Logging Into a Brave New World: How Facial Recognition Just Got Personal

0
163

by Christina Maas, Reclaim The Net:

Surprising exactly no one paying attention to the slow erosion of privacy, the US General Services Administration (GSA) has rolled out its shiny new toy: facial recognition technology for accessing login.gov. Yes, that beloved single sign-in service, connecting Americans to federal and state agencies, now wants your face—literally. This gateway, clicked into over 300 million times a year by citizens has decided the most efficient way to keep us all “safe” is by scanning our mugs. How very 2024.

TRUTH LIVES on at https://sgtreport.tv/

But of course, this little “upgrade” didn’t just appear overnight. Oh no, it dragged itself through bureaucratic purgatory, complete with false starts, delays, and some spicy critique from the Inspector General. Apparently, login.gov had been fibbing about its compliance with Identity Assurance Level 2 (IAL2)—a fancy label for a government-mandated security standard that requires real-deal verification of who you are. Up until now, that “verification” meant having someone eyeball your ID card photo and say, “Yep, that looks about right,” rather than dipping into the biometric surveillance toolkit.

Facial recognition was supposed to make its grand debut last year, but things got complicated when it turned out login.gov wasn’t actually playing by the rules it claimed to follow. The Inspector General, ever the fun police, caught them misrepresenting their tech’s adherence to the IAL2 standard, causing the rollout to stall while everyone scrambled to figure out if they could get away with this. Now, after enough piloting to give a nervous airline passenger a heart attack, login.gov has finally reached compliance, but not without leaving a greasy trail of unanswered questions in its wake.

Smile for the Algorithm

So here we are, with the GSA proudly offering up facial recognition as the answer to all our identity verification problems. Just snap a “live selfie,” upload it to the cloud, and let some “best in class” algorithm work its magic by comparing your face to the one on your government ID. What could possibly go wrong? According to the GSA, nothing. They swear these photos are used solely for verification purposes and won’t be stored, misused, or, you know, somehow end up in the hands of anyone you wouldn’t want to have your biometric data.

But hey, let’s not get too distracted by the fine print. “Best in class” algorithms? That’s a bold claim coming from the same government that brought us Healthcare.gov’s disaster debut and the IRS phone service from hell. There’s something hilarious about throwing out a vague phrase like “best in class” as if it absolves them of any responsibility. We’re just supposed to trust that their mysterious, highly proprietary facial matching system is doing the right thing behind closed doors—no questions asked, citizen.

The Privacy Mirage

Of course, the skeptics among us—the kind of people who read the full terms of service before clicking “I agree”—aren’t buying the GSA’s feel-good assurances. Privacy advocates have been sounding the alarm for years about the dangers of biometric data collection, and facial recognition technology has become the poster child for Big Brother’s relentless march into our lives. How do we really know that these selfies won’t be stored somewhere, only to be hacked or sold off like digital cattle at a data auction? And even if they are just for verification now, who’s to say that won’t change later?

Let’s not forget that the government doesn’t exactly have a spotless track record when it comes to handling sensitive personal data. The Office of Personnel Management hack in 2015, anyone? That little debacle only exposed the personal information of over 21 million people, including fingerprints. And yet, here we are, being asked to believe that this time, this time, they’ve got everything under control. It’s hard not to picture a row of bureaucrats crossing their fingers behind their backs while issuing their promises of security.

Read More @ ReclaimTheNet.org