Up-link (card/reader) threats
U1. (S1/S2) Interception of fingerprint template.
U2. (S1/S2) Manipulation of fingerprint template.
U3. (S2/S4) Interception of fingerprint image.
U4. (S2/S4) Manipulation of fingerprint image.
Possible countermeasures: encryption (U1 & U3) and MAC (U2 & U4).