{"id":9196,"date":"2025-09-16T16:04:05","date_gmt":"2025-09-16T14:04:05","guid":{"rendered":"https:\/\/evidency.io\/menace-deepfake-defi-preuve-numerique\/"},"modified":"2026-02-06T10:04:27","modified_gmt":"2026-02-06T09:04:27","slug":"deepfake-threat-challenge-digital-evidence","status":"publish","type":"post","link":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/","title":{"rendered":"The deepfake threat: an immediate challenge for digital evidence"},"content":{"rendered":"<p><strong>Key takeaways: deepfakes and digital evidence<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The deepfake threat is real:<\/strong> $25.5 million lost through a fake videoconference; 70% of French companies targeted by fraud in 2022.<\/li>\n\n\n\n<li><strong>The European legal framework is strengthening: <\/strong>eIDAS 2 and the AI Act now regulate digital evidence and AI use.<\/li>\n\n\n\n<li><strong>Qualified electronic timestamping is essential:<\/strong> providing certified proof of date and time with a legal presumption of accuracy.<\/li>\n\n\n\n<li><strong>Qualified electronic signatures and certified archiving:<\/strong> ensure authenticity, integrity, and long-term preservation of evidence.<\/li>\n\n\n\n<li><strong>Relying on certified trust service providers:<\/strong> accredited under the eIDAS framework, maximises evidential value in the face of AI-driven manipulation.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre1\">Deepfakes and AI: digital evidence in a manipulable reality<\/h2>\n\n\n\n<p>The word deepfake is a blend of \u201cdeep learning\u201d and \u201cfake\u201d. The technique relies on AI analysing hours of video and photographic content of a person to replicate their appearance, voice, and expressions with striking precision. The resulting model can then be made to say or do virtually anything.<\/p>\n\n\n\n<p>The widespread availability of such tools is <strong>disrupting the entire evidence ecosystem<\/strong>. No longer does one need advanced technical expertise or substantial financial resources to <strong>produce a realistic forgery<\/strong>. Today, anyone with a personal computer, or even a smartphone app, can create deepfakes in real time.<\/p>\n\n\n\n<p>The sectors most exposed to such fraud include finance, where fraudulent voice instructions can trigger <strong>unauthorised transfers<\/strong>; e-commerce, where counterfeit products are promoted through <strong>fake endorsement videos<\/strong>; and human resources, where <strong>interviews conducted via phone or videoconference can be faked<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre2\">The European legal framework for digital evidence<\/h2>\n\n\n\n<p>In response to these developments, European legislation is evolving. The <strong>eIDAS Regulation<\/strong>[4], in force since 2016, defines electronic trust services. Its revised version, <strong>eIDAS 2<\/strong>[5], which took effect in May 2024, strengthens security requirements and introduces <strong>new mechanisms for European digital identity<\/strong>.<\/p>\n\n\n\n<p>This legal framework establishes a <strong>clear hierarchy of evidential weight among electronic documents<\/strong>. A <a href=\"https:\/\/evidency.io\/en\/qualified-timestamping\/\">qualified electronic timestamp<\/a> issued by a trust service provider accredited by ANSSI enjoys a <strong>legal presumption of accuracy<\/strong>, meaning that the burden of proof falls on the opposing party to demonstrate any inaccuracy.<\/p>\n\n\n\n<p>In parallel, the AI Act[6], which entered into force in August 2024, regulates the <strong>use of artificial intelligence<\/strong>. It imposes specific obligations on <a href=\"https:\/\/evidency.io\/en\/ia-act-eu-compliance-risks\/\">high-risk AI systems<\/a> and prohibits certain manipulative practices. It also establishes legal mechanisms to <strong>distinguish AI-generated content<\/strong>, including <strong>obligations for transparency and traceability<\/strong>.<\/p>\n\n\n\n<p>ANSSI plays a central role within this framework by <strong>certifying trust service providers and defining technical standards<\/strong>. Such certifications allow companies to rely on <strong>legally recognised and technically robust solutions<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre3\">Evidence strategies for businesses facing deepfake and AI manipulation threats<\/h2>\n\n\n\n<p>To respond to these risks, businesses must rethink their approach to digital evidence. The first step is to <strong>map out critical documents according to their potential evidential value<\/strong>. Not all digital documents require the <strong>same level of protection<\/strong>: a strategic commercial contract, for example, demands far stronger guarantees than a routine operational email.