Feeds

EFF: Feds plan to put 52 MILLION FACES into recognition database

System would identify faces as part of biometrics collection

Secure remote control for conventional and virtual desktops

The FBI is planning to expand the facial recognition components of its biometrics database to catalog and search the faces of more than 52 million individuals, according to the Electronic Frontier Foundation (EFF).

The group has released a cache of documents it obtained from the bureau by way of a Freedom of Information Act suit. The documents detail the FBI's plans for the Next Generation Identification (NGI) records system.

According to the FBI, the NGI database is a project of the bureau's Criminal Justice Information Services (CJIS) office which, with the aid of outside contractors, is building a biometrics database the will use facial recognition to help supplement existing fingerprint databases for state and local authorities.

The NGI plan also calls for the introduction of archives with scar and tattoo images as well as iris scan collections set for deployment or testing this year.

The EFF claims that the FBI is seeking to build a platform which will contain 52 million facial images and will enable authorities to run "tens of thousands" of searches every day for both criminal and non-criminal inquiries.

This, says the EFF, represents a huge potential privacy violation for millions of law-abiding citizens who will have data uploaded by not only law enforcement but also potentially through their employers as well.

"Currently, if you apply for any type of job that requires fingerprinting or a background check, your prints are sent to and stored by the FBI in its civil print database. However, the FBI has never before collected a photograph along with those prints," wrote EFF senior staff attorney Jennifer Lynch.

"This is changing with NGI. Now an employer could require you to provide a 'mug shot' photo along with your fingerprints. If that's the case, then the FBI will store both your face print and your fingerprints along with your biographic data."

When contacted for comment on the matter, the FBI provided El Reg with overview documents noting that the facial recognition system is intended to be used only as an investigative lead and will be restricted to use by authorized law enforcement agencies. ®

Beginner's guide to SSL certificates

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.