Facial Recognition Technologies

The White House instructed the Department of Homeland Security to escalate the deployment of a biometric monitoring system to evaluate all visitors crossing US borders, as part of President Trump’s controversial executive order barring travel to the US from seven Muslim-majority nations.

Homeland Security is rushing to equip airports across the country with sophisticated facial recognition software, according to an agency official.

The technology will check the identities of departing visitors to ensure they haven’t overstayed visas, aren’t wanted in criminal or terrorist investigations, and to confirm they aren’t trying to leave the country with forged documents.

Csmonitor.com reports that since 2004, DHS has collected fingerprints from most foreigners entering the country to ensure imposters and criminals don’t get in. But the department hasn’t been able to similarly check the identities of departing visitors, largely because jetways, gangplanks, and highways weren’t built to accommodate fingerprint or facial sensors.

In a recent trial at Atlanta’s Hartsfield-Jackson International Airport, the agency successfully tested workstations that captured images to verify passengers’ identities before boarding.

At the nation’s top airports, DHS also has tried mobile fingerprint scanners to identify foreigners exiting the country. In addition, DHS has experimented with capturing images of irises at an outdoor US-Mexico border crossing in Otay Mesa, California.

In addition to privacy issues, there arise questions about the accuracy of facial recognition technology. For instance, algorithms in three state-of-the-art facial recognition systems all performed less accurately on females, Blacks, and adults under 30, according to a 2012 IEEE study coauthored by an FBI technologist.

Yet, a DHS Customs and Border Protection (CBP) spokeswoman said the agency is accelerating the creation of a biometric exit system “by building upon existing operational platforms” and has found “a feasible solution.” CBP currently is collaborating with partners in industry and government to ensure the system works properly.

The agency retains photos of nonimmigrant aliens and lawful permanent residents for a maximum of 15 years, and deletes any pictures of US citizens once their identities have been confirmed, according to the assessment.

CBP officers connect mobile tablets to a virtual private network with two-factor authentication and strong encryption to transfer face snapshots to the agency’s database. The images are deleted from the device after the flight is completed. Only agency personnel and CBP contractors can access the collection device and database.  

CBP acknowledges it does often share information with federal, state, and local authorities, which may be authorised to use the information for purposes beyond the scope of the agency’s mission.

I-HLS:

Google's New AI System Unscrambles Pixelated Faces:

Suspect Monitoring & Surveillance Technology:

Anti-Surveillance Clothing Thwarts Facial Recognition:

Facial Recognition Prevents Terrorist Attacks:

 

« Hard To Keep The Cloud Safe Without Skills
Dubai Tests Autonomous Aerial Vehicle »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

7 Elements

7 Elements

7 Elements is an independent IT security testing company providing expertise in technical information assurance through security testing, incident response and consultancy.

SecureAppbox

SecureAppbox

SecureAppbox provide solutions that protects the communication of sensitive data as well as advice on data security and compliance with GDPR.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.