British Legislators Want To Ban Live Facial Recognition

A UK cross-party group of 38 MPs and 27 peers, backed by 31 rights and race quality groups, has called on UK police and private companies to immediately stop using live facial recognition (LFR) for public surveillance. This comes after the government announced plans for police to access 45 million UK passport photos to help catch criminals in relation to minor crimes such as bicycle thefts and shoplifting. 

The use of this controversial technology in Britain has long been criticised by numerous civil liberties groups including Amnesty International and faces a blanket ban in the European Union.

British police have previously deployed live facial recognition at a number of large-scale public events, including the recent coronation of King Charles IlI. Police and private companies should "immediately stop" the use of facial recognition surveillance, says a group of politicians and privacy campaigners.They have raised concerns around human rights, potential for discrimination and "the lack of a democratic mandate".

The former cabinet minister David Davis, the Liberal Democrats leader, Sir Ed Davey, the Green MP Caroline Lucas and the former shadow attorney general Shami Chakrabarti are among 65 members of the House of Commons and House of Lords to call for a halt to the technology’s use. The joint statement reads: “We hold differing views about live facial recognition surveillance, ranging from serious concerns about its incompatibility with human rights, to the potential for discriminatory impact, the lack of safeguards, the lack of an evidence base, an unproven case of necessity or proportionality, the lack of a sufficient legal basis, the lack of parliamentary consideration, and the lack of a democratic mandate.”

Beyond the ethical arguments against the use of facial recognition, there is an even more concerning aspect of relying on biometric authentication, it's easily tampered with. If it can easily be spoofed, this begs the question as to whether, in its current form, it has any place in our surveillance systems.

Commenting on facial recognition technology expert Nick France, CTO of Sectigo said “People don’t realise how far along AI deep fake technology has come and how democratised the technology is. Unfortunately, anything about your physical appearance that can be measured i.e eyes, face, voice, can easily be replicated... This is everywhere, and so using these as methods for identity is a lousy secret many have access to. There are better and smarter ways to validate and authenticate identity."

The use of live facial recognition technology outside of law enforcement in the retail sector is even more controversial. 

Earlier this year, the British Information Commissioner’s Office (ICO) reviewed the operations of retail crime prevention firm Facewatch, finding the company had breached data protection legislation, but that it was satisfied it had a legitimate purpose for using people’s information for the detection and prevention of crime. 

Information Commissioner's Office:     National Technology:     Techmarketview:    Guardian:   BBC:   Reuters

Independent:     Facewatch:     Image: Ron Lach

You Might Also Read: 

Facial Recognition Technology Might Place Children At Risk:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« DNA Testing Service 23andMe Hacked
Ukraine’s Cyber Conflict With Russia »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

Guardz

Guardz

Guardz helps small and growing businesses to go from zero or low cyber protection to having comprehensive security – in the quickest and most straightforward way.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Dialog Enterprise

Dialog Enterprise

Dialog Enterprise is the corporate ICT solutions arm of Dialog Axiata, Sri Lanka’s leading connectivity provider.