GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Mo Money, Mo Technology

3D face recognition background

Facial recognition has come a long way since the 1960’s, when a man named Woodrow Wilson Bledsoe (great name, right?) took measurements between key, primary facial elements, laid those coordinates out on grid-lined tablet, and, ultimately, could replicate subjects’ faces. His tablet—known as a RAND tablet—was actually a screen similar to an iPad, and Bledsoe would enter the measured lines on the tablet with a stylus, which emitted electromagnetic pulses. Those pulsed lines would enter a database maintaining hundreds of etchings. When Bledsoe’s system was “shown” a picture of the subject, it would rifle through the database and pick out—when it worked—the associated electronic sketch.

It was roughly twenty (20) years later when facial recognition, at least the bones of how it currently works, was invented. Called the Eigenface approach, it utilized linear algebra to automatically detected faces from images. Distances between facial features were automatically assigned coordinates, which were then submitted to a database. Once there, the magic would happen and soon cough up the individual in question.

For fighting crime, it’s a natural

Facial recognition was first used in crimefighting at the 2002 Super Bowl, where it helped authorities nab a few petty criminals. More significant, though, was the spate of false positives it reported. Imagine spending thousands of dollars on Super Bowl tickets, only to be ushered aside upon entry and told that a machine suspects you’re part of an international crime syndicate. Fighting crime with facial recognition was getting close, but it wasn’t quite there. There was considerable work to be done, and they did it—lots of it. And who could have predicted that sixteen (16) years and billions of dollars later it would be used to help keep a megastar safe.

There are a lot of creeps out there

Perennial pop chart topper Taylor Swift, with album sales of well over 35 million and a gazillion dollars in the bank, is probably one (1) of facial recognition technology’s biggest fans. It was recently disclosed by Rolling Stone that at her Rose Bowl concert last May, well-disguised facial recognition kiosks were set up to detect the very worst of her fans—stalkers.

The kiosks baited the creeps by displaying sundry information about Swift, including rehearsal clips, so anybody who decided to peruse them was scanned. Those images were sent to a command center, of sorts, located in Swift’s hometown of Nashville, Tennessee. From there, each scanned picture was cross-referenced against a considerable list of Swift stalkers (there are hundreds). There were several who weren’t scanned, however; they’re serving prison time for their penchant for a number Swift-stalking related crimes.

Considering the scans weren’t turned over to authorities, it’s unclear for precisely what purpose the facial recognition technology was used. The whereabouts of the scans are unknown, and the Swift camp has remained mum on the entire subject; it’s clear they have no plans to disclose any information on the subject.

From a legality standpoint—and because concerts are considered private events and are open to, among other security measures, surveillance—there’s no indication that Swift broke any privacy laws, even though concertgoers weren’t notified that they were being surveilled. Oh, but don’t worry—the ACLU is looking into it.

Security Concerns?

To find out how to secure your organization’s network, contact GDT’s tenured and talented engineers and security analysts at From their Security and Network Operations Centers, they manage, monitor and protect the networks of companies of all sizes, including those for some of the most notable enterprises, service providers, healthcare organizations and government agencies in the world. They’d love to hear from you.


Share this article

You might also like:

AI and Data Security

The advent of artificial intelligence (AI) brings transformative potential across industries while also introducing significant data security challenges. As AI systems become integral to operational and decision-making processes, safeguarding sensitive information against sophisticated threats is paramount. This exploration sheds light on the complexities of AI and data security and proposes

Transport layer security (TLS)

Transport layer security (TLS) is one of the most common tools for keeping users safe on the internet. When automated, TLS certification management can help organizations ensure more reliable and consistent use of TLS, reducing the need for human intervention and risk of human error. In fact, over the years,


As the head of GDT’s security practice and an industry veteran, Jeanne Malone and her team help customers worldwide advance their cybersecurity posture. One of the biggest cybersecurity game-changers is artificial intelligence (AI). We asked Jeanne to weigh in on leveraging AI and machine learning in cybersecurity to improve intrusion