Unmasking Cybercrime Strengthening Digital Identity Verification against Deepfakes 2026

Page 18 of 23 · WEF_Unmasking_Cybercrime_Strengthening_Digital_Identity_Verification_against_Deepfakes_2026.pdf

Institutions (programme and governance layer) Institutions govern the broader risk management framework and ensure vendor compliance. The following governance- oriented recommendations are advised: 1. Risk-based deployment – Prioritize control rollouts for high-risk use cases such as account onboarding, account recovery or high-value transactions. Phased deployment based on exposure helps deliver rapid risk reduction with minimal customer impact. 2. Privacy and retention controls – Enforce minimal data retention, limited access and comprehensive audit trails for biometric and liveness data. These guardrails for responsible use reduce privacy and compliance risks while maintaining detection capabilities. 3. Customer transparency – Provide simple explanations about liveness prompts and lighting effects to reduce confusion and improve user experience. 4. Vendor procurement standards – Require vendors to deliver features such as virtual camera detection, compressed-stream scoring and explainable outcomes as part of procurement contracts. 5. Governance documentation – Maintain clear operational guidelines, thresholds and appeal mechanisms. This documentation and these operational guardrails ensure that decisions remain consistent, auditable and defensible. 6. Staff training and playbooks – Implement concise operational guides for customer support and escalation handling to ensure consistent responses and reduce errors. 7. Red team testing cadence – Conduct periodic simulation exercises to benchmark defences against evolving real- time face swap tools. 8. Layered verification models – Combine multiple verification signals (e.g. liveness, document validation, behavioural biometrics) to create a defence-in-depth architecture. 9. Government-condoned intelligence sharing – In the interest of public safety and national resilience, companies are permitted to share intelligence on tools or related information with government agencies and peer organizations (provided such disclosures are proportionate, purpose-specific and aligned with lawful exemptions to privacy legislation). 10. Wider implementation of government legislation to protect “right to identity” – Laws granting individuals copyright over their own face, voice and body could strengthen protections against face-swapping technologies and other deepfake threats, such as Denmark’s proposed “right to identity” law. Unmasking Cybercrime 18
Ask AI what this page says about a topic: