spoof the gait-recognition software
Spoofing is defined as using the “characteristics of a legitimate enrollee to fool a biometric system,” and can be accomplished in a myriad of ways (Li 134). Spoofing can be viewed as a form of countersurveillance, as it is a direct rebellion against what can be considered oppressive authority figures; such is Marcus’ case, as he’s fooling gait recognition software as a means to circumvent the security system. One example of spoofing that we briefly talked about in class is the URME mask:
The mask, created by Leo Selvaggio allows wearers to trick facial recognition software by hiding their true identity; the systems, instead, register Selvaggio’s face. A form of countersurveillance, I found this product particularly interesting; as you can see in the photo, wearing the prosthetic version of the mask renders the wearer virtually unrecognizable from the chin up. That said, it could pose an issue if wearers decide to commit crimes; law enforcement now has no way of establishing the perpetrator’s true identity. I think this is something to think about going forward as well as what the increased popularity of these types of items can mean for criminal activity.
However, spoofing also represents an important threat to the security and identities of individuals. For each of the common biometric systems, there currently exists a way to trick the system and gain entry. For example, fingerprint scans can be fooled by gummy fingerprints, voice recognition software can be tricked by recordings, and iris or facial scans can be tricked by using a detailed print out. The risk of compromise with biometric identification is greater, as we leave traces of our fingerprints and our DNA everywhere we go; similarly, our faces and voices are not protected and can be photographed and recorded with ease, especially in our digital society. Allison Burtch, the artist who visited our class made light of how easy it is to “transform” yourself into another person in a video we watched in class. Here's a link in case you want to see it again.
In my opinion, hacking via biometric spoofing should be perceived as worse; the other person now has your physical features, which represent your unique identity. This kind of hacking is much more personal than losing a password; that said, the results are equally as devastating.
I’m interested in whether or not you all think the benefits associated with biometric technology outweigh the risks and still justify their use for security.
Note: There’s an episode of CSI: Cyber where criminals are wearing a URME-esque mask while committing crimes. The episode is called “Selfie 2.0,” and you should check it out over break if you have a chance.
Sources
- Li, Stan Z., and Anil K. Jain. Encyclopedia of Biometrics. I-Z. New York: Springer, 2009. Print. *
- Ranger, Steve. "Crime of the Future--biometric Spoofing? | ZDNet." ZDNet. N.p., 21 July 2006. Web. 25 Nov. 2015. http://www.zdnet.com/article/crime-of-the-future-biometric-spoofing/.