<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<!--<?xml-stylesheet type="text/xsl" href="article.xsl"?>-->
<article article-type="research-article" dtd-version="1.2" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id journal-id-type="issn">1533-628X</journal-id>
<journal-title-group>
<journal-title>Philosophers&#8217; Imprint</journal-title>
</journal-title-group>
<issn pub-type="epub">1533-628X</issn>
<publisher>
<publisher-name>Michigan Journal of Community Service Learning</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3998/phimp.2653</article-id>
<article-categories>
<subj-group>
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Deepfakes, Pornography, and Consent</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Benn</surname>
<given-names>Claire</given-names>
</name>
<email>cmabenn@gmail.com</email>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
</contrib-group>
<aff id="aff-1"><label>1</label>University of Cambridge</aff>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2025-10-01">
<day>01</day>
<month>10</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="collection">
<year>2025</year>
</pub-date>
<volume>25</volume>
<elocation-id>24</elocation-id>
<history>
<date date-type="received" iso-8601-date="2022-04-27">
<day>27</day>
<month>04</month>
<year>2022</year>
</date>
<date date-type="accepted" iso-8601-date="2024-09-12">
<day>12</day>
<month>09</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025, Claire Benn</copyright-statement>
<copyright-year>2025</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by-nc-nd/4.0/">
<license-p>This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. <uri xlink:href="https://creativecommons.org/licenses/by-nc-nd/4.0/">https://creativecommons.org/licenses/by-nc-nd/4.0/</uri>.</license-p>
</license>
</permissions>
<self-uri xlink:href="https://www.philosophersimprint.org/024004/phimp/article/10.3998/phimp.2653/"/>
</article-meta>
</front>
<body>
<sec>
<title>1 Introduction</title>
<p>The media is awash with panic about deepfakes: images, still or moving, created by taking a photograph or footage of an existing person and modify it, with the help of artificial intelligence (AI), to make it appear as if they did or said something they didn&#8217;t. Fake footage of politicians and cultural figures now abounds from Barack Obama and Mark Zuckerberg to the actor Kit Harington giving a moving apology in character as Jon Snow for the ending of season eight of <italic>Game of Thrones</italic>. Because of the use of deepfakes in the political sphere, discussions have focused on the threat they pose to trust, social cohesion, and democracy (<xref ref-type="bibr" rid="B24">Floridi 2018</xref>; <xref ref-type="bibr" rid="B15">Chesney and Citron 2019</xref>; <xref ref-type="bibr" rid="B22">Fallis 2021</xref>; <xref ref-type="bibr" rid="B56">Rini 2020</xref>; <xref ref-type="bibr" rid="B14">Carlson 2021</xref>). However, Jeffrey Shallit&#8217;s &#8216;First Law of New Media&#8217; states that every new medium of expression will be used for sex (<xref ref-type="bibr" rid="B60">Shallit 1996</xref>). Deepfake technology is no exception.</p>
<p>Deepfakes shot into the public awareness because of their use in creating pornography. In 2017, the online magazine <italic>Motherboard</italic> broke a story about a Reddit user called &#8216;deepfakes&#8217; who had uploaded doctored pornography of Scarlett Johansson, Taylor Swift, and Gal Gadot (amongst others).<xref ref-type="fn" rid="n1">1</xref> Their likenesses had been superimposed onto porn performers using AI to render the final pornographic videos realistic at first glance. The cybersecurity company Deeptrace found that 96% of deepfakes were pornographic and that 99% of these mapped women&#8217;s faces onto those of porn actors (<xref ref-type="bibr" rid="B2">Ajder et al. 2019</xref>).</p>
<p>While there has been a public outcry about the creation of deepfake pornography, there has been far less of a sustained attempt to explain exactly why their creation is objectionable,<xref ref-type="fn" rid="n2">2</xref> in particular from the point of view of those whose images have been used to create them. This paper addresses this gap, providing an argument that explains the objection that individuals have against the production of deepfake pornography that uses images of them.</p>
<p>The structure of this paper is as follows. I begin, in &#167;2, by giving an account of deepfake pornography and raising the central question of the paper: on what grounds can those whose images are used to create deepfake pornography object to its creation? In &#167;3, using the case of deepfake child pornography as a case study, I uncover and reject the assumption that makes this question seem puzzling: that the only way the creation of pornography wrongs the depicted person is because it involves sexual abuse in its creation.</p>
<p>In &#167;4, I establish that there are two ways in which an image can be &#8216;of us&#8217; and that these two ways can apply even when the final image is a deepfake. I conclude, in &#167;5, by presenting my consent-based objection to deepfake pornography, answering the question I started with. I explore two objections that might be raised and discuss how my argument can be extended to provide a basis for objections to the creation and use of other kinds of images in contexts beyond deepfake pornography.</p>
</sec>
<sec>
<title>2 Existing Arguments against Deepfake Pornography</title>
<sec>
<title>2.1 Defining Deepfake Pornography</title>
<p>To begin to answer the question of how deepfake pornography might wrong the depicted person, we first need to know what it is. Part of the complexity of giving a definition of deepfake pornography lies in the fact that it is notoriously difficult to give a definition of pornography.<xref ref-type="fn" rid="n3">3</xref> For the purposes of this paper, I assume that we have a handle on what counts as <italic>photographic</italic> pornography.<xref ref-type="fn" rid="n4">4</xref> Deepfake pornography, then, utilises photographs (a term I use to include video footage) of actual persons (including non-sexual photographs) via deepfake technology to create a final (false or misleading) image that, were it a photograph, would be classed as pornography.<xref ref-type="fn" rid="n5">5</xref></p>
</sec>
<sec>
<title>2.2 Existing Arguments</title>
<p>Despite the fact that, in deepfake pornography, the person depicted as engaging in sexual activity did not actually do what they are depicted to have done, it is often nonetheless indistinguishable from <italic>photographic</italic> pornography. As such, answers to the question of what is wrong with deepfake pornography have tended to focus on the harms arising from its use and consumption.</p>
<p>Deepfake pornography can clearly be <italic>used</italic> in various ways that are morally wrong, for example grooming a child for abuse (<xref ref-type="bibr" rid="B1">Adelman 1996</xref>; <xref ref-type="bibr" rid="B4">Armagh 2002</xref>; <xref ref-type="bibr" rid="B11">Bergelt 2003</xref>). However, in these cases, the wrong is nothing to do with the image itself: it is straightforwardly wrong to groom a child, no matter what is used to do so, be it deepfake child pornography, photographic child pornography, adult pornography, non-sexual images, or objects such as sweets or toys.</p>
<p>Let us limit our discussion to the private and personal use of pornography, for example, as a means of achieving sexual arousal. In this case, three arguments can be raised against the <italic>consumption</italic> of deepfake pornography. The first is to extend the argument that viewing pornography harms the <italic>consumer</italic>, causing them to be depraved or corrupted. This is at the heart of the obscenity objections to pornography that have dominated legal discussions (<xref ref-type="bibr" rid="B33">Koppelman 2005</xref>; <xref ref-type="bibr" rid="B28">Henkin 1963</xref>; <xref ref-type="bibr" rid="B55">Regina v. Hicklin 1868</xref>). The second is that, like photographic pornography, deepfakes can encourage harm to <italic>others</italic>. As some have argued, violent adult pornography encourages viewers to act in ways or express views that tolerate or promote violence against women (<xref ref-type="bibr" rid="B21">Eaton 2007</xref>; <xref ref-type="bibr" rid="B37">Longino 1980</xref>; <xref ref-type="bibr" rid="B39">MacKinnon 1987</xref>). This argument does not rely on any specific connection between the final image and actual persons depicted: it is the resulting image&#8217;s reception and role in normalising and inciting sexual violence that is the cause of the harm, and this applies as much to deepfake pornography as it does to photographic pornography. This argument&#8212;that pornography can lead to greater tolerance or even promote sexual violence&#8212;has also been raised with respect to child pornography, where many have argued that deepfake child pornography encourages paedophiles to sexually abuse non-depicted children (<xref ref-type="bibr" rid="B64">Taylor and Quayle 2003</xref>; <xref ref-type="bibr" rid="B62">Strikwerda 2011</xref>). The third argument is that deepfake pornography, just like photographic pornography, harms women as a group. For example, Carl &#214;hman argues that &#8220;The consumption of Deepfakes is undeniably a highly gendered phenomenon, and arguably plays a role in the social degradation of women in society&#8221; (<xref ref-type="bibr" rid="B46">&#214;hman 2020, 139</xref>). This draws on the argument that pornography can objectify or subordinate women by sexualising their inequality (<xref ref-type="bibr" rid="B41">May and Friedman 1985</xref>; <xref ref-type="bibr" rid="B35">Langton 1993</xref>; <xref ref-type="bibr" rid="B39">MacKinnon 1987</xref>).<xref ref-type="fn" rid="n6">6</xref> This argument about the sexualisation of inequality has also been applied to synthetic <italic>child</italic> pornography (<xref ref-type="bibr" rid="B36">Levy 2002</xref>).<xref ref-type="fn" rid="n7">7</xref></p>
<p>Deepfake pornography may well be wrong in the ways these arguments suggest. In fact, I am deeply sympathetic to many of these arguments and in no way seek to reject them. However, regardless of the plausibility of these existing arguments, they fail to explain how deepfake pornography can wrong <italic>those depicted</italic>. My argument addresses this question directly and therefore differs from existing arguments in three important respects. Firstly, existing arguments locate the wrongs of deepfake pornography in the <italic>use</italic> or <italic>consumption</italic> of such images. I establish what is wrong with <italic>producing</italic> deepfake pornography. Secondly, existing arguments are based on empirical claims concerning the consumption of pornography, and harm. My argument does not stand or fall depending on the outcome of empirical research, which is particularly important because the causal connection between the consumption of pornography and harm has been notoriously difficult to definitively establish. And finally, existing arguments focus on harms to non-depicted persons (either as individuals or as a group). My argument brings to light how deepfake pornography wrongs the <italic>depicted</italic> person.</p>
</sec>
</sec>
<sec>
<title>3 Photographic Pornography and Consent</title>
<sec>
<title>3.1 The Puzzle of Deepfake Pornography</title>
<p>So: what, if anything, is wrong with deepfake pornography such that the depicted person has a specific grievance against its production? Let&#8217;s start by considering how the creation of <italic>photographic</italic> pornography wrongs the person depicted.</p>
<p>A key argument is that the creation of photographic pornography wrongs the depicted person when it harms that person. While prominent theorists have made this argument about the harms done in the adult porn industry (<xref ref-type="bibr" rid="B40">MacKinnon and Dworkin 1997</xref>; <xref ref-type="bibr" rid="B20">Dworkin 1985</xref>; <xref ref-type="bibr" rid="B38">Lovelace and McGrady 1980</xref>), it has dominated discussions of child pornography. In <italic>New York v. Ferber</italic>, for example, part of the rationale for extending prohibitions of child pornography was that it is &#8220;intrinsically related to the sexual abuse of children&#8221; as the production of the material &#8220;requires the sexual exploitation of children&#8221; (<xref ref-type="bibr" rid="B45">New York v. Ferber 1982, vol. 81&#8211;55, secs. 458 U.S. 747, 760</xref>)). In more recent years, many organisations and academics have argued that, instead of &#8216;child pornography&#8217;, we should call such images &#8216;child abuse images&#8217; (INTERPOL)<xref ref-type="fn" rid="n8">8</xref> or &#8216;images of sexual abuse&#8217; (<xref ref-type="bibr" rid="B64">Taylor and Quayle 2003, 7</xref>), or &#8216;child sexual abuse material&#8217; (Technology Coalition)<xref ref-type="fn" rid="n9">9</xref>. The proponents of this terminological change argue that their suggested terms capture the real wrong of these images and express unambiguously &#8220;the nature of child pornography&#8221; (<xref ref-type="bibr" rid="B64">Taylor and Quayle 2003, 7</xref>). A child engaging in a sexual act is a child who is being sexually abused, and a photograph of this act is simply the recording of an abusive act. Thus, these photographs are, as the National Association for People Abused in Childhood (NAPAC) puts it, &#8220;crime scenes&#8221; (<xref ref-type="bibr" rid="B44">NAPAC 2016, 4</xref>). In this sense, the <italic>photograph</italic> per se is immaterial: the moral wrong is in the act depicted, and the fact that this wrong had to take place for the photograph to be made is what renders the production of the photograph morally wrong.<xref ref-type="fn" rid="n10">10</xref></p>
<p>And this is the puzzle of deepfake pornography: the immediate reasons we have to object to the creation of photographic pornography simply fail to apply in the case of deepfake pornography. In the case of children, sexual abuse of the depicted child is not a wrong that can be attributed to the creation of deepfake child pornography, by its very definition. If this is the <italic>only</italic> way the creation of photographic child pornography wrongs depicted children, then the project of finding a wrong that <italic>deepfake</italic> child pornography commits against depicted children is a non-starter. However, this position relies on the assumption that all child pornography depicts acts of child sexual abuse, which is a false assumption even if we limit our discussion to <italic>photographic</italic> child pornography. Consider, for example, a photograph of a child masturbating or of their genitals. This photograph does not depict an <italic>act</italic> that constitutes child sexual abuse and yet would intuitively and, in many jurisdictions, legally be classed as child pornography.<xref ref-type="fn" rid="n11">11</xref></p>
<p>Thus, the production of photographic child pornography does not necessarily involve child sexual abuse in the acts depicted. The assumption that it does was the main reason to be sceptical of the claim that deepfake child pornography could wrong the children depicted in it. Without this assumption, two questions remain: what is wrong with all photographic child pornography if not child sexual abuse? And does this wrong apply to deepfake child pornography? Answering these two questions will help us ascertain how deepfake images more generally can wrong the persons (children and adults) whose image is used. Let&#8217;s turn to answering the first of these questions.</p>
</sec>
<sec>
<title>3.2 Consent, Sex Acts, and Sexual Images</title>
<p>The examples above demonstrate that the ethical status of an act is distinct from the ethical status of producing an image of that act. Thus, the permissibility of an act does not entail the permissibility of making an image of that act. For example, it is permissible for someone to give witness testimony; however, it is in general impermissible to take a photograph of a witness in a courtroom (it is illegal to do so in the UK under the Criminal Justice Act 1925 Sec. 41). Conversely, the <italic>im</italic>permissibility of an act does not entail that producing an image of that act is also impermissible. For example, there are many occasions on which it is permissible to photograph morally impermissible acts, such as war crimes, police violence, or domestic abuse. So, what makes the production of a sexual image permissible or impermissible, if this isn&#8217;t determined by the act depicted? My answer is <italic>consent</italic>.</p>
<p>Consent has long been a cornerstone of explanations of what makes a sexual act permissible in one context but impermissible in another. However, while consent has dominated discussions of sexual <italic>activity</italic>, there has been less focus on it in discussions about the creation of sexual <italic>images</italic>. Just as a sexual act can be permissible if all parties consent but is impermissible if they do not, it can also be permissible to make an image of people engaging in that sexual act if they consent, but this is impermissible if they do not. Importantly, the above discussion brings home the fact that consenting to engaging in a sexual act does not entail consent to the production of an image of that act. A separate act of consent is required.<xref ref-type="fn" rid="n12">12</xref> Consider cases where pornography has been made of someone without their consent: for example, where spy cameras have captured footage of people having sex in Airbnbs. The impermissibility of this lies not in any impermissibility of the sexual activity but in the lack of consent to the <italic>recording</italic> of that sexual activity.</p>
<p>Thus, just as sexual activity creates a special demand for consent, so too does the creation of sexual photographs. As children cannot consent, photographic pornography <italic>necessarily</italic> wrongs the children depicted.<xref ref-type="fn" rid="n13">13</xref> With respect to adults, I will assume that there are circumstances where adults can consent to the production of photographic pornography of themselves but that when an adult does not consent, the creation of photographic pornography wrongs them.</p>
<p>However, this does not yet explicitly speak to the wrong, if any, of <italic>deepfake</italic> pornography. In the next section, I discuss the two ways in which we are connected to images of us&#8212;connections that ground the demand for consent&#8212;and show that these connections persist even if an image is doctored, as in the case of deepfakes.</p>
</sec>
</sec>
<sec>
<title>4 Images of Us</title>
<sec>
<title>4.1 Identifiability</title>
<p>So: what is it about photographs that give them a special connection to the depicted? One obvious answer is that photographs tend to look like us. Insofar as we are identifiable from photographs, and these images say something about us, we have reason to be morally concerned about them.</p>
<p>The intuitive concern about identifiability grounds the current US legal position on child pornography. In 1996, it was already illegal to create, possess, and distribute any visual depiction that involved an actual child engaging in sexually explicit conduct. The definition of child pornography was later expanded to include any visual depiction (including created or doctored ones) in which it appears that an <italic>identifiable</italic> child is engaging in sexually explicit conduct.<xref ref-type="fn" rid="n14">14</xref></p>
<p>One question that arises immediately is: identifiable to whom? The US legal position is that the child must be &#8220;recognizable as an actual person by the person&#8217;s face, likeness, or other distinguishing characteristic, such as a unique birthmark or other recognizable feature&#8221; (<italic>Child Pornography Prevention Act of 1996</italic> (<italic>CPPA</italic>) 1996, sec. 18 USC &#167;2252 A). This definition is both very narrow and extremely subjective. Rarely are birthmarks so unique (or known to be) as to identify someone. Also, there are certain things from which only people who know us well may be able to recognise us.</p>
<p>What is important to note is that, no matter how we define it, the property of identifiability is not limited to photographs: many deepfake images maintain the identifiability of the depicted. If <italic>photographic</italic> pornography is objectionable in part because it depicts identifiable persons, then there is reason to object to <italic>any</italic> deepfake pornography that depicts identifiable persons. Thus, whatever explains the problem with identifiability should explain objections to both photographic and doctored pornography that depicts identifiable persons. I turn now to arguing that the best way to understand what is objectionable about the use of someone&#8217;s identifiable image is that it involves a violation of consent.</p>
</sec>
<sec>
<title>4.2 Defamation, Privacy, and Consent</title>
<p>Philip Brey outlines two reasons to care about identifiable images: defamation and privacy (<xref ref-type="bibr" rid="B12">Brey 2008</xref>).<xref ref-type="fn" rid="n15">15</xref> These may well provide the best basis for legal restrictions on the depiction of real people in certain cases; however, using deepfake child pornography as the test case, I show that neither defamation nor privacy completely capture what is <italic>morally</italic> wrong with doctored pornography that depicts identifiable persons.</p>
<p>Let&#8217;s begin with defamation. There is clearly something behind the concern that deepfake images that depict identifiable children tell a lie about those children. However, defamation requires not only that lies are told about a person, but that the public reputation of that person is damaged because they are depicted as <italic>morally depraved or ridiculous</italic> (<xref ref-type="bibr" rid="B12">Brey 2008, 11&#8211;12</xref>). This cannot be our objection to child pornography. An image of a child masturbating does not depict that child as morally depraved or ridiculous. Nor does an image that depicts child sexual abuse. It would defame an adult to falsely portray them as the <italic>perpetrator</italic> of child sexual abuse, but any temptation to see such images as defaming <italic>the child</italic> simply reveals something deeply concerning about our current culture around sex, shame, and victim-blaming.<xref ref-type="fn" rid="n16">16</xref></p>
<p>Concerns about privacy seem to get closer to the mark. Pornography often depicts something private: a private act or a private body part. This can explain what is wrong with photographic child pornography that depicts acts that do not themselves constitute child sexual abuse. A photograph of a child masturbating or naked violates that child&#8217;s privacy by intruding on their private affairs. However, as noted before, whatever explains the problem with identifiability should be able to explain our objection to both photographic and deepfake pornography that depicts identifiable persons. And the privacy argument cannot explain what is wrong with deepfake pornography where a person is identifiable in the final image: the <italic>original</italic> photograph has no sexual content and so does not constitute a violation of privacy (let&#8217;s stipulate that the image used is publicly available). The final image has sexual content and so <italic>looks</italic> like a violation of privacy, but no such violation has in fact taken place: the violation is merely simulated. Deepfake pornography that appears to be of you performing sexual acts might certainly <italic>feel</italic> like a violation. But if there is a violation, it is not one of privacy as there is no intrusion at all into your <italic>actual</italic> private affairs.</p>
<p>Furthermore, the concern with privacy is itself, at its base, an issue of consent. We often allow people into our intimate space such that we enjoy <italic>less</italic> privacy. What is of moral concern is not a loss of privacy but a <italic>violation</italic> of privacy (<xref ref-type="bibr" rid="B30">Introna 1997, 262</xref>). And a loss of privacy is a violation of our privacy when it occurs <italic>without our consent</italic>.</p>
<p>My contention is that what is wrong with the production of pornographic photographs in which someone is identifiable is that the production of such images requires consent and, when that person has not consented (or in the case of children <italic>cannot</italic> consent), they are wronged by the production of such photographs. As it is the <italic>identifiability</italic> of an individual in an image that grounds the requirement for consent in the case of photographs, it follows that <italic>deepfake</italic> pornography depicting an identifiable person also requires consent. Thus, when an adult does not consent to their likeness being used in the creation of deepfake pornography, the production of such doctored images wrongs them. And in the case of children, just as they cannot consent to the creation of <italic>photographic</italic> pornography of themselves, they likewise cannot consent to having their likeness used to create pornography. Thus, whether or not the final image is a deepfake, whenever pornography is made that depicts an identifiable child, that child is necessarily wronged.</p>
</sec>
<sec>
<title>4.3 Two Connections</title>
<p>I could stop here. Almost all deepfake pornography depicts an identifiable person. The entire point of using the images of celebrities is their recognisability. That those depicted are identifiable is part of the intended harm to victims in the case of &#8216;revenge porn&#8217;.<xref ref-type="fn" rid="n17">17</xref> However, I also want to address the claim of someone whose image is used even if they are rendered <italic>un</italic>identifiable in the final image.</p>
<p>To establish my consent-based objection to deepfake pornography even when the person is not identifiable in the final image, let us return to photographs and our connection to them. While it is true that we are often identifiable in photographs, there is another connection that we have to photographs.</p>
<p>To understand this second connection, let&#8217;s start by exploring what makes photographs special. The idea that photographs bear a special relationship to what they depict is noted in the well-documented sense of nearness, intimacy, contact, or proximity that we have when looking at photographs. In the words of Elizabeth Barrett Browning, writing only a few years after the invention of photography, it is &#8220;not merely the likeness which is precious in such cases&#8212;but the association and the sense of nearness involved in the thing&#8221; (quoted inSontag 2005 (e-book edition, originally published 1977), 143). Robert Hopkins explains this &#8220;distinctive power&#8221; of photographs in terms of putting us &#8220;in a relation to their objects that is somehow more intimate, more direct, than that in which we stand to the objects handmade pictures depict&#8221; (<xref ref-type="bibr" rid="B29">Hopkins 2012, 709</xref>).</p>
<p>So, what underpins this special relationship of nearness or proximity? Drawing on Mary Ann Doane&#8217;s terminology, I call it a &#8216;material connection&#8217; (<xref ref-type="bibr" rid="B19">Doane 2007</xref>). Doane&#8217;s work is based on C.S. Pierce&#8217;s semiology, according to which the relationship photographs have to what they depict is not only iconic (a connection based on resemblance and identifiability) but also indexical (a connection based on the material connection) (<xref ref-type="bibr" rid="B48">Peirce 1931, sec. 2.281</xref>).</p>
<p>The idea that photographs or recordings in general have a material connection to what they represent &#8220;is as old as recordings themselves&#8221; (<xref ref-type="bibr" rid="B14">Carlson 2021, 151</xref>). This material connection underpins many prominent accounts of photography (for example, <xref ref-type="bibr" rid="B59">Scruton 1981</xref>), including Dawn Phillips&#8217;, where a photograph is a record of a &#8220;photographic event&#8221;, that is the recording of a light image (<xref ref-type="bibr" rid="B50">Phillips 2009</xref>). It is also a key part of some of the most influential accounts of the phenomenology or subjective experience of photography, such as Kendall Walton&#8217;s &#8216;transparency thesis&#8217; (<xref ref-type="bibr" rid="B66">Walton 1984</xref>), as well as the trace theory (<xref ref-type="bibr" rid="B49">Pettersson 2011</xref>; <xref ref-type="bibr" rid="B17">Currie 1999</xref>).<xref ref-type="fn" rid="n18">18</xref> As many have argued, it is not the epistemic status of the <italic>content</italic> depicted that makes photographs special (<xref ref-type="bibr" rid="B49">Pettersson 2011</xref>). Photographs of loved ones are often valued, even if little is learned from them (<xref ref-type="bibr" rid="B66">Walton 1984, 253</xref>). It is the connection to the person depicted that we value (<xref ref-type="bibr" rid="B50">Phillips 2009</xref>; <xref ref-type="bibr" rid="B14">Carlson 2021</xref>; <xref ref-type="bibr" rid="B10">Benovsky 2016</xref>). And this connection does not require identifiability. As Susan Sontag has argued, even if a photograph of Shakespeare were &#8220;faded, barely legible, a brownish shadow, we would probably still prefer it to another glorious Holbein. Having a photograph of Shakespeare would be like having a nail from the True Cross&#8221; (<xref ref-type="bibr" rid="B61">Sontag 2005</xref> (e-book edition, originally published 1977), 120).</p>
<p>Identifiability seems like the more obvious&#8212;and therefore more important&#8212;connection that we have to photographs. Thus, it might seem less plausible that this material connection could ground a requirement for consent. However, this material connection is key.</p>
<p>To see why, first note that identifiability without <italic>any</italic> kind of connection may not be sufficient to ground a requirement for consent. Take Hilary Putnam&#8217;s classic example of an ant crawling around on a patch of sand, where the lines it happens to trace ends up looking like a &#8220;recognisable caricature of Winston Churchill&#8221; (<xref ref-type="bibr" rid="B53">Putnam 1979, 1</xref>). Putnam asks whether the ant has traced a picture that <italic>depicts</italic> Churchill and answers that it has not, because the ant has not seen Churchill (or a picture of Churchill) and has no intention of depicting him. Thus, although the image is identifiable as Churchill, it does not depict him because it lacks the appropriate causal connection. Identifiability matters in the case of deepfake pornography because these images are derived from photographs that do have a material connection to the depicted.<xref ref-type="fn" rid="n19">19</xref> What is significant is that it is only in <italic>conjunction</italic> with this other connection that our identifiability in photographs becomes important.<xref ref-type="fn" rid="n20">20</xref></p>
<p>Second, not only is mere identifiability insufficient, but it is also not <italic>necessary</italic> for a connection between the depicted and the depiction, because the material connection we have to photographs can ground a requirement for consent even when we are not identifiable. Suppose someone takes a photograph of you from the neck down, or of your feet, or your genitalia. Or suppose the photograph is blurry or overexposed or only shows you in silhouette. Even you may not be able to identify yourself from these photographs, let alone a stranger. Nevertheless, they would still be photographs of you.<xref ref-type="fn" rid="n21">21</xref></p>
<p>Some might push back on the idea that a material connection without identifiability of any kind grounds a requirement for consent. Here are two counterexamples.<xref ref-type="fn" rid="n22">22</xref></p>
<p>The first is that the <italic>photographer</italic> is just as causally important to the existence of the final image as the person depicted. However, it would be unusual to think that the photograph was equally a photograph <italic>of</italic> the photographer as of the photographed.</p>
<p>The second is that, outside of photographs, we might have causal connections to things that it might seem odd to think of as requiring consent to be used in pornography. For example, imagine that you have sex in an alley behind my house and leave a swirled handprint in the drying paint on my fence. If I use this handprint in a pornographic image, does the causal connection that exists between you and that image, via the handprint, mean that your consent is needed?</p>
<p>These are thorny issues. I do not think that there is a clear answer with which all would agree. I would say that, when the material connection exists, the more that an image resembles us (with identifiability in the strong, narrow, legal sense at one end of the spectrum), the stronger our claim against its use to create pornography. However, the fact that an image does not render us identifiable does not mean that we have no claim. Our depiction matters, even if the final image is (as noted above) blurry, grainy, or of parts of our bodies from which no one could identify us. The key sense of nearness or proximity that viewers have to those depicted in an image remains even when the image does not entail high-fidelity visual resemblance. This is sufficient for my argument.</p>
<p>Moreover, it is not implausible that the persons in the cases above (the photographer or the leaver of the swirled handprint) <italic>may well understandably</italic> object to their causal creations being used for certain purposes. Imagine you found out that your artistic Instagram photographs of tidying hacks for children&#8217;s playrooms had been used extensively as backgrounds for deepfake child pornography. Or imagine that the handprint you left in the paint ended up being used as the symbol for a racist terrorist organisation who thought that the smeared white handprint aesthetically captured their cause. You might indeed be horrified and vehemently object to these causal traces of yourself being used in these ways.</p>
<p>For now, however, I will set aside whether purely causal connections that are not manifested in what is captured <italic>in</italic> a photograph can ground requirements for consent. Instead, let&#8217;s focus on the fact that this material connection exists for all photographs and that it is this material connection to those photographs that explains why the production of pornographic photographs wrongs the person depicted, even if they are not identifiable in that photograph. But does this material connection that exists between a person and a photograph of them persist through doctoring as in the case of deepfakes? I now show that it does.</p>
</sec>
<sec>
<title>4.4 The Line between Photographs and Deepfakes</title>
<p>To accept that photographs have the right kind of connection (established above) but deny that doctored images like deepfakes do we must identify a clear separation between them. But photographs have always been doctored. Many early photographs were a product of &#8216;combination printing&#8217; (originally proposed by Hippolyte Bayard, as early as the 1850s) where two or more negatives were used to create a single image, in part because the lack of light sensitivity meant that, by the time the main subject of a photograph was properly exposed, other elements, such as the sky, were bound to be overexposed. Throughout the Victorian era, the doctoring of run-of-the-mill portraits at commercial photography studios was commonplace, including the removal of wrinkles and freckles as well as the slimming of waists. This practice is described and recommended in several guides and instruction manuals from around that era (<xref ref-type="bibr" rid="B31">Johnson 1898</xref>; <xref ref-type="bibr" rid="B58">Schriever 1908</xref>).</p>
<p>The digital age has put further pressure on maintaining a distinction between a photograph and a doctored image. Digital images are just data, and this data is highly malleable. A digital photograph of you displayed on a low-resolution screen is just as much a photograph of you as the one displayed on a high-resolution screen, even though they are qualitatively different (<xref ref-type="bibr" rid="B9">Benn 2019</xref>).<xref ref-type="fn" rid="n23">23</xref> Can one really be said to be the original and the other doctored?</p>
<p>There are plenty of ways of doctoring photographs: obscuring or exaggerating image details, altering the colour saturation and contrast, the brightness, sharpening, cropping, making it hazy, blurry, in sepia, grayscale, or pixelated, or even making it look hand-drawn or like a cartoon (<xref ref-type="bibr" rid="B23">Farid 2004</xref>). We can now make any of these changes at the touch of a button, just as easily as taking a photograph, through graphic filters readily available on smartphones. In fact, these graphic filters can now be applied <italic>pre</italic>-production: the image is previewed and taken with the filter already applied (via apps such as Facetune, Reface, and MSQRD). In such cases, there is no &#8216;original&#8217; photograph.</p>
<p>It is therefore not possible to maintain a sharp enough distinction between a photograph and a doctored image to ground a requirement for consent in the case of the former but not in the case of the latter: if a graphic filter is added to a pornographic photograph (or added before the image is even taken), the requirement for consent does not vanish.</p>
<p>Of course, there may come a point where, because the changes made are so many or so radical, this chain between the final image and the person in the original photograph is broken.<xref ref-type="fn" rid="n24">24</xref> Suppose just one pixel from a photograph of you is used as the basis of the skin colour of an image of someone having sex. The link in this case is perhaps not strong enough to merit a requirement for your consent. I leave the question of exactly where the line should be drawn for future research.<xref ref-type="fn" rid="n25">25</xref> The idea that the connection we have to a final image might break down at some point does not undermine the more general points that the link between you and an image can remain intact through doctoring, and that this connection can ground a requirement for consent when your image is put to use as pornography.</p>
</sec>
<sec>
<title>4.5 Consent and the Creation of Pornography</title>
<p>Doctoring a photograph cannot <italic>remove</italic> any original demand for consent, whether or not we are identifiable in the final image. However, we might question whether <italic>introducing</italic> sexual content or context through doctoring an otherwise non-sexual image cannot give rise to a requirement for consent. I argue that it can. To see why, we must return to the question: what is pornography?</p>
<p>Michael Rea identifies a curious phenomenon: a naked photograph of Marilyn Monroe would be pornography if it appeared in <italic>Hustler</italic>, but it wasn&#8217;t when it appeared in <italic>Life</italic> (he noted that it <italic>was</italic> considered pornographic when it originally appeared in a calendar in 1940, being banned in two US states) (<xref ref-type="bibr" rid="B54">Rea 2001, 118</xref>). He asks how this can be accounted for: how an image could become pornographic even though there is no change in content. His argument, and his subsequent definition of pornography, is that some material, <italic>x</italic>, is pornography when &#8220;it is reasonable to believe that <italic>x</italic> will be used (or treated) as pornography by most of the audience for which it was produced&#8221; (<xref ref-type="bibr" rid="B54">Rea 2001, 120</xref>).<xref ref-type="fn" rid="n26">26</xref></p>
<p>The advantage of this position is that, because specific kinds of <italic>content</italic> (such as nudity or depictions of sexual acts) are not necessary for an image to be pornography, it can account for a wide range of intuitively pornographic images, such as those depicting feet and shoes when created for shoe fetishes (<xref ref-type="bibr" rid="B54">Rea 2001, 122</xref>).<xref ref-type="fn" rid="n27">27</xref> This is in keeping with my argument that not all child pornography falls under the description of &#8216;child abuse images&#8217; because this latter definition is too narrow in terms of what content an image must have in order to be child pornography. More significantly, it can explain how the <italic>introduction</italic> of content and alterations in context can change the audience for whom the image is intended, and the reasonable expectations of how that image will be treated, and thus whether or not it is pornography. This includes its posting in certain spaces, alongside other pornographic content.<xref ref-type="fn" rid="n28">28</xref> But it, arguably, also includes deepfaking someone&#8217;s image onto footage that is pornographic. Adding sexually explicit material to someone&#8217;s image <italic>recontextualises</italic> that individual&#8217;s image such that it is reasonable to expect it will now be treated as pornography. As such, it makes a non-sexual image into pornography, in the same way that placing Marilyn Monroe&#8217;s picture in <italic>Hustler</italic> (or a non-sexual image of a child alongside sexually explicit images of that child)<xref ref-type="fn" rid="n29">29</xref> turns it into pornography.</p>
<p>My argument goes beyond Rea&#8217;s both in considering the case of doctored and deepfaked images, and in requiring that we look at how this recontextualising affects the demand for consent. My argument is that, just as our consent is needed for <italic>content</italic> that makes it reasonable to believe that the resulting image will be treated as pornography, our consent is also needed when our image is recontextualised such that it <italic>becomes</italic> pornography. This includes a picture of someone in a bikini or at a nudist beach (neither of which are necessarily pornographic) that is placed on a website containing hard-core pornography. It also addresses cases where elements are added to an image of someone such that it is likely to be treated as pornography.<xref ref-type="fn" rid="n30">30</xref> This is exactly what deepfake pornography does. Whenever pornography is made of us, our consent is needed. Deepfakes are no exception.</p>
</sec>
</sec>
<sec>
<title>5 Conclusion</title>
<p>This paper began with the following question: what, if anything, is wrong with deepfake pornography such that the depicted person has a specific grievance against its production? The answer, I have argued, lies in the fact that there are two ways in which an image can be &#8216;of us&#8217;: an image can look like us, and we can have a material connection to the image. Both connections can exist even if the image in question is a deepfake. And whenever an image is of us and is pornography, our consent is required. Pornography can be created by the <italic>addition</italic> of content or context, including the modification of an image such that it becomes reasonable to believe it will be treated as pornography: deepfake pornography does just this by compositing someone&#8217;s image with underlying sexually explicit material.</p>
<p>Thus, the creation of sexual images that involve the use of someone&#8217;s likeness or photographs of them gives rise to a special demand for consent. Children cannot consent to be used&#8212;or to have their likeness or their photographs used&#8212;to create pornography. Thus, the production of deepfake child pornography&#8212;given that it starts with a photograph of a child&#8212;<italic>necessarily</italic> morally wrongs the children depicted. Deepfake adult pornography is objectionable whenever those whose image or likeness is used do not give consent.</p>
<p>My account does vital explanatory work. It explains what is wrong with <italic>creating</italic> deepfake pornography, independent of the wrongs of using or consuming pornography. It does not rely on any empirical claim about the causal connection between pornography and harm. And most importantly, unlike other arguments against pornography, it explains why the person whose image is used has reason to object.</p>
<sec>
<title>5.1 Two Objections</title>
<p>I turn now to two objections that might be raised. One is that we <italic>do</italic> often consent to giving rights over&#8212;and therefore control of&#8212;the images we upload to various websites. It is true: few if any of us refuse to click &#8216;accept&#8217; on the terms and conditions when trying to access a free service or website. Doesn&#8217;t my argument thereby imply that those to whom we have consented are perfectly within their rights to use our images, including to produce pornography? There are two responses to be made to this.</p>
<p>The first is that the standard of &#8216;consent&#8217; when it comes to end user agreements is notoriously poor (<xref ref-type="bibr" rid="B8">Barocas and Nissenbaum 2014</xref>). It often fails to meet almost any robust theory of consent (for example, the user being informed enough about the consequences and significance of agreeing, and the practical ability to refuse when these services are vital infrastructure) (<xref ref-type="bibr" rid="B42">McDonald and FaithCranor 2008</xref>; <xref ref-type="bibr" rid="B7">Bakos, Marotta-Wurgler, and Trossen 2014</xref>). It can, therefore, only be called consent in inverted commas.</p>
<p>Secondly, consent in the case of sex and sexual images doesn&#8217;t necessarily function as other instances of consent do. Consider, for example, that in certain circumstances consent can be given by a third party: if you are unconscious (or otherwise unable to make decisions), it is permissible for me as your nominated proxy to consent on your behalf about your medical care. However, it is impermissible for me to consent on your behalf to a sexual encounter or to the creation of pornography of you, even if you are similarly incapacitated. It is beyond the scope of this paper to explore further the special features of consent when it comes to sex and sexual images. However, the inapplicability of third-party consent in this area explains why a parent cannot consent to someone creating pornography of their child even though parents can consent to other things on behalf of their child, such as invasive medical procedures. It also gives some strength to the claim that, while we can consent online to many things, we arguably cannot give consent as a blank cheque when it comes to sex or sexual images.</p>
<p>Another objection might arise from the seeming equivalency my argument makes between the wrongs of deepfake child pornography and deepfake adult pornography. My argument might appear, at first glance, to be unable to explain how deepfake child pornography wrongs depicted children <italic>qua</italic> children. Here are two responses. Firstly, adults can consent and therefore there are (at least theoretically) some cases in which the creation of deepfake adult pornography does not wrong the person depicted, whereas the creation of deepfake child pornography <italic>necessarily</italic> wrongs those depicted. Secondly, there are perhaps special obligations that we have towards children who are in a position of dependence and trust that makes violations due to a lack of consent worse in the case of children than of adults. Note, for example, that both the rape of a child and the rape of an adult are wrong, and wrong for the same reason&#8212;the lack of consent&#8212;and yet the rape of a child seems <italic>worse</italic> than the rape of an adult, if we were inclined to compare such things. Finally, the idea that child pornography is worse than adult pornography perhaps draws on arguments beyond concerns with the wrong done to those depicted: that the consumption and enjoyment of child pornography is wrong; that the causal arguments about harm to non-depicted persons strike many as more plausible in the case of child pornography; and that the problems of inequality are more common or plausible in the case of child pornography. I do not disagree. However, this paper had a narrower goal: to establish how using someone&#8217;s image to create deepfakes wrongs the person whose image is used. Thus, without undermining the idea that what is wrong in both cases is a lack of consent, it is possible to accommodate the intuition that the creation of deepfake child pornography seems morally worse than the creation of deepfake adult pornography, even in cases where the adult depicted does not consent.</p>
</sec>
<sec>
<title>5.2 Beyond Deepfake Pornography</title>
<p>My argument has primarily focused on the issue of deepfake pornography: a phenomenon that is increasingly commonplace and therefore increasingly in need of philosophical attention. However, my argument goes beyond deepfake pornography, grounding concerns about other kinds of activities and other types of images.</p>
<p>My account can be expanded to explain, for example, the wrongs of revenge porn, once we understand this phenomenon as the <italic>distributing</italic> of a sexual image of someone without their consent, noting that the distribution of pornography is another point at which consent is required, beyond the act depicted and the taking of the photograph. My argument can also explain how the creation of purely synthetic pornography (i.e. pornography that does not start with a <italic>photograph</italic> of an individual) that intends to render an individual identifiable can be objectionable when that individual has not consented or cannot consent to the production of that image. Finally, my argument also has application to cases where the content, context, or use of an image demands consent for production. Pornography is one such case. However, there are likely to be others, for example using someone&#8217;s image to advertise a product (<xref ref-type="bibr" rid="B52">Prosser 1960, 385</xref>) or to illustrate a story on, say, obesity (<xref ref-type="bibr" rid="B6">Attorneys-General 2005, 11</xref>). This enables deeper reflection on another core use case of deepfakes: where images of political figures are used to make fake political speeches or statements. Of course, there are arguments analogous to those concerning pornography that the creation of political deepfakes is wrong because the consumption and use of these images harm non-depicted persons. However, my argument can explain how <italic>those depicted</italic> have reason to object to their image being used to make political speeches and statements beyond the political and epistemic impact on non-depicted persons.</p>
<p>My discussion of doctored pornography has implications for ethics and technology more generally: it establishes that there is a deep ethical significance in using images of real people for certain purposes that is not reliant on the truthfulness of the depiction. Fictions can wrong real people. The link between the depictions and the depicted&#8212;between a representation and the represented&#8212;in a time increasingly dominated by representations can ground the interests of specific individuals. This paper lays the foundations for explicating how such interests are threatened, and those depicted wronged, even when they are not necessarily harmed.</p>
</sec>
</sec>
</body>
<back>
<fn-group>
<fn id="n1"><p><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.vice.com/en/article/gydydm/gal-gadot-fake-ai-porn">https://www.vice.com/en/article/gydydm/gal-gadot-fake-ai-porn</ext-link></p></fn>
<fn id="n2"><p>Exceptions include de Ruiter (<xref ref-type="bibr" rid="B18">2021</xref>) and Rini and Cohen (<xref ref-type="bibr" rid="B57">2022</xref>).</p></fn>
<fn id="n3"><p>There are a variety of ways of defining pornography (<xref ref-type="bibr" rid="B67">Williams 1981</xref>; <xref ref-type="bibr" rid="B20">Dworkin 1985</xref>; <xref ref-type="bibr" rid="B37">Longino 1980</xref>; <xref ref-type="bibr" rid="B39">MacKinnon 1987</xref>; <xref ref-type="bibr" rid="B54">Rea 2001</xref>). Defining child pornography is even more complex (<xref ref-type="bibr" rid="B64">Taylor and Quayle 2003</xref>), especially in the digital age (<xref ref-type="bibr" rid="B9">Benn 2019</xref>).</p></fn>
<fn id="n4"><p>Note that there is an important difference between images that are &#8216;photographic&#8217; and those that are &#8216;photographs&#8217; as well as between those that are &#8216;pornographic&#8217; and those that are &#8216;pornography&#8217; (<xref ref-type="bibr" rid="B47">Patridge 2013</xref>). However, for brevity, I treat these terms as equivalent. Thus, by both &#8216;photographic pornography&#8217; and &#8216;pornographic photographs&#8217;, I mean photographs that are also pornography.</p></fn>
<fn id="n5"><p>The term &#8216;images&#8217; here is intended to refer to both still and moving images. Note that there is a wide range of terminology that has been used in this space, especially in the legal tradition. What I am calling doctored images have been called &#8216;pseudo-photographs&#8217; (<xref ref-type="bibr" rid="B62">Strikwerda 2011, 140</xref>) or &#8216;morphed&#8217; images (<xref ref-type="bibr" rid="B5">Ashcroft v. The Free Speech Coalition 2002</xref>, mentioned in the Opinion of the Court delivered by Justice Kennedy; <xref ref-type="bibr" rid="B36">Levy 2002, 319</xref>; <xref ref-type="bibr" rid="B34">Krone 2004</xref>; <xref ref-type="bibr" rid="B13">Burke 1997, 440</xref>; <xref ref-type="bibr" rid="B11">Bergelt 2003, 570</xref>; <xref ref-type="bibr" rid="B4">Armagh 2002, 1994</xref>). I avoid the term &#8216;pseudo-photographs&#8217; because it has also been used to refer to any image (whether doctored or completely CGI) that is indistinguishable from a photograph (see for example the UK law concerning &#8216;indecent images of a child&#8217;). I avoid the term &#8216;morphed&#8217; as it is best reserved for one specific way in which images can be doctored (<xref ref-type="bibr" rid="B23">Farid 2004</xref>).</p></fn>
<fn id="n6"><p>Note that these positions are bolstered when feminists restrict their argument to inegalitarian adult pornography (<xref ref-type="bibr" rid="B21">Eaton 2007</xref>).</p></fn>
<fn id="n7"><p>Levy argues against the production of virtual child pornography because it sexualises inequality, and this harms <italic>women</italic>. Thus, his argument has been critiqued as only explaining the wrong of virtual child pornography <italic>indirectly</italic>: it doesn&#8217;t explain how it wrongs <italic>children</italic> (<xref ref-type="bibr" rid="B47">Patridge 2013</xref>).</p></fn>
<fn id="n8"><p><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.interpol.int/News-and-media/News/2010/PR080">http://www.interpol.int/News-and-media/News/2010/PR080</ext-link></p></fn>
<fn id="n9"><p><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.technologycoalition.org/">https://www.technologycoalition.org/</ext-link></p></fn>
<fn id="n10"><p>This argument has also dominated anti-porn feminist critiques that have focused on the harm done to women actors in the production of pornography, as documented in Lovelace and McGrady (<xref ref-type="bibr" rid="B38">1980</xref>).</p></fn>
<fn id="n11"><p>For the US, see (<xref ref-type="bibr" rid="B45">New York v. Ferber 1982</xref>; <xref ref-type="bibr" rid="B13">Burke 1997, 442, footnote 13</xref>). For the UK, see the SAP and COPINE scales (<xref ref-type="bibr" rid="B63">Taylor, Holland, and Quayle 2001, 101</xref>).</p></fn>
<fn id="n12"><p>Note that, nevertheless, consent might not be <italic>sufficient</italic> to make the production of pornography permissible as the other arguments (discussed in &#167;1) against the production and consumption of pornography&#8212;that it harms non-depicted individuals or groups, or sexualises inequality itself&#8212;apply and render the creation of all pornography (or certain types of pornography) impermissible <italic>even if</italic> those depicted consent.</p></fn>
<fn id="n13"><p>For a discussion of the capacities needed for sexual consent, see Archard (<xref ref-type="bibr" rid="B3">1998</xref>). Note that I leave aside whether the capacities needed to have the ability to consent to sexual activity and to the production of sexual images arise at the same age, something rejected by most Western countries, which legally define a child as someone under <italic>16</italic> for the former but under <italic>18</italic> for the latter (<xref ref-type="bibr" rid="B27">Healy 2004</xref>). Some might object, assuming that if someone has the capacities necessary to permissibly engage in a sexual act, they must also have the capacities necessary to consent to the production of an image of that act. However, this overlooks the fact that there are sexual acts, such as masturbation, that have no age of consent. Infant masturbation has been recorded as early as two months old (<xref ref-type="bibr" rid="B26">Hansen and Balslev 2009</xref>) and yet it cannot be the case that a two-month-old has the capacities necessary to be able to consent to anything at all. Also note law-specific definitions of what it is to be a child are common in areas of activity unrelated to sex, for example voting and criminal responsibility (<xref ref-type="bibr" rid="B65">The UN Convention of the Rights of the Child 2010, Article 1</xref>).</p></fn>
<fn id="n14"><p>This was the outcome of the Child Pornography Prevention Act (<italic>Child Pornography Prevention Act of 1996</italic> (<italic>CPPA</italic>) 1996, (<xref ref-type="bibr" rid="B16">Child Pornography Prevention Act of 1996 (CPPA) 1996, Pub. L. No. 104-208</xref>, codified at 18 USC &#167;2252(8)C.) and its subsequent challenge in (<xref ref-type="bibr" rid="B5">Ashcroft v. The Free Speech Coalition 2002</xref>).</p></fn>
<fn id="n15"><p>I leave aside the third reason he discusses: publicity. The right of publicity is usually reserved for celebrities who make their living partly from this commercial use. My argument establishes the interests of <italic>all</italic> of us in not having our images used in the creation of pornography without our consent, even if we are not celebrities.</p></fn>
<fn id="n16"><p>But perhaps &#8216;ridiculous&#8217; should be understood here not as a normative term&#8212;deserving of ridicule&#8212;but as descriptive&#8212;likely to be ridiculed. And indeed, many things unworthy of ridicule are likely to be ridiculed, such as an image of a celebrity on the toilet. However, even if we were cynical enough to believe that people <italic>would</italic> ridicule a child for being depicted as the victim of child abuse, it would be strange if our objection to a child being identifiable in pornography is grounded in the fact that they will be ridiculed as a matter of fact, as then the objection would disappear if people rightly came to see them as the victims they are. And surely our objection is not as fleeting as that.</p>
<p><styled-content style="display: block">Another possibility is that identifiable deepfake pornography exposes those depicted to a risk of stigma. For example, deepfakes could be made of politicians appearing to engage in sex with men in counties where attitudes towards homosexuality are negative and intolerant. Despite the fact that gay sex is, in fact, not depraved, this could constitute a serious reputational harm to those depicted. Nevertheless, this argument (about the harm or risk of stigma) is not sufficient because it does not explain why an identifiable deepfake of you can be problematic even if it only depicts you having the kind of sex that is in no way stigmatised in your current society.</styled-content></p></fn>
<fn id="n17"><p>While this term is commonly used to describe pornographic images taken (and/or shared) without the consent of one or more of those depicted, often by someone known to the person, it should be noted that not all image-based abuse of this kind has to be motivated by &#8216;revenge&#8217; as the term &#8216;revenge porn&#8217; suggests.</p></fn>
<fn id="n18"><p>A &#8216;trace&#8217; is one form of &#8216;index&#8217;. For example, there are marks that someone has made: a footprint or a death mask are traces of, respectively, someone&#8217;s foot and someone&#8217;s face (<xref ref-type="bibr" rid="B61">Sontag 2005</xref> (e-book edition, originally published 1977), 145). There are also transformations: a burnt tree stump is a trace of a fire (<xref ref-type="bibr" rid="B32">Kauser 2007, 59</xref>). Note that material or indexical connections can take many forms: a connection could be causal (as in the case of smoke being a sign of a fire) or it could be non-causal (such as the Pole Star as an index for the North Pole) (<xref ref-type="bibr" rid="B25">Goudge 1965, 54-56</xref>).</p></fn>
<fn id="n19"><p>These connections explain why we might be pulled in two directions when it comes to the interesting (albeit unlikely) case of one identical twin being involved in producing pornography (this is a plot point in an episode of <italic>Friends</italic>, but I have yet to hear of a real-life case). We might understand the other twin&#8217;s objection, which is based on identifiability: that someone might believe that it was them. However, we might also understand the original twin&#8217;s argument that the objecting twin has no grounds to object because they lack the proper material connection, as they were not in fact photographed.</p></fn>
<fn id="n20"><p>We might think that an intentional connection is enough (rather than the material one that applies in the use of photographs). This would ground objections to cases where someone is depicted intentionally in completely created synthetic pornography, which did not use a photograph of the person it depicts. I do not settle this specific case here (though it should be noted how currently and increasingly rare and infrequent such completely synthetic images are, given the availability of deepfake software).</p></fn>
<fn id="n21"><p>Benovsky suggests that <italic>typically</italic> photographs fail to &#8220;depict reality as it is (they only depict things from one side, they can involve distortions, blurred background, etc.)&#8221; (<xref ref-type="bibr" rid="B10">Benovsky 2016, 77-78</xref>). Phillips also says &#8220;&#8216;Photograph of&#8217; picks out a causal relation to the objects and sources that were causally responsible for the light image. Being a photograph of these things does not entail visual resemblance&#8221; (<xref ref-type="bibr" rid="B50">Phillips 2009, 339</xref>).</p></fn>
<fn id="n22"><p>My thanks to the reviewers for bringing these interesting cases to my attention.</p></fn>
<fn id="n23"><p>In this earlier paper, I go into more detail about how digital photography demands a conceptual change to our understanding of an image, an image of a child, and a sexual image of a child (<xref ref-type="bibr" rid="B9">Benn 2019</xref>).</p></fn>
<fn id="n24"><p>This chain-line connection between us, photographs, and doctored images of us is discussed further in McMullan (<xref ref-type="bibr" rid="B43">2011</xref>) and Poremba (<xref ref-type="bibr" rid="B51">2011</xref>).</p></fn>
<fn id="n25"><p>One place where this distinction is likely to be key is in with respect to generative AI models such as DALL-E, Sora, and Gemini, which create synthetic media but by using existing images, including photographs of actual people. My argument can explain the objection that can be raised by those of whom <italic>identifiable</italic> pornographic images are made through such means. If we assume the chain is never broken, my argument would potentially ground the objections of anyone whose images are used to train these models when they are used for the generation of <italic>any</italic> pornography.</p></fn>
<fn id="n26"><p>He offers a complex definition of what it means to &#8216;treat something as pornography&#8217;, but a common-sense understanding will do for the purposes of this paper.</p></fn>
<fn id="n27"><p>It can also account for why some images with certain content, in particular children in the nude, might <italic>not</italic> be considered child pornography in certain contexts. For example, Spencer Elden, the naked baby on the cover of the album <italic>Nevermind</italic>, sued Nirvana, claiming the image was child pornography. An application of Rea&#8217;s argument would deny this claim, as it is unreasonable to believe that the album cover would be used or treated as pornography by most of the Nirvana fans for whom the album was produced.</p></fn>
<fn id="n28"><p>In an earlier paper, I offer an account of how metadata could be included as part of the context that determines if an image is pornography or not (<xref ref-type="bibr" rid="B9">Benn 2019</xref>).</p></fn>
<fn id="n29"><p>Taylor and Quayle discuss a real case of this sort: a 14-year-old child who, in 2000, had been depicted in large amounts of child pornography as well as extensively photographed in non-pornographic settings (<xref ref-type="bibr" rid="B64">Taylor and Quayle 2003, 6</xref>). These latter images should be treated as pornography, given that, as Taylor and Quayle note, they &#8220;complement and extend&#8221; the explicit pornographic material and provide contextual material about the child &#8220;making them more &#8216;real&#8217; to the offender and fuelling sexual fantasies&#8221; (<xref ref-type="bibr" rid="B64">Taylor and Quayle 2003, 6</xref>).</p></fn>
<fn id="n30"><p>It is interesting to note that sometimes removing content to make it appear less pornographic can convey the idea that the editors believe it will be treated as pornography, leading it to in fact seem <italic>more</italic> pornographic. This can be seen in the case of <italic>The Wall Street Journal</italic> when it published Sally Mann&#8217;s photograph of her four-year-old daughter Virginia in the nude but put black bars over her eyes, nipples, and vulva. In response, Mann claimed that &#8220;the censorship, not the picture itself, gave the image a tinge of pornography&#8221; (<ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.artsy.net/article/artsy-editorial-sally-mann-s-photographs-children-viewers-uncomfortable">https://www.artsy.net/article/artsy-editorial-sally-mann-s-photographs-children-viewers-uncomfortable</ext-link>).</p></fn>
</fn-group>
<ref-list>
<ref id="B1"><mixed-citation publication-type="journal"><string-name><surname>Adelman</surname>, <given-names>Ronald W.</given-names></string-name> <year>1996</year>. <article-title>&#8220;The Constitutionality of Congressional Efforts to Ban Computer-Generated Child Pornography: A First Amendment Assessment of S. 1237.&#8221;</article-title> <source>The John Marshall Journal of Information Technology &amp; Privacy Law</source> <volume>14</volume> (<issue>3</issue>): <fpage>483</fpage>&#8211;<lpage>492</lpage>.</mixed-citation></ref>
<ref id="B2"><mixed-citation publication-type="webpage"><string-name><surname>Ajder</surname>, <given-names>Henry</given-names></string-name>, <string-name><given-names>Giorgio</given-names> <surname>Patrini</surname></string-name>, <string-name><given-names>Francesco</given-names> <surname>Cavalli</surname></string-name>, and <string-name><given-names>Laurence</given-names> <surname>Cullen</surname></string-name>. <year>2019</year>. <source>The State of Deepfakes: Landscape, Threats, and Impact</source>. <uri>https://regmedia.co.uk/2019/10/08/deepfake_report.pdf</uri>.</mixed-citation></ref>
<ref id="B3"><mixed-citation publication-type="book"><string-name><surname>Archard</surname>, <given-names>David</given-names></string-name>. <year>1998</year>. <source>Sexual Consent</source>. <publisher-loc>Boulder</publisher-loc>: <publisher-name>Westview Press</publisher-name>.</mixed-citation></ref>
<ref id="B4"><mixed-citation publication-type="journal"><string-name><surname>Armagh</surname>, <given-names>Daniel S.</given-names></string-name> <year>2002</year>. <article-title>&#8220;Virtual Child Pornography: Criminal Conduct or Protected Speech?&#8221;</article-title> <source>Cardozo Law Review</source> <volume>23</volume> (<issue>6</issue>): <fpage>1993</fpage>&#8211;<lpage>2010</lpage>.</mixed-citation></ref>
<ref id="B5"><mixed-citation publication-type="journal"><collab>Ashcroft v. The Free Speech Coalition</collab>. <year>2002</year>. <article-title>535 U.S. 234</article-title>.</mixed-citation></ref>
<ref id="B6"><mixed-citation publication-type="book"><collab>Attorneys-General, Standing Comittee of</collab>. <year>2005</year>. <chapter-title>Unauthorised Photographs on the Internet And Ancillary Privacy Issues</chapter-title>. <publisher-loc>Australia</publisher-loc>.</mixed-citation></ref>
<ref id="B7"><mixed-citation publication-type="journal"><string-name><surname>Bakos</surname>, <given-names>Yannis</given-names></string-name>, <string-name><given-names>Hlorencia</given-names> <surname>Marotta-Wurgler</surname></string-name>, and <string-name><given-names>David R.</given-names> <surname>Trossen</surname></string-name>. <year>2014</year>. <article-title>&#8220;Does Anyone Read the Fine Print? Testing a Law and Economics Approach to Standard Form Contracts.&#8221;</article-title> <source>The Journal of Legal Studies</source> <volume>43</volume> (<issue>1</issue>): <fpage>1</fpage>&#8211;<lpage>35</lpage>. <pub-id pub-id-type="doi">10.1086/674424</pub-id>.</mixed-citation></ref>
<ref id="B8"><mixed-citation publication-type="book"><string-name><surname>Barocas</surname>, <given-names>Solon</given-names></string-name>, and <string-name><given-names>Helen</given-names> <surname>Nissenbaum</surname></string-name>. <year>2014</year>. <chapter-title>&#8220;Big Data&#8217;s End Run Around Anonymity and Consent.&#8221;</chapter-title> In <source>Privacy, Big Data, and the Public Good: Frameworks for Engagement</source>, edited by <string-name><given-names>Julia</given-names> <surname>Lane</surname></string-name>, <string-name><given-names>Victoria</given-names> <surname>Stodden</surname></string-name>, <string-name><given-names>Stefan</given-names> <surname>Bender</surname></string-name> and <string-name><given-names>Helen</given-names> <surname>Nissenbaum</surname></string-name>, <fpage>44</fpage>&#8211;<lpage>75</lpage>. <publisher-loc>New York</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>.</mixed-citation></ref>
<ref id="B9"><mixed-citation publication-type="book"><string-name><surname>Benn</surname>, <given-names>Claire</given-names></string-name>. <year>2019</year>. <chapter-title>&#8220;Child Pornography in the Digital Age: A Conceptual Muddle.&#8221;</chapter-title> In <source>Pornography: Interdisciplinary Perspectives</source>, edited by <string-name><given-names>Frank</given-names> <surname>Jacob</surname></string-name>, <fpage>261</fpage>&#8211;<lpage>285</lpage>. <publisher-loc>Berlin</publisher-loc>: <publisher-name>Peter Lang</publisher-name>.</mixed-citation></ref>
<ref id="B10"><mixed-citation publication-type="journal"><string-name><surname>Benovsky</surname>, <given-names>J.</given-names></string-name> <year>2016</year>. <article-title>&#8220;Depiction and Imagination.&#8221;</article-title> <source>SATS</source> <volume>17</volume> (<issue>1</issue>): <fpage>61</fpage>&#8211;<lpage>80</lpage>. <pub-id pub-id-type="doi">10.1515/sats-2015-0017</pub-id>.</mixed-citation></ref>
<ref id="B11"><mixed-citation publication-type="journal"><string-name><surname>Bergelt</surname>, <given-names>Kelley</given-names></string-name>. <year>2003</year>. <article-title>&#8220;Simulation by Stimulation: Is There Really Any Difference Between Actual and Virtual Child Pornography? The Supreme Court Gives Child Pornographers a New Vehicle for Satisfaction.&#8221;</article-title> <source>Capital University Law Review</source> <volume>31</volume> (<issue>3</issue>): <fpage>565</fpage>&#8211;<lpage>595</lpage>.</mixed-citation></ref>
<ref id="B12"><mixed-citation publication-type="book"><string-name><surname>Brey</surname>, <given-names>Philip</given-names></string-name>. <year>2008</year>. <chapter-title>&#8220;Virtual Reality and Computer Simulation.&#8221;</chapter-title> In <source>The handbook of information and computer ethics</source>, edited by <string-name><given-names>K.</given-names> <surname>Himma</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Tavani</surname></string-name>, <fpage>361</fpage>&#8211;<lpage>384</lpage>. <publisher-loc>Hoboken</publisher-loc>: <publisher-name>John Wiley &amp; Sons</publisher-name>.</mixed-citation></ref>
