Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Cops nab suspect using CREEPY facial recog system

Looks like his dad, says computer


British cops used a new facial recognition system to snare a shoplifting suspect whom they say was automatically identified due to his resemblance to criminal relatives, The Register has learned.

In a development that may strike fear into members of well-known underworld families, Leicestershire plod told us a new system called NeoFace can finger crims simply by comparing their features to a database of snaps of arrested suspects.

The force are halfway through a six-month trial of the software, which uses facial recognition to help officers solve crimes. They spoke to the press about their experience for the first time this week, as other police forces paid close attention to the force's findings.

The Metropolitan Police Force is due to visit Leicestershire this week to scope out NeoFace, it is understood, while the Essex and Kent forces have already been to check out the system. French and Romanian officers have also been in contact to express an interest.

Although a positive identification is not enough evidence to result in a conviction, it helps officers in their line of enquiry. They could, for instance, carry out DNA checks on a crime scene or organise an identify parade, both of which carry weight in court.

Dave Harper, spokesperson for Leicestershire Police, told us that although the shoplifting suspect's case had not yet gone to trial, officers were delighted with the new system, which has been used in 200 cases.

"The officer came in with CCTV images of a shoplifting suspect he didn't recognise. We ran his image through the facial recognition system and his father and brother both popped up, because the family all have strong and shared facial characteristics."

Using the system is "more of an art than it is a science", because it still requires some level of human operation, he said.

It requires a front-facing, mugshot-style image, which greatly increases the chances of an accurate match. Images are automatically compared against a database of photographs of people the police have arrested - who can be innocent or guilty.

Cops are allowed to keep photographs for five years before deleting them, as long as the subject agrees. Leicestershire Police alone has pictures of 90,000 people on their system. If the system rolls out across the whole country, this could mean millions of people's pictures are available for analysis.

In the bad old days, police used to keep a massive book full of photographs, which cops and crime victims would root through to identify suspects - a process which could take days.

NeoFace speeds this up enormously.

"The system doesn't discriminate," Harper added. "Whether you are black or white, male or female, it works the same, looking for facial characteristics and them matching them. Perhaps a person has a mole or their ears are high up on their head. The system picks that up."

NeoFace was recently used to identify and arrest a man for carrying out two armed robberies on the Chicago Transit Authority train system last year. ®


Other stories you might like

  • Alarm raised after Microsoft wins data-encoding patent
    This is why we can't have nice things, potentially

    Microsoft last month received a US patent covering modifications to a data-encoding technique called rANS, one of several variants in the Asymmetric Numeral System (ANS) family that support data compression schemes used by leading technology companies and open source projects.

    The creator of ANS, Jarosław Duda, assistant professor at Institute of Computer Science at Jagiellonian University in Poland, has been trying for years to keep ANS patent-free and available for public use. Back in 2018, Duda's lobbying helped convince Google to abandon its ANS-related patent claim in the US and Europe. And he raised the alarm last year when he learned Microsoft had applied for an rANS (range asymmetric number system) patent.

    Now that Microsoft's patent application has been granted, he fears the utility of ANS will be diminished, as software developers try to steer clear of a potential infringement claim.

    Continue reading
  • VMware patches critical guest-to-host vulnerabilities
    Time to fix code like it's 2020

    In an advisory this week, VMware alerted users to guest-to-host vulnerabilities in the XHCI and UHCI USB controllers in its ESXi hypervisor, plus an important flaw fixed in NSX Data Center for vSphere.

    In all, five vulnerabilities were discovered in VMware's ESXi, Workstation, Cloud Foundation (ESXi), and Fusion during the Tianfu Cup 2021, a Chinese vulnerability competition, by the country's Kunlun Lab. Bugs that Kunlun discovered were disclosed privately to VMware – though last year China passed a new law ordering security researchers to reveal findings to the country's Ministry of Public Security at least two days before anyone else.

    The vendor said it hadn't seen any evidence the competition's findings had been exploited in the wild. Patches have been issued, now it's up to admins to schedule them. The vulnerabilities range from use-after-free() and double-fetch flaws that can be exploited to execute code on the host, to an old-fashioned denial of service (DoS). The full list for ESXi, Workstation, Cloud Foundation, and Fusion is:

    Continue reading
  • AMD, DoiT to help Google Cloud customers optimize for Epyc
    Pair promise to provide the tools to achieve peak Zen

    AMD has partnered with DoiT International on a program aimed at helping Google Cloud customers optimize their off-prem workloads to obtain the best performance, cost and security, at least for workloads running on AMD silicon.

    DoiT and AMD today said they aim to provide Google Cloud customers with the tools, technology and expertise to ensure their compute workloads are finely tuned for performance, cost and longevity. The program will also involve technical consulting to help customers identify the right workloads for a benchmark comparison on AMD’s Epyc server chips.

    DoiT sells itself as a global multicloud software and managed services provider, which means that it offers products aimed at simplifying and automating cloud operations. In particular, the firm claims that its FlexSave solution automates the management of Google Cloud CUDs, or committed use discounts, which provide users with discounted prices in exchange for a commitment to use a minimum level of resources for a specified term.

    Continue reading

Biting the hand that feeds IT © 1998–2022