How to do things with deepfakes

Synthese 201 (2):1-18 (2023)
  Copy   BIBTEX

Abstract

In this paper, I draw a distinction between two types of deepfake, and unpack the deceptive strategies that are made possible by the second. The first category, which has been the focus of existing literature on the topic, consists of those deepfakes that act as a fabricated record of events, talk, and action, where any utterances included in the footage are not addressed to the audience of the deepfake. For instance, a fake video of two politicians conversing with one another. The second category consists of those deepfakes that direct an illocutionary speech act - such as a request, injunction, invitation, or promise - to an addressee who is located outside of the recording. For instance, fake footage of a company director instructing their employee to make a payment, or of a military official urging the populace to flee for safety. Whereas the former category may deceive an audience by giving rise to false beliefs, the latter can more directly manipulate an agent's actions: the speech act's addressee may be moved to accept an invitation or a summons, follow a command, or heed a warning, and in doing so further a deceiver's unethical ends.

Author's Profile

Tom Roberts
University of Exeter

Analytics

Added to PP
2023-01-24

Downloads
190 (#72,280)

6 months
121 (#32,219)

Historical graph of downloads since first upload
This graph includes both downloads from PhilArchive and clicks on external links on PhilPapers.
How can I increase my downloads?