Search This Blog

Saturday, March 12, 2022

Facial recognition system

From Wikipedia, the free encyclopedia

Automatic ticket gate with face recognition system in Osaka Metro Morinomiya Station

A facial recognition system is a technology capable of matching a human face from a digital image or a video frame against a database of faces, typically employed to authenticate users through ID verification services, works by pinpointing and measuring facial features from a given image.

Development began on similar systems in the 1960s, beginning as a form of computer application. Since their inception, facial recognition systems have seen wider uses in recent times on smartphones and in other forms of technology, such as robotics. Because computerized facial recognition involves the measurement of a human's physiological characteristics, facial recognition systems are categorized as biometrics. Although the accuracy of facial recognition systems as a biometric technology is lower than iris recognition and fingerprint recognition, it is widely adopted due to its contactless process. Facial recognition systems have been deployed in advanced human–computer interaction, video surveillance and automatic indexing of images.

Facial recognition systems are employed throughout the world today by governments and private companies. Their effectiveness varies, and some systems have previously been scrapped because of their ineffectiveness. The use of facial recognition systems has also raised controversy, with claims that the systems violate citizens' privacy, commonly make incorrect identifications, encourage gender norms and racial profiling, and do not protect important biometric data. These claims have led to the ban of facial recognition systems in several cities in the United States. As a result of growing societal concerns, Meta announced that it plans to shut down Facebook facial recognition system, deleting the face scan data of more than one billion users. This change will represent one of the largest shifts in facial recognition usage in the technology's history.

History of facial recognition technology

Automated facial recognition was pioneered in the 1960s. Woody Bledsoe, Helen Chan Wolf, and Charles Bisson worked on using the computer to recognize human faces. Their early facial recognition project was dubbed "man-machine" because the coordinates of the facial features in a photograph had to be established by a human before they could be used by the computer for recognition. On a graphics tablet a human had to pinpoint the coordinates of facial features such as the pupil centers, the inside and outside corner of eyes, and the widows peak in the hairline. The coordinates were used to calculate 20 distances, including the width of the mouth and of the eyes. A human could process about 40 pictures an hour in this manner and so build a database of the computed distances. A computer would then automatically compare the distances for each photograph, calculate the difference between the distances and return the closed records as a possible match.

In 1970, Takeo Kanade publicly demonstrated a face matching system that located anatomical features such as the chin and calculated the distance ratio between facial features without human intervention. Later tests revealed that the system could not always reliably identify facial features. Nonetheless, interest in the subject grew and in 1977 Kanade published the first detailed book on facial recognition technology.

In 1993, the Defense Advanced Research Project Agency (DARPA) and the Army Research Laboratory (ARL) established the face recognition technology program FERET to develop "automatic face recognition capabilities" that could be employed in a productive real life environment "to assist security, intelligence, and law enforcement personnel in the performance of their duties." Face recognition systems that had been trialed in research labs were evaluated and the FERET tests found that while the performance of existing automated facial recognition systems varied, a handful of existing methods could viably be used to recognize faces in still images taken in a controlled environment. The FERET tests spawned three US companies that sold automated facial recognition systems. Vision Corporation and Miros Inc were both founded in 1994, by researchers who used the results of the FERET tests as a selling point. Viisage Technology was established by a identification card defense contractor in 1996 to commercially exploit the rights to the facial recognition algorithm developed by Alex Pentland at MIT.

Following the 1993 FERET face recognition vendor test the Department of Motor Vehicles (DMV) offices in West Virginia and New Mexico were the first DMV offices to use automated facial recognition systems as a way to prevent and detect people obtaining multiple driving licenses under different names. Driver's licenses in the United States were at that point a commonly accepted form of photo identification. DMV offices across the United States were undergoing a technological upgrade and were in the process of establishing databases of digital ID photographs. This enabled DMV offices to deploy the facial recognition systems on the market to search photographs for new driving licenses against the existing DMV database. DMV offices became one of the first major markets for automated facial recognition technology and introduced US citizens to facial recognition as a standard method of identification. The increase of the US prison population in the 1990s prompted U.S. states to established connected and automated identification systems that incorporated digital biometric databases, in some instances this included facial recognition. In 1999 Minnesota incorporated the facial recognition system FaceIT by Visionics into a mug shot booking system that allowed police, judges and court officers to track criminals across the state.

In this shear mapping the red arrow changes direction, but the blue arrow does not and is used as eigenvector.
 
The Viola–Jones algorithm for face detection uses Haar-like features to locate faces in an image. Here a Haar Feature that looks similar to the bridge of the nose is applied onto the face.

Until the 1990s facial recognition systems were developed primarily by using photographic portraits of human faces. Research on face recognition to reliably locate a face in an image that contains other objects gained traction in the early 1990s with the principle component analysis (PCA). The PCA method of face detection is also known as Eigenface and was developed by Matthew Turk and Alex Pentland. Turk and Pentland combined the conceptual approach of the Karhunen–Loève theorem and factor analysis, to develop a linear model. Eigenfaces are determined based on global and orthogonal features in human faces. A human face is calculated as a weighted combination of a number of Eigenfaces. Because few Eigenfaces were used to encode human faces of a given population, Turk and Pentland's PCA face detection method greatly reduced the amount of data that had to be processed to detect a face. Pentland in 1994 defined Eigenface features, including eigen eyes, eigen mouths and eigen noses, to advance the use of PCA in facial recognition. In 1997 the PCA Eigenface method of face recognition was improved upon using linear discriminant analysis (LDA) to produce Fisherfaces. LDA Fisherfaces became dominantly used in PCA feature based face recognition. While Eigenfaces were also used for face reconstruction. In these approaches no global structure of the face is calculated which links the facial features or parts.

Purely feature based approaches to facial recognition were overtaken in the late 1990s by the Bochum system, which used Gabor filter to record the face features and computed a grid of the face structure to link the features. Christoph von der Malsburg and his research team at the University of Bochum developed Elastic Bunch Graph Matching in the mid 1990s to extract a face out of an image using skin segmentation. By 1997 the face detection method developed by Malsburg outperformed most other facial detection systems on the market. The so-called "Bochum system" of face detection was sold commercially on the market as ZN-Face to operators of airports and other busy locations. The software was "robust enough to make identifications from less-than-perfect face views. It can also often see through such impediments to identification as mustaches, beards, changed hairstyles and glasses—even sunglasses".

Real-time face detection in video footage became possible in 2001 with the Viola–Jones object detection framework for faces. Paul Viola and Michael Jones combined their face detection method with the Haar-like feature approach to object recognition in digital images to launch AdaBoost, the first real-time frontal-view face detector. By 2015 the Viola-Jones algorithm had been implemented using small low power detectors on handheld devices and embedded systems. Therefore, the Viola-Jones algorithm has not only broadened the practical application of face recognition systems but has also been used to support new features in user interfaces and teleconferencing.

Techniques for face recognition

Automatic face detection with OpenCV.

While humans can recognize faces without much effort, facial recognition is a challenging pattern recognition problem in computing. Facial recognition systems attempt to identify a human face, which is three-dimensional and changes in appearance with lighting and facial expression, based on its two-dimensional image. To accomplish this computational task, facial recognition systems perform four steps. First face detection is used to segment the face from the image background. In the second step the segmented face image is aligned to account for face pose, image size and photographic properties, such as illumination and grayscale. The purpose of the alignment process is to enable the accurate localization of facial features in the third step, the facial feature extraction. Features such as eyes, nose and mouth are pinpointed and measured in the image to represent the face. The so established feature vector of the face is then, in the fourth step, matched against a database of faces.

Traditional

Some eigenfaces from AT&T Laboratories Cambridge

Some face recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face. For example, an algorithm may analyze the relative position, size, and/or shape of the eyes, nose, cheekbones, and jaw. These features are then used to search for other images with matching features.

Other algorithms normalize a gallery of face images and then compress the face data, only saving the data in the image that is useful for face recognition. A probe image is then compared with the face data. One of the earliest successful systems is based on template matching techniques applied to a set of salient facial features, providing a sort of compressed face representation.

Recognition algorithms can be divided into two main approaches: geometric, which looks at distinguishing features, or photo-metric, which is a statistical approach that distills an image into values and compares the values with templates to eliminate variances. Some classify these algorithms into two broad categories: holistic and feature-based models. The former attempts to recognize the face in its entirety while the feature-based subdivide into components such as according to features and analyze each as well as its spatial location with respect to other features.

Popular recognition algorithms include principal component analysis using eigenfaces, linear discriminant analysis, elastic bunch graph matching using the Fisherface algorithm, the hidden Markov model, the multilinear subspace learning using tensor representation, and the neuronal motivated dynamic link matching. Modern facial recognition systems make increasing use of machine learning techniques such as deep learning.

Human identification at a distance (HID)

To enable human identification at a distance (HID) low-resolution images of faces are enhanced using face hallucination. In CCTV imagery faces are often very small. But because facial recognition algorithms that identify and plot facial features require high resolution images, resolution enhancement techniques have been developed to enable facial recognition systems to work with imagery that has been captured in environments with a high signal-to-noise ratio. Face hallucination algorithms that are applied to images prior to those images being submitted to the facial recognition system use example-based machine learning with pixel substitution or nearest neighbour distribution indexes that may also incorporate demographic and age related facial characteristics. Use of face hallucination techniques improves the performance of high resolution facial recognition algorithms and may be used to overcome the inherent limitations of super-resolution algorithms. Face hallucination techniques are also used to pre-treat imagery where faces are disguised. Here the disguise, such as sunglasses, is removed and the face hallucination algorithm is applied to the image. Such face hallucination algorithms need to be trained on similar face images with and without disguise. To fill in the area uncovered by removing the disguise, face hallucination algorithms need to correctly map the entire state of the face, which may be not possible due to the momentary facial expression captured in the low resolution image.

3-dimensional recognition

3D model of a human face.

Three-dimensional face recognition technique uses 3D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin. One advantage of 3D face recognition is that it is not affected by changes in lighting like other techniques. It can also identify a face from a range of viewing angles, including a profile view. Three-dimensional data points from a face vastly improve the precision of face recognition. 3D-dimensional face recognition research is enabled by the development of sophisticated sensors that project structured light onto the face. 3D matching technique are sensitive to expressions, therefore researchers at Technion applied tools from metric geometry to treat expressions as isometries. A new method of capturing 3D images of faces uses three tracking cameras that point at different angles; one camera will be pointing at the front of the subject, second one to the side, and third one at an angle. All these cameras will work together so it can track a subject's face in real-time and be able to face detect and recognize.

Thermal cameras

A pseudocolor image of two people taken in long-wavelength infrared (body-temperature thermal) light.

