In a surprising twist, Indiana government websites have been discovered hosting documents that serve as comprehensive guides on using AI applications to create deepfake pornography. These guides have been found specifically on the Indiana Department of Health’s website, available through a simple Google search. The PDF files in question lay out detailed instructions on how to utilize artificial intelligence tools that can strip clothing and alter photographs to depict people in various compromising manners.
In addition to deepfake content creation, these documents offer guidance on using AI tools for "sexting" with chatbots and even creating virtual "AI girlfriends." A particular file boldly claims, “This guide covers EVERYTHING you need to know about NSFW AI without skipping a single concept.” The legality of such content is dubious, as the AI technologies that "remove and reveal" clothing fall under violation of the Take it Down Act.
Amidst the unfolding drama, a spokesperson for the Indiana Department of Health reported a significant spike in bot activity targeting the agency’s public applications on November 19. In collaboration with the Indiana Office of Technology, they quickly contained the incident without any data compromise. Nevertheless, many of these controversial files are still appearing in Google searches, despite efforts to delete them.
“We are still working through the process of also eliminating them from Google searches,” stated a representative from the state agency.
While most files have been removed, the persistent appearance of these documents online keeps the issue alive. This unexpected breach highlights vulnerabilities in digital infrastructure and the importance of stringent cybersecurity measures for public entities.
Indiana isn't alone in this ordeal. Similar occurrences have surfaced in other states, including Nevada, where the Department of Transportation's site was used for the same purposes, and Kansas, where links appeared on the attorney general’s site. Investigations in Bakersfield, California, pointed fingers at tech company Granicus, which runs cloud-based platforms for government websites.
Granicus, which services over 7,000 public sector entities, acknowledged the misuse of their platforms by "bad actors," implementing a security block to prevent public access to such documents. Despite this, the documents hosted on Indiana sites dated November 19 remain accessible. However, the Indiana Department of Health asserts that their issue is unrelated to Granicus and specifically involved application vulnerabilities, not the websites themselves.