Facial Recognition What is it and how does it work? 1. LEAs collect photo mugshots of arrestees and ask other government agencies (like the DMV or the.

Slides:



Advertisements
Similar presentations
IIJIS Privacy Policy Meeting June 2, 2004 Bureau of Identification Data Quality.
Advertisements

Dr. Marc Valliant, VP & CTO
Collecting Primary Data: Unobtrusive Measures. Objectives After this session you will be able to: Distinguish between unobtrusive measures and other research.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Automated Fingerprint Identification System (AFIS) Modernization Project Department Of Emergency Services and Public Protection Division of State Police.
Eyewitness ID Reform Legislation: Past, Present and Future Scott Ehlers, NACDL State Legislative Affairs Director.
Face Biometric Applications Team Members: Faune Hughes, Daniel Lichter, Richard Oswald, and Michael Whitfield Clients: Fred Penna and Robert Zack.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School - Wu Laboratory
Police Technology Chapter Eight
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
INTERPOL For official use only. Facial Recogniton Project Campbell McGhee.
Advanced Information Technology in Law Enforcement: Challenges and Barriers to Implementation Andreas M. Olligschlaeger, Ph.D. President, TruNorth Data.
LOCAL AGENCY MUST STILL RUN A FILE CHECK (QHW) TO DETERMINE WARRANTS/HOLDS II. If name is not on CCH, prints are compared to all fingerprints in AFIS for.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
A New Way to Work For the New Century. As a result of several years’ work by you and your co-workers, we have...
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
How do we use DNA in law enforcement and forensics? How do we use DNA in law enforcement and forensics? Personal Genetics Education Project Harvard Medical.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Wil Haywood Rossana Bua Rhishi Katoch Kelvyn Araujo-Valdez Steve Kim.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Quiz Week 8 Topical. Topical Quiz (Section 2) What is the difference between Computer Vision and Computer Graphics What is the difference between Computer.
Face Recognition Technology By Catherine jenni christy.M.sc.
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
Combating Fraud with Face Recognition: Some FBI Initiatives Richard W. Vorder Bruegge Senior Photographic Technologist Federal Bureau of Investigation.
Office of Research and Information Technology CVSA and FMCSA SSDQ Performance Measures: Crash Timeliness Inspection Timeliness April , 2013 CVSA.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School
Ide kerülhet az előadás címe Julia Sziklay: Facial recognition – a relevant example of biometric data collection Sarajevo,
Presented By Bhargav (08BQ1A0435).  Images play an important role in todays information because A single image represents a thousand words.  Google's.
Keeping Students and Families Safe: Healthcare Breakout Session
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Computer vision and biometric technology in credit risk
Athina Antoniou and Lilian Mitrou
FACE RECOGNITION TECHNOLOGY
Cell Site Simulators (“CSSs”)
What is it and what does it do?
Biometrics.
The Law Governing Identification Evidence
For Parent Attorney Representation in Dependency Matters
Facial Recognition [Biometric]
Chapter 10 Eyewitness Testimony Talbot Kellogg Community College
Facial Recognition in Biometrics
Biometrics.
Privacy and Information
Biometric technology.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Making a Match.
Theft of Trade Secrets & Economic Espionage
How is Crime Measured Uniform Crime Report (UCR)
Digital Device Searches
Timothy J. Pastore, Esq. Duval & Stachenfeld LLP
Baltimore Police Department & CitiWatch
Cell Site Location Information
15-5 Automated Fingerprint Identification System
Current State of Security and Privacy
ALPR What is it? Automated license plate readers (“ALPRs”) are computer-controlled, high-speed camera systems that automatically capture images of license.
Presentation transcript:

Facial Recognition What is it and how does it work? 1. LEAs collect photo mugshots of arrestees and ask other government agencies (like the DMV or the State Dept.) that also collect photos of faces to share their info

Facial Recognition What is it and how does it work? 2. The digital images are then converted into a mathematical representation of pre-designated measurements

Facial Recognition What is it and how does it work? 3. The mathematical templates are uploaded into a common database

Facial Recognition What is it and how does it work? 4. Cops take a “query” photo they want to ID, convert the image into a mathematical representation that can be compared with the known photos in the database(s), using facial recognition algorithms that rely on unique physical markers on your face to find the closest mathematical matches.

Where do cops get a query photo? Facial Recognition Where do cops get a query photo? In the field: Social media: CCTV: Smart City cameras:

Facial Recognition How do I know if cops used FR in my case ? Look for the following factors which may indicate use of FR: An officer or witness took your client’s photo before booking. Your client was arrested in an unusual location or without notice. You see certain buzzwords in the police report.

Buzzwords to look for in reports: Facial Recognition Buzzwords to look for in reports: “photos from a police database” Next Generation Identification-Interstate Photo System (“NGI-IPS”) – FBI database of nearly 73 million criminal records and over 53 million civilian records Facial Analysis, Comparison and Evaluation (“FACE”) Services – over 411 million non-criminal photos from DMV & passports Universal Control Number (“UCN”) – ID # assigned to photo Repository for Individuals of Special Concern (“RISC”) “Candidate List” – list of potential matches

How do I challenge FR evidence? Facial Recognition How do I challenge FR evidence? Subpoena contract between the LEA, DOJ, and FR prgm developers to review limits in programming capabilities. Object to error rates and false positives: NGI purports to provide the “true candidate” in the top 50 profiles only 85% of the time – and that’s presumably only if the “true candidate” is even contained within the database – leaving the system prone to false positives.

How do I challenge FR evidence? Facial Recognition How do I challenge FR evidence? Consider filing a motion to compel the FR algorithm source code in order to search for flaws that may affect search results If in IL and a stock photo is taken from a private actor, take advantage of the IL Biometric Information Privacy Act (740 ILCS 14/15, § 15(b)) that requires notice and consent before use of FR tech

Facial Recognition How do I learn more? Read Govt Accountability Office report on FR: eff.org/FRGAO2016 EFF’s 2017 Senate Testimony on FR: eff.org/FR2017 Georgetown’s Law’s Report on FR: https://www.perpetuallineup.org/ Ex. of law enforcement’s FR training: eff.org/FRLEAtraining Review of FR program flaws: eff.org/FRflaws NGI/RISC Privacy Impact Assessment: eff.org/FRPIA

Stephanie Lacambra Criminal Defense Staff Attorney 415-436-9333 x130 stephanie@eff.org