The $25 Million Video Call
In early 2024, a finance worker at Arup (a British multinational) joined a video call with what appeared to be the company’s CFO and several senior executives. The CFO instructed the worker to transfer $25 million to specific accounts.
Every person on the call was a deepfake. The worker was the only real human in the meeting.
This isn’t science fiction. This isn’t a theoretical risk assessment. This is the new reality of business fraud.
The Threat Landscape
CEO / CFO impersonation
Deepfake video and voice cloning allow attackers to impersonate executives in video calls, voice messages, and even real-time conversations. A cloned voice instructing “wire the funds immediately” is far more convincing than an email.
Brand and product impersonation
Fake product images, manipulated testimonials, and fabricated press releases can destroy brand trust. When anyone can generate photorealistic images of your product with fake reviews, distinguishing real from fake becomes your problem.
Evidence fabrication
Deepfake technology can fabricate video evidence of events that never happened. In litigation, employment disputes, and regulatory proceedings, fabricated digital evidence is a growing concern.
Misinformation campaigns
Competitors or malicious actors can generate fake executive statements, product failures, or scandal-suggesting content. By the time you debunk it, the damage is done.
Market manipulation
Fake video statements from executives about financial results, mergers, or product launches can move stock prices. The real statement exists — but so does the convincing fake.
Why Detection Isn’t Enough
The instinctive response to deepfakes is “detect and flag.” But detection tools face the same fundamental problem as all AI detection:
The arms race favors the attacker. Each new generation of deepfake technology is harder to detect. Detection tools train on yesterday’s fakes while generators produce tomorrow’s. The gap widens over time.
False positives are damaging. If your detection system flags a legitimate CEO video as a deepfake, you’ve created confusion. “Is our CEO real?” is not a question your organization should need to answer regularly.
Detection is reactive. By the time you detect a deepfake, it may have already been seen, shared, and acted upon.
The Provenance Approach
Instead of trying to detect fakes (reactive), establish the authenticity of your real content (proactive).
How it works
- Timestamp official content at creation — every press release, executive video, financial statement, brand asset, and official communication gets a blockchain timestamp
- Establish a verification norm — train stakeholders that official content has a corresponding TimeProof certificate
- When fakes appear — the absence of a blockchain record for alleged content raises immediate questions
- When challenged — the blockchain-anchored proof of the authentic version is independently verifiable
This approach flips the burden. Instead of proving something is fake (increasingly hard), you prove what’s real (always possible with timestamps).
Implementation for Business
Tier 1: Executive communications
Timestamp every official executive statement, video message, earnings call recording, and board communication. This creates a verifiable record of what leaders actually said.
Cost: 10-20 files/month = 10-20 scheduled credits, or 20-40 verified instant credits when timing matters.
Tier 2: Brand assets
Timestamp official product images, marketing materials, press releases, and brand guidelines. When knockoffs or deepfakes use your brand, you have blockchain proof of the originals.
Cost: 50-200 files/quarter = 50-200 scheduled credits, typically covered by a $15 Micro pack or included plan credits.
Tier 3: Legal and compliance
Timestamp contracts, compliance reports, financial filings, and regulatory submissions. Add Legal-Grade for court-ready evidence with identity attestation.
Cost: Variable, with Legal-Grade adding Starter and Pro: 50 credits up to 25 files, then +2/file. Business: 25 credits up to 25 files, then +1/file. Enterprise: included.
Tier 4: Employee verification
Provide executives and spokespeople with TimeProof accounts to timestamp their official communications. This creates a personal authenticity chain that follows the individual.
The Verification Workflow
When someone receives content allegedly from your organization:
- Check the timestamp — does this content have a corresponding TimeProof certificate?
- Verify on the blockchain — paste the transaction ID into Polygonscan
- Compare the hash — does the file’s SHA-256 hash match the on-chain record?
- If no timestamp exists — treat with suspicion and verify through other channels
This is similar to how HTTPS works for websites. You don’t think about it when it’s there. Its absence is the warning.
What This Doesn’t Solve
Blockchain timestamps are powerful but not a complete deepfake defense:
- They don’t detect deepfakes — they prove what’s authentic, not what’s fake
- They require adoption — the verification workflow only works if stakeholders know to check
- They protect your content, not others’ — you can prove your CEO’s real statement; you can’t directly prove a fake of your CEO is fake
- They require the real content to exist — you can only timestamp content you create
The strongest defense combines multiple layers:
- Internal verification procedures (call back, multi-factor approval)
- Employee training on deepfake risks
- AI detection tools (as one signal among many)
- Blockchain timestamps for provable authenticity of real content
- Incident response plans for deepfake attacks
The Cost of Inaction
| Impact | Example | Potential Cost |
|---|---|---|
| Direct fraud | CEO deepfake wire transfer | $25M (Arup case) |
| Stock price manipulation | Fake executive statement | Market cap impact |
| Brand damage | Fake product images/reviews | Revenue loss |
| Legal exposure | Fabricated evidence in litigation | Settlement costs |
| Regulatory action | Manipulated compliance documents | Fines, sanctions |
Compare this to the cost of protecting your official content:
| Protection Level | Coverage | Annual Cost |
|---|---|---|
| Executive communications | ~100 files/year | 100-200 credits/year depending on scheduled vs instant use |
| + Brand assets | ~300 files/year | 300-600 credits/year depending on scheduled vs instant use |
| + Compliance documents | ~500 files/year | 500-1,000 credits/year depending on scheduled vs instant use |
| + Legal-Grade for critical items | Add 50 credits/batch by default | Variable |
The asymmetry is stark. Comprehensive protection costs less than a business lunch.