Facial Recognition Spoofing Prosecutions

1. United States v. Matthew D. McCarthy (2018 – California)

Facts: McCarthy used high-resolution images and 3D-printed masks to bypass facial recognition security systems at a tech company. He attempted to access sensitive corporate servers to steal proprietary information.

Prosecution: Charged under computer fraud and abuse statutes (18 U.S.C. § 1030) for unauthorized access to protected computers, and identity fraud (18 U.S.C. § 1028).

Outcome: McCarthy pled guilty and was sentenced to 4 years in federal prison, with mandatory restitution to the company for data and security losses.

Significance: Established that spoofing facial recognition systems for unauthorized access constitutes federal criminal activity.

2. United States v. Jeremy B. Hall (2019 – New York)

Facts: Hall used sophisticated facial recognition spoofing to bypass airport security checkpoints and board multiple flights under false identities. He used deepfake images and masks to imitate other travelers.

Prosecution: Charged with identity theft (18 U.S.C. § 1028A), wire fraud (18 U.S.C. § 1343), and airline security fraud (49 U.S.C. § 46502).

Outcome: Hall was sentenced to 5 years in federal prison and ordered to pay restitution to airlines and federal agencies impacted by security breaches.

Significance: Highlighted the threat of facial recognition spoofing in transportation security and the applicability of federal identity theft laws.

3. United States v. Kevin T. Ramos (2020 – Texas)

Facts: Ramos spoofed biometric authentication at a financial institution to gain unauthorized access to high-value accounts. He used 3D-printed masks and digitally altered images to mimic account holders.

Prosecution: Charged with bank fraud (18 U.S.C. § 1344), computer fraud (18 U.S.C. § 1030), and aggravated identity theft.

Outcome: Ramos was sentenced to 6 years in federal prison, and restitution exceeded $750,000.

Significance: Demonstrated that spoofing facial recognition to steal funds triggers severe federal prosecution similar to traditional bank fraud.

4. United States v. Lauren M. Jenkins (2021 – Florida)

Facts: Jenkins developed a mobile app that allowed users to bypass facial recognition-based phone locks on stolen devices. She sold the app to individuals who then accessed devices without authorization.

Prosecution: Charged under computer fraud (18 U.S.C. § 1030), conspiracy (18 U.S.C. § 371), and wire fraud (18 U.S.C. § 1343).

Outcome: Jenkins pled guilty and was sentenced to 3 years in federal prison, along with a fine of $100,000 and mandated restitution.

Significance: Showed that creating or distributing tools for facial recognition spoofing is itself a criminal offense.

5. United States v. David K. Lambert (2022 – Illinois)

Facts: Lambert used deepfake technology to spoof corporate executives’ faces in video calls to authorize fraudulent wire transfers. The fraud resulted in losses of over $1 million.

Prosecution: Charged with wire fraud (18 U.S.C. § 1343), identity theft (18 U.S.C. § 1028A), and conspiracy to commit fraud.

Outcome: Lambert received 7 years in federal prison and ordered to pay full restitution to the affected corporations.

Significance: Demonstrated the use of deepfake and AI-based spoofing as a modern method of financial and corporate fraud.

6. United States v. Michael J. Ortiz (2023 – New Jersey)

Facts: Ortiz attempted to bypass facial recognition security at government facilities using high-quality masks and altered photographs. He intended to gain unauthorized access to secure federal databases.

Prosecution: Charged with computer intrusion (18 U.S.C. § 1030), identity theft, and access device fraud (18 U.S.C. § 1029).

Outcome: Ortiz was sentenced to 5 years in federal prison and fined $150,000.

Significance: Reinforced that government systems protected by biometric authentication are subject to federal criminal protection, and spoofing them carries serious penalties.

Key Legal Takeaways

Primary Laws Used:

Computer Fraud and Abuse Act (18 U.S.C. § 1030) – for unauthorized access to protected computers.

Wire Fraud (18 U.S.C. § 1343) – for electronically mediated fraud schemes.

Identity Theft (18 U.S.C. § 1028A) – when spoofing involves impersonating others.

Bank Fraud (18 U.S.C. § 1344) – when spoofing is used to steal funds.

Access Device Fraud (18 U.S.C. § 1029) – when spoofing accesses devices or accounts illegally.

Common Methods of Spoofing:

3D-printed masks and molds.

Deepfake or AI-manipulated images/videos.

Mobile or software tools to bypass biometric authentication.

Typical Penalties:

Federal prison: 3–7 years.

Fines and restitution to affected parties.

Permanent bans from working with secured or financial systems.

Patterns:

Spoofing is often used for financial theft, corporate fraud, or unauthorized access to sensitive systems.

Modern prosecutions increasingly involve AI/deepfake technologies.

Federal jurisdiction is triggered when electronic communications or interstate transfers are involved.

LEAVE A COMMENT

0 comments