{"id":216,"date":"2019-05-16T07:38:51","date_gmt":"2019-05-16T11:38:51","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/?page_id=216"},"modified":"2025-05-12T11:09:00","modified_gmt":"2025-05-12T15:09:00","slug":"garbage-in-garbage-out-face-recognition-on-flawed-data","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/garbage-in-garbage-out-face-recognition-on-flawed-data\/","title":{"rendered":"Garbage In, Garbage Out: Face Recognition on Flawed Data"},"content":{"rendered":"<p>This situation may already be a reality for people in New York City. On multiple occasions, when blurry or flawed photos of suspects have failed to turn up good leads, analysts have instead picked a celebrity they thought looked like the suspect, then run the <em>celebrity\u2019s<\/em> photo through their automated face recognition system looking for a lead. In a <a href=\"https:\/\/www.flawedfacedata.com\/\">report<\/a> released by the Center on Privacy &amp; Technology, we explain how police agencies across the country misuse face recognition technology, with reference to actual use cases from the NYPD. Analysts using these systems also sometimes submit forensic sketches\u2014a practice that has been shown to fail the vast majority of the time\u2014and routinely doctor low-quality photos to make them clearer, including by copying and pasting facial features from someone else\u2019s face onto a photo of an unknown suspect.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This situation may already be a reality for people in New York City. On multiple occasions, when blurry or flawed photos of suspects have failed to turn up good leads, [&hellip;]<\/p>\n","protected":false},"author":3777,"featured_media":0,"parent":62,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-216","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/users\/3777"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/comments?post=216"}],"version-history":[{"count":63,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/216\/revisions"}],"predecessor-version":[{"id":3669,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/216\/revisions\/3669"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/62"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/media?parent=216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}