General Information
Spaces
Apps
Templates
Create
DG - DeepfakesIDV
All content
Space settings
Content
Results will update as you type.
Moved shortcuts
Participant Roster
Charter
Mailing List and List Archive
Topic Area Content Pages
OUTPUTS of the group
A.1 Glossaries
A.2 ID Proofing and Verification Systems - Overall
A.3 Artificial Intelligence - in the context of IDPV Systems
A.4 Simulated humans and synthetic identity - context
B.1 Current threats and attack vectors
B.2 Hacker motivations
B.3 Phone/Voice vector attacks and defences
B.4 A collection of real world incidents
C.1 Prevention and Countermeasures
E.1 A Collection of regulatory materials (and public-sector-related material)
Mind maps
Audiences and Segmentation
Revised Group Context Paragraphs
Recent Page Updates
Source Material
Presentations, reports, papers based on Deepfakes content!
Meeting notes
NIST-RFx - AI
DG Planning
Wiki building materials - to be removed soon
Regula Survey on the Impact of Deepfakes on ID Verification
You‘re viewing this with anonymous access, so some content might be blocked.
Close
DG - DeepfakesIDV
/
B.2 Hacker motivations
B.2 Hacker motivations
Andrew Hughes
Heather Vescent
Owned by
Andrew Hughes
Last updated:
Nov 08, 2023
by
Heather Vescent
1 min read
Analytics
Loading data...
Topic area lead: Heather Vescent
Testing editing function by HV.
File
Modified
No files shared here yet.
, multiple selections available,
{"serverDuration": 46, "requestCorrelationId": "ac830514eb0546a589c89b622dbb5399"}