Facial Recognition: A Three Billion Image Database

Facial recognition technology is already used for security checks at airports, for police investigations, and for monitoring large events like concerts. However, existing technology generally images faces and matches them to a set database, such as a list of persons wanted by law enforcement. 

Now a new technology developed by the startup Clearview essentially allows the identification of anyone it images who has a presence online and also provides a list of links to sites to learn more about that person. You take a picture of a person, upload it and get to see public photos of that person, along with links. 

The company, which makes it clear that it does not offer a consumer application, says the app accesses a database of more than three billion images, collected from social media sites like Facebook and YouTube and it has a fantastic selling point it offers up to police departments nationwide.

Clearview AI's website says that its facial recognition software had been used by more than 600 police departments and government groups, including the FBI. But in at least two cases, BuzzFeed News found that the company suggested it was working with a police department simply because it had submitted a lead to a tip line.

A New York Times report claims that this could be used to identify anyone who steps foot in a public place and it’s already in use by police in the US. The app has been provided to “hundreds of law enforcement agencies.

Law enforcement officers have confirmed they have used the app to investigate crimes. Federal and state law enforcement officers said that while they had only limited knowledge of how Clearview works and who is behind it, they had used its app to help solve shoplifting, identity theft, credit card fraud, murder and child sexual exploitation cases.

In addition to privacy infringement, this app carries extra risks because law enforcement agencies are uploading sensitive photos to the servers of a company whose ability to protect its data is untested. 

Its critics say the he company has shrouded itself in secrecy, avoiding debate about its boundary-pushing technology. US 
Democratic Sen. Edward Markey of Massachusetts issued an open letter requests information from Clearview, including a full list of any entities and law enforcement agencies currently using the technology, as well as details on any past security breaches and on Clearview's employee access privileges.  

Markey also asks if Clearview's technology is able to recognise whether the biometric information uploaded to its systems points to children under the age of 13. 

"Any technology with the ability to collect and analyze individuals' biometric information has alarming potential to impinge on the public's civil liberties and privacy," said Markey.

CNet:          BuzzFeed News:           I-HLS:        New York Times:

You Might Alsdo Read: 
 
Police Criticised For Face Recognition Failures:  
 

AI Will Find You In The Crowd:

 

 

 

« Facebook Crime In Britain Rises 19%
Industry 4.0 - Changing How We Live »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Maryman & Associates

Maryman & Associates

Maryman & Associates are specialists in computer forensic investigations, incident response and e-discovery services.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

BLOCX

BLOCX

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.