Welcome to Stop Synthetic Filth! wiki - A wiki about discovering ways of stopping and minimizing the damage from synthetic human-like fakes (transcluded below) i.e digital look-alikes and digital sound-alikes that result from covert modeling i.e. thieving of the human appearance and of the naked human voice.
Biblical explanation - The books of Daniel and Revelation, wherein Daniel 7 and Revelation 13 we are warned of this age of industrial filth, is for those who believe in Jesus.
Since the early 00's it has become (nearly) impossible to determine in still or moving pictures what is an image of a human, imaged with a (movie) camera and what on the other hand is a simulation of an image of a human imaged with a simulation of a camera. When there is no camera and the target being imaged with a simulation looks deceptively like some real human, dead or living, it is a digital look-alike.
Now in the late 2010's the equivalent thing is happening to our voices i.e. they can be stolen to some extent with the 2016 prototypes like w:Adobe Inc.'s w:Adobe Voco and w:Google's w:DeepMind w:WaveNet and made to say anything. When it is not possible to determine with human testing or testing with technological means what is a recording of some living or dead person's real voice and what is a simulation it is a digital sound-alike. 2018 saw the publication of Google Research's sound-like-anyone machine (transcluded below) at the w:NeurIPS conference and by the end of 2019 Symantec research had learned of 3 cases where digital sound-alike technology had been used for crimes.
Therefore it is high time to act and to criminalize covert modeling of the naked human voice and synthesis from a covert voice model!
Covert modeling poses growing threats to
- The right to be the only one that looks like me (compromised by digital look-alikes)
- The right to be the only one able to make recordings that sound like me (compromised by digital sound-alikes)
And these developments have various severe effects on the right to privacy, provability by audio and video evidence and deniability.
- 1 Synthetic human-like fakes (transcluded)
- 1.1 Digital look-alikes
- 1.2 Digital sound-alikes
- 1.2.1 'Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis' 2018 by Google Research (external transclusion)
- 1.2.2 Example of a hypothetical 4-victim digital sound-alike attack
- 1.2.3 Examples of speech synthesis software not quite able to fool a human yet
- 1.2.4 Reporting on the sound-like-anyone-machines
- 1.2.5 Documented digital sound-alike attacks
- 1.3 Text synthesis
- 1.4 Countermeasures against synthetic human-like fakes
- 1.4.1 Organizations against synthetic human-like fakes
- 1.4.2 Events against synthetic human-like fakes
- 1.4.3 Studies against synthetic human-like fakes
- 1.4.4 Companies against synthetic human-like fakes
- 1.4.5 SSF! wiki proposed countermeasure to synthetic porn: Adequate Porn Watcher AI (transcluded)
- 1.4.6 Possible legal response: Outlawing digital sound-alikes (transcluded)
- 1.5 Timeline of synthetic human-like fakes
- 1.6 Media perhaps about synthetic human-like fakes
- 1.6.1 2020's media perhaps about synthetic human-like fakes
- 1.6.2 2010's media perhaps about synthetic human-like fakes
- 1.6.3 2000's media perhaps about synthetic human-like fakes
- 1.6.4 1990's media perhaps about synthetic human-like fakes
- 1.6.5 1980's media perhaps about synthetic human-like fakes
- 1.6.6 1st century media perhaps about synthetic human-like fakes
- 1.6.7 3rd century BC media perhaps about synthetic human-like fakes
- 1.6.8 6th century BC media perhaps about synthetic human-like fakes
- 1.7 Footnotes
- 1.8 1st seen in
- 1.9 References
- 2 How to protect yourself and others from covert modeling (transcluded)
- 2.1 Help in case of appearance theft
- 2.2 Protect your appearance from covert modeling
- 2.3 Protect your voice from covert modeling
- 2.4 Protect your mind from the products of covert modeling
- 2.5 Protect others from the products of covert modeling
- 2.6 How to protect the humankind from products of covert appearance modeling
- 2.7 How to protect our societies from covert modeling
- 2.8 References
Synthetic human-like fakes (transcluded)
Transcluded from Synthetic human-like fakes
When the camera does not exist, but the subject being imaged with a simulation of a (movie) camera deceives the watcher to believe it is some living or dead person it is a digital look-alike.
When it cannot be determined by human testing whether some fake voice is a synthetic fake of some person's voice, or is it an actual recording made of that person's actual real voice, it is a digital sound-alike.
Introduction to digital look-alikes
In the cinemas we have seen digital look-alikes for over 15 years. These digital look-alikes have "clothing" (a simulation of clothing is not clothing) or "superhero costumes" and "superbaddie costumes", and they don't need to care about the laws of physics, let alone laws of physiology. It is generally accepted that digital look-alikes made their public debut in the sequels of The Matrix i.e. w:The Matrix Reloaded and w:The Matrix Revolutions released in 2003. It can be considered almost certain, that it was not possible to make these before the year 1999, as the final piece of the puzzle to make a (still) digital look-alike that passes human testing, the reflectance capture over the human face, was made for the first time in 1999 at the w:University of Southern California and was presented to the crème de la crème of the computer graphics field in their annual gathering SIGGRAPH 2000.
The problems with digital look-alikes
Extremely unfortunately for the humankind, organized criminal leagues, that posses the weapons capability of making believable looking synthetic pornography, are producing on industrial production pipelines synthetic terror porn[footnote 1] by animating digital look-alikes and distributing it in the murky Internet in exchange for money stacks that are getting thinner and thinner as time goes by.
These industrially produced pornographic delusions are causing great humane suffering, especially in their direct victims, but they are also tearing our communities and societies apart, sowing blind rage, perceptions of deepening chaos, feelings of powerlessness and provoke violence. This hate illustration increases and strengthens hate thinking, hate speech, hate crimes and tears our fragile social constructions apart and with time perverts humankind's view of humankind into an almost unrecognizable shape, unless we interfere with resolve.
For these reasons the bannable raw materials i.e. covert models, needed to produce this disinformation terror on the information-industrial production pipelines, should be prohibited by law in order to protect humans from arbitrary abuse by criminal parties.
List of possible naked digital look-alike attacks
- The classic "portrayal of as if in involuntary sex"-attack. (Digital look-alike "cries")
- "Sexual preference alteration"-attack. (Digital look-alike "smiles")
- "Cutting / beating"-attack (Constructs a deceptive history for genuine scars)
- "Mutilation"-attack (Digital look-alike "dies")
- "Unconscious and injected"-attack (Digital look-alike gets "disease")
Living people can defend[footnote 2] themselves against digital sound-alike by denying the things the digital sound-alike says if they are presented to the target, but dead people cannot. Digital sound-alikes offer criminals new disinformation attack vectors and wreak havoc on provability.
'Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis' 2018 by Google Research (external transclusion)
- In the 2018 at the Conference on Neural Information Processing Systems (NeurIPS) the work 'Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis' (at arXiv.org) was presented. The pre-trained model is able to steal voices from a sample of only 5 seconds with almost convincing results
The Iframe below is transcluded from 'Audio samples from "Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis"' at google.gituhub.io, the audio samples of a sound-like-anyone machine presented as at the 2018 w:NeurIPS conference by Google researchers.
Observe how good the "VCTK p240" system is at deceiving to think that it is a person that is doing the talking.
Example of a hypothetical 4-victim digital sound-alike attack
A very simple example of a digital sound-alike attack is as follows:
Someone puts a digital sound-alike to call somebody's voicemail from an unknown number and to speak for example illegal threats. In this example there are at least two victims:
- Victim #1 - The person whose voice has been stolen into a covert model and a digital sound-alike made from it to frame them for crimes
- Victim #2 - The person to whom the illegal threat is presented in a recorded form by a digital sound-alike that deceptively sounds like victim #1
- Victim #3 - It could also be viewed that victim #3 is our law enforcement systems as they are put to chase after and interrogate the innocent victim #1
- Victim #4 - Our judiciary which prosecutes and possibly convicts the innocent victim #1.
Thus it is high time to act and to criminalize the covert modeling of human appearance and voice!
Examples of speech synthesis software not quite able to fool a human yet
Some other contenders to create digital sound-alikes are though, as of 2019, their speech synthesis in most use scenarios does not yet fool a human because the results contain tell tale signs that give it away as a speech synthesizer.
- Lyrebird.ai (listen)
- CandyVoice.com (test with your choice of text)
- Merlin, a w:neural network based speech synthesis system by the Centre for Speech Technology Research at the w:University of Edinburgh
- 'Neural Voice Cloning with a Few Samples at papers.nips.cc, w:Baidu Research'es shot at sound-like-anyone-machine did not convince in 2018
Reporting on the sound-like-anyone-machines
- "Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?" May 2019 reporting at forbes.com on w:Baidu Research'es attempt at the sound-like-anyone-machine demonstrated at the 2018 w:NeurIPS conference.
Documented digital sound-alike attacks
- Sound like anyone technology found its way to the hands of criminals as in 2019 Symantec researchers knew of 3 cases where technology has been used for crime
- "Fake voices 'help cyber-crooks steal cash'" at bbc.com July 2019 reporting 
- "An artificial-intelligence first: Voice-mimicking software reportedly used in a major theft" at washingtonpost.com documents a w:fraud committed with digital sound-like-anyone-machine, July 2019 reporting.
The below video 'This AI Clones Your Voice After Listening for 5 Seconds' by '2 minute papers' describes the voice thieving machine presented by Google Research in NeurIPS 2018.
w:Chatbots have existed for a longer time, but only now armed with AI they are becoming more deceiving.
Reporting / announcements
- 'OpenAI’s latest AI text generator GPT-3 amazes early adopters' at siliconangle.com July 2020 reporting on GPT-3
- OpenAI releases the full version of GPT-2 at openai.com in August 2019
- 'OpenAI releases curtailed version of GPT-2 language model' at venturebeat.com, August 2019 reporting on the original release of of the curtailed version of GPT-2
- "Detection of Fake and False News (Text Analysis): Approaches and CNN as Deep Learning Model" at analyticsteps.com, a 2019 summmary written by Shubham Panth.
Countermeasures against synthetic human-like fakes
Organizations against synthetic human-like fakes
- w:DARPA DARPA program: 'Media Forensics (MediFor)' at darpa.mil aims to develop technologies for the automated assessment of the integrity of an image or video and integrating these in an end-to-end media forensics platform. Archive.org first crawled their homepage in June 2016.
- DARPA DARPA program: 'Semantic Forensics (SemaFor) at darpa.mil aims to counter synthetic disinformation by developing systems for detecting semantic inconsistencies in forged media. They state that they hope to create technologies that "will help identify, deter, and understand adversary disinformation campaigns". More information at w:Duke University's Research Funding database: Semantic Forensics (SemaFor) at researchfunding.duke.edu and some at Semantic Forensics grant opportunity (closed Nov 2019) at grants.gov. Archive.org first cralwed their website in November 2019
- w:University of Colorado Denver is the home of the National Center for Media Forensics at artsandmedia.ucdenver.edu at the w:University of Colorado Denver offers a Master's degree program, training courses and scientific basic and applied research. Faculty staff at the NCMF
- w:SAG-AFTRA SAG-AFTRA ACTION ALERT: "Support California Bill to End Deepfake Porn" at sagaftra.org endorses California Senate Bill SB 564 introduced to the California State Senate by California Senator Connie Leyva in Feb 2019.
Events against synthetic human-like fakes
- 2020 | CVPR | 2020 Conference on Computer Vision and Pattern Recognition: 'Workshop on Media Forensics' at sites.google.com, a June 2020 workshop at the w:Conference on Computer Vision and Pattern Recognition.
- 2019 | NeurIPS | Facebook, Inc. "Facebook AI Launches Its Deepfake Detection Challenge" at spectrum.ieee.org
- 2019 | CVPR | 2019 CVPR: 'Workshop on Media Forensics'
- Annual (?) | w:National Institute of Standards and Technology (NIST) | NIST: 'Media Forensics Challenge' at nist.gov, an iterative research challenge by the w:National Institute of Standards and Technology with the ongoing challenge being the 2nd one in action. the evaluation criteria for the 2019 iteration are being formed
- 2018 | ECCV ECCV 2018: 'Workshop on Objectionable Content and Misinformation' at sites.google.com, a workshop at the 2018 w:European Conference on Computer Vision
Studies against synthetic human-like fakes
- 'Media Forensics and DeepFakes: an overview' at arXiv.org (as .pdf at arXiv.org), a 2020 review on the subject of digital look-alikes and media forensics
- 'DEEPFAKES: False pornography is here and the law cannot protect you' at scholarship.law.duke.edu by Douglas Harris, published in Duke Law & Technology Review - Volume 17 on 2019-01-05 by Duke University School of Law
Search for more
Companies against synthetic human-like fakes
- Cyabra.com is an AI-based system that helps organizations be on the guard against disinformation attacks[1st seen in 1]. Reuters.com reporting from July 2020.
SSF! wiki proposed countermeasure to synthetic porn: Adequate Porn Watcher AI (transcluded)
Transcluded from Adequate Porn Watcher AI
Adequate Porn Watcher AI (APW_AI) is a working title for an w:AI to watch and model all porn ever found on the Internet to police porn for contraband and especially to protect humans by exposing digital look-alike attacks.
The purpose of the APW_AI is providing safety and security to its users, who can briefly upload a model they've gotten of themselves and then the APW_AI will either say nothing matching found or it will be of the opinion that something matching found.
If people are able to check whether there is synthetic porn that looks like themselves, this causes synthetic hate-illustration industrialists' product lose destructive potential and the attacks that happen are less destructive as they are exposed by the APW_AI and thus decimate the monetary value of these disinformation weapons to the criminals.
Looking up if matches are found for anyone else's model is forbidden and this should probably be enforced with a facial biometric app that checks that the model you want checked is yours and that you are awake.
If you feel comfortable to leave your model with the good people at the benefactor for safekeeping you get alerted and help if you ever get attacked with a synthetic porn attack.
People who openly do porn can help by opting-in to help in the development by providing training material and material to test the AI on. People and companies who help in training the AI naturally get credited for their help.
An adequate implementation should be nearly free of false positives, very good at finding true positives and able to process more porn than is ever uploaded.
There are of course lots of people-questions to this and those questions need to be identified by professionals of psychology and social sciences.
Possible legal response: Outlawing digital sound-alikes (transcluded)
Transcluded from Juho's proposal on banning digital sound-alikes
§1 Covert modeling of a human voice
Acquiring such a model of a human's voice, that deceptively resembles some dead or living person's voice model of human voice, possession, purchase, sale, yielding, import and export without the express consent of the target is punishable.
§2 Application of covert voice models
Producing and making available media from a covert voice model is punishable.
§3 Aggravated application of covert voice models
If produced media is used in for the purpose to frame a human target or targets for crimes or to defame the target, the crime should be judged as aggravated.
Timeline of synthetic human-like fakes
2020's synthetic human-like fakes
- 2020 | demonstration | In Event of Moon Disaster - FULL FILM at youtube.com by the moondisaster.org project by the Center for Advanced Virtuality of the MIT makes a synthetic human-like fake in the appearance and almost in the sound of Nixon.
- 2020 | US state law | January 1  the w:California state law AB-602 came into effect banning the manufacturing and distribution of synthetic pornography without the w:consent of the people depicted. AB-602 provides victims of synthetic pornography with injunctive relief and poses legal threats of statutory and w:punitive damages on w:criminals making or distributing synthetic pornography without consent. The bill AB-602 was signed into law by California Governor w:Gavin Newsom on October 3 2019 and was authored by w:California State Assembly member w:Marc Berman.
- 2020 | Chinese legislation | On January 1 Chinese law requiring that synthetically faked footage should bear a clear notice about its fakeness came into effect. Failure to comply could be considered a w:crime the w:Cyberspace Administration of China stated on its website. China announced this new law in November 2019. The Chinese government seems to be reserving the right to prosecute both users and w:online video platforms failing to abide by the rules. 
2010's synthetic human-like fakes
- 2019 | demonstration | In September 2019 w:Yle, the Finnish w:public broadcasting company, aired a result of experimental w:journalism, a deepfake of the President in office w:Sauli Niinistö in its main news broadcast for the purpose of highlighting the advancing disinformation technology and problems that arise from it.
- 2019 | US state law | Since September 1 w:Texas senate bill SB 751 w:amendments to the election code came into effect, giving w:candidates in w:elections a 30-day protection period to the elections during which making and distributing digital look-alikes or synthetic fakes of the candidates is an offense. The law text defines the subject of the law as "a video, created with the intent to deceive, that appears to depict a real person performing an action that did not occur in reality"
- 2019 | US state law | Since July 1  w:Virginia has criminalized the sale and dissemination of unauthorized synthetic pornography, but not the manufacture., as § 18.2-386.2 titled 'Unlawful dissemination or sale of images of another; penalty.' became part of the w:Code of Virginia. The law text states: "Any person who, with the intent to coerce, harass, or intimidate, maliciously disseminates or sells any videographic or still image created by any means whatsoever that depicts another person who is totally [w:[nudity|nude]], or in a state of undress so as to expose the genitals, pubic area, w:buttocks, or female w:breast, where such person knows or has reason to know that he is not w:licensed or authorized to disseminate or sell such videographic or still image is guilty of a Class 1 misdemeanor.". The identical bills were House Bill 2678 presented by Delegate w:Marcus Simon to the w:Virginia House of Delegates on January 14 2019 and three day later an identical Senate bill 1736 was introduced to the w:Senate of Virginia by Senator w:Adam Ebbin.
- 2019 | science and demonstration | 'Speech2Face: Learning the Face Behind a Voice' at arXiv.org a system for generating likely facial features based on the voice of a person, presented by the w:MIT Computer Science and Artificial Intelligence Laboratory at the 2019 CVPR. Speech2Face at github.com This may develop to something that really causes problems. "Speech2Face: Neural Network Predicts the Face Behind a Voice" reporing at neurohive.io, "Speech2Face Sees Voices and Hears Faces: Dreams Come True with AI" reporting at belitsoft.com
- 2019 | crime | w:Fraud with digital sound-alike technology surfaced in 2019. See 'An artificial-intelligence first: Voice-mimicking software reportedly used in a major theft', a 2019 Washington Post article or 'A Voice Deepfake Was Used To Scam A CEO Out Of $243,000' at Forbes.com (2019-09-03)
- 2019 | demonstration | 'Which Face is real?' at whichfaceisreal.com is an easily unnerving game by Carl Bergstrom and Jevin West where you need to try to distinguish from a pair of photos which is real and which is not. A part of the "tools" of the Calling Bullshit course taught at the w:University of Washington. Relevancy: certain
- 2019 | demonstration | 'Thispersondoesnotexist.com' (since February 2019) by Philip Wang. It showcases a w:StyleGAN at the task of making an endless stream of pictures that look like no-one in particular, but are eerily human-like. Relevancy: certain
- 2018 | counter-measure | In September 2018 Google added “involuntary synthetic pornographic imagery” to its ban list, allowing anyone to request the search engine block results that falsely depict them as “nude or in a sexually explicit situation.” Information on removing involuntary fake pornography from Google at support.google.com if it shows up in Google and the form to request removing involuntary fake pornography at support.google.com, select "I want to remove: A fake nude or sexually explicit picture or video of myself"
- 2018 | science and demonstration | The work 'Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis' (at arXiv.org) was presented at the 2018 w:Conference on Neural Information Processing Systems (NeurIPS). The pre-trained model is able to steal voices from a sample of only 5 seconds with almost convincing results.
- 2018 | demonstration | At the 2018 w:World Internet Conference in w:Wuzhen the w:Xinhua News Agency presented two digital look-alikes made to the resemblance of its real news anchors Qiu Hao (w:Chinese language) and Zhang Zhao (w:English language). The digital look-alikes were made in conjunction with w:Sogou. Neither the w:speech synthesis used nor the gesturing of the digital look-alike anchors were good enough to deceive the watcher to mistake them for real humans imaged with a TV camera.
- 2018 | controversy / demonstration | The w:deepfakes controversy surfaces where porn videos were doctored utilizing deep machine learning so that the face of the actress was replaced by the software's opinion of what another persons face would look like in the same pose and lighting.
- 2017 | science | 'Synthesizing Obama: Learning Lip Sync from Audio' at grail.cs.washington.edu. In SIGGRAPH 2017 by Supasorn Suwajanakorn et al. of the w:University of Washington presented an audio driven digital look-alike of upper torso of Barack Obama. It was driven only by a voice track as source data for the animation after the training phase to acquire w:lip sync and wider facial information from w:training material consisting 2D videos with audio had been completed. Relevancy: certain
- 2016 | movie | w:Rogue One is a Star Wars film for which digital look-alikes of actors w:Peter Cushing and w:Carrie Fisher were made. In the film their appearance would appear to be of same age as the actors were during the filming of the original 1977 w:Star Wars (film) film.
- 2016 | science / demonstration | w:DeepMind's w:WaveNet owned by w:Google also demonstrated ability to steal people's voices
- 2016 | science and demonstration | w:Adobe Inc. publicly demonstrates w:Adobe Voco, a sound-like-anyone machine '#VoCo. Adobe Audio Manipulator Sneak Peak with Jordan Peele | Adobe Creative Cloud' on Youtube. THe original Adobe Voco required 20 minutes of sample to thieve a voice. Relevancy: certain.
- 2016 | science | 'Face2Face: Real-time Face Capture and Reenactment of RGB Videos' at Niessnerlab.org A paper (with videos) on the semi-real-time 2D video manipulation with gesture forcing and lip sync forcing synthesis by Thies et al, Stanford. Relevancy: certain
- 2015 | movie | In the w:Furious 7 a digital look-alike made of the actor w:Paul Walker who died in an accident during the filming was done by w:Weta Digital to enable the completion of the film.
- 2014 | science | w:Ian Goodfellow et al. presented the principles of a w:generative adversarial network. GANs made the headlines in early 2018 with the w:deepfakes controversies.
- 2013 | demonstration | At the 2013 SIGGGRAPH w:Activision and USC presented a real time "Digital Ira" a digital face look-alike of Ari Shapiro, an ICT USC research scientist, utilizing the USC light stage X by Ghosh et al. for both reflectance field and motion capture. The end result both precomputed and real-time rendering with the modernest game GPU shown here and looks fairly realistic.
- 2013 | demonstration | A 'Scanning and Printing a 3D Portrait of President Barack Obama' at ict.usc.edu. A 7D model and a 3D bust was made of President Obama with his consent. Relevancy: Relevancy: certain
2000's synthetic human-like fakes
- 2010 | movie | w:Walt Disney Pictures released a sci-fi sequel entitled w:Tron: Legacy with a digitally rejuvenated digital look-alike made of the actor w:Jeff Bridges playing the w:antagonist CLU.
- 2009 | movie | A digital look-alike of a younger w:Arnold Schwarzenegger was made for the movie w:Terminator Salvation though the end result was critiqued as unconvincing. Facial geometry was acquired from a 1984 mold of Schwarzenegger.
- 2009 | demonstration | Paul Debevec: 'Animating a photo-realistic face' at ted.com Debevec et al. presented new digital likenesses, made by w:Image Metrics, this time of actress w:Emily O'Brien whose reflectance was captured with the USC light stage 5. At 00:04:59 you can see two clips, one with the real Emily shot with a real camera and one with a digital look-alike of Emily, shot with a simulation of a camera - Which is which is difficult to tell. Bruce Lawmen was scanned using USC light stage 6 in still position and also recorded running there on a w:treadmill. Many, many digital look-alikes of Bruce are seen running fluently and natural looking at the ending sequence of the TED talk video.  Motion looks fairly convincing contrasted to the clunky run in the Animatrix: Final Flight of the Osiris which was w:state-of-the-art in 2003 if photorealism was the intention of the w:animators.
- 2004 | movie | The w:Spider-man 2 (and w:Spider-man 3, 2007) films. Relevancy: The films include a digital look-alike made of actor w:Tobey Maguire by w:Sony Pictures Imageworks.
- 2003 | short film | The Animatrix: Final Flight of the Osiris a w:state-of-the-art want-to-be human likenesses not quite fooling the watcher made by Square Pictures.
