By Roger Rodriguez, Director of Business Development at Vigilant Solutions, a 2017 ‘ASTORS’ Homeland Security Award Winner
We all know that technology and automation make us more efficient in our lives and our jobs – think of the way you save a few precious seconds by telling your mobile device to dial a phone number instead of manually pushing buttons.
As a retired police officer, I have been alarmed to see comments in recent months by privacy activists, and even some policymakers, suggesting that it should be harder for law enforcement to use technology to do their jobs more efficiently.
Facial recognition is an important crime-fighting technology – yet certain groups and media outlets have deemed it a law enforcement surveillance tool that infringes on privacy.
This is not correct.
The reality is that facial recognition is a proven technology that helps investigators prevent and solve crimes.
It is not used to continuously surveil the public or target specific groups, as has some have suggested.
Law enforcement officials use it to more efficiently solve crimes, ensuring public safety and ultimately saving lives.
Here’s how it works:
Facial recognition software quickly compares one face with a lot of other faces to see if there is a potential match.
Cops do the same thing every day in a manual way, by knocking on doors with a photo, or having crime victims look through hundreds of mugshot photos; facial recognition just automates the process.
The technology does not replace anything in criminal investigations except for time and effort – and when used properly, it is a valuable tool in the investigative process that can generate a strong investigative lead.
I recently spoke at the Biometrics for Government and Law Enforcement conference in Washington, DC, and the more I speak at these events and around the country, the more I realize that there are many misconceptions about biometric facial recognition technology.
Maybe it comes from too many crime dramas on TV or maybe it comes from reports that represent a narrative about bias that the facts simply don’t support.
During speaking engagements like this one, I consider it a duty and a privilege to cut through the myths and share the reality of how facial recognition can be an incredibly valuable tool for law enforcement to develop leads and help solve cases.
Separating Biometric Facial Recognition Myths from Reality
While there are many misconceptions to address, I’ll take you through the top four that were discussed at the Biometrics conference.
Fact One: It works.
- When I joined Vigilant Solutions after serving over 20 years in the New York Police Department (NYPD), I was asked, “If you had one message that you would like the world to know about facial recognition what would it be?”
- My response: “I want the world to know that this is a biometric technology tool and not a biometric science.”
- What do I mean? Facial recognition is not 100% accurate. It is not DNA.
- But here’s what I do know: After working on countless cases using facial recognition, I am certain it works when properly used in the investigative process to develop leads and help solve cases.
- At the NYPD, the facial recognition investigation unit I spearheaded has conducted more than 8,500 facial recognition investigations and over 2,700 arrests.
- I know that without it, many cases would go unsolved.
- And I know that it has helped bring dangerous criminals to justice, it has saved lives, and it protects officers and communities.
Fact Two: A facial recognition match is NOT the basis for arrest.
- This is so important and that’s why we emphasize this over and over: Facial recognition technology provides leads; it is NOT the basis for arrest.
- The onus always falls on the agency to establish probable cause.
- Agencies should follow best investigative practices and establish policies for facial recognition investigations including: documenting what you have done, creating an audit trail, and demonstrating a disciplined approach to facial recognition investigations.
- Critical to that disciplined approach in addition to the background investigation, is a requirement that an analyst individually examine the potential match to determine if the physical attributes match up.
Fact Three: Enhancing images helps to find the bad people.
- At the conference, there was a ton of buzz about the ability to enhance images.
- Some even questioned the practice and asked whether it was a bad to manipulate probe images.
- The facts show that we are not manipulating but enhancing what is already there to develop a lead.
- When we use enhancement tools to render a poor-quality image usable for facial recognition investigations, we are simply taking that image and cleaning it up so that it can be used to generate a potential match by the facial recognition software.
- For example, what happens when you add eyes to a picture of someone with closed eyes and you end up with a potential match that ranks 100?
- You investigate, you look into the background, and you vet that photo.
- Take the case of twins. If you put in a photo of one twin the other will show up as a match. Does that mean you arrest the match?
- No, what you have is a lead to investigate. Isn’t the same thing done when agencies use sketch artists?
- The find someone who resembles the sketch through physical characteristics but still need to validate the potential match as a viable candidate in the Investigation.
Fact Four: You don’t have to be a graphic design expert to use enhancement tools.
- For many agencies, biometric facial recognition is off the table because they falsely believe that you need to either be an expert at graphic design or you have to outsource image editing software and training to use the technology.
- My time with the NYPD as the Lead Detective for the agency’s first dedicated facial recognition unit taught me that law enforcement needs tools that are easy to use or they won’t use them at all.
- That experience led to the development of Vigilant’s simple to use image enhancement tools.
Want to know more? Get the Whitepaper: Facial Recognition: Art or Science?
Recommended Best Practices for Your Facial Recognition Investigative Workflow to Prevent Facial Recognition Misuse and Bias
Capturing good probe images, enhancing lower quality images, facial analysis, two-tier verifications, and identifying your possible match.
Combat False Narratives with These Investigative Processes
Facial recognition is a proven technology that provides great and growing value to public safety.
But, I will also firmly state that law enforcement users of facial recognition technology must live by a clearly defined process and rock-solid policies that are rigorously exercised and audited.
If we don’t actively demonstrate the accountability we all live by, we create open space for fear mongers to air their falsehoods.
Goal of Facial Recognition to Generate Investigative Leads
Let’s consider the facts. The goal of using facial recognition technology is to generate a strong investigative lead – not to definitively conclude that a face matches an identity.
- As a former detective who has analyzed thousands of images for criminal investigations, I can attest that every image introduced into a facial recognition system is unique.
- Because of this, a standard workflow and process must be established by every agency that uses the technology.
- An initial step in this process is image analysis.
- A vetting process must be established by the agency where a system user analyzes and physically inspects the images for quality and clarity before conducting any type of facial recognition search or comparison.
- The user must affirmatively answer the questions:
- Does this image meet the criteria for a facial recognition search?
- Can this image be enhanced by software, or will this image be rejected?
These purely human expert judgments should be a prerequisite to starting the process since no facial recognition search or analysis is ever the same.
- As search results go, facial recognition algorithms read each face differently.
- When images are higher quality, the process is seamless: import a face and the software will find a result in the list of returns, usually returning a facial match with a higher confidence ranking.
- Many facial recognition systems on the market today do this very well.
What about facial recognition results using images of lower quality?
- Assuming these images can be enhanced by facial recognition software, they can be searched, but confidence rankings in the gallery of returned faces will vary and the returns will not be so obvious.
- What is important for agencies to remember is that you can still leverage a lower quality image to find possible matches.
- You can enhance the image with software and utilize data filters.
- Search results often change when metadata filters are applied, especially when searching against a database in the millions, thousands, or hundreds.
- When search parameters are defined and levels of specificity are set by the user, the results vary but also become more precise.
- Users can either narrow or expand searches based on filters and gallery sizes.
- These factors can improve results, but they still require the facial recognition user to individually examine each image.
- The algorithms may pick up minute facial features, but the subject will more likely return deeper in a candidate list.
The point is that with the right gallery size and appropriate metadata selections, lower quality images can be used by facial recognition systems to return results.
- It is also critical that the investigator who uses facial recognition technology has detailed knowledge of the case such as the unknown suspect’s descriptive features, or the location where the crime occurred.
- This helps improve the quality of search results. Just as important, the facial recognition user needs to have a keen eye for detail to locate the “face” within the list of candidates, and also needs to be patient and persistent with the use of filters.
Two-Level Verification Process Critical
Once a subject has been identified as a possible match through physical attributes, a first level verification begins.
- Because many doppelgangers exist in this world (he looks like him, she looks like her), an immediate background investigation must be performed on faces with similar physical characteristics.
- This first level verification validates the candidate as a viable suspect by strengthening the subjective analysis for identifying physical similarities between two faces.
Once the physical characteristics and first level background checks match, a second level verification is needed in the form of a peer review.
- The objective in a peer review is to convince the group the person in the known image (your candidate) may reasonably be the same person in the original image sourced in your investigation (your probe image).
- Findings should be displayed on high definition screens and presented to a group of three to five peers.
- The investigator should showcase his or her first level verifications in the form of a “sales pitch” made to their peers.
- This analysis must demonstrate in great detail any physical similarities or differences between both faces.
- Annotations should be made and displayed on screen which highlight definitive characteristics such as scars, moles, marks, or tattoos.
- Talk about the shape of the head, hairline, hair texture, jawline, eyes, nose, mouth region, and the shape of the ears.
- Discuss any relevant background information obtained about your candidate, provide any arrest history if applicable, and compare investigative background findings to establish associations with your current investigation.
- The goal of the peer review process is to showcase how you selected your candidate and came to your conclusions.
Ultimately, you want to reasonably place the known candidate who was matched and selected from the facial recognition gallery search at the scene of the crime.
- To complete the second level verification, a majority rules voting system should take place.
- The question everyone should be asking is:
- “Could this be the person we are looking for?
- Could this reasonably be the suspect with all factors considered?”
Critical to note is that once a candidate has been identified through facial recognition and validated through peer review, an arrest still CANNOT be made.
While this is obvious to most facial recognition users in law enforcement, it is still where unintentional mistakes can be made.
- While many agencies act in good faith to acquire expert testimony from facial recognition analysts, they sometimes unintentionally fall short by making arrests based on that analysis, and not based on sound implementation of the recommended two-level verification process.
- Expert analysis can inform the process, but it should not replace it.
Lower Quality Images Require More Vetting and Analysis
An enhanced approach should be taken with regard to images of lower quality.
- These images require more vetting and analysis.
- When surveillance video is described as “grainy,” the image lacks quality data because it is of lower resolution.
- This may cause an expert analyst to remain neutral.
- If that happens, there is no longer a need for a facial recognition comparison using algorithms.
- As a general rule of thumb, I always teach:
- “If you can’t see a face, the facial recognition system can’t see a face.”
- “If you are presented with a lower quality image that a human being cannot effectively analyze, do not perform any type of comparative facial analysis.”
- “It will rarely be credible.”
I’ve seen many articles discuss the high probabilities of facial recognition false positives or the potential for high rates of misidentifications.
However, a key to law enforcement success with facial recognition is reducing reliance on facial recognition software alone or expert testimony alone.
- In police terminology, “Call for back up!” Back up your “faces” with peer reviews and other supporting documents to validate any facial recognition match candidates as viable suspects. A
- gain, the goal of performing facial recognition analysis is to generate a strong lead.
- We have no time for fishing expeditions.
- When agencies implement a two-level validation process into their facial recognition workflow, it supports all forms of subjective analysis, and the false narrative of selecting false positives which lead to misidentifications will be much easier to refute.
Even when images acquired in investigations are higher in resolution, and a person in an image can easily be identified by human eyes, the analysis is still subjective.
- It still needs other forms of supporting validation to strengthen the already apparent physical similarities between two faces.
- How can you do this?
- This can be done with adding facial annotations and measurements in the comparative analysis of faces in addition to conducting background check verifications.
- The annotations and supporting documents can be introduced into court as the basis which generated the facial recognition lead.
- This proper documentation can greatly assist in the prosecution of suspects.
- Implementing this methodology shows an agency is not simply relying on the facial recognition software, but is sourcing other methods to validate the match.
Agencies Must Independently Establish Probable Cause for Arrest
Upon review, all facial recognition matches should be treated no differently than someone calling in a possible lead from a dedicated tip line.
- The onus still falls on the investigator in an agency to independently establish probable cause to effect an arrest.
- It is important to note: A recommended best practice in facial recognition use in criminal investigations is that all matches returned by the software, and validated by human analysis, remain possible leads.
Probable cause for arrest must be met by other investigatory means.
As to claims of racial bias in the Georgetown Study, when would someone’s race be applied to a facial recognition search?
- If a facial recognition user is working with a large database of faces, and the suspect has been described as a male or female, and the subject’s race is known.
- However, this is not a biased search. This is a filtered search.
- These types of demographic filters (which are found within the image metadata) are applied to facial recognition searches to narrow a list of returns to a much smaller scale.
- This basic metadata, which works in tandem with the facial recognition algorithms, is simply the pedigree information associated with an arrest photo, or driver’s license photo, and includes gender, race, age, date of birth, height, weight, or any other descriptive feature.
What needs to be thoroughly evangelized here is when users apply these filters to a facial recognition search, it narrows a list of candidates from millions into thousands, thousands into hundreds, and ultimately allows a return from hundreds of “faces” to one.
- Using filters defines searches to levels of specificity and greatly contributes to matching accuracy by driving up more possible match returns and driving down false positives which often plague most of the larger database systems of today.
