{"id":26572,"date":"2023-06-26T12:46:01","date_gmt":"2023-06-26T20:46:01","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=26572"},"modified":"2023-06-29T12:51:50","modified_gmt":"2023-06-29T20:51:50","slug":"celebrity-deepfake-identity-theft","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/","title":{"rendered":"How the Tools Used for Celebrity Deepfakes Can Steal Your Identity, Too"},"content":{"rendered":"\n<p>There\u2019s a longstanding piece of advice that says: \u201cYou can\u2019t believe anything you hear, and only half of what you see.\u201d&nbsp; There\u2019s always been an element of truth to that, even in the days before modern high-powered computing.&nbsp; Now, with the rise of digital media, it has become startlingly \u2014 and worryingly \u2014 easy to falsify audio and video.&nbsp;<\/p>\n\n\n\n<p>\u201cDeepfake\u201d is the popular term for a realistic re-creation of someone\u2019s face or voice, usually (so far) a celebrity or politician.&nbsp; They\u2019ve mostly been created as viral videos or proofs of concept, but it\u2019s unlikely to stop there.&nbsp; Security professionals fear that criminals will take the same technology currently used to create a celebrity deepfake and turn it against ordinary people for identity theft purposes.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Deepfakes in the Commercial World<\/h2>\n\n\n\n<p>Even if you spend little time on social media, or the sketchy websites where fake videos have begun to proliferate, you\u2019ve probably seen deepfakes that were created by some of the world\u2019s leading digital-imaging specialists.&nbsp; One early example was this <a href=\"https:\/\/youtu.be\/4uZlwyVmrkw\">2014 chocolate ad<\/a>, which used <a href=\"https:\/\/vintagenewsdaily.com\/behind-the-scenes-from-the-making-of-2014-dove-chocolate-commercial-with-audrey-hepburn\/\">live models and digital trickery<\/a> to recreate the late Audrey Hepburn in all her youthful 1950s beauty.&nbsp;<\/p>\n\n\n\n<p>More recently the Star Wars movie \u201cRogue One\u201d used similar technology to bring back the late Peter Cushing, and to de-age the late Carrie Fisher, as it\u2019s set before the original 1977 film.&nbsp; Director Martin Scorcese also used digital de-aging in his film \u201cThe Irishman,\u201d allowing established stars such as Robert De Niro and Joe Pesci to play both younger and older versions of their characters.&nbsp;<\/p>\n\n\n\n<p>Fans didn\u2019t necessarily <em>like<\/em> the end result, due to the \u201cuncanny valley\u201d effect, which was just noticeable enough to be jarring in the context of a big-screen film in high resolution.&nbsp; One tech-savvy fan was miffed enough to take things into his own hands and <a href=\"https:\/\/www.creativebloq.com\/news\/the-irishman-deepfake\">went viral<\/a> when he proved that he could de-age De Niro better than Scorcese had.&nbsp; It\u2019s a bravura piece of fan art, but it also demonstrates exactly why deepfakes are keeping security professionals awake at night.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Deepfakes as a Service<\/h2>\n\n\n\n<p>It\u2019s commonplace to point out that today\u2019s smartwatch or fitness tracker contains a more powerful computer than the ones NASA used a generation ago to put astronauts on the moon.&nbsp; The processing power available to ordinary people with run-of-the-mill computers would have been unimaginable not so long ago, and software has kept pace.&nbsp; That\u2019s why deepfakes could become more prevalent than you might think.&nbsp;<\/p>\n\n\n\n<p>Deepfakes begin with a form of artificial intelligence (AI) called \u201cmachine learning.\u201d&nbsp; Programmers <a href=\"https:\/\/www.pandasecurity.com\/en\/mediacenter\/technology\/deepfake-fraud\/\">train their algorithms<\/a> to recognize realistic patterns of movement (like facial expressions) by watching hundreds of hours of video.&nbsp; With time and repetition the software evolves rules to re-create those patterns and applies them to images of a specific real person.&nbsp;<\/p>\n\n\n\n<p>It\u2019s a process that requires an investment of time and money, and it\u2019s faster on high-powered equipment, but \u2014 this is important \u2014 once that software model is created, it can be used on ordinary, less-powerful computers.&nbsp; Off-the-shelf software can do this and there\u2019s a niche within the criminal underworld that creates these models for resale to enterprising but less sophisticated scammers.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where Is Deepfake Technology Headed?