US Police Make Widespread Use Of Facial Recognition Software

Half of all American adults are included in databases police use to identify citizens with facial recognition technology, according to new research that raises serious concerns about privacy violations and the widespread use of racially biased surveillance technology.

A report from Georgetown Law’s Center on Privacy and Technology found that more than 117 million adults are captured in a “virtual, perpetual lineup”, which means law enforcement offices across the US can scan their photos and use unregulated software to track law-abiding citizens in government datasets.

Numerous major police departments have “real-time face recognition” technology that allows surveillance cameras to scan the faces of pedestrians walking down the street.

In Maryland, police have been using software to identify faces in protest photos and match them to people with warrants, according to the American Civil Liberties Union (ACLU).

UK Police will use facial recognition software to scan the faces of tens of thousands of revellers at this year’s Notting Hill carnival, on the 26th – 28th August, even though civil liberties groups believe such an action would be discriminatory.

The Metropolitan Police has described the planned deployment as a pilot project intended to look for suspected troublemakers to keep those attending safe.

The Notting Hill carnival is the biggest annual public order test for the Met, attracting crowds of up to 1 million people. Police at the two-day west London event will use the facial recognition system and match faces in the crowd against databases of people they suspect will cause trouble, comparing them with images of people previously arrested or under bail conditions to keep away from the event.

Last year’s carnival led to 45 officers being assaulted and eight were spat at, requiring them to take medication in case of infection. There were also 454 arrests, the highest number in a decade.

The Met said it had consulted on the deployment technology with a regulator and a civil liberties group. “The deployment of the cameras is to test the technology and was implemented following close liaison with the information commissioner and Big Brother Watch. Once the trial is complete, we will be analysing the results and holding a public consultation.”

However, Big Brother Watch, a privacy group campaigning against burgeoning state powers, said it had one chat with police last summer. Its chief executive, Renate Samson, said: “We met with them before the trial last year and haven’t spoken to them since. Certainly, we did not know the technology was to be trialled again this year.”

A different facial recognition system was used by police in Cardiff when the Welsh capital hosted May’s Champions League final between Real Madrid and Juventus.

Sam Lincoln, a former chief inspector in the Office of Surveillance Commissioners, said: “When you put facial recognition on to CCTV cameras, the ability for crime fighters to recognise people is enhanced. It speeds it up, you don’t have to have lots of people watching video.

“Who is saying that a camera has the capability? How is the capability used? How is it monitored? How is that data being connected to other surveillance? It’s a very clever method of data collection.”

Guardian:     Guardian

You Might Also Read:

Facial Recognition Technologies:

Facial Recognition Prevents Terrorist Attacks:

 

 

« The Stage Is Set For Cyber War
There Are No Civilians In Cyber Warfare »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

KvantPhone

KvantPhone

KvantPhone (formerly CryptTalk) is an easy-to-use, quantum resistant secure communication service designed for businesses and large organizations.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Sectra Communications

Sectra Communications

Sectra successfully develops and sells cutting-edge solutions in the expanding niche segments of medical IT and cybersecurity.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

VectorUSA

VectorUSA

VectorUSA is a premier technology solution provider. We design, build and maintain cybersecurity, data center, wireless and managed solutions – transforming business needs into technology solutions.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

SektorCERT

SektorCERT

SektorCERT is the cybersecurity center for the critical infrastructure sectors in Denmark. We help detect and handle when critical infrastructure is exposed to cyber attacks.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

Tuskira

Tuskira

Tuskira is a Preemptive Cyber Defense & Response Platform powered by Agentic AI, designed to go beyond traditional vulnerability management.

Cyber Security Centre for the Isle of Man (CSC)

Cyber Security Centre for the Isle of Man (CSC)

The Cyber Security Centre for the Isle of Man is responsible for the delivery of the Isle of Man National Cyber Security Strategy.