- 2003 | movie(s) | The w:Matrix Reloaded and w:Matrix Revolutions films. Relevancy: First public display of digital look-alikes that are virtually indistinguishable from the real actors.
- 2002 | music video | 'Bullet' by Covenant on Youtube by w:Covenant (band) from their album w:Northern Light (Covenant album). Relevancy: Contains the best upper-torso digital look-alike of Eskil Simonsson (vocalist) that their organization could procure at the time. Here you can observe the classic "skin looks like cardboard"-bug (assuming this was not intended) that thwarted efforts to make digital look-alikes that pass human testing before the reflectance capture and dissection in 1999 by w:Paul Debevec et al. at the w:University of Southern California and subsequent development of the "Analytical BRDF" (quote-unquote) by ESC Entertainment, a company set up for the sole purpose of making the cinematography for the 2003 films Matrix Reloaded and Matrix Revolutions possible, lead by George Borshukov.
1990's synthetic human-like fakes
- 1999 | science | 'Acquiring the reflectance field of a human face' paper at dl.acm.org w:Paul Debevec et al. of USC did the first known reflectance capture over the human face with their extremely simple w:light stage. They presented their method and results in w:SIGGRAPH 2000. The scientific breakthrough required finding the w:subsurface light component (the simulation models are glowing from within slightly) which can be found using knowledge that light that is reflected from the oil-to-air layer retains its w:Polarization (waves) and the subsurface light loses its polarization. So equipped only with a movable light source, movable video camera, 2 polarizers and a computer program doing extremely simple math and the last piece required to reach photorealism was acquired.
- 1999 | institute founded | The w:Institute for Creative Technologies was founded by the w:United States Army in the w:University of Southern California. It collaborates with the w:United States Army Futures Command, w:United States Army Combat Capabilities Development Command, w:Combat Capabilities Development Command Soldier Center and w:United States Army Research Laboratory.. In 2016 w:Hao Li was appointed to direct the institute.
- 1994 | movie | The Crow was the first film production to make use of w:digital compositing of a computer simulated representation of a face onto scenes filmed using a w:body double. Necessity was the muse as the actor w:Brandon Lee portraying the protagonist was tragically killed accidentally on-stage.
1970's synthetic human-like fakes
- 1976 | movie | w:Futureworld reused parts of A Computer Animated Hand on the big screen.
- 1972 | entertainment | 'A Computer Animated Hand' on Vimeo. w:A Computer Animated Hand by w:Edwin Catmull and w:Fred Parke. Relevancy: This was the first time that computer-generated imagery was used in film to animate moving human-like appearance.
- 1971 | science | 'Images de synthèse : palme de la longévité pour l’ombrage de Gouraud' (still photos). w:Henri Gouraud (computer scientist) made the first w:Computer graphics w:geometry w:digitization and representation of a human face. Modeling was his wife Sylvie Gouraud. The 3D model was a simple w:wire-frame model and he applied w:Gouraud shading to produce the first known representation of human-likeness on computer. 
1770's synthetic human-like fakes
- 1791 | science | w:Wolfgang von Kempelen's Speaking Machine of w:Wolfgang von Kempelen of w:Pressburg, w:Hungary, described in a 1791 paper was w:bellows-operated. This machine added models of the tongue and lips, enabling it to produce w:consonants as well as w:vowels. (based on w:Speech synthesis#History)
- 1779 | science / discovery | w:Christian Gottlieb Kratzenstein won the first prize in a competition announced by the w:Russian Academy of Sciences for models he built of the human w:vocal tract that could produce the five long w:vowel sounds. (Based on w:Speech synthesis#History)
Media perhaps about synthetic human-like fakes
This is a chronological listing of media that are probably to do with synthetic human-like fakes.
The links currently include scripture, science, demonstrations, music videos, music, entertainment and movies.
2020's media perhaps about synthetic human-like fakes
- 2022 | movie | w:The Matrix 4 (2022) will be the 4th installment of the w:The Matrix (franchise). Relevancy: High likelihood of relevance, but unknown as this film is not yet ready or released.
2010's media perhaps about synthetic human-like fakes
- 2018 | music video | 'Simulation Theory' album by Muse on Youtube by w:Muse (band) from the w:Simulation Theory (album). Obs. "The Pause," "Watch What I Do" and "The Interlude" are not part of the album. Relevancy: Whole album
- 2016 | music video |'Voodoo In My Blood' (official music video) by Massive Attack on Youtube by w:Massive Attack and featuring w:Tricky from the album w:Ritual Spirit. Relevancy: How many machines can you see in the same frame at times? If you answered one, look harder and make a more educated guess.
- 2016 | music video | 'The Spoils' by Massive Attack on Youtube by w:Massive Attack featuring w:Hope Sandoval. Wikipedia on The Spoils (song) Relevancy: The video contains synthesis of human-like likenesses.
- 2013 | music | 'In Two' by the Nine Inch Nails (lyric video) on Youtube by w:Nine Inch Nails from the album w:Hesitation Marks. Relevancy: The lyrics seem to be about appearance theft.
