Description: The actor Kristen Bell discovered that her likeness was exploited by creators of deepfake pornography, who shared their non-consensual sexual depictions of her on the Internet.
Editor Notes: Incidents 771 and 772 are closely related in terms of narrative overlap and discussion.
Entities
View all entitiesAlleged: Unknown deepfake technology developers developed an AI system deployed by Unknown deepfake creators, which harmed Kristen Bell.
Incident Stats
Risk Subdomain
A further 23 subdomains create an accessible and understandable classification of hazards and harms associated with AI
4.3. Fraud, scams, and targeted manipulation
Risk Domain
The Domain Taxonomy of AI Risks classifies risks into seven AI risk domains: (1) Discrimination & toxicity, (2) Privacy & security, (3) Misinformation, (4) Malicious actors & misuse, (5) Human-computer interaction, (6) Socioeconomic & environmental harms, and (7) AI system safety, failures & limitations.
- Malicious Actors & Misuse
Entity
Which, if any, entity is presented as the main cause of the risk
Human
Timing
The stage in the AI lifecycle at which the risk is presented as occurring
Post-deployment
Intent
Whether the risk is presented as occurring as an expected or unexpected outcome from pursuing a goal
Intentional
Incident Reports
Reports Timeline
Kristen Bell first found out there were deepfake porn videos of her online from her husband, the actor Dax Shepard. In the videos, her face has been manipulated onto porn performers' bodies.
"I was just shocked," Bell told me. "It's hard to…
Actor Kristen Bell has revealed that she felt "exploited" after learning that her face was used in "deepfake" pornography.
The Good Place star told *Vox*that she only found out she'd fallen victim to the practice, which sees the faces of pe…
Variants
A "variant" is an incident that shares the same causative factors, produces similar harms, and involves the same intelligent systems as a known AI incident. Rather than index variants as entirely separate incidents, we list variations of incidents under the first similar incident submitted to the database. Unlike other submission types to the incident database, variants are not required to have reporting in evidence external to the Incident Database. Learn more from the research paper.