<\/p>\n\n\n\n<p>The use of <a href=\"https:\/\/evidency.io\/en\/what-is-eidas-certified-timestamping\/\">qualified electronic timestamping<\/a> should be the first reflex. By securely <strong>associating a date and time with a digital file<\/strong>, timestamping creates <strong>proof of precedence<\/strong> that is admissible in court. When applied from the moment a document is created, it <strong>greatly simplifies the subsequent evidential process<\/strong>.<\/p>\n\n\n\n<p>To ensure authenticity and integrity, qualified electronic signatures and <a href=\"https:\/\/evidency.io\/en\/electronic-seal-definition-how-it-works-and-benefits-for-businesses\/\">qualified electronic seals <\/a>are also essential. Defined under the eIDAS regulation, these mechanisms <strong>formally identify a document\u2019s author and detect any later modifications<\/strong>. Their legal weight is equivalent to that of a traditional handwritten signature.<\/p>\n\n\n\n<p><a href=\"https:\/\/evidency.io\/en\/electronic-archiving\/\">Certified electronic archiving<\/a> completes this framework by <strong>preserving the integrity of evidence over time<\/strong>. An electronic archiving system compliant with the <strong>NF Z42-013 standard ensures documents cannot be tampered with, logs every operation, and guarantees format reversibility for long-term accessibility<\/strong>.<\/p>\n\n\n\n<p>Against deepfakes specifically, <strong>biometric and behavioural authentication solutions<\/strong> are emerging. These technologies analyse metadata, compare IP addresses, and detect invisible inconsistencies. Major technology players such as Microsoft and Google are investing heavily in automated detection tools.<\/p>\n\n\n\n<p>Finally, <strong>traceability in the evidence-collection process<\/strong> is becoming critical. Accurately recording who collected the evidence, when, where, and how, helps eliminate doubts of manipulation. Such <strong>meticulous documentation<\/strong>, often overlooked, can prove decisive in litigation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre4\">Future threats to anticipate in digital evidence<\/h2>\n\n\n\n<p>In the longer term, <strong>quantum computing <\/strong>could upend the entire digital evidence ecosystem. These supercomputers, still in experimental stages, may <strong>undermine current cryptographic methods<\/strong> used to secure communications and data.<\/p>\n\n\n\n<p>While this threat may seem distant, preparation must begin now. The US National Institute of Standards and Technology (NIST) has been working since 2016 on <strong>new \u201cpost-quantum\u201d encryption algorithms <\/strong>designed to resist quantum attacks[7]. In France, ANSSI closely monitors these developments and advises companies to assess their vulnerability to this emerging risk.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>With the exponential growth of <a href=\"https:\/\/evidency.io\/en\/document-fraud-leveraging-the-electronic-seal-as-an-anti-fraud-measure\/\">AI-driven fraud<\/a>, companies must adopt a comprehensive strategy to <strong>safeguard their ability to present admissible and secure evidence<\/strong>. This requires combining several elements: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>risk assessment by document type, <\/li>\n\n\n\n<li>systematic reliance on qualified trust service providers, <\/li>\n\n\n\n<li>team training on emerging threats, <\/li>\n\n\n\n<li>and the implementation of reinforced verification processes.<\/li>\n<\/ul>\n\n\n\n<p><strong>Collaboration with trusted third parties<\/strong> is therefore crucial. Qualified providers, certified by national authorities such as ANSSI under the <strong>eIDAS framework<\/strong>, deliver the technical expertise and legal guarantees needed to counter technological threats. Their involvement also <strong>shifts the burden of proof onto certified, specialised actors<\/strong>.<\/p>\n\n\n\n<p>Constant adaptation of practices is equally necessary. As the technological landscape evolves, businesses must remain vigilant to new threats. Ongoing regulatory and technological monitoring, integrated into risk management processes, is the key to building a sustainable evidential strategy.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/evidency.io\/en\/contact-evidency\/\" style=\"background-color:#0c0171\">Contact our experts<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>Sources<\/p>\n\n\n\n<p>[1] Filippone D., Pi\u00e9g\u00e9 par un deepfake en visio, un employ\u00e9 transf\u00e8re 24 M\u20ac \u00e0 des escrocs, Le Monde Informatique, 5 f\u00e9vrier 2024 : https:\/\/www.lemondeinformatique.fr\/actualites\/lire-piege-par-un-deepfake-en-visio-un-employe-transfere-24-meteuro-a-des-escrocs-92875.html<br>[2] Europol, EU Serious and Organised Crime Threat Assessment (SOCTA) 2021, A corrupting influence : the infiltration and undermining of Europe\u2019s economy and society by organised crime : https:\/\/www.europol.europa.eu\/cms\/sites\/default\/files\/documents\/socta2021_1.pdf<br>[3] Observatoire