- 2013 | music | 'Copy of A' by the Nine Inch Nails (lyric video) on Youtube by w:Nine Inch Nails from the album w:Hesitation Marks. Relevancy: The lyrics seem to be about appearance theft.
- 2013 | music video | 'Before Your Very Eyes' by Atoms For Peace (official music video) on Youtube by w:Atoms for Peace (band) from their album w:Amok (Atoms for Peace album). Video was made by Andrew Thomas Huang (.com) Relevancy: Watch the video
2000's media perhaps about synthetic human-like fakes
- 2007 | short film | 'Doll Face' by Andy Huang on youtube.com was uploaded on 2007-02-19 by Andrew Thomas Huang (.com). There are various unofficial videos using 'Doll Face' as graphics, but with different music.
- 2006 | music video | 'John The Revelator' by Depeche Mode (official music video) on Youtube by w:Depeche Mode from the single w:John the Revelator / Lilian. Relevancy: Book of Revelations.
- 2005 | music video | 'Only' by Nine Inch Nails at Youtube.com w:Only (Nine Inch Nails song) by the w:Nine Inch Nails. Relevancy: check the lyrics, check the video
- 2001 | music video | 'Plug In Baby' by Muse on youtube.com by w:Muse (band) from their album w:Origin of Symmetry. Relevancy: See video
- 2001 | music video | 'Evolution Revolution Love' by Tricky on Youtube by w:Tricky (musician) from the w:Blowback (album) and featuring w:Ed Kowalczyk. Relevancy: See video
1990's media perhaps about synthetic human-like fakes
- 1998 | music video | 'Rabbit in Your Headlights' by UNKLE on Youtube by w:Unkle and featuring w:Thom Yorke on the lyrics. Wikipedia on 'Rabbit in Your Headlights' music video. Relevancy: Contains shots that would have injured / killed a human actor.
- 1998 | music | 'New Model No. 15' by Marilyn Manson (lyrics in video) on Youtube by w:Marilyn Manson (band) from the album w:Mechanical Animals. Relevancy: The lyrics are obviously about digital look-alikes approaching.
- 1998 | music video | 'The Dope Show' by Marilyn Manson (lyric video) on Youtube (official music video) by w:Marilyn Manson (band) from the album w:Mechanical Animals. Relevancy: lyrics
- 1990 | music (video) | Daydreaming by Massive Attack on youtube.com w:Daydreaming (Massive Attack song) by w:Massive Attack Relevancy: foreseeing "But what happen when the bomb drops Down...?"
1980's media perhaps about synthetic human-like fakes
- 1986 | music video | 'Paranoimia' by Art of Noise on Youtube. w:Paranoimia by w:Art of Noise featuring Max Headroom from the album w:In Visible Silence Relevancy: Contains state-of-the-art (for the era) synthetic human-like character, w:Max Headroom).
- 1983 | music video | 'Musique Non-Stop' by Kraftwerk on Youtube made in 1983, but published only in in 1986 by w:Kraftwerk from album w:Electric Café. Relevancy: Contains state-of-the-art (for the era) digital look-alikes of the band members.
1st century media perhaps about synthetic human-like fakes
- w:1st century | scripture | w:Jesus teaches about things that are yet to come in
- 1st century | scripture | w:2 Thessalonians 2 is the second chapter of the w:Second Epistle to the Thessalonians. It is traditionally attributed to w:Paul the Apostle, with w:Saint Timothy as a co-author. See Biblical explanation - The books of Daniel and Revelation § 2 Thessalonians 2 Caution to reader: contains explicit written information about the beasts
- 1st century | scripture | w:Book of Revelation. The task of writing down and smuggling out this early warning of what is to come is given by God to his servant John, who was imprisoned on the island of w:Patmos. See Biblical explanation - The books of Daniel and Revelation § Revelation 13. Caution to reader: contains explicit written information about the beasts.
3rd century BC media perhaps about synthetic human-like fakes
- w:3rd century BC | scripture | The w:Book of Daniel was put in writing.
- See Biblical explanation - The books of Daniel and Revelation § Daniel 7. Caution to reader: contains explicit written information about the beasts.
6th century BC media perhaps about synthetic human-like fakes
- w:6th century BC | scripture | w:Daniel (biblical figure) was in w:Babylonian captivity when he had his visions where God warned us of synthetic human-like fakes first.
- His testimony was put into written form in the #3rd century BC.
- It is terminologically more precise, more inclusive and more useful to talk about 'synthetic terror porn', if we want to talk about things with their real names, than 'synthetic rape porn', because also synthesizing recordings of consentual looking sex scenes can be terroristic in intent.
- Whether a suspect can defend against faked synthetic speech that sounds like him/her depends on how up-to-date the judiciary is. If no information and instructions about digital sound-alikes have been given to the judiciary, they likely will not believe the defense of denying that the recording is of the suspect's voice.