A different form of taking input data for face recognition is by using thermal cameras, by this procedure the cameras will only detect the shape of the head and it will ignore the subject accessories such as glasses, hats, or makeup. Unlike conventional cameras, thermal cameras can capture facial imagery even in low-light and nighttime conditions without using a flash and exposing the position of the camera. However, the databases for face recognition are limited. Efforts to build databases of thermal face images date back to 2004. By 2016 several databases existed, including the IIITD-PSE and the Notre Dame thermal face database. Current thermal face recognition systems are not able to reliably detect a face in a thermal image that has been taken of an outdoor environment.

In 2018, researchers from the U.S. Army Research Laboratory (ARL) developed a technique that would allow them to match facial imagery obtained using a thermal camera with those in databases that were captured using a conventional camera. Known as a cross-spectrum synthesis method due to how it bridges facial recognition from two different imaging modalities, this method synthesize a single image by analyzing multiple facial regions and details. It consists of a non-linear regression model that maps a specific thermal image into a corresponding visible facial image and an optimization issue that projects the latent projection back into the image space. ARL scientists have noted that the approach works by combining global information (i.e. features across the entire face) with local information (i.e. features regarding the eyes, nose, and mouth). According to performance tests conducted at ARL, the multi-region cross-spectrum synthesis model demonstrated a performance improvement of about 30% over baseline methods and about 5% over state-of-the-art methods.

Application

Social media

Founded in 2013, Looksery went on to raise money for its face modification app on Kickstarter. After successful crowdfunding, Looksery launched in October 2014. The application allows video chat with others through a special filter for faces that modifies the look of users. Image augmenting applications already on the market, such as Facetune and Perfect365, were limited to static images, whereas Looksery allowed augmented reality to live videos. In late 2015 SnapChat purchased Looksery, which would then become its landmark lenses function. Snapchat filter applications use face detection technology and on the basis of the facial features identified in an image a 3D mesh mask is layered over the face.

DeepFace is a deep learning facial recognition system created by a research group at Facebook. It identifies human faces in digital images. It employs a nine-layer neural net with over 120 million connection weights, and was trained on four million images uploaded by Facebook users. The system is said to be 97% accurate, compared to 85% for the FBI's Next Generation Identification system.

TikTok's algorithm has been regarded as especially effective, but many were left to wonder at the exact programming that caused the app to be so effective in guessing the user's desired content. In June 2020, Tiktok released a statement regarding the "For You" page, and how they recommended videos to users, which did not include facial recognition. In February 2021, however, Tiktok agreed to a $92 million settlement to a US lawsuit which alleged that the app had used facial recognition in both user videos and its algorithm to identify age, gender and ethnicity.

ID verification

The emerging use of facial recognition is in the use of ID verification services. Many companies and others are working in the market now to provide these services to banks, ICOs, and other e-businesses. Face recognition has been leveraged as a form of biometric authentication for various computing platforms and devices; Android 4.0 "Ice Cream Sandwich" added facial recognition using a smartphone's front camera as a means of unlocking devices, while Microsoft introduced face recognition login to its Xbox 360 video game console through its Kinect accessory, as well as Windows 10 via its "Windows Hello" platform (which requires an infrared-illuminated camera). In 2017 Apple's iPhone X smartphone introduced facial recognition to the product line with its "Face ID" platform, which uses an infrared illumination system.

Face ID

Apple introduced Face ID on the flagship iPhone X as a biometric authentication successor to the Touch ID, a fingerprint based system. Face ID has a facial recognition sensor that consists of two parts: a "Romeo" module that projects more than 30,000 infrared dots onto the user's face, and a "Juliet" module that reads the pattern. The pattern is sent to a local "Secure Enclave" in the device's central processing unit (CPU) to confirm a match with the phone owner's face.

The facial pattern is not accessible by Apple. The system will not work with eyes closed, in an effort to prevent unauthorized access. The technology learns from changes in a user's appearance, and therefore works with hats, scarves, glasses, and many sunglasses, beard and makeup. It also works in the dark. This is done by using a "Flood Illuminator", which is a dedicated infrared flash that throws out invisible infrared light onto the user's face to properly read the 30,000 facial points.

Deployment of FRT for availing government services

India

In an interview, the National Health Authority chief Dr. R.S. Sharma said that facial recognition technology would be used in conjunction with Aadhaar to authenticate the identity of people seeking vaccines. Ten human rights and digital rights organizations and more than 150 individuals signed a statement by the Internet Freedom Foundation that raised alarm against the deployment of facial recognition technology in the central government's vaccination drive process. Implementation of an error-prone system without adequate legislation containing mandatory safeguards, would deprive citizens of essential services and linking this untested technology to the vaccination roll-out in India will only exclude persons from the vaccine delivery system.

In July, 2021, a press release by the Government of Meghalaya stated that facial recognition technology (FRT) would be used to verify the identity of pensioners to issue a Digital Life Certificate using “Pensioner’s Life Certification Verification” mobile application. The notice, according to the press release, purports to offer pensioners “a secure, easy and hassle-free interface for verifying their liveness to the Pension Disbursing Authorities from the comfort of their homes using smart phones”. Mr. Jade Jeremiah Lyngdoh, a law student, sent a legal notice to the relevant authorities highlighting that “The application has been rolled out without any anchoring legislation which governs the processing of personal data and thus, lacks lawfulness and the Government is not empowered to process data.”

Deployment in security services

Swiss European surveillance: face recognition and vehicle make, model, color and license plate reader

Commonwealth

The Australian Border Force and New Zealand Customs Service have set up an automated border processing system called SmartGate that uses face recognition, which compares the face of the traveller with the data in the e-passport microchip. All Canadian international airports use facial recognition as part of the Primary Inspection Kiosk program that compares a traveler face to their photo stored on the ePassport. This program first came to Vancouver International Airport in early 2017 and was rolled up to all remaining international airports in 2018–2019.

Police forces in the United Kingdom have been trialing live facial recognition technology at public events since 2015. In May 2017, a man was arrested using an automatic facial recognition (AFR) system mounted on a van operated by the South Wales Police. Ars Technica reported that "this appears to be the first time [AFR] has led to an arrest". However, a 2018 report by Big Brother Watch found that these systems were up to 98% inaccurate. The report also revealed that two UK police forces, South Wales Police and the Metropolitan Police, were using live facial recognition at public events and in public spaces. In September 2019, South Wales Police use of facial recognition was ruled lawful. Live facial recognition has been trialled since 2016 in the streets of London and will be used on a regular basis from Metropolitan Police from beginning of 2020. In August 2020 the Court of Appeal ruled that the way the facial recognition system had been used by the South Wales Police in 2017 and 2018 violated human rights.

United States

Flight boarding gate with "biometric face scanners" developed by U.S. Customs and Border Protection at Hartsfield–Jackson Atlanta International Airport.

The U.S. Department of State operates one of the largest face recognition systems in the world with a database of 117 million American adults, with photos typically drawn from driver's license photos. Although it is still far from completion, it is being put to use in certain cities to give clues as to who was in the photo. The FBI uses the photos as an investigative tool, not for positive identification. As of 2016, facial recognition was being used to identify people in photos taken by police in San Diego and Los Angeles (not on real-time video, and only against booking photos) and use was planned in West Virginia and Dallas.

In recent years Maryland has used face recognition by comparing people's faces to their driver's license photos. The system drew controversy when it was used in Baltimore to arrest unruly protesters after the death of Freddie Gray in police custody. Many other states are using or developing a similar system however some states have laws prohibiting its use.

The FBI has also instituted its Next Generation Identification program to include face recognition, as well as more traditional biometrics like fingerprints and iris scans, which can pull from both criminal and civil databases. The federal General Accountability Office criticized the FBI for not addressing various concerns related to privacy and accuracy.

Starting in 2018, U.S. Customs and Border Protection deployed "biometric face scanners" at U.S. airports. Passengers taking outbound international flights can complete the check-in, security and the boarding process after getting facial images captured and verified by matching their ID photos stored on CBP's database. Images captured for travelers with U.S. citizenship will be deleted within up to 12-hours. TSA had expressed its intention to adopt a similar program for domestic air travel during the security check process in the future. The American Civil Liberties Union is one of the organizations against the program, concerning that the program will be used for surveillance purposes.

In 2019, researchers reported that Immigration and Customs Enforcement uses facial recognition software against state driver's license databases, including for some states that provide licenses to undocumented immigrants.

China

In 2006, the Skynet Project was initiated by the Chinese Government to implement CCTV surveillance nationwide and as of 2018, there has been 20 million cameras, many of which capable of real-time facial recognition, deployed across the country for this project Some official claim that the current Skynet system can scan the entire Chinese population in one second and the world population in two seconds.

Boarding gates with facial recognition technology at Beijing West railway station

In 2017 the Qingdao police was able to identify twenty-five wanted suspects using facial recognition equipment at the Qingdao International Beer Festival, one of which had been on the run for 10 years. The equipment works by recording a 15-second video clip and taking multiple snapshots of the subject. That data is compared and analyzed with images from the police department's database and within 20 minutes, the subject can be identified with a 98.1% accuracy.

In 2018, Chinese police in Zhengzhou and Beijing were using smart glasses to take photos which are compared against a government database using facial recognition to identify suspects, retrieve an address, and track people moving beyond their home areas.

As of late 2017, China has deployed facial recognition and artificial intelligence technology in Xinjiang. Reporters visiting the region found surveillance cameras installed every hundred meters or so in several cities, as well as facial recognition checkpoints at areas like gas stations, shopping centers, and mosque entrances. In May 2019, Human Rights Watch reported finding Face++ code in the Integrated Joint Operations Platform (IJOP), a police surveillance app used to collect data on, and track the Uighur community in Xinjiang. Human Rights Watch released a correction to its report in June 2019 stating that the Chinese company Megvii did not appear to have collaborated on IJOP, and that the Face++ code in the app was inoperable. In February 2020, following the Coronavirus outbreak, Megvii applied for a bank loan to optimize the body temperature screening system it had launched to help identify people with symptoms of a Coronavirus infection in crowds. In the loan application Megvii stated that it needed to improve the accuracy of identifying masked individuals.

Many public places in China are implemented with facial recognition equipment, including railway stations, airports, tourist attractions, expos, and office buildings. In October 2019, a professor at Zhejiang Sci-Tech University sued the Hangzhou Safari Park for abusing private biometric information of customers. The safari park uses facial recognition technology to verify the identities of its Year Card holders. An estimated 300 tourist sites in China have installed facial recognition systems and use them to admit visitors. This case is reported to be the first on the use of facial recognition systems in China. In August 2020 Radio Free Asia reported that in 2019 Geng Guanjun, a citizen of Taiyuan City who had used the WeChat app by Tencent to forward a video to a friend in the United States was subsequently convicted on the charge of the crime "picking quarrels and provoking troubles". The Court documents showed that the Chinese police used a facial recognition system to identify Geng Guanjun as an "overseas democracy activist" and that China's network management and propaganda departments directly monitor WeChat users.

In 2019, Protestors in Hong Kong destroyed smart lampposts amid concerns they could contain cameras and facial recognition system used for surveillance by Chinese authorities.

India

Even though facial recognition technology (FRT) is not fully accurate, it is being increasingly deployed for identification purposes by the police in India. FRT systems generate a probability match score, or a confidence score between the suspect who is to be identified and the database of identified criminals that is available with the police. The National Automated Facial Recognition System (AFRS) is already being developed by the National Crime Records Bureau (NCRB), a body constituted under the Ministry of Home Affairs. The project seeks to develop and deploy a national database of photographs which would comport with a facial recognition technology system by the central and state security agencies. The Internet Freedom Foundation has flagged concerns regarding the project. The NGO has highlighted that the accuracy of FRT systems are "routinely exaggerated and the real numbers leave much to be desired. The implementation of such faulty FRT systems would lead to high rates of false positives and false negatives in this recognition process.” 

Under the Supreme Court of India's decision in [[Justice K.S. Puttaswamy vs Union of India (22017 10 SCC 1), any justifiable intrusion by the State into people's right to privacy, which is protected as a fundamental right under Article 21 of the Constitution, must confirm to certain thresholds, namely: legality, necessity, proportionality and procedural safeguards. As per the Internet Freedom Foundation, the National Automated Facial Recognition System (AFRS) proposal fails to meet any of these thresholds, citing "absence of legality," "manifest arbitrariness," and "absence of safeguards and accountability."

While the national level AFRS project is still in the works, police departments in various states in India are already deploying facial recognition technology systems, such as: TSCOP + CCTNS in Telangana, Punjab Artificial Intelligence System (PAIS) in Punjab, Trinetra in Uttar Pradesh, Police Artificial Intelligence System in Uttarakhand, AFRS in Delhi, Automated Multimodal Biometric Identification System (AMBIS) in Maharashtra, FaceTagr in Tamil Nadu. The Crime and Criminal Tracking Network and Systems (CCTNS), which is a Mission Mode Project under the National e-Governance Plan (NeGP), is viewed as a system which would connect police stations across India, and help them "talk" to each other. The project's objective is to digitize all FIR-related information, including FIRs registered, as well as cases investigated, charge sheets filed, and suspects and wanted persons in all police stations. This shall constitute a national database of crime and criminals in India. CCTNS is being implemented without a data protection law in place. CCTNS is proposed to be integrated with the AFRS, a repository of all crime and criminal related facial data which can be deployed to purportedly identify or verify a person from a variety of inputs ranging from images to videos. This has raised privacy concerns from civil society organizations and privacy experts. Both the projects have been censured as instruments of "mass surveillance" at the hands of the state. In Rajasthan, 'RajCop,' a police app has been recently integrated with a facial recognition module which can match the face of a suspect against a database of known persons in real-time. Rajasthan police is in currently working to widen the ambit of this module by making it mandatory to upload photographs of all arrested persons in CCTNS database, which will "help develop a rich database of known offenders."

Helmets fixed with camera have been designed and being used by Rajasthan police in law and order situations to capture police action and activities of “the miscreants, which can later serve as evidence during the investigation of such cases.” PAIS (Punjab Artificial Intelligence System), App employs deep learning, machine learning, and face recognition for the identification of criminals to assist police personnel. The state of Telangana has installed 8 lakh CCTV cameras, with its capital city Hyderabad slowly turning into a surveillance capital.

A false positive happens when facial recognition technology misidentifies a person to be someone they are not, that is, it yields an incorrect positive result. They often results in discrimination and strengthening of existing biases. For example, in 2018, Delhi Police reported that its FRT system had an accuracy rate of 2%, which sank to 1% in 2019. The FRT system even failed to distinguish accurately between different sexes.

The government of Delhi in collaboration with Indian Space Research Organisation (ISRO) is developing a new technology called Crime Mapping Analytics and Predictive System (CMAPS). The project aims to deploy space technology for "controlling crime and maintaining law and order." The system will be connected to a database containing data of criminals. The technology is envisaged to be deployed to collect real-time data at the crime scene.

In a reply dated November 25, 2020 to a Right to Information request filed by the Internet Freedom Foundation seeking information about the facial recognition system being used by the Delhi Police (with reference number DEPOL/R/E/20/07128), the Office of the Deputy Commissioner of Police cum Public Information Officer: Crime stated that they cannot provide the information under section 8(d) of the Right to Information Act, 2005. A Right to Information (RTI) request dated July 30, 2020 was filed with the Office of the Commissioner, Kolkata Police, seeking information about the facial recognition technology that the department was using. The information sought was denied stating that the department was exempted from disclosure under section 24(4) of the RTI Act.

Latin America

In the 2000 Mexican presidential election, the Mexican government employed face recognition software to prevent voter fraud. Some individuals had been registering to vote under several different names, in an attempt to place multiple votes. By comparing new face images to those already in the voter database, authorities were able to reduce duplicate registrations.

In Colombia public transport busses are fitted with a facial recognition system by FaceFirst Inc to identify passengers that are sought by the National Police of Colombia. FaceFirst Inc also built the facial recognition system for Tocumen International Airport in Panama. The face recognition system is deployed to identify individuals among the travelers that are sought by the Panamanian National Police or Interpol. Tocumen International Airport operates an airport-wide surveillance system using hundreds of live face recognition cameras to identify wanted individuals passing through the airport. The face recognition system was initially installed as part of a US$11 million contract and included a computer cluster of sixty computers, a fiber-optic cable network for the airport buildings, as well as the installation of 150 surveillance cameras in the airport terminal and at about 30 airport gates.

At the 2014 FIFA World Cup in Brazil the Federal Police of Brazil used face recognition goggles. Face recognition systems "made in China" were also deployed at the 2016 Summer Olympics in Rio de Janeiro. Nuctech Company provided 145 insepction terminals for Maracanã Stadium and 55 terminals for the Deodoro Olympic Park.

European Union

Police forces in at least 21 countries of the European Union use, or plan to use, facial recognition systems, either for administrative or criminal purposes.

Greece

Greek police passed a contract with Intracom-Telecom for the provision of at least 1,000 devices equipped with live facial recognition system. The delivery is expected before the summer 2021. The total value of the contract is over 4 million euros, paid for in large part by the Internal Security Fund of the European Commission.

Italy

Italian police acquired a face recognition system in 2017, Sistema Automatico Riconoscimento Immagini (SARI). In November 2020, the Interior ministry announced plans to use it in real-time to identify people suspected of seeking asylum.

The Netherlands

The Netherlands has deployed facial recognition and artificial intelligence technology since 2016.[126] The database of the Dutch police currently contains over 2.2 million pictures of 1.3 million Dutch citizens. This accounts for about 8% of the population. In The Netherlands, face recognition is not used by the police on municipal CCTV.

South Africa

In South Africa, in 2016, the city of Johannesburg announced it was rolling out smart CCTV cameras complete with automatic number plate recognition and facial recognition.

Deployment in retail stores

The US firm 3VR, now Identiv, is an example of a vendor which began offering facial recognition systems and services to retailers as early as 2007. In 2012 the company advertised benefits such as "dwell and queue line analytics to decrease customer wait times", "facial surveillance analytic[s] to facilitate personalized customer greetings by employees" and the ability to "[c]reate loyalty programs by combining Point of sale (POS) data with facial recognition".

United States

In 2018 the National Retail Federation Loss Prevention Research Council called facial recognition technology "a promising new tool" worth evaluating.

In July 2020, the Reuters news agency reported that during the 2010s the pharmacy chain Rite Aid had deployed facial recognition video surveillance systems and components from FaceFirst, DeepCam LLC, and other vendors at some retail locations in the United States. Cathy Langley, Rite Aid's vice president of asset protection, used the phrase "feature matching" to refer to the systems and said that usage of the systems resulted in less violence and organized crime in the company's stores, while former vice president of asset protection Bob Oberosler emphasized improved safety for staff and a reduced need for the involvement of law enforcement organizations. In a 2020 statement to Reuters in response to the reporting, Rite Aid said that it had ceased using the facial recognition software and switched off the cameras.

According to director Read Hayes of the National Retail Federation Loss Prevention Research Council, Rite Aid's surveillance program was either the largest or one of the largest programs in retail. The Home Depot, Menards, Walmart, and 7-Eleven are among other US retailers also engaged in large-scale pilot programs or deployments of facial recognition technology.

Of the Rite Aid stores examined by Reuters in 2020, those in communities where people of color made up the largest racial or ethnic group were three times as likely to have the technology installed, raising concerns related to the substantial history of racial segregation and racial profiling in the United States. Rite Aid said that the selection of locations was "data-driven", based on the theft histories of individual stores, local and national crime data, and site infrastructure.

Additional uses

Disney's Magic Kingdom, near Orlando, Florida, during a trial of a facial recognition technology for park entry.

At the American football championship game Super Bowl XXXV in January 2001, police in Tampa Bay, Florida used Viisage face recognition software to search for potential criminals and terrorists in attendance at the event. 19 people with minor criminal records were potentially identified.

Face recognition systems have also been used by photo management software to identify the subjects of photographs, enabling features such as searching images by person, as well as suggesting photos to be shared with a specific contact if their presence were detected in a photo. By 2008 facial recognition systems were typically used as access control in security systems.

The United States' popular music and country music celebrity Taylor Swift surreptitiously employed facial recognition technology at a concert in 2018. The camera was embedded in a kiosk near a ticket booth and scanned concert-goers as they entered the facility for known stalkers.

On August 18, 2019, The Times reported that the UAE-owned Manchester City hired a Texas-based firm, Blink Identity, to deploy facial recognition systems in a driver program. The club has planned a single super-fast lane for the supporters at the Etihad stadium. However, civil rights groups cautioned the club against the introduction of this technology, saying that it would risk "normalising a mass surveillance tool". The policy and campaigns officer at Liberty, Hannah Couchman said that Man City's move is alarming, since the fans will be obliged to share deeply sensitive personal information with a private company, where they could be tracked and monitored in their everyday lives.

In August 2020, amid the COVID-19 pandemic in the United States, American football stadiums of New York and Los Angeles announced the installation of facial recognition for upcoming matches. The purpose is to make the entry process as touchless as possible. Disney's Magic Kingdom, near Orlando, Florida, likewise announced a test of facial recognition technology to create a touchless experience during the pandemic; the test was originally slated to take place between March 23 and April 23, 2021, but the limited timeframe had been removed as of late April.

