TDCAA    TDCAA Community  Hop To Forum Categories  Criminal    FBI Database
Go
New
Find
Notify
Tools
Reply
  
FBI Database Login/Join 
Member
posted
FBI Prepares Vast Database Of Biometrics
$1 Billion Project to Include Images of Irises and Faces

By Ellen Nakashima
Washington Post Staff Writer
Saturday, December 22, 2007; A01



CLARKSBURG, W. Va. -- The FBI is embarking on a $1 billion effort to build the world's largest computer database of peoples' physical characteristics, a project that would give the government unprecedented abilities to identify individuals in the United States and abroad.

Digital images of faces, fingerprints and palm patterns are already flowing into FBI systems in a climate-controlled, secure basement here. Next month, the FBI intends to award a 10-year contract that would significantly expand the amount and kinds of biometric information it receives. And in the coming years, law enforcement authorities around the world will be able to rely on iris patterns, face-shape data, scars and perhaps even the unique ways people walk and talk, to solve crimes and identify criminals and terrorists. The FBI will also retain, upon request by employers, the fingerprints of employees who have undergone criminal background checks so the employers can be notified if employees have brushes with the law.

"Bigger. Faster. Better. That's the bottom line," said Thomas E. Bush III, assistant director of the FBI's Criminal Justice Information Services Division, which operates the database from its headquarters in the Appalachian foothills.

The increasing use of biometrics for identification is raising questions about the ability of Americans to avoid unwanted scrutiny. It is drawing criticism from those who worry that people's bodies will become de facto national identification cards. Critics say that such government initiatives should not proceed without proof that the technology really can pick a criminal out of a crowd.

The use of biometric data is increasing throughout the government. For the past two years, the Defense Department has been storing in a database images of fingerprints, irises and faces of more than 1.5 million Iraqi and Afghan detainees, Iraqi citizens and foreigners who need access to U.S. military bases. The Pentagon also collects DNA samples from some Iraqi detainees, which are stored separately.

The Department of Homeland Security has been using iris scans at some airports to verify the identity of travelers who have passed background checks and who want to move through lines quickly. The department is also looking to apply iris- and face-recognition techniques to other programs. The DHS already has a database of millions of sets of fingerprints, which includes records collected from U.S. and foreign travelers stopped at borders for criminal violations, from U.S. citizens adopting children overseas, and from visa applicants abroad. There could be multiple records of one person's prints.

"It's going to be an essential component of tracking," said Barry Steinhardt, director of the Technology and Liberty Project of the American Civil Liberties Union. "It's enabling the Always On Surveillance Society."

If successful, the system planned by the FBI, called Next Generation Identification, will collect a wide variety of biometric information in one place for identification and forensic purposes.

In an underground facility the size of two football fields, a request reaches an FBI server every second from somewhere in the United States or Canada, comparing a set of digital fingerprints against the FBI's database of 55 million sets of electronic fingerprints. A possible match is made -- or ruled out--as many as 100,000 times a day.

Soon, the server at CJIS headquarters will also compare palm prints and, eventually, iris images and face-shape data such as the shape of an earlobe. If all goes as planned, a police officer making a traffic stop or a border agent at an airport could run a 10-fingerprint check on a suspect and within seconds know if the person is on a database of the most wanted criminals and terrorists. An analyst could take palm prints lifted from a crime scene and run them against the expanded database. Intelligence agents could exchange biometric information worldwide.

More than 55 percent of the search requests now are made for background checks on civilians in sensitive positions in the federal government, and jobs that involve children and the elderly, Bush said. Currently those prints are destroyed or returned when the checks are completed. But the FBI is planning a "rap-back" service, under which employers could ask the FBI to keep employees' fingerprints in the database, subject to state privacy laws, so that if that employees are ever arrested or charged with a crime, the employers would be notified.

Advocates say bringing together information from a wide variety of sources and making it available to multiple agencies increases the chances to catch criminals. The Pentagon has already matched several Iraqi suspects against the FBI's criminal fingerprint database. The FBI intends to make both criminal and civilian data available to authorized users, officials said. There are 900,000 federal, state and local law enforcement officers who can query the fingerprint database today, they said.

The FBI's biometric database, which includes criminal history records, communicates with the Terrorist Screening Center's database of suspects and the National Crime Information Center database, which is the FBI's master criminal database of felons, fugitives and terrorism suspects.

The FBI is building its system according to standards shared by Britain, Canada, Australia and New Zealand.

At the West Virginia University Center for Identification Technology Research (CITeR), 45 minutes north of the FBI's biometric facility in Clarksburg, researchers are working on capturing images of people's irises at distances of up to 15 feet, and of faces from as far away as 200 yards. Soon, those researchers will do biometric research for the FBI.

Covert iris- and face-image capture is several years away, but it is of great interest to government agencies.

Think of a Navy ship approaching a foreign vessel, said Bojan Cukic, CITeR's co-director. "It would help to know before you go on board whether the people on that ship that you can image from a distance, whether they are foreign warfighters, and run them against a database of known or suspected terrorists," he said.

Skeptics say that such projects are proceeding before there is evidence that they reliably match suspects against a huge database.

In the world's first large-scale, scientific study on how well face recognition works in a crowd, the German government this year found that the technology, while promising, was not yet effective enough to allow its use by police. The study was conducted from October 2006 through January at a train station in Mainz, Germany, which draws 23,000 passengers daily. The study found that the technology was able to match travelers' faces against a database of volunteers more than 60 percent of the time during the day, when the lighting was best. But the rate fell to 10 to 20 percent at night.

To achieve those rates, the German police agency said it would tolerate a false positive rate of 0.1 percent, or the erroneous identification of 23 people a day. In real life, those 23 people would be subjected to further screening measures, the report said.

Accuracy improves as techniques are combined, said Kimberly Del Greco, the FBI's biometric services section chief. The Next Generation database is intended to "fuse" fingerprint, face, iris and palm matching capabilities by 2013, she said.

To safeguard privacy, audit trails are kept on everyone who has access to a record in the fingerprint database, Del Greco said. People may request copies of their records, and the FBI audits all agencies that have access to the database every three years, she said.

"We have very stringent laws that control who can go in there and to secure the data," Bush said.

Marc Rotenberg, executive director of the Electronic Privacy Information Center, said the ability to share data across systems is problematic. "You're giving the federal government access to an extraordinary amount of information linked to biometric identifiers that is becoming increasingly inaccurate," he said.

In 2004, the Electronic Privacy Information Center objected to the FBI's exemption of the National Crime Information Center database from the Privacy Act requirement that records be accurate. The group noted that the Bureau of Justice Statistics in 2001 found that information in the system was "not fully reliable" and that files "may be incomplete or inaccurate." FBI officials justified that exemption by claiming that in law enforcement data collection, "it is impossible to determine in advance what information is accurate, relevant, timely and complete."

Privacy advocates worry about the ability of people to correct false information. "Unlike say, a credit card number, biometric data is forever," said Paul Saffo, a Silicon Valley technology forecaster. He said he feared that the FBI, whose computer technology record has been marred by expensive failures, could not guarantee the data's security. "If someone steals and spoofs your iris image, you can't just get a new eyeball," Saffo said.

In the future, said CITeR director Lawrence A. Hornak, devices will be able to "recognize us and adapt to us."

"The long-term goal," Hornak said, is "ubiquitous use" of biometrics. A traveler may walk down an airport corridor and allow his face and iris images to be captured without ever stepping up to a kiosk and looking into a camera, he said.

"That's the key," he said. "You've chosen it. You have chosen to say, 'Yeah, I want this place to recognize me.' "
 
Posts: 234 | Location: Texas | Registered: October 12, 2006Reply With QuoteReport This Post
Member
posted Hide Post
I purposefully posted these articles in the order that I did. I am sure that many people are in favor of such a database, but maybe after reading the article below, some people might think twice about whether or not it is such a good thing.

Hoover Planned Mass Jailing in 1950

By TIM WEINER, NY Times
Dec. 23, 2007


A newly declassified document shows that J. Edgar Hoover, the longtime director of the Federal Bureau of Investigation, had a plan to suspend habeas corpus and imprison some 12,000 Americans he suspected of disloyalty.

Hoover sent his plan to the White House on July 7, 1950, 12 days after the Korean War began. It envisioned putting suspect Americans in military prisons.

Hoover wanted President Harry S. Truman to proclaim the mass arrests necessary to "protect the country against treason, espionage and sabotage." The F.B.I would "apprehend all individuals potentially dangerous" to national security, Hoover's proposal said. The arrests would be carried out under "a master warrant attached to a list of names" provided by the bureau.

The names were part of an index that Hoover had been compiling for years. "The index now contains approximately twelve thousand individuals, of which approximately ninety-seven per cent are citizens of the United States," he wrote.

