New Orleans under fire — police secretly used live Face ID technology to make arrests

21 May 2025 2 minutes Author: Newsman

For years, New Orleans authorities secretly used a live facial recognition system to track and arrest suspects on the streets — in violation of local laws and without public oversight. After an investigation by *The Washington Post*, the program was shut down.

The investigation revealed that the city police relied on more than two hundred cameras from a private network called Project NOLA, which automatically identified people in real time. These cameras instantly informed officers via a special phone app as soon as they recorded the appearance of a suspect. Despite a 2022 city ordinance that allowed the use of the technology only in the investigation of serious crimes, and only through a special state center, law enforcement officers systematically ignored these requirements. At least 34 arrests, including for minor offenses, have been made using Face ID technology, often without proper disclosure in official reports and city council reports.

The project was led by former police officer Brian Lagarde, who coordinated the deployment of cameras with private businesses, including those in the French Quarter. The database, which included more than 30,000 “suspects,” was compiled from local police photos.

Live facial recognition is a technology that is rarely used officially even in the United States. Most cities allow its limited use, while some, such as Vermont and Virginia, have banned it altogether. Strict controls require the use of images in a specialized center with double-checking by experts. Instead, New Orleans police received and acted on instant notifications, potentially jeopardizing the rights of citizens, especially vulnerable groups.

This scandal is a clear demonstration of how private technology can circumvent even the most stringent local regulations. The uncontrolled use of live Face ID by police is not just a violation of policy, but also a serious threat to civil rights. New Orleans has become a kind of warning to other cities.

Other related articles
News
Read more
RedisRaider is a new hacking campaign developed in Go that infects Linux servers with the XMRig cryptominer, exploiting vulnerabilities in Redis instances.
RedisRaider is a Go malware that spreads using open Redis servers on Linux. It infects the host by adding a cron` task that runs the XMRig miner for Monero. The campaign uses TTL keys and Redis configuration changes to evade detection. Protect your servers: restrict access to Redis, disable unnecessary features, and monitor for unusual activity in /etc/cron.d.
83
News
Read more
How a fake password manager led to an ESXi encryptor
In 2025, hackers distributed a fake version of KeePass — KeeLoader — through Bing ads, stealing passwords, installing Cobalt Strike, and launching an ESXi encryptor. The campaign is associated with Black Basta and used typosquatting domains.
71
Found an error?
If you find an error, take a screenshot and send it to the bot.