Advantages and disadvantages

Compared to other biometric systems

In 2006, the performance of the latest face recognition algorithms was evaluated in the Face Recognition Grand Challenge (FRGC). High-resolution face images, 3-D face scans, and iris images were used in the tests. The results indicated that the new algorithms are 10 times more accurate than the face recognition algorithms of 2002 and 100 times more accurate than those of 1995. Some of the algorithms were able to outperform human participants in recognizing faces and could uniquely identify identical twins.

One key advantage of a facial recognition system that it is able to perform mass identification as it does not require the cooperation of the test subject to work. Properly designed systems installed in airports, multiplexes, and other public places can identify individuals among the crowd, without passers-by even being aware of the system. However, as compared to other biometric techniques, face recognition may not be most reliable and efficient. Quality measures are very important in facial recognition systems as large degrees of variations are possible in face images. Factors such as illumination, expression, pose and noise during face capture can affect the performance of facial recognition systems. Among all biometric systems, facial recognition has the highest false acceptance and rejection rates, thus questions have been raised on the effectiveness of face recognition software in cases of railway and airport security.

Weaknesses

Ralph Gross, a researcher at the Carnegie Mellon Robotics Institute in 2008, describes one obstacle related to the viewing angle of the face: "Face recognition has been getting pretty good at full frontal faces and 20 degrees off, but as soon as you go towards profile, there've been problems." Besides the pose variations, low-resolution face images are also very hard to recognize. This is one of the main obstacles of face recognition in surveillance systems.

Face recognition is less effective if facial expressions vary. A big smile can render the system less effective. For instance: Canada, in 2009, allowed only neutral facial expressions in passport photos.

There is also inconstancy in the datasets used by researchers. Researchers may use anywhere from several subjects to scores of subjects and a few hundred images to thousands of images, and training datasets often have homogeneous composition. It is important for researchers to make available the datasets they used to each other, or have at least a standard dataset.

Facial recognition systems have been criticized for upholding and judging based on a binary gender assumption. When classifying the faces of cisgender individuals into male or female, these systems are often very accurate, however were typically confused or unable to determine the gender identity of transgender and non-binary people. Gender norms are being upheld by these systems, so much so that even when shown a photo of a cisgender male with long hair, algorithms was split between following the gender norm of males having short hair, and the masculine facial features and became confused. This accidental misgendering of people can be very harmful for those who do not identify with their sex assigned at birth, by disregarding and invalidating their gender identity. This is also harmful for people who do not ascribe to traditional and outdated gender norms, because it invalidates their gender expression, regardless of their gender identity.

Ineffectiveness

Critics of the technology complain that the London Borough of Newham scheme has, as of 2004, never recognized a single criminal, despite several criminals in the system's database living in the Borough and the system has been running for several years. "Not once, as far as the police know, has Newham's automatic face recognition system spotted a live target." This information seems to conflict with claims that the system was credited with a 34% reduction in crime (hence why it was rolled out to Birmingham also).

An experiment in 2002 by the local police department in Tampa, Florida, had similarly disappointing results. A system at Boston's Logan Airport was shut down in 2003 after failing to make any matches during a two-year test period.

In 2014, Facebook stated that in a standardized two-option facial recognition test, its online system scored 97.25% accuracy, compared to the human benchmark of 97.5%.

Systems are often advertised as having accuracy near 100%; this is misleading as the studies often use much smaller sample sizes than would be necessary for large scale applications. Because facial recognition is not completely accurate, it creates a list of potential matches. A human operator must then look through these potential matches and studies show the operators pick the correct match out of the list only about half the time. This causes the issue of targeting the wrong suspect.

Controversies

Privacy violations

Civil rights organizations and privacy campaigners such as the Electronic Frontier Foundation, Big Brother Watch and the ACLU express concern that privacy is being compromised by the use of surveillance technologies. Face recognition can be used not just to identify an individual, but also to unearth other personal data associated with an individual – such as other photos featuring the individual, blog posts, social media profiles, Internet behavior, and travel patterns. Concerns have been raised over who would have access to the knowledge of one's whereabouts and people with them at any given time. Moreover, individuals have limited ability to avoid or thwart face recognition tracking unless they hide their faces. This fundamentally changes the dynamic of day-to-day privacy by enabling any marketer, government agency, or random stranger to secretly collect the identities and associated personal information of any individual captured by the face recognition system. Consumers may not understand or be aware of what their data is being used for, which denies them the ability to consent to how their personal information gets shared.

In July 2015, the United States Government Accountability Office conducted a Report to the Ranking Member, Subcommittee on Privacy, Technology and the Law, Committee on the Judiciary, U.S. Senate. The report discussed facial recognition technology's commercial uses, privacy issues, and the applicable federal law. It states that previously, issues concerning facial recognition technology were discussed and represent the need for updating the privacy laws of the United States so that federal law continually matches the impact of advanced technologies. The report noted that some industry, government, and private organizations were in the process of developing, or have developed, "voluntary privacy guidelines". These guidelines varied between the stakeholders, but their overall aim was to gain consent and inform citizens of the intended use of facial recognition technology. According to the report the voluntary privacy guidelines helped to counteract the privacy concerns that arise when citizens are unaware of how their personal data gets put to use.

In 2016 Russian company NtechLab caused a privacy scandal in the international media when it launched the FindFace face recognition system with the promise that Russian users could take photos of strangers in the street and link them to a social media profile on the social media platform Vkontakte (VT). In December 2017, Facebook rolled out a new feature that notifies a user when someone uploads a photo that includes what Facebook thinks is their face, even if they are not tagged. Facebook has attempted to frame the new functionality in a positive light, amidst prior backlashes. Facebook's head of privacy, Rob Sherman, addressed this new feature as one that gives people more control over their photos online. "We've thought about this as a really empowering feature," he says. "There may be photos that exist that you don't know about." Facebook's DeepFace has become the subject of several class action lawsuits under the Biometric Information Privacy Act, with claims alleging that Facebook is collecting and storing face recognition data of its users without obtaining informed consent, in direct violation of the 2008 Biometric Information Privacy Act (BIPA). The most recent case was dismissed in January 2016 because the court lacked jurisdiction. In the US, surveillance companies such as Clearview AI are relying on the First Amendment to the United States Constitution to data scrape user accounts on social media platforms for data that can be used in the development of facial recognition systems.

In 2019 the Financial Times first reported that facial recognition software was in use in the King's Cross area of London. The development around London's King's Cross mainline station includes shops, offices, Google's UK HQ and part of St Martin's College. According to the UK Information Commissioner's Office: "Scanning people's faces as they lawfully go about their daily lives, in order to identify them, is a potential threat to privacy that should concern us all." The UK Information Commissioner Elizabeth Denham launched an investigation into the use of the King's Cross facial recognition system, operated by the company Argent. In September 2019 it was announced by Argent that facial recognition software would no longer be used at King's Cross. Argent claimed that the software had been deployed between May 2016 and March 2018 on two cameras covering a pedestrian street running through the centre of the development. In October 2019 a report by the deputy London mayor Sophie Linden revealed that in a secret deal the Metropolitan Police had passed photos of seven people to Argent for use in their King's cross facial recognition system.

Automated Facial Recognition was trialled by the South Wales Police on multiple occasions between 2017 and 2019. The use of the technology was challenged in court by a private individual, Edward Bridges, with support from the charity Liberty (case known as R (Bridges) v Chief Constable South Wales Police). The case was heard in the Court of Appeal and a judgement was given in August 2020. The case argued that the use of Facial Recognition was a privacy violation on the basis that there was insufficient legal framework or proportionality in the use of Facial Recognition and that its use was in violation of the Data Protection Acts 1998 and 2018. The case was decided in favour of Bridges and did not award damages. The case was settled via a declaration of wrongdoing. In response to the case, the British Government has repeatedly attempted to pass a Bill regulating the use of Facial Recognition in public spaces. The proposed Bills have attempted to appoint a Commissioner with the ability to regulate Facial Recognition use by Government Services in a similar manner to the Commissioner for CCTV. Such a Bill has yet to come into force [correct as of September 2021].

Imperfect technology in law enforcement

It is still contested as to whether or not facial recognition technology works less accurately on people of color. One study by Joy Buolamwini (MIT Media Lab) and Timnit Gebru (Microsoft Research) found that the error rate for gender recognition for women of color within three commercial facial recognition systems ranged from 23.8% to 36%, whereas for lighter-skinned men it was between 0.0 and 1.6%. Overall accuracy rates for identifying men (91.9%) were higher than for women (79.4%), and none of the systems accommodated a non-binary understanding of gender. It also showed that the datasets used to train commercial facial recognition models were unrepresentative of the broader population and skewed toward lighter-skinned males. However, another study showed that several commercial facial recognition software sold to law enforcement offices around the country had a lower false non-match rate for black people than for white people.

Experts fear that face recognition systems may actually be hurting citizens the police claims they are trying to protect. It is considered an imperfect biometric, and in a study conducted by Georgetown University researcher Clare Garvie, she concluded that "there's no consensus in the scientific community that it provides a positive identification of somebody." It is believed that with such large margins of error in this technology, both legal advocates and facial recognition software companies say that the technology should only supply a portion of the case – no evidence that can lead to an arrest of an individual. The lack of regulations holding facial recognition technology companies to requirements of racially biased testing can be a significant flaw in the adoption of use in law enforcement. CyberExtruder, a company that markets itself to law enforcement said that they had not performed testing or research on bias in their software. CyberExtruder did note that some skin colors are more difficult for the software to recognize with current limitations of the technology. "Just as individuals with very dark skin are hard to identify with high significance via facial recognition, individuals with very pale skin are the same," said Blake Senftner, a senior software engineer at CyberExtruder.

The United State's National Institute of Standards and Technology (NIST) carried out extensive testing of FRT system 1:1 verification and 1:many identification. It also tested for the differing accuracy of FRT across different demographic groups. The independent study concluded at present, no FRT system has 100% accuracy.

Data protection

In 2010 Peru passed the Law for Personal Data Protection, which defines biometric information that can be used to identify an individual as sensitive data. In 2012 Colombia passed a comprehensive Data Protection Law which defines biometric data as senstivite information. According to Article 9(1) of the EU's 2016 General Data Protection Regulation (GDPR) the processing of biometric data for the purpose of "uniquely identifying a natural person" is sensitive and the facial recognition data processed in this way becomes sensitive personal data. In response to the GDPR passing into the law of EU member states, EU based researchers voiced concern that if they were required under the GDPR to obtain individual's consent for the processing of their facial recognition data, a face database on the scale of MegaFace could never be established again. In September 2019 the Swedish Data Protection Authority (DPA) issued its first ever financial penalty for a violation of the EU's General Data Protection Regulation (GDPR) against a school that was using the technology to replace time-consuming roll calls during class. The DPA found that the school illegally obtained the biometric data of its students without completing an impact assessment. In addition the school did not make the DPA aware of the pilot scheme. A 200,000 SEK fine (€19,000/$21,000) was issued.

