Facial Recognition Technologies

The White House instructed the Department of Homeland Security to escalate the deployment of a biometric monitoring system to evaluate all visitors crossing US borders, as part of President Trump’s controversial executive order barring travel to the US from seven Muslim-majority nations.

Homeland Security is rushing to equip airports across the country with sophisticated facial recognition software, according to an agency official.

The technology will check the identities of departing visitors to ensure they haven’t overstayed visas, aren’t wanted in criminal or terrorist investigations, and to confirm they aren’t trying to leave the country with forged documents.

Csmonitor.com reports that since 2004, DHS has collected fingerprints from most foreigners entering the country to ensure imposters and criminals don’t get in. But the department hasn’t been able to similarly check the identities of departing visitors, largely because jetways, gangplanks, and highways weren’t built to accommodate fingerprint or facial sensors.

In a recent trial at Atlanta’s Hartsfield-Jackson International Airport, the agency successfully tested workstations that captured images to verify passengers’ identities before boarding.

At the nation’s top airports, DHS also has tried mobile fingerprint scanners to identify foreigners exiting the country. In addition, DHS has experimented with capturing images of irises at an outdoor US-Mexico border crossing in Otay Mesa, California.

In addition to privacy issues, there arise questions about the accuracy of facial recognition technology. For instance, algorithms in three state-of-the-art facial recognition systems all performed less accurately on females, Blacks, and adults under 30, according to a 2012 IEEE study coauthored by an FBI technologist.

Yet, a DHS Customs and Border Protection (CBP) spokeswoman said the agency is accelerating the creation of a biometric exit system “by building upon existing operational platforms” and has found “a feasible solution.” CBP currently is collaborating with partners in industry and government to ensure the system works properly.

The agency retains photos of nonimmigrant aliens and lawful permanent residents for a maximum of 15 years, and deletes any pictures of US citizens once their identities have been confirmed, according to the assessment.

CBP officers connect mobile tablets to a virtual private network with two-factor authentication and strong encryption to transfer face snapshots to the agency’s database. The images are deleted from the device after the flight is completed. Only agency personnel and CBP contractors can access the collection device and database.  

CBP acknowledges it does often share information with federal, state, and local authorities, which may be authorised to use the information for purposes beyond the scope of the agency’s mission.

I-HLS:

Google's New AI System Unscrambles Pixelated Faces:

Suspect Monitoring & Surveillance Technology:

Anti-Surveillance Clothing Thwarts Facial Recognition:

Facial Recognition Prevents Terrorist Attacks:

 

« Hard To Keep The Cloud Safe Without Skills
Dubai Tests Autonomous Aerial Vehicle »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) undertakes cyber security research and plays a leading role in securing Pakistan’s Cyberspace.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Cybots

Cybots

Cybots is a multinational cyber defence brand founded in Singapore in 2018 to help organizations stay ahead of increasingly sophisticated threats from cyber criminals.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.