Trial Facial Recognition Technology In London

Facial recognition software was trialed on Monday 17th December in central London for the first time amid soaring crime in the capital. The Metropolitan Police deployed the technology in Soho, Piccadilly Circus and Leicester Square looking for suspects wanted by the force or the courts.

The operation was conducted in a visible fashion with uniformed as well as plain-clothed police officers present and posters informing the public what was happening.

The Met said that anyone who declined to be scanned was not automatically “viewed as suspicious by police officers”.
Also any matches were not in themselves considered grounds to detain people and officers were instructed to make further checks before taking any action.

The Met Police said three arrests were made during the operation with one suspect identified by the technology wanted for a violent offence.

A second was flagged by the system but turned out to be a different individual when officers made checks, albeit one wanted for a separate offence. The Met Police said the third arrest was unrelated to the facial recognition system and due to officers witnessing an incident during the operation.

The operation was one of a series stretching back to last year where police have trialed the technology in areas such as Stratford’s Westfield Shopping Centre and Notting Hill. The central London trial is set to take place again this week. Ivan Balhatchet, the Met Police's strategic lead for live facial technology, said: “The Met is currently developing the use of live facial recognition technology and we have committed to ten trials during the coming months. We are now coming to the end of our trials when a full evaluation will be completed.

"We continue to engage with many different stakeholders, some who actively challenge our use of this technology. In order to show transparency and continue constructive debate, we have invited individuals and groups with varying views on our use of facial recognition technology to this deployment.”

The Met Police’s latest operation comes after a civil liberties group, Big Brother Watch, criticised the use of facial recognition software as “authoritarian, dangerous and lawless.”

The group also said that previous police trials had shown the software had misidentified innocent members of the public. Silkie Carlo, director of Big Brother Watch, said “As with all mass surveillance tools, it is the general public who suffer more than criminals. “It is well overdue that police drop this dangerous and lawless technology.”

Telegraph

You Might Also Read: 

The Way You Walk Will Reveal Your Identity To Surveillance Technology:

Chinese Police Wearing Face Recognition Glasses:

 

 

« Robots And AI Will Create More Jobs Than They Replace
Computers Could Soon Run Cold »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

Exire Technologies

Exire Technologies

Exire Technologies is comprised of a team of professionals who are specialised in cybersecurity and a value added reseller and integrator of ICT security systems.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.