940 likes | 1.05k Views
Annual Surveillance Edition. Logos Radio Network Money Bomb!. Live Free speech radio! Go chip in and help these patriots so that they can continue to bring you the great programming and uncensored content that they have so generously provided their listeners with for years.
E N D
Logos Radio Network Money Bomb! Live Free speech radio! Go chip in and help these patriots so that they can continue to bring you the great programming and uncensored content that they have so generously provided their listeners with for years. www.Logosradionetwork.com At 3,265
Anonymity-the ability to conceal one's identity while communicating “Anonymity is a shield from the tyranny of the majority ... It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation--and their ideas from suppression--at the hand of an intolerant society.“McIntyre v. Ohio Elections Comm’n, 514 U.S. 334 ? Morris Hymes, Head of the ID Assurance Directorate at the Defense Department says that; “We need to recognize the change that is occurring in society,” “Society,” he said, “is taking away the privilege of anonymity.” Donald Kerr senior US intelligence official tells us that; “at this time privacy can no longer mean anonymity”
As 2012 draws to a close. . here at team Advox, we've decided to suggest 10 resolutions for 2013, presented in the form of a review of the tools and strategies to protect yourself online. This is a selection of the best ways and methods we've come across in 2012. Remember that no one tactic will ever provide you with 100% security and safety online. At all times, stay armed with your common sense. 10 New Year's Resolutions to Browse the Internet Safely in 2013 http://advocacy.globalvoicesonline.org/2012/12/31/10-new-years-resolutions-to-browse-the-internet-safely-in-2013/
The Balance of Power Individual Opacity (privacy) Information is POWER Personal Freedom High Liberty & Justice • Independence • Economic Prosperity • Innovation • Political and social participation Transparency Government Control Low
Re-Balancing of Power Government Control High Opacity Transparencyof the Individual Personal Freedom Low
We Lost The War by: Frank Rieger “We had a reasonable chance to tame the wild beast of universal surveillance technology, approximately until september 10th, 2001. One day later, we had lost. All the hopes we had, to keep the big corporations and “security forces” at bay and develop interesting alternative concepts in the virtual world, evaporated with the smoke clouds of the World Trade Center. . . .We are now deep inside the other kind of future, the future that we speculated about as a worst case scenario, back then. This is the ugly future, the one we never wanted, the one that we fought to prevent. We failed. Probably it was not even our fault. But we are forced to live in it now.” http://frank.geekheim.de/?page_id=128
Everyone is dispirited. . .(Word to the wise-Now is NOT the time to watch Les Mis! https://secure.cryptohippie.com/pubs/EPS-2011.pdf
Despair and Resistance CASPIAN model-as capitalists, we often have more power as consumers than voters. Hit them in their wallets! Individual Resistance-the courts, Subtle (or not so subtle) non-compliance or Collective Resistance-
Nathan Allonby: • "Simultaneous introduction of biometric, smart ID cards around the world is not just a coincidence, it is not merely due to nations copying effective schemes in other nations, and is not just a phenomenon related to the sudden maturity of technology. Implementation of these ID card schemes was pushed. It is being driven in a coordinated programme, via international organisations and conferences, led by the US and the European Union (EU).“ • Podcast interview with James Corbett, 2010http://www.corbettreport.com/mp3/2010-01-09%20Nathan%20Allonby.mp3
“If one term embodies the paradoxical and contradictory character of Anonymous—which is now serious in action and frivolous by design; made up of committed activists and agents of mischief—it is lulz” “Today Anonymous is associated with an irreverent, insurgent brand of activist politics” “What sets Anonymous apart is its fluid membership and organic political evolution, along with its combination of feral tricksterism and expert online organizing.” “It’s not a group, it’s an idea. You won’t be met with a welcome wagon but that is because no one owns it. It’s the evolution of activism and it’s yours.” --KB . . . it also offers an object lesson in what Frankfurt School philosopher Ernst Bloch calls “the principle of hope.”
Stop Biometric ID! Kaye Beach Needs Your Support for Lawsuit This is a money bomb to raise funds for my lawsuit against the state of Oklahoma for the unwarranted collection of my biometric data. (More information below) The date is Jan 18th but you can donate anytime you like.Please, support my lawsuit to stop mandatory biometric enrollment!You may make a donation online through Paypal.com (you don't have to have a PayPal account, just a credit/debit card)To do so, all you need is my email, which is axxiomforliberty@gmail.com or use this link;https://www.paypal.com/cgi-bin/webscr?cmd=_donations&business=axxiomforliberty%40gmail.com&lc=US&item_name=Kaye+Beach+Legal+Defense+Fund¤cy_code=USD&bn=PP-DonationsBF%3Abtn_donateCC_LG.gif%3ANonHosted READ MORE https://www.facebook.com/events/450899124971229/?ref=ts&fref=ts
Jacob Appelbaum 29C3 Keynote: Not My Department Jacob Appelbaum, a Seattle-based programmer for the online privacy protection project called Tor http://www.youtube.com/watch?v=QNsePZj_Yks In his speech he talks about NSA storage facilities, drone attacks, the patriot act, surveillance states (and much more) why this affects you and why this is your department.Quoting a British author, "To be free from suspicion is one of the first freedoms that is important for being free in the rest of your life" http://news.cnet.com/8301-27080_3-20012253-245.html
Twitter 101: How should I get started using Twitter? https://support.twitter.com/groups/31-twitter-basics/topics/104-welcome-to-twitter-support/articles/215585-twitter-101-how-should-i-get-started-using-twitter# Oklahoma listener: If you do twitter, I have found some Oklahoma Anonymous people on Twitter you might want to follow; @OkieAnonymous @AnonOklahoma @DustBowlAnon @okieanon On Facebook: “Anonymous Oklahoma”
SOCIAL MEDIA and ACTIVISM Disciplined and coordinated groups, whether businesses or governments, have always had an advantage over undisciplined ones: they have an easier time engaging in collective action because they have an orderly way of directing the action of their members. Social media can compensate for the disadvantages of undisciplined groups by reducing the costs of coordination. SHARED AWARENESS For political movements, one of the main forms of coordination is what the military calls "shared awareness," the ability of each member of a group to not only understand the situation at hand but also understand that everyone else does, too. Social media increase shared awareness by propagating messages through social networks. the dictator's dilemma This condition of shared awareness -- which is increasingly evident in all modern states -- creates what is commonly called "the dictator's dilemma“ The dilemma is created by new media that increase public access to speech or assembly; with the spread of such media, whether photocopiers or Web browsers, a state accustomed to having a monopoly on public speech finds itself called to account for anomalies between its view of events and the public's.
The Cute Cat Theory Tools specifically designed for dissident use are politically easy for the state to shut down, whereas tools in broad use become much harder to censor without risking politicizing the larger group of otherwise apolitical actors. EthanZuckerman of Harvard's Berkman Center for Internet and Society calls this "the cute cat theory of digital activism." Specific tools designed to defeat state censorship (such as proxy servers) can be shut down with little political penalty, but broader tools that the larger population uses to, say, share pictures of cute cats are harder to shut down. The Political Power of Social Media Technology, the Public Sphere, and Political Change by Clay Shirky http://www.gpia.info/files/u1392/Shirky_Political_Poewr_of_Social_Media.pdf
Justice Louis Brandeis wrote in his dissent in the first Supreme Court wiretapping case, Olmstead vs. United States (1928): • “Discovery and invention have made it possible for the government, with means far more effective than stretching upon the rack, to obtain disclosure in court of what is whispered in the closet. … The progress of science in furnishing the Government with means of espionage (on American citizens) is not likely to stop with wiretapping.” • “Ways may some day be developed,” Brandeis continued, “by which the government, without removing papers from secret drawers, can reproduce them in court.” (He didn’t foresee the Patriot Act’s giving the FBI permission to sneak into our homes when we aren’t there and photograph those papers.) • The time did come, as Brandeis prophesied, when the government “will be enabled to expose to a jury the intimate occurrences of the home” – and any of our communications in almost any form, if this Obama legislation becomes and remains law. • Brandeis also warned –: “The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man’s spiritual nature, of his feelings, and of his intellect. … They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the government, the right to be let alone – the most comprehensive of rights, and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.” • http://www.wnd.com/2010/10/211885/
5 Levels of Surveillance- • Notice • the Role of Government • Attitude of the PublicIs Policy driven by Principle or Practice? • Amount of personal information held by government and degree of database linking.
