Facial Recognition: A Three Billion Image Database

Facial recognition technology is already used for security checks at airports, for police investigations, and for monitoring large events like concerts. However, existing technology generally images faces and matches them to a set database, such as a list of persons wanted by law enforcement. 

Now a new technology developed by the startup Clearview essentially allows the identification of anyone it images who has a presence online and also provides a list of links to sites to learn more about that person. You take a picture of a person, upload it and get to see public photos of that person, along with links. 

The company, which makes it clear that it does not offer a consumer application, says the app accesses a database of more than three billion images, collected from social media sites like Facebook and YouTube and it has a fantastic selling point it offers up to police departments nationwide.

Clearview AI's website says that its facial recognition software had been used by more than 600 police departments and government groups, including the FBI. But in at least two cases, BuzzFeed News found that the company suggested it was working with a police department simply because it had submitted a lead to a tip line.

A New York Times report claims that this could be used to identify anyone who steps foot in a public place and it’s already in use by police in the US. The app has been provided to “hundreds of law enforcement agencies.

Law enforcement officers have confirmed they have used the app to investigate crimes. Federal and state law enforcement officers said that while they had only limited knowledge of how Clearview works and who is behind it, they had used its app to help solve shoplifting, identity theft, credit card fraud, murder and child sexual exploitation cases.

In addition to privacy infringement, this app carries extra risks because law enforcement agencies are uploading sensitive photos to the servers of a company whose ability to protect its data is untested. 

Its critics say the he company has shrouded itself in secrecy, avoiding debate about its boundary-pushing technology. US 
Democratic Sen. Edward Markey of Massachusetts issued an open letter requests information from Clearview, including a full list of any entities and law enforcement agencies currently using the technology, as well as details on any past security breaches and on Clearview's employee access privileges.  

Markey also asks if Clearview's technology is able to recognise whether the biometric information uploaded to its systems points to children under the age of 13. 

"Any technology with the ability to collect and analyze individuals' biometric information has alarming potential to impinge on the public's civil liberties and privacy," said Markey.

CNet:          BuzzFeed News:           I-HLS:        New York Times:

You Might Alsdo Read: 
 
Police Criticised For Face Recognition Failures:  
 

AI Will Find You In The Crowd:

 

 

 

« Facebook Crime In Britain Rises 19%
Industry 4.0 - Changing How We Live »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

MagicCube

MagicCube

MagicCube is a device independent IoT security platform that protects against on-device, cloud, and network attacks.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

SecureKloud Technologies

SecureKloud Technologies

SecureKloud is a global leader in the Cloud services arena. Our experience in cloud consulting and servicing for highly regulated industries extends more than a decade.