Deepfakes In Court Proceedings: How To Safeguard Evidence

Deepfakes In Court Proceedings: How To Safeguard Evidence

Insights

Deepfakes in Court Proceedings: How To Safeguard Evidence

 
November 18, 2024
 
 

By Daniel B. Garrie and Jennifer Deutsch

Imagine a courtroom where key evidence — a video of the defendant confessing to a crime — is so convincing that the judge and jury have little reason to doubt its authenticity.

The recording plays, showing the defendant detailing the crime in their own voice, with familiar gestures and expressions. The jury is moved, convinced by the video’s clarity and the confidence of what appears to be a genuine confession. A conviction is handed down, seemingly beyond doubt.

Months later, new information surfaces: The video was a deepfake, an AI-crafted fabrication made to resemble the defendant with stunning accuracy. The conviction is overturned, but the damage has been done. The defendant’s life and reputation have suffered irrevocably, public trust in the legal system is shaken, and significant court resources are spent untangling the deception.

This hypothetical is not far-fetched — it’s a near-term risk as deepfake technology advances. The term deepfake — a blend of “deep learning” and “fake” — refers to a sophisticated manipulation of audio, video or images using AI.

By training algorithms on extensive datasets, deepfake technology can create uncannily realistic yet entirely fabricated portrayals, making it increasingly difficult to distinguish fact from fiction.

The pervasive threat of deepfakes has already been shown in other high-stakes environments.

In 2021, cybercriminals deepfaked the voice of an unnamed company’s director, successfully authorizing the fraudulent transfer of $35 million.[1]

In 2022, a manipulated video of Ukrainian President Volodymyr Zelenskyy allegedly surrendering to Russian forces circulated widely online, briefly shaking public trust before it was debunked.[2]

Navigating the Mirage of Deepfakes in Court and Arbitration

Navigating the Mirage of Deepfakes in Court and Arbitration

Insights

Navigating the Mirage of Deepfakes in Court and Arbitration

 

October 16, 2024
 
 

By Daniel B. Garrie and Gail A. Andler

The proliferation of sophisticated artificial intelligence (AI) technologies has given rise to a novel and formidable challenge: deep fakes. These hyper-realistic digital fabrications, generated through deep learning algorithms, can convincingly mimic the appearance, voice, and actions of real individuals, often without their consent. While the technology behind deepfakes holds potential for innovation in fields such as entertainment and education, its misuse poses significant threats to the integrity of the legal system. This article explores the nature of deepfakes and the dangers they present in legal contexts.

Understanding Deepfakes

Deepfakes are generated through sophisticated machine learning algorithms, specifically using a subset called generative adversarial networks (GANs). These networks pit two AI algorithms against each other: one generates fake images or videos, while the other attempts to detect the forgery. The result is hyper-realistic videos or audio recordings that can be nearly indistinguishable from genuine material to the untrained eye or ear.

Evidence and Deep Fakes in Legal Proceedings  

The introduction of deep fakes into legal proceedings is a troubling prospect. Imagine scenario where fabricated evidence is so convincing that it sways the outcome of a trial, infringing upon the principles of justice and fairness that underpin the legal system. The Federal Rules of Evidence (FRE) serve as the cornerstone for determining the admissibility of evidence in federal courts. However, the rise of deep fakes introduces complexities that challenge these established rules, particularly in the realms of authenticity, relevance, and the potential for unfair prejudice. The potential for deep fakes to be used as false evidence raises profound questions about the integrity of trials and the reliability of the evidence presented.

Rule 901 of the FRE requires that evidence must be authenticated before…

The advantages of mediating Computer Fraud and Abuse Act disputes

The advantages of mediating Computer Fraud and Abuse Act disputes

Insights

Daily Journal

 

The advantages of mediating Computer Fraud and Abuse Act disputes

 

February 6, 2024

 

By Daniel Garrie, Hon. Gail A. Andler

 

The Computer Fraud and Abuse Act of 1986 (“CFAA”), codified as United States Code Title 18 Section 1030, is probably best known as the primary federal law governing cybercrime in the United States today. However, the CFAA also provides for civil remedies, which some companies have seen as an way to recover monetary damages for suffered losses from data breaches or cyberattacks that the government is either unwilling or unable to prosecute due to the explosion of cybercrime in recent years. For CFAA cases pursued as civil matters, mediation can be an effective tool for resolving disputes, saving the parties time and money in a way that gets to the heart of the technical issues.    

What is the CFAA?  

At a high level, the CFAA prohibits unauthorized access of protected computer systems and the distribution, theft, or damage of information from a computer or network. The CFAA also includes provisions prohibiting other computer related offenses such as computer espionage, trafficking in passwords, and transmitting malicious code.  

Notably, the CFAA also allows individuals to bring civil actions for violations of the CFAA. Pursuant to Section 1030(g) of the CFAA, “Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief.”  The CFAA limits the right of a private individual to bring a civil action only where the violation: (1) modifies or impairs medical examination, diagnosis, treatment or care of a person or persons; (2) causes physical injury to any person; (3) causes a threat to public health or safety; or (4) causes “loss” to one or more persons during any one-year period aggregating at least $5,000 in value. 

This gives entities that have been the victim of cybersecurity breaches a useful tool in situations where law enforcement does not pursue the matter. There are also advantages for the plaintiff as the “preponderance of evidence” standard of civil cases is much lower than the “beyond a reasonable doubt” standard of criminal cases.

To read the full article, go to Daily Journal

Understanding the Distinct Roles of E-Discovery and Digital Forensics

Understanding the Distinct Roles of E-Discovery and Digital Forensics

Insights

Roles of E-Discovery and Digital Forensics

Daily Journal

Understanding the Distinct Roles of E-Discovery and Digital Forensics

December 28th, 2023

By Daniel Garrie, Hon. Gail A. Andler

E-discovery and digital forensics are two distinct and nuanced concepts that are often conflated in the world of legal technology. While both fields converge in their utilization of digital data and may overlap once litigation is instituted, their applications, methodologies, and implications in legal proceedings significantly differ.

E-Discovery is by its nature employed once litigation (or arbitration, under some rules) has commenced; digital forensics implicates the prelitigation obligation of preservation, as discussed below, and perhaps other aspects of the discipline which may come into play for pre-litigation mediation or other forms of alternative dispute resolution.

Take, for example, the hypothetical situation of a key employee (“Former Employee”) leaving Business A to start a competing business, Business B. As soon as competing business enterprise Business B or Former Employee are put on notice that Business A may dispute some aspect of Former Employee’s actions in leaving Business A or engaging at Business B, Digital Forensics must come into play to identify, preserve and maintain certain electronically stored information of all concerned. Early mediation efforts may take place pre-mediation with the sides, separately or together, utilizing a digital forensics expert to review hard drives or phones to determine whether information has been accessed, downloaded or deleted. In our hypothetical, it is not until either litigation or arbitration permitting discovery commences that eDiscovery may come into play, potentially overlapping with Digital Forensics activities. Following below is a more expansive discussion of each. Understanding the roles and characteristics of these two critical facets of legal practice can aid legal professionals in managing the technical aspects of legal proceedings more efficiently and avoid costly pitfalls. This article provides an overview of the defining features of e-discovery and digital forensics and how they are used in distinct ways in the legal field.

To read the full article, go to JAMS