The Double-side of Deepfakes: Obstacles and Assets in the Fight Against Child Pornography

Publication year2022

The Double-side of Deepfakes: Obstacles and Assets in the Fight Against Child Pornography

Abigail Olson
University of Georgia School of Law

The Double-side of Deepfakes: Obstacles and Assets in the Fight Against Child Pornography

Cover Page Footnote
J.D. Candidate, 2022, University of Georgia School of Law; B.A., 2018, Emory University.

THE DOUBLE-SIDE OF DEEPFAKES: OBSTACLES AND ASSETS IN THE FIGHT AGAINST CHILD PORNOGRAPHY

Abigail Olson*

[Page 865]

Deepfake technology recently took the internet by storm. Although they can be used for both innocuous and nefarious purposes, deepfakes overwhelmingly depict people who appear to be creating nonconsensual pornography. The rise of deepfake technology must be accounted for in the existing federal legal framework, specifically in cases implicating images of children. While deepfakes' malicious uses ought to be criminalized, exceptions should be made to use deepfake technology as a tool to enforce and deter purveyors of child pornography. This Note explores what the emerging legal framework addressing deepfakes should look like and considers the importance of using the "flipside" of deepfake technology—meaning its potentially safe, beneficial uses—to stop child pornography.

[Page 866]

Table of Contents

I. Introduction...............................................................867

II. Background................................................................870

A. CHILD PORNOGRAPHY LAW IN THE UNITED STATES .... 870
B. THE EMERGENCE OF DEEPFAKE TECHNOLOGY...........874

III. Analysis.....................................................................879

A. SUGGESTED LEGAL FRAMEWORK TO ADDRESS DEEPFAKES IN THE CONTEXT OF CHILD PORNOGRAPHY ..................................................................................880
B. EXCEPTIONS TO THE SUGGESTED LEGAL FRAMEWORK ..................................................................................882
1. Allow the Use of Synthetic Pornography Materials for Law Enforcement to Use in Online Stings .................................................... 882
2. Allow the Use of Synthetic Child Pornography as a Rehabilitative Tool for Predators.............885

IV. Barriers to Implementation...................................888

V. Conclusion.................................................................890

[Page 867]

I. Introduction

Your friend sends you a video. At first glance, it looks like any other scene from Game of Thrones. But a few seconds into the scene, something strange happens: the characters' faces change. The video no longer shows a conversation between Sam Tarly and Jon Snow. Instead, you're watching your friend talk to different Game of Thrones versions of himself—his face but the actors' bodies. The strangest thing about the scene: it looks realistic.1

Anyone with a smartphone can create videos like the one just described, which, like this example alone, can be a creative source of entertainment.2 These altered videos are called "deepfakes."3 Simply put, a deepfake is a "fake video or audio recording that look[s] and sound[s] just like the real thing."4 Deepfakes include any type of falsified video content that appears realistic, and just about anyone can make them.5 Deepfakes use technology driven by artificial intelligence (AI) to create the fake image, which can

[Page 868]

appear either extremely doctored or extremely realistic.6 Deepfake videos are relatively new—the technology needed to create them only became widely available to the public in 2017.7 Since then, individuals have used deepfakes for an array of purposes: funny videos shared between friends,8 comedy shows,9 political videos,10 and even immersive videos of art and culture.11 While the these examples demonstrate the versatility of the technology, an overwhelming majority of deepfakes depict nonconsensual pornographic videos.12 Many of the first deepfakes of this kind

[Page 869]

featured female celebrities.13 Now, about 70% of deepfake targets are private individuals.14

On the one hand, deepfakes can be a creative and innocuous source of entertainment. On the other hand, deepfakes pose alarming risks in the context of nonconsensual pornography and different obstacles in the context of online child pornography.15 The harms of deepfakes are apparent in their use as tools to create nonconsensual images depicting abuse. But just as deepfakes can be used to perpetuate abuse, they can also potentially be used to combat that same type of harm. This Note suggests that this flipside of deepfake technology could also serve as a powerful tool in the fight against child pornography.

