Archive for 'Blog'

Facial recognition technology works even when only half a face is visible, researchers from the University of Bradford have found.

Using artificial intelligence techniques, the team achieved 100 percent recognition rates for both three-quarter and half faces. The study, published in Future Generation Computer Systems, is the first to use machine learning to test the recognition rates for different parts of the face.

Lead researcher, Professor Hassan Ugail from the University of Bradford said: “The ability humans have to recognise faces is amazing, but research has shown it starts to falter when we can only see parts of a face. Computers can already perform better than humans in recognising one face from a large number, so we wanted to see if they would be better at partial facial recognition as well.”

The team used a machine learning technique known as a “convolutional neural network,” drawing on a feature extraction model called VGG—one of the most popular and widely used for facial recognition.

They worked with a dataset containing multiple photos—2,800 in total—of 200 students and staff from FEI University in Brazil, with equal numbers of men and women.

For the first experiment, the team trained the model using only full facial images They then ran an experiment to see how well the computer was able to recognize faces, even when shown only part of them. The computer recognized full faces 100 percent of the time, but the team also had 100 percent success with three-quarter faces and with the top or right half of the face. However, the bottom half of the face was only correctly recognized 60 percent of the time, and eyes and nose on their own just 40 percent.

They then ran the experiment again, after training the model using partial facial images as well. This time, the scores significantly improved for the bottom half of the face, for eyes and nose on their own and even for faces with no eyes and nose visible, achieving around 90 percent correct identification.

Individual facial parts, such as the nose, cheek, forehead or mouth had low recognition rates in both experiments.

Read More

TAMPA, Fla. – Homeland Security Investigations (HSI) Tampa is looking for additional potential victims of a Tampa woman indicted Tuesday on four counts of wire fraud and three counts of wrongfully using government seals in connection with a scheme in which she fraudulently represented herself as an immigration attorney to take money from victims for services she never provided in the Tampa and Chicago areas. This case was investigated by HSI and United States Citizenship and Immigration Services (USCIS).

According to the indictment, Erika Paola Intriago, 44, of Tampa, who is not a licensed attorney, fraudulently portrayed herself as an immigration attorney offering immigration-related services on social media targeting persons from Spanish-speaking countries seeking immigration-related services.

Victims retained and paid Intriago to represent them in immigration-related matters before USCIS and other agencies. Intriago is accused of then creating fraudulent letters, emails, receipts, documents, and communications to send her victims to falsely portray the records as legitimate communications with U.S. government agencies when in fact she never filed or completed the necessary immigration paperwork for which she was paid.

Intriago is also accused of threatening and intimidating victims who complained about her conduct by telling them that she would report their immigration status to U.S. immigration authorities, which Intriago claimed would result in the victims being deported.

If convicted, Intriago faces a maximum penalty of 20 years in federal prison for each count of wire fraud and up to five years in federal prison for each count of wrongfully using government seals.

Read More

ROCKFORD, Ill. — An Illinois man was indicted Tuesday by a federal grand jury on several counts of illegally bringing aliens to the U.S., transporting them and harboring them for his personal financial gain.

This indictment was announced by U.S. Attorney John R. Lausch Jr., Northern District of Illinois, and Special Agent in Charge James M. Gibbons, U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI). The DeKalb (Illinois) Police Department assisted in this investigation.

Luis Alfredo Delacruz, 49, from DeKalb, Illinois, was indicted on the following charges:

- two counts of bringing aliens into the United States at a place other than a designated port of entry for commercial advantage or private financial gain;
- two counts of bringing aliens into the U.S. at a place other than a designated port of entry;
- two counts of transporting illegal aliens within the U.S. for commercial advantage or private financial gain; and,
- eight counts of harboring illegal aliens for commercial advantage or private financial gain.

As alleged in the indictment, in November 2015 and April 2016, Delacruz brought into the United States two aliens who had not received prior official authorization to enter. Delacruz did not bring them through immigration at a designated port of entry, the indictment states.

It is further alleged that on June 1, 2018, Delacruz illegally harbored eight illegal aliens in buildings or other places through employment at Alfredo’s Iron Works in Cortland. Delacruz allegedly harbored these aliens for commercial advantage and his own financial gain.

Each count of bringing aliens into the United States at a place other than a designated port of entry for commercial advantage or private financial gain carries a mandatory minimum sentence of three years in prison and a maximum of 10 years.

Each count of bringing aliens to the U.S. at a place other than a designated port of entry carries a maximum sentence of five years in prison.

Each count of transporting illegal aliens within the U.S. for commercial advantage or private financial gain, and each count of harboring illegal aliens for commercial advantage or private financial gain, carries a maximum sentence of 10 years in prison.

Read More

IN 2016, TIM Cook fought the law—and won.

Late in the afternoon of Tuesday, February 16, 2016, Cook and several lieutenants gathered in the “junior boardroom” on the executive floor at One Infinite Loop, Apple’s old headquarters. The company had just received a writ from a US magistrate ordering it to make specialized software that would allow the FBI to unlock an iPhone used by Syed Farook, a suspect in the San Bernardino shooting in December 2015 that left 14 people dead.

The iPhone was locked with a four-digit passcode that the FBI had been unable to crack. The FBI wanted Apple to create a special version of iOS that would accept an unlimited combination of passwords electronically, until the right one was found. The new iOS could be side-loaded onto the iPhone, leaving the data intact.

But Apple had refused. Cook and his team were convinced that a new unlocked version of iOS would be very, very dangerous. It could be misused, leaked, or stolen, and once in the wild, it could never be retrieved. It could potentially undermine the security of hundreds of millions of Apple users.

In the boardroom, Cook and his team went through the writ line by line. They needed to decide what Apple’s legal position was going to be and figure out how long they had to respond. It was a stressful, high-stakes meeting. Apple was given no warning about the writ, even though Cook, Apple’s top lawyer, Bruce Sewell, and others had been actively speaking about the case to law enforcement for weeks.

The writ “was not a simple request for assistance in a criminal case,” explained Sewell. “It was a forty-two-page pleading by the government that started out with this litany of the horrible things that had been done in San Bernardino. And then this . . . somewhat biased litany of all the times that Apple had said no to what were portrayed as very reasonable requests. So this was what, in the law, we call a speaking complaint. It was meant to from day one tell a story . . . that would get the public against Apple.”

The team came to the conclusion that the judge’s order was a PR move—a very public arm twisting to pressure Apple into complying with the FBI’s demands—and that it could be serious trouble for the company. Apple “is a famous, incredibly powerful consumer brand and we are going to be standing up against the FBI and saying in effect, ‘No, we’re not going to give you the thing that you’re looking for to try to deal with this terrorist threat,’” said Sewell.

They knew that they had to respond immediately. The writ would dominate the next day’s news, and Apple had to have a response. “Tim knew that this was a massive decision on his part,” Sewell said. It was a big moment, “a bet-the-company kind of decision.” Cook and the team stayed up all night—a straight 16 hours—working on their response. Cook already knew his position—Apple would refuse—but he wanted to know all the angles: What was Apple’s legal position? What was its legal obligation? Was this the right response? How should it sound? How should it read? What was the right tone?

Read More

When detectives in a Phoenix suburb arrested a warehouse worker in a murder investigation last December, they credited a new technique with breaking open the case after other leads went cold.

The police told the suspect, Jorge Molina, they had data tracking his phone to the site where a man was shot nine months earlier. They had made the discovery after obtaining a search warrant that required Google to provide information on all devices it recorded near the killing, potentially capturing the whereabouts of anyone in the area.

Investigators also had other circumstantial evidence, including security video of someone firing a gun from a white Honda Civic, the same model that Mr. Molina owned, though they could not see the license plate or attacker.

But after he spent nearly a week in jail, the case against Mr. Molina fell apart as investigators learned new information and released him. Last month, the police arrested another man: his mother’s ex-boyfriend, who had sometimes used Mr. Molina’s car.

The warrants, which draw on an enormous Google database employees call Sensorvault, turn the business of tracking cellphone users’ locations into a digital dragnet for law enforcement.

The Arizona case demonstrates the promise and perils of the new investigative technique, whose use has risen sharply in the past six months, according to Google employees familiar with the requests. It can help solve crimes. But it can also snare innocent people.

Technology companies have for years responded to court orders for specific users’ information. The new warrants go further, suggesting possible suspects and witnesses in the absence of other clues. Often, Google employees said, the company responds to a single warrant with location information on dozens or hundreds of devices.

Law enforcement officials described the method as exciting, but cautioned that it was just one tool.

Read More

Academics at Cardiff University have conducted the first independent academic evaluation of Automated Facial Recognition (AFR) technology across a variety of major policing operations.

The project by the Universities’ Police Science Institute evaluated South Wales Police’s deployment of Automated Facial Recognition across several major sporting and entertainment events in Cardiff city over more than a year, including the UEFA Champion’s League Final and the Autumn Rugby Internationals.

The study found that while AFR can enable police to identify persons of interest and suspects where they would probably not otherwise have been able to do so, considerable investment and changes to police operating procedures are required to generate consistent results.

Researchers employed a number of research methods to develop a rich picture and systematically evaluate the use of AFR by police across multiple operational settings. This is important as previous research on the use of AFR technologies has tended to be conducted in controlled conditions. Using it on the streets and to support ongoing criminal investigations introduces a range of factors impacting the effectiveness of AFR in supporting police work.

The technology works in two modes: Locate is the live, real-time application that scans faces within CCTV feeds in an area. It searches for possible matches against a pre-selected database of facial images of individuals deemed to be persons of interest by the police.

Identify, on the other hand, takes still images of unidentified persons (usually captured via CCTV or mobile phone camera) and compares these against the police custody database in an effort to generate investigative leads. Evidence from the research found that in 68 percent of submissions made by police officers in the Identify mode, the image was not of sufficient quality for the system to work.

Over the period of the evaluation, however, the accuracy of the technology improved significantly and police got better at using it. The Locate system was able to correctly identify a person of interest around 76 percent of the time. A total of 18 arrests were made in ‘live Locate deployments during the evaluation, and in excess of 100 people were charged following investigative searches during the first 8-9 months of the AFR Identify operation (end of July 2017-March 2018).

The report suggests that it is more helpful to think of AFR in policing as ‘Assisted Facial Recognition’ rather than a fully ‘Automated Facial Recognition’ system. ‘Automated’ implies that the identification process is conducted solely by an algorithm, when in fact, the system serves as a decision-support tool to assist human operators in making identifications. Ultimately, decisions about whether a person of interest and an image match are made by police operators. It is also deployed in uncontrolled environments, and so is impacted by external factors including lighting, weather and crowd flows.

“There is increasing public and political awareness of the pressures that the police are under to try and prevent and solve crime. Technologies such as Automated Facial Recognition are being proposed as having an important role to play in these efforts. What we have tried to do with this research is provide an evidence-based and balanced account of the benefits, costs and challenges associated with integrating AFR into day-to-day policing,” says Professor Martin Innes, director, Crime and Security Research Institute and Director, Universities’ Police Science Institute.

Read More

When Knoxville first responders found a man dead in his home, there was clear evidence on the scene of the heroin that caused his overdose. Also nearby were clues to how the deadly drugs had reached him. Investigators found a padded manila envelope with postage and markings that provided them another link back to the online drug sellers who have proliferated on the Darknet in recent years.

Drug traffickers are increasingly using anonymous online networks to sell narcotics, including potent synthetic opioids like fentanyl, to buyers who can order and receive the drugs without ever leaving home. What can appear to be a regular e-commerce transaction is one of the delivery channels fueling a deadly nationwide epidemic. The Centers for Disease Control and Prevention reports that drug overdose deaths have been on an upward climb for several years, across the United States and across all demographic groups. In 2017 alone, 70,237 people in this country died of a drug overdose; two-thirds of those deaths involved an opioid.

As part of a government-wide effort to address the epidemic, the Department of Justice created the Joint Criminal Opioid and Darknet Enforcement (J-CODE) team in 2018 to leverage the power of federal and international partnerships to combat the complex and deadly threat of online drug sales.

Now in its second year, J-CODE is delivering results through coordinated efforts and the commitment of the nation’s law enforcement agencies to address opioid sales on the Darknet. Building on the success of last year’s Operation Disarray, the J-CODE team led Operation SaboTor between January and March of this year. These concentrated operations in the United States and abroad led to 61 arrests and shut down 50 Darknet accounts used for illegal activity. Agents executed 65 search warrants, seizing more than 299 kilograms of drugs, 51 firearms, and more than $7 million ($4.504 million in cryptocurrency, $2.485 million in cash, and $40,000 in gold).

Read More

Two decades ago, computer viruses—and public awareness of the tricks used to unleash them—were still relatively new notions to many Americans.

One attack would change that in a significant way.

In late March 1999, a programmer named David Lee Smith hijacked an America Online (AOL) account and used it to post a file on an Internet newsgroup named “alt.sex.” The posting promised dozens of free passwords to fee-based websites with adult content. When users took the bait, downloading the document and then opening it with Microsoft Word, a virus was unleashed on their computers.

On March 26, it began spreading like wildfire across the Internet.

The Melissa virus, reportedly named by Smith for a stripper in Florida, started by taking over victims’ Microsoft Word program. It then used a macro to hijack their Microsoft Outlook email system and send messages to the first 50 addresses in their mailing lists. Those messages, in turn, tempted recipients to open a virus-laden attachment by giving it such names as “sexxxy.jpg” or “naked wife” or by deceitfully asserting, “Here is the document you requested … don’t show anyone else ;-) .” With the help of some devious social engineering, the virus operated like a sinister, automated chain letter.

The virus was not intended to steal money or information, but it wreaked plenty of havoc nonetheless. Email servers at more than 300 corporations and government agencies worldwide became overloaded, and some had to be shut down entirely, including at Microsoft. Approximately one million email accounts were disrupted, and Internet traffic in some locations slowed to a crawl.

Within a few days, cybersecurity experts had mostly contained the spread of the virus and restored the functionality of their networks, although it took some time to remove the infections entirely. Along with its investigative role, the FBI sent out warnings about the virus and its effects, helping to alert the public and reduce the destructive impacts of the attack. Still, the collective damage was enormous: an estimated $80 million for the cleanup and repair of affected computer systems.

Finding the culprit didn’t take long, thanks to a tip from a representative of AOL and nearly seamless cooperation between the FBI, New Jersey law enforcement, and other partners. Authorities traced the electronic fingerprints of the virus to Smith, who was arrested in northeastern New Jersey on April 1, 1999. Smith pleaded guilty in December 1999, and in May 2002, he was sentenced to 20 months in federal prison and fined $5,000. He also agreed to cooperate with federal and state authorities.

The Melissa virus, considered the fastest spreading infection at the time, was a rude awakening to the dark side of the web for many Americans. Awareness of the danger of opening unsolicited email attachments began to grow, along with the reality of online viruses and the damage they can do.

Read More

HAMMOND — “Bingo,” a would-be robber told his accomplice as a Brinks armored truck pulled into their view in Merrillville Monday, federal authorities allege.

Traveling in a black Jeep Cherokee, the suspects began following the Brinks truck to various stops, with the ultimate plan of robbing it, federal prosecutors allege.

But the FBI was reportedly trailing them each step of the way.

A short time later, FBI agents thwarted the robbery by following and arresting the two men outside of the Aldi grocery store in Merrillville, the agency reported.

The men also are suspects in another $500,000 robbery of an armored truck in July, federal law enforcement officials said.

On Wednesday, the U.S. attorney’s office charged Reilly Jackson Jr., 23, of Griffith, with conspiracy to commit robbery after the Merrillville incident.

His alleged companion, Delvin Perkins, 23, of South Holland, was charged with being an armed felon.

Federal prosecutors allege in a criminal complaint that an ongoing FBI investigation of the suspects prompted agents to follow Jackson and Perkins on Monday.

The government alleges the men are suspects in a $500,000 robbery of a Thillens Cagistics armored truck July 25 in Blue Island, Illinois.

The government alleges that robbery was an inside job because Jackson was the armored car driver employed by Thillens Cagistics, and Perkins was the alleged robber.

The FBI said it found a photo in Jackson’s cellphone of Perkins wearing the same clothes in which he robbed that armed truck and concluded the pair worked together to commit the Blue Island robbery.

An FBI surveillance team was following the two defendants as they traveled in the Jeep Cherokee on Monday. Agents saw the men following a Brinks armed truck as it made multiple stops to collect money from local banks and businesses, the agency reported.

Read More

The treasurer of a charity that benefits the families of New York Police Department officers who are killed in the line of duty was charged Thursday with stealing more than $410,000 from the fund.

Lorraine Shanley, 68, was charged by federal prosecutors in New York with bank fraud and aggravated identity theft. She will appear Thursday in court after prosecutors said she was stealing more than 20 percent of donations to the charity between 2010 to 2017 at least.

A person with direct knowledge of the matter confirmed to NBC News that Shanley acted as the treasurer for the nonprofit Survivors of the Shield.

The U.S. Attorney’s Office for the Southern District of New York said that Shanley spent the money in a variety of ways — $29,000 for her grandchild’s private school tuition, $32,000 for personal dental expenses, and $25,000 for landscaping.

Shanley is also accused of using about $63,000 of the stolen money to pay for her son’s legal expenses related to criminal cases, prosecutors said.

Her son was reportedly served about three years in prison on drug charges from 2006 to 2009. He was also charged in 2014 with second-degree manslaughter and leaving the scene of an incident without reporting, resulting in death after he crashed his SUV in Manhattan, killing an activist, and fled. The manslaughter charges were dropped.

She also allegedly wrote $45,000 in checks to family members and other people, which she then endorsed herself and deposited into her own account. Prosecutors said Shanley, from Staten Island, also used $1,400 of the stolen money to buy Barbra Streisand tickets and $6,600 more on other event tickets.

According to court documents, 99 percent of the donations to Survivors of the Shield come from New York police officers, and on average, 5,500 NYPD employees donate to the charity each year.

Read More