1st seen in
https://www.washingtonpost.com/technology/2019/09/04/an-artificial-intelligence-first-voice-mimicking-software-reportedly-used-major-theft/ Cite error: Invalid
<ref>tag; name "WaPo2019" defined multiple times with different content
- Template:Cite book
- Template:Cite web
- https://web.archive.org/web/20191108090036/https://www.darpa.mil/program/semantic-forensics November
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite web
- Template:Cite AV media
- Template:Cite web
- In this TED talk video at 00:04:59 you can see two clips, one with the real Emily shot with a real camera and one with a digital look-alike of Emily, shot with a simulation of a camera - Which is which is difficult to tell. Bruce Lawmen was scanned using USC light stage 6 in still position and also recorded running there on a w:treadmill. Many, many digital look-alikes of Bruce are seen running fluently and natural looking at the ending sequence of the TED talk video.
- Template:Cite web
- Template:Cite web
- Mechanismus der menschlichen Sprache nebst der Beschreibung seiner sprechenden Maschine ("Mechanism of the human speech with description of its speaking machine", J. B. Degen, Wien).
- History and Development of Speech Synthesis, Helsinki University of Technology, Retrieved on November 4, 2006
How to protect yourself and others from covert modeling (transcluded)
Transcluded from How to protect yourself and others from covert modeling
Help in case of appearance theft
Information on removing involuntary fake pornography from Google at support.google.com if it shows up in Google. Form for removing involuntary fake pornography at support.google.com, select 'I want to remove: A fake nude or sexually explicit picture or video of myself'
Google added “involuntary synthetic pornographic imagery” to its ban list in September 2018, allowing anyone to request the search engine block results that falsely depict them as “nude or in a sexually explicit situation.”
On 3rd of October 2019 California outlawed with the AB-602 the use of w:human image synthesis technologies to make fake pornography without the consent of the people depicted in. The law was authored by Assembly member w:Marc Berman.
Protect your appearance from covert modeling
- Avoid uploading facial and full body photos and video of yourself to services where they are exposed to the whole Internet.
- If you need to upload photos, wear protective clothing, e.g. niqāb or burqa or protective accessories e.g. sunglasses.
- Consider getting a non-photorealistic w:avatar of your liking and use pictures of it to shield your appearance.
- Do not agree or get fooled to having your reflectance captured in a light stage.
Protect your voice from covert modeling
- Avoid uploading unaltered recordings of your w:human voice to services where they are exposed to the whole Internet.
- Consider altering the voice of your recordings if you must upload to the Internet with a voice changer or synthetic voice that does not match any human's voice.
- Avoid getting recorded by parties whose identity and reliability you cannot verify, especially if they do not expressly state how, where and for what purpose they will use the recording
- Ask for a voice changer to be applied if getting recorded to something that will be publicly broadcast
Protect your mind from the products of covert modeling
- Teach your loved ones the 2 key media literacy skills for this age of industrial disinformation:
- Not everything that looks like a video of people is actually a video of people
- Not everything that sounds like a recording of a known human's voice is actually a recording of that person's voice.
- Don't watch porn. A dodgy porn site or few is a hefty risk of seeing some digital look-alikes.
- Be critical of gossip about stuff claimed seen on the Internet.
Protect others from the products of covert modeling
- Read #Protect your mind from the products of covert modeling first. It is usually found above this. Also reading it to others has potential to help them.
- If you have strong evidence to suggest that some person may be under the influence of digital look-alikes, try to talk to them. The BCM! wiki glossary helps talk about things with their real names.
How to protect the humankind from products of covert appearance modeling
Adequate Porn Watcher AI is name for concept development to make an AI to look at and model all findable porn to provide protection the humankind and individual humans by modeling what it sees.
The reason why APW_AI makes sense is that if you can trust the service providers to keep safe your own model it will alert you when it finds something that looks really like a match and therefore lifting the looming threat of digital look-alike attacks and the destructiveness of the attacks that take place considerably lower and thus also the monetary value to the criminals.
How to protect our societies from covert modeling
Contact your representatives
Contact your representatives and ask them ...
- If they are aware of these new classes of disinformation weapons?
- What is their position on the criminalizing covert modeling-question?
- If steps are being taken to protect the judiciary from covert modeling?
- What, if anything, they are doing to put this hyper-modern lawlessness under some check?
- To talk with colleagues and also publicly about the problems caused by covert modeling.
If they don't believe ask them to...
- Work for the creation of fact-finding taskforce to ascertain the truth that synthetic terror porn has been used as a weapon for a longer time.
- Create a fact-finding taskforce for determining if implementations of digital sound-alikes-technology are available to criminals and is it being used to commit crimes.
How to protect judiciaries from covert modeling
Recordings that sound like someone saying something may not be genuine and therefore the suspect should be allowed to state to the court "I did never say that thing you got on tape."
Pictures and videos that looks like someone doing something may not be genuine and therefore the suspect should be allowed to state to the court "I am not in that image/video."
If media forensics proves beyond suspicion the genuinity of the media in question or if credible witness to its creation is found, the media should be considered evidence.