<\/h2>\n\n\n\n<p>What does that mean for you?&nbsp; In practical terms, it means that if there are photos of you available anywhere online \u2014 your social media accounts, your company\u2019s website, the cloud backups of all your friends\u2019 and family\u2019s photos \u2014 they can be scraped or hacked and used to create images or video that are every bit as believable as the celebrity deepfakes created by TV satirists and YouTube hobbyists.&nbsp;<\/p>\n\n\n\n<p>One sadly predictable outcome is that pornographic deepfakes have become <a href=\"https:\/\/www.technologyreview.com\/2021\/02\/12\/1018222\/deepfake-revenge-porn-coming-ban\/\">a hazard of online life<\/a> for many women.&nbsp; Women in public life, like high-profile politician <a href=\"https:\/\/www.thelily.com\/a-fake-nude-photo-was-supposed-to-silence-alexandria-ocasio-cortez-she-turned-up-the-volume-instead\/\">Alexandria Ocasio-Cortez<\/a>, are especially popular targets, but it can happen to anyone, often in the form of \u201crevenge porn\u201d created by bitter exes.&nbsp;<\/p>\n\n\n\n<p>There are less obvious ways that this technology can be used to disrupt your life.&nbsp; Suppose you\u2019re locked in a custody battle, and a deepfake falsely portrays you engaging in illegal activity or in verbal abuse of your kids?&nbsp; Similarly, an unscrupulous business rival might concoct a video that damages your reputation, or a co-worker might use one to undercut you in the race for a big promotion.&nbsp; The possibilities are endless.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Deepfakes and Identity Theft<\/h2>\n\n\n\n<p>While politicians and celebrities tend to be the targets of having their images and voices impersonated (yes, <a href=\"https:\/\/www.wired.com\/story\/ai-makes-de-niro-perform-lines-flawless-german\/\">audio deepfakes are a thing<\/a> as well), deepfakes hold tremendous potential for conventional identity theft and fraud as well.&nbsp;<\/p>\n\n\n\n<p>The prospect has law enforcement and security specialists spooked.&nbsp; In 2020, for example, the Carnegie Endowment for International Peace <a href=\"https:\/\/carnegieendowment.org\/2020\/07\/08\/deepfakes-and-synthetic-media-in-financial-system-assessing-threat-scenarios-pub-82237\">released a research paper<\/a> detailing 10 ways deepfakes could be used to target everyone from individuals to entire financial markets.&nbsp; Believably faked voices or face-swapped videos can be used to impersonate C-suite executives or key employees, for example, in order to \u201capprove\u201d fraudulent payments and transfers or gain access to privileged information.&nbsp;<\/p>\n\n\n\n<p>The same technologies could be used to manipulate stocks, cause a run on a bank or even potentially crash the economy temporarily by causing a panic sell-off in the major markets.&nbsp; For most of us that sort of thing is \u201cabove our pay grade,\u201d but the technology is rapidly becoming cheap enough to be used against anyone.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Deepfakes and You<\/h2>\n\n\n\n<p>Suppose a friend or family member reached out to you in a video call and asked for an emergency loan.&nbsp; You\u2019d probably help out if you could, wouldn\u2019t you?&nbsp; Similarly, if you were in a Zoom meeting with your boss and she said you needed to click a link in the message she was sending you, you probably would, right?&nbsp;<\/p>\n\n\n\n<p>The phone numbers, emails and social media accounts we use to initiate that kind of contact can be hacked, and scammers already have ways to spoof <a href=\"https:\/\/www.spokeo.com\/compass\/what-is-email-spoofing-learn-how-to-protect-yourself\/\">an email address<\/a> or <a href=\"https:\/\/www.spokeo.com\/compass\/tracing-spoofed-phone-number\/\">phone number<\/a> if they can\u2019t get access to the real thing.&nbsp; A deepfaked \u201cyou\u201d could be used similarly to defraud your friends and family or the company you work for.&nbsp;<\/p>\n\n\n\n<p>The video doesn\u2019t need to be production quality or even especially good.&nbsp; We\u2019re not viewing it on a movie screen, after all, but on our devices in videoconferencing or video chat apps.&nbsp; The telltale signs that make faked videos easy to spot in high-res \u2014 lack of detail, video that\u2019s out of sync with the audio, blocky pixelation \u2014 are all things we\u2019ve learned to expect in chat.