Counterfeit reality: Gartner says new laws must be passed to combat rise of counterfeit reality

December 2004 News

While digital media presents companies with new options for handling information, it also allows unscrupulous entities to create an entire world of digital forgeries that will become virtually impossible to detect through casual inspection. Digital media has created new possibilities in counterfeit reality, with many images no longer easily certified as real. This rise of counterfeit reality increasingly will lead to disputes over interpretations of social, political, legal and business realities that the judicial system and other institutions of conflict resolution are not equipped to resolve, according to Gartner.

Gartner defines counterfeit reality as the digital creation of images, video, documents or sounds that are convincingly realistic representations of things that never occurred or never existed exactly as represented.

In the past, it was reasonable to assume that a photograph was good enough evidence to 'establish a reality' in a court. Today, photographs are scrutinised by experts in court, but few people know how to spot an enhanced, forged or fake image.

"Laws covering admissibility of electronic documents in courts will need to be revamped to anticipate superior digital forgeries," says Daryl Plummer, group vice president and chief fellow at Gartner. "Approaches to document verification, privacy legislation, digital rights management and protection of intellectual property will need to be revolutionised over time."

Gartner analysts say current laws are inadequate to halt abuses. For example, counterfeit reality is having a significant impact on virtual child pornography. The US supreme court turned back efforts by congress to outlaw the creation and distribution of simulated child pornography in a May 2002 ruling. The supreme court ruled that banning any image that appeared to be a child engaged in nude or lascivious acts was infringing on free speech and 'akin to prohibiting dirty thoughts'.

"The existing law puts the burden of proof on the government to prove that these children are real when a computer can easily alter their appearance with just a few keystrokes," Plummer says.

There have been many recent examples of counterfeit reality. Some of these include:

* A fake photograph of John Kerry together with Jane Fonda at an anti-Vietnam War rally in 1970 in Pennsylvania. The photograph angered veterans who said his association with her 34 years ago was a slap in the face of Vietnam War veterans. However, the picture was a hoax. While this has been proved false, the image fulfilled its intent to portray Kerry as an anti-military service candidate.

* Ben Vanderford created a video that depicted himself being beheaded and then forwarded the video to a known Islamic terrorist website. The website contacted various media outlets and within a few hours, major news organisations were reporting another beheading in Iraq. While the FBI is investigating Vanderford, it is unknown what charges he may face.

"Fake reality for sale will be the norm in the next decade. Surprisingly, its growth will not be about technology, but it will be about society's propensity for allowing the deviant to become the norm," Plummer says. "As people come to expect the use of virtual technology instead of realtime human interaction, the psychological outrage expected with counterfeit reality will be diminished."

For more information contact Gillian Dolby, Gartner Africa, 021 790 3526, [email protected]

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

StorONE eliminates capacity-based pricing, offers per-drive pricing model
StorONE announced a new pricing model that enables customers to scale for free, driven by a significant software update to the StorONE Storage Engine.

Axis sets science-based targets for reducing emissions
Axis Communications SA News
Axis Communications has committed to set company-wide emissions reduction targets in line with the Science Based Targets initiative (SBTi), which aims to drive ambitious climate action across the private sector globally.

Cybereason expands presence across sub-Saharan Africa
News Cyber Security
Cybereason has appointed Chantél Hamman as its new channel director focused on growing the company’s presence across sub-Saharan Africa.

Duxbury awarded Axis SA Distributor of the Year
Duxbury Networking News CCTV, Surveillance & Remote Monitoring
Axis Communications held its Annual Partner Awards on 1 July 2022 to celebrate and acknowledge the efforts of Axis’ partners by awarding them for key projects and achievements throughout the year.

inq. acquires Enea Edge IP for edge orchestration capability
inq., a global edge solutions provider, announced an agreement with Enea AB to license the Enea Edge intellectual property through a perpetual software development licence.

Add a mobile punch to payroll
Econz Wireless has appointed 4Sight Holdings as a distributor of its products throughout the Middle East, Central Europe and Africa regions.

How deepfakes attack business and how to combat them
The FBI recently announced that more companies have been reporting people applying for jobs using deepfaked, video, images, recordings and stolen identities pretending to be someone else to get a remote IT position.

Liquid launches Africa's first Cyber Security Fusion Centre
Liquid Cyber Security, a business of Cassava Technologies, recently launched the first of its matrix of Cyber Security Fusion Centres in Johannesburg, South Africa.

Cybersecure surveillance cameras
HiTek Security Distributors News CCTV, Surveillance & Remote Monitoring Cyber Security
Provision-ISR builds customer trust and opens up new opportunities with Check Point Quantum IoT Protect Firmware built into Provision-ISR cameras.

CathexisVision integrated with Suprema’s BioStar2
Technews Publishing News Access Control & Identity Management Integrated Solutions
This integration uses BioStar2 access control events to trigger automated actions on the CathexisVision system, including alerts, recording a camera and commands such as locking and unlocking doors, and clearing an alarm.