The worst part, however, is that all the attacker would need is a printout of the face of an authorized person. That being said, the printout should ideally adhere to the following specifications ...