Impacts of Facial Recognition Technology in Combating Criminal Activities in Nairobi

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

IMPACTS OF FACIAL RECOGNITION TECHNOLOGY IN COMBATING CRIMINAL ACTIVITIES IN NAIROBI,

KENYA

CASE STUDY –NAIROBI COUNTY

SHIMRI KORIR

ICT-G-4-0774-18

A RESEARCH PROJECT SUBMITTED TO THE SCHOOL OF COMPUTING AND INFORMATICS IN PARTIAL


FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF BACHELOR OF SCIENCE IN
COMPUTER OF GRETSA

UNIVERSITY
DEDICATION

ACKNOWLEDGMENT

Importantly I thank God for his abundant love that has seen me through the work and has care as I
worked this project . I appreciate my supervisor (Ms Faith Too) for the guidance and support

TABLE OF CONTENTS

ABSTRACT

The study will investigate the use of Artificial Intelligence in Face ID ;facial recognition on urban
CCTV network. The actual population of study is about 100 police staff of Nairobi surveillance room
located at Kenya National police service headquarters. They are mainly along major roads and
highways as part of an upgrade of its Intergrated C ommand and Control System(ICCS).The data
collected is to be analysed with simple statistical criteria and interviews done to senior and junior
staff.Findings showed that top security at Nairobi city prevents/reduces theft and feeling of insecurity
among common places .Footage surveillance and face ID recognition system boosts security .There are
lack of enough trained personnel such that computer literate personnel are fewer on ICCS impacting
state of security .Sometimes lack of proper power supply reduces surveillance ie lack of standadised
power generators in place.Computer and software failure atimes incase of power short leads to
improper control and monitoring of residents around the city .Based on findings collected ,it is advised
that use of modern face ID on latest ICCS CCTV netwoks,that includes ultra HD and nightvision
capabilities and increasing number of security experts at ICCS.
INTRODUCTION

Artificial Intelligence (AI) is rapidly changing around the world; new developments keep emerging from
the onset of fake videos that blur the line between the truth and false ,to advanced algorithm.

Advanced AI surveillance through face ID monitors ,track and surveil citizens to accomplish set of
objectives-security and safety.

Security provides form of protection where a separation is created between assets and threat. Kenya
has encountered darker times of insecurity especially case of Westgate mall attack of 2013 and then
Garissa university attack both that claimed deaths of many innocent citizens due to lack of enough
surveillance.The face ID system works in a way that the city hidden security cameras have an
advanced option that lets one make a database of people at given area at a given time .Then when a
camera sees a face ,it determines whether or not it belongs to someone in the list of faces .Some
examples include Kairos ,Luxand face ID software , May 2018, Amazon is already actively promoting its
cloud-based face recognition service named Rekognition to law enforcement agencies..

AI-powered facial recognition technology, helps you accelerate response times by quickly identifying
people of interest. Facial recognition offers the context to make better informed decisions that
empower you to respond to events proactively.

STATEMENT OF PROBLEM

The adoption of Facial ID recognition system in Nairobi city to monitor and boosts security of citizens has
led to the following privacy threats of citizens;

Privacy concerns - with facial recognition also have to do with improper data storage that expose face ID
credentials to potential security threats. Many security firms still host their face recognition data in local
servers.

Misuse of AI face recognition system - Citizens are worried about the use of technology for mass
surveillance. Further, they want to be sure they are not being exploited, and reasonably so.

A complete face recognition system includes face detection, face preprocessing and face
recognition processes. Therefore, it is necessary to extract the face region from the face detection

process and separate the face from the background pattern, which provides the basis for the

subsequent extraction of the face difference features.Assuming a citizen from Nairobi is inocently
tracked and his/her information stored in surveillance database ,his/her self confidence reduces
.Therefore the need to protect citizen privacy should be considered.

.Therefore the need to protect citizen privacy should be considered.

Conceptual framework algorithm behind Face ID on morden CCTV;

Access granted /faces cleared

Facial recognition
system captures
(faces)data of citizen

Faces/samples are received Security action /monitoring


and then compared to the
recorded data/faces
OBJECTIVE OF STUDY

General objectives;

The main reasons for conducting this research was gather information related to use of face ID for
security and theft protection in Nairobi ,Kenya.

Specific;

1.)impact of the technology used in compacting security issues Nairobi.

2.)find out several means that face ID recognition system is breached

3.)identify methods to adopt to enhance personnel information welfare from being threatened

4.)identify problems proned against use of facial recognition system at Nairobi ,Kenya

Research questions

The following reseaech question s will guide the study;

1.)What is the impacts (s) of the technology used in compacting security issues n Nairobi ?

2.)What are several means that face ID recognition system is breached?

3.)What are methods to adopt by face ID to prevent breeches?

4.)What are various problems proned against use of Facial ID through (AI) in providing security in Nairobi
city?

Significance of the study


The significance of the study is based on the need to improve the usen of facial recognition system in
security and protection of citizens around Nairobi metropolitan area .Therefore study becomes
resourcefull and important if used to create solutions to the problems of insecurity and monitoring .

The result of number of city attacks reported that most governments around the world are having
problems with spying on its citizens . With security system in place it becomes easier to monitor the
premises and also gather information of an incident.

Scope of study

The research is based on impacts of facial recognition system on security of citizens at Nairobi
metropolitan area.The researcher considered this place especially Intergrated Command and Control
System(ICCS)/National police headquarters ,Nairobi.

Limitations of the study

Inadequate research materials

It hindered research that the researcher was not able to come up with the required research materials
for data in the study.

Time

The research of the study needed time in order to be done .Due to less time allocation it is therefore
equivalated to research done .Also some security officials could not be found on time

Hypoithesis of study

H0:There is inefficiency and lack of enough/ of existing facial recognition system in Nairobi metropolitan
area

H1:Theres efficiency and enough facial recognition systems in Nairobi area

H0:There are no cases of privacy threats to citizens around metropolitan area

H1:There are cases of privacy threats to citizens around Nairobi metropolitan area

Conceptua l framework
INDEPENDENT VARIABLE DEPENDENT VARIABLE

Provision of monitoring services


Advanced Facial Recognition system
Improved quality of surveillance services

Reduces security checks

Assumptions

The facial recognition system used at the Intergrated Command and Control center,Nairobi police
headquarters represents others metropolitan areas in Kenya.

CHAPTER 2:LITERATURE REVIEW


Introduction

This section reviews literature concerns on impact of the technology used in compacting security
issues Nairobi

The research is mainly into the following parts: Efficiency facial recognition system , Concerns and
threats to citizens privacy; concerns on Database personell on improved keeping of records and Ethical
laws/rules that exist on citizens data privacy. All the above, this

Section was a highlight on the theoretical framework within which this study is based.

You might also like