<ref id="B13"><mixed-citation publication-type="journal"><string-name><surname>Burke</surname>, <given-names>Debra D.</given-names></string-name> <year>1997</year>. <article-title>&#8220;The Criminalization of Virtual Child Pornography: A Constitutional Question.&#8221;</article-title> <source>Harvard Journal on Legislation</source> <volume>34</volume> (<issue>2</issue>): <fpage>439</fpage>&#8211;<lpage>473</lpage>.</mixed-citation></ref>
<ref id="B14"><mixed-citation publication-type="journal"><string-name><surname>Carlson</surname>, <given-names>Matthew</given-names></string-name>. <year>2021</year>. <article-title>&#8220;Skepticism and the Digital Information Environment.&#8221;</article-title> <source>SATS</source> <volume>22</volume> (<issue>2</issue>): <fpage>149</fpage>&#8211;<lpage>167</lpage>. <pub-id pub-id-type="doi">10.1515/sats-2021-0008</pub-id>.</mixed-citation></ref>
<ref id="B15"><mixed-citation publication-type="journal"><string-name><surname>Chesney</surname>, <given-names>Robert</given-names></string-name>, and <string-name><given-names>Danielle</given-names> <surname>Citron</surname></string-name>. <year>2019</year>. <article-title>&#8220;Deepfakes and the New Disinformation War: the Coming Age of Post-Truth Geopolitics.&#8221;</article-title> <source>Foreign Affairs</source> <volume>98</volume> (<issue>1</issue>): <fpage>147</fpage>&#8211;<lpage>155</lpage>.</mixed-citation></ref>
<ref id="B16"><mixed-citation publication-type="journal"><source>Child Pornography Prevention Act of 1996 (CPPA)</source>.</mixed-citation></ref>
<ref id="B17"><mixed-citation publication-type="journal"><string-name><surname>Currie</surname>, <given-names>Gregory</given-names></string-name>. <year>1999</year>. <article-title>&#8220;Visible Traces: Documentary and the Contents of Photographs.&#8221;</article-title> <source>The Journal of Aesthetics and Art Criticism</source> <volume>57</volume> (<issue>3</issue>): <fpage>285</fpage>&#8211;<lpage>297</lpage>. <pub-id pub-id-type="doi">10.2307/432195</pub-id>.</mixed-citation></ref>
<ref id="B18"><mixed-citation publication-type="journal"><string-name><surname>de Ruiter</surname>, <given-names>Adrienne</given-names></string-name>. <year>2021</year>. <article-title>&#8220;The Distinct Wrong of Deepfakes.&#8221;</article-title> <source>Philosophy and Technology</source> <volume>34</volume> (<issue>4</issue>): <fpage>1311</fpage>&#8211;<lpage>1332</lpage>. <pub-id pub-id-type="doi">10.1007/s13347-021-00459-2</pub-id>.</mixed-citation></ref>
<ref id="B19"><mixed-citation publication-type="journal"><string-name><surname>Doane</surname>, <given-names>Mary Ann</given-names></string-name>. <year>2007</year>. <article-title>&#8220;Indexicality: Trace and Sign: Introduction.&#8221;</article-title> <source>differences</source> <volume>18</volume> (<issue>1</issue>): <fpage>1</fpage>&#8211;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1215/10407391-2006-020</pub-id>.</mixed-citation></ref>
<ref id="B20"><mixed-citation publication-type="book"><string-name><surname>Dworkin</surname>, <given-names>Ronald</given-names></string-name>. <year>1985</year>. <chapter-title>&#8220;Do We Have a Right to Pornography?&#8221;</chapter-title> In <source>A Matter of Principle</source>, edited by <string-name><given-names>Ronald</given-names> <surname>Dworkin</surname></string-name>, <fpage>335</fpage>&#8211;<lpage>372</lpage>. <publisher-loc>Harvard</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</mixed-citation></ref>
<ref id="B21"><mixed-citation publication-type="journal"><string-name><surname>Eaton</surname>, <given-names>Ann W.</given-names></string-name> <year>2007</year>. <article-title>&#8220;A Sensible Antiporn Feminism.&#8221;</article-title> <source>Ethics</source> <volume>117</volume> (<issue>4</issue>): <fpage>674</fpage>&#8211;<lpage>715</lpage>. <pub-id pub-id-type="doi">10.1086/519226</pub-id>.</mixed-citation></ref>
<ref id="B22"><mixed-citation publication-type="journal"><string-name><surname>Fallis</surname>, <given-names>Don</given-names></string-name>. <year>2021</year>. <article-title>&#8220;The Epistemic Threat of Deepfakes.&#8221;</article-title> <source>Philosophy and Technology</source> <volume>34</volume> (<issue>4</issue>): <fpage>623</fpage>&#8211;<lpage>643</lpage>. <pub-id pub-id-type="doi">10.1007/s13347-020-00419-2</pub-id>.</mixed-citation></ref>
<ref id="B23"><mixed-citation publication-type="webpage"><string-name><surname>Farid</surname>, <given-names>Hany</given-names></string-name>. <year>2004</year>. <source>Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act</source>. <publisher-name>Department of Computer Science, Dartmouth College</publisher-name>, Technical Report TR2004&#8211;518. <uri>https://digitalcommons.dartmouth.edu/cs_tr/255/</uri>.</mixed-citation></ref>
<ref id="B24"><mixed-citation publication-type="journal"><string-name><surname>Floridi</surname>, <given-names>Luciano</given-names></string-name>. <year>2018</year>. <article-title>&#8220;Artificial Intelligence, Deepfakes and a Future of Ectypes.&#8221;</article-title> <source>Philosophy &amp; Technology</source> <volume>31</volume>: <fpage>317</fpage>&#8211;<lpage>321</lpage>. <pub-id pub-id-type="doi">10.1007/s13347-018-0325-3</pub-id>.</mixed-citation></ref>
<ref id="B25"><mixed-citation publication-type="journal"><string-name><surname>Goudge</surname>, <given-names>Thomas A.</given-names></string-name> <year>1965</year>. <article-title>&#8220;Peirce&#8217; s Index.&#8221;</article-title> <source>Transactions of the Charles S. Peirce Society</source> <volume>1</volume> (<issue>2</issue>): <fpage>52</fpage>&#8211;<lpage>70</lpage>.</mixed-citation></ref>
<ref id="B26"><mixed-citation publication-type="journal"><string-name><surname>Hansen</surname>, <given-names>Jonas Kjeldbjerg</given-names></string-name>, and <string-name><given-names>Thomas</given-names> <surname>Balslev</surname></string-name>. <year>2009</year>. <article-title>&#8220;Hand Activities in Infantile Masturbation: A Video Analysis of 13 Cases.&#8221;</article-title> <source>European Journal of Paediatric Neurology</source> <volume>13</volume> (<issue>6</issue>): <fpage>508</fpage>&#8211;<lpage>510</lpage>. <pub-id pub-id-type="doi">10.1016/j.ejpn.2008.10.007</pub-id>.</mixed-citation></ref>
<ref id="B27"><mixed-citation publication-type="webpage"><string-name><surname>Healy</surname>, <given-names>Margaret A.</given-names></string-name> <year>2004</year>. <source>Child Pornography: An International Perspective</source>. Computer Crime Research Center, prepared for the World Congress against Commercial Sexual Exploitation of Children, ECPAT (U.S. Embassy Stockholm). <uri>http://www.crime-research.org/articles/536/</uri>.</mixed-citation></ref>
<ref id="B28"><mixed-citation publication-type="journal"><string-name><surname>Henkin</surname>, <given-names>Louis</given-names></string-name>. <year>1963</year>. <article-title>&#8220;Morals and the Constitution: The Sin of Obscenity.&#8221;</article-title> <source>Columbia Law Review</source> <volume>63</volume> (<issue>3</issue>): <fpage>391</fpage>&#8211;<lpage>414</lpage>.</mixed-citation></ref>
<ref id="B29"><mixed-citation publication-type="journal"><string-name><surname>Hopkins</surname>, <given-names>Robert</given-names></string-name>. <year>2012</year>. <article-title>&#8220;Factive Pictorial Experience: What&#8217; s Special about Photographs?&#8221;</article-title> <source>No&#251;s</source> <volume>46</volume> (<issue>4</issue>): <fpage>709</fpage>&#8211;<lpage>731</lpage>. <pub-id pub-id-type="doi">10.1111/j.1468-0068.2010.00800.x</pub-id>.</mixed-citation></ref>
<ref id="B30"><mixed-citation publication-type="journal"><string-name><surname>Introna</surname>, <given-names>Lucas D.</given-names></string-name> <year>1997</year>. <article-title>&#8220;Privacy and the Computer: Why We Need Privacy in the Information Society.&#8221;</article-title> <source>Metaphilosophy</source> <volume>28</volume> (<issue>3</issue>): <fpage>259</fpage>&#8211;<lpage>275</lpage>. <pub-id pub-id-type="doi">10.1111/1467-9973.00055</pub-id>.</mixed-citation></ref>
<ref id="B31"><mixed-citation publication-type="book"><string-name><surname>Johnson</surname>, <given-names>Robert</given-names></string-name>. <year>1898</year>. <source>The Complete Treatise on the Art of Retouching Photographic Negatives and Clear Directions How to Finish &amp; Colour Photographs</source>. <publisher-loc>London</publisher-loc>: <publisher-name>Marion &amp; Co</publisher-name>.</mixed-citation></ref>
<ref id="B32"><mixed-citation publication-type="book"><string-name><surname>Kauser</surname>, <given-names>Kitty</given-names></string-name>. <year>2007</year>. <source>Shadow Sites: Photography, Archaeology and the British Landscape 1927&#8211;1955</source>. <publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</mixed-citation></ref>
<ref id="B33"><mixed-citation publication-type="journal"><string-name><surname>Koppelman</surname>, <given-names>Andrew</given-names></string-name>. <year>2005</year>. <article-title>&#8220;Does Obscenity Cause Moral Harm?&#8221;</article-title> <source>Columbia Law Review</source> <volume>105</volume> (<issue>5</issue>): <fpage>1635</fpage>&#8211;<lpage>1679</lpage>.</mixed-citation></ref>
<ref id="B34"><mixed-citation publication-type="webpage"><string-name><surname>Krone</surname>, <given-names>Tony</given-names></string-name>. <year>2004</year>. <source>A Typology of Online Child Pornography Offending</source>. Trends &amp; issues in crime and criminal justice (<publisher-name>Australian Institute of Criminology</publisher-name>, <publisher-loc>Canberra</publisher-loc>). <uri>https://www.aic.gov.au/publications/tandi/tandi279</uri>.</mixed-citation></ref>
<ref id="B35"><mixed-citation publication-type="journal"><string-name><surname>Langton</surname>, <given-names>Rae</given-names></string-name>. <year>1993</year>. <article-title>&#8220;Speech Acts and Unspeakable Acts.&#8221;</article-title> <source>Philosophy and Public Affairs</source> <volume>22</volume> (<issue>4</issue>): <fpage>293</fpage>&#8211;<lpage>330</lpage>.</mixed-citation></ref>
<ref id="B36"><mixed-citation publication-type="journal"><string-name><surname>Levy</surname>, <given-names>Neil</given-names></string-name>. <year>2002</year>. <article-title>&#8220;Virtual Child Pornography: The Eroticization of Inequality.&#8221;</article-title> <source>Ethics and Information Technology</source> <volume>4</volume> (<issue>4</issue>): <fpage>319</fpage>&#8211;<lpage>323</lpage>. <pub-id pub-id-type="doi">10.1023/a:1021372601566</pub-id>.</mixed-citation></ref>
<ref id="B37"><mixed-citation publication-type="book"><string-name><surname>Longino</surname>, <given-names>Helen</given-names></string-name>. <year>1980</year>. <chapter-title>&#8220;What Is Pornography?&#8221;</chapter-title> In <source>Take Back the Night: Women on Pornography</source>, edited by <string-name><given-names>Laura</given-names> <surname>Lederer</surname></string-name>, <fpage>40</fpage>&#8211;<lpage>54</lpage>. <publisher-loc>New York</publisher-loc>: <publisher-name>William Morrow</publisher-name>.</mixed-citation></ref>
<ref id="B38"><mixed-citation publication-type="book"><string-name><surname>Lovelace</surname>, <given-names>Linda</given-names></string-name>, and <string-name><given-names>Mike</given-names> <surname>McGrady</surname></string-name>. <year>1980</year>. <source>Ordeal</source>. <publisher-loc>Secaucus, New Jersey</publisher-loc>: <publisher-name>Citadel Press</publisher-name>.</mixed-citation></ref>
<ref id="B39"><mixed-citation publication-type="book"><string-name><surname>MacKinnon</surname>, <given-names>Catharine A.</given-names></string-name> <year>1987</year>. <chapter-title>&#8220;Not a Moral Issue.&#8221;</chapter-title> In <source>Feminism Unmodified: Discourses on Life and Law</source>, edited by <string-name><given-names>Catharine A.</given-names> <surname>MacKinnon</surname></string-name>, <fpage>146</fpage>&#8211;<lpage>162</lpage>. <publisher-loc>Cambridge, Massachusetts</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</mixed-citation></ref>
<ref id="B40"><mixed-citation publication-type="book"><string-name><surname>MacKinnon</surname>, <given-names>Catharine A.</given-names></string-name>, and <string-name><given-names>Andrea</given-names> <surname>Dworkin</surname></string-name>. <year>1997</year>. <source>In Harm&#8217; s Way: the Pornography Civil Rights Hearings</source>. <publisher-loc>Cambridge, Massachusettes</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</mixed-citation></ref>
<ref id="B41"><mixed-citation publication-type="journal"><string-name><surname>May</surname>, <given-names>Larry</given-names></string-name>, and <string-name><given-names>Marilyn</given-names> <surname>Friedman</surname></string-name>. <year>1985</year>. <article-title>&#8220;Harming Women as a Group.&#8221;</article-title> <source>Social Theory and Practice</source> <volume>11</volume> (<issue>2</issue>): <fpage>207</fpage>&#8211;<lpage>34</lpage>.</mixed-citation></ref>
<ref id="B42"><mixed-citation publication-type="journal"><string-name><surname>McDonald</surname>, <given-names>Aleecia M.</given-names></string-name>, and <string-name><given-names>Lorrie</given-names> <surname>FaithCranor</surname></string-name>. <year>2008</year>. <article-title>&#8220;The Cost of Reading Privacy Policies.&#8221;</article-title> <source>I/S: a Journal of Law and Policy for the Information Society</source> <volume>4</volume> (<issue>3</issue>): <fpage>540</fpage>&#8211;<lpage>565</lpage>.</mixed-citation></ref>
<ref id="B43"><mixed-citation publication-type="journal"><string-name><surname>McMullan</surname>, <given-names>John</given-names></string-name>. <year>2011</year>. <article-title>&#8220;The Digital Moving Image: Revising Indexicality and Transparency.&#8221;</article-title> Diegetic Life Form II: Creative Arts Practice and New Media Scholarship, Murdoch University, Western Australia, published in <source>IM Interactive Media: e-journal of the National Academy of Screen and Sound</source> <volume>7</volume>: <fpage>1</fpage>&#8211;<lpage>16</lpage>.</mixed-citation></ref>
<ref id="B44"><mixed-citation publication-type="webpage"><collab>NAPAC</collab>. <year>2016</year>. <source>Media Guidelines for Reporting Child Abuse</source>. <publisher-name>National Association for People Abused in Childhood (NAPAC)</publisher-name> Media Guidelines. <uri>https://web.archive.org/web/20250806123751/https://napac.org.uk/wp-content/uploads/2016/06/NAPAC-media-guidelines-FINAL-Jan-2016.pdf</uri>.</mixed-citation></ref>
<ref id="B45"><mixed-citation publication-type="journal"><collab>New York v. Ferber</collab>. <year>1982</year>. <article-title>458 U.S. 747</article-title>.</mixed-citation></ref>
<ref id="B46"><mixed-citation publication-type="journal"><string-name><surname>&#214;hman</surname>, <given-names>Carl</given-names></string-name>. <year>2020</year>. <article-title>&#8220;Introducing the Pervert&#8217;s Dilemma: a Contribution to the Critique of Deepfake Pornography.&#8221;</article-title> <source>Ethics and Information Technology</source> <volume>22</volume> (<issue>2</issue>): <fpage>133</fpage>&#8211;<lpage>140</lpage>. <pub-id pub-id-type="doi">10.1007/s10676-019-09522-1</pub-id>.</mixed-citation></ref>
<ref id="B47"><mixed-citation publication-type="journal"><string-name><surname>Patridge</surname>, <given-names>Stephanie L.</given-names></string-name> <year>2013</year>. <article-title>&#8220;Pornography, ethics, and video games.&#8221;</article-title> <source>Ethics and Information Technology</source> <volume>15</volume> (<issue>1</issue>): <fpage>25</fpage>&#8211;<lpage>34</lpage>. <pub-id pub-id-type="doi">10.1007/s10676-012-9310-1</pub-id>.</mixed-citation></ref>
<ref id="B48"><mixed-citation publication-type="book"><string-name><surname>Peirce</surname>, <given-names>Charles Sanders</given-names></string-name>. <year>1931</year>. <source>The Collected Papers of Charles Sanders Peirce</source>. <publisher-loc>Cambridge Massachusettes</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</mixed-citation></ref>
<ref id="B49"><mixed-citation publication-type="journal"><string-name><surname>Pettersson</surname>, <given-names>Mikael</given-names></string-name>. <year>2011</year>. <article-title>&#8220;Depictive Traces: On the Phenomenology of Photography.&#8221;</article-title> <source>Journal of Aesthetics and Art Criticism</source> <volume>69</volume> (<issue>2</issue>): <fpage>185</fpage>&#8211;<lpage>196</lpage>. <pub-id pub-id-type="doi">10.1111/j.1540-6245.2011.01460.x</pub-id>.</mixed-citation></ref>
<ref id="B50"><mixed-citation publication-type="journal"><string-name><surname>Phillips</surname>, <given-names>Dawn M.</given-names></string-name> <year>2009</year>. <article-title>&#8220;Photography and Causation: Responding to Scruton&#8217; s Scepticism.&#8221;</article-title> <source>British Journal of Aesthetics</source> <volume>49</volume> (<issue>4</issue>): <fpage>327</fpage>&#8211;<lpage>340</lpage>. <pub-id pub-id-type="doi">10.1093/aesthj/ayp036</pub-id>.</mixed-citation></ref>
<ref id="B51"><mixed-citation publication-type="thesis"><string-name><surname>Poremba</surname>, <given-names>Cynthia</given-names></string-name>. <year>2011</year>. <chapter-title>&#8220;Real/Unreal: Crafting Actuality in the Documentary Videogame.&#8221;</chapter-title> PhD Dissertation, <publisher-name>Concordia University</publisher-name>.</mixed-citation></ref>
<ref id="B52"><mixed-citation publication-type="webpage"><string-name><surname>Prosser</surname>, <given-names>William L.</given-names></string-name> <year>1960</year>. <article-title>&#8220;Privacy.&#8221;</article-title> <source>California Law Review</source> <volume>48</volume> (<issue>3</issue>): <fpage>383</fpage>&#8211;<lpage>423</lpage>. <pub-id pub-id-type="doi">10.15779/Z383J3C</pub-id>. <uri>http://dx.doi.org/doi:10.15779/Z383J3C%5Cnhttp://scholarship.law.berkeley.edu/californialawreview/vol48/iss3/1</uri>.</mixed-citation></ref>
<ref id="B53"><mixed-citation publication-type="book"><string-name><surname>Putnam</surname>, <given-names>Hilary</given-names></string-name>. <year>1979</year>. <chapter-title><italic>Reason</italic></chapter-title>, <source>Truth and History</source>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</mixed-citation></ref>
<ref id="B54"><mixed-citation publication-type="journal"><string-name><surname>Rea</surname>, <given-names>Michael C.</given-names></string-name> <year>2001</year>. <article-title>&#8220;What Is Pornography?&#8221;</article-title><source>No&#251;s</source> <volume>35</volume> (<issue>1</issue>): <fpage>118</fpage>&#8211;<lpage>145</lpage>. <pub-id pub-id-type="doi">10.1111/0029-4624.00290</pub-id>.</mixed-citation></ref>
<ref id="B55"><mixed-citation publication-type="journal"><collab>Regina v. Hicklin</collab>. <year>1868</year>. <article-title>L. R. 3 Q. B. 360</article-title>.</mixed-citation></ref>
<ref id="B56"><mixed-citation publication-type="journal"><string-name><surname>Rini</surname>, <given-names>Regina</given-names></string-name>. <year>2020</year>. <article-title>&#8220;Deepfakes and the Epistemic Backstop.&#8221;</article-title> <source>Philosophers&#8217; Imprint</source> <volume>20</volume> (<issue>24</issue>): <fpage>1</fpage>&#8211;<lpage>16</lpage>.</mixed-citation></ref>
<ref id="B57"><mixed-citation publication-type="journal"><string-name><surname>Rini</surname>, <given-names>Regina</given-names></string-name>, and <string-name><given-names>Leah</given-names> <surname>Cohen</surname></string-name>. <year>2022</year>. <article-title>&#8220;Deepfakes, Deep Harms.&#8221;</article-title> <source>Journal of Ethics and Social Philosophy</source> <volume>22</volume> (<issue>2</issue>): <fpage>143</fpage>&#8211;<lpage>161</lpage>. <pub-id pub-id-type="doi">10.26556/jesp.v22i2.1628</pub-id>.</mixed-citation></ref>
<ref id="B58"><mixed-citation publication-type="book"><string-name><surname>Schriever</surname>, <given-names>J. B.</given-names></string-name> <year>1908</year>. <source>Complete Self-Instructing Library of Practical Photography, Volume X: Negative Retouching, Etching and Modeling</source>. Vol. <volume>X</volume>. <publisher-loc>Pennsylvania</publisher-loc>: <publisher-name>American School of Art and Photography</publisher-name>.</mixed-citation></ref>
<ref id="B59"><mixed-citation publication-type="journal"><string-name><surname>Scruton</surname>, <given-names>Roger</given-names></string-name>. <year>1981</year>. <article-title>&#8220;Photography and Representation.&#8221;</article-title> <source>Critical Enquiry</source> <volume>7</volume> (<issue>3</issue>): <fpage>577</fpage>&#8211;<lpage>603</lpage>.</mixed-citation></ref>
<ref id="B60"><mixed-citation publication-type="book"><string-name><surname>Shallit</surname>, <given-names>Jeffrey</given-names></string-name>. <year>1996</year>. <chapter-title>&#8220;Public Networks and Censorship.&#8221;</chapter-title> In <source>High Noon on the Electronic Frontier</source>, edited by <string-name><given-names>Peter</given-names> <surname>Ludlow</surname></string-name>, <fpage>275</fpage>&#8211;<lpage>289</lpage>. <publisher-loc>Cambridge, Massachusetts</publisher-loc>: <publisher-name>MIT Press</publisher-name>.</mixed-citation></ref>
<ref id="B61"><mixed-citation publication-type="book"><string-name><surname>Sontag</surname>, <given-names>Susan</given-names></string-name>. <year>2005</year> (e-book edition, originally published 1977). <source>On Photography</source>. <publisher-name>Rosetta Books</publisher-name>.</mixed-citation></ref>
<ref id="B62"><mixed-citation publication-type="book"><string-name><surname>Strikwerda</surname>, <given-names>Litska</given-names></string-name>. <year>2011</year>. <chapter-title>&#8220;Virtual Child Pornography: Why Images Do Harm from a Moral Perspective.&#8221;</chapter-title> In <source>Trust and Virtual Worlds</source>, edited by <string-name><given-names>Charles</given-names> <surname>Ess</surname></string-name> and <string-name><given-names>May</given-names> <surname>Thoresth</surname></string-name>, <fpage>139</fpage>&#8211;<lpage>161</lpage>. <publisher-loc>New York</publisher-loc>: <publisher-name>Peter Lang Publishing, Inc</publisher-name>.</mixed-citation></ref>
<ref id="B63"><mixed-citation publication-type="journal"><string-name><surname>Taylor</surname>, <given-names>Max</given-names></string-name>, <string-name><given-names>Gemma</given-names> <surname>Holland</surname></string-name>, and <string-name><given-names>Ethel</given-names> <surname>Quayle</surname></string-name>. <year>2001</year>. <article-title>&#8220;Typology of Paedophile Picture Collections.&#8221;</article-title> <source>The Police Journal</source> <volume>74</volume> (<issue>2</issue>): <fpage>97</fpage>&#8211;<lpage>107</lpage>. <pub-id pub-id-type="doi">10.1177/0032258X0107400202</pub-id>.</mixed-citation></ref>
<ref id="B64"><mixed-citation publication-type="book"><string-name><surname>Taylor</surname>, <given-names>Max</given-names></string-name>, and <string-name><given-names>Ethel</given-names> <surname>Quayle</surname></string-name>. <year>2003</year>. <source>Child Pornography: An Internet Crime</source>. <publisher-loc>Hove</publisher-loc>: <publisher-name>Brunner-Routledge</publisher-name>.</mixed-citation></ref>
<ref id="B65"><mixed-citation publication-type="journal"><collab>The UN Convention of the Rights of the Child</collab>. <year>2010</year>. <article-title>The Children&#8217; s Rights Alliance</article-title>.</mixed-citation></ref>
<ref id="B66"><mixed-citation publication-type="journal"><string-name><surname>Walton</surname>, <given-names>Kendall L.</given-names></string-name> <year>1984</year>. <article-title>&#8220;Transparent Pictures: On the Nature of Photographic Realism.&#8221;</article-title> <source>Critical Inquiry</source> <volume>11</volume> (<issue>2</issue>): <fpage>246</fpage>&#8211;<lpage>277</lpage>.</mixed-citation></ref>
<ref id="B67"><mixed-citation publication-type="book"><string-name><surname>Williams</surname>, <given-names>B.</given-names></string-name> <year>1981</year>. <source>Obscenity and Film Censorship: An Abridgement of the Williams Report</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>.</mixed-citation></ref>
</ref-list>
</back>
</article>