diff options
Diffstat (limited to 'site/content')
18 files changed, 35 insertions, 10 deletions
diff --git a/site/content/pages/research/munich_security_conference/assets/4350550797.jpg b/site/content/pages/research/munich_security_conference/assets/4350550797.jpg Binary files differnew file mode 100755 index 00000000..4fd364b5 --- /dev/null +++ b/site/content/pages/research/munich_security_conference/assets/4350550797.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/4606260362.jpg b/site/content/pages/research/munich_security_conference/assets/4606260362.jpg Binary files differdeleted file mode 100755 index 67fe31f4..00000000 --- a/site/content/pages/research/munich_security_conference/assets/4606260362.jpg +++ /dev/null diff --git a/site/content/pages/research/munich_security_conference/assets/4625883763.jpg b/site/content/pages/research/munich_security_conference/assets/4625883763.jpg Binary files differnew file mode 100755 index 00000000..99dfe233 --- /dev/null +++ b/site/content/pages/research/munich_security_conference/assets/4625883763.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/4730007024.jpg b/site/content/pages/research/munich_security_conference/assets/4730007024.jpg Binary files differindex b3fff0bf..efc8ae04 100755 --- a/site/content/pages/research/munich_security_conference/assets/4730007024.jpg +++ b/site/content/pages/research/munich_security_conference/assets/4730007024.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/4749096858.jpg b/site/content/pages/research/munich_security_conference/assets/4749096858.jpg Binary files differindex 2c7fc9fa..56962610 100755 --- a/site/content/pages/research/munich_security_conference/assets/4749096858.jpg +++ b/site/content/pages/research/munich_security_conference/assets/4749096858.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/5906549160.jpg b/site/content/pages/research/munich_security_conference/assets/5906549160.jpg Binary files differnew file mode 100755 index 00000000..c9938727 --- /dev/null +++ b/site/content/pages/research/munich_security_conference/assets/5906549160.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/6862454118.jpg b/site/content/pages/research/munich_security_conference/assets/6862454118.jpg Binary files differnew file mode 100755 index 00000000..2df6c5ac --- /dev/null +++ b/site/content/pages/research/munich_security_conference/assets/6862454118.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/7118211377.jpg b/site/content/pages/research/munich_security_conference/assets/7118211377.jpg Binary files differindex 191126ac..f0ce5b4a 100755 --- a/site/content/pages/research/munich_security_conference/assets/7118211377.jpg +++ b/site/content/pages/research/munich_security_conference/assets/7118211377.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/7208430726.jpg b/site/content/pages/research/munich_security_conference/assets/7208430726.jpg Binary files differnew file mode 100755 index 00000000..29cfcadb --- /dev/null +++ b/site/content/pages/research/munich_security_conference/assets/7208430726.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/7241284424.jpg b/site/content/pages/research/munich_security_conference/assets/7241284424.jpg Binary files differnew file mode 100755 index 00000000..705c40ba --- /dev/null +++ b/site/content/pages/research/munich_security_conference/assets/7241284424.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/7645865468.jpg b/site/content/pages/research/munich_security_conference/assets/7645865468.jpg Binary files differindex da7c0973..f2b4f837 100755 --- a/site/content/pages/research/munich_security_conference/assets/7645865468.jpg +++ b/site/content/pages/research/munich_security_conference/assets/7645865468.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/8225846629.jpg b/site/content/pages/research/munich_security_conference/assets/8225846629.jpg Binary files differnew file mode 100755 index 00000000..75dd709c --- /dev/null +++ b/site/content/pages/research/munich_security_conference/assets/8225846629.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/9246033391.jpg b/site/content/pages/research/munich_security_conference/assets/9246033391.jpg Binary files differnew file mode 100755 index 00000000..42ae5566 --- /dev/null +++ b/site/content/pages/research/munich_security_conference/assets/9246033391.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/9607407530.jpg b/site/content/pages/research/munich_security_conference/assets/9607407530.jpg Binary files differnew file mode 100755 index 00000000..ea688e5a --- /dev/null +++ b/site/content/pages/research/munich_security_conference/assets/9607407530.jpg diff --git a/site/content/pages/research/munich_security_conference/assets/msc_embassy_flickr_montage.jpg b/site/content/pages/research/munich_security_conference/assets/msc_embassy_flickr_montage.jpg Binary files differdeleted file mode 100644 index 751a9f93..00000000 --- a/site/content/pages/research/munich_security_conference/assets/msc_embassy_flickr_montage.jpg +++ /dev/null diff --git a/site/content/pages/research/munich_security_conference/assets/msc_tsr_fig.png b/site/content/pages/research/munich_security_conference/assets/msc_tsr_fig.png Binary files differdeleted file mode 100644 index 85927110..00000000 --- a/site/content/pages/research/munich_security_conference/assets/msc_tsr_fig.png +++ /dev/null diff --git a/site/content/pages/research/munich_security_conference/assets/summary_countries.csv b/site/content/pages/research/munich_security_conference/assets/summary_countries.csv index 1e319fd9..d384e6d2 100755 --- a/site/content/pages/research/munich_security_conference/assets/summary_countries.csv +++ b/site/content/pages/research/munich_security_conference/assets/summary_countries.csv @@ -40,4 +40,4 @@ Cyprus,1 Croatia,1 Chile,1 Belgium,1 -Vietnam,1 +Vietnam,1
