Computerworld - Congress might need to pass legislation to limit the way government agencies and private companies use facial recognition technology to identify people, a U.S. senator said recently.
The growing use of facial recognition tools raises serious privacy concerns, said Sen. Al Franken (D-Minn.), chairman of the Senate Judiciary Committee's privacy subcommittee.
During a subcommittee hearing, Franken called on the FBI and Facebook to change the way they use facial recognition technology. "I believe that we have a fundamental right to control our private information," he said.
No existing U.S. laws limit the use of facial recognition tools in the public or private sectors, said people who testified before the subcommittee. The FBI and the Department of Homeland Security have huge databases of biometric identifiers, and they're adding facial data to them. Meanwhile, Facebook users are uploading 300 million photos to the social networking site every day, said Jennifer Lynch, an attorney for the Electronic Frontier Foundation. "Many Americans don't even realize that they're already in a facial recognition database," she said.
The FBI is testing facial recognition tools in criminal cases, said Jerome Pender, a deputy assistant director in the FBI's Criminal Justice Information Services Division. It uses a mugshot database that doesn't contain photos of people who have never been arrested, he said.
Others who testified said the technology is a useful tool that helps police arrest the correct people more quickly.
This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.
Read more about Security in Computerworld's Security Topic Center.
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!