Connect with us

Sci-Tech

Israel Deploys Expansive Facial Recognition Program in Gaza

Published

on


Within minutes of walking through an Israeli military checkpoint along Gaza’s central highway on Nov. 19, the Palestinian poet Mosab Abu Toha was asked to step out of the crowd. He put down his 3-year-old son, whom he was carrying, and sat in front of a military jeep.

Half an hour later, Mr. Abu Toha heard his name called. Then he was blindfolded and led away for interrogation.

“I had no idea what was happening or how they could suddenly know my full legal name,” said the 31-year-old, who added that he had no ties to the militant group Hamas and had been trying to leave Gaza for Egypt.

It turned out Mr. Abu Toha had walked into the range of cameras embedded with facial recognition technology, according to three Israeli intelligence officials who spoke on the condition of anonymity. After his face was scanned and he was identified, an artificial intelligence program found that the poet was on an Israeli list of wanted persons, they said.

Mr. Abu Toha is one of hundreds of Palestinians who have been picked out by a previously undisclosed Israeli facial recognition program that was started in Gaza late last year. The expansive and experimental effort is being used to conduct mass surveillance there, collecting and cataloging the faces of Palestinians without their knowledge or consent, according to Israeli intelligence officers, military officials and soldiers.

The technology was initially used in Gaza to search for Israelis who were taken hostage by Hamas during the Oct. 7 cross-border raids, the intelligence officials said. After Israel embarked on a ground offensive in Gaza, it increasingly turned to the program to root out anyone with ties to Hamas or other militant groups. At times, the technology wrongly flagged civilians as wanted Hamas militants, one officer said.

The facial recognition program, which is run by Israel’s military intelligence unit, including the cyber-intelligence division Unit 8200, relies on technology from Corsight, a private Israeli company, four intelligence officers said. It also uses Google Photos, they said. Combined, the technologies enable Israel to pick faces out of crowds and grainy drone footage.

Three of the people with knowledge of the program said they were speaking out because of concerns that it was a misuse of time and resources by Israel.

An Israeli army spokesman declined to comment on activity in Gaza, but said the military “carries out necessary security and intelligence operations, while making significant efforts to minimize harm to the uninvolved population.” He added, “Naturally, we cannot refer to operational and intelligence capabilities in this context.”

Facial recognition technology has spread across the globe in recent years, fueled by increasingly sophisticated A.I. systems. While some countries use the technology to make air travel easier, China and Russia have deployed the technology against minority groups and to suppress dissent. Israel’s use of facial recognition in Gaza stands out as an application of the technology in a war.

Matt Mahmoudi, a researcher with Amnesty International, said Israel’s use of facial recognition was a concern because it could lead to “a complete dehumanization of Palestinians” where they were not seen as individuals. He added that Israeli soldiers were unlikely to question the technology when it identified a person as being part of a militant group, even though the technology makes mistakes.

Israel previously used facial recognition in the West Bank and East Jerusalem, according to an Amnesty report last year, but the effort in Gaza goes further.

In the West Bank and East Jerusalem, Israelis have a homegrown facial recognition system called Blue Wolf, according to the Amnesty report. At checkpoints in West Bank cities such as Hebron, Palestinians are scanned by high-resolution cameras before being permitted to pass. Soldiers also use smartphone apps to scan the faces of Palestinians and add them to a database, the report said.

In Gaza, which Israel withdrew from in 2005, no facial recognition technology was present. Surveillance of Hamas in Gaza was instead conducted by tapping phone lines, interrogating Palestinian prisoners, harvesting drone footage, getting access to private social media accounts and hacking into telecommunications systems, Israeli intelligence officers said.

After Oct. 7, Israeli intelligence officers in Unit 8200 turned to that surveillance for information on the Hamas gunmen who breached Israel’s borders. The unit also combed through footage of the attacks from security cameras, as well as videos uploaded by Hamas on social media, one officer said. He said the unit had been told to create a “hit list” of Hamas members who participated in the attack.

Corsight was then brought in to create a facial recognition program in Gaza, three Israeli intelligence officers said.

The company, with headquarters in Tel Aviv, says on its website that its technology requires less than 50 percent of a face to be visible for accurate recognition. Robert Watts, Corsight’s president, posted this month on LinkedIn that the facial recognition technology could work with “extreme angles, (even from drones,) darkness, poor quality.”

Corsight declined to comment.

Unit 8200 personnel soon found that Corsight’s technology struggled if footage was grainy and faces were obscured, one officer said. When the military tried identifying the bodies of Israelis killed on Oct. 7, the technology could not always work for people whose faces had been injured. There were also false positives, or cases when a person was mistakenly identified as being connected to Hamas, the officer said.

To supplement Corsight’s technology, Israeli officers used Google Photos, the free photo sharing and storage service from Google, three intelligence officers said. By uploading a database of known persons to Google Photos, Israeli officers could use the service’s photo search function to identify people.

Google’s ability to match faces and identify people even with only a small portion of their face visible was superior to other technology, one officer said. The military continued to use Corsight because it was customizable, the officers said.

A Google spokesman said Google Photos was a free consumer product that “does not provide identities for unknown people in photographs.”

The facial recognition program in Gaza grew as Israel expanded its military offensive there. Israeli soldiers entering Gaza were given cameras equipped with the technology. Soldiers also set up checkpoints along major roads that Palestinians were using to flee areas of heavy fighting, with cameras that scanned faces.

The program’s goals were to search for Israeli hostages, as well as Hamas fighters who could be detained for questioning, the Israeli intelligence officers said.

The guidelines of whom to stop were intentionally broad, one said. Palestinian prisoners were asked to name people from their communities who they believed were part of Hamas. Israel would then search for those people, hoping they would yield more intelligence.

Mr. Abu Toha, the Palestinian poet, was named as a Hamas operative by someone in the northern Gaza town of Beit Lahia, where he lived with his family, the Israeli intelligence officers said. The officers said there was no specific intelligence attached to his file explaining a connection to Hamas.

In an interview, Mr. Abu Toha, who wrote “Things You May Find Hidden in My Ear: Poems From Gaza,” said he has no connection to Hamas.

When he and his family were stopped at the military checkpoint on Nov. 19 as they tried leaving for Egypt, he said he had not shown any identification when he was asked to step out of the crowd.

After he was handcuffed and taken to sit under a tent with several dozen men, he heard someone say the Israeli army had used a “new technology” on the group. Within 30 minutes, Israeli soldiers called him by his full legal name.

Mr. Abu Toha said he was beaten and interrogated in an Israeli detention center for two days before being returned to Gaza with no explanation. He wrote about his experience in The New Yorker, where he is a contributor. He credited his release to a campaign led by journalists at The New Yorker and other publications.

Upon his release, Israeli soldiers told him his interrogation had been a “mistake,” he said.

In a statement at the time, the Israeli military said Mr. Abu Toha was taken for questioning because of “intelligence indicating a number of interactions between several civilians and terror organizations inside the Gaza Strip.”

Mr. Abu Toha, who is now in Cairo with his family, said he was not aware of any facial recognition program in Gaza.

“I did not know Israel was capturing or recording my face,” he said. But Israel has “been watching us for years from the sky with their drones. They have been watching us gardening and going to schools and kissing our wives. I feel like I have been watched for so long.”

Kashmir Hill contributed reporting.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Sci-Tech

World's biggest 3D printer whirs into action

Published

on



It’s hoped giant device will be able to print homes, bridges, boats and wind turbines.



Source link

Continue Reading

Sci-Tech

The Paris Olympics’ One Sure Thing: Cyberattacks

Published

on


In his office on one of the upper floors of the headquarters of the Paris Olympic organizing committee, Franz Regul has no doubt what is coming.

“We will be attacked,” said Mr. Regul, who leads the team responsible for warding off cyberthreats against this year’s Summer Games in Paris.

Companies and governments around the world now all have teams like Mr. Regul’s that operate in spartan rooms equipped with banks of computer servers and screens with indicator lights that warn of incoming hacking attacks. In the Paris operations center, there is even a red light to alert the staff to the most severe danger.

So far, Mr. Regul said, there have been no serious disruptions. But as the months until the Olympics tick down to weeks and then days and hours, he knows the number of hacking attempts and the level of risk will rise exponentially. Unlike companies and governments, though, who plan for the possibility of an attack, Mr. Regul said he knew exactly when to expect the worst.

“Not many organizations can tell you they will be attacked in July and August,” he said.

Worries over security at major events like the Olympics have usually focused on physical threats, like terrorist attacks. But as technology plays a growing role in the Games rollout, Olympic organizers increasingly view cyberattacks as a more constant danger.

The threats are manifold. Experts say hacking groups and countries like Russia, China, North Korea and Iran now have sophisticated operations capable of disabling not just computer and Wi-Fi networks but also digital ticketing systems, credential scanners and even the timing systems for events.

Fears about hacking attacks are not just hypothetical. At the 2018 Pyeongchang Winter Olympics in South Korea, a successful attack nearly derailed the Games before they could begin.

That cyberattack started on a frigid night as fans arrived for the opening ceremony. Signs that something was amiss came all at once. The Wi-Fi network, an essential tool to transmit photographs and news coverage, suddenly went down. Simultaneously, the official Olympics smartphone app — the one that held fans’ tickets and essential transport information — stopped functioning, preventing some fans from entering the stadium. Broadcast drones were grounded and internet-linked televisions meant to show images of the ceremony across venues went blank.

But the ceremony went ahead, and so did the Games. Dozens of cybersecurity officials worked through the night to repel the attack and to fix the glitches, and by the next morning there was little sign that a catastrophe had been averted when the first events got underway.

