Wow Max and DF DG this is impressive. See following (some are nits others more than that I hope). Slide 6 IDPV system vs. services, should this be one thing? Systems in first sentence then services thereafter. It is not just AI related techniques that may decrease the effectiveness, it is also the ability to substitute the image/meta/info. These are more in the security domain that AI domain imo. Slide 7 Legal Identities are verified by a human being attributing to the ability to be authoritative, then enabling the remote proofing. Slde 8 perhaps first bullet, perhaps establishing a unique individual vs. an individual's uniqueness. Authentication - so this sounds like authentication for access which is not the same, imo, as authentication for identity proofing. Slide 11 Terrorism and Critical Infrastruture would seem on par to me or the same? Perhaps widen horizontal axis so that the personal fraud and job loss are not so close to neutral, since the extent of the threat will depend on the perspective. Slide 12 metadata and signatures are involved in faking content as well. DF could also be used to create a denial of service or negative impersonation? Slide 16 text color and bullet differences Slide 17 can be a camera swap as well as virtual. Slide 18 commercially available, to almost anyone, the technology to generate the fakes (touched on in next slide on role of generative AI). Moore's Law has a lot to do with this. Slide 21 sensor attack as opposed to before or after. Slide 26, is the edge device always in control by the person? One approach could be to provide an edge devices as part of the process, using device authentication.. Slide 31 SEIM vs SIEM (more used to the later) Slide 36 So what impresses me about the content here is the system level analysis, which includes looking at the entire "supply chain" and workflow here. Taking this approach would seem a key recommendation. Slide 42 perhaps some discussion of cryptographic attack vectors, need for post-quantum as an example particular for the top left nation state threats. Also applies to Slide 43. This shows up in Slide 45. Slide 44 same comment as earlier, substitution attack. Slide 51 perhaps 27701 Slide 53 no other certifications (FBI)? From: maxine most <cmaxmost@acuity-mi.com> Sent: Sunday, December 8, 2024 7:46 PM To: dg-deepfakesidv@kantarainitiative.org Subject: [DG-DeepfakesIDV] Deck Update Thanks for your recommendations, suggestions, edits, etc. I have tried to incorporate everything that was sent to me. If I missed something or did not accurately represent your comments and feedback, please let me know. We are still missing: * Slide 2 - Executive Summary * Slide 9- Definitions of Liveness and PAD * Slide 11 - any feedback on the DF Spectrum We should wrap this up at our Wednesday meeting and all enjoy the holidays. (-: C. Maxine Most Principal, Acuity Market Intelligence +1 720 530 5836 640 W. Linden St, Louisville, CO 80027, USA www.acuitymi.com<http://www.acuitymi.com> <https://www.linkedin.com/in/maxinemost/> <https://twitter.com/cmaxmost>