Capitol Hill at sunset

New Senate Bill Would Place Moratorium on Federal Use of Facial Recognition

Two Democratic senators want to temporarily pause the government’s use of facial recognition technology while a commission develops regulations.

A pair of Democratic senators have introduced legislation to temporarily pause the federal government’s use and purchase of facial recognition technology until Congress passes regulations.

Sens. Cory Booker (N.J.) and Jeff Merkley (Ore.) announced the move on Wednesday, reflecting a growing movement to regulate and even ban the use of facial recognition technology by law enforcement, government agencies like Customs and Border Protection and private corporations.

Under the Ethical Use of Facial Recognition Act, state and local governments would be prohibited from using federal funds to purchase or use the technology. In addition, a commission would be created to provide recommendations about potential regulations to Congress within 18 months of the bill’s passage.

“Facial recognition technology is both a powerful and a problematic new frontier,” Merkley said in a statement. “Before this unregulated market becomes too big to tame, Congress needs to put a moratorium on federal use of facial recognition while we develop responsible and ethical guidelines for its use going forward.”

The senators echoed concerns by civil liberties advocates that facial recognition could be an invasion of Americans’ privacy as well as a threat to people of color, who are more likely to be misidentified by algorithms than white people.

A December report by the National Institute of Standards and Technology, a federal agency, found that a majority of facial recognition systems used in the U.S. are more inaccurate for people of color than white people. In the study, Native Americans had the highest rates of false positives, while African-American women were most likely to be misidentified in a law enforcement database.

Read More: House Homeland Security Committee Chairman Expresses Opposition To Moratorium on Facial Recognition

Booker, who has previously introduced legislation to ban the technology from public housing, said in a statement that without proper oversight, facial recognition poses a “serious risk” to privacy and safety.

“Facial recognition technology has been demonstrated to be often inaccurate--misidentifying and disproportionately targeting women and people of color,” Booker said. “To protect consumer privacy and safety, Congress must work to set the rules of the road for responsible uses of this technology by the federal government.”

Cities across the U.S. have adopted ordinances banning the use of the software by local law enforcement and government agencies, including San Francisco and Oakland in California and several smaller communities in Massachusetts. Many of those efforts were led by privacy and civil liberties groups, particularly the American Civil Liberties Union.

In letters to Congress last year, security companies and law enforcement groups called for regulation over implementing an outright ban. But that has not stopped advocacy groups from demanding bans rather than temporary moratoriums.

On Thursday, Fight for the Future, a privacy rights group, criticized Merkley for not consulting with them before releasing the legislation.

“It’s great to see lawmakers engaging on #facialrecognition, but we don’t need legislation that speeds us toward weak regulations,” the group tweeted. “We need to #BanFacialRecognition.”

Featured

  • Achieving Clear Communications

    Achieving Clear Communications

    Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more. Read Now

  • Taking Flight

    Taking Flight

    Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring. Read Now

  • Live From ISC West 2023 Preview

    Live From ISC West 2023 Preview

    ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Read Now

    • Industry Events
    • ISC West
  • A Break from Routine

    A Break from Routine

    It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

New Products

  • CyberAudit Introduced to Manage Systems, Intuitive Interface

    CyberAudit Web

    CyberLock, Inc. announces the release of CyberAudit Web 9.4! CyberAudit-Web (CAW), the software suite for managing CyberLock systems, provides an intuitive interface to assign keys, set expirations, monitor staff and configure access schedules. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3