SYS-CON MEDIA Authors: Yeshim Deniz, Pat Romanski, Nikita Ivanov, Elizabeth White, Sean Houghton

News Feed Item

CreepShield: Facial Recognition For Safer Online Dating

CreepShield.com releases free public search tools to instantly scan online dating profile photos against a database of over 475,000 convicted sex offenders

DOWNTOWN LAS VEGAS, April 23, 2014 /PRNewswire/ -- CreepShield, a revolutionary new facial recognition search engine powered by FacialNetwork.com, helps users learn more about potential online dates by scanning their profile photos.  Just copy the URL of any headshot and paste it into the CreepShield search engine and the photo is instantly scanned against millions of images of convicted sex offenders.  Photos from popular dating sites such as Match.com, eHarmony, PlentyOfFish and OkCupid can be used.

"Criminals often hide behind aliases online, but CreepShield uses facial recognition software to check for facial similarities and brings up potential matches from a database of over 475,000 registered sex offenders," explained CreepShield's creator Kevin Alan Tussy. "We see facial recognition as a tool that can definitely help make online dating safer. While this technology can't identify everyone out there with bad intentions, it's a huge step in the right direction."

In addition to CreepShield.com, FacialNetwork is also announcing the launch of the CreepShield Chrome extension as well as the CreepShield Enterprise API.

Once installed, the CreepShield Chrome extension allows users to right click on any jpg, png or gif displayed in the Google Chrome browser and select "Scan with CreepShield" from the dropdown menu.  It only takes two clicks to scan any photo on any website against the CreepShield database.

The CreepShield Enterprise API allows dating websites to perform a scan of their new and existing profile photos to further protect their site's users from sexual predators. When you see a CreepShield Security Badge on a dating site, you will know that they are doing everything possible to protect their users.

CreepShield.com has been developed by the team that released the groundbreaking but extremely controversial Google Glass app "NameTag." The app and its powerful facial recognition technology became the subject of an international media firestorm in February 2014 when Senator Al Franken publicly requested that FacialNetwork delay the NameTag app's release in a three-page open letter to FacialNetwork.

In a detailed response to Senator Franken, Tussy explained how safety precautions built into the app prevent it from being used surreptitiously but also agreed to consider delaying the release of NameTag.

"We have delayed NameTag's release at the Senator's request and decided to release CreepShield with the goal of immediately making the 41 million Americans who have used online dating sites safer," said Tussy.

For more information about CreepShield please visit www.CreepShield.com
For more information about the CreepShield Chrome extension please visit www.creepshield.com/chrome-extension
For more information about the CreepShield Enterprise API please visit www.creepshield.com/creepshield-api
For more information about NameTag please visit www.NameTag.ws
For more information about FacialNetwork please visit www.FacialNetwork.com

Contact: Jeff Haney
[email protected]
Office: (702) 385-7300
Cell: (702) 812-9008

SOURCE FacialNetwork.com

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!