Oct 9, 2011
This is just the tip of the iceberg….
By Aliya Sternstein 10/07/2011
The FBI by mid-January will activate a nationwide facial recognition service in select states that will allow local police to identify unknown subjects in photos, bureau officials told Nextgov.
The federal government is embarking on a multiyear, $1 billion dollar overhaul of the FBI’s existing fingerprint database to more quickly and accurately identify suspects, partly through applying other biometric markers, such as iris scans and voice recordings.
Often law enforcement authorities will “have a photo of a person and for whatever reason they just don’t know who it is [but they know] this is clearly the missing link to our case,” said Nick Megna, a unit chief at the FBI’s criminal justice information services division. The new facial recognition service can help provide that missing link by retrieving a list of mug shots ranked in order of similarity to the features of the subject in the photo.
Looking Back-A Refresher
A compulsory global biometric identification system for law abiding people is not, will never be justifiable.
Our government seems to have backed off on their denials that Real ID and similar legislation is in fact, a national ID. But what you should know is that any national ID system is also international. It’s all about sharing these days and that means with our “international Partners’ too
The following is just a mere sampling of news articles, government documents and sources of information that clearly show the absolute intention to use our state driver’s licenses and the biometric data collected for them, as a an instrument of global identification, tracking and control.
Viisage receives $12 million award from Oklahoma
FEBRUARY 19, 2003–Viisage Technology Inc. (Littleton, MA; http://www.viisage.com) has been chosen to fulfill the new digital driver’s license contract by the state of Oklahoma’s Department of Public Safety. The contract will include the design, development, and implementation of the statewide secure license production program. The total value of this new multiyear contract is approximately $12 million. Oklahoma is the 19th state to utilize Viisage in the production of identity verification documents and the third state in recent months to give Viisage a major driver’s license contract. The three latest contracts total approximately $35 million. The solution will integrate multiple, advanced identification security features, including FaceEXPLORER facial-recognition software and SAGEM Morpho finger imaging technology
Oklahoma has collected Face, Fingerprint scans and signature biometrics since 2004
Biometric Drivers Licenses Make Debut in Oklahoma
April 20, 2004
SAGEM Morpho, Inc. a proven provider of mission-critical biometric systems and services, announced the successful deployment of biometric technology solutions for the Oklahoma Department Public Safety (DPS) in conjunction with Viisage, a provider of advanced technology identity solutions. SAGEM Morpho will combine its finger imaging recognition technology with Viisage’s facial recognition technology to create accurate biometric records of the state’s approximately four million licensed drivers. http://www.tmcnet.com/usubmit/2004/apr/1033349.htm
NLETS the International Justice and Public Safety Information Sharing Network, links together every state, local, and federal and International law enforcement (INTERPOL), justice and public safety agency for the purpose of exchanging critical information http://www.nlets.org
The NLETS Candle Project In a related NIJ-funded project, NLETS is working with the American Association of Motor Vehicle Administrators (AAMVA) to standardize critical information from departments of motor vehicles (DMVs) around the country.
The project, entitled Collaboration between AAMVA and NLETS for Driver’s License Exchange (Candle), seeks to develop and deploy standards and solutions to exchange standardized driver and motor vehicle records over the NLETS network.
Candle builds upon the existing NLETS infrastructure, as well as the Web services advancements made in the Aisle project, and seeks to deploy an international capability for driver and motor vehicle exchanges based upon XML standards, greatly increasing the efficiency. . .
The Candle project provides a first step in transitioning AAMVA to a new generation of technology. This effort will result in consolidating interstate DMV transactions into a single standardized service for both the DMV and law enforcement communities.
From The Police Chief, vol. 71, no. 6, June 2004.
Copyright held by the International Association of Chiefs of Police,
515 North Washington Street, Alexandria, VA 22314 USA.
‘AAMVA was directly involved in the crafting of the Real ID Act 2005. In the DHS-published final rules document for the Real ID Act, the AAMVA was referred to as its “hub” and “backbone.”’ UPDATE: Real ID
SB 474-Oklahoma prohibited participation in the REAL ID in 2007. (So far, 25 states either by law or resolution have done the same) Although Oklahoma lags behind other states in full implementation of Real ID, there is no reason to believe Oklahoma will not eventually come into full compliance with the act.
FBI Seeks to Build Massive Identification System
The Federal Bureau of Investigation awarded a $1B, 10-year contract to design, develop, document, integrate, test, and deploy the Next Generation Identification (NGI) System to Lockheed Martin. This new database will expand on the current fingerprint-based system; the FBI will increase its collection and storage not only fingerprints but also iris scans, palm prints and facial images.
The FBI is also in talks with the U.K. police to establish a unified database for the tracking of this biometric information.
The UK has said that the new NGI System could easily be integrated with the U.K.’s current Ident1 database
2007 News article;
–The Homeland Security Department’s plans for sharing biometric information internationally — designed to counter the threat of terrorism — face resistance from domestic privacy advocates and European governments that follow stricter privacy laws that protect personal data.
Robert Mocny, acting program manager for the U.S. Visitor and Immigrant Status Indicator Technology program, sketched the outline of a Global Security Envelope of internationally shared biometric data that would permanently link individuals with their personal data held by governments and corporations.
“information sharing is appropriate around the world,” and DHS plans to create a “Global Security Envelope of internationally shared biometric data that would permanently link individuals with biometric ID, personal information held by governments and corporations”—
Read more… http://www.gcn.com/print/26_03/43061-1.html
2007 The National Information Sharing Initiative ;
The Bush Administration’s 2007 National Information Sharing Strategy established state and local fusion centers as the federal government’s primary mechanism for collecting and disseminating domestic intelligence.
The federal government has fueled the growth of these state and local intelligence centers, and has organized them into a national network that feeds information gathered at the local level into the Director of National Intelligence’s Information Sharing Environment (ISE), where it becomes accessible to all participating law enforcement agencies as well as the larger intelligence community. Link
The Biometric Interoperability Program promotes biometric-based information sharing between the Federal Bureau of Investigation’s (FBI) Integrated Automated Fingerprint Identification System (IAFIS) and other federal and international biometric systems.
2008 -Fusion Centers Tap Into Personal Databases
Many fusion centers have not shared with the public what databases they use. This was demonstrated in an April 2, 2008 article in The Washington Post titled “Centers Tap into Personal Databases.” It revealed that several fusion centers in the northeast have access to millions of people’s information including unlisted cell phone numbers, insurance claims, driver’s license photographs
–Rebecca Andino, PMP, CIPP/G, president and founder of Highlight Technologies
Ann Cavoukian, Ph.D. (Information and Privacy Commissioner for Ontario) and Alex Stoianov, Ph.D. point out that in the not too distant future a person’s unique biometric template could be used as an identifying key to link together all the different databases that contain entries for that person. It would enable someone to build up a complete picture of that individual without their knowledge or consent.
“When the use of biometrics grows, an ordinary person will be enrolled in various biometrically controlled databases, such as travel documents, driver licenses, health care, access control, banking, shopping, etc. Current biometric systems can use the same biometric template for all of them. The template becomes the ultimate unique identifier of the person. This is where biometric data mining comes into effect: the different databases, even if some of them are anonymous, may be linked together to create comprehensive personal profiles for all the users. To do this, no fresh biometric sample is even required. The linking of the databases can be done offline using template-to-template matching, in a very efficient one-to-many mode. The privacy implications explode at this point.”
DHS Human Factors Division: Social-Behavioral Threat Analysis
To apply the social, behavioral and physical sciences to improve identification, analysis, and understanding of the threats posed by individuals, groups, and radical movements; to support community preparedness, response, and recovery to catastrophic events; and to advance national security by integrating the human element into homeland security science & technology. http://www.scribd.com/doc/27037194/Behave-Fast-Tsadhs
MONITORING EVERYDAY BEHAVIOR
In April 2008, the Wall Street Journal and the Los Angeles Times both reported on a new Los Angeles Police Department order that compels LAPD officers to begin reporting “suspicious behaviors” in addition to their other duties—creating a stream of “intelligence” about a host of everyday activities that, according to documents, will be fed to the local fusion center.
LAPD Special Order #11, dated March 5, 2008, states that it is the policy of the LAPD to “gather, record, and analyze information of a criminal or non-criminal nature, that could indicate activity or intentions related to either foreign or domestic terrorism,” and includes a list of 65 behaviors LAPD officers “shall” report. The list includes such innocuous, clearly subjective, and First Amendment protected activities as:
– taking measurements
– using binoculars
– taking pictures or video footage “with no apparent esthetic value”
– abandoning vehicle
– drawing diagrams
– taking notes
– espousing extremist views
LAPD’s Program is now the Nationwide SAR Initiative (NSI)
Nationwide SAR Initiative Vision: By 2014, every Federal, State, local, tribal and law enforcement entity operating domestically will participate in a standardized integrated approach to gather, document, process, analyze, and share terrorism-related suspicious activity
28 C.F.R. part 23
28 CRF Part 23 is a US Federal Code that basically says you cannot be entered into a criminal data system unless you are a legitimate suspect. Not so anymore.
The April 2003 GIWG meeting minutes record approval for the weakening of 28 CFR 23 and note that GIWG member Daniel J. Oates indicated he was excited about the proposed changes to 28 CFR Part 23, specifically the area dealing with changing the reasonable suspicion collection criteria to reasonable indication. If the rule is passed, officers on the street can gather small bits of information that can be entered into an intelligence database. Under the old standard, this could not be done. Read more
28 C.F.R. Part 23 was promulgated pursuant to 42 U.S.C. §3789(g)(c) which requires state and local law enforcement agencies receiving federal funding to
“…collect, maintain, and disseminate criminal intelligence information in conformance with policy standards which are prescribed by the Office of Justice Programs and which are written to assure that the funding and operation of these systems further the purpose of this chapter and to assure that some systems are not utilized in violation of the privacy and constitutional rights of individuals.
Why did we need 28 CFR 23?dep
The Department of Justice Office of Justice Programs (OJP) in 1993 explained;
“Because criminal intelligence information is both conjectural and subjective in nature, may be widely disseminated through the interagency exchange of information and cannot be accessed by criminal suspects to verify that the information is accurate and complete, the protections and limitations set forth in the regulation are necessary to protect the privacy interests of the subjects and potential suspects of a criminal intelligence system.”
They have decided that now-we are no longer due these legal protections.
It actually took them until 2008 before the desired weakening of federal code was officially achieved
In July 2008, the Department of Justice proposed a rule to amend the primary federal regulation governing criminal intelligence databases (28 CFR Part 23) to expand both what information can be collected by law enforcement agencies, and with whom it may be shared. (see 73 Fed. Reg. 44673) read more
. . .the Department of Justice has relaxed restrictions on when the Federal Bureau of Investigation can begin investigations, and worked to increase intelligence-sharing among local, state, and federal law enforcement agencies as well as with federal (intelligence) agencies in ways that will compromise civil liberties (through a change in federal regulation 28 C.F.R. part 23).
Read more FBI Guidelines 28 C.F.R. part 23
Comments on proposed amendments to 28 Code of Federal
Regulations Part 23 –
. . .intelligence fusion centers universally claimed compliance with 28 CFR Part 23 as the appropriate regulation governing the conduct of their intelligence collection efforts.
The Congressional Research Service reported that “many state and local law enforcement and fusion center staff” expressed concerns regarding sharing law enforcement sensitive information with non-law enforcement personnel including analysts working under contract to the Department of Homeland Security.10
In January 2008 the Director of National Intelligence (DNI) published “functional standards” for suspicious activity reports (SAR) produced by state and local law enforcement.
The DNI standards actually encourage state and local law enforcement to report non-criminal suspicious activities to the intelligence community by defining the scope of suspicious activity as “observed behavior that may be indicative of intelligence gathering or pre-operational planning related to terrorism, criminal, or other illicit intention.”
The OIFC may retain information that is based on mere suspicion, such as tips and leads. Suspicious Activity Reports (SAR) information will be retained in the future once the SAR project is finalized and guidelines are issued to Fusion Centers. http://www.scribd.com/doc/24732421/Oklahoma-Information-Fusion-center-Privacy-Policy
**Please Note-This is NOT a genuine OIFC Notice. If the OIFC files a suspicious activity report on you-You would never know it.
Nationwide Suspicious Activity Reporting Initiative IJIS (Fusion Centers)
SAR and Amtrak
Oct. 20, 2008
International Police Organization Proposes Worldwide Facial Recognition System.
An Interpol face-recognition database would permit Interpol member nations to search records containing travelers’ personal biometric information, and could be used in conjunction with travel watch lists.
“There will be such a large role in the future for fingerprints and facial recognition”
— Mark Branchflower, head of Interpol’s fingerprint unit
BIOMETRICS TASK FORCE
Across All Government Biometric Information Coordination
Collaboration Data Sharing Biometrics Mission Sets Population Census Targeting / Tracking Base & Checkpoint Security Police, Military, & Govt. Official Vetting Border Control / Ports of Entry (POEs) Detainee Operations
Homeland Security Presidential Directive 24, signed in 2008 and revalidated in 2009 by the current administration, mandates that interoperability with respect to biometrics spans the military, civil, and criminal arenas.
October 12, 2009
RALEIGH, N.C. — In its search for fugitives, the FBI has begun using facial-recognition technology on millions of motorists, comparing driver’s license photos with pictures of convicts in a high-tech analysis of chin widths and nose sizes.
The project in North Carolina has already helped nab at least one suspect. Agents are eager to look for more criminals and possibly to expand the effort nationwide. But privacy advocates worry that the method allows authorities to track people who have done nothing wrong.
October 13, 2009
According to the AP’s report, the FBI has assembled a panel of experts tasked with standardizing drivers license photos and push use of biometric-mining nationwide. But the value of mining DMV records with the biometric software is limited for one simple reason, expressed perfectly by Marc Rotenberg of the Electronic Privacy Information Center. “We don’t have good photos of terrorists,” he explains.
“Most of the facial-recognition systems today are built on state DMV records because that’s where the good photos are”
Fusion Centers “fuse” information shared between Military and Civilian forces, Public and Private Institutions, State Federal and International Governments.
September 15, 2009
WASHINGTON – The Department of Homeland Security (DHS) announced Monday that it was giving state and local fusion centers access to the classified military intelligence in Department of Defense (DOD) databases. The federal government has facilitated the growth of a network of fusion centers since 9/11 to expand information collection and sharing practices among law enforcement agencies, the private sector and the intelligence community.
2009 Biometric Consortium Conference
Biometric Enabled Intelligence has been a powerful tool in the law enforcement community, linking individuals to events, evidence and ultimately to solved crimes. That same concept can make biometrics a so what enabler of military operations, physical security, logical security, and forensic analysis by linking people, places, activities and events.
As we learn to link biometrics to biographic, geospatial, social networks and other forms of data, we can develop patterns of activities for both individuals and organizations
Mrs. Del Greco initiated two high profile, multi-million dollar development efforts: “Next Generation Identification” (NGI), which will expand biometric and criminal history capabilities; and “Biometric Interoperability”, which will ensure information sharing between the FBI’s Integrated Automated Fingerprint Identification System (IAFIS) and other key biometric-based systems within the Federal Government and international partners
Tag! You’re It!
“Face recognition already exists through photo IDs, which can be used of individuals that are not enrolled”
Stripping Away Anonymity-The Secretary of Defense Funding Doc
“Biometrics technologies can be used to both verify an individual’s claimed identity and, when combined with additional intelligence and/or forensic information, biometrics technologies can establish an unknown individual’s identity, thus stripping away his anonymity. “
“This program will develop the technology that will improve the quality of biometrics derived information provided to the operational forces for the purpose of identifying and classifying anonymous individuals. It will enable execution of a DoD and interagency coordinated biometrics science and technology plan that supports technology transition to acquisition programs in FY10 and the out-years.”
See the document; www.dtic.mil/descriptivesum/Y2010/OSD/0603665D8Z.pdf
Biometrics Identity Management Agency (BIMA)
Warfighter, Business, Intelligence, and Security & Law Enforcement
The Department of the Army General Order (DAGO) 2010-06, signed by the Secretary of the Army (SecArmy), redesignated BTF (biometrics task force) as the Biometrics Identity Management Agency (BIMA) on 23 March 2010.
Sept 1, 2010
Get REAL . . .
But open rebellion against REAL ID, which was so heated two or three years ago, has calmed considerably. States are no longer lining up to add themselves to the list of those refusing to fund of implement the federal law’s requirements.
Instead, many state motor vehicle departments are quietly doing the work to meet the law’s initial 18 benchmarks. According to DHS, all but the 14 holdout states say they’ll be able to meet the law’s operational requirements by the end of this year.
June 22, 2011
Making REAL ID a Reality: Next Steps for Congress
At least 32 states are close to REAL ID material compliance, while a total of 44 states and territories have indicated that they fully intend to meet REAL ID compliance
Starting Monday, Alabama residents will be able to obtain a new, more secure form of identification.In compliance with REAL ID Act of 2005, the Alabama Department of Public Safety has developed a driver’s license and identification program called STAR I.D. Congress passed the REAL ID Act in response to acts of terrorism against the United States.
Connecticut launched a campaign today to publicize how to obtain a drivers license that meets the stricter verification standards of a federal “Real ID” law passed in 2005, but never implemented in face of objections from two dozen states
And Many. Many more!