SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Hikvision 4G solar kit for remote security

    Hikvision 4G solar kit for remote security

    Dahua Panoramic PTZ WizMind Network Camera

    Dahua Panoramic PTZ WizMind Network Camera

    Hikvision DeepinView: The Dedicated Subseries

    Hikvision DeepinView: The Dedicated Subseries

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • HID Global expands its RFID enablement solutions portfolio with Invengo's Textile Services Business acquisition
    • ASSA ABLOY acquires Invengo Information Technology Co., Ltd.’s textile services business unit in France
    • Access IS delivers contactless transit payment solutions for Storstockholms Lokaltrafik to secure Stockholm’s public transport
    • Security Industry Association names Craig Sharman as the 2021 recipient of the SIA Chairman’s Award
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2020
    • Year in Review 2019
    Featured
    • What are the security challenges of protecting SMBs?
    • Expert roundup: healthy buildings, blockchain, AI, skilled workers, and more
    • Smart Offices: How is mobile ID changing the way we access the office?
    • Water plant attack emphasizes cyber’s impact on physical security
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Dahua Technology installs HD CCTV cameras with smart analytics using AI to secure iconic Battle of Britain Bunker

    Dahua Technology installs HD CCTV cameras with smart analytics using AI to secure iconic Battle of Britain Bunker

    Oliver Law Security installs Vanderbilt ACT365 security system to protect one of Doncaster’s largest gyms, The Fitness Village

    Oliver Law Security installs Vanderbilt ACT365 security system to protect one of Doncaster’s largest gyms, The Fitness Village

    Hikvision IP CCTV systems protect visitors and stores at Somerset Mall in South Africa

    Hikvision IP CCTV systems protect visitors and stores at Somerset Mall in South Africa

    CLIQ® access control solution from ASSA ABLOY helps secure museums, shopping and indoor leisure sites

    CLIQ® access control solution from ASSA ABLOY helps secure museums, shopping and indoor leisure sites

  • Virtual events
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Management Systems
    • Integrated Systems
    • Asset Management
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Shifting trends in operation centers and control rooms for 2021

    Shifting trends in operation centers and control rooms for 2021

    5 steps to building resilience in your 2021 physical security plan

    5 steps to building resilience in your 2021 physical security plan

    Critical event management: The digital transformation of safety and security

    Critical event management: The digital transformation of safety and security

    Capture new opportunities with computer vision and video analytics

    Capture new opportunities with computer vision and video analytics

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY
    • Security & Safety Things
    • Hanwha Techwin America
    Other Resources
    • eMagazines
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    How to ramp up perimeter security with license plate reader technology

    How to ramp up perimeter security with license plate reader technology

    Solve access control challenges in the healthcare sector

    Solve access control challenges in the healthcare sector

    The role of access control in a safe return to the workplace

    The role of access control in a safe return to the workplace

    10 step guide to staying ahead of emerging security threats

    10 step guide to staying ahead of emerging security threats

About us Advertise
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Thermal imaging
  • Intrusion detection
  • Body worn video cameras
  • ISC West
  • Video management software
  • Video analytics
  • COVID-19
  • View all
Counter Terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
Counter Terror

We have the technology to make society safer – how long can we justify not using it?

We have the technology to make society safer – how long can we justify not using it?
Rob Watts
Rob Watts
Download PDF version
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Related Links
  • Safety in smart cities: How video surveillance keeps security front and centre

While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware.

CCTV surveillance cameras 

Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention?

It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents.

Live Facial Recognition (LFR)

We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition

Across recent weeks, we have seen pleas from UK organisations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift.

We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society.

Facial recognition technology - A force for good

Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives.

One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centres or police stations of their identity, condition and where they need to go (a home address or a next of kin contact).

Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations.

Tracking and finding missing persons

Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognise individuals even if up to 50% of their face is covered and from challenging or oblique angles.

Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analysing CCTV footage.

Rapid scanning of images

Facial recognition technology can rapidly scan images for a potential match

Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold.

It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable.  

Debunking the myths

One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal.

The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognise. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed.

Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted.

Privacy

Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story

Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative.

As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the centre of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly.

Biometrics, mask detection and contactless payments

Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police.

There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.  

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version
  • Network / IP
  • Biometrics
  • Counter surveillance
  • Mass surveillance
  • Video surveillance systems
  • Video surveillance equipment
  • Remote video surveillance
  • IP video surveillance
  • Electronic security systems
  • Business security systems
  • Physical security
  • Public sector security
  • Security management
  • Security policy
  • Security cameras
  • Surveillance cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Biometric authentication
  • Biometric time and attendance
  • Biometric sensors
  • Facial recognition systems
  • Network monitoring
  • Asset tracking
  • Electronic access control
  • Identity management
  • Public security
  • Network cameras
  • IP Surveillance
  • Security service
  • Mobile surveillance
  • Green security
  • Green surveillance
  • Video surveillance solutions
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Covert Surveillance
  • Security communication
  • Counter Terror
  • Cyber security
  • Mobile communications
  • Corporate Security
  • Data Security
  • Incident Management
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • Video surveillance
  • Machine Learning
  • Touchless Security
  • Related links
  • Biometric Access control systems & kits
  • Biometric Access control software
  • Pan Tilt CCTV cameras
  • Indoor/Outdoor IP Dome cameras
  • Standalone / Networked Access control systems & kits
  • Proximity Access control systems & kits
  • Network IP cameras
  • Central Monitoring Option Access control software
  • Face Recognition Software Access control software
  • Articles by Rob Watts
  • Related categories
  • CCTV cameras
  • Access control systems & kits
  • Access control software
  • IP cameras
  • IP Dome cameras
Featured white papers
Access control & intelligent vehicle screening

Access control & intelligent vehicle screening

Download
Related articles
Physical and cyber security precautions when travelling

Physical and cyber security precautions when travelling

Mass security screening technology for large events

Mass security screening technology for large events

2018 FIFA World Cup Russia integrates safety, security and service

2018 FIFA World Cup Russia integrates safety, security and service

Follow us

Sections CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos January 2021 news RSS
Topics Artificial intelligence (AI) Counter Terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras ISC West Video management software
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec