U.S. Capitol Attack: IDing Domestic Terrorists Using Facial Recognition and Video Surveillance

Umbrella Technologies CEO Thomas Carnevale explains how law enforcement will likely leverage technology to ID the Capitol Hill attackers.

Thomas Carnevale is CEO of Aurora, Ill.-based Umbrella Technologies, a commercial security consulting and integration firm. In the following article, he provides his perspective on how video surveillance and facial recognition will be used to identify individuals involved in the Jan. 6 attack on the U.S. Capitol.

As of Thursday (Jan. 7), the primary footage that has aired on the news and social media comes from news cameras and phone recordings by individuals located on the scene. While this footage provides a piece of the story, the story’s best perspective will come from the congressional building’s security cameras.

Surprisingly, the media so far is not reporting the insurmountable evidence that will be reviewable by law enforcement based on the video recordings from the congressional video surveillance systems.

As of Thursday night, 82 people have been arrested in connection with the violent mob that overran the U.S. Capitol, according to the Metropolitan Police Department. The majority of these arrests were for curfew violations; however, it is not a stretch to say that law enforcement agencies will be able to identify and charge hundreds or thousands more.

I am confident that if the video surveillance recordings are utilized to their fullest extent, the puzzle pieces will come together. Law enforcement agencies will understand the criminal activity that occurred within the Capitol building and be able to identify individual perpetrators. The video recordings will also provide primary evidence in the trials to convict the individuals who assaulted our democratic institutions and vandalized federal property.

The video surveillance systems located throughout the Capitol building do not use cheap residential security cameras. The equipment that monitors the high traffic and priority spaces is top-of-the-line. The consumer equivalents of these security cameras offer 4K HD video resolution capable of identifying individuals with a level of detail, efficiency and accuracy that was unthinkable a few years ago. There isn’t a fuzzy picture that needs to be “enhanced, enhanced, enhanced”; this is likely a security camera feed with HD resolution.

Here are some other related topics to examine:

What role will facial recognition technology play in identifying individuals that are involved in criminal activity? 

You may have seen law enforcement using facial recognition software in nearly every fictional law enforcement TV show. In reality, facial recognition technology will likely play an important role in sorting out the situation that occurred within the capital. It will be critical to identifying individuals and attributing specific actions to those individuals.

Facial recognition technology utilizes individual physical and biometric characteristics to create a measured and mathematically calculated unique facial signature. The unique facial signatures identified on video surveillance footage are then matched to a database of recognized faces. The database of individuals’ faces could be sourced from governmental databases such as police mugshots of arrested individuals, publicly available social media pictures, or evidence reported to the FBI and law enforcement.

A less well-known feature of advanced security camera technology is rapid forensic search. This feature enables reviewers to find a needle in a haystack and quickly review hours or days of video surveillance evidence in seconds. For example, if reviewers want to see all of the footage of a man wearing a specific outfit, they would be able to rapidly search for that outfit across multiple camera feeds and track that individual’s movements without hours of work.

If you want to help the law enforcement investigation, review the publicly available video footage and photographs and report any individuals you recognize. In your report, I recommend providing your supporting evidence and the name, city, and links to social media profiles of the individual you are reporting. Plus, if you want an example of facial recognition technology in your everyday life, you can look at the technology that is used to recommend tags for your friends in photographs on social media.

You may be wondering if this is legal. Can the government use video surveillance on its citizens?

Yes. Although each state has its legislation on video surveillance in public places, the general rule of thumb across the United States is that video recording (without audio) is allowed — except for places where someone has a reasonable expectation of privacy (e.g., bathrooms, hotel rooms, shower areas, changing rooms, etc.). That means the public hallways throughout the Capitol building and the surrounding grounds can be legally recorded and analyzed to identify criminal activity.

To support this perspective, it is worth referencing the archived version of the Department of Justice Criminal Resource Manual, which states the following:

“Video surveillance, which is the use of closed-circuit television (CCTV) to conduct a visual surveillance of a person or a place, is not covered by Title III. Rather, its use is governed by the Fourth Amendment and, therefore, when a reasonable expectation of privacy exists, a search warrant should be sought pursuant to Fed. ‘…’ 

Accordingly, a search warrant requesting to use video surveillance must demonstrate not only probable cause to believe that evidence of a Federal crime will be obtained by the surveillance, but also should include: (1) a factual statement that alternative investigative methods have been tried and failed or reasonably appear to be unlikely to succeed if tried or would be too dangerous; (2) a statement of the steps to be taken to assure that the surveillance will be minimized to effectuate only the purposes for which the order is issued; (3) a particularized description of the premises to be surveilled; (4) a statement of the duration of the order, which shall not be longer than is necessary to achieve the objective of the authorization nor, in any event, longer than 30 days, measured from the date of the order (without any 10-day grace period to begin interception, but with 30-day extension periods possible); and (5) the names of the persons to be surveilled, if known. 

The Department requires that the investigative agency seeking to use court-ordered video surveillance obtain prior approval from the appropriate Department official. That policy appears at JM 9-7.200.”

I am not a lawyer, but if I review this from a commonsense perspective, it means that law enforcement will be able to use the video surveillance recordings to successfully and thoroughly investigate the acts that occurred during the attack on the U.S. Capitol.

Diving deeper into the video surveillance requirements, criteria #1 is met by law enforcement’s inability to detain and arrest thousands of individuals during the event, given the law enforcement ratios and potential dangers to all involved. Criteria #2 can be met by describing the use of the footage. Criteria #3 and #4 can be specified given that the attack took place in a known location and at a limited time. #5 is written such that it only requires the names of known individuals and does not exclude the use of video surveillance to identify unknown individuals for further investigation.

In some cases, the individuals within the Capitol building were wearing masks. Will those individuals be able to avoid detection due to the masks worn for COVID-19? 

It is highly improbable that a mask that covers part of the individual’s face will make it impossible for law enforcement to identify the person. Even if the individual could keep their mask on during the entire time spent on camera, that doesn’t mean they are unidentifiable. A half-covered face still shows half the face. The person’s eyes, face shape, and facial structure are all still clearly visible to cameras.

These security cameras also recorded the individual from multiple angles for an extended amount of time. Software programs are available to recreate an approximation of what the remainder of the face looks like behind the mask. When you combine that with the additional evidence from data location and social media sharing, law enforcement will still be able to identify the majority of individuals involved in the riotous behavior in Washington D.C.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters