Facial Recognition Technologies

The White House instructed the Department of Homeland Security to escalate the deployment of a biometric monitoring system to evaluate all visitors crossing US borders, as part of President Trump’s controversial executive order barring travel to the US from seven Muslim-majority nations.

Homeland Security is rushing to equip airports across the country with sophisticated facial recognition software, according to an agency official.

The technology will check the identities of departing visitors to ensure they haven’t overstayed visas, aren’t wanted in criminal or terrorist investigations, and to confirm they aren’t trying to leave the country with forged documents.

Csmonitor.com reports that since 2004, DHS has collected fingerprints from most foreigners entering the country to ensure imposters and criminals don’t get in. But the department hasn’t been able to similarly check the identities of departing visitors, largely because jetways, gangplanks, and highways weren’t built to accommodate fingerprint or facial sensors.

In a recent trial at Atlanta’s Hartsfield-Jackson International Airport, the agency successfully tested workstations that captured images to verify passengers’ identities before boarding.

At the nation’s top airports, DHS also has tried mobile fingerprint scanners to identify foreigners exiting the country. In addition, DHS has experimented with capturing images of irises at an outdoor US-Mexico border crossing in Otay Mesa, California.

In addition to privacy issues, there arise questions about the accuracy of facial recognition technology. For instance, algorithms in three state-of-the-art facial recognition systems all performed less accurately on females, Blacks, and adults under 30, according to a 2012 IEEE study coauthored by an FBI technologist.

Yet, a DHS Customs and Border Protection (CBP) spokeswoman said the agency is accelerating the creation of a biometric exit system “by building upon existing operational platforms” and has found “a feasible solution.” CBP currently is collaborating with partners in industry and government to ensure the system works properly.

The agency retains photos of nonimmigrant aliens and lawful permanent residents for a maximum of 15 years, and deletes any pictures of US citizens once their identities have been confirmed, according to the assessment.

CBP officers connect mobile tablets to a virtual private network with two-factor authentication and strong encryption to transfer face snapshots to the agency’s database. The images are deleted from the device after the flight is completed. Only agency personnel and CBP contractors can access the collection device and database.  

CBP acknowledges it does often share information with federal, state, and local authorities, which may be authorised to use the information for purposes beyond the scope of the agency’s mission.

I-HLS:

Google's New AI System Unscrambles Pixelated Faces:

Suspect Monitoring & Surveillance Technology:

Anti-Surveillance Clothing Thwarts Facial Recognition:

Facial Recognition Prevents Terrorist Attacks:

 

« Hard To Keep The Cloud Safe Without Skills
Dubai Tests Autonomous Aerial Vehicle »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Kinetic Investments

Kinetic Investments

Kinetic Investments is a venture capital firm dedicated to early-stage companies that are transforming the digital landscape.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

SyberFort

SyberFort

SyberFort offers a suite of SAAS-based platforms designed to fortify your digital defenses including Threat Intelligence and Brand Protection.