de la Fili\u00e8re de la Confiance Num\u00e9rique 2025 : https:\/\/www.confiance-numerique.fr\/wp-content\/uploads\/2025\/06\/observatoire-acn-2025-de-la-confiance-numerique.pdf<br>[4] R\u00e8glement (UE) N\u00b0 910\/2014 du 23 juillet 2014 sur l\u2019identification \u00e9lectronique et les services de confiance pour les transactions \u00e9lectroniques au sein du march\u00e9 int\u00e9rieur et abrogeant la directive 1999\/93\/CE (eIDAS) : https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=celex%3A32014R0910<br>[5] R\u00e8glement (UE) N\u00b02024\/1183 du 11 avril 2024 modifiant le r\u00e8glement (UE) n\u00b0 910\/2014 en ce qui concerne l\u2019\u00e9tablissement du cadre europ\u00e9en relatif \u00e0 une identit\u00e9 num\u00e9rique (eIDAS 2) : https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=OJ:L_202401183<br>[6] R\u00e8glement (UE) N\u00b02024\/1689 du 13 juin 2024 \u00e9tablissant des r\u00e8gles harmonis\u00e9es concernant l\u2019intelligence artificielle : https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=OJ:L_202401689<br>[7] https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Disclaimer<\/strong><\/p>\n\n\n\n<p><em>The opinions, presentations, figures and estimates set forth on the website including in the blog are for informational purposes only and should not be construed as legal advice. For legal advice you should contact a legal professional in your jurisdiction.<\/em><\/p>\n\n\n\n<p><em>The use of any content on this website, including in this blog, for any commercial purposes, including resale, is prohibited, unless permission is first obtained from Evidency. Request for permission should state the purpose and the extent of the reproduction. For non-commercial purposes, all material in this publication may be freely quoted or reprinted, but acknowledgement is required, together with a link to this website.<\/em><\/p>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><\/p>\n<\/div>\n<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Key takeaways: deepfakes and digital evidence Deepfakes and AI: digital evidence in a manipulable reality The word deepfake is a blend of \u201cdeep learning\u201d and \u201cfake\u201d. The technique relies on AI analysing hours of video and photographic content of a person to replicate their appearance, voice, and expressions with striking precision. The resulting model can [&hellip;]<\/p>\n","protected":false},"author":246879326,"featured_media":10402,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[6426,6491,6410],"tags":[],"ppma_author":[6443,6457],"class_list":["post-9196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-electronic-seal","category-fraud","category-timestamping","author-stephane-pere"],"acf":{"profil":"","bio":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Deepfakes and digital evidence: legal strategies against AI manipulation<\/title>\n<meta name=\"description\" content=\"How can the evidentiary value of documents be safeguarded against deepfakes? Discover the legal and technical solutions to secure your digital evidence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deepfakes and digital evidence: legal strategies against AI manipulation\" \/>\n<meta property=\"og:description\" content=\"How can the evidentiary value of documents be safeguarded against deepfakes? Discover the legal and technical solutions to secure your digital evidence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidency\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-16T14:04:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-06T09:04:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"St\u00e9phane P\u00e8re, St\u00e9phane P\u00e8re\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"St\u00e9phane P\u00e8re\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/\"},\"author\":{\"name\":\"St\u00e9phane P\u00e8re\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/1888314d58ec64690ef29f8594d44cbf\"},\"headline\":\"The deepfake threat: an immediate challenge for digital evidence\",\"datePublished\":\"2025-09-16T14:04:05+00:00\",\"dateModified\":\"2026-02-06T09:04:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/\"},\"wordCount\":1213,\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp\",\"articleSection\":[\"Electronic seal\",\"Fraud\",\"Timestamping\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/\",\"url\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/\",\"name\":\"Deepfakes and digital evidence: legal strategies against AI manipulation\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp\",\"datePublished\":\"2025-09-16T14:04:05+00:00\",\"dateModified\":\"2026-02-06T09:04:27+00:00\",\"description\":\"How can the evidentiary value of documents be safeguarded against deepfakes? Discover the legal and technical solutions to secure your digital evidence.