The relative novelty and prevalence of deepfake technology has caught legal systems on their back foot: technology has far outstripped existing laws on content regulation.16 The rise of deepfake technology is concerning, and legal frameworks must evolve to account for it. This Note argues that the developing legal frameworks must take special account of pornographic deepfakes of children by enacting new laws and amending current laws criminalizing child pornography and sexual abuse that are applicable to deepfakes. In addition to the development of the law surrounding deepfakes, this Note argues that carveouts should exist for the use of this technology as a tool for law enforcement to catch online predators and to use as a potential rehabilitative tool to divert predators away from continued victimization of children.

[Page 870]

Part II discusses current child pornography law and the emergence of deepfakes in the context of child sexual abuse. Part III suggests how incorporation of deepfake criminalization could proceed at the federal level and then argues for two exceptions to the criminalization of deepfakes in this context: as a crime-fighting tool to identify and stop purveyors of child pornography and as a deterrent or rehabilitative tool to prevent offenders from reoffending. Part IV considers and responds to counterarguments and potential criticisms of exceptions to the criminalization of synthetic child pornography.

II. Background

A. CHILD PORNOGRAPHY LAW IN THE UNITED STATES

Child pornography is an image or video of a child being sexually exploited.17 Unlike pornography that features consenting legal adults, children depicted in pornography are victims of sexual abuse and exploitation.18 In child pornography, "[t]he act creating the pornography [is] by force—a rape, for example—and there [is] unequivocally no consent, legally or commonsensically speaking."19 The sexual abuse and exploitation of children in the United States is not taken lightly, as evidenced by the massive social condemnation and disdain held for perpetrators of this abuse.20

[Page 871]

Furthermore, the abuse and exploitation can cause massive long-term repercussions for victims: "The permanent record of a child's sexual abuse can alter his or her life forever. Many victims of child pornography suffer from feelings of helplessness, fear, humiliation, and lack of control given that their images are available for others to view in perpetuity."21

Laws first passed in the 1970s provide the foundation for today's legal response to child pornography.22 The United States Code dedicates an entire chapter to child sexual exploitation and abuse,23 which defines child pornography as "any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct" involving a minor.24 A "visual depiction" can be any kind of image and can be stored in a number of ways.25 The Child Pornography Prevention Act of 1996 criminalizes the production, trafficking in, and possession of child pornography.26 While criminalization of child pornography continues to grow,27 pushback related to online free speech concerns also persists.28 The U.S. Supreme Court,

[Page 872]

however, has found that the First Amendment does not protect child pornography.29

Child pornography offenses typically fall under federal jurisdiction when they involve interstate commerce.30 Interstate commerce includes any "commerce between one State, Territory, Possession, or the District of Columbia."31 Any person who receives, distributes, reproduces, or advertises material constituting or containing child pornography in a manner that uses or affects interstate commerce violates federal law.32 Interstate commerce is an expansive umbrella—so expansive that the Internet is considered "an instrumentality of interstate commerce" in U.S. caselaw.33 For example, federal jurisdiction attaches if the materials used to download or store child pornography traveled through interstate commerce, if a hard copy image of child pornography traveled through interstate or foreign commerce, or if the perpetrator used the Internet to commit a child pornography offense.34

Child pornography offenders can also be prosecuted under state law.35 For example, in 2007 Georgia enacted its own law targeting purveyors of child pornography, called the Computer or Electronic Pornography and Child Exploitation Prevention Act.36 The language of the statute aligns closely with existing federal law. Both Georgia and federal law criminalize knowingly coercing a minor to

[Page 873]

engage in sexually explicit conduct, possessing sexually explicit depictions of minors, and distributing explicit material depicting minors.37 The penalties for a federal child pornography conviction are harsher though: the minimum time of imprisonment in Georgia is one year,38 but the federal minimum is five years.39 Although state laws may mirror federal legislation, states have a distinct interest in creating state law causes of action to prosecute offenders when federal jurisdiction does not attach to activity related to child pornography.40

Despite the societal disapproval and legal ramifications for those who engage in activity relating to child...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT