Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityManagementCyber Tactics ColumnSecurity Leadership and Management

How Sense of Privacy Threatens Facial Recognition's Protective Power

By John McClurg
SEC0919-Cyber-Feat-slide1_900px
SEC0919-cyber-slide2_900px
SEC0919-Cyber-Feat-slide1_900px
SEC0919-cyber-slide2_900px
September 2, 2019

The original concept of privacy, in one of its simplest expressions, was “the state or condition of being free from being observed or disturbed by other people.” If one didn’t want to be observed by others, one didn’t put themselves in public places or the electronic equivalent (i.e. social media). To insist on privacy at all times and in all places is generally appreciated as an untenable position and one that would ultimately prove advantageous to criminals in an unintended and ultimately detrimental way.

Recent concerns churning around the use of facial recognition may be another example of misplaced, anachronistic consternation borne of having pushed the concept of privacy to extremes. These anxious feelings toward facial recognition can, if unchecked, reach a point where they undermine common sense and our ability to leverage new technologies in the protection of the innocent and prosecution of the guilty.

Like any new technology, facial recognition can conceivably be advanced in a biased and abusive manner. However, those who want to put forth the specter of such scenarios should do so in a manner that provides actual evidence of these instances. For example, a recent published account reports to have discovered that the states of Utah, Vermont and Washington have allowed government agents to access images on their respective DMV databases.  It doesn’t follow, however, that such access constituted an “an abuse” or that it was done in some untoward or biased way.  Admittedly, it might prove valuable to ask in these situations if the legal or public safety justifications surrounding the use of facial recognition were, in fact, an encroachment on a limited, judiciously construed concept of privacy.

We, as citizens in a society, are obligated to do certain things in order to enjoy the fruits and benefits of citizenship, like having a valid ID in order to drive a car. There are those who would suggest that the mere accessing of our information [in this case, our image] is somehow an “exploitation.” Others would suggest that mere access doesn’t equate with the pejoratively ladened description of it as having been an exploitation.

After all, what is the definition of an “exploitation”?  The action or fact of treating someone unfairly in order to benefit from their work or property. Once we give up our photo, one could argue that that constitutes tacit permission to use or leverage that visage in any manner that might benefit the common good (i.e. aid in an arrest of someone who might have violated the law). The issues surrounding such use are myriad and beg the question as to what regulations should be put in place in order to protect a citizen’s reasonably held expectation of privacy.

Clearly scanning an inanimate representation or image of a person is not the same as surveilling the actual person.  Leveraging that image, after a person has placed themselves in a public forum where it could be argued one has waived any reasonable expectations of privacy, at least as far as those that might have extended to one’s visage, is hardly exploitation. To extend privacy protections into public forums— forums in which many criminal actions are advanced—is to limit the ability of law enforcement to effectively battle on behalf of those who are being prejudicially impacted by the criminal acts of others.

We would never think of claiming that law enforcement had exploited the privacy of an individual because they used their fingerprints on file to match those found in a crime scene. Why then would we question the matching of an image on file with that of another image taken at a crime scene, illegal border crossing or riot? Food for thought in challenging and complex times.

KEYWORDS: cyber cybersecurity facial recognition privacy concerns social media

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • Facial REcognition

    Commercial Facial Recognition Privacy Act of 2019 Introduced

    See More
  • cyber security

    Reflections on 35 years in the trenches

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • surveillance.jpg

    Surveillance, Privacy and Public Space

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing