1 / 13

The End of Trust?

Investigating a High-Profile Voice Deepfake Incident

A comprehensive analysis of voice deepfake incidents in Malaysia and their implications for digital trust

Data Analysis

Security Impact

Global Context

UiTM Tapah

Course: ICT652

Group: A4CDCS2306A

Presenters

AMIR HAFIZI BIN MUSA

2024745815

Lead Researcher Data Analysis

MUHAMMAD 'ADLI BIN MOHD ALI

2024974573

Technical Expert Security

NIK MUHAMMAD HAZIQ BIN NIK HASNI

2024741073

Policy Analysis Research

MOHAMAD BUKHARI BIN AHMAD HUZAIRI

2024916761

Documentation Analysis

Voice Deepfake & Cloning Demo

Live demonstration of voice cloning technology using our team's voice samples

Mohamad Bukhari

Original vs Cloned Voice

Original Voice

Cloned Voice

Muhammad 'Adli

Original vs Cloned Voice

Original Voice

Cloned Voice

Nik Muhammad Haziq

Original vs Cloned Voice

Original Voice

Cloned Voice

English Voice

Original vs Cloned Voice

Original Voice

Cloned Voice

The Challenge of Detection

Can you distinguish between the original and cloned voices? This demonstrates the sophistication of modern voice cloning technology.

Human Perception

Increasingly difficult to detect

Current Detection

Limited effectiveness

AI Arms Race

Technology vs Detection

Research Objectives

Primary Objective

Investigate and analyze high-profile voice deepfake incidents in Malaysia to understand their impact on digital trust and security

Identify

Document and categorize all voice deepfake incidents in Malaysia

Analyze

Examine patterns, methods, and targets of voice deepfake attacks

Assess

Evaluate the effectiveness of current detection and prevention measures

Recommend

Propose strategies to combat voice deepfake threats

Why This Matters

Voice deepfakes represent one of the most significant threats to digital trust in the modern era

Security Threat

Voice authentication bypass, financial fraud, identity theft

Critical Urgent

Legal Implications

Evidence manipulation, defamation, jurisdictional challenges

Complex Evolving

Social Impact

Erosion of trust, misinformation, public safety concerns

Widespread Growing

Malaysia's Unique Position

Rapid digital adoption + Multilingual society = Complex challenge landscape

Voice Deepfake Incidents in Malaysia

Political Manipulation (2023)

Deepfake audio of political figures making controversial statements circulated during election period

Political Election Interference Social Media High Impact

Banking Fraud (2023)

Criminals used voice deepfakes to bypass bank voice authentication systems, resulting in significant financial losses

Financial Authentication Bypass RM 2.5M+ Loss

Corporate Espionage (2024)

Voice deepfake used to impersonate executives for obtaining sensitive business information

Corporate Data Theft Sophisticated

Celebrity Scam (2024)

Fake endorsements and investment schemes using celebrity voice clones

Celebrity Investment Fraud Social Media

Incident Analysis & Impact

Impact Assessment

Financial Losses RM 2.5M+
Trust Erosion High
Media Coverage Widespread
Policy Response Active

Vulnerability Factors

Widespread voice authentication adoption
Multi-lingual environment complexity
Limited public awareness
Rapid digital transformation

Legal & Regulatory Response

MCMC guidelines on deepfake content
Central Bank authentication standards review
Personal Data Protection Act amendments
Cybersecurity Act 2024 provisions

Public Awareness

Government awareness campaigns
Bank customer education programs
Media literacy initiatives
Industry collaboration efforts

AI Voice Generation Landscape

Understanding the tools behind voice deepfake technology

Closed-Source Solutions

Commercial platforms with proprietary technology

Advanced quality & features
Commercial support & SLAs
Easier integration
Subscription-based pricing

Open-Source Solutions

Community-driven, freely available tools

Customizable & extensible
No licensing costs
Community support
Privacy & control

Closed-Source AI Voice Tools

11L

ElevenLabs

Premium voice synthesis with emotional intelligence

High Quality Multilingual API
IW

InworldTTS

Leading voice AI with sub-second latency, instant voice cloning

Business API Access Professional
PL

Play.ht

Real-time voice cloning and synthesis

Real-time Cloning Fast
RE

Replica Studios

AI voice actors for games and media

Entertainment Emotional Gaming
MMS

MiniMax S2.6

Core piece of global voice intelligence, outstanding speech technology

Top Choice Studio Agent
WE

WellSaid Labs

Enterprise-grade voice synthesis platform

Enterprise Professional B2B

Open-Source AI Voice Tools

KO

Kokoro

Open-weight TTS model with 82 million parameters.

Python Small Fast
IT2

IndexTTS2

A Breakthrough in Emotionally Expressive and Duration-Controlled Auto-Regressive Zero-Shot Text-to-Speech

Research TensorFlow Open Source
VV

VibeVoice

A Frontier Open-Source Text-to-Speech Model

PyTorch Fast Research
M1

Maya1

State-of-the-art speech model for expressive voice generation

SOTA Realistic Neural
CTB

Chatterbox

Leading Open Source Voice Cloning AI Model

Flow-based Audio Codec
F5

F5-TTS

A Fairytaler that Fakes Fluent and Faithful Speech with Flow Matching

Local Fast Lightweight

Key Implications

Personal Security

Voice authentication vulnerability
Identity theft risks
Personal data exposure
Reputation damage

Business Impact

Financial fraud losses
Customer trust erosion
Regulatory compliance costs
Brand reputation damage

Legal Challenges

Evidence authentication
Jurisdictional issues
Liability determination
Regulatory framework gaps

Societal Impact

Digital trust erosion
Misinformation spread
Social cohesion threats
Democratic process risks

The trust paradox: As AI voice technology improves, the harder it becomes to distinguish real from fake

Strategic Recommendations

Technology Solutions

Multi-factor authentication
Deepfake detection tools
Blockchain verification
Watermarking technologies

Education & Awareness

Public awareness campaigns
Digital literacy programs
Professional training
School curriculum integration

Policy & Regulation

Updated legal frameworks
Industry standards
International cooperation
Enforcement mechanisms

Malaysia-Specific Action Plan

Immediate Actions (0-6 months)

National awareness campaign
Banking security updates
Emergency response protocols

Long-term Strategy (6-24 months)

Comprehensive legislation
R&D investment
Regional leadership initiatives

Conclusion

The rise of voice deepfake technology presents both unprecedented challenges and opportunities for Malaysia's digital future.

Vigilance

Stay alert to emerging threats

Adaptation

Evolving security measures

Collaboration

Multi-stakeholder approach

The future of digital trust depends on our actions today.

Thank You

Questions & Discussion

UiTM Tapah
ICT652
A4CDCS2306A

Presented by: Amir Hafizi, Muhammad 'Adli, Nik Muhammad Haziq, Mohamad Bukhari