Select Page



Umbrella Security Systems’ COO, Thomas Carnevale, an expert in security technology provides his perspective on how video surveillance and facial recognition will be used to identify individuals involved in the attack on the U.S. Capitol.  ABC7 – WJLA investigative news team called on Thomas as a security expert to discuss the security breach in the US Capitol and the identification of the people who invaded the building. Below is the news video and a quick excerpt of the 15-minute discussion that happened between I-Team Reporter Scott Taylor and Thomas Carnevale.

Security experts tell us the FBI is using high-tech facial recognition software and huge databases to track these people down.

“We have seen maybe a couple of dozens of arrests so far how do you expect that to lead in the coming weeks? We are going to see just a couple of dozens or even more arrests?”

I-Team Reporter Scott Taylor.

“Anyone that breached that building is going to have some sort of charge.”

Thomas Carnevale, CEO of Umbrella Security Systems in Chicago.

“And you think the FBI will be able to identify those people?”

I-Team Reporter Scott Taylor.

“Absolutely. Every single one of them and they probably already have,” 

Thomas Carnevale, CEO of Umbrella Security Systems in Chicago.

Well, that’s what has happened! The bureau has two facial recognition programs in Criminal Justice Information Services (CJIS) Division. First, The Next Generation Identification (NGI) System and the Facial Analysis, Comparison, and Evaluation (FACE) Services Unit, according to congressional testimony in 2019.  Facial recognition dramatically enhances law enforcement capabilities and provides public safety. Here are the essential points of the FBI’s use of facial recognition.

  • FBI policy strictly governs the impacts in which facial recognition tools may be utilized.
  • The technology is used for law enforcement purposes with human reviews and investigation.

The FBI has also set up a portal for the public to upload any video and images to track down and identify those who breached the Capitol building’s security. Facial recognition technology can extract event the lengthy streamed videos from the incident and generate high-confidence identification of people in the footage. Law enforcement officials rely on this technology to speed up the process of identifying criminals.

U.S. Capitol Congressional Building Identifying Individuals in US Capitol Attack

As of Thursday afternoon (1/7/21), the primary footage that has aired on the news and social media comes from news cameras and phone recordings by individuals located on the scene. While this footage provides a piece of the story, the story’s best perspective will come from the congressional building’s security cameras. Shockingly, the news is not discussing the insurmountable evidence that will be reviewable by law enforcement based on the video recordings from the congressional video surveillance systems.

While there were only 52 reported arrests from the attack on the U.S. Capitol, I believe it is not a stretch to say that law enforcement agencies will be able to identify and charge hundreds or thousands more. I am confident that if the video surveillance recordings are utilized to their fullest extent, the puzzle pieces will come together. Law enforcement agencies will understand the criminal activity that occurred within the Congressional Building and be able to identify individual perpetrators. The video recordings will also provide primary evidence in the trials to convict the individuals who assaulted our democratic institutions and vandalized federal property.

The video surveillance systems located throughout the congressional building do not use cheap residential security cameras. The equipment that monitors the high traffic and priority spaces is top-of-the-line. The consumer equivalents of these security camera systems offer 4k HD video resolution capable of identifying individuals with a level of detail, efficiency, and accuracy that was unthinkable a few years ago. There isn’t a fuzzy picture that needs to be ‘enhanced, enhanced, enhanced’; this is likely a security camera feed with HD resolution.

Brown Moustache Fathers Day Card 27 Identifying Individuals in US Capitol Attack

What role will facial recognition technology play in identifying individuals that are involved in the criminal attacks on the U.S. Capitol?

You may have seen law enforcement using facial recognition software in nearly every fictional law enforcement TV show. In reality, facial recognition technology will likely play an important role in sorting out the situation that occurred within the capital. It will be critical to identifying individuals and attributing specific actions to those individuals.

Facial recognition technology utilizes individual physical and biometric characteristics to create a measured and mathematically calculated unique facial signature. The unique facial signatures identified on video surveillance footage are then matched to a database of recognized faces. The database of individuals’ faces could be sourced from governmental databases such as police mugshots of arrested individuals, publicly available social media pictures, or evidence reported to the FBI and law enforcement.

A less well-known feature of advanced security camera technology is rapid forensic search. This feature enables reviewers to find a needle in a haystack and quickly review hours or days of video surveillance evidence in seconds. For example, if reviewers want to see all of the footage of a man wearing a specific outfit, they would be able to rapidly search for that outfit across multiple camera feeds and track that individual’s movements without hours of work.

If you want to help the law enforcement investigation, review the publicly available video footage and photographs and report any individuals you recognize. In your report, I recommend providing your supporting evidence and the name, city, and links to social media profiles of the individual you are reporting. Plus, if you want an example of facial recognition technology in your everyday life, you can look at the technology that is used to recommend tags for your friends in photographs on social media.

Top 5 Reasons to Integrate Video Surveillance and Access Control Identifying Individuals in US Capitol Attack

You may be wondering if this is legal; can the government and law enforcement use video surveillance on its citizens?

Yes. Although each state has its legislation on video surveillance in public places, the general rule of thumb across the United States is that video recording (without audio) is allowed – except for places where someone has a reasonable expectation of privacy (e.g., bathrooms, hotel rooms, shower areas, changing rooms, etc.). That means the public hallways throughout the congressional building and the grounds surrounding the U.S. Capitol can be legally recorded and analyzed to identify criminal activity.

To support this perspective, it is worth referencing the archived version of the Department of Justice Criminal Resource Manual, which states the following: 

“Video surveillance, which is the use of closed-circuit television (CCTV) to conduct a visual surveillance of a person or a place, is not covered by Title III. Rather, its use is governed by the Fourth Amendment and, therefore, when a reasonable expectation of privacy exists, a search warrant should be sought pursuant to Fed. ‘…’

Accordingly, a search warrant requesting to use video surveillance must demonstrate not only probable cause to believe that evidence of a Federal crime will be obtained by the surveillance, but also should include: (1) a factual statement that alternative investigative methods have been tried and failed or reasonably appear to be unlikely to succeed if tried or would be too dangerous; (2) a statement of the steps to be taken to assure that the surveillance will be minimized to effectuate only the purposes for which the order is issued; (3) a particularized description of the premises to be surveilled; (4) a statement of the duration of the order, which shall not be longer than is necessary to achieve the objective of the authorization nor, in any event, longer than 30 days, measured from the date of the order (without any 10-day grace period to begin interception, but with 30-day extension periods possible); and (5) the names of the persons to be surveilled, if known. 

The Department requires that the investigative agency seeking to use court-ordered video surveillance obtain prior approval from the appropriate Department official. That policy appears at JM 9-7.200.”

I am not a lawyer, but if I review this from a commonsense perspective, it means that law enforcement will be able to use the video surveillance recordings to successfully and thoroughly investigate the acts that occurred during the attack on the U.S. Capitol. Diving deeper into the video surveillance requirements, criteria #1 is met by law enforcement’s inability to detain and arrest thousands of individuals during the event, given the law enforcement ratios and potential dangers to all involved. Criteria #2 can be met by describing the use of the footage. Criteria #3 and #4 can be specified given that the attack took place in a known location and at a limited time. #5 is written such that it only requires the names of known individuals and does not exclude the use of video surveillance to identify unknown individuals for further investigation.

hooded man wearing US Flag mask Identifying Individuals in US Capitol Attack

In some cases, the individuals within the congressional building were wearing masks. Will those individuals be able to avoid detection due to the masks worn for Covid-19?

It is highly improbable that a mask that covers part of the individual’s face will make it impossible for law enforcement to identify the person. Even if the individual could keep their mask on during the entire time spent on camera, that doesn’t mean they are unidentifiable to facial recognition technology. A half-covered face still shows half the face. The person’s eyes, face shape, and facial structure are all still clearly visible to cameras. These security cameras also recorded the individual from multiple angles for an extended amount of time. Software programs are available to recreate an approximation of what the remainder of the face looks like behind the mask. When you combine that with the additional evidence from data location and social media sharing, law enforcement will still be able to identify the majority of individuals involved in the riotous behavior in Washington DC.

The fact that the judicial headquarters of our democracy was breached should be a wake-up call to state local and federal governments. Basic access control for even small businesses is today’s standard and can be used for operational purposes as well as the most serious of security risk mitigation. For a free business security consultation, contact Umbrella Security Systems at 630-270-3313 or send us a message today. 

Share This