Facial Recognition Technology Might Place Children At Risk

The online facial recognition search engine PimEyes allows anyone to search for images of children scraped from across the Internet, raising alarm over its possible uses.  

PimEyes' technology enables people to look for faces in images which have been posted publicly on the Internet and describes itself as a 'reverse image' search engine.

Privacy campaign group Big Brother Watch claims that it also facilitates stalking and has complained to the UK data and privacy watchdog (ICO). But according to PimEyes' CEO Giorgi Gobronidze, it poses fewer risks related to stalking than social media or other search engines.

To make full use of PimEyes, users need to take out one of three types of paid subscription. In its terms and conditions, the site says it is intended to allow people to search for publicly available information about themselves. 

Starting with a person's picture, PimEyes finds other photos of them published online. This could include images on photo-sharing sites, in blog posts and news articles, and on websites.

Campaigners accuse PimEyes of unlawfully processing the biometric data of millions of UK citizens - arguing it does not obtain permission from those whose images are analysed. Big Brother Watch's complaint claims that PimEyes has enabled "surveillance and stalking on a scale previously unimaginable". 

Big Brother Watch says that by piecing together information associated with these images - for example the text of a blog post, or a photo on a workplace website - a stalker could work out a person's "place of work, or indications of the area in which they live".

In June the New York Times published a report taking the subscription-based face search engine PimEyes for a test run and producing worrying results for personal privacy. 

The test was conducted on several of the newspaper’s reporters unearthed a surprisingly accurate collection of results including decades-old pictures, pictures in which the subject’s face was obscured, and even pictures in which they were amid a blurry crowd.

"Images of anyone, including children, can be scoured and tracked across the Internet," wrote Madeleine Stone, legal and policy officer at Big Brother Watch, as she announced the complaint.

BigBrotherWatch:   Intercept:    BBC:     Yahoo:   NYTmes:    PimEyes:    CPOMagazine:

You Might Also Read: 

Facing Facts On Facial Recognition:

 

« How To Become A Cyber Millionaire
Ransomware Attacks Linked to FIN7 »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

MSAB

MSAB

MSAB is a pioneer in forensic technology for mobile device examination.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

TSARKA

TSARKA

TSARKA (formerly the Center for Analysis & Investigation of Cyber Attacks - CAICA) is a leader in cybersecurity in Central Asia, playing a key role in protecting government and private IT assets.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

International College For Security Studies (ICSS)

International College For Security Studies (ICSS)

ICSS India offers technical education to students, clients and partners in IT Industry by our well qualified, certified and experienced trainers.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.

Krash Consulting

Krash Consulting

Krash Consulting is a premier provider of Cyber Security solutions, offering a range of services to safeguard businesses against cyber-attacks, minimize fraud, and protect brand reputation globally.

Redblock

Redblock

Redblock's mission is to eliminate the drudgery and repetitive 'eye on the glass' work done by Security Teams.