US Police Make Widespread Use Of Facial Recognition Software

Half of all American adults are included in databases police use to identify citizens with facial recognition technology, according to new research that raises serious concerns about privacy violations and the widespread use of racially biased surveillance technology.

A report from Georgetown Law’s Center on Privacy and Technology found that more than 117 million adults are captured in a “virtual, perpetual lineup”, which means law enforcement offices across the US can scan their photos and use unregulated software to track law-abiding citizens in government datasets.

Numerous major police departments have “real-time face recognition” technology that allows surveillance cameras to scan the faces of pedestrians walking down the street.

In Maryland, police have been using software to identify faces in protest photos and match them to people with warrants, according to the American Civil Liberties Union (ACLU).

UK Police will use facial recognition software to scan the faces of tens of thousands of revellers at this year’s Notting Hill carnival, on the 26th – 28th August, even though civil liberties groups believe such an action would be discriminatory.

The Metropolitan Police has described the planned deployment as a pilot project intended to look for suspected troublemakers to keep those attending safe.

The Notting Hill carnival is the biggest annual public order test for the Met, attracting crowds of up to 1 million people. Police at the two-day west London event will use the facial recognition system and match faces in the crowd against databases of people they suspect will cause trouble, comparing them with images of people previously arrested or under bail conditions to keep away from the event.

Last year’s carnival led to 45 officers being assaulted and eight were spat at, requiring them to take medication in case of infection. There were also 454 arrests, the highest number in a decade.

The Met said it had consulted on the deployment technology with a regulator and a civil liberties group. “The deployment of the cameras is to test the technology and was implemented following close liaison with the information commissioner and Big Brother Watch. Once the trial is complete, we will be analysing the results and holding a public consultation.”

However, Big Brother Watch, a privacy group campaigning against burgeoning state powers, said it had one chat with police last summer. Its chief executive, Renate Samson, said: “We met with them before the trial last year and haven’t spoken to them since. Certainly, we did not know the technology was to be trialled again this year.”

A different facial recognition system was used by police in Cardiff when the Welsh capital hosted May’s Champions League final between Real Madrid and Juventus.

Sam Lincoln, a former chief inspector in the Office of Surveillance Commissioners, said: “When you put facial recognition on to CCTV cameras, the ability for crime fighters to recognise people is enhanced. It speeds it up, you don’t have to have lots of people watching video.

“Who is saying that a camera has the capability? How is the capability used? How is it monitored? How is that data being connected to other surveillance? It’s a very clever method of data collection.”

Guardian:     Guardian

You Might Also Read:

Facial Recognition Technologies:

Facial Recognition Prevents Terrorist Attacks:

 

 

« The Stage Is Set For Cyber War
There Are No Civilians In Cyber Warfare »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

EarlyBirds

EarlyBirds

EarlyBirds is a real-time Open Innovation and OSINT ecosystem that connects organizations with Innovators, Early Adopters, and Subject Matter Experts (SMEs).

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.