• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Physical Security

Open-Source Facial Recognition Program Tracks Users Across Social Media

A new open-source program for facial recognition allows programmers to identify profiles on social media networks based on names and pictures.

August 15, 2018 Jonathan Blackwood Leave a Comment

A new open-source program called Social mapper was released by Trustwave recently, according to The Verge. The tool is designed for security researchers performing social engineering attacks, and while it is supposed to be used for ethical hacking, the free software is currently freely available.

Social Mapper doesn’t even need access to the social networks, according to The Verge:

Social Mapper doesn’t require API access to social networks, a restriction that has hampered social media tracking tools like Geofeedia. Instead, the system performs automated manual searches in an instrumented browser window, then uses facial recognition to scan through the first ten to twenty results for a match. The manual searches mean the tool can be quite slow compared to API-based scans. The developer estimates that searching a target list of 1000 people could take more than 15 hours.

This program comes on the wave of a number of facial recognition developments in the past several months. Amazon’s facial recognition software mismatched 28 congress members, mistaking them for criminal mugshots. The US Army adopted facial recognition technology to detect people using thermal imaging cameras. China is currently testing facial recognition glasses for police officers.

It’s clear that facial recognition software is becoming more prevalent in society. Many groups are lashing out against the practice, especially for governmental use, including the ACLU. The fear is that the data gathered from facial recognition will be used for purposes the public isn’t comfortable with – similar to how Cambridge Analytica used Facebook data to influence voters during elections. Think how facial recognition could identify where people have been, and use that information to track them, predict where they will go, perhaps even blackmail them if the information falls into the wrong hands.

The questions becomes whether or not facial recognition should be allowed, especially in the hands of whoever wants to use that technology. Obviously Trustwave believes anyone should use it – otherwise they wouldn’t have released an open-source technology. However, that same technology could easily be used in phishing campaigns and other attacks. Is that worth it in exchange for intelligence gathering efforts?

It’s a tricky topic, and one that will be debated in the coming years. As legislation passes, consider whether or not facial recognition is something your company would be comfortable implementing – and how would it affect your surveillance efforts?

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Surveillance

Related Content:

  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • AtlasIED North Syracuse Central School Dist 2 North Syracuse Central School District Streamlines Communications with…
  • cyber-attack-skull Spike in Cyberattacks Exposes Vulnerabilities in University Security…
  • NSA Programming Languages The Cyberattacks and Insider Threats During The Development…

Free downloadable guide you may like:

  • 10 Reasons Why School Administrators Should Consider These Tech Tools for Emergency Preparedness

    Working in an educational facility is more complicated than ever before. There are so many more situations to be aware of, so much more to have to communicate to others. Communication is paramount for the safety of students and staff and to keep daily operations flowing smoothly. Where once a PA system was all that […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.