home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,430 of 2,445   
   Mike Powell to All   
   Criminals are using AI to   
   30 May 25 09:20:00   
   
   TZUTC: -0500   
   MSGID: 1163.consprcy@1:2320/105 2c9efad8   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Criminals are using AI to create fake documents to trick businesses   
      
   Date:   
   Thu, 29 May 2025 14:08:55 +0000   
      
   Description:   
   Forged documents are a growing threat to businesses worldwide - here's what   
   you need to know about the tech used to stop them.   
      
   FULL STORY   
   ======================================================================   
      
   We may not think much about it, but businesses need to rely on digital and   
   physical documents every day. Decisions, purchases, and deals worth millions   
   hinge on information in official documents being trustworthy. In the new    
   world that AI has brought about, forged or altered documents are becoming not   
   only very convincing, but also available to anyone with basic AI tools .    
      
   The news cycle has been replete with cases of AI being used to fake crucial   
   documents like IDs  and these only scratch the surface. AI has given   
   fraudsters the tools for fabricating invoices, tax forms, investment   
   contracts, risk assessments, financial audits, and procurement documents    
   among others.    
      
   A report on AI-assisted fraud found that digital document forgeries increased   
   244% between 2023 and 2024 making it one of the fastest growing categories of   
   business-related fraud going into 2025. For businesses operating into the    
   next decade, the possibility that they cannot trust their own internal   
   documents is becoming a problem that is impossible to ignore.   
      
   Faked documents do real harm to businesses   
      
   While cases of significant fraud will be rare given the layers of internal   
   security and regulations that prevent decision making being centered on one   
   person or one document, the real damage this will do will be to trust.    
   Without a reliable and quick way to authenticate documents businesses may    
   have to add hours into processes of checking and re-verifying documents, even   
   when they are perfectly legitimate.    
      
   At best, this will add a significant inefficiency to many businesses, wasting   
   time and effort  but at worst, it can grind operations almost to a standstill    
    costing businesses the critical advantage of time against their competitors.    
      
   This creates a need to counter this by creating systems that distinguish   
   authentic documents from tampered ones. How tech restores trust    
      
   Responding to this critical problem, new technologies focused on document   
   verification have developed quickly. Principally, the solutions that exist   
   fall into four main categories blockchain-based solutions, AI detection,   
   Identity Verification Technology (IDVT), and Public Key Infrastructure (PKI).   
   Heres what you need to know about them:    
      
    Blockchain    
      
   While Blockchain started as a means for facilitating cryptocurrencies, its   
   since become a legitimate platform for business applications , where the   
   immutability of blockchains present significant security benefits when   
   integrated into business software and processes.    
      
   Blockchain authentication solutions create tamper-proof documents by matching   
   them with cryptographic hashes - meaning that a document can always be    
   checked against its hash. Fundamentally, blockchains decentralized nature   
   makes it nearly impossible for bad actors to change internal records stored    
   on the platform, providing a reassurance that once a document is placed on    
   the blockchain, you will always be able to verify it against the authentic   
   version.    
      
   Since document hashing takes place in your own environment and hashes cannot   
   be reverse engineered to rebuild the document, this method allows you to    
   avoid sending any sensitive data to third parties.    
      
   There are some legitimate concerns about the blockchain's environmental costs   
   given the vast amounts of computing and energy needed to maintain it,    
   although different blockchains offer different advantages in this regard.    
      
    AI-detection    
      
   AI anomaly detection identifies metadata, formatting, and other criteria for   
   mismatches. This is certainly the most straightforward option  as AIs have   
   become surprisingly adept at spotting the output of other AI. That said,    
   while it can be a cost-effective solution, there is no way of guaranteeing    
   its accuracy given AIs notorious hallucinations. Given this, it can be an   
   effective 'first layer against forgery but should not be relied upon   
   exclusively.    
      
    IDVT    
      
   IDVT uses AI to scan metadata and security protocols to detect fakes. This   
   scanning procedure can cross-reference the protocols with trusted databases    
   to prevent using forged credentials in business transactions. The process   
   essentially provides a checkpoint for all your data  documents are flagged   
   immediately if it doesnt match the protocols stored on an organizations   
   database.    
      
   IDVT is sometimes hampered by overreliance on database accuracy.    
   Organizations typically require a lot of resources in terms of    
   infrastructure, personnel, and access to reliable data sources to set it up   
   making it prohibitively expensive for small and medium companies. It's also   
   prone to human error- if an employee sets up protocols incorrectly, the   
   solution becomes near useless.    
      
    PKI    
      
   PKI relies on shareable digital certificates that authenticate a document's   
   origin and integrity.  Using the issuers public key to check the certificate,   
   both first parties and third parties can check its authenticity. It has the   
   advantage of being intuitive to set up, but has gained an unfortunate   
   reputation of being somewhat insecure  if bad actors are able to obtain the   
   keys and/or modify them, they can certify modified documents as authentic.   
   Regulation needs to be the answer to systemic document forgery    
      
   The truth is, AI forgery is not a business-by-business level problem, but a   
   systemic one that will need higher level regulation to address. Eventually,    
   it will become critical for governments to impose baseline metadata standards   
   and mandatory verification technology that can make vital public    
   documentation verifiable by everyone.    
      
   We cannot afford to regard AI forgeries as a distant problem  the threat of   
   serious harm being caused by an AI-doctored document grows daily. Operating a   
   business or running a government where we cannot trust the documents we    
   depend on is an impossible task. Embracing these technologies not only allows   
   us to head off this potential crisis of trust, but can open new opportunities   
   to make the organizations we rely on more transparent.    
      
    This article was produced as part of TechRadarPro's Expert Insights channel   
   where we feature the best and brightest minds in the technology industry   
   today. The views expressed here are those of the author and are not   
   necessarily those of TechRadarPro or Future plc. If you are interested in   
   contributing find out more here:   
   https://www.techradar.com/news/submit-your-story-to-techradar-pro   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/criminals-are-using-ai-to-create-fake-documents-   
   to-trick-businesses   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428   
   SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200   
   SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca