Face recognition technology follows a long analog history of surveillance and control based on identifying physical features
- Written by Sharrona Pearl, Associate Professor of Bioethics and History, Drexel University
American Amara Majeed was accused of terrorism[1] by the Sri Lankan police in 2019. Robert Williams was arrested outside his house[2] in Detroit and detained in jail for 18 hours for allegedly stealing watches in 2020. Randal Reid spent six days in jail[3] in 2022 for supposedly using stolen credit cards in a state he’d never even visited.
In all three cases, the authorities had the wrong people. In all three, it was face recognition technology that told them they were right. Law enforcement officers in many U.S. states are not required to reveal[4] that they used face recognition technology to identify suspects.
Face recognition technology is the latest and most sophisticated version of biometric surveillance[5]: using unique physical characteristics to identify individual people. It stands in a long line of technologies[6] – from the fingerprint to the passport photo to iris scans – designed to monitor people and determine who has the right to move freely within and across borders and boundaries.
In my book, “Do I Know You? From Face Blindness to Super Recognition[7],” I explore how the story of face surveillance lies not just in the history of computing but in the history of medicine, of race, of psychology and neuroscience, and in the health humanities and politics.
Viewed as a part of the long history of people-tracking, face recognition techology’s incursions into privacy and limitations on free movement are carrying out exactly what biometric surveillance was always meant to do.
The system works by converting captured faces – either static from photographs or moving from video – into a series of unique data points, which it then compares against the data points drawn from images of faces already in the system. As face recognition technology improves in accuracy and speed, its effectiveness as a means of surveillance becomes ever more pronounced.
Accuracy improves, but biases persist
Surveillance is predicated on the idea that people need to be tracked[9] and their movements limited and controlled in a trade-off between privacy and security. The assumption that less privacy leads to more security is built in.
That may be the case for some, but not for the people disproportionately targeted by face recognition technology. Surveillance has always been designed[10] to identify the people whom those in power wish to most closely track.
On a global scale, there are[11] caste cameras in India[12], face surveillance of Uyghurs in China[13] and even attendance surveillance[14] in U.S. schools[15], often with low-income and majority-Black populations. Some people are tracked more closely[16] than others.
In addition, the cases of Amara Majeed, Robert Williams and Randal Reid aren’t anomalies[17]. As of 2019, face recognition technology misidentified Black and Asian people[18] at up to 100 times the rate of white people[19], including, in 2018, a disproportionate number of the 28 members of the U.S. Congress[20] who were falsely matched with mug shots on file using Amazon’s Rekognition tool.
When the database against which captured images were compared had only a limited number of mostly white faces upon which to draw, face recognition technology would offer matches based on the closest alignment available, leading to a pattern of highly racialized – and racist – false positives.
With the expansion of images in the database and increased sophistication of the software, the number of false positives[21] – incorrect matches between specific individuals and images of wanted people on file – has declined dramatically[22]. Improvements in pixelation and mapping static images into moving ones, along with increased social media tagging and ever more sophisticated scraping tools[23] like those developed by Clearview AI, have helped decrease the error rates.
The biases[24], however, remain deeply embedded into the systems and their purpose, explicitly or implicitly targeting already targeted communities. The technology is not neutral, nor is the surveillance it is used to carry out.
clu/DigitalVision Vectors via Getty Images[25]Latest technique in a long history
Face recognition software is only the most recent manifestation of global systems of tracking and sorting. Precursors are rooted in the now-debunked belief that bodily features offer a unique index to character and identity. This pseudoscience was formalized in the late 18th century under the rubric of the ancient practice of physiognomy[26].
Early systemic applications included anthropometry (body measurement), fingerprinting and iris or retinal scans. They all offered unique identifiers. None of these could be done without the participation – willing or otherwise – of the person being tracked.
The framework of bodily identification was adopted in the 19th century for use in criminal justice detection, prosecution and record-keeping to allow governmental control of its populace. The intimate relationship between face recognition and border patrol was galvanized by the introduction of photos into passports[27] in some countries including Great Britain and the United States in 1914, a practice that became widespread by 1920[28].
Face recognition technology provided a way to go stealth on human biometric surveillance. Much early research into face recognition software was funded by the CIA[29] for the purposes of border surveillance.
It tried to develop a standardized framework for face segmentation: mapping the distance between a person’s facial features, including eyes, nose, mouth and hairline. Inputting that data into computers let a user search stored photographs for a match. These early scans and maps were limited, and the attempts to match them were not successful.
Huang Zongzhi/Xinhua News Agency via Getty Images[30]More recently, private companies have adopted data harvesting techniques[31], including face recognition, as part of a long practice of leveraging personal data for profit[32].
Face recognition technology works not only to unlock your phone or help you board your plane more quickly, but also in promotional store kiosks and, essentially, in any photo taken and shared by anyone, with anyone, anywhere around the world. These photos are stored in a database, creating ever more comprehensive systems of surveillance and tracking.
And while that means that today it is unlikely that Amara Majeed, Robert Williams, Randal Reid and Black members of Congress would be ensnared by a false positive, face recognition technology has invaded everyone’s privacy. It – and the governmental and private systems that design, run, use and capitalize upon it – is watching, and paying particular attention to those whom society and its structural biases deem to be the greatest risk.
References
- ^ accused of terrorism (www.bbc.com)
- ^ arrested outside his house (www.nytimes.com)
- ^ spent six days in jail (www.nytimes.com)
- ^ not required to reveal (www.wired.com)
- ^ biometric surveillance (www.dhs.gov)
- ^ long line of technologies (www.thalesgroup.com)
- ^ Do I Know You? From Face Blindness to Super Recognition (www.press.jhu.edu)
- ^ David McNew/AFP via Getty Images (www.gettyimages.com)
- ^ people need to be tracked (theconversation.com)
- ^ Surveillance has always been designed (www.routledge.com)
- ^ there are (doi.org)
- ^ caste cameras in India (longreads.tni.org)
- ^ face surveillance of Uyghurs in China (www.theguardian.com)
- ^ attendance surveillance (mynbc15.com)
- ^ in U.S. schools (dx.doi.org)
- ^ Some people are tracked more closely (www.aclu.org)
- ^ aren’t anomalies (www.aclu.org)
- ^ misidentified Black and Asian people (nvlpubs.nist.gov)
- ^ 100 times the rate of white people (www.nist.gov)
- ^ 28 members of the U.S. Congress (www.aclu.org)
- ^ the number of false positives (www.csis.org)
- ^ declined dramatically (bipartisanpolicy.org)
- ^ ever more sophisticated scraping tools (www.penguinrandomhouse.com)
- ^ The biases (www.washingtonpost.com)
- ^ clu/DigitalVision Vectors via Getty Images (www.gettyimages.com)
- ^ ancient practice of physiognomy (www.hup.harvard.edu)
- ^ introduction of photos into passports (www.atlasobscura.com)
- ^ a practice that became widespread by 1920 (doi.org)
- ^ funded by the CIA (www.wired.com)
- ^ Huang Zongzhi/Xinhua News Agency via Getty Images (www.gettyimages.com)
- ^ adopted data harvesting techniques (fortune.com)
- ^ leveraging personal data for profit (theconversation.com)
Authors: Sharrona Pearl, Associate Professor of Bioethics and History, Drexel University