Facial Recognition: A Three Billion Image Database

Facial recognition technology is already used for security checks at airports, for police investigations, and for monitoring large events like concerts. However, existing technology generally images faces and matches them to a set database, such as a list of persons wanted by law enforcement. 

Now a new technology developed by the startup Clearview essentially allows the identification of anyone it images who has a presence online and also provides a list of links to sites to learn more about that person. You take a picture of a person, upload it and get to see public photos of that person, along with links. 

The company, which makes it clear that it does not offer a consumer application, says the app accesses a database of more than three billion images, collected from social media sites like Facebook and YouTube and it has a fantastic selling point it offers up to police departments nationwide.

Clearview AI's website says that its facial recognition software had been used by more than 600 police departments and government groups, including the FBI. But in at least two cases, BuzzFeed News found that the company suggested it was working with a police department simply because it had submitted a lead to a tip line.

A New York Times report claims that this could be used to identify anyone who steps foot in a public place and it’s already in use by police in the US. The app has been provided to “hundreds of law enforcement agencies.

Law enforcement officers have confirmed they have used the app to investigate crimes. Federal and state law enforcement officers said that while they had only limited knowledge of how Clearview works and who is behind it, they had used its app to help solve shoplifting, identity theft, credit card fraud, murder and child sexual exploitation cases.

In addition to privacy infringement, this app carries extra risks because law enforcement agencies are uploading sensitive photos to the servers of a company whose ability to protect its data is untested. 

Its critics say the he company has shrouded itself in secrecy, avoiding debate about its boundary-pushing technology. US 
Democratic Sen. Edward Markey of Massachusetts issued an open letter requests information from Clearview, including a full list of any entities and law enforcement agencies currently using the technology, as well as details on any past security breaches and on Clearview's employee access privileges.  

Markey also asks if Clearview's technology is able to recognise whether the biometric information uploaded to its systems points to children under the age of 13. 

"Any technology with the ability to collect and analyze individuals' biometric information has alarming potential to impinge on the public's civil liberties and privacy," said Markey.

CNet:          BuzzFeed News:           I-HLS:        New York Times:

You Might Alsdo Read: 
 
Police Criticised For Face Recognition Failures:  
 

AI Will Find You In The Crowd:

 

 

 

« Facebook Crime In Britain Rises 19%
Industry 4.0 - Changing How We Live »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

Gleam Cloud Security Solutions (GCSS)

Gleam Cloud Security Solutions (GCSS)

GCSS Security is an information security firm providing cyber security protection with a highly skilled and experienced team focused on technology that creates best-in-class customer experiences.

ITUS Secure Technologies

ITUS Secure Technologies

ITUS offer fully outsourced cybersecurity solutions working with leading security vendors, providing next-gen solutions.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.

ManagedMethods

ManagedMethods

ManagedMethods is a leading Google Workspace and Microsoft 365 data security and student safety platform for K-12 schools.