In the United States of America several U.S. states have passed laws to protect the privacy of biometric data. Examples include the Illinois Biometric Information Privacy Act (BIPA) and the California Consumer Privacy Act (CCPA). In March 2020 California residents filed a class action against Clearview AI, alleging that the company had illegally collected biometric data online and with the help of face recognition technology built up a database of biometric data which was sold to companies and police forces. At the time Clearview AI already faced two lawsuits under BIPA and an investigation by the Privacy Commissioner of Canada for compliance with the Personal Information Protection and Electronic Documents Act (PIPEDA).

Bans on the use of facial recognition technology

In May 2019, San Francisco, California became the first major United States city to ban the use of facial recognition software for police and other local government agencies' usage. San Francisco Supervisor, Aaron Peskin, introduced regulations that will require agencies to gain approval from the San Francisco Board of Supervisors to purchase surveillance technology. The regulations also require that agencies publicly disclose the intended use for new surveillance technology. In June 2019, Somerville, Massachusetts became the first city on the East Coast to ban face surveillance software for government use, specifically in police investigations and municipal surveillance. In July 2019, Oakland, California banned the usage of facial recognition technology by city departments.

The American Civil Liberties Union ("ACLU") has campaigned across the United States for transparency in surveillance technology and has supported both San Francisco and Somerville's ban on facial recognition software. The ACLU works to challenge the secrecy and surveillance with this technology.

In January 2020, the European Union suggested, but then quickly scrapped, a proposed moratorium on facial recognition in public spaces.

During the George Floyd protests, use of facial recognition by city government was banned in Boston, Massachusetts. As of June 10, 2020, municipal use has been banned in:

The West Lafayette, Indiana City Council passed an ordinance banning facial recognition surveillance technology.

On October 27, 2020, 22 human rights groups called upon the University Of Miami to ban facial recognition technology. This came after the students accused the school of using the software to identify student protesters. The allegations were, however, denied by the university.

The European "Reclaim Your Face" coalition launched in October 2020. The coalition calls for a ban on facial recognition and launched a European Citizens' Initiative in February 2021. More than 60 organizations call on the European Commission to strictly regulate the use of biometric surveillance technologies.

A state police reform law in Massachusetts will take effect in July 2021; a ban passed by the legislature was rejected by governor Charlie Baker. Instead, the law requires a judicial warrant, limit the personnel who can perform the search, record data about how the technology is used, and create a commission to make recommendations about future regulations.

Emotion recognition

In the 18th and 19th century the belief that facial expressions revealed the moral worth or true inner state of a human was widespread and physiognomy was a respected science in the Western world. From the early 19th century onwards photography was used in the physiognomic analysis of facial features and facial expression to detect insanity and dementia. In the 1960s and 1970s the study of human emotions and its expressions was reinvented by psychologists, who tried to define a normal range of emotional responses to events. The research on automated emotion recognition has since the 1970s focused on facial expressions and speech, which are regarded as the two most important ways in which humans communicate emotions to other humans. In the 1970s the Facial Action Coding System (FACS) categorization for the physical expression of emotions was established. Its developer Paul Ekman maintains that there are six emotions that are universal to all human beings and that these can be coded in facial expressions. Research into automatic emotion specific expression recognition has in the past decades focused on frontal view images of human faces.

In 2016 facial feature emotion recognition algorithms were among the new technologies, alongside high-definition CCTV, high resolution 3D face recognition and iris recognition, that found their way out of university research labs. In 2016 Facebook acquired FacioMetrics, a facial feature emotion recognition corporate spin-off by Carnegie Mellon University. In the same year Apple Inc. acquired the facial feature emotion recognition start-up Emotient. By the end of 2016 commercial vendors of facial recognition systems offered to integrate and deploy emotion recognition algorithms for facial features. The MIT's Media Lab spin-off Affectiva by late 2019 offered a facial expression emotion detection product that can recognize emotions in humans while driving

Anti-facial recognition systems

In January 2013 Japanese researchers from the National Institute of Informatics created 'privacy visor' glasses that use nearly infrared light to make the face underneath it unrecognizable to face recognition software. The latest version uses a titanium frame, light-reflective material and a mask which uses angles and patterns to disrupt facial recognition technology through both absorbing and bouncing back light sources. Some projects use adversarial machine learning to come up with new printed patterns that confuse existing face recognition software.

Another method to protect from facial recognition systems are specific haircuts and make-up patterns that prevent the used algorithms to detect a face, known as computer vision dazzle. Incidentally, the makeup styles popular with Juggalos can also protect against facial recognition.

Facial masks that are worn to protect from contagious viruses can reduce the accuracy of facial recognition systems. A 2020 NIST study tested popular one-to-one matching systems and found a failure rate between five and fifty percent on masked individuals. The Verge speculated that the accuracy rate of mass surveillance systems, which were not included in the study, would be even less accurate than the accuracy of one-to-one matching systems. The facial recognition of Apple Pay can work through many barriers, including heavy makeup, thick beards and even sunglasses, but fails with masks.

Structures built by animals

From Wikipedia, the free encyclopedia
 
A so-called "cathedral" mound produced by a termite colony.

Structures built by animals, often called animal architecture, abound in nature. Examples of animal structures include termite mounds, wasp and beehives, burrow complexes of rodents, beaver dams, elaborate nests of birds, and webs of spiders.

Often, these structures incorporate sophisticated features such as temperature regulation, traps, bait, ventilation, special-purpose chambers and many other features. They may be created by individuals or complex societies of social animals with different forms carrying out specialized roles. These constructions may arise from complex building behaviour of animals such as in the case of night-time nests for chimpanzees, from inbuilt neural responses, which feature prominently in the construction of bird songs, or triggered by hormone release as in the case of domestic sows, or as emergent properties from simple instinctive responses and interactions, as exhibited by termites, or combinations of these. The process of building such structures may involve learning and communication, and in some cases, even aesthetics. Tool use may also be involved in building structures by animals.

Animals which build

A young paper wasp queen (Polistes dominula) starting a new colony

Building behaviour is common in many non-human mammals, birds, insects and arachnids. It is also seen in a few species of fish, reptiles, amphibians, molluscs, urochordates, crustaceans, annelids and some other arthropods. It is virtually absent from all the other animal phyla.

Functions

Animals create structures primarily for three reasons:

  • to create protected habitats, i.e. homes.
  • to catch prey and for foraging, i.e. traps.
  • for communication between members of the species (intra-specific communication), i.e. display.

Animals primarily build habitat for protection from extreme temperatures and from predation. Constructed structures raise physical problems which need to be resolved, such as humidity control or ventilation, which increases the complexity of the structure. Over time, through evolution, animals use shelters for other purposes such as reproduction, food storage, etc.

Protected habitats

Nest, eggs and young of the red-wattled lapwing which depends upon crypsis to avoid detection of its nest.
 
The red-faced spinetail places bits of grass and other material loosely streaming around its nest to break the shape and to masquerade as debris.

Predators are attracted to animal-built structures either by the prey or its offspring, or the stored caches of food. Structures built by animals may provide protection from predators through avoiding detection, by means such as camouflage and concealment, or through prevention of invasion, once predators have located the hideout or prey, or a combination of both. As a last resort, structures may provide means of escape.

Among the structures created by animals to prevent predation are those of the paper wasps, Polistes chinensis antennalis. The nests of these wasps contain “defensive structures”, which are formations built onto or inside of the nest to prevent predation. New nests are formed in the spring by young queens, as worker wasps have not hatched at this time. While these worker wasps are growing in the nest, they are vulnerable to predators who might rip open the nest to eat the larva. One method the queens use to prevent this is covering the developing pupae in pulp, which acts as a reinforcer and makes it more difficult from predators to break open the pupae. This pulp is a mixture of plant matter and liquids from the mouth of the queen wasp. While there are costs associated with using pulp, such as requiring time and energy to collect materials and hindering the emergence of the worker wasps from the cocoon, it does lower the risk of predation. Nests in areas with higher predation rates have been found to contain more pulp on these cocoons than nests in low predation areas.

Animals use the techniques of crypsis or camouflage, concealment, and mimicry, for avoiding detection. Some species of birds will use materials foraged from nature to camouflage their nests and prevent their offspring from being hunted. Blue–gray gnatcatchers (Polioptila caerulea) and long-tailed tits (Aegithalos caudatus) use materials such as spider webbing, silk, and lichen, while other species such as great crested flycatchers (Myiarchus crinitus) and common waxbills (Estrilda astrild) will use animal feces and snake skins to disguise their nests. Crypsis works by blending the structure with its background. The use of lichen flakes as an outer covering of nests by birds, as in the case of the paradise flycatcher (Terpsiphone paradisei) have been considered by some authors to be a case of crypsis through "branch-matching" and as a case of disruptive camouflage by the British ethologist, M. Hansell, where the lichen flakes are thought to resemble small patches of light seen through as in the case of insubstantial objects of insufficient importance to receive a predator's interest.

Ground-nesting birds which rely on crypsis for concealment have nests made from local materials which blend in with the background, the eggs and young too are cryptic; whereas birds which do not use crypsis for hiding their nests may not have cryptic eggs or young.

In a case apparently of masquerade, the red-faced spinetail Cranioleuca erythrops places bits of grass and other material loosely streaming both above and below the nest chamber to break the shape of the nest and to cause it to resemble random debris without any underlying structure.

Thermoregulation

Communal silk nests of the small eggar moth Eriogaster lanestris

Temperature extremes harm animals irrespective of whether they are endothermic or ectothermic. In endothermic animals, construction of shelters, coupled with behavioural patterns, reduces the quantity and energy cost of thermoregulation, as in the case of the Arctic ground squirrels.

In ectothermic animals, moderation of temperature, along with architectural modifications to absorb, trap or dissipate energy, maximises the rate of development, as in the case of the communal silk nests of the small eggar moth Eriogaster lanestris. The primary sources of energy for an animal are the sun and its metabolism. The dynamics of heat in animal shelters is influenced by the construction material which may act as a barrier, as a heat sink or to dissipate heat. The cocoons of insect are a case in point.

An interesting example is the case of silk caps which cover the pupal cells of the Oriental hornet Vespa orientalis. Firstly, the silk insulates the pupa from the air outside the cell, and secondly, it acts as a thermostatic regulator. By virtue of its thermoelectric properties, the silk stores excess daytime heat in the form of electric charge which it releases in the form of an electric current when the temperature falls resulting in heating. Cooling is aided by evaporation of excess water from the pupal cells. When the ambient temperature drops, the silk absorbs moisture and restores the moisture content by spreading water through all parts of its cocoon.

