2024-02-28 DeepfakesIDV DG Meeting Notes DRAFT

Meeting status metadata

Quorum

quorate

Notes-Status

Ready for review

Approved-Link

 

The meeting status metadata table is used for summary reports - copy the status macros from the table in these instructions:

Quorum: quorate not quorate

Notes-Status: drafting Ready for review approved

Approved-Link: Insert a link to the Meeting Notes page holding the approval decision for this notes page

 

Agenda

  • Call meeting to order

  • Roll call & determination of voting participant quorum

  • Agenda bashing

  • Approval of previous minutes

  • Announcements

  • Main discussion items (see table below)

  • AOB

  • Adjourn meeting

 Attendees

Voting participants

Voter

Organization

Presence

Voter

Organization

Presence

Ajay Amlani

iProov

 

Andrew Hughes

FaceTec, Inc.

Present

Ashok Singal

Demystify Biometrics

 

Chris LaBarbera

Verizon

 

Denny Prvu

RBC Royal Bank of Canada

 

Iain Corby

SafetyTech Limited

 

Jay Meier

FaceTec, Inc.

Present

Jim Pasquale

Chasm Crossing Solutions

Present

Jordan Burris

Socure

 

Justin Byrd

N/A

Present

Maxine Most

Acuity Market Intelligence

Present

Mike Magrath

Easy Dynamics

Present

Peter Davis

Airside Mobile, Inc

Present

Sean Lanzner

iProov

Present

Terry Brenner

FIDO Alliance

 

Non-Voting Participants

Participant

Organization

Presence

Participant

Organization

Presence

Anand Kumar

SecureKloud Technologies, Inc.

Present

Dan Bachenheimer

Accenture

Present

Dawid Jacobs

DAL Identity

Present

Michael Choudoin

N/A

Present

Michael Engle

1Kosmos

Present

Pieter Van Iperen

N/A

Present

Stephanie Schuckers

Clarkson University

Present

Uttam Reddi

Aware Corp

Present

Guests

Participant

Organization

Presence

Participant

Organization

Presence

Kay Chopard

Kantara

Present

Quorum determination

Meeting is quorate when 50% + 1 of voting participants attend

There are 15 voters as of 2024-02-28

Approval of Prior Minutes

Motion to approve meeting minutes listed below:

Moved by:

Seconded by:

Link to draft minutes and outcome

Discussion

Link to draft minutes and outcome

Discussion

 

 

 Discussion topics

Time

Item

Presenter

Notes

Time

Item

Presenter

Notes

 

Biometric inputs

Mike Chaudoin

  • Looked back at Biometric standards for ideas

    • ISO 30107-3 presentation attack detection - this is the typical system-architecture diagram that biometric folks are familiar with

 

image-20240228-170829.png
  • Discussion about how to bring the diagram into the discussion - so that we can speak to the biometrics-oriented audiences

  • Dan: there might be arrows missing if we overlay the IDPV flows and consider deepfakes - e.g. during enrollment, capture of the reference may go via the signal processor box into the data storage box.

  • Jay: where do injection attacks happen in this diagram?

    • Dan: for image processing, injections happen at #2 before templatization

  • Mike notes that this diagram was originally created for the fingerprint

  • Stephanie has an updated diagram that addresses deepfakes

 

image-20240228-172844.png

 

  • Joey: points out that the new world is both the biometric sampling and also now reference document modifications

    • Synthetically generated ID Documents should be in scope

  • Sean: a big part of the threat is the ability to scale the attacks - important considerations

  • Andrew: points out that we have to address physical document fakes during the transition towards digital ID documents (10-15 years)

Mike and Joey to work on updating the architecture diagram for the world of deepfakes - use it to point back into our other content work
  • This content area fits into “attack vectors”

    • Volunteers: Max, Dan

    • Need to add in new boxes for how images are brought into the reference database - e.g. morph image attacks

  •  

 

What to do with Heather’s content topics?

Jay

  • Discussion about how the “hacker motivations” topic areas should be handled

    • An option to merge into other content areas - e.g. who is a target/is vulnerable

    • Look for opportunities to include “motivations” into the other topic areas

A Book with content on cyber-crime motives: Industry of Anonymity: Inside the Business of Cybercrim…

 

Next week topic

 

Dawid: To present on forensics

Joey: to demonstrate live injection of deepfake into Zoom call

 

Places to follow

 

 Open Action items

Action items may be created inline on any page. This block shows all open action items from all meeting notes.

 

 Decisions