"In order to make effective these apprehensions, the proclamation suspends the Writ of Habeas Corpus," it said.

Habeas corpus, the right to seek relief from illegal detention, has been a fundamental principle of law for seven centuries. The Bush administration's decision to hold suspects for years at Guantanamo Bay, Cuba, has made habeas corpus a contentious issue for Congress and the Supreme Court today.

The Constitution says habeas corpus shall not be suspended "unless when in cases of rebellion or invasion, the public safety may require it." The plan proposed by Hoover, the head of the F.B.I. from 1924 to 1972, stretched that clause to include "threatened invasion" or "attack upon United States troops in legally occupied territory."

After the terrorist attacks of Sept. 11, 2001, President Bush issued an order that effectively allowed the United States to hold suspects indefinitely without a hearing, a lawyer, or formal charges. In September 2006, Congress passed a law suspending habeas corpus for anyone deemed an "unlawful enemy combatant."

But the Supreme Court has reaffirmed the right of American citizens to seek a writ of habeas corpus. This month the court heard arguments on whether about 300 foreigners held at Guant�namo Bay had the same rights. It is expected to rule by next summer.

Hoover's plan was declassified Friday as part of a collection of cold-war documents concerning intelligence issues from 1950 to 1955. The collection makes up a new volume of "The Foreign Relations of the United States," a series that by law has been published continuously by the State Department since the Civil War.

Hoover's plan called for "the permanent detention" of the roughly 12,000 suspects at military bases as well as in federal prisons. The F.B.I., he said, had found that the arrests it proposed in New York and California would cause the prisons there to overflow.

So the bureau had arranged for "detention in military facilities of the individuals apprehended" in those states, he wrote.

The prisoners eventually would have had a right to a hearing under the Hoover plan. The hearing board would have been a panel made up of one judge and two citizens. But the hearings "will not be bound by the rules of evidence," his letter noted.

The only modern precedent for Hoover's plan was the Palmer Raids of 1920, named after the attorney general at the time. The raids, executed in large part by Hoover's intelligence division, swept up thousands of people suspected of being communists and radicals.

Previously declassified documents show that the F.B.I.'s "security index" of suspect Americans predated the cold war. In March 1946, Hoover sought the authority to detain Americans "who might be dangerous" if the United States went to war. In August 1948, Attorney General Tom Clark gave the F.B.I. the power to make a master list of such people.

Hoover's July 1950 letter was addressed to Sidney W. Souers, who had served as the first director of central intelligence and was then a special national-security assistant to Truman. The plan also was sent to the executive secretary of the National Security Council, whose members were the president, the secretary of defense, the secretary of state and the military chiefs.

In September 1950, Congress passed and the president signed a law authorizing the detention of "dangerous radicals" if the president declared a national emergency. Truman did declare such an emergency in December 1950, after China entered the Korean War. But no known evidence suggests he or any other president approved any part of Hoover�s proposal.
 
Posts: 234 | Location: Texas | Registered: October 12, 2006Reply With QuoteReport This Post
Member
posted Hide Post
GG, the mystery is solved. RTC is the man who was on the grassy noll.
 
Posts: 7860 | Location: Georgetown, Texas | Registered: January 25, 2001Reply With QuoteReport This Post
Member
posted Hide Post
I thought it was the grassy knoll.

I figure that since the insurance industry has all of my health information in their master data banks, that it is fair for us to have whatever information we can get on the crooks. From what I know, the health industry works together to make sure that the honest, law-abiding, medical-premuim and tax paying public has no secrets to hide from them if they have ever been treated by a medical professional and used insurance in any way.

Now that's a situation that truly bothers me.

By the way RTC, where to you prosecute cases?
 
Posts: 2578 | Location: The Great State of Texas | Registered: December 26, 2001Reply With QuoteReport This Post
Member
posted Hide Post
These "glitches" seem to becoming more and more common.



February 17, 2008

Through Error, F.B.I. Gained Unauthorized Access to E-Mail

By ERIC LICHTBLAU, NY Times

WASHINGTON -- A technical glitch gave the F.B.I. access to the e-mail messages from an entire computer network - perhaps hundreds of accounts or more - instead of simply the lone e-mail address that was approved by a secret intelligence court as part of a national security investigation, according to an internal report of the 2006 episode.

F.B.I. officials blamed an "apparent miscommunication" with the unnamed Internet provider, which mistakenly turned over all the e-mail from a small e-mail domain for which it served as host. The records were ultimately destroyed, officials said.

Bureau officials noticed a "surge" in the e-mail activity they were monitoring and realized that the provider had mistakenly set its filtering equipment to trap far more data than a judge had actually authorized.

The episode is an unusual example of what has become a regular if little-noticed occurrence, as American officials have expanded their technological tools: government officials, or the private companies they rely on for surveillance operations, sometimes foul up their instructions about what they can and cannot collect.

The problem has received no discussion as part of the fierce debate in Congress about whether to expand the government's wiretapping authorities and give legal immunity to private telecommunications companies that have helped in those operations.

But an intelligence official, who spoke on condition of anonymity because surveillance operations are classified, said: "It's inevitable that these things will happen. It's not weekly, but it's common."

A report in 2006 by the Justice Department inspector general found more than 100 violations of federal wiretap law in the two prior years by the Federal Bureau of Investigation, many of them considered technical and inadvertent.

Bureau officials said they did not have updated public figures but were preparing them as part of a wider-ranging review by the inspector general into misuses of the bureau's authority to use so-called national security letters in gathering phone records and financial documents in intelligence investigations.

In the warrantless wiretapping program approved by President Bush after the Sept. 11 terrorist attacks, technical errors led officials at the National Security Agency on some occasions to monitor communications entirely within the United States - in apparent violation of the program's protocols - because communications problems made it difficult to tell initially whether the targets were in the country or not.

Past violations by the government have also included continuing a wiretap for days or weeks beyond what was authorized by a court, or seeking records beyond what were authorized. The 2006 case appears to be a particularly egregious example of what intelligence officials refer to as "overproduction" - in which a telecommunications provider gives the government more data than it was ordered to provide.

The problem of overproduction is particularly common, F.B.I. officials said. In testimony before Congress in March 2007 regarding abuses of national security letters, Valerie E. Caproni, the bureau's general counsel, said that in one small sample, 10 out of 20 violations were a result of "third-party error," in which a private company "provided the F.B.I. information we did not seek."

The 2006 episode was disclosed as part of a new batch of internal documents that the F.B.I. turned over to the Electronic Frontier Foundation, a nonprofit group in San Francisco that advocates for greater digital privacy protections, as part of a Freedom of Information Act lawsuit the group has brought. The group provided the documents on the 2006 episode to The New York Times.

Marcia Hofmann, a lawyer for the privacy foundation, said the episode raised troubling questions about the technical and policy controls that the F.B.I. had in place to guard against civil liberties abuses.

"How do we know what the F.B.I. does with all these documents when a problem like this comes up?" Ms. Hofmann asked.

In the cyber era, the incident is the equivalent of law enforcement officials getting a subpoena to search a single apartment, but instead having the landlord give them the keys to every apartment in the building. In February 2006, an F.B.I. technical unit noticed "a surge in data being collected" as part of a national security investigation, according to an internal bureau report. An Internet provider was supposed to be providing access to the e-mail of a single target of that investigation, but the F.B.I. soon realized that the filtering controls used by the company "were improperly set and appeared to be collecting data on the entire e-mail domain" used by the individual, according to the report.

The bureau had first gotten authorization from the Foreign Intelligence Surveillance Court to monitor the e-mail of the individual target 10 months earlier, in April 2005, according to the internal F.B.I. document. But Michael Kortan, an F.B.I. spokesman, said in an interview that the problem with the unfiltered e-mail went on for just a few days before it was discovered and fixed. "It was unintentional on their part," he said.

Mr. Kortan would not disclose the name of the Internet provider or the network domain because the national security investigation, which is classified, is continuing. The improperly collected e-mail was first segregated from the court-authorized data and later was destroyed through unspecified means. The individuals whose e-mail was collected apparently were never informed of the problem. Mr. Kortan said he could not say how much e-mail was mistakenly collected as a result of the error, but he said the volume "was enough to get our attention." Peter Eckersley, a staff technologist for the Electronic Frontier Foundation who reviewed the documents, said it would most likely have taken hundreds or perhaps thousands of extra messages to produce the type of "surge" described in the F.B.I.'s internal reports.

Mr. Kortan said that once the problem was detected the foreign intelligence court was notified, along with the Intelligence Oversight Board, which receives reports of possible wiretapping violations.

