Cybercriminals hunt for data of all kinds: personal details, photos, videos and even ways that users interact with others; this data is often stolen from social networks. Stolen data is often posted elsewhere online to be sold to other criminals looking to make a profit.
Are people stealing your personal Facebook photos and putting them on porn sites? http://t.co/CZDRLqciDS
— The Daily Dot (@dailydot) May 22, 2015
With that said, a digital ID is made up of much more than social media accounts. As technology continues to make advancements, so does the amount of components of our online identity that can be stolen or forged.
It’s already possible to put on the face of another person during a video call. With the correct approach it can look so realistic that you’d hardly distinguish between the forgery and a real person.
There was an app in 2011, which could overlay a face from a photo onto a moving face in a video, dynamically, in real time. Have you ever dreamt of Angelina Jolie’s lips or Brad Pitt’s face? No need for Photoshop here, just a creepy app.
Of course, in 2011 the algorithm was imperfect. After four years on Facebook Oculus Rift developers and researchers at the University of Southern California demonstrated a way to track the facial expressions of someone wearing a virtual-reality headset and to transfer them to a virtual character. That could make for online games and even more. Just imagine, how tough would Warcraft or other massively multiplayer online role-playing game (MMORPG) characters look with your glowering face expression! Sounds interesting.
It was clear that people would also be able to exchange facial gestures in video chat,. Recently researchers from Stanford have presented a solution for this.
Sounds great, but as usual every new development can be used for good and for evil — to deceive, defraud and gain profit in illegal way. And be sure, cybercriminals are very creative when it comes to exploiting technology to make money.
Currently people use their fingerprints to enter gyms, which belong to the popular American fitness center chain 24 Hour Fitness. Patients of New York University medical center show their palms instead of their insurance cards, as PatientSecure system scans unique vein patterns in their hands.
#Fingerprints and #iris scans are insecure and can even stitch you up. #cybercrime #biometrics #security
But let’s look at the situation in a different way. We use passwords to access Internet services. When a password is compromised, you can easily change it. Speaking of plastic credit cards, they can be quickly substituted as well — in a week or two — if they are lost or stolen.
Imagine, that you use parts of your body for identification, such as fingerprints or iris scans. Can you make new body parts, if cybercriminals make copies of the old ones?
Victims of identity theft can wait from three to five years before the problem is fixed.
In 2009, Scientists discovered they could fabricate 'fake' DNA evidence.
— Wikipedia (@WikipediaPage) July 30, 2013
There are instances where one cannot wait that long as research has shown that it is feasible to fake DNA, imagine if that is planted at a crime scene.
Can we fake it?
As it turns out, it’s not that hard to compromise another person’s biometrics, such as fingerprints and iris scans. The worst part is that one can do it remotely. A German biometrics specialist Jan Krisller, who had risen to fame after hacking Apple’s TouchID, recently discovered how to copy iris and fingerprints from high resolution photos.
Starbug's in your eyes: German hacker spoofs iris recognition | https://t.co/HctpvVXs8H
— SCMagazine (@SCMagazine) October 27, 2015
Starbug shares how he can #hack fingerprint sensors. Including iPhone! #biometrics2015 pic.twitter.com/uMQdIc6Js8
— Mike Wood (@MikeRwood) October 15, 2015
Forging fingerprints is just as easy. For example, Krissler did it with a common SLR camera and a 200mm lens. With a photo of the victim’s hand criminals can make a dummy and pass the fingerprint scanner just as easily.
Tips and Tricks to Hide from #BigBrother Watchful Eye https://t.co/xJ6VqqUKuo pic.twitter.com/oeNopI12hL
— Kaspersky Lab (@kaspersky) October 9, 2015