\",\"breadcrumb\":{\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#primaryimage\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp\",\"width\":950,\"height\":500,\"caption\":\"deepfakes d\u00e9fi preuve num\u00e9rique\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidency\",\"item\":\"https:\/\/evidency.io\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The deepfake threat: an immediate challenge for digital evidence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/evidency.io\/en\/#website\",\"url\":\"https:\/\/evidency.io\/en\/\",\"name\":\"Evidency\",\"description\":\"Sp\u00e9cialiste de la preuve num\u00e9rique\",\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/evidency.io\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/evidency.io\/en\/#organization\",\"name\":\"Evidency\",\"url\":\"https:\/\/evidency.io\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"width\":275,\"height\":58,\"caption\":\"Evidency\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/evidency-io\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/1888314d58ec64690ef29f8594d44cbf\",\"name\":\"St\u00e9phane P\u00e8re\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/d13b2274f4c8cd6020ef82e1cf02bac2\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp\",\"caption\":\"St\u00e9phane P\u00e8re\"},\"description\":\"St\u00e9phane is the Managing Director of Evidency. Formerly the Chief Data Officer at The Economist Group, he has over 20 years of international experience in the technology and media sectors.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/stephanepere\/\"],\"url\":\"https:\/\/evidency.io\/author\/stephane-pere\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deepfakes and digital evidence: legal strategies against AI manipulation","description":"How can the evidentiary value of documents be safeguarded against deepfakes? Discover the legal and technical solutions to secure your digital evidence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/","og_locale":"en_US","og_type":"article","og_title":"Deepfakes and digital evidence: legal strategies against AI manipulation","og_description":"How can the evidentiary value of documents be safeguarded against deepfakes? Discover the legal and technical solutions to secure your digital evidence.","og_url":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/","og_site_name":"Evidency","article_published_time":"2025-09-16T14:04:05+00:00","article_modified_time":"2026-02-06T09:04:27+00:00","og_image":[{"width":950,"height":500,"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp","type":"image\/webp"}],"author":"St\u00e9phane P\u00e8re, St\u00e9phane P\u00e8re","twitter_card":"summary_large_image","twitter_misc":{"Written by":"St\u00e9phane P\u00e8re","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#article","isPartOf":{"@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/"},"author":{"name":"St\u00e9phane P\u00e8re","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/1888314d58ec64690ef29f8594d44cbf"},"headline":"The deepfake threat: an immediate challenge for digital evidence","datePublished":"2025-09-16T14:04:05+00:00","dateModified":"2026-02-06T09:04:27+00:00","mainEntityOfPage":{"@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/"},"wordCount":1213,"publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"image":{"@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp","articleSection":["Electronic seal","Fraud","Timestamping"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/","url":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/","name":"Deepfakes and digital evidence: legal strategies against AI manipulation","isPartOf":{"@id":"https:\/\/evidency.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#primaryimage"},"image":{"@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp","datePublished":"2025-09-16T14:04:05+00:00","dateModified":"2026-02-06T09:04:27+00:00","description":"How can the evidentiary value of documents be safeguarded against deepfakes? Discover the legal and technical solutions to secure your digital evidence.","breadcrumb":{"@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#primaryimage","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/deepfakes.webp","width":950,"height":500,"caption":"deepfakes d\u00e9fi preuve num\u00e9rique"},{"@type":"BreadcrumbList","@id":"https:\/\/evidency.io\/en\/deepfake-threat-challenge-digital-evidence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidency","item":"https:\/\/evidency.io\/en\/"},{"@type":"ListItem","position":2,"name":"The deepfake threat: an immediate challenge for digital evidence"}]},{"@type":"WebSite","@id":"https:\/\/evidency.io\/en\/#website","url":"https:\/\/evidency.io\/en\/","name":"Evidency","description":"Sp\u00e9cialiste de la preuve num\u00e9rique","publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evidency.