4.6 • 684 Ratings
🗓️ 7 November 2023
⏱️ 31 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | What the malign actors are striving at is that they would like to see us starting to compromise |
0:06.1 | our values, question our own values. We should make sure that we are not going to the direction |
0:12.7 | where the malign actors would want to steer us. From a technical perspective, influence operations |
0:19.4 | are detected by people. |
0:21.2 | Our work of detecting malign influence operations is really about a human problem powered |
0:26.6 | by technology. |
0:35.3 | When people first heard this clip that circulated on social media, more than a few were confused, even shocked. |
0:41.3 | You know, people might be surprised to hear me say this, but I actually like Ron DeSantis. |
0:47.3 | A lot. Yeah, I know. I'd say he's just the kind of guy this country needs, and I really mean that. |
0:53.3 | That was not Hillary Clinton. It was an AI-generated deep fake video. I'd say he's just the kind of guy this country needs, and I really mean that. |
0:54.3 | That was not Hillary Clinton. |
0:56.6 | It was an AI-generated deep fake video, but it sounded so realistic that Reuters actually |
1:01.9 | investigated it to prove that it was bogus. |
1:05.2 | Could governments use techniques such as this one to spread false narratives and adversary |
1:08.9 | nations or to influence the outcomes of elections? |
1:11.8 | The answer is yes, and they already do. |
1:15.0 | In fact, in a growing digital ecosystem, there are a wide range of ways in which governments can manipulate the information environment to push particular narratives. |
1:24.1 | Welcome to patching the system, a special podcast from the Global Stage series, a partnership between GZERMedia and Microsoft. |
1:31.7 | I'm Ali Wine, a senior analyst at Eurasia Group. Throughout this series, we're highlighting the work of the |
1:37.1 | Cybersecurity Tech Accord, a public commitment from over 150 global technology companies dedicated to |
1:43.6 | creating a safer cyber world for all of us. |
1:46.6 | Today we're looking at the growing threat of foreign influence operations, state-led efforts |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from GZERO Media, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of GZERO Media and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.