US Police Make Widespread Use Of Facial Recognition Software

Half of all American adults are included in databases police use to identify citizens with facial recognition technology, according to new research that raises serious concerns about privacy violations and the widespread use of racially biased surveillance technology.

A report from Georgetown Law’s Center on Privacy and Technology found that more than 117 million adults are captured in a “virtual, perpetual lineup”, which means law enforcement offices across the US can scan their photos and use unregulated software to track law-abiding citizens in government datasets.

Numerous major police departments have “real-time face recognition” technology that allows surveillance cameras to scan the faces of pedestrians walking down the street.

In Maryland, police have been using software to identify faces in protest photos and match them to people with warrants, according to the American Civil Liberties Union (ACLU).

UK Police will use facial recognition software to scan the faces of tens of thousands of revellers at this year’s Notting Hill carnival, on the 26th – 28th August, even though civil liberties groups believe such an action would be discriminatory.

The Metropolitan Police has described the planned deployment as a pilot project intended to look for suspected troublemakers to keep those attending safe.

The Notting Hill carnival is the biggest annual public order test for the Met, attracting crowds of up to 1 million people. Police at the two-day west London event will use the facial recognition system and match faces in the crowd against databases of people they suspect will cause trouble, comparing them with images of people previously arrested or under bail conditions to keep away from the event.

Last year’s carnival led to 45 officers being assaulted and eight were spat at, requiring them to take medication in case of infection. There were also 454 arrests, the highest number in a decade.

The Met said it had consulted on the deployment technology with a regulator and a civil liberties group. “The deployment of the cameras is to test the technology and was implemented following close liaison with the information commissioner and Big Brother Watch. Once the trial is complete, we will be analysing the results and holding a public consultation.”

However, Big Brother Watch, a privacy group campaigning against burgeoning state powers, said it had one chat with police last summer. Its chief executive, Renate Samson, said: “We met with them before the trial last year and haven’t spoken to them since. Certainly, we did not know the technology was to be trialled again this year.”

A different facial recognition system was used by police in Cardiff when the Welsh capital hosted May’s Champions League final between Real Madrid and Juventus.

Sam Lincoln, a former chief inspector in the Office of Surveillance Commissioners, said: “When you put facial recognition on to CCTV cameras, the ability for crime fighters to recognise people is enhanced. It speeds it up, you don’t have to have lots of people watching video.

“Who is saying that a camera has the capability? How is the capability used? How is it monitored? How is that data being connected to other surveillance? It’s a very clever method of data collection.”

Guardian:     Guardian

You Might Also Read:

Facial Recognition Technologies:

Facial Recognition Prevents Terrorist Attacks:

 

 

« The Stage Is Set For Cyber War
There Are No Civilians In Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

CloudSEK

CloudSEK

CloudSEK has set its sights on building the world’s fastest and most reliable AI technology, that identifies and resolves digital threats.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.

CheapSSLWEB

CheapSSLWEB

CheapSSLWeb.com is an affordable and trusted SSL/TLS certificate provider from globally recognized CA (Certificate Authority) Comodo, Sectigo, and Certera..