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evidency.io\/en\/#organization","name":"Evidency","url":"https:\/\/evidency.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","width":275,"height":58,"caption":"Evidency"},"image":{"@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/evidency-io\/"]},{"@type":"Person","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/1888314d58ec64690ef29f8594d44cbf","name":"St\u00e9phane P\u00e8re","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/d13b2274f4c8cd6020ef82e1cf02bac2","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp","caption":"St\u00e9phane P\u00e8re"},"description":"St\u00e9phane is the Managing Director of Evidency. Formerly the Chief Data Officer at The Economist Group, he has over 20 years of international experience in the technology and media sectors.","sameAs":["https:\/\/www.linkedin.com\/in\/stephanepere\/"],"url":"https:\/\/evidency.io\/author\/stephane-pere\/"}]}},"modified_by":"Cl\u00e9a Guinaudeau","authors":[{"term_id":6443,"user_id":246879326,"is_guest":0,"slug":"stephane-pere","display_name":"St\u00e9phane P\u00e8re","avatar_url":{"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp","url2x":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane.webp"},"author_category":"1","first_name":"St\u00e9phane","description_complete":"St\u00e9phane est titulaire de deux Masters, en Commerce et en Droit, et poss\u00e8de plus de 20 ans d\u2019exp\u00e9rience dans les domaines de la technologie, des m\u00e9dias et de l\u2019intelligence de march\u00e9. Avant de prendre la direction g\u00e9n\u00e9rale d\u2019Evidency, il a occup\u00e9 le poste de Chief Data Officer au sein de The Economist Group, o\u00f9 il a supervis\u00e9 et fa\u00e7onn\u00e9 la strat\u00e9gie data, l\u2019analytique et les initiatives de transformation digitale \u00e0 l\u2019\u00e9chelle internationale.\r\n\r\nAyant travaill\u00e9 dans des environnements vari\u00e9s, \u00e0 travers diff\u00e9rents march\u00e9s et cultures, St\u00e9phane ma\u00eetrise l\u2019art de f\u00e9d\u00e9rer des \u00e9quipes diverses, produit, ing\u00e9nierie, juridique, conformit\u00e9, op\u00e9rations, autour d\u2019objectifs communs.","domaine_dexpertise":"<ul>\r\n \t<li>Transformation digitale<\/li>\r\n \t<li>R\u00e9glementation et conformit\u00e9<\/li>\r\n \t<li>Strat\u00e9gie data<\/li>\r\n<\/ul>","last_name":"P\u00e8re","user_url":"","job_title":"Managing Director","linkedin":"https:\/\/www.linkedin.com\/in\/stephanepere\/","description":"St\u00e9phane est Managing Director de Evidency. Ancien Chief Data Officer du groupe The Economist, il a plus de 20 ans d'exp\u00e9rience internationale dans le domaine de la technologie et des m\u00e9dias."},{"term_id":6457,"user_id":246879326,"is_guest":0,"slug":"stephane-pere","display_name":"St\u00e9phane P\u00e8re","avatar_url":{"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane-1.webp","url2x":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Stephane-1.webp"},"author_category":"1","first_name":"St\u00e9phane","description_complete":"St\u00e9phane has double Master Degrees in Business &amp; Law, and a 20 year experience in technology, media and market intelligence. Before stepping into the role of Managing Director at Evidency, he served as Chief Data Officer at The Economist Group, where he oversaw and shaped data strategy, analytics, and digital transformation efforts across international operations.\r\nHaving worked across markets and cultures, St\u00e9phane is skilled at aligning diverse teams, product, engineering, legal, compliance, operations, around shared goals.","domaine_dexpertise":"<ul>\r\n \t<li>Digital transformation<\/li>\r\n \t<li>Regulation and compliance<\/li>\r\n \t<li>Data strategy<\/li>\r\n<\/ul>","last_name":"P\u00e8re","user_url":"","job_title":"Managing Director","linkedin":"https:\/\/www.linkedin.com\/in\/stephanepere\/","description":"St\u00e9phane is the Managing Director of Evidency. Formerly the Chief Data Officer at The Economist Group, he has over 20 years of international experience in the technology and media sectors."}],"_links":{"self":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/9196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/users\/246879326"}],"replies":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/comments?post=9196"}],"version-history":[{"count":2,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/9196\/revisions"}],"predecessor-version":[{"id":11372,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/9196\/revisions\/11372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media\/10402"}],"wp:attachment":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media?parent=9196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/categories?post=9196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/tags?post=9196"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/ppma_author?post=9196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}