Systems intended to be more widely used by 2012 Olympics UK police forces are reportedly trialling facial recognition systems in a bid to catch rioters, as the authorities step up their use of technology in their investigations into the trouble last week.The systems were originally intended for the 2012 London Olympic Games, but the riots across the UK have presented an opportunity to test the technology.Andy Trotter, Chief Constable at the British Transport Police, told the Associated Press that sophisticated facial recognition systems were being used to help locate the rioters. The main software is located at the Metropolitan Police’s New Scotland Yard headquarters.“There’s a mass of evidence out there,” Trotter told the AP. He said that the system was generally only being used for suspects of the more serious crimes during the riots, with manual identification still forming the method by which most are caught. For the systems to identify the suspects, it is understood the individuals already need to have a criminal record.Last week, police forces across the UK began posting images of suspects, from CCTV and from members of the public, on the internet. A number of forces told ComputerworldUK.com that the investigations into the suspects could not be as effective without the technology. The police initially faced some criticism for not being quick enough to tackle the riots, after many of the incidents were found to have been planned publicly on BlackBerry Messenger, Twitter and Facebook.However, recent proposals by the government to consider blocking social media and text message access for rioters were met with strong opposition from human rights campaigners.NOW READ Riots: Police target technology in bid to catch looters Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe