Spy Researchers Take on Biometric ID Hackers

skyla80/Shutterstock.com

A 4-year project just launched to develop artificial intelligence to automatically detect spoofed fingertips, facial images and irises.

With Americans increasingly using fingerprint recognition to secure everything from smartphones to U.S. borders, impostors are inventing some pretty creative ways to fake out biometric readers.

Now, the spy community is fighting back. A 4-year project just launched to develop artificial intelligence that should automatically detect spoofed fingertips, facial images and irises. 

Researchers at the Intelligence Advanced Research Projects Agency aim not only to spot prosthetic thumbs, images printed with ink that conducts a charge, or other proven deceptions. The machine will learn to predict attacks never seen before. 

"One of the ways we achieve that today is with a human in the loop," IARPA program manager Chris Boehnen told Nextgov in an interview. Cops are present when suspects are fingerprinted. At the Otay Mesa pedestrian crossing, U.S. Customs and Border Protection personnel assist with a new system for iris and facial identification of foreign travelers. In January, CBP officers started using mugshot-matching at John F. Kennedy International Airport to reduce passport fraud.

"Yes, the human helps improve the security of the process but it's not uncommon for humans to be the weak link in security processes," Boehnen said. 

The ideal biometric security systems should not just "find the attacks of today,” but also ruses “we've never even necessarily considered" as human beings, he said. In techie-jargon, this means the technologies will not be signature-based tools that look for patterns of identified attacks. Think of “anomaly detection" machines that look for odd behaviors instead.

Earlier this month, Boehnen met with about 100 people interested in proposing "presentation attack detectors" for a research and development program named after the Norse god, Odin

One stage of the project -- called Thor, the son of Odin who brings peace and justice -- will attempt to flag known and unknown scams. A final stage, dubbed Loki, who is a trickster in Norse mythology "known for causing chaos," will try to find weaknesses in the detection systems themselves, according to project slides. 

Boehnen mentioned the German hacking research group Chaos Computer Club as an example of the challenges biometric identification faces. In September 2013, the analysts showed how to fool the iPhone fingerprint security system with pink latex milk, less than two days after Apple released the first Touch ID-enabled smartphone. 

Foreigners Are Welcome

"Think about the state of computer security in say the mid- to-late- '90s. Everybody at this point had a personal computer for the most part -- but how many of them had antivirus?" Boehnen said.

Now, computer users are engaged in a game of cat and mouse with hackers.

"The goal here is to make sure that we don't find ourselves using technology, in this case biometrics, that we can't rely upon,” he said.

The threat of biometric cons came into focus in September 2015, when the U.S. government disclosed that suspected Chinese hackers stole fingerprint data on 5.6 million national security personnel from the Office of Personnel Management. 

Despite the fear that a nation state might abuse that very personal data, foreigners are allowed to help with the biometric spoofing-detection project. 

At IARPA, "we want to get the best research in the world and while I’m proud to say that that's commonly in the good ole U.S. of A., it may not always be," Boehnen said. So, "we're somewhat unique in the IC, in that we are able to support participation by foreign entities. And as this is an unclassified program we have no problems with participation."

But he stressed that foreigners will not be given any sort of preference over other competitors. Plus, they are barred from Loki, the part of the project where testers will try attacking the impostor-detection systems. That portion is classified. 

After the OPM hack, U.S. officials insisted "the ability to misuse fingerprint data is limited," but a federal working group will examine ways adversaries might exploit the stolen finger files. 

Boehnen said the ODIN program is not a response to the massive breach. In general, "the goal of this program is to help ensure that when a biometric system believes you are you -- that you really are,” he said.

Hacking is Pretty Cheap Now, But...

Right now, the cost of defeating fingerprint sensors on smartphones can be relatively low.

Michigan State University researchers in February published a paper demonstrating how simple it is to print an image of a fingerprint with enough accuracy to fool fingerprint readers. The technique only requires a standard inkjet printer along with some conductive ink and special paper, which The Atlantic estimates could cost about $450 total. 

"Silly putty and wood glue is pretty cheap," Boehnen said, referring to other media that can be used to imitate a finger.

Program funding has not been disclosed. Potential researchers were told to pick detector components that, if purchased in bulk today, would not exceed $5,000 combined. 

The price point for poseur-proofing a mobile device is probably lower than for safeguarding biometric access to a national security facility, Boehnen said. But the agency does not want participants spending gobs of money on a machine comprising a mass spectrometer or electron microscope, for instance, he said.

The idea is to capture multiple aspects of a live human body part, such as texture, light and three-dimensional structure, using special algorithms and hardware. Pieces could include, say, a motion detector, camera or an ultrasonic device. 

A request for proposals is expected to be released over the next couple of months.  

"We picked a number in today's terms that seemed high enough to allow cutting-edge stuff and limit the stuff that's obviously wrong -- but not really prevent the groundbreaking solution which is what we're looking for," Boehnen said. 

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.