Facial Recognition Technologies

The White House instructed the Department of Homeland Security to escalate the deployment of a biometric monitoring system to evaluate all visitors crossing US borders, as part of President Trump’s controversial executive order barring travel to the US from seven Muslim-majority nations.

Homeland Security is rushing to equip airports across the country with sophisticated facial recognition software, according to an agency official.

The technology will check the identities of departing visitors to ensure they haven’t overstayed visas, aren’t wanted in criminal or terrorist investigations, and to confirm they aren’t trying to leave the country with forged documents.

Csmonitor.com reports that since 2004, DHS has collected fingerprints from most foreigners entering the country to ensure imposters and criminals don’t get in. But the department hasn’t been able to similarly check the identities of departing visitors, largely because jetways, gangplanks, and highways weren’t built to accommodate fingerprint or facial sensors.

In a recent trial at Atlanta’s Hartsfield-Jackson International Airport, the agency successfully tested workstations that captured images to verify passengers’ identities before boarding.

At the nation’s top airports, DHS also has tried mobile fingerprint scanners to identify foreigners exiting the country. In addition, DHS has experimented with capturing images of irises at an outdoor US-Mexico border crossing in Otay Mesa, California.

In addition to privacy issues, there arise questions about the accuracy of facial recognition technology. For instance, algorithms in three state-of-the-art facial recognition systems all performed less accurately on females, Blacks, and adults under 30, according to a 2012 IEEE study coauthored by an FBI technologist.

Yet, a DHS Customs and Border Protection (CBP) spokeswoman said the agency is accelerating the creation of a biometric exit system “by building upon existing operational platforms” and has found “a feasible solution.” CBP currently is collaborating with partners in industry and government to ensure the system works properly.

The agency retains photos of nonimmigrant aliens and lawful permanent residents for a maximum of 15 years, and deletes any pictures of US citizens once their identities have been confirmed, according to the assessment.

CBP officers connect mobile tablets to a virtual private network with two-factor authentication and strong encryption to transfer face snapshots to the agency’s database. The images are deleted from the device after the flight is completed. Only agency personnel and CBP contractors can access the collection device and database.  

CBP acknowledges it does often share information with federal, state, and local authorities, which may be authorised to use the information for purposes beyond the scope of the agency’s mission.

I-HLS:

Google's New AI System Unscrambles Pixelated Faces:

Suspect Monitoring & Surveillance Technology:

Anti-Surveillance Clothing Thwarts Facial Recognition:

Facial Recognition Prevents Terrorist Attacks:

 

« Hard To Keep The Cloud Safe Without Skills
Dubai Tests Autonomous Aerial Vehicle »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

Joint Accreditation System of Australia and New Zealand (JASANZ)

Joint Accreditation System of Australia and New Zealand (JASANZ)

JASANZ is the joint national accreditation body for Australia and New Zealand. The directory of members provides details of organisations offering certification services for ISO 27001.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Sunday Cyber

Sunday Cyber

Sunday is a personal cybersecurity platform, built to protect the world’s top executive teams beyond the enterprise perimeter.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.

runZero

runZero

runZero delivers the most complete security visibility possible, providing you the ultimate foundation for successfully managing exposures and compliance.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.