0 0
Read Time:1 Minute, 32 Second

The classic of political thought Niccolo Machiavelli, in his treatise The Sovereign, stated: “All armed prophets won, and all unarmed perished.”

Техно-магия, фокусы и приемы OSINT, утечки, экономическая безопасность, доказательная аналитика и многое другое.

Автор канала Александр Есаулов, старший партнер ГК «Масалович и партнеры» и популяризатор OSINT.

Связь: a.esaulov@maspartners.ru

Therefore, we continue our dive into the dark side of the force. Today we will talk about the generation of a fake personality.

Maybe we need a photograph or a whole constructed personality. There are special services for creating persona incognita.

1. Avatar. This is the first thing a person starts with. From image. We need a unique photo to go through the neural networks of social networks and not get caught right at the entrance.

To generate a unique person’s appearance, you can use the This person does not exist service [1]. He uses his set of photos, mixes the faces together and gets a completely new, unique person.

I must say right away that this is not a panacea. Facebook, for example, is already actively learning how to calculate AI-generated avatars. But for less technological tasks it will work.

2. Personal data. Next, we create the very essence of a person – his personal profile. For a Russian fake, I recommend using Random Data Tools [2]. For foreign – Fake Name Generator [3] or Fake Person Generator [4].

3. Other information. If you need to generate a company, correspondence or even documents, then you can turn to Fake Info [5] or Fake Details [6].

Naturally, these are only the very first steps in growing a fake or your digital avatar. The presented services are the entry point to a complex and exciting process.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence