Deception - Synthetic identities
GenAI can produce images of people that look very real, as if they could be seen on platforms like Facebook, Twitter, or Tinder. Although these individuals do not exist in reality, these synthetic identities are already being used in malicious activities (see Table 1D).
ENTITY
1 - Human
INTENT
1 - Intentional
TIMING
2 - Post-deployment
Risk ID
mit708
Domain lineage
4. Malicious Actors & Misuse
4.3 > Fraud, scams, and targeted manipulation
Mitigation strategy
1. Implement advanced, multi-layered identity verification protocols that incorporate real-time biometric liveness detection and deepfake analysis to nullify the efficacy of GenAI-created synthetic media during onboarding. 2. Deploy adaptive machine learning models and behavioral analytics for continuous monitoring to detect subtle anomalies, irregular patterns, and cross-channel linkages characteristic of synthetic identity cultivation and eventual "bust-out" fraud. 3. Establish secure, cross-organizational threat intelligence sharing to rapidly disseminate data on emerging synthetic identity creation methodologies and associated device or personally identifiable information signals.