Feeds

FBI preps $1bn biometric database

'Next Generation Identification' awaits you

Secure remote control for conventional and virtual desktops

"If someone steals and spoofs your iris image, you can't just get a new eyeball." Paul Saffo, technology industry observer

Quality science fiction has often provided the prism through which we view, for good or ill, the effects of technological and scientific evolution on human life in all its moral and ethical disarray. No recent sci-fi movie has portrayed the inexorable expansion of the use of biometric data in public fora better than Minority Report.

To the surprise of no one who follows such things, the FBI on Friday at last revealed its plans for a major expansion of the use of biometrics in law enforcement - and perhaps most unnervingly, what appears to be a widespread expansion of its use in public spaces.

"Bigger. Faster. Better. That's the bottom line," Thomas E. Bush III, assistant director of the FBI's Criminal Justice Information Services Division, said to the Washington Post. Of course, with American law enforcement, that's always the bottom line, and this is clearly just the beginning.

The program is closely tied with technology currently being developed at the West Virginia University Center for Identification Technology Research (CITeR), located a short drive away, that will allow for biometric identification based on facial recognition technology from as far away as 200 yards, and iris scans from about fifteen feet. Although the report did not specifically address questions of public surveillance, it's difficult to imagine places other than public spaces where law enforcement needs to recognize people from 200 yards away.

The FBI's biometric database is apparently being developed according to standards - of what? - allegedly shared by Britain, Canada, Australia, the US and New Zealand, and includes criminal histories. It is connected, for purposes of cross-reference, with the Terrorist Screening Center's database, and the National Crime Information Center database, which is the FBI's master criminal database of terrorists, felons, fugitives and other undesirables.

Minority retort

Civil libertarians and privacy advocates are not amused.

They claim that the project presents nightmare scenarios of stolen biometric information being used for ever-more outlandish forms of identity theft, which would be nearly impossible to correct. Correcting an inaccurate credit report is already an insulting and hair-raising experience in America, and critics contend that the use of biometrics would make correcting inaccurate credit reports or criminal histories nearly impossible. Besides, they argue, the US government does not exactly have a sterling record when it comes to database security - what happens when, as seems inevitable, the database is hacked and this intimate and allegedly indisputable data is compromised?

The FBI already has a database of 55 million fingerprints and several million DNA samples, but the new initiative will be able to rely on iris patterns, face-shape data, scars, and even unique mannerisms such as the ways people walk and talk, to solve crimes and identify criminals, terrorists and the like.

The FBI will also be more than happy to retain - upon request by employers, though we suspect employers who prefer that the data not be retained will probably have to "opt out" - the fingerprints of employees who have undergone criminal background checks so the employers can be notified if employees have brushes with the law. The project will also share data with law enforcement agencies around the world. Information sharing is always a two way street, which makes the whole endeavor seem even less reliable, depending on where that information comes from.

Databases usually become less accurate, rather than more, the older and bigger they get, because there's very little incentive for the humans that maintain them to go back and correct old, inaccurate information rather than simply piling on new information. Data entry typically trumps data accuracy. Furthermore, the facial recognition technology in its current iteration is woefully inaccurate, with recognition rates as low as 10 per cent at night. All in all, there is ample reason for skepticism - not that it will make much of a difference.

Thanks for the memories

Biometric sharing with the government has already proven to be a sucker's deal for those who have chosen to participate. The government is never going to assume one's innocence just because that individual has agreed to make him or herself immediately identifiable to government screeners - which is why Americans who agreed to submit to routine iris scans in airports still have to wait in line to take off their shoes and have their bags x-rayed.

CITeR director Lawrence A. Hornak - a visionary of the Big Brother school of technology - awaits the day when devices will be able to "recognize us and adapt to us. The long-term goal," he said, is "ubiquitous use" of biometrics. A traveler may walk down an airport corridor and "allow" his face and iris images to be captured without ever stepping up to a kiosk and looking into a camera, he said. Sound familiar?

One of the most memorable scenes in Minority Report occurs when John Anderton, pursued by his own pre-crime division, breaks into a secure area using a stolen eyeball to bypass an iris-scan identification system. Of course, sophisticated criminals of the future will probably not have to resort to carrying stolen eyeballs around in ziplock bags - the glories of digital information technology will surely provide cleaner, more elegant criminal solutions.®

Burke Hansen, attorney at large, heads a San Francisco law office

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.