Facial Recognition Technology Might Place Children At Risk

The online facial recognition search engine PimEyes allows anyone to search for images of children scraped from across the Internet, raising alarm over its possible uses.  

PimEyes' technology enables people to look for faces in images which have been posted publicly on the Internet and describes itself as a 'reverse image' search engine.

Privacy campaign group Big Brother Watch claims that it also facilitates stalking and has complained to the UK data and privacy watchdog (ICO). But according to PimEyes' CEO Giorgi Gobronidze, it poses fewer risks related to stalking than social media or other search engines.

To make full use of PimEyes, users need to take out one of three types of paid subscription. In its terms and conditions, the site says it is intended to allow people to search for publicly available information about themselves. 

Starting with a person's picture, PimEyes finds other photos of them published online. This could include images on photo-sharing sites, in blog posts and news articles, and on websites.

Campaigners accuse PimEyes of unlawfully processing the biometric data of millions of UK citizens - arguing it does not obtain permission from those whose images are analysed. Big Brother Watch's complaint claims that PimEyes has enabled "surveillance and stalking on a scale previously unimaginable". 

Big Brother Watch says that by piecing together information associated with these images - for example the text of a blog post, or a photo on a workplace website - a stalker could work out a person's "place of work, or indications of the area in which they live".

In June the New York Times published a report taking the subscription-based face search engine PimEyes for a test run and producing worrying results for personal privacy. 

The test was conducted on several of the newspaper’s reporters unearthed a surprisingly accurate collection of results including decades-old pictures, pictures in which the subject’s face was obscured, and even pictures in which they were amid a blurry crowd.

"Images of anyone, including children, can be scoured and tracked across the Internet," wrote Madeleine Stone, legal and policy officer at Big Brother Watch, as she announced the complaint.

BigBrotherWatch:   Intercept:    BBC:     Yahoo:   NYTmes:    PimEyes:    CPOMagazine:

You Might Also Read: 

Facing Facts On Facial Recognition:

 

« How To Become A Cyber Millionaire
Ransomware Attacks Linked to FIN7 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Teneo

Teneo

Teneo is a Solutions Provider focused on reducing complexity. We combine leading technology with deep expertise to create new ideas on how to simplify IT operations.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab conducts research into predictive security analytics.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Propelo

Propelo

Propelo (formerly LevelOps) is an engineering excellence platform that helps increase developer productivity and improve security with data-led insights and workflow automation.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

Avint

Avint

Avint delivers transformational cybersecurity solutions that help both commercial and government entities achieve mission success.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Logiq Consulting

Logiq Consulting

Logiq Consulting provide a full range of Cyber Security, Information Assurance and System Engineering services.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.