\ No newline at end of file diff --git a/site/content/pages/research/munich_security_conference/index.md b/site/content/pages/research/munich_security_conference/index.md index 9327a1f8..95a850c8 100644 --- a/site/content/pages/research/munich_security_conference/index.md +++ b/site/content/pages/research/munich_security_conference/index.md @@ -34,10 +34,9 @@ In this new research for the [Munich Security Conference's Transnational Securit ### 24 Million Non-Cooperative Faces -In total, we analyzed 30 publicly available face recognition and face analysis datasets that collectively include over 24 million non-cooperative images. Of these 24 million images, over 15 million face images are from Internet search engines, over 5.8 million from Flickr.com, over 2.5 million from the Internet Movie Database (IMDb.com), and nearly 500,000 from CCTV footage. All 24 million images were collected without any explicit consent, a type of face image that researchers call "in the wild". - -Next we manually verified 1,134 publicly available research papers that cite these datasets to determine who was using the data and where it was being used. Even though the vast majority of the images originated in the United States, the publicly available research citations show that only about 25% citations are from the country of the origin while the majority of citations are from China. +In total, we found over 24 million non-cooperative, non-consensual face images in 30 publicly available face recognition and face analysis datasets. Of these 24 million images, over 15 million face images are from Internet search engines, over 5.8 million from Flickr.com, over 2.5 million from the Internet Movie Database (IMDb.com), and nearly 500,000 from CCTV footage. All 24 million images were collected without any explicit consent, a type of face image that researchers call "in the wild". +Next we manually verified 1,134 publicly available research papers that cite these datasets to determine who was using the face data and where it was being used. Even though the vast majority of the images originated in the United States, the publicly available research citations show that only about 25% citations are from the United States while the majority of citations are from China. === columns 2 @@ -62,7 +61,9 @@ OtherLabel: Other ### Over 6,000 Embassy Photos Found in Facial Recognition Training Datasets -Of the 5.8 million Flickr images in publicly available face recognition training datasets there were over 6,000 photos from Embassy Flickr accounts. These images were mainly used in the MegaFace and IBM Diversity in Faces datasets. Over 2,000 more images were included in the Who Goes There dataset, used for facial ethnicity analysis research for a total over 8,000 embassy images used in facial analysis studies. A few of the embassy images found in facial recognition datasets are shown below. +Out of the 24 million images analyzed, over 6,000 embassies images were found in face recognition training datasets. These images were found by cross-referencing the Flickr IDs between datasets to locate 5,667 images in the MegaFace dataset, 389 images in the IBM Diversity in Faces datasets. Both of these datasets are widely used in academic, industry, and defense research projects. An additional 2,372 more images were found in the Who Goes There dataset, which is used for facial ethnicity analysis research. + +In total at least 8,428 embassy images are being used in facial recognition and facial analysis studies in at least 42 countries. === columns 2 @@ -86,21 +87,45 @@ Colors: categoryRainbow === end columns - - +#### Embassy Photos in Face Recognition Datasets + +The embassy and consulate photos below were all found in facial recognition training datasets MegaFace or IBM Diversity in Faces. Consulates were only included if marked as "EMBASSY" by the [U.S. Department of State’s Social Media Presence List](https://www.state.gov/global-social-media-presence/). Photos were chosen because of their inclusion of an embassy logo. + + + + + + + + - + + - - + + + + + +To make this analysis slightly more personal for Munich Security Conference readers, several photos from the US Consulate in Munich were found. Ironically, several photos were from the Deutsch-amerikanischer Datenschutztag. + + + + This brief research aims to shed light on the emerging politics of data. A photo is no longer just a photo when it can also be surveillance training data, and datasets can no longer be separated from the development of software when software is now built with data. "Our relationship to computers has changed", says Geoffrey Hinton, one of the founders of modern day neural networks and deep learning. "Instead of programming them, we now show them and they figure it out."[^hinton]. As data becomes more political, national AI strategies might also want to include transnational dataset strategies. + *This research post is ongoing and will updated during July and August, 2019.* +### FAQ + +- **Why are most photos from US Embassies?** Most Flickr accounts cross-referenced are from the US State Department's social media account list. +- **Why are most photos from the MegaFace dataset?** Probably because MegaFace is such a large dataset. It includes about 4.7 million images from Flickr. IBM's Diversity in Faces contains far fewer, around 1 million. Only the photos with embassy logos were displayed on this page. + ### Further Reading - [MS Celeb Dataset Analysis](/datasets/msceleb) |