Internal architectural devices, such as walls may block convection or the construction of air flow systems may cool the nest or habitat.

Trap building

Trap-building is a method used to catch prey instead of active hunting. Animals that snare prey will construct a trap and then wait nearby until an organism is caught. This is observed in web-building spiders, who weave elaborate webs of sticky spider silk that entangle prey. Spiders increase the size of their webs when prey are scarce, and can add extra ornamental pieces to their web in order to attract more prey. Traps can allow organisms to capture larger prey, provide protection from predators, or serve as an area for mating, as seen with spiders. Another method of trap creation is used by the antlion (Myrmeleon crudelis) larva. These larva prey on small arthropods, such as ants. The larva dig pits into fine-particle soil to capture their prey, which fall into the holes and are often unable to climb out. The antlions may alter these pits based on prey availability. In areas with less available prey, antlions will make wider holes to increase the chance of catching an insect. If prey are able to climb out of the hole, antlions will increase the depth of the hole.

Displays

Bowerbird in front of a constructed bower

Animal structures can serve as a means of communication with other organisms. Animals may construct to attract mates, as seen in species of male fiddler crabs. These crabs may form "pillars" or "hoods" out of sand and mud to gain the attention of nearby females. Bowerbirds (Ptilonorhynchus violaceus) also create display structures to attract mates. During the mating season, male Bowerbirds will collect twigs and colourful objects to create structures known as "bowers", which attract the attention of females. Bowers that are more colourful and well constructed are more attractive to female bowerbirds, as the quality of the constructed bowers reflects the quality of the male bird.

Transportation

Eciton sp. forming a bridge

Army Ants (Eciton hamatum) form "living bridges" to assist in transportation. Army Ant colonies may move locations each day in search of food. These bridges provide a path over obstacles and allow for the ants to search for food at an increased speed. The bridges are constructed when the ants join their bodies together, and can vary in size and shape depending on the situation the ants face. Ants are confined to their position when they are forming these bridges, preventing them from moving. The bridges are broken apart when they are no longer needed.

Building materials

Materials used by animals in building structures need to not only be suitable for the kind of structure to be built but also to be manipulable by the animals. These materials may be organic in nature or mineral. They may also be categorised as "collected material" and "self-secreted material".

Collected materials

A long-tailed tit adds a feather to its nest.

Some animals collect materials with plastic properties which are used to construct and shape the nest. These include resin collected by stingless bees, mud collected by swallows and silk collected by hummingbirds.

Some materials in nature act as ready made "building blocks" to the animals in question, such as feathers and leaf petioles for some birds and animal hair for the chaffinch. Other materials need to be "processed". Caddisfly larvae use stone pieces and also cut sections from green leaves for use in construction. The stone pieces are selected as per their size and shape from a large variety. In the case of leaf sections, these are cut and shaped to required size. Similarly bagworms cut and shape thorns or twigs to form their case. Some sphecid wasps collect mud and blend them with water to construct free standing nests of mud. Paper wasp queens build with paper pulp which they prepare by rasping wood with their jaws and mixing with saliva, a case of collecting, processing and blending raw materials.

An animal builder may collect a variety of materials and use them in complex ways to form useful habitat. The nest of the long-tailed tit, Aegithalos caudatus, is constructed from four materials – lichen, feathers, spider egg cocoons and moss, over 6000 pieces in all for a typical nest. The nest is a flexible sac with a small, round entrance on top, suspended low in a gorse or bramble bush. The structural stability of the nest is provided by a mesh of moss and spider silk. The tiny leaves of the moss act as hooks and the spider silk of egg cocoons provides the loops; thus forming a natural form of velcro. The tit lines the outside with hundreds of flakes of pale lichens – this provides camouflage. Inside, it lines the nest with more than 2000 feathers to insulate the nest.

About the construction of nest by the long-tailed tit, it has been written:

"...the most amazing thing about it (the building behaviour) is, in my opinion that so few, so simple and so rigid movements together lead to the construction of so superb a result."

Niko Tinbergen, 1953.

Material of animal origin

Birds form the majority of the group of animals which collect building material of animal origin. They collect animal fur and feathers of other species of birds to line their nests. Almost 56% of all families of passerine birds have species which utilise spider silk. Most birds use spider silk as in the case of the long-tailed tit, previously discussed; however the little spiderhunter (Arachnothera longirostra) of Asian tropical forests uses spider silk differently. It constructs a nest of plant strips which it suspends below a large leaf using spider silk for about a 150 or so of "pop-rivets".

Plant material

Young bank voles (Myodes glareolus) in their underground chamber which is often lined with moss, feathers and vegetable fiber.

Flowering plants provide a variety of resources – twigs, leaves, petioles, roots, flowers and seeds. Basal plants, such as lichens, mosses and ferns also find use in structures built by animals. The leaves of grasses and palms being elongate and parallel-veined are very commonly used for building. These, along-with palm fibers and horse-hair fern are used to build hanging baskets. Wooden twigs form the greater proportion of materials used in the nests of large birds. Plants and trees not only provide resources but also sites. Branches provide support in the form of cantilevered beams while leaves and green twigs provide flexible but strong supports.

Structures formed from plant material include beaver dams, which are constructed by foraged branches and sticks. The dam is a wall of sticks constructed on a moving water source, which forces the water to collect in one area and to stop flowing. Beavers begin to build a dam in an area where rocks and other debris slow the flow of the water. The beavers then form a small platform of sticks stretching across the water source. More sticks and branches are added to build the dam up over time. The structure in the center of the dam, known as the lodge, serves as a home for the beavers and protects them from predators. The primary reason behind the construction of beaver dams is to surround the lodge with deep water, which protects the beaver from and-dwelling predators. The entrance of the dam is underwater to prevent predators such as bears and wolves from entering, and the sticks at the top of the lodge are not packed tightly, which allows air into the structure.

Mud and stones

Mud is used by a few species of a wide variety of families including wasps and birds. Mud is plastic when wet and provides compressive strength when dried. Amongst birds, 5% of all birds use mud and stones in their nest for toughness and compressive strength. Males in some species of crab will construct structures out of mud to attract mates and avoid predators. Uca musica, also known as fiddler crabs, will build short, wide “hoods” out of sand. Another species of crab, Uca beebei, will build tall, thin pillars out of mud. These structures attract female crabs to male crab burrows and provide a hiding place for both males and females when predators are nearby. Beavers will often seal their dams and lodges with mud for extra support.

Self-secreted materials

Western honey bees on a wild nest.

The majority of self-secreted materials are produced by insects and selection acts on this characteristic of production of self-secreting materials and increases the fitness of the animal. In some cases, the self-secreted material is directly applied, as in the case of ecribellate silk, spun by ecribellate spiders, to form sticky traps for prey, or it may be processed, as in the case of salivary excretion used for creation of paper by paper wasps, by blending it directly with wood pulp. Self-secreted materials may be processed in some cases. In cribellate spiders, silk produced by the spider are reworked in the cribellum to form fine sticky strands used for capturing prey. In other cases, the scale wax, produced on the bodies of honey bees, is gathered and blended with saliva, to form comb wax, the building material. Not all self-secreted materials are developed specifically for that purpose. For example, bird feathers are used for lining and insulation, a typical example being that of the female common eider duck (Somateria mollissima), which produces down feathers for lining its nest.

Cocoons are another type of structure formed to protect the organism from predation. In order to transform from a larva into a butterfly or moth, a caterpillar must undergo drastic changes in its body. These changes require significant amounts of energy and occur over long periods of time, making a caterpillar very vulnerable to predation. To overcome this, caterpillars will produce silk to form a cocoon or pupa, a structure in which the caterpillar will reside while pupating to lower its risk of predation. Some species of caterpillar, such as the silkworm (Bombyx mori) are able to spin multiple cocoons in the event that one gets destroyed. Other caterpillars will even form defensive structures to accompany their pupas. The Aethria carnicauda caterpillar uses the hairs that cover its body as a defensive mechanism against predators. When it is time to form a cocoon, the caterpillar rips the hairs off of its body and places them around the pupating site. This creates a series of defensive walls to protect the vulnerable caterpillar while resides in its cocoon.

Evolutionary consequences

Recently, some researchers have argued that the structures built by animals affect the evolution of the constructor, a phenomenon known as niche construction.

Genetic history of the Middle East

From Wikipedia, the free encyclopedia
 

The genetic history of the Middle East is the subject of research within the fields of human population genomics, archaeogenetics and Middle Eastern studies. Researchers use Y-DNA, mtDNA, and other autosomal DNAs to identify the genetic history of ancient and modern populations of Egypt, Persia, Mesopotamia, Anatolia, Arabia, the Levant, and other areas.

History

Developments in DNA sequencing in the 1970s and 1980s provided researchers with the tools needed to study human genetic variation and the genetics of human populations to discover founder populations of modern people groups and human migrations.

In 2005, National Geographic launched The Genographic Project, led by 12 prominent scientists and researchers, to study and map historical human migration patterns by collecting and analyzing DNA samples from hundreds of thousands of people from around the world.

Regions

Egypt

Contamination from handling and intrusion from microbes create obstacles to the recovery of Ancient DNA. Consequently, most DNA studies have been carried out on modern Egyptian populations with the intent of learning about the influences of historical migrations on the population of Egypt.

In general, various DNA studies have found that the genetic variant frequencies of North African populations are intermediate between those of the Near East, the Horn of Africa, southern Europe and Sub Saharan Africa, though Egypt's NRY frequency distributions appear to be much more similar to those of the Middle East than to any sub-Saharan African population, suggesting a much larger Eurasian genetic component in samples examined .

A recent genetic study published in the "European Journal of Human Genetics" (2019) showed that Northern Africans (including Egyptians) are closely related to Europeans and West Asians as well as to Southwest Asians. Northern Africans can clearly be distinguished from West Africans and other African populations dwelling south of the Sahara.

Blood groups

Blood typing and DNA sampling on ancient Egyptian mummies is scant; however, a 1982 study of blood typing of dynastic mummies found ABO frequencies to be most similar to modern Egyptians and some also to Northern Haratin populations. ABO blood group distribution shows that the Egyptians form a sister group to North African populations, including Berbers, Nubians and Canary Islanders.

Ancient Egyptians

In 2013, Nature announced the publication of the first genetic study utilizing next-generation sequencing to ascertain the ancestral lineage of an Ancient Egyptian individual. The research was led by Carsten Pusch of the University of Tübingen in Germany and Rabab Khairat, who released their findings in the Journal of Applied Genetics. DNA was extracted from the heads of five Egyptian mummies that were housed at the institution. All the specimens were dated between 806 BC and 124 AD, a timeframe corresponding with the late Dynastic period. The researchers observed that one of the mummified individuals likely belonged to the mtDNA haplogroup I2, a maternal clade that is believed to have originated in Western Asia.

In a 2017 study published in Nature, three Egyptian mummies were obtained spanning around 1,300 years of Egyptian history from the New Kingdom to the Roman period. Analyses revealed that ancient Egyptians shared more ancestry with Near Easterners than present-day Egyptians, who received additional sub-Saharan admixture in more recent times, around 750 years ago.

Iran

Iranian peoples descended from two closely related West-Eurasian groups, specifically from "Neolithic Iranian farmers" and from "Yamnaya Steppe pastoralists". Recent population genomic studies found that the genetic structure of Iranian peoples formed already about 5,000 years ago and show high continuity since then, suggesting that they were largely unaffected by migration events from outside groups. Genetically speaking, Iranian peoples generally cluster closely with European peoples and populations south to the Caucasus, however certain ethno-linguistic minority groups, such as Turkmens, are more distant and show evidence of recent admixture. Persians, Kurds, Azeris, Tajiks, Pashtuns, Balochis, and certain Uzbek samples, cluster tightly together, forming a single cluster, known as CIC (Central Iranian cluster). Compared with worldwide populations, Iranians (CIC) cluster in the center of the wider West-Eurasian cluster, close to Europeans, Middle Easterners, and South-Central Asians. Interestingly, Iranian Arabs and Azeris are nearly indistinguishable from other Iranian groups, suggesting that linguistic identity is less relevant within Iran. Parsi samples from India were surprisingly found to be part of the Iranian cluster (CIC). The genetic substructure of Iranians is surprisingly low and homogeneous, compared with other "1000G" populations. Europeans, and certain South Asians (Indians) showed the highest affinity with Iranians, while Sub-Saharan Africans and East Asians showed the highest differentiation with Iranians.

Genetic links to neolithic Anatolia

A 2017 study analyzed the autosomal DNA and genome of an Iron Age Iranian sample taken from Teppe Hasanlu (F38_Hasanlu, dated to 971-832 BCE) and revealed it had close affinities to a neolithic North-West Anatolian individual from Kumtepe even closer than Neolithic Iranians.

Gilaks and Mazandaranis

A 2006 genetic research was made by Nasidze et al. on the North Iranian populations on the Gilaks and Mazandaranis, spanning the southwestern coast of the Caspian Sea, up to the border with neighbouring Azerbaijan. The Gilaks and Mazandaranis comprise 7% of the Iranian population. The study suggested that their ancestors came from the Caucasus region, perhaps displacing an earlier group in the South Caspian. Linguistic evidence supports this scenario, in that the Gilaki and Mazandarani languages (but not other Iranian languages) share certain typological features with Caucasian languages, and specifically South Caucasian languages. There have been patterns analyzed of mtDNA and Y chromosome variation in the Gilaki and Mazandarani.

Based on mtDNA HV1 sequences tested by Nasidze et al., the Gilaks and Mazandarani most closely resemble their geographic and linguistic neighbors, namely other Iranian groups. However, their Y chromosome types most closely resemble those found in groups from the South Caucasus. A scenario that explains these differences is a south Caucasian origin for the ancestors of the Gilani and Mazandarani, followed by introgression of women (but not men) from local Iranian groups, possibly because of patrilocality. Given that both mtDNA and language are maternally transmitted, the incorporation of local Iranian women would have resulted in the concomitant replacement of the ancestral Caucasian language and mtDNA types of the Gilani and Mazandarani with their current Iranian language and mtDNA types. Concomitant replacement of language and mtDNA may be a more general phenomenon than previously recognized.

The Mazandarani and Gilani groups fall inside a major cluster consisting of populations from the Caucasus and West Asia and are particularly close to the South Caucasus groups—Georgians, Armenians, and Azerbaijanis. Iranians from Tehran and Isfahan are situated more distantly from these groups.

Iranian Azeris

The 2013 comparative study on the complete mitochondrial DNA diversity in Iranians has indicated that Iranian Azerbaijanis are more related to the people of Georgia, than they are to other Iranians (Like Persians), while the Persians, Armenians and Qashqai on the other hand were more related to each other. It furthermore showed that overall, the complete mtDNA sequence analysis revealed an extremely high level of genetic diversity in the Iranian populations studied which is comparable to the other groups from the South Caucasus, Anatolia and Europe. The same 2013 research further noted that "the results of AMOVA and MDS analyses did not associate any regional and/or linguistic group of populations in the Anatolia, Caucasus and Iran region pointing to strong genetic affinity of Indo-European speaking Persians and Turkic-speaking Qashqais, thus suggesting their origin from a common maternal ancestral gene pool. The pronounced influence of the South Caucasus populations on the maternal diversity of Iranian Azeris is also evident from the MDS analysis results." The study also notes that "It is worth pointing out the position of Azeris from the Caucasus region, who despite their supposed common origin with Iranian Azeris, cluster quite separately and occupy an intermediate position between the Azeris/Georgians and Turks/Iranians grouping". The MtDNA results from the samples overall on average closely resemble those found in the neighbouring regions of the Caucasus, Anatolia, and to a lesser extent (Northern) Mesopotamia.

Among the most common MtDNA lineages in the nation, namely U3b3, appears to be restricted to populations of Iran and the Caucasus, while the sub-cluster U3b1a is common in the whole Near East region.

Iraq

Ancient genetic links to South Asia

A 2013 study based on DNA extracted from the dental remains of four individuals from different time eras (200–300 CE, 2650-2450 BCE, 2200–1900 BCE) unearthed at Tell Ashara (ancient Terqa, in modern Syria) and Tell Masaikh (ancient Kar-Assurnasirpal) suggested a possible genetic link between the people of Bronze Age Mesopotamia and Northern India. According to the study, "We anticipate that the analysed remains from [northern] Mesopotamia belonged to people with genetic affinity to the Indian subcontinent since the distribution of identified ancient haplotypes indicates solid link with populations from the region of South Asia-Tibet (Trans-Himalaya). They may have been descendants of migrants from much earlier times, spreading the clades of the macrohaplogroup M throughout Eurasia and founding regional Mesopotamian groups like that of Terqa or just merchants moving along trade routes passing near or through the region." A 2014 study expanding on the 2013 study and based on analysis of 15751 DNA samples arrives at the conclusion, that "M65a, M49 and/or M61 haplogroups carrying ancient Mesopotamians might have been the merchants from India".

Assyrians

In the 1995 book The History and Geography of Human Genes the authors wrote that: "The Assyrians are a fairly homogeneous group of people, believed to originate from the land of old Assyria in northern Iraq [..] they are Christians and are bona fide descendants of their ancient namesakes." In a 2006 study of the Y chromosome DNA of six regional populations, including, for comparison, Assyrians and Syrians, researchers found that, "the two Semitic populations (Assyrians and Syrians) are very distinct from each other according to both [comparative] axes. This difference supported also by other methods of comparison points out the weak genetic affinity between the two populations with different historical destinies."

A 2008 study on the genetics of "old ethnic groups in Mesopotamia," including 340 subjects from seven ethnic communities ("These populations included Assyrians, Jews, Zoroastrians, Armenians, Arabs and Turkmen (representing ethnic groups from Iran, restricted by rules of their religion), and the Iraqi and Kuwaiti populations from Iraq and Kuwait.") found that Assyrians were homogeneous with respect to all other ethnic groups sampled in the study, regardless of religious affiliation.

Marsh Arabs

A study published in 2011 looking at the relationship between Iraq's Marsh Arabs and ancient Sumerians concluded "the modern Marsh Arabs of Iraq harbour mtDNAs and Y chromosomes that are predominantly of Middle Eastern origin. Therefore, certain cultural features of the area such as water buffalo breeding and rice farming, which were most likely introduced from the Indian sub-continent, only marginally affected the gene pool of the autochthonous people of the region. Moreover, a Middle Eastern ancestral origin of the modern population of the marshes of southern Iraq implies that, if the Marsh Arabs are descendants of the ancient Sumerians, also Sumerians were not of Indian or Southern Asian ancestry." The same 2011 study, when focusing on the genetics of the Maʻdān people of Iraq, identified Y chromosome haplotypes shared by Marsh Arabs, Arabic speaking Iraqis, Assyrians and Mandeans "supporting a common local background."

Levant

Chalcolithic and Bronze Age periods

From a 2020 study published in Cell: "Understanding the nature of this movement was the primary motivation behind this study. Here, we present a large-scale analysis of genome-wide data from key sites of prehistoric Anatolia, the Northern Levant, and the Southern Caucasian lowlands ... In the Northern Levant, we identified a major genetic shift between the Chalcolithic and Bronze Age periods. During this transition, Northern Levantine populations experienced gene flow from new groups harboring ancestries related to both Zagros/Caucasus and the Southern Levant. This suggests a shift in social orientation, perhaps in response to the rise of urban centers in Mesopotamia, which to date remain genetically unsampled." They further add: "This expansion is recorded in the region of the Northern Levant ca. 2800 BCE and could be associated with the movement/ migration of people from Eastern Anatolia and the Southern Caucasian highlands. However, our results do not support this scenario for a number of reasons". "There are extensive textual references from the end of the EBA through the LBA referring to groups of people arriving into the area of the Amuq Valley. Although these groups were named, likely based on designations (e.g., Amorites, Hurrians), the formative context of their (cultural) identity and their geographic origins remain debated. One recent hypothesis (Weiss, 2014, 2017; Akar and Kara, 2020) associates the arrival of these groups with climate-forced population movement during the ‘‘4.2k BP event,’’ a Mega Drought that led to the abandonment of the entire Khabur river valley in Northern Mesopotamia and the search of nearby habitable areas."

The study also suggested a substantial genetic continuity from the Levantine Bronze Age both in modern-day Arabic-speaking Levantine populations (such as Syrians, Druze, Lebanese, and Palestinians) and Jewish groups (such as Moroccan, Ashkenazi, and Mizrahi Jews), who are all suggested to derive a majority (about half or more) of their ancestry from Canaanite-related or Bronze Age Levantine populations (with differering variables for different communities, and with Ashkenazi Jews deriving just over half of their ancestry from Bronze-Age Levantines/Canaanite-related peoples and the rest from Europeans, and Arabic-speaking Levantines, Moroccan Jews, and Mizrahi Jews deriving a larger majority of their ancestry from Bronze Age Canaanite-related peoples). The study concludes that this does not mean that any of these present-day groups bear direct ancestry from people who lived in the Middle-to-Late Bronze Age Levant or in Chalco-lithic Zagros; rather, it indicates that they have ancestries from populations whose ancient proxy can be related to the Middle East.

