Capitol Hill at sunset

New Senate Bill Would Place Moratorium on Federal Use of Facial Recognition

Two Democratic senators want to temporarily pause the government’s use of facial recognition technology while a commission develops regulations.

A pair of Democratic senators have introduced legislation to temporarily pause the federal government’s use and purchase of facial recognition technology until Congress passes regulations.

Sens. Cory Booker (N.J.) and Jeff Merkley (Ore.) announced the move on Wednesday, reflecting a growing movement to regulate and even ban the use of facial recognition technology by law enforcement, government agencies like Customs and Border Protection and private corporations.

Under the Ethical Use of Facial Recognition Act, state and local governments would be prohibited from using federal funds to purchase or use the technology. In addition, a commission would be created to provide recommendations about potential regulations to Congress within 18 months of the bill’s passage.

“Facial recognition technology is both a powerful and a problematic new frontier,” Merkley said in a statement. “Before this unregulated market becomes too big to tame, Congress needs to put a moratorium on federal use of facial recognition while we develop responsible and ethical guidelines for its use going forward.”

The senators echoed concerns by civil liberties advocates that facial recognition could be an invasion of Americans’ privacy as well as a threat to people of color, who are more likely to be misidentified by algorithms than white people.

A December report by the National Institute of Standards and Technology, a federal agency, found that a majority of facial recognition systems used in the U.S. are more inaccurate for people of color than white people. In the study, Native Americans had the highest rates of false positives, while African-American women were most likely to be misidentified in a law enforcement database.

Read More: House Homeland Security Committee Chairman Expresses Opposition To Moratorium on Facial Recognition

Booker, who has previously introduced legislation to ban the technology from public housing, said in a statement that without proper oversight, facial recognition poses a “serious risk” to privacy and safety.

“Facial recognition technology has been demonstrated to be often inaccurate--misidentifying and disproportionately targeting women and people of color,” Booker said. “To protect consumer privacy and safety, Congress must work to set the rules of the road for responsible uses of this technology by the federal government.”

Cities across the U.S. have adopted ordinances banning the use of the software by local law enforcement and government agencies, including San Francisco and Oakland in California and several smaller communities in Massachusetts. Many of those efforts were led by privacy and civil liberties groups, particularly the American Civil Liberties Union.

In letters to Congress last year, security companies and law enforcement groups called for regulation over implementing an outright ban. But that has not stopped advocacy groups from demanding bans rather than temporary moratoriums.

On Thursday, Fight for the Future, a privacy rights group, criticized Merkley for not consulting with them before releasing the legislation.

“It’s great to see lawmakers engaging on #facialrecognition, but we don’t need legislation that speeds us toward weak regulations,” the group tweeted. “We need to #BanFacialRecognition.”

Featured

  • Security Today Launches 2023 Government Security Awards

    Security Today Launches 2023 Government Security Awards

    Security Today is proud to announce the launch of the 2023 Government Security Awards. The Govies honor outstanding government security products in a variety of categories. For this year’s awards program, participants can choose from 38 different categories to enter their product(s) into. Read Now

  • Back to the Basics

    Back to the Basics

    Security is a continuous evolution of practices and procedures. The developments in technology and advancements in threats make security difficult at times. Although security from one location may look different from another location, there is a common goal applied to security measures. The common goal is protection. Read Now

  • The Top Three Security Trends in 2023

    The Top Three Security Trends in 2023

    As security technology has become more widely used, the interest in new capabilities and increased security measures has increased. As we head into 2023, these three trends will shape the security landscape. Read Now

  • TSA Breaks Record Nationally and in Washington for Firearm Discoveries in 2022

    TSA Breaks Record Nationally and in Washington for Firearm Discoveries in 2022

    Transportation Security Administration (TSA) officers in Washington detected 164 firearms in travelers’ carry-on luggage in 2022, with the majority of the firearms discovered at Seattle-Tacoma International Airport’s (SEA) security checkpoints. Read Now

Featured Cybersecurity

New Products

  • CyberAudit Introduced to Manage Systems, Intuitive Interface

    CyberAudit Web

    CyberLock, Inc. announces the release of CyberAudit Web 9.4! CyberAudit-Web (CAW), the software suite for managing CyberLock systems, provides an intuitive interface to assign keys, set expirations, monitor staff and configure access schedules. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Genetec Security Center

    Genetec Security Center

    This major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. 3