Facial Recognition Technologies

The White House instructed the Department of Homeland Security to escalate the deployment of a biometric monitoring system to evaluate all visitors crossing US borders, as part of President Trump’s controversial executive order barring travel to the US from seven Muslim-majority nations.

Homeland Security is rushing to equip airports across the country with sophisticated facial recognition software, according to an agency official.

The technology will check the identities of departing visitors to ensure they haven’t overstayed visas, aren’t wanted in criminal or terrorist investigations, and to confirm they aren’t trying to leave the country with forged documents.

Csmonitor.com reports that since 2004, DHS has collected fingerprints from most foreigners entering the country to ensure imposters and criminals don’t get in. But the department hasn’t been able to similarly check the identities of departing visitors, largely because jetways, gangplanks, and highways weren’t built to accommodate fingerprint or facial sensors.

In a recent trial at Atlanta’s Hartsfield-Jackson International Airport, the agency successfully tested workstations that captured images to verify passengers’ identities before boarding.

At the nation’s top airports, DHS also has tried mobile fingerprint scanners to identify foreigners exiting the country. In addition, DHS has experimented with capturing images of irises at an outdoor US-Mexico border crossing in Otay Mesa, California.

In addition to privacy issues, there arise questions about the accuracy of facial recognition technology. For instance, algorithms in three state-of-the-art facial recognition systems all performed less accurately on females, Blacks, and adults under 30, according to a 2012 IEEE study coauthored by an FBI technologist.

Yet, a DHS Customs and Border Protection (CBP) spokeswoman said the agency is accelerating the creation of a biometric exit system “by building upon existing operational platforms” and has found “a feasible solution.” CBP currently is collaborating with partners in industry and government to ensure the system works properly.

The agency retains photos of nonimmigrant aliens and lawful permanent residents for a maximum of 15 years, and deletes any pictures of US citizens once their identities have been confirmed, according to the assessment.

CBP officers connect mobile tablets to a virtual private network with two-factor authentication and strong encryption to transfer face snapshots to the agency’s database. The images are deleted from the device after the flight is completed. Only agency personnel and CBP contractors can access the collection device and database.  

CBP acknowledges it does often share information with federal, state, and local authorities, which may be authorised to use the information for purposes beyond the scope of the agency’s mission.

I-HLS:

Google's New AI System Unscrambles Pixelated Faces:

Suspect Monitoring & Surveillance Technology:

Anti-Surveillance Clothing Thwarts Facial Recognition:

Facial Recognition Prevents Terrorist Attacks:

 

« Hard To Keep The Cloud Safe Without Skills
Dubai Tests Autonomous Aerial Vehicle »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

National Response Centre for Cyber Crime (NR3C) - Pakistan

National Response Centre for Cyber Crime (NR3C) - Pakistan

National Response Centre for Cyber Crime (NR3C) is a law enforcement agency in Pakistan dedicated to fighting cyber crime.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

Cofrac

Cofrac

Cofrac is the national accreditation body for France. The directory of members provides details of organisations offering certification services for ISO 27001.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

Fastcomcorp

Fastcomcorp

Fastcomcorp offers a world-class proactive cyber security defense and risk management consulting. Including Darkweb monitoring and posture assessments.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Umbrella Cyber

Umbrella Cyber

Umbrella Cyber specialises in Cyber Essentials and Cyber Essentials Plus Certification and penetration testing.

Zorins Technologies

Zorins Technologies

Zorins Technologies is a leading IT company providing IT networking Equipment and expertise in managed services, consulting, and cybersecurity.