Canaanites and Phoenicians

Zalloua and Wells (2004), under the auspices of a grant from National Geographic Magazine, examined the origins of the Canaanite Phoenicians. The debate between Wells and Zalloua was whether haplogroup J2 (M172) should be identified as that of the Phoenicians or that of its "parent" haplogroup M89 on the YDNA phylogenetic tree. Initial consensus suggested that J2 be identified with the Canaanite-Phoenician (North Levantine) population, with avenues open for future research. As Wells commented, "The Phoenicians were the Canaanites" It was reported in the PBS description of the National Geographic TV Special on this study entitled "Quest for the Phoenicians" that ancient DNA was included in this study as extracted from the tooth of a 2500-year-old Phoenician mummy.

Wells identified the haplogroup of the Canaanites as haplogroup J2 which originated from Anatolia and the Caucasus. The National Geographic Genographic Project linked haplogroup J2 to the site of Jericho, Tel el-Sultan, ca. 8500 BCE and indicated that in modern populations, haplogroup J2 is found primarily in the Middle East, but also along the coasts of North Africa and Southern Europe, with especially high distribution among present-day Jewish populations (30%), Southern Italians (20%), and lower frequencies in Southern Spain (10%).

Cyprus

Cruciani in 2007 found E1b1b1a2 (E-V13) [one from Sub Clades of E1b1b1a1 (E-M78)] in high levels (>10% of the male population) in Cypriot and Druze lineages. Recent genetic clustering analyses of ethnic groups are consistent with the close ancestral relationship between the Druze and Cypriots, and also identified similarity to the general Syrian and Lebanese populations, as well as a variety of Jewish lineages (Ashkenazi, Sephardi, Iraqi Jewish, and Moroccan Jews).

A 2016 study on 600 Cypriot males asserts that "genome-wide studies indicate that the genetic affinity of Cyprus is nearest to current populations of the Levant". Analyses of Cypriot haplogroup data are consistent with two stages of prehistoric settlement. E-V13 and E-M34 are widespread, and PCA suggests sourcing them to the Balkans and Levant/Anatolia, respectively. Contrasting haplogroups in the PCA were used as surrogates of parental populations. Admixture analyses suggested that the majority of G2a-P15 and R1b-M269 components were contributed by Anatolia and Levant sources, respectively, while Greece/Balkans supplied the majority of E-V13 and J2a-M67. Haplotype-based expansion times were at historical levels suggestive of recent demography. On the other hand, more recent Principal Component Analyses based on autosomal DNA, have placed Cypriots clearly separate from Levantine and Middle Eastern groups, either at the easternmost flank of the south European cluster, or in an intermediate position between southern Europeans and northern Levantines. In a study by Harvard geneticist Iosif Lazarides and colleagues investigating the genetic origins of the Minoans and Mycenaeans, Cypriots were found to be the second least differentiated population from Bronze Age Mycenaeans based on FST index and also genetically differentiated from Levantines.

Palestine and Israel

A study published by the National Academy of Sciences found that "the paternal gene pools of Jewish communities from Europe, North Africa, and the Middle East descended from a common Middle Eastern ancestral population", and suggested that "most Jewish communities have remained relatively isolated from neighbouring non-Jewish communities during and after the Diaspora". Researchers expressed surprise at the remarkable genetic uniformity they found among modern Jews, no matter where the diaspora has become dispersed around the world. Skorecki and colleague wrote that "the extremely close affinity of Jewish and non-Jewish Middle Eastern populations observed ... supports the hypothesis of a common Middle Eastern origin".

This research has suggested that, in addition to Israelite male, significant female founder ancestry might also derive from the Middle East-with 40% of Ashkenazim descended from four women who lived about 2000–3000 years ago in the Middle East. In addition, Behar (2006) suggested that the rest of Ashkenazi mtDNA is originated from about 150 women; most of those were probably of Middle Eastern origin. A 2013 genetic study suggested that the four founding maternal lineages of Ashkenazi Jews originate in Europe and that only ~8% of Ashkenazi mtDNA can confidently be assigned a Near Eastern origin, while >80% of Ashkenazi maternal lineages have a likely European origin (with most Ashkenazi paternal lineages having a Middle Eastern origin), while a 2014 study carried out by Spanish geneticists suggested an ancient Near Eastern origin of the four founding maternal lineages of Ashkenazi Jews.

In 2004, a team of geneticists from Stanford University, the Hebrew University of Jerusalem, Tartu University (Estonia), Barzilai Medical Center (Ashkelon, Israel), and the Assaf Harofeh Medical Center (Zerifin, Israel), studied the modern Samaritan ethnic community living in Israel in comparison with modern Israeli populations to explore the ancient genetic history of these people groups. The Samaritans or Shomronim (singular: Shomroni; Hebrew: שומרוני) trace their origins to the Assyrian province of Shomron (Samaria) in ancient Israel in the period after the Assyrian conquest circa 722 BCE. Shomron was the capital of the Northern Kingdom of Israel when it was conquered by the Assyrians and gave the name to the ancient province of Samaria and the Samaritan people group. Jewish tradition holds that the Samaritans were a mixed group of Israelites who were not exiled or were sent back or returned from exile and non-Israelites relocated to the region by the Assyrians. The modern-day Samaritans are believed to be the direct descendants of the ancient Samaritans.

Their findings reported on four family lineages among the Samaritans: the Tsdaka family (tradition: tribe of Menasseh), the Joshua-Marhiv and Danfi families (tradition: tribe of Ephraim), and the Cohen family (tradition: tribe of Levi). All Samaritan families were found in haplogroups J1 and J2, except the Cohen family which was found in haplogroup E3b1a-M78. This article predated the E3b1a subclades based on the research of Cruciani, et al.

A 2018 study conducted by scholars from Tel-Aviv University, the Israel Antiquities Authority and Harvard University had discovered that 22 out of the 600 people who were buried in Peki'in cave from the Chalcolithic Period were of both local Levantine and Persian and Zagros area ancestries, or as phrased in the paper itself: "Ancient DNA from Chalcolithic Israel reveals the role of population mixture in cultural transformation," the scientists concluded that the homogeneous community found in the cave could source ~57% of its ancestry from groups related to those of the local Levant Neolithic, ~26% from groups related to those of the Anatolian Neolithic, and ~17% from groups related to those of the Iran Chalcolithic. The scholars noted that the Zagros genetic material held "Certain characteristics, such as genetic mutations contributing to blue eye color, were not seen in the DNA test results of earlier Levantine human remains"...The blue-eyed, fair-skinned community didn’t continue, but at least now researchers have an idea why. "These findings suggest that the rise and fall of the Chalcolithic culture are probably due to demographic changes in the region".

In a 2005 study of ASPM gene variants, Mekel-Bobrov et al. found that the Israeli Druze people of the Carmel region have among the highest rate of the newly evolved ASPM haplogroup D, at 52.2% occurrence of the approximately 6,000-year-old allele. While it is not yet known exactly what selective advantage is provided by this gene variant, the haplogroup D allele is thought to be positively selected in populations and to confer some substantial advantage that has caused its frequency to rapidly increase. According to DNA testing, Druze are remarkable for the high frequency (35%) of males who carry the Y-chromosomal haplogroup L, which is otherwise uncommon in the Mideast. This haplogroup originates from prehistoric South Asia and has spread from Pakistan into southern Iran.

Lebanon

In a 2011 genetic study by Haber et al which analyzed the male-line Y-chromosome genetics of the different religious groups of Lebanon, revealed no noticeable or significant genetic differentiation between the Maronites, Greek Orthodox Christians, Greek Catholic Christians, Sunni Muslims, Shiite Muslims, and Druze of the region on the more frequent haplogroups. Major differences between Lebanese groups were found among the less frequent haplogroups. In 1965, Ruffié and Taleb found significant differences of blood markers between ethno-religious groups. A 2005 study by Makhoul et al on Beta Thalassemia Heterogeneity in Lebanon found out that the thalassemia mutations in some Lebanese Christians are similar to the ones observed in Macedonia which "may confirm the presumed Macedonian origin of certain Lebanese Christians".

A 2013 genetic study carried out by Haber at al found "all Jews (Sephardi and Ashkenazi) cluster in one branch; Druze from Mount Lebanon and Druze from Mount Carmel are depicted on a private branch; and Lebanese Christians form a private branch with the Christian populations of Armenia and Cyprus placing the Lebanese Muslims as an outer group. Lebanese Muslims cluster towards the predominant Muslim populations of Syrians, Palestinians, and Jordanians, which in turn cluster on branches with other Muslim populations as distant as Morocco and Yemen."

The authors explained that "In particular, conversion of the region's populations to Islam appears to have introduced major rearrangements in populations' relations through admixture with culturally similar but geographically remote populations, leading to genetic similarities between remarkably distant populations like Jordanians, Moroccans, and Yemenis. Conversely, Christians, Jews and Druze became genetically isolated in the new cultural environment." In conclusions, the authors reconstructed the genetic structure of ancient Levantines and found that a pre-Islamic expansion Levant was more genetically similar to Europeans than to Arabians.

A 2017 study published by the American Journal of Human Genetics, concluded that present-day Lebanese derive most of their ancestry from a Canaanite-related population (Canaanite being a pre-Phoenician name), which therefore implies substantial genetic continuity in the Levant since at least the Bronze Age. More specifically, according to Chris Tyler-Smith, a geneticist and his colleagues at the Sanger Institute in Britain, who compared "sampled ancient DNA from five Canaanite people who lived 3,750 and 3,650 years ago" to modern people. "The comparison revealed that 93 percent of the genetic ancestry of people in Lebanon came from the Canaanites and the other 7 percent was of a Eurasian steppe population"

A 2019 study, carried out by the Wellcome Sanger Institute, United Kingdom, after analyzing the "DNA evidence from the remains of nine Crusaders found at a burial site in Lebanon", concludes that contrary to the popular belief, the Crusaders did not leave "a lasting effect on the genetics of modern-day Lebanese. Instead, today’s Lebanese Christians in particular are more genetically similar to locals from the Roman period, which preceded the Crusades by more than four centuries."

Turkey

Turkish genomic variation, along with several other Western Asian populations, looks most similar to genomic variation of South European populations such as southern Italians. Data from ancient DNA – covering the Paleolithic, the Neolithic, and the Bronze Age periods – showed that Western Asian genomes, including Turkish ones, have been greatly influenced by early agricultural populations in the area; later population movements, such as those of Turkic speakers, also contributed. The first and only (as of 2017) whole genome sequencing study in Turkey was done in 2014. Moreover, the genetic variation of various populations in Central Asia "has been poorly characterized"; Western Asian populations may also be "closely related to populations in the east". An earlier 2011 review had suggested that "small-scale, irregular punctuated migration events" caused changes in language and culture "among Anatolia's diverse autochthonous inhabitants," which explains Anatolian populations' profile today.

Magnet school

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Magnet_sc...