With more people than ever now using the internet, the threshold for identity fraud has increased dramatically.
While many cases of spoofing fraud attacks are conducted through email or a computer, some forms of the attacks are less well known. One of the most well-known and dangerous forms of spoofing is facial spoofing – which consists of imitating or using a person’s face to pretend to be that person in order to trick the facial biometric identification systems to commit bank identity fraud.
In a recent post by RegTech firm Electronic IDentification, the company looked deeper into the problem of facial spoofing and considered how it is impacting the industry as well as how to get to grips with it.
According to the firm, the industry is already picking up this issue. In recent years, the development of anti-spoofing technology linked to cybersecurity has given rise to what is known as anti-spoofing face recognition. Facial anti-spoofing protection is an anti-spoofing technology that blocks and alerts the relevant authorities or entities related to protecting the rights of users and the firms they interact with on a daily basis.
How can spoofing attacks be performed? eID believes the most dangerous are common way is through facial spoofing fraud.
The company said, “Facial spoofing is the act of using a person’s face and simulating their facial biometrics with the use of a photo or video to steal their identity (becoming a digital identity theft). Although it can be used to commit various activities related to money laundering, a facial spoofing attack is most used to commit a crime linked to bank identity fraud.”
Alongside this is identity spoofing – particularly in online environments. This has increased substantially in recent years and is mostly used to create a bank account or to apply for a loan.
Identity spoofing fraud to open an online bank account is carried out by using face recognition spoofing mechanisms such as programmed videos, photos/selfies or even masks.
eID noted that a key way to deal with spoofing, especially in the case of online, is through digital onboarding. Such a process is fully automated and complies with the strictest AML regulations. Therefore, a firm can perform the same processes online and remotely with the same security as in the physical environment.
The company added that proof of life is part of the identity proofing process and serves to verify and authenticate a person’s identity. How can this be carried out? There are two ways.
The first, eID highlights, is face-to-face proof of identity – such as through an ID card or a passport. The second is through digital proof of life, by using an online identity verification process.
eID added that online proof of life through video streaming is the safest and most effective method to detect identity spoofing for different reasons. This is to certify that the person is not being forced as well as the integrity of the data, to detect deepfakes and to avoid the use of selfies and images that don’t comply with KYC and AML regulations.
Read the full post here.