Tag Archives: identity

State’s Giving Feds Trolling Rights to DMV Facial Biometric Databases

Biometrics getting personal

Kaye Beach

June 17, 2013

The Washington Post published what is probably one of the most comprehensive and clear (major media) articles to date on the state departments of motor vehicles’ biometric databases and how they are increasingly being utilized to undermine the presumption of innocence and rob us of our right to be left alone.

State photo-ID databases become troves for police

“Facial-recognition systems are more pervasive and can be deployed remotely, without subjects knowing that their faces have been captured.   Today’s driver’s-license databases, which also include millions of images of people who get non-driver ID cards to open bank accounts or board airplanes, typically were made available for police searches with little public notice.”

The Washington Post reports;

“Thirty-seven states now use ­facial-recognition technology in their driver’s-license registries, a Washington Post review found. At least 26
of those allow state, local or federal law enforcement agencies to search — or request searches — of photo databases. . .”

The Washington Post also notes that;

“The current version of the Senate’s immigration bill would dramatically expand an electronic photo-verification system, probably relying on access to driver’s-license registries.”

The New York Times reported on this a few days ago;

WASHINGTON — Driver’s license photographs and biographic information of most Americans would be accessible through an expanded Department of Homeland Security nationwide computer network if the immigration legislation pending before the Senate becomes law.

. . . the Senate bill would direct the department to expand the photo program by offering grants to states if they allow the department to tap into their driver’s license photo records

Read more; Fears of National ID With Immigration Bill

The Constitutional Alliance first sounded  the alarm on April 17th;

“If you want to work, travel, buy, or sell you will be forced to be enrolled into this global system of identification.” 

Read more from the Constitutional Alliance; You are being enrolled into a global identity scheme which controls your ability to buy, sell, travel and now work !!!

Our government is working diligently to ‘connect the dots’  We need to do the same – please read the Washington Post’s article on the state’s biometric databases along with  the ones linked above.

Advertisements

Smartworld: Identity Profiling With Radio Frequency

Kaye Beach

September 6, 2012

Excellent, information and reference packed article!  More than you ever wanted to know about RFID.

Published Sept. 4, 2012

Julie Beal, Contributor
Activist Post

RFID, or radio frequency identification (also known as near field communication, or NFC) is used for wireless communication between devices, one of which is a transmitter and the other is a receiver. This involves the use of low frequency radio waves passing between the devices; it is in widespread use, although the impact on health is rarely alluded to. RFID is being used for a multitude of applications involving sensing and communication of information, especially ID verification using smart cards/phones, miniscule sensors known as smart dust, bodily implants, and product tracking.

There are already many well-established ID Management companies who are also using or advocating RFID and biometrics. These companies are heavily involved in the emerging global identity ecosystem (eg, the NSTIC program, the work of the ITU, and the European initiatives, including STORK), and include Accenture, IBM, Verisign/Symantec and Oracle. The industry has grown significantly and the trend looks set to continue – especially considering the heavy investment by leading corporations like Google, IBM, and Microsoft.

The smart card industry is playing a leading role in identity management, indicating that in the near future the public will expect to manage their digitised identity with extrinsic devices such as contactless cards and mobile phones.

In Denver, for instance, Auraria Higher Education Center recently decided to issue new contactless smart cards to students (over 43,000 of them), and to staff. The cards will control door access using RFID, and will even serve as Visa debit cards. The plan is to eventually integrate the cards with other applications for student services, including parking, meal payment, library checkout, event management, emergency incidents, and lab and recreational tracking.

Read more

Google Confirms It Aims to Own Your Online ID

Kaye Beach

Sept. 2, 2011

The right to anonymity

Anonymous communications have an important place in our political and social discourse.   I have nothing to hide and don’t communicate anonymously online yet still see the option to do so as absolutely vital.

Google+ is a big minus.

Anonymity–the ability to conceal one’s identity while communicating–enables the expression of political ideas, participation in the government process, membership in political associations, and the practice of religious belief without fear of government intimidation or public retaliation  http://epic.org/free_speech/watchtower.html

Article by  Bloomberg Businessweek 

Published August 29, 2011

Amid a furor over Google+’s ban on pseudonymity and anonymity, Google Chairman Eric Schmidt just admitted the company intends to be an ‘identity service”

Ever since Google (GOOG) launched its new Google+ social network, we and others have pointed out that the search giant clearly has more in mind than just providing a nice place for people to share photos of their pets. For one thing, Google needs to tap into the “social signals” that people provide through networks such as Facebook so it can improve its search results. There’s a larger motive, too: As Chairman and former Chief Executive Officer Eric Schmidt admitted during an interview in Edinburgh over the weekend, Google is taking a hard line on the real-name issue because it sees Google+ as an “identity service” or platform on which it can build other products.

Schmidt’s comments came during an interview with Andy Carvin, the National Public Radio digital editor who has become a one-man newswire during the Arab Spring revolutions. Carvin asked the Google chairman about the company’s reasoning for pushing its real-name policies on Google+—a policy that many have criticized (including us) because it excludes potentially valuable viewpoints that might be expressed by political dissidents and others who prefer to remain anonymous. In effect, Schmidt said Google isn’t interested in changing its policies to accommodate those kinds of users: If people want to remain anonymous, he said, then they shouldn’t use Google+.

Google+ is primarily an “identity service”

The Children’s Identification and Location Database

What is The Child Project™?

The Children’s Identification and Location Database (CHILD) Project is a secure nationwide network and registry that was created in conjunction with the Nation’s Missing Children Organization (NMCO) and National Center for Missing Adults (NCMA) – www.theyaremissed.org. The Child Project™ enables law enforcement and social service agencies throughout the country to locate and positively identify missing children and adults with iris biometric recognition technology. Through this network, The Child Project™ compares the unique features contained in the iris against a database of individuals who enroll throughout the country to determine the identity of an individual. Complementing fingerprinting identification and related programs now in place, The Child Project™ captures a digital photograph of the individual’s iris, along with basic demographic information. Unlike existing fingerprint identification programs, The Child Project™ has created and maintains a national registry to give social service agencies, law enforcement, and other authorized users of the system, access to data that can positively identify children in seconds.

http://www.thechildproject.org/faq.html

More Research from Channeling Reality

Oops! They said the “N” Word. ‘National’ ID

Document Link

National?  I beg to disagree since the NORTH AMERICAN Security Products Organization is the accreditation standards developer.  Unless we have assimilated Mexico and Canada into our nation, North American accreditation would be INTERNATIONAL.

From SecureID News;

June 16, 2010

ID standard verification meeting set

The American National Standards Institute (ANSI) has scheduled a meeting July 12 – 13 in Kansas City to discuss development of a national identity verification standard.

ANSI, along with its accredited standards-developer the North American Security Products Organization (NASPO), have been working on identity verification standards but this meeting is calling for participants to join in the process.

[. . .]The results of the meeting may lead to a national standard for identity verification, sets of rules and procedures for identity assurance and a standard that will enable relying partied to place a valuation of risk on to identities.

Read more

Who do they want to join them?

First and foremost, they call for interested parties who are willing to contribute financially.  They also claim to  seek input by these  interested parties but warn that their  rules of standard writing is done by “consensus process” and membership  is contingent upon the chairman and administrators “ability to manage”  the group.

I take this to mean that “if you are not likely to support the predetermined outcome, you will be nixed”

“Members should have a strong interest in the development of a national Identity Verification standard.  They must also be aware that there is international interest in this area”

The annual fee is 25,000 dollars for Sponsor’s

Members of NAPSO

NASPO Certified Companies

I think I can guess what “consensus” was reached but I will be watching to see what this meeting produced.


“Claims that the technology will be used to track people are inaccurate” Paul Sund

May 11, 2010 the Oklahoma House which previously passed HB 2569 by a wide margin (76-13 with 12 excused) failed to get enough votes to override the Governor’s Veto of the Radio Frequency ID bill.

Henry spokesman Paul Sund thanked the lawmakers for reviewing the legislation and sustaining the governor’s veto.

“It made no sense to prospectively ban technology that can provide future benefits,” Sund said. “Claims that the technology will be used to track people are inaccurate.”

Read more about the failed veto override vote on May 11, 2010 in this Tulsa World article

SIA CEO Richard Chace says in his letter to Gov. Henry;

“Unfortunately, this legislation reflects common misperceptions about RFID applications that are based upon twisted facts and emotions generated by ill-informed “privacy rights” advocates.”

And

“Governor, please be assured that safeguarding the privacy of personal information collected through government-issued identification documents is of paramount concern to our membership”. Read the letter

More; Oklahoma Law Makers Led Astry...

How long till the lies our trusted official told us becomes painfully apparent to Oklahomans?

The clock is ticking as the use of RFID for TRACKING purposes accelerate. How long until the people in this state are mandated to carry the devious devices?  Anyone want to place their bets?

Japanese company NEC wowed technophiles and horrified privacy advocates earlier this year with electronic billboards that use facial recognition technology to identify the age and gender of passers-by, tailoring the ads they display to fit the demographic. Now IBM researchers in the UK are taking that notion even further, taking advantage of new technologies to delve deeper into the personal data of people on the street, tailoring advertisements that can even call the subject by name.

The billboards they are developing rely on the RFID chips that are increasingly being built into credit cards and cell phones as a means of storing data that is accessible by contact-free sensors (like the “touch pay” feature on some credit and debit cards that doesn’t require the user to swipe). A sensor on the billboard picks up on that RFID signal as the cardholder passes by, tapping information like name, age, gender, shopping habits, and personal preferences.

read more

“Fascism should more appropriately be called Corporatism because it is a merger of State and corporate power.”

Benito Mussolini

 

Maryland Gov. Bets that His Citizens Will Make Great Pets!

Kaye Beach

Aug. 7, 2010

Maybe “pets” is the wrong word.

Since most citizens will be permitted to roam freely (within certain, specified limits) aside from the occasional interruptions required by their minders to relieve them of a quantity of useful product, I guess “herd” or “livestock” might be a more accurate way of characterizing how Mr. O’Malley views the taxpayers that he plans to tend.

Editorial

With great fanfare, Gov. Martin O’Malley on Wednesday announced his use of your tax dollars to track every move made by Maryland motorists. The Democratic chief executive will spend $2 million in federal grants to double the number of roadside and mobile spy cameras, with the data centrally collected at a “fusion center” accessible to government bureaucrats.

Like speed cameras and red-light cameras, Mr. O’Malley‘s license-plate recognition cameras photograph the plates of passing motorists. Within a matter of seconds, a computer system looks up the vehicle owner’s identity and cross-references it against a “wanted” list after recording the time, date and GPS coordinates of the vehicle. All of this information will be stored at the Maryland Coordination and Analysis Center located in Woodlawn, just outside Baltimore. Mr. O’Malley‘s plan is unique insofar as it allows tracking of persons of interest using cameras located in dozens of local jurisdictions. “We believe it’s the first,” Maryland State Police spokesman Gregory M. Shipley told The Washington Times. “It’s certainly one of the first to network police [agencies] together like this.”

http://www.washingtontimes.com/news/2010/aug/6/omalleys-spy-cameras/

If you have somehow managed to miss this video,  I highly recommend it.

The Battle at Kruger

Congress Wants Legislation to Obtain Prepaid Cell Phone Users’ Identities

Congress wants to remove the possibility of anyone having an anonymous cell phone because some people do or might use it for illegal acts.

Based on this logic, most anything could be be justified!

Guns come to mind and of course the innocent glass bud vase which some people apparently use smoke crack.

I am now terrified to buy little glass vases for my posies for fear I will be pegged as a crack head on a fusion center  SARS report.

June 4, 2010, By Karen Wilkinson, Staff Writer

Since prepaid cell phones don’t require a contract, credit check or identification to purchase them, they are one of the last remaining anonymous communication tools.

Used by the poor, reporters, their sources, whistleblowers, abused spouses and anyone needing an untraceable phone number, they’ve also become the device du jour of drug dealers and terrorists who want to avoid the eyes and ears of law enforcement. While such phones pose problems for police agencies — they can’t be wiretapped as can traditional cell phones and land lines — their purposes are far-reaching.

