The Future Looks a Lot Like You and Me

The Future Looks a Lot Like You and Me

The rise of facial recognition is making us safer

Security and its technologies are, of course, ever-evolving. From simple photo IDs of the past to 2D barcodes and the now ubiquitous use of video cameras, businesses, schools and venues are constantly looking for better ways to protect people and property.

As with most things in life, the more sophisticated the systems, the greater the cost, which can keep better security beyond the reach of many organizations. That’s why new evolutions in facial recognition technology offer so much promise in allowing a wider range of businesses and institutions to simply and easily enhance security with the most unique identifier this side of our fingerprints—the human face.

Today, I’m proud to say facial recognition is becoming increasingly accessible to organizations of all sizes, requiring only a video camera and a few lines of code. Through computer vision and machine learning, the technology can recognize and measure people in any video, image, or photo. Its uses are both practical and game-changing, allowing organizations to scan the faces of those on or near their properties to spot potential threats and to verify individuals’ identities. The benefits of facial recognition to highly-secure facilities are fairly obvious, but now that it’s more accessible, this technology has far reaching, practical uses for virtually any type of business, like retailers, clubs, hotels, entertainment venues, and casinos.

We all know fraud and identity theft are major problems responsible for millions of dollars lost and countless horror stories. Lexis- Nexis’ 2017 True Cost of Fraud report estimates the total amount of loss a merchant incurs, based on the actual dollar value of a fraudulent transaction, is up to $2.77 from the previous year’s figure of $2.40. Furthermore, the report notes that the volume of fraud has been on the rise in both successful and prevented fraudulent transactions. Also noted in the report is limited merchant access to fraudfighting solutions.

I’ve spent my entire career pioneering solutions to prevent identity fraud, and have been inspired to make facial recognition more widely accessible to businesses and organizations of all types. Facial recognition means more secure environments in the places where we live, work, shop, and visit. Now, more than ever, facial recognition technology is being used for access control and visitor management. A camera reads visitors’ faces as they approach an access control point, such as an automated door or reception desk. The person’s facial features are then validated against biometric data previously loaded into the system to ensure the person has authorization to enter.

This same system can also streamline visitor check in at office buildings, public events and schools. The true power and potential of facial recognition in these kinds of venues is showcased when we consider just what these systems can accomplish in regards to real time watch-list detection. In this use, a camera (much like those we currently see in any number of public spaces) scans crowds to read faces, verify identities and run this information against watch lists, such as sex offender registries or internal “banned” lists.

Facial recognition is also a great tool for retailers and other businesses to greatly enhance customer experiences. Anytime a VIP customer enters a venue, they can be instantly identified so that experiences can be maximized and their preferences available to staff to help them better serve the customer. Casinos are using this technology to identify VIP guests at the door, and they are pairing it with added layers of identity verification, running individual’s identities against internal banned lists and watch lists, such as Self-Exclusion, OFAC, and more.

Similarly, Delta recently unveiled facial recognition technology to allow passengers to check in at self-service kiosks, drop checked baggage, and serve as identification at the TSA checkpoint. Facial recognition is marrying security with customer experience and improving both.

These uses of facial recognition technology clearly offer benefits to business and consumers alike. Yet too often in the news media, however, we get only the more sensational or “hot button” approaches to reporting on new technologies as opposed to more sober analysis of why these technologies are being developed in the first place.

Recently, the pop singer Taylor Swift was in the news because of a facial recognition kiosk that was placed outside her concert venues. The screens on the kiosks played film clips of her videos and some of her concert footage. Those who stopped to watch the footage had their faces scanned and run against a database of known Taylor Swift stalkers.

The ACLU raised concerns over this use of facial recognition without the knowledge of those interacting with the kiosk screens and this, was, of course what made the headlines in the reporting. But cameras in public spaces have long been a part of everyday life in the name of crime prevention and security. It could be argued whether the use of facial recognition technology at a concert was really that much different. Given recent terrorist events at concerts worldwide, would a majority of concert-goers be against a technology that could potentially alert security personnel to violent or unstable individuals?

The possibilities for facial recognition are endless and can enhance security across a broad range of industries and applications.

Certainly recent events have placed school security foremost in the minds of all of us. Here again, more accessible, more affordable and simple-to-implement facial recognition technology can give our schools a potentially life-saving security tool. Facial recognition can ensure unauthorized individuals do not have access to the campus— a key factor in the spate of recent school shootings. Similarly, violence by disgruntled former employees could potentially be thwarted if flagged individuals were not allowed access to the workplace and security were alerted, through facial recognition, that a flagged individual was nearing the property.

On a more everyday level, for example, the technology can also be utilized to ensure parents who may have lost custody are prevented from illegally taking children from the school. It could also be used to help reduce and discourage drug activity around school campuses and to keep sex offenders away.

Financial institutions could greatly reduce fraudulent transactions on premises by simply matching the face in front of the teller window to that on file. Clubs could immediately identify VIP customers as they approach the door as well as those who may have been placed on banned lists.

And all of this can be accomplished seamlessly, simply and affordably, with no inconvenience to customers and many potential benefits. Most of all, the security of the businesses and public spaces we regularly utilize will be greatly enhanced. I like to think of facial recognition as a better answer to the office ID badge or key card you have to swipe to enter a building.

A better answer that is staring back at us in the mirror.

This article originally appeared in the March 2019 issue of Security Today.


  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Cybersecurity Awareness Month: Top Five Action Items to Elevate Your Data Security Posture Management and Secure Your Data

    October is Cybersecurity Awareness Month, and every year most tips for security hygiene and staying safe have not changed. We’ve seen them all – use strong passwords, deploy multi-factor authentication (MFA), be vigilant to spot phishing attacks, regularly update software and patch your systems. These are great recommended ongoing tips and are as relevant today as they’ve ever been. But times have changed and these best practices can no longer be the bare minimum. Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity


New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3