AI created faces hiding you online
There are many reasons to hide the identity of employees without any additional influence from the new regulatory requirements that need to be complied to. For instance, this can usually be due to management figuring out that identity of staff can be a fast and convenient way into a company’s infrastructure and inject ransomware attacks directly into connected systems or steal intellectual property through either copying data or adding a LAN turtle to a secured network connection. Video blurring technology and AI created faces may hold the key to making it harder to gain access to a company.
If a person wants to get into a secure site the first step is to study the media coming out of the company for how the business runs, key personnel in each section, dress code and security. This key information comes from promotional videos, social media platforms or through monitoring corporate communications such as conference calls typically using a man-in-the-middle (MIM) attack. By using post production video blurring software for offline videos and AI created faces such as avatars for conference calls this makes this process much more difficult. AI created faces software essentially takes a picture of the user in each frame from the camera, identifies and maps features and then modifies them so biometrics cannot be copied; everyone on the call looks similar however different enough that a biometric scanner cannot use their image; this also helps with security identifying false IDs if scanned at the entry of the business. The great thing is that these real-time avatars move with the face of the person behind the camera, including showing teeth during talking and realistic hair movement. Essentially AI created faces are you but on a good day and while great for looking professional in remote conference calls from home they can be used with standard conference call backing software enabling you to pretend you are anywhere you want; furthermore, the avatar can be created prior and used during the call. This type of software is excellent if you need to impersonate your boss on a conference call to a client when they are busy on another call. As you move, so does the avatar and mapping works as you turn your head or body during the meeting; it is truly a robust solution.
More risk of identity theft
A few years ago, securing a business from onsite entry in part meant removing staff photos of the corporate website, however this is now not good enough due to video communications providing a convenient way to identify key personnel and edit still frames for photo ID production. Cards have chips for door access and are usually restricted to the work area the user resides in. A cybercriminal can walk past a targeted individual and scan their ID card and clone it later with a relatively cheap ID card printer, but without the same look of the card they may be caught by security or another staff member. Even the clips or lanyards can be printed to help reduce the risk of detection. Video blurring similar to avatars helps reduce the risk of cybercriminals entering the business based on information gathered to increase sales and brand loyalty.
Improved security through ambiguity
Before social engineering can take place to gain access by the cybercriminal to the site it is good to see who are useful roles in the company to know prior to entry and what areas they work in. For example, if it is known that Joe Bloggs works in R&D and you need to get in this area then it would make sense to first identify them through a photo and then wirelessly scan their id in a walk by attack. If they gather misleading information then it makes cybercriminals much easier to catch through falsifying avatar biometrics or just not showing faces where it isn’t needed in videos.