacy of GenAI-created synthetic media during onboarding. 2. Deploy adaptive machine learning models and behavioral analytics for continuous monitoring to detect subtle anomalies, irregular patterns, and cross-channel linkages characteristic of synthetic identity cultivation and eventual "bust-out" fraud. 3. Establish secure, cross-organizational threat intelligence sharing to rapidly disseminate data on emerging synthetic identity creation methodologies and associated device or personally identifiable information signals.