Cyber warfare

Ukraine is using Clearview AI’s facial recognition during the conflict

Ukraine’s defense ministry began using Clearview AI’s facial recognition technology to uncover Russian assailants, combat misinformation and identify the dead.

Ukraine’s defense ministry announced it will use the AI’s facial recognition technology offered by Clearview. Clearview’s chief executive Hoan Ton-That confirmed the news to Reuters, the technology will allow the Ukrainian military to uncover Russian assailants, combat misinformation and identify the dead. The company offered its support to Ukraine immediately after the beginning of the invasion, the Reuters reports, Clearview pointed out that it has never had Russia as a client

The AI-based system provided by Clearview could analyze more than 2 billion images from the Russian social network VKontakte, while its overall database contains over 10 billion photos.

We can distinguish harmless usages of the technology from those potentially dangerous. The former includes the identification of the dead, the identification of people to reunite refugees separated from their families or the debunking of false social media posts related to the conflict. Another use is related to the identification of Russian operatives on the battlefield.The exact purpose for which Ukraine’s defense ministry is using the technology is unclear, Ton-That said. Other parts of Ukraine’s government are expected to deploy Clearview in the coming days, he and Wolosky said.

The use of so powerful technology during a conflict is scary, it could allow identifying people of interest at checkpoints, but in a contest where there is no time to reflect false positives could cause the death of people.

“At least one critic says facial recognition could misidentify people at checkpoints and in battle.” Albert Fox Cahn, executive director of the Surveillance Technology Oversight Project in New York, told Reuters. “A mismatch could lead to civilian deaths, just like unfair arrests have arisen from police use, said Albert Fox Cahn, executive director of the Surveillance Technology Oversight Project in New York.”

“We’re going to see well-intentioned technology backfiring and harming the very people it’s supposed to help,” he added.

Ton-That always recommended to use its technology along with other sources of identification and it must be used to prevent abuses in wartime.

Clearview technology is in the middle of a heated debate, some governments are accusing the company of violating privacy rights by scraping images online without the explicit consent of the owners.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Clearview)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. CISA adds Microsoft Internet Explorer and Twilio Authy bugs to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Internet Explorer and Twilio Authy bugs…

3 hours ago

China-linked APT group uses new Macma macOS backdoor version

China-linked APT group Daggerfly (aka Evasive Panda, Bronze Highland) Evasive Panda has been spotted using an…

14 hours ago

FrostyGoop ICS malware targets Ukraine

In April 2024, Dragos researchers spotted the malware FrostyGoop that interacts with Industrial Control Systems…

1 day ago

Hackers abused swap files in e-skimming attacks on Magento sites

Threat actors abused swap files in compromised Magento websites to hide credit card skimmer and…

1 day ago

US Gov sanctioned key members of the Cyber Army of Russia Reborn hacktivists group

The US government sanctioned two Russian hacktivists for their cyberattacks targeting critical infrastructure, including breaches…

2 days ago

EvilVideo, a Telegram Android zero-day allowed sending malicious APKs disguised as videos

EvilVideo is a zero-day in the Telegram App for Android that allowed attackers to send…

2 days ago

This website uses cookies.