Tech

Clearview AI Reports Breach of Customer List

Facial Recognition

Facial recognition company Clearview AI notified customers that an intruder had gained “unauthorized access” to its entire list of customers, The Daily Beast reports.

Clearview gained widespread attention in recent weeks after a wave of media coverage, starting with The New York Times in January. The company stands out from others due to its use of a database of over 3 billion photos the firm constructed by scraping images from Facebook, Twitter, Instagram, and other social networks and websites.

Videos by VICE

Clearview sells its product to law enforcement clients particularly in the U.S. The company’s app allows a customer to point their phone’s camera at a subject, or upload a photo into the system. Then, the system provides links to other photos and related social media profiles of the suspected person online.

Were you behind the Clearview breach? Did you receive the Clearview breach notification? We’d love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, OTR chat on jfcox@jabber.ccc.de, or email joseph.cox@vice.com.

Security is Clearview’s top priority. Unfortunately, data breaches are part of life in the 21st century. Our servers were never accessed. We patched the flaw, and continue to work to strengthen our security,” Tor Ekeland, an attorney working for Clearview, said in a statement to Motherboard.

The New York Times reported that law enforcement has used Clearview to identify child abuse victims. Buzzfeed News found that Clearview wants to sell its tool to authoritarian regimes.

Since the New York Times uncovered Clearview, New Jersey has banned police from using the tool, and various social networks have told Clearview to stop scraping their platforms.

Update: This piece has been updated to include a statement from Ekeland sent to Motherboard.

Subscribe to our cybersecurity podcast, CYBER.