Since then, the threat to the Olympics has only grown. The cybersecurity team at the last Summer Games, in Tokyo in 2021, reported that it faced 450 million attempted “security events.” Paris expects to face eight to 12 times that number, Mr. Regul said.

Perhaps to demonstrate the scale of the threat, Paris 2024 cybersecurity officials use military terminology freely. They describe “war games” meant to test specialists and systems, and refer to feedback from “veterans of Korea” that has been integrated into their evolving defenses.

Experts say a variety of actors are behind most cyberattacks, including criminals trying to hold data in exchange for a lucrative ransom and protesters who want to highlight a specific cause. But most experts agree that only nation states have the ability to carry out the biggest attacks.

The 2018 attack in Pyeongchang was initially blamed on North Korea, South Korea’s antagonistic neighbor. But experts, including agencies in the U.S. and Britain, later concluded that the true culprit — now widely accepted to be Russia — deliberately used techniques designed to pin the blame on someone else.

This year, Russia is once again the biggest focus.

Russia’s team has been barred from the Olympics following the country’s 2022 invasion of Ukraine, although a small group of individual Russians will be permitted to compete as neutral athletes. France’s relationship with Russia has soured so much that President Emmanuel Macron recently accused Moscow of attempting to undermine the Olympics through a disinformation campaign.

The International Olympic Committee has also pointed the finger at attempts by Russian groups to damage the Games. In November, the I.O.C. issued an unusual statement saying it had been targeted by defamatory “fake news posts” after a documentary featuring an A.I.-generated voice-over purporting to be the actor Tom Cruise appeared on YouTube.

Later, a separate post on Telegram — the encrypted messaging and content platform — mimicked a fake news item broadcast by the French network Canal Plus and aired false information that the I.O.C. was planning to bar Israeli and Palestinian teams from the Paris Olympics.

Earlier this year, Russian pranksters — impersonating a senior African official — managed to get Thomas Bach, the I.O.C. president, on the phone. The call was recorded and released earlier this month. Russia seized on Mr. Bach’s remarks to accuse Olympic officials of engaging in a “conspiracy” to keep its team out of the Games.

In 2019, according to Microsoft, Russian state hackers attacked the computer networks of at least 16 national and international sports and antidoping organizations, including the World Anti-Doping Agency, which at the time was poised to announce punishments against Russia related to its state-backed doping program.

Three years earlier, Russia had targeted antidoping officials at the Rio de Janeiro Summer Olympics. According to indictments of several Russian military intelligence officers filed by the United States Department of Justice, operatives in that incident spoofed hotel Wi-Fi networks used by antidoping officials in Brazil to successfully penetrate their organization’s email networks and databases.

Ciaran Martin, who served as the first chief executive of Britain’s national cybersecurity center, said Russia’s past behavior made it “the most obvious disruptive threat” at the Paris Games. He said areas that might be targeted included event scheduling, public broadcasts and ticketing systems.

“Imagine if all athletes are there on time, but the system scanning iPhones at the gate has gone down,” said Mr. Martin, who is now a professor at the Blavatnik School of Government at the University of Oxford.

“Do you go through with a half-empty stadium, or do we delay?” he added. “Even being put in that position where you either have to delay it or have world-class athletes in the biggest event of their lives performing in front of a half-empty stadium — that’s absolutely a failure.”

Mr. Regul, the Paris cybersecurity head, declined to speculate about any specific nation that might target this summer’s Games. But he said organizers were preparing to counter methods specific to countries that represent a “strong cyberthreat.”

This year, Paris organizers have been conducting what they called “war games” in conjunction with the I.O.C. and partners like Atos, the Games’ official technology partner, to prepare for attacks. In those exercises, so-called ethical hackers are hired to attack systems in place for the Games, and “bug bounties” are offered to those who discover vulnerabilities.

Hackers have previously targeted sports organizations with malicious emails, fictional personas, stolen passwords and malware. Since last year, new hires at the Paris organizing committee have undergone training to spot phishing scams.

“Not everyone is good,” Mr. Regul said.

In at least one case, a Games staff member paid an invoice to an account after receiving an email impersonating another committee official. Cybersecurity staff members also discovered an email account that had attempted to impersonate the one assigned to the Paris 2024 chief, Tony Estanguet.

Millions more attempts are coming. Cyberattacks have typically been “weapons of mass irritation rather than weapons of mass destruction,” said Mr. Martin, the former British cybersecurity official.

“At their worst,” he said, “they’ve been weapons of mass disruption.”



Source link

Continue Reading

Sci-Tech

'Bad at almost everything': AI wearable panned by reviewers

Published

on



A new AI-fuelled gadget has fallen foul of the tech world’s expectations.



Source link

Continue Reading
Advertisement

Trending

Copyright © 2024 World Daily Info. Powered by Columba Ventures Co. Ltd.