^

Headlines

Social media users charged over Marcos deepfake

Emmanuel Tupas - The Philippine Star
Social media users charged over Marcos deepfake
Members of the Kapisanan ng Social Media Broadcasters ng Pilipinas, Inc. (KSMBPI) file a complaint against the perpetrators behind the circulating deepfake video of President Ferdinand Marcos Jr. at the office of the PNP Anti-Cybercrime Group in Camp Crame, Quezon City on May 14, 2024
STAR / Michael Varcas

MANILA, Philippines — Social media users who uploaded a deepfake audio recording of President Marcos are facing cybercrime charges filed by a group of social media influencers.

The group has been advised to submit requirements showing they are authorized to file the complaint on behalf of the President, said police Anti Cybercrime Group (ACG) cyber response unit chief Col. Jay Guillermo.

The Kapisanan ng Social Media Broadcaster ng Pilipinas Inc. (KSMBPI), led by chairman Michael Raymond Aragon, filed a complaint before the ACG against persons who uploaded copies of the deepfake on social media.

They have been charged with unlawful use of means of publication and unlawful utterances under Article 154 of the Revised Penal Code, in connection with Republic Act 10175 or the Cybercrime Prevention Act.

The audio deepfake had Marcos ordering the Armed Forces of the Philippines to intervene if China posed a threat to the country.

Aragon said they, as private citizens, are within their rights to file complaints against people spreading falsehoods on social media, especially when national security is at risk.

Anna Tan, KSMBPI legal counsel, said they have identified around 10 persons responsible for uploading the deepfake on four or five social media sites.

The group had to take action as some social media users were spreading false information using artificial technology, Tan added.

The government earlier said a foreign actor is likely behind the audio deepfake.

Guillermo said investigators are studying the case filed by the group but it could take months, as tracing an internet protocol address does not immediately lead to the perpetrators’ identity.

Spam texts

Controlling or proactively blocking spam texts, phishing attempts and child sexual abuse material could soon be performed by three telecommunications firms, as well as small and local internet service providers, according to the Department of Information and Communications Technology.

The DICT on May 2 met with telcos and the National Telecommunications Commission to discuss the worsening problem of unsolicited text promotions and scams faced by telco subscribers in recent months.

“We are studying taking that measure,” DICT Undersecretary for cybersecurity, connectivity and upskilling Jeffrey Ian Dy told The STAR.

Representatives of Smart Communications, Globe Telecom and Dito Telecommunity, as well as NTC Commissioner Ella Blanca Lopez and Deputy Commissioner Jon Paulo Salvahan, attended the meeting.

“In that meeting, the DICT offered to provide tools to telcos including information on known scam URLs. We need to share information with each other so it would not spread,” Dy recalled.

“Because of this consultation, we, NTC and DICT, are processing a memorandum for telos,” he added.

Globe has yet to take effective action against a fake Globe Rewards text scam that spoofs or impersonates the Globe SMS 8080 text channel.

Last month, the Cybercrime Investigation and Coordinating Center raised an alert regarding the spread of a fake Globe Rewards promo campaign that collected the personal and bank details of unsuspecting victims.

In February, Globe started removing clickable links from official customer advisories. — Rainier Allan Ronda

CYBERCRIME

Philstar
  • Latest
  • Trending
Latest
Latest
abtest
Are you sure you want to log out?
X
Login

Philstar.com is one of the most vibrant, opinionated, discerning communities of readers on cyberspace. With your meaningful insights, help shape the stories that can shape the country. Sign up now!

Get Updated:

Signup for the News Round now

FORGOT PASSWORD?
SIGN IN
or sign in with