Facial Recognition Technology Might Place Children At Risk

The online facial recognition search engine PimEyes allows anyone to search for images of children scraped from across the Internet, raising alarm over its possible uses.  

PimEyes' technology enables people to look for faces in images which have been posted publicly on the Internet and describes itself as a 'reverse image' search engine.

Privacy campaign group Big Brother Watch claims that it also facilitates stalking and has complained to the UK data and privacy watchdog (ICO). But according to PimEyes' CEO Giorgi Gobronidze, it poses fewer risks related to stalking than social media or other search engines.

To make full use of PimEyes, users need to take out one of three types of paid subscription. In its terms and conditions, the site says it is intended to allow people to search for publicly available information about themselves. 

Starting with a person's picture, PimEyes finds other photos of them published online. This could include images on photo-sharing sites, in blog posts and news articles, and on websites.

Campaigners accuse PimEyes of unlawfully processing the biometric data of millions of UK citizens - arguing it does not obtain permission from those whose images are analysed. Big Brother Watch's complaint claims that PimEyes has enabled "surveillance and stalking on a scale previously unimaginable". 

Big Brother Watch says that by piecing together information associated with these images - for example the text of a blog post, or a photo on a workplace website - a stalker could work out a person's "place of work, or indications of the area in which they live".

In June the New York Times published a report taking the subscription-based face search engine PimEyes for a test run and producing worrying results for personal privacy. 

The test was conducted on several of the newspaper’s reporters unearthed a surprisingly accurate collection of results including decades-old pictures, pictures in which the subject’s face was obscured, and even pictures in which they were amid a blurry crowd.

"Images of anyone, including children, can be scoured and tracked across the Internet," wrote Madeleine Stone, legal and policy officer at Big Brother Watch, as she announced the complaint.

BigBrotherWatch:   Intercept:    BBC:     Yahoo:   NYTmes:    PimEyes:    CPOMagazine:

You Might Also Read: 

Facing Facts On Facial Recognition:

 

« How To Become A Cyber Millionaire
Ransomware Attacks Linked to FIN7 »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Purdicom

Purdicom

Purdicom (formerly known as Selcoms) is an award winning distributor specialising in Wireless, Cloud & Security technologies.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

Applied Security (APSEC)

Applied Security (APSEC)

APSEC provides products and services in the areas of encryption, digital signature, authentication and data loss prevention.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.

Harmony Intelligence

Harmony Intelligence

Harmony builds cutting-edge defensive AI products that safeguard people and critical infrastructure around the world from AI-powered threats.