From the Blog

: Almost out of science fiction, facial recognition technology that identifies people and flags authorities if an individual is on a security watch-list has been gaining headlines.

Real-time imaging systems integrating existing and new image sources, combined with facial recognition and artificial intelligence software, are used to track suspects, spot suspicious behaviors, and coordinate emergency services to help improve public safety and security.

In China, the law enforcement uses a database referred to as a public security police cloud infrastructure. According to the Washington Post, the vast database gathers information on criminal and medical records, travel bookings, online purchases and social media, and links the intelligence assembled to an individual’s identity card and face.

As covered by Kan Kan News, Chinese law enforcement was able to locate a man wanted for “economic crimes” in a concert crowd of 60,000 people. When the man arrived to the stadium, the entrance cameras with facial recognition capabilities identified the man and notified authorities. The man could not fathom how the police were able to locate him in a crowd of 60,000 people.

An article posted on The Telegraph described how a man suffering from mental illness missing for over a year was reunited with his family due to China’s network of facial recognition systems.

Facial recognition has proved itself to be a powerful and effective technology with many applications, among them, security. Like every other powerful and effective technology, there are positive and negative ways to utilize facial recognition technology.