US Police Make Widespread Use Of Facial Recognition Software

Half of all American adults are included in databases police use to identify citizens with facial recognition technology, according to new research that raises serious concerns about privacy violations and the widespread use of racially biased surveillance technology.

A report from Georgetown Law’s Center on Privacy and Technology found that more than 117 million adults are captured in a “virtual, perpetual lineup”, which means law enforcement offices across the US can scan their photos and use unregulated software to track law-abiding citizens in government datasets.

Numerous major police departments have “real-time face recognition” technology that allows surveillance cameras to scan the faces of pedestrians walking down the street.

In Maryland, police have been using software to identify faces in protest photos and match them to people with warrants, according to the American Civil Liberties Union (ACLU).

UK Police will use facial recognition software to scan the faces of tens of thousands of revellers at this year’s Notting Hill carnival, on the 26th – 28th August, even though civil liberties groups believe such an action would be discriminatory.

The Metropolitan Police has described the planned deployment as a pilot project intended to look for suspected troublemakers to keep those attending safe.

The Notting Hill carnival is the biggest annual public order test for the Met, attracting crowds of up to 1 million people. Police at the two-day west London event will use the facial recognition system and match faces in the crowd against databases of people they suspect will cause trouble, comparing them with images of people previously arrested or under bail conditions to keep away from the event.

Last year’s carnival led to 45 officers being assaulted and eight were spat at, requiring them to take medication in case of infection. There were also 454 arrests, the highest number in a decade.

The Met said it had consulted on the deployment technology with a regulator and a civil liberties group. “The deployment of the cameras is to test the technology and was implemented following close liaison with the information commissioner and Big Brother Watch. Once the trial is complete, we will be analysing the results and holding a public consultation.”

However, Big Brother Watch, a privacy group campaigning against burgeoning state powers, said it had one chat with police last summer. Its chief executive, Renate Samson, said: “We met with them before the trial last year and haven’t spoken to them since. Certainly, we did not know the technology was to be trialled again this year.”

A different facial recognition system was used by police in Cardiff when the Welsh capital hosted May’s Champions League final between Real Madrid and Juventus.

Sam Lincoln, a former chief inspector in the Office of Surveillance Commissioners, said: “When you put facial recognition on to CCTV cameras, the ability for crime fighters to recognise people is enhanced. It speeds it up, you don’t have to have lots of people watching video.

“Who is saying that a camera has the capability? How is the capability used? How is it monitored? How is that data being connected to other surveillance? It’s a very clever method of data collection.”

Guardian:     Guardian

You Might Also Read:

Facial Recognition Technologies:

Facial Recognition Prevents Terrorist Attacks:

 

 

« The Stage Is Set For Cyber War
There Are No Civilians In Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CyTech Services

CyTech Services

CyTech provides Forensics Incident Response, Cyber Security and Training services.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.