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Deepfakes and Next-Level Identity Theft<\/h2>\n\n\n\n<p>Your voice or image could also be used to bring an existing threat, <a href=\"https:\/\/www.spokeo.com\/compass\/what-is-synthetic-identity-theft\/\">synthetic identity theft<\/a>, to a new level.&nbsp; With deepfakes, that fake persona can now look or sound like anyone on calls and video chat.&nbsp;<\/p>\n\n\n\n<p>It\u2019s a whole new frontier.&nbsp; Many common <a href=\"https:\/\/www.spokeo.com\/compass\/beware-these-7-new-social-media-scams\/\">social media scams<\/a> and <a href=\"https:\/\/www.spokeo.com\/compass\/beware-of-these-eharmony-scammers\/\">romance scams<\/a> start with a falsified account (a \u201csock puppet\u201d).&nbsp; Deepfake software makes them more convincing, giving scammers the ability to add videos to their social media timeline or (in the not too distant future) the ability to video chat with their targets in real time, with a believable voice and face that can\u2019t easily be traced.&nbsp;<\/p>\n\n\n\n<p>Another alarming aspect to all of this is that many companies, especially financial institutions, have begun turning to <a href=\"https:\/\/www.csoonline.com\/article\/3442397\/deepfakes-and-synthetic-identity-more-reasons-to-worry-about-identity-theft.html\">sophisticated biometric authentication<\/a> (facial recognition, voice recognition) to fight existing forms of fraud and identity theft.&nbsp; If scammers can create a realistic synthetic identity, they can use it to open fraudulent accounts. If they can realistically impersonate you, they can beat a facial-recognition or voice-recognition algorithm to take over <em>your<\/em> account.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What You Can Do About Deepfakes<\/h2>\n\n\n\n<p>Meeting the threat of deepfakes is a major challenge, and most of it is out of your hands.&nbsp; A lot of the heavy work will need to be done by security professionals, financial institutions and government agencies (especially law enforcement).&nbsp; Ironically, the most powerful tool these authorities can wield against deepfaking criminals is artificial intelligence, the same tool used to create them.&nbsp; Fakes can fool the human eye or ear relatively easily, but AI is much harder to beat.<\/p>\n\n\n\n<p>That doesn\u2019t mean you have to make it easy for scammers. You could start by <a href=\"https:\/\/www.spokeo.com\/compass\/internet-safety-social-media-follower-audit\/\">auditing your social media<\/a> accounts periodically, to make sure your friends and followers are all people you know (or at a minimum, actual people).&nbsp; Set photo posts and video posts to <a href=\"https:\/\/www.spokeo.com\/compass\/internet-safety-what-you-need-to-know-about-public-vs-private-social-media-accounts\/\">\u201cprivate\u201d or \u201cfriends only,\u201d<\/a> wherever possible, to make it harder for scammers to gather up the raw materials for their fakery.&nbsp;<\/p>\n\n\n\n<p>Deepfakes are most dangerous when they\u2019re combined with existing forms of identity theft, and \u2014 because that\u2019s an established and well-known threat \u2014 there\u2019s a <em>lot<\/em> you can do about that.&nbsp; Some standard precautions include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Checking your account statements regularly for any irregularities.<\/li>\n\n\n\n<li>Requesting your credit report frequently from the \u201cBig Three\u201d reporting agencies.&nbsp; They\u2019ll each give you a free one every year, and additional reports aren\u2019t very expensive, so take advantage.&nbsp; Any unexplained change in your credit, or activity you didn\u2019t initiate, constitutes a big red flag.&nbsp;<\/li>\n\n\n\n<li>Never clicking a link in an unsolicited email or text message, and never downloading an attachment from an unknown source.&nbsp; Those are often <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\">phishing attacks<\/a>.<\/li>\n\n\n\n<li>Staying up to date on common scams, so you\u2019re less likely to fall for one.&nbsp; The FTC\u2019s consumer-facing <a href=\"https:\/\/www.consumer.ftc.gov\/features\/scam-alerts\">Avoiding and Reporting Scams<\/a> page is a great resource (and so is this humble blog).<\/li>\n\n\n\n<li>Checking your phone number, email addresses and passwords regularly to make sure they haven\u2019t been compromised in a data breach.&nbsp; The best consumer-facing resource for that is a site called <a href=\"https:\/\/haveibeenpwned.com\/\">Have I Been Pwned?<\/a><\/li>\n\n\n\n<li>Using strong passwords and not using the same password across multiple sites.&nbsp; Use a <a href=\"https:\/\/www.spokeo.com\/compass\/best-ways-to-store-passwords\/\">password manager<\/a> if remembering your passwords is a struggle.&nbsp;<\/li>\n\n\n\n<li>Signing up for <a href=\"https:\/\/www.spokeo.com\/identity-theft-protection\">Spokeo Protect<\/a>, our identity protection service.&nbsp; If your key pieces of personal information are offered up for sale on the sketchy marketplaces of <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-find-out-if-your-information-is-on-the-dark-web-and-what-to-do\/\">the dark web<\/a>, we\u2019ll let you know.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>&#8230;or to wrap up all of that in one simple sentence, knowing <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-check-for-identity-theft\/\">how to check for identity theft<\/a> and doing it regularly.&nbsp;<\/p>\n\n\n\n<p>You can think of deepfakes (and identity theft in general) as being like forest fires:&nbsp; Preventing them entirely is hard, but taking away the fuel they rely on can minimize the risk.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">References:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>YouTube &#8211; <a href=\"https:\/\/youtu.be\/4uZlwyVmrkw\">CGI Audrey Hepburn for a Dove Chocolate Commercial<\/a><\/li>\n\n\n\n<li>Vintage News Daily &#8211; <a href=\"https:\/\/vintagenewsdaily.com\/behind-the-scenes-from-the-making-of-2014-dove-chocolate-commercial-with-audrey-hepburn\/\">Behind the Scenes From the Making of 2014 Dove Chocolate Commercial With Audrey Hepburn<\/a><\/li>\n\n\n\n<li>IMDB &#8211; <a href=\"https:\/\/www.imdb.com\/title\/tt3748528\/\">Rogue One:&nbsp; A Star Wars Story<\/a><\/li>\n\n\n\n<li>IMDB &#8211; <a href=\"https:\/\/www.imdb.com\/title\/tt1302006\/?ref_=fn_al_tt_1\">The Irishman<\/a><\/li>\n\n\n\n<li>Creative Bloq &#8211; <a href=\"https:\/\/www.creativebloq.com\/news\/the-irishman-deepfake\">Spectacular \u201cThe Irishman\u201d Deepfake Blows Away the Original<\/a><\/li>\n\n\n\n<li>Panda Security &#8211; <a href=\"https:\/\/www.pandasecurity.com\/en\/mediacenter\/technology\/deepfake-fraud\/\">Deepfake Fraud:&nbsp; Security Threats Behind Artificial Faces<\/a><\/li>\n\n\n\n<li>MIT Technology Review &#8211; <a href=\"https:\/\/www.technologyreview.com\/2021\/02\/12\/1018222\/deepfake-revenge-porn-coming-ban\/\">Deepfake Porn Is Ruining Womens\u2019 Lives.&nbsp; Now the Law May Finally Ban It.<\/a>&nbsp;<\/li>\n\n\n\n<li>The Lily &#8211; <a href=\"https:\/\/www.thelily.com\/a-fake-nude-photo-was-supposed-to-silence-alexandria-ocasio-cortez-she-turned-up-the-volume-instead\/\">A Fake Nude Photo Was Supposed To Silence Alexandria Ocasio-Cortez.&nbsp; She Turned Up the Volume Instead.<\/a><\/li>\n\n\n\n<li>Wired &#8211; <a href=\"https:\/\/www.wired.com\/story\/ai-makes-de-niro-perform-lines-flawless-german\/\">This AI Makes Robert De Niro Perform Lines in Perfect German<\/a><\/li>\n\n\n\n<li>Carnegie Endowment for International Peace &#8211; <a href=\"https:\/\/carnegieendowment.org\/2020\/07\/08\/deepfakes-and-synthetic-media-in-financial-system-assessing-threat-scenarios-pub-82237\">Deepfakes and Synthetic Media in the Financial System:&nbsp; Assessing Threat Scenarios<\/a><\/li>\n\n\n\n<li>CSO Online &#8211; <a href=\"https:\/\/www.csoonline.com\/article\/3442397\/deepfakes-and-synthetic-identity-more-reasons-to-worry-about-identity-theft.html\">Deepfakes and Synthetic Identity:&nbsp; More Reasons To Worry About Identity Theft<\/a><\/li>\n\n\n\n<li>U.S. Federal Trade Commission &#8211; <a href=\"https:\/\/www.consumer.ftc.gov\/features\/scam-alerts\">Avoiding and Reporting Scams<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s a longstanding piece of advice that says: \u201cYou can\u2019t believe anything you hear, and only half of what you see.\u201d&nbsp; There\u2019s always been an element of truth to that,&hellip;<\/p>\n","protected":false},"author":112,"featured_media":26573,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[614],"tags":[],"class_list":["post-26572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Forget the Celebrity Deepfake, You\u2019re at Risk As Well | Spokeo<\/title>\n<meta name=\"description\" content=\"If you\u2019ve ever seen a celebrity deepfake or watched a movie with digitally de-aged characters, you know that technology can now imitate people pretty well. Learn why that\u2019s the new frontier in identity theft and why it may soon (or already) be a threat to you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forget the Celebrity Deepfake, You\u2019re at Risk As Well | Spokeo\" \/>\n<meta property=\"og:description\" content=\"If you\u2019ve ever seen a celebrity deepfake or watched a movie with digitally de-aged characters, you know that technology can now imitate people pretty well. Learn why that\u2019s the new frontier in identity theft and why it may soon (or already) be a threat to you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-26T20:46:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-29T20:51:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spokeo.com\/compass\/image\/IDPCanaScammerMakeaCelebrity-StyleDeepfakeOfYou_1170x585.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/\",\"name\":\"Forget the Celebrity Deepfake, You\u2019re at Risk As Well | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPCanaScammerMakeaCelebrity-StyleDeepfakeOfYou_1170x585.jpg?fit=1170%2C585&ssl=1\",\"datePublished\":\"2023-06-26T20:46:01+00:00\",\"dateModified\":\"2023-06-29T20:51:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"description\":\"If you\u2019ve ever seen a celebrity deepfake or watched a movie with digitally de-aged characters, you know that technology can now imitate people pretty well. Learn why that\u2019s the new frontier in identity theft and why it may soon (or already) be a threat to you.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPCanaScammerMakeaCelebrity-StyleDeepfakeOfYou_1170x585.jpg?fit=1170%2C585&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPCanaScammerMakeaCelebrity-StyleDeepfakeOfYou_1170x585.jpg?fit=1170%2C585&ssl=1\",\"width\":1170,\"height\":585},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forget the Celebrity Deepfake, You\u2019re at Risk As Well | Spokeo","description":"If you\u2019ve ever seen a celebrity deepfake or watched a movie with digitally de-aged characters, you know that technology can now imitate people pretty well. Learn why that\u2019s the new frontier in identity theft and why it may soon (or already) be a threat to you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/","og_locale":"en_US","og_type":"article","og_title":"Forget the Celebrity Deepfake, You\u2019re at Risk As Well | Spokeo","og_description":"If you\u2019ve ever seen a celebrity deepfake or watched a movie with digitally de-aged characters, you know that technology can now imitate people pretty well. Learn why that\u2019s the new frontier in identity theft and why it may soon (or already) be a threat to you.","og_url":"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2023-06-26T20:46:01+00:00","article_modified_time":"2023-06-29T20:51:50+00:00","og_image":[{"width":1170,"height":585,"url":"https:\/\/www.spokeo.com\/compass\/image\/IDPCanaScammerMakeaCelebrity-StyleDeepfakeOfYou_1170x585.jpg","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/","url":"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/","name":"Forget the Celebrity Deepfake, You\u2019re at Risk As Well | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPCanaScammerMakeaCelebrity-StyleDeepfakeOfYou_1170x585.jpg?fit=1170%2C585&ssl=1","datePublished":"2023-06-26T20:46:01+00:00","dateModified":"2023-06-29T20:51:50+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"description":"If you\u2019ve ever seen a celebrity deepfake or watched a movie with digitally de-aged characters, you know that technology can now imitate people pretty well. Learn why that\u2019s the new frontier in identity theft and why it may soon (or already) be a threat to you.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/celebrity-deepfake-identity-theft\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPCanaScammerMakeaCelebrity-StyleDeepfakeOfYou_1170x585.jpg?fit=1170%2C585&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPCanaScammerMakeaCelebrity-StyleDeepfakeOfYou_1170x585.jpg?fit=1170%2C585&ssl=1","width":1170,"height":585},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPCanaScammerMakeaCelebrity-StyleDeepfakeOfYou_1170x585.jpg?fit=1170%2C585&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-6UA","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/26572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=26572"}],"version-history":[{"count":1,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/26572\/revisions"}],"predecessor-version":[{"id":26574,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/26572\/revisions\/26574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/26573"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=26572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=26572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=26572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}