User:Revlava71/sandbox/Face Recognition System and Homeland Security

1. Introduction

Many years ago, face recognition system has been a technological dream for some people who were specifically involved in the research, and a fiction for others who had no idea of what could done. At that time, anyone who had heard on such a technological project, had probably wondered: how will that be possible? How would that be done? Richler, Cheung, and Gauthier (2001) noted that, “The concept of holistic processing is a cornerstone of face recognition research.” However, the events of September 11th gave a new twist to the evolution of facial recognition technology. From its invention until now, facial recognition system has undergone enormous progress and has impacted some industries such as intelligence agencies, healthcare, and business. Actually, Homeland security has always been one of the main concerns for all Americans, and most importantly a focus on the United States presidential debates. As terrorist’s networks are expanding and multiply, the security of citizens is threatened. Ciampa (2015), observed that, “Random shootings, suicide car bombings, airplane hijackings, and other types of physical violence occur around the world with increasing frequency.” (p.3) Therefore, at the challenge of the insecurity caused by the growth of terrorism, the facial recognition system seems to be an appropriate tool that helps prevent potential terrorist attacks and provide homeland security by identifying and stalking the criminals.

2. How and where the technology is used.

Depending on the domain, face recognition system is differently used for the same purpose: the security. Li and Jain (2011), have stated that, “As a biometric system, a face recognition system operates in either or both of two modes: (1) face verification (or authentication), and (2) face identification (or recognition).” (p.2) For example, intelligence agencies use the technology to identify criminals and respond against potential threats. I totally agree with Cordesman (2002) as he pointed out that, “Homeland defense must respond to the full range of threats.” (p.13) Whereas, face recognition software in the smart phone is used as a feature that helps to secure the device from robbery. Face recognition technology is used in smart phones as password preventing anybody else who is not the owner to use the device without a prior authorization.

3. Security aspects of Face Recognition System.

When it comes to think of the security aspects of face recognition system, Data privacy seems to be a real concern. In 2007, Newton, Sweeney, and Malin pointed out that, “In the context of sharing video surveillance data, a significant threat to privacy is face recognition software.” (Abstract) The consumers of facial recognition technology are certainly enjoying it on the devices, but only few of them are aware of its downsides. Your image can be accessed by unknown people where it is stored and be harmfully used against you.

4. Ethical and Social implications. According to Langenderfer and Linnhoff (2005), “Biometric systems are quickly becoming a standard part of modern life...” As a biometric feature that can be found almost in all the devices of last release, face recognition technology has Ethical and Social implications in people everyday life. 5. Future use.

How the technology will be used in future? A good question, right? It’s a little tricky to say and predict how facial recognition system will be used in future. Few years ago, none of the consumers of technologic products such as smart phone, smart cars, smart watches could say and predict the technological improvements we are all witnessing today. However, the evidence is that, the future will come with new improvements and the technology may be used in the way we don’t have any idea yet. Technology is the world of wonders, and face recognition system is one of the wonders of technology.

References

Ciampa, M., (2015). Security+ guide to network security fundamentals (5th ed.). Boston, MA: Cengage.

Cordesman, A. H., (2002). Terrorism, asymmetric warfare, and weapons of mass destruction: Defending the U.S. Homeland. Westport, Conn: Praeger.

Langenderfer, J., & Linnhoff, S. (2005). The emergence of biometrics and its effect on consumers. The Journal of Consumer Affairs, 39(2), 314-338. Retrieved from https://search-proquest-com.mutex.gmu.edu/docview/195895681?accountid=14541

Li, S.Z. and Jain, A.K., (2011). Handbook of face recognition. (2nd ed.). London: Springer.

Newton, E., Sweeney, L., & Malin, B. (2007). Preserving privacy by de-identifying facial Images [Abstract]. Star, 45(3) Retrieved from https://search.proquest.com/docview/24011308?accountid=14541

Richler, J. J., Cheung, O. S., & Gauthier, I. (2011). Holistic processing predicts face recognition Psychological Science, 22(4), 464-471. doi: http://dx.doi.org.mutex.gmu.edu/10.1177/0956797611401753