So What?
Deepfakes pose an increasing challenge to all technology users, including those working in critical infrastructure settings. While state and federal governments have investigated regulating deepfakes, often in relation to elections, critical infrastructure organizations and their operations are relatively unprotected.
Project Summary
Researchers will investigate how deepfakes can be used to bypass the security of critical infrastructure organizations and undermine public trust in critical infrastructure.
Purpose/Objectives
This research will provide knowledge about the threat of deepfake attacks to critical infrastructure organizations and how these organizations can limit such threats.
Method
This multi-method study is broken into three parts:
- During Phase 1, researchers will interview cybersecurity leaders in critical infrastructure, such as chief information security officers and cybersecurity managers.
- During Phase 2, researchers will conduct experiments investigating how effectively deepfakes can be used to gain access to critical infrastructure and to damage critical infrastructure organizations’ trust among the public.
- During Phase 3, researchers will conduct experiments based on previous phases to discover the most effective methods for mitigating deepfake attacks. This includes identifying trainings and methods for distinguishing illegitimate communications from legitimate communications, as well as communication strategies for external audiences.
Outputs and Impact
- Annual progress reports
- Practitioner reports
- Presentation to end-user working groups
![]() |
Matthew Jensen, Ph.D.
|
![]() |
Allen Johnston, Ph.D.
|
![]() |
Deanna House, Ph.D.
|