Level 1 RESTRICTED SURVEILLANCE level 2 CONDITIONAL SURVEILLANCE Least intrusive zone of surveillance, Rare, An Ideal • Government is small • Private enterprise respectful of individual privacy • Law, policy based on principle (Constitution) focused on protection of rights • Boundaries respected-sovereignty, jurisdictions and separation of powers • Minimal collection of personal information. Large databases uncommon. • Society understands and respects rights of individuals. Civically aware and exerts a positive influence on policy The government has an unobtrusive role in society Considered the norm for western democratic societies • Surveillance generally regarded as an undesirable practice, only exercised by govt. after examination of principle, adequate public debate and only then with proper safeguards in place. • Records are maintained within individual departments,general linkage between agencies is not permitted. Access based on right to know. • Attitude of Good Faith is maintained between the government and the public. The role of government agencies is essentially one of serving the public
Level 4 MASS SURVEILLANCE Level 3 ROUTINE SURVEILLANCE Mass surveillance established 1.Law enforcement 2.Taxation 3.Government Benefits • Linkage between these 3 sectors occurs on a case by case basis when there is suspicion or evidence of wrongdoing • Public mostly accepts the idea that a certain amount of monitoring is a reasonable trade-off in exchange for a desired end. • General public support for some surveillance, public still retains awareness of individual rights • Govt. relationship with the community still retains a basis of trust Enforced, interactive and punitive surveillance. • Numerous systems and infrastructure developed for monitoring most aspects of people's movement, transactions, interactions and associations. • Most computer systems are interlinked. • Records and files of citizens are routinely and automatically matched against each other to detect inconsistencies. • Interests of Revenue, Security and Law Enforcementprovide powerful arguments for surveillance. • There is mass obedience with little or no resistance Government agencies have the role of controllers and enforcers of public policy Governmental bodies have assumed the role of agents of public interest
(LEVEL FIVE) TOTAL SURVEILLANCE Rarely attained state of total surveillance • Crucial element - Meek willingness of the public to support government control. • Public voluntarily aids in surveillance. Surrenders their own liberty and privacy and will force the surrender of their neighbor's information or liberty • All movements and activities monitored or controlled by authorities • There is still physical freedom of movement and freedom of association, just no right to keep anything secret. The interests of the government become internalized by the public. Individual rights and identity subsumed by government interests. (Think Stockholm Syndrome) Level of surveillance of a population is always predicated on 4 things; Money, Man power or Technology, political will, public acceptance
Source-THE NEW PARADIGM—MERGING LAW ENFORCEMENT AND COUNTERTERRORISM STRATEGIES Secure Cities 2006 http://www.scribd.com/doc/21970726/IACP-Intelligence-Led-Policing-2006-New-Paradigm What does this mean? Global political integration, merging military and civilian operations, loss of natural and constitutional rights and protections traditionally afforded us citizens, perpetual emergency state, all are viewed equally as a potential threat
Intelligence Led Policing • Key Features of Intelligence Led Policing ; • Information driven (human, data-mining, hi-tech surveillance) • information sharing (without regard to jurisdiction) • Interconnected data systems-data fusion • Tech. and Data Driven • Preemptive • Preventative • Predictive • Utilitarian the ends justifies the means • Social controlSeeks to influence the behavior of the public to desired ends Intelligence-led policing is future focus in Rochester, 2010 "You're less likely to do something (wrong) if you think somebody's watching," McAleer said. "This is the direction of policing in this country,"
Total Information Awareness “TIA would give government the power to generate a comprehensive data profile on anyone” • 2002 Defense Advanced Research Projects Agency (DARPA) Project • 2003 TIA was supposedly defunded by Congress • 2013 TIA lives. Change the name, shift the programs, quietly continue funding. • Ex; New NSA data center, Utah, Fusion Centers, F.A.S.T., All Digital Data collected, collated and analyzed- Transaction, finances, education, medical history, travel, public records, Emails, personal communications and more Total Information Awareness Goal: All Encompassing Knowledge of the facts and circumstances of people places and things and events . .without any requirement for a search warrant. link
An electronic police state is characterized by this: State use of electronic technologies to record, organize, search and distribute forensic evidence against its citizens. The two crucial facts about the information gathered under an electronic police state are these: It is criminal evidence, ready for use in a trial. It is gathered universally (“preventively”) and only later organized for use in prosecutions. In an Electronic Police State, every surveillance camera recording, every email sent, every Internet site surfed, every post made, every check written, every credit card swipe, every cell phone ping... are all criminal evidence, and all are held in searchable databases. The individual can be prosecuted whenever the government wishes. Long-term, the Electronic Police State destroys free speech, the right to petition the government for redress of grievances, and other liberties. Worse, it does so in a way that is difficult to identify. https://secure.cryptohippie.com/pubs/EPS-2010.pdf The Electronic Police State 2010
National Security Agency NSA Quote Church “Th[e National Security Agency's] capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. [If a dictator ever took over, the N.S.A.] could enable it to impose total tyranny, and there would be no way to fight back.“ --Sen. Frank Church
The Utah Data Center Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program. . .