But this safety net or criminal-enabling device — depending on one’s perspective — may be eliminated if a newly introduced Senate bill passes. A bipartisan pair of Senate leaders recently introduced legislation that would require prepaid cell phone purchasers to present identification and cell phone companies to keep that information on file for 18 months after the phone’s deactivation.

“Although there are many legitimate users of prepaid cell phones, they have also become the communication device of choice for terrorists, drug lords and gang members interested in masking their identities,” stated a press release from Sen. Charles E. Schumer, D-N.Y. “Since they can be purchased and activated without signing a contract or undergoing a credit check, prepaid cell phones provide virtual anonymity.”

Read More;

Papers Please! gives this analysis

Wanna buy a prepaid SIM card? “Papers, please!”

S. 3427, a bill introduced in the Senate this week by Senators Charles E. Schumer (D-NY) and John Cornyn (R-TX),  would require would require ID “verification” as a prerequite to buying a prepaid cell phone or SIM card.

The seller or reseller of the phone or SIM card would be required to collect your personal information (including name, address, date of birth, and for online sales your Social Security number) and all unique identifiers of the phone or SIM card including the including the EMEI or other serial number and the assigned phone number.

For in-person sales, you would have to show government-issued ID credentials in a form to be determined later by the Attorney General.  For online or other non-face-to-face sales, you would also have to provide “Any other personal identifying information that the Attorney General finds, by regulation, to be necessary for purposes of this section.”

The bill would place no limits on the amount or intrusiveness of the information the Attorney General could demand, as long as it is spelled out in regulations.  And there’s nothing in the bill to stop the AG from making the verification requirements so onerous as to amount to a de facto ban on online or mail order sales of prepaid SIM card or cell phones

Read more;

Unisys Predicts 2010 Yields a Biometrics Boom

Dec 8, 2009

Advances in surveillance systems and continued Trojan attacks also on the horizon

BLUE BELL, Pa. – Slashed budgets and reduced staffing numbers delayed many security initiatives in 2009, but the vulnerabilities didn’t retreat and will only intensify in 2010, Unisys security experts predict.

Looking ahead to 2010, Unisys predicts that government and commercial organizations will take a more proactive approach to security, implementing new measures to verify identity and protect confidential information. Financial institutions and defense agencies will lead the charge, with ports and other organizations quickly following.

“Given the potential harm that can result from new and more dangerous forms of attacks, both physical and virtual, organizations can no longer afford to wait until they are attacked to defend themselves,” said Sid Pearl, global director, Risk Intelligence Solutions Management, Unisys. “They will begin to more closely monitor behaviors and identities in an effort to predict and prevent attacks before they happen.”

Unisys believes the following seven security trends will emerge in 2010 as business and government agencies look to protect data and strengthen identification methods:

1. The consumerization challenge – Consumerization of IT will continue to blur the perimeters of the enterprise network. As a result, Unisys experts predict organizations’ focus will shift to data protection as opposed to traditional network security or infrastructure security. As more employees and consumers use smartphones and PDAs to conduct business transactions online, organizations will look for new ways to protect data beyond simple PINs and passwords. As consumer devices are increasingly targeted by malware and spyware, users will demand that security platforms and anti-fraud applications need to be strengthened and continually updated to ensure the protection of mobile online transactions.

2. A good offense – Trojan attacks will continue to plague financial institutions and government agencies. Therefore, these organizations will need to take an offensive stance to better guard their data against increasingly sophisticated and harmful threats. Unisys experts predict that banks and government agencies will adopt a more comprehensive, integrated view of their IT environments and will seek to better understand the human element behind illegal activities to help them pinpoint in advance when and where and how attacks are likely to happen.

3. Proactive ports – Port security officials will take a more predictive, proactive approach to preventing threats at key ports of entry. Rather than focusing on mere compliance with security standards, Unisys security experts predict that ports will actively begin assessing risks, simulating response efforts and creating more robust disaster recovery plans in the coming year. In addition, Unisys predicts an increase in U.S. land-based port cargo activity as Asian shipping lanes divert shipments from the congested sea ports of Los Angeles and Long Beach, Calif., to Canadian and Mexican ports. Pressure will increase to rapidly scan cargo shipments as they cross land borders into the U.S.

4. Cloudy forecast – Organizations will also begin to reverse the tendency of “protecting everything” and instead prioritize security controls based on whether the data in question presents low, moderate or high levels of risk. Consequently, more organizations will begin moving less sensitive public data into cloud computing environments to attain cost savings in 2010, and will then migrate more sensitive data to the cloud as new security models are developed to address multi-tier data protection.

5. Biometrics on the border – The coming year will see a tipping point in use of biometric identification tools such as iris, facial or fingerprint scans, to verify identity at the border and customs areas in airports. Unisys experts point out that many governments have invested in an electronic passport infrastructure, but not yet used it. Unisys expects increased rollout of electronic passports which contain a chip to store biometric data that can be matched to its owner to verify that the person carrying the passport is the owner of the passport. Unisys predicts that the rollout electronic passports will be led by countries in the Asia-Pacific region and Europe. The Unisys Security Index recently found a majority of people globally would accept biometric authentication to verify their identities.

6. Taking IT to the streets – Mobile biometric devices will allow governments to take more biometric-based critical services directly to their citizens, rather than requiring their citizens to come to the technology. Police forces in the U.S. and U.K. have already started using mobile fingerprint scanners to facilitate faster processing. In Australia, police officers can use the device to access the national fingerprint database from the field to scan the criminal database for a match. Such devices will also aid in the identification of individuals in a disaster situation.

7. Smart surveillance – Surveillance systems will be become more sophisticated and intelligent. Unisys experts say that real time event detection technology will soon be able to identify a security breach as it occurs and initiate an action instead of simply recording footage to be reviewed after the incident. Improved digital camera technology coupled with intelligent software enables surveillance footage to be combined with other available information, such as facial recognition data, to create alerts so that immediate appropriate action can be taken. Surveillance software will also soon be able to recognize recurring patterns, or individuals to detect when an unusual event is occurring in real-time.

About Unisys
Unisys is a worldwide information technology company. We provide a portfolio of IT services, software, and technology that solves critical problems for clients. We specialize in helping clients secure their operations, increase the efficiency and utilization of their data centers, enhance support to their end users and constituents, and modernize their enterprise applications. To provide these services and solutions, we bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With more than 26,000 employees, Unisys serves commercial organizations and government agencies throughout the world. For more information, visit http://www.unisys.com.

Contacts
Unisys
Brad Bass, 703-439-5887
brad.bass@unisys.com
or
Weber Shandwick for Unisys
Mary McCeney, 212-445-8160
mmcceney@webershandwick.com

http://findbiometrics.com/industry-news/i/7588/

Driver’s License Image Sharing

Technology Summary: When driver’s license images and information are shared between police jurisdictions, law enforcement officers may have a much better chance of apprehending suspects during routine operations. Several government initiatives have focused on building the technology to share this important information.

NISP: Nlets Interstate Sharing of Photos

Summary
Nlets received initial support from the U.S. Department of Justice and Department of Homeland Security to demonstrate the viability of exchanging interstate driver license photos among law enforcement and safety officials using Nlets. The project involves a pilot with NC, VA, and SC. The results will be used to expand DL photo exchange nationwide. The original grant was supplemented by the NISP II and III grants from NIJ.

In the spring of 2007, Nlets successfully conducted a live demonstration with these three states at an IACP meeting. These states are working with Nlets to move the results of the pilot into production. The project is also addressing policy issues, such as privacy and archiving of photos.

The 2008 goals of the new grants are to increase the number of states exchanging photos to ten: six new states will be added by late summer, with at least four to be added in the first quarter of 2009. In partnership with ARJIS, we will combine funds and expand our purchasing power in order to expand photo exchange capabilities.

http://www.nlets.org/grants.aspx

About NLETS

About Nlets

Nlets is a 501(c)(3) not-for-profit organization

Nlets provides two basic capabilities to its users. First, it is an international, computer-based message switching system that links together state, local, and federal law enforcement and justice agencies for the purpose of information exchange. Second, it provides information services support for a growing number of justice related applications.

http://www.nlets.org/whoWeAre.aspx