Blog Post #1: Eyes Everywhere; AI Surveillance
Ever wonder who watches surveillance cameras beyond federal agents, police, and security personnel? Artificial intelligence has become quiet yet incredibly advanced—capable of tracking personal information and recognizing faces with astonishing accuracy. But where does AI store this information, and who has access to it?
Before the rise of AI, surveillance systems relied on continuous 24/7 recording that had to be carefully monitored by human caretakers. These individuals ensured that footage was not distorted, corrupted, or lost due to limited storage space. According to the Security Industry Association, AI can monitor and analyze network traffic in real time, strengthening network security and identifying suspicious activities such as unauthorized access attempts or unusual data transfers. When these activities are detected, users can take immediate action to block or contain potential threats.
While many argue that AI improves security, it also introduces significant challenges. One major concern is security breaches, as AI systems themselves can become targets for cyberattacks. Another issue is compliance, which is essential to avoid legal consequences and requires adherence to national and international regulations governing the use of AI. Addressing these concerns may require collaboration not only with AI technologies themselves but also with AI developers, cybersecurity professionals, and regulatory experts. AI holds the promise of a more holistic approach to security; however, many people place trust in AI without fully understanding where their data is stored or how it is used.
This shift reflects a cyberpunk-like reality where high technology is paired with low transparency where advanced technologies coexist with humans in everyday life. Surveillance cameras are now embedded into our devices, networks, and infrastructure, allowing AI to operate with minimal human oversight.
Facial recognition has advanced significantly over the decades and has blended seamlessly into daily life. According to Critical Tech Solutions, AI facial recognition combines imaging, pattern recognition, and neural networks to analyze and compare facial data. This process typically involves three steps: capturing facial data, converting faces into digital templates, and matching and verification.
As we progress in today’s world, AI will continue to grow smarter, stronger, and more human-like. It is ultimately our responsibility to establish boundaries to ensure that AI does not override human authority or become a tool for harm.
Sources
Dorn, M. (2025a, November 18). Understanding AI facial recognition and its role in public safety. Tech Deployments Made Simple by Critical Tech Solutions. https://www.criticalts.com/articles/ai-facial-recognition-how-it-works-for-security-safety/
Dorn, M. (2025, December 30). How ai surveillance transforms modern security. Tech Deployments Made Simple by Critical Tech Solutions. https://www.criticalts.com/articles/how-ai-surveillance-transforms-modern-security/
Galaz, V. (n.d.). Sciencedirect.com | Science, Health and medical journals, full text articles and books. ScienceDirect. https://www.sciencedirect.com/science/article/am/pii/S0160791X21002165
James Segil, M. S. (2024, April 23). How ai can transform integrated security. Security Industry Association. https://www.securityindustry.org/2024/03/19/how-ai-can-transform-integrated-security/
https://chatgpt.com/share/697574ec-b270-8003-8613-1bbb06691394
ChatGPT was used to craft an AI image and to revise my original thoughts to a more clear and organized writings.