The plan, mentioned in a new 76-page wish list by the Department of Defense’s Joint Special Operations Command, or JSOC, outlines advanced technologies desired for country’s most elite, clandestine military efforts. “Special Operations Forces (SOF) are interested in technologies that can generate convincing online personas for use on social media platforms, social networking sites, and other online content,” the entry reads.

The document specifies that JSOC wants the ability to create online user profiles that “appear to be a unique individual that is recognizable as human but does not exist in the real world,” with each featuring “multiple expressions” and “Government Identification quality photos.”

In addition to still images of faked people, the document notes that “the solution should include facial & background imagery, facial & background video, and audio layers,” and JSOC hopes to be able to generate “selfie video” from these fabricated humans. These videos will feature more than fake people: Each deepfake selfie will come with a matching faked background, “to create a virtual environment undetectable by social media algorithms.”

  • davel [he/him]@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    1 month ago

    Yeah, I work in this industry, in the US. I’m familiar with the specific attacks you mentioned. I’ve been paid to lose sleep over these things. I’ve worked extra hours dealing with DDOS attacks and suspected intrusions and zero-day fire drills. I know.

    But this isn’t unique to the US. It’s basically the same everywhere. And the US isn’t uniquely “behind.” Everyone’s behind. If the US is unique at all, it’s that we happen to own & run more internet services than anyone else.

    • Warl0k3@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      1 month ago

      I’m familiar with the specific attacks you mentioned

      (I made “false landings” up.)

      No, it’s not unique to the US. But we’re by far the most dependent on technology out of any country and knowing this we talk a big game and do nothing to back said game up. The frequency with which [any agency you care to name] fails information security audits is pretty much just one long interrupted string of failures, and having worked with many western non-US governmental groups, the difference in security culture is pretty shameful.