ScientiaEstPotentia “Knowledge is Power” Motto of Admiral Poindexter’s Information Awareness Office “A . . .crucial component [of TIA] was the development of biometric technology to enable the identification and tracking of individuals.” EPIC BIOMETRIC ID IS THE LYNCHPIN OF THE MODERN SURVEILLANCE SOCIETY. EVERYONE MUST BE ENROLLED
Nathan Allonby:"Simultaneous introduction of biometric, smart ID cards around the world is not just a coincidence, it is not merely due to nations copying effective schemes in other nations, and is not just a phenomenon related to the sudden maturity of technology. Implementation of these ID card schemes was pushed. It is being driven in a coordinated programme, via international organisations and conferences, led by the US and the European Union (EU)."http://www.corbettreport.com/mp3/2010-01-09%20Nathan%20Allonby.mp3 ID Cards - intergovernmental cooperation in worldwide implementation http://www.corbettreport.com/articles/20100109_id_cards.htm ID Cards – a World View http://www.globalresearch.ca/id-cards-a-world-view/14992
ID Cards – a World View However, policies introducing ID cards, evolved in secret, go far beyond identification and security, as described by Tony Bunyan of Statewatch, in an article in The Guardian. ID cards are only one tool, enabling a much larger scheme, to track and record the lives of every individual; Bunyan calls this the digital tsunami : - “Every object the individual uses, every transaction they make and almost everywhere they go will create a detailed digital record. This will generate a wealth of information for public security organisations”, leading to behaviour being predicted and assessed by “machines” (their term) which will issue orders to officers on the spot. The proposal presages the mass gathering of personal data on travel, bank details, mobile phone locations, health records, internet usage, criminal records however minor, fingerprints and digital pictures that can be data-mined and applied to different scenario – boarding a plane, behaviour on the Tube or taking part in a protest.”
Biometrics is used to establish a perfect connection between the body and personal data associated with an individual. travel transactions Health employment Financial Location Habits Medical education associations
“When you do that, assemble that much info, you're assembling power,” William Binney http://civic.mit.edu/blog/schock/the-government-is-profiling-you-william-binney-former-nsa In this powerful interview, documentary filmmaker Laura Poitras talks with William Binney about the emerging police state in America. Binneydiscusses how programs he had helped develop to gather intelligence on foreign enemies was suddenly, and to his shock, turned around on the American public without their knowledge or consent. He resigned from the NSA due to the unconstitutionality and immorality of this turn of events. The Program (Stellar Wind) on You Tube http://www.youtube.com/watch?feature=player_embedded&v=6PIPHNlAxY4#at=42 William Binney is a former mathematician and code breaker at the NSA
In an interview with RT, William Binney, a former mathematician and code breaker at the NSA, says the FBI records the emails of nearly all Americans, including members of Congress, and warns that the government can use this information against anyone. “The FBI has access to the data collected, which is basically the emails of virtually everybody in the country. And the FBI has access to it,” Binney said. “All the congressional members are on the surveillance, too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything they’ve done for the last 10 years at least.” NSA agent: Everyone under virtual surveillance Read more at http://www.wnd.com/2012/12/nsa-agent-everyone-under-virtual-surveillance/#OB3q3vp6K62STRju.99
Senate Passes FISA Extension73-23 Dec. 28, 2012 Congress approved a measure Friday that would renew expansive U.S. surveillance authority for five more years, rejecting objections from senators who are concerned the legislation does not adequately protect Americans' privacy. The bill passed the Senate 73 to 23. The House approved it in September The FISA Amendments Act, (.pdf) which was expiring Monday at midnight, allows the government to electronically eavesdrop on Americans’ phone calls and e-mails without a probable-cause warrant so long as one of the parties to the communication is believed outside the United States. The communications may be intercepted “to acquire foreign intelligence information.” link Amendments that would have offered some small degree of oversight were pushed aside. Defenders claimed that they simply didn't have time to properly consider alternatives, but that's mainly because they didn't schedule a debate until mere hours remained before the Foreign Intelligence Surveillance Act amendments were set to expire. link Dec. 31: Obama signs FISA extension
Americans Are The Most Spied On People In World History http://www.washingtonsblog.com/2012/12/americans-the-most-spied-on-people-in-world-history.html
Timeline of NSA Domestic Spying • Dec. 2005 Headlines • New York Times Exposes NSA Spying to the Public for the First Time • President Bush Confirms Existence of NSA Spying • New York Times Reveals Some of NSA Spying Activites Are Purely Domestic • New York Times Reveals NSA Spying Program Much Larger Than President Bush Acknowledged • New York Times Reveals Companies Gave Backdoor Access to Their Communications Stream https://www.eff.org/nsa-spying/timeline
U.S. Terrorism Agency to Tap a Vast Database of Citizens The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation. Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes. "It's breathtaking" in its scope, said a former senior administration official familiar with the White House debate. December 12, 2012, The Wall Street Journal
Darla Storm, Computer World Dec. 17, 2012: In March 2012 the Obama administration secretly had Attorney General Eric Holder sign new NCTC guidelines [PDF] so it could store data on all Americans as potential domestic terrorists. The guidelines changed the amount of time NCTC “can retain private information about Americans when there is no suspicion that they are tied to terrorism.” Mike German, the ACLU's Senior Policy Counsel, ACLU Washington Legislative Office wrote, “American citizens and residents should not be considered potential terrorists until the NCTC decides otherwise. Having innocent people's information in intelligence databases for five years without any suspicion of wrongdoing creates an unacceptable risk to Americans' privacy through error and abuse.” Previously, NCTC analysts were "required to remove information about innocent U.S. people 'upon discovery’,” but "they didn't always know who was innocent. A person might seem innocent today, until new details emerge tomorrow. . . NCTC can get hold of any government file on any U.S. citizen to examine it “for possible criminal behavior, even if there is no reason to suspect them,” so don't be silly by believing you must break the law first. “NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others.” http://blogs.computerworld.com/privacy/21505/feds-spying-innocent-americans-just-case-we-might-commit-future-crimes
Warrantless cellphone location tracking: What Fourth Amendment? Despite a major U.S. Supreme Court ruling in January on the constitutionality of GPS tracking by law enforcement agencies, the overall issue of location tracking of individuals remained as murky as ever in 2012. Cellphones and other mobile devices offer criminal investigators a powerful tool for tracking suspects. Local police departments often use realtime cellphone data track individuals. In addition, historical cellphone data is often gathered -- without a warrant -- by police to track past activities of suspected criminals. In a case now being heard by the U.S Fifth Circuit Court of Appeals, federal prosecutors maintain that there can be no reasonable expectation of privacy in historical cell phone location data that is collected and maintained by phone companies. According to prosecutors, the Stored Communications Act (SCA) of 1986 allows them to use a relatively easy-to-obtain court order to force a carrier to turn over a person's historical cell-site location information. http://m.computerworld.com/s/article/9234896/Drones_phones_and_other_2012_privacy_threats?taxonomyId=17&pageNumber=2
Warrantless cellphone location tracking: What Fourth Amendment? The Sixth Circuit Court of Appeals in August agreed with that assessment, ruling that Fourth Amendment protections do not apply to cellphone location data. Others courts, however, have ruled that cellphone data is protected. n a landmark ruling in June, the U.S. Supreme Court agreed with privacy advocates that law enforcement officials need to first obtain a search warrant based on probable cause before conducting some types of location tracking. However, the court's decision pertained only to the issue of warrantless GPS tracking. It did not address the crucial and much broader issue of whether similar tracking using cellphone data and other geo-tracking devices requires a warrant. That lack of guidance leaves the door open for all sorts of warrantless cellphone tracking by the government and all sorts of interpretation of those actions by the courts, privacy advocates say. http://m.computerworld.com/s/article/9234896/Drones_phones_and_other_2012_privacy_threats?taxonomyId=17&pageNumber=2
DOT to begin offering REAL ID January 15th January 3, 2013 By Dar Danielson Sample of a new REAL ID driver’s license. The Iowa Department of Transportation plans to begin offering what’s known as the REAL ID driver’s license later this month. Mark Lowe, the director of the DOT’s Motor Division, says the new license is federally mandated. “Real ID is really just a regular Iowa driver’s license or non-operators identification card that we have marked to show that when we issued it we were in compliance with federal guidelines for secure issuance of driver’s licenses or ID’s,” Lowe explains. “So really nothing new in terms of what a driver’s license or ID is, but it signifies that we have met certain federal requirements and when the person came, they provided documents that met the federal requirements.” Congress created the REAL ID program in an effort to prevent terrorist attacks http://www.radioiowa.com/2013/01/03/dot-to-begin-offering-real-id-january-15th/
How close is Oklahoma to Real ID? Much, Much Closer Than It Ought To Be Kaye Beach September 14, 2012 Have you noticed the flurry of activity related to Oklahoma’s driver’s licenses? Did your Real ID radar begin to ping? A Google photo search for “new driver’s license design” shows that many states, like Oklahoma, are getting new driver’s license designs. And like Oklahoma, the photos are all moved to the left. This isn’t a DMV fad. These standards come from somewhere. – 2012 AAMVA North American Standard – DL/ID Card Design
Biometrics FRT • Imagine the police taking a picture: any picture of a person, anywhere, and matching it on the spot in less than a second to a personalized profile, scanning millions upon millions of entries from within vast, intricate databases stored on the cloud. • It’s done with state of the art facial recognition technology, and in Southern California it’s already happening. http://rt.com/usa/news/california-facefirst-surveillance-recognition-908/
FBI Introduces a New Generation Facial Recognition System • By Harry Morgan on October 28, 2011 • http://www.virusremove.co.uk/2011/10/fbi-introduces-a-new-generation-facial-recognition-system/
FBI Next Generation ID The FBI’s Next Generation Identification (NGI) database represents the most robust effort to introduce and streamline multimodal biometrics collection. FBI has stated it needs “to collect as much biometric data as possible . . . and to make this information accessible to all levels of law enforcement, including International agencies.” Accordingly, it has been working “aggressively to build biometric databases that are comprehensive and international in scope.”75 Once NGI is complete, it will include iris scans, palm prints,76 and voice data, in addition to fingerprints. However, the biggest and perhaps most controversial change will be the addition of face‐recognition ready photographs, which the FBI has already started collecting through a pilot program with four states.77 Jennifer Lynch, EFF, FROM FINGER PRINTS TO DNA, 2012 BIOMETRIC DATA COLLECTION IN U.S. IMMIGRANT COMMUNITIES AND BEYOND
Facts about the FBI’s Next Generation ID According to the FBI it is official FBI policy to collect “as much biometric data as possible within information technology systems” and to “work aggressively to build biometric databases that are comprehensive and international in scope.” link -NGI will be fully operational in 2014 -In 2008 Lockheed Martin won a 1 billion dollar contract for the NGI. source -This database is international in scope. Biometrics collected by government officials is already done so using international standards for the purpose of international data sharing. -The FBI will share data with more than 18,000 local, state, federal, and international agencies. Link -State DMV databases are one of the desired sources of biometrics for the FBI. FBI Facial Recognition Initiatives -The database is NOT being built from the biometrics of just criminals or legitimate suspects. The NGI consolidates two existing databases of biometric information (one from the FBI and one from the Dept. Of Homeland Security) both of which were designed to be independent of each other and not interoperable.