- The bottom line, filters help facial recognition accuracy and do not hinder performance. They set rules on searches to keep faces categorized.
- More importantly, facial recognition algorithms are designed to analyze nodal points, or facial landmarks.
- These landmarks are the eyes, nose, mouth, chin, jawline, etc.
- There are approximately 90 nodal points on a human face.
- Algorithms ignore skin color and focus matching probabilities on facial structure.
- For anyone to claim that facial recognition is racially biased or targets one or more races of color is purely a false narrative.
- In my experience, these false narratives are often fueled and driven by the misinformed, and are professed usually for their own self-promoting reasons.
Documenting and Auditing Key to Facial Recognition Investigations
I strongly recommend that any agency electing to use facial recognition capabilities document each search and have full auditing capabilities.
- Doing so ensures all the officers within law enforcement agencies are utilizing this technology properly, and brings needed integrity to an already unfairly criticized technology.
- This is simply sound investigative practice.
Vigilant Solutions FaceSearch and LineUp facial recognition offerings are the standard model and platform for facial recognition in law enforcement.
Vigilant realizes the need for security and accountability by taking a proactive approach to integrating full auditing capabilities at the agency administrator level.
(Learn More. Courtesy of Vigilant Solutions and YouTube)
Vigilant Solutions provide a self-regulating inquiry system which meets FBI-CJIS compliance standards, giving every agency full dashboard monitoring capabilities so they can gather agency metrics, manage their photo galleries and assist in the supervision of the personnel who access these law enforcement systems.
About the Author
Roger Rodriguez served more than 20 years with the NYPD, where he spearheaded the department’s first dedicated facial recognition unit and helped develop the Real Time Crime Center.
He is currently Director of Business Development at Vigilant Solutions and Subject Matter Expert in Facial Recognition Use in Law Enforcement. He can be reached at firstname.lastname@example.org.
Vigilant Solutions’ helps law enforcement solve crimes faster to keep officers and communities safe.
Vigilant Solutions Wins Platinum in 2017 ‘ASTORS’ Homeland Security Awards Program
AST focuses on Homeland Security and Public Safety Breaking News, the Newest Initiatives and Hottest Technologies in Physical & IT Security, essential to meeting today’s growing security challenges.
The Annual ‘ASTORS’ Homeland Security Awards Program, is organized to recognize the most distinguished vendors of Physical, IT, Port Security, Law Enforcement, Border Security, First Responders, (Fire, EMT, Military, Support Services Vets, SBA, Medical Tech) as well as the Federal, State, County and Municipal Government Agencies – to acknowledge their outstanding efforts to ‘Keep our Nation Secure, One City at a Time.’
To Learn More about the ‘ASTORS’ Homeland Security Awards Program, see 2017 ‘ASTORS’ Homeland Security Award Winners Honored at ISC East.
Over 100 distinguished guests from National, State and Local Governments, and Industry Leading Corporate Executives from companies allied to Government, gathered from across North America and the Middle East to be honored from disciplines across the Security Industry in their respective fields which included representatives from:
- The Department of Homeland Security
- The Department of Justice
- The Security Exchange Commission
- State and Municipal Law Enforcement Agencies
- Leaders in Private Security
Recognized for their Innovative Training and Education Programs, Outstanding Product Development Achievements and Exciting New Technologies to address the growing Homeland Security Threats our Nation is facing.
Nominations are now being accepted for the 2018 ‘ASTORS’ Homeland Security Awards at https://americansecuritytoday.com/ast-awards/.
American Security Today will be holding the 2018 ‘ASTORS’ Awards Presentation Luncheon to honor Nominees, Finalists and Winners on November 14, 2018 at ISC East 2018 in New York City.
Vigilant Solutions’ helps law enforcement solve crimes faster to keep officers and communities safe.
Built for agencies of all sizes, Vigilant’s technology increases investigative efficiency, generates more leads, connects cases, and reduces crimes with advanced analytics, billions of nationwide commercial LPR detections, and a hosted facial recognition gallery.
Bring criminals to justice with Vigilant Solutions.
For ‘ASTORS’ Sponsorship Opportunities and More Information on the AST 2018 ‘ASTORS’ Homeland Security Awards Program, please contact Michael Madsen, AST Publisher at: email@example.com or call 732.233.8119 (mobile) or 646-450-6027 (office).