Feeds

EFF: Feds plan to put 52 MILLION FACES into recognition database

System would identify faces as part of biometrics collection

Maximizing your infrastructure through virtualization

The FBI is planning to expand the facial recognition components of its biometrics database to catalog and search the faces of more than 52 million individuals, according to the Electronic Frontier Foundation (EFF).

The group has released a cache of documents it obtained from the bureau by way of a Freedom of Information Act suit. The documents detail the FBI's plans for the Next Generation Identification (NGI) records system.

According to the FBI, the NGI database is a project of the bureau's Criminal Justice Information Services (CJIS) office which, with the aid of outside contractors, is building a biometrics database the will use facial recognition to help supplement existing fingerprint databases for state and local authorities.

The NGI plan also calls for the introduction of archives with scar and tattoo images as well as iris scan collections set for deployment or testing this year.

The EFF claims that the FBI is seeking to build a platform which will contain 52 million facial images and will enable authorities to run "tens of thousands" of searches every day for both criminal and non-criminal inquiries.

This, says the EFF, represents a huge potential privacy violation for millions of law-abiding citizens who will have data uploaded by not only law enforcement but also potentially through their employers as well.

"Currently, if you apply for any type of job that requires fingerprinting or a background check, your prints are sent to and stored by the FBI in its civil print database. However, the FBI has never before collected a photograph along with those prints," wrote EFF senior staff attorney Jennifer Lynch.

"This is changing with NGI. Now an employer could require you to provide a 'mug shot' photo along with your fingerprints. If that's the case, then the FBI will store both your face print and your fingerprints along with your biographic data."

When contacted for comment on the matter, the FBI provided El Reg with overview documents noting that the facial recognition system is intended to be used only as an investigative lead and will be restricted to use by authorized law enforcement agencies. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.