Facial Recognition: A Three Billion Image Database

Facial recognition technology is already used for security checks at airports, for police investigations, and for monitoring large events like concerts. However, existing technology generally images faces and matches them to a set database, such as a list of persons wanted by law enforcement. 

Now a new technology developed by the startup Clearview essentially allows the identification of anyone it images who has a presence online and also provides a list of links to sites to learn more about that person. You take a picture of a person, upload it and get to see public photos of that person, along with links. 

The company, which makes it clear that it does not offer a consumer application, says the app accesses a database of more than three billion images, collected from social media sites like Facebook and YouTube and it has a fantastic selling point it offers up to police departments nationwide.

Clearview AI's website says that its facial recognition software had been used by more than 600 police departments and government groups, including the FBI. But in at least two cases, BuzzFeed News found that the company suggested it was working with a police department simply because it had submitted a lead to a tip line.

A New York Times report claims that this could be used to identify anyone who steps foot in a public place and it’s already in use by police in the US. The app has been provided to “hundreds of law enforcement agencies.

Law enforcement officers have confirmed they have used the app to investigate crimes. Federal and state law enforcement officers said that while they had only limited knowledge of how Clearview works and who is behind it, they had used its app to help solve shoplifting, identity theft, credit card fraud, murder and child sexual exploitation cases.

In addition to privacy infringement, this app carries extra risks because law enforcement agencies are uploading sensitive photos to the servers of a company whose ability to protect its data is untested. 

Its critics say the he company has shrouded itself in secrecy, avoiding debate about its boundary-pushing technology. US 
Democratic Sen. Edward Markey of Massachusetts issued an open letter requests information from Clearview, including a full list of any entities and law enforcement agencies currently using the technology, as well as details on any past security breaches and on Clearview's employee access privileges.  

Markey also asks if Clearview's technology is able to recognise whether the biometric information uploaded to its systems points to children under the age of 13. 

"Any technology with the ability to collect and analyze individuals' biometric information has alarming potential to impinge on the public's civil liberties and privacy," said Markey.

CNet:          BuzzFeed News:           I-HLS:        New York Times:

You Might Alsdo Read: 
 
Police Criticised For Face Recognition Failures:  
 

AI Will Find You In The Crowd:

 

 

 

« Facebook Crime In Britain Rises 19%
Industry 4.0 - Changing How We Live »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / Black Hat On-Demand Webinar

Perimeter 81 / Black Hat On-Demand Webinar

Black Hat On-Demand Webinar - Identity is the New Perimeter: This webinar will provide you with vital insights to help understand the need for Zero Trust and how it can transform your network.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Quick Heal Technologies

Quick Heal Technologies

Quick Heal Technologies is a leading IT security solutions provider focused on endpoint and network security solutions.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.