"This was a technical glitch in an area of evolving tools and technology and fast-paced investigations," Mr. Kortan said. "We moved quickly to resolve it and stop it. The system worked exactly the way it's designed."
 
Posts: 234 | Location: Texas | Registered: October 12, 2006Reply With QuoteReport This Post
Member
posted Hide Post
Yet more reasons why we cannot trust the FBI.


Mar 5, 10:56 AM (ET)

By LARA JAKES JORDAN

WASHINGTON (AP) - FBI Director Robert Mueller says an upcoming Justice Department report will show the bureau improperly used national security letters to obtain personal data on Americans during terror and spy investigations.

Mueller says the report focuses on national security letters issued only in 2006 - a year before the FBI enacted sweeping new reforms to prevent future lapses.

Mueller's comments Wednesday morning in front of the Senate Judiciary Committee came just days before the Justice Department's inspector general is scheduled to release the follow-up to a similar audit in 2007.

Last year's report found that over a three-year period, the FBI had demanded personal data on people from banks, telephone and Internet providers and credit bureaus without official authorization and in non-emergency circumstances.

http://apnews.myway.com/article/20080305/D8V7C6T06.html
 
Posts: 234 | Location: Texas | Registered: October 12, 2006Reply With QuoteReport This Post
Member
posted Hide Post
quote:
Mueller says the report focuses on national security letters issued only in 2006 - a year before the FBI enacted sweeping new reforms to prevent future lapses.


So, the organization spotted the problem and took steps to fix the problem, but they can't be trusted?
 
Posts: 956 | Location: Cherokee County, Rusk, Tx | Registered: July 11, 2001Reply With QuoteReport This Post
Member
posted Hide Post
But don't you see that during all those years in which "mistakes" were made, the FBI and government was repeatedly assuring us that NO mistakes would be made and that privacy would be closely guarded. That turned out to be a big, fat lie. Fool me once, shame on you. Fool me twice, shame on me. I am not prepared to be fooled twice by these people.

FBI chief: Lack of legal shield won't halt telecom spy partnerships

Posted by Anne Broache
WASHINGTON--NEWS.com 3/5/08

As Congress debates whether to wipe out lawsuits accusing telephone companies of allegedly illegal wiretaps, the Bush administration has argued such cooperation is key to keeping Americans safe from terrorists.

FBI Director Robert Mueller continued that push on Wednesday, but he wouldn't go so far as to say those "private partners" would stop installing requested wiretaps unless certain legal protection is granted.

To some extent, Mueller is stating the obvious: Federal law requires telephone and Internet companies to comply with lawful wiretap court orders or lawful certifications from the attorney general, with stiff penalties for noncompliance. But Mueller said in various ways that he was concerned that lack of retroactive liability protection would harm the government's "relationships" with telephone companies -- which seems to leave in doubt whether all of the administration's requests were legal.

The seemingly reluctant admission came during pointed questioning by Sen. Arlen Specter (R-Penn.) at a Senate Judiciary Committee hearing. Specter, the committee's ranking member, has proposed an amendment--which has so far been unsuccessful--to a controversial spy law update that would allow lawsuits alleging illegal spying by telephone companies to continue, except with government lawyers substituted in the companies' place.

FBI Director Robert Mueller said he disagreed with that approach, arguing it would provide a "disincentive" for communications companies to team up with federal terrorism investigations.

Then the following exchange ensued:


Specter: A disincentive, OK, but do you think they would stop?
Mueller: I think it is a disincentive...
Specter: But do you think they would stop?
Mueller: I think it would hamper our relationships, yes.... I do think it would hinder our relationships.
Specter: Disincentive, hamper, hinder, but I don't hear you say it would stop....
Mueller: I'm not going to say it's going to stop, but I do believe delay is detrimental to the safety of the country. Delay and lack of clarity, lack of simplicity guiding our relationships inhibits our ability to get the information we need on a daily basis.

http://www.news.com/8301-10784_3-9886461-7.html?tag=blog.promos
 
Posts: 234 | Location: Texas | Registered: October 12, 2006Reply With QuoteReport This Post
Member
posted Hide Post
You know RTC the best way to change an organization is from the inside. I'm sure with your prosecution experience the FBIS would snap you up !
 
Posts: 641 | Location: Longview, Texas | Registered: October 10, 2001Reply With QuoteReport This Post
  Powered by Social Strata  
 

TDCAA    TDCAA Community  Hop To Forum Categories  Criminal    FBI Database

© TDCAA, 2001. All Rights Reserved.