This past summer, the FBI was compelled to release information about the operational facial recognition database they working on. As part of its Next Generation Identification (NGI) program, this database is part of the FBIs efforts to build a “bigger, faster and better” means of biometric identification. Earlier this month, the FBI announced that the system is now working at “full operational capability”, and many people are worried…
To break it down, the NGI database is made up of millions of stored mugshots and other photos, which are then used when analyzing footage taken by CCTV feeds or other cameras around the country. The full deployment of the program comes three months after James Comey, the bureau’s director, announced that the agency was “piloting the use of mug shots” alongside the bureau’s other databases, in order to catch wanted criminals.
Designed to replace the bureau’s aging fingerprint database, the NGI is different in that it is designed to be multimodal. This means that it will link multiple forms of biometric data to biographical information such as name, address, ID number, age and ethnicity. It’s currently focused on fingerprint and facial records, but it will also be capable of holding iris scans and palm prints, with the possibility of added voice recognition and gate analysis (i.e. how people walk).
As the FBI said in a statement on Monday, Sept. 15th, the NGI, combined with fingerprint database:
[W]ill provide the nation’s law enforcement community with an investigative tool that provides an image-searching capability of photographs associated with criminal identities.
Naturally, the worries that this database will be another step towards “Big Brother” monitoring. However, what is equally (if not more) worrisome is the fact that the details of the program are only a matter of public record thanks to a lawsuit filed by the Electronic Frontier Foundation. The lawsuit was issued in June of 2013, wherein the EFF compelled the FBI to produce records in accordance Freedom of Information Act to detail the program and its face-recognition components.
Citing the FBI documents, the EFF claims that the facial recognition technology is not very reliable and that the way the database returns results is fundamentally flawed, as well as pointing out that it will indiscriminately combine the details of both criminals and non-criminals. Based on their own interpretation, they claim it could fail 20 percent of the time, which could lead to innocent persons becoming the subject of police investigations.
Nevertheless, the bureau remains confident that the system will simplify and enhance law enforcement both locally and federally. As they said of the program when it was first announced back in 2011:
The NGI system has introduced enhanced automated fingerprint and latent search capabilities, mobile fingerprint identification, and electronic image storage, all while adding enhanced processing speed and automation for electronic exchange of fingerprints to more than 18,000 law enforcement agencies and other authorized criminal justice partners 24 hours a day, 365 days a year.
In 2012, the NGI database already contained 13.6 million images (of seven to eight million individuals) and by mid-2013, it had 16 million images. We now know it aims to have 52 million facial records in its system by next year, and those will include some regular citizens. This is another source of concern for the EFF and civil liberties advocates, which is the estimated 4.3 million images taken for non-criminal purposes.
Whenever someone applies for a job that requires a background check, they are required to submit fingerprint records. These records are then entered into federal databases. Right now, the FBI’s fingerprint database contains around 70 million criminal profiles, and 34 million non-criminal records. With the NGI database now up and running, photographs can be submitted by employers and other sources along with fingerprints, which puts non-criminals on file.
The database, while maintained by the FBI, can be searched by law enforcement at all levels. According to Jennifer Lynch, the EFF attorney behind the lawsuit:
Your image would be searched every time there is a criminal investigation. The problem with that is the face recognition is still not 100 percent accurate.” This means that the system is liable to make mismatches with data. If a camera catches a criminal’s face and that is compared to images in the database, there’s no guarantee that it will pop up an accurate result.
What’s more, when the database is searched it does not return a completely positive result; but instead provides the top hits, ranked by probability of match. So if your face just happens to be similar to a snapshot of a criminal caught in CCTV footage, you may become a suspect in that case. Combined with other forms of biometric readers and scanners, it is part of a general trend where privacy is shrinking and public spaces are increasingly permeated by digital surveillance.
This sort of data exchange and on-the-ground scanning will be made possible by – and is one of the explicit aims of – FirstNet, the nationwide broadband network for law enforcement and first responders, colloquially referred to by some as the “internet of cops”. Much like all things pertaining the expansion of the internet into the “internet of things”, this sort of growth has the capacity to affect privacy and become invasive as well as connective.
As always, fears of an “Orwellian” situation can be allayed by reminding people that the best defense is public access to the information – to know what is taking place and how it works. While there are doubts as to the efficacy of the NGI database and the potential for harm, the fact that we know about its inner workings and limitations could serve as a legal defense wherever a potentially innocent person is targeted by it.
And of course, as the issue of domestic surveillance grows, there are also countless efforts being put forth by “Little Brother” to protect privacy and resist identification. The internet revolution cuts both ways, and ensures that everyone registered in the torrential data stream has a degree of input. Fight the power! Peace out!
Sources: motherboard.com, arstechnica.com, singularityhub.com



The authorizations must be regularly renewed by the court for the surveillance to remain in effect, usually every 90 days for U.S. citizens. In none of these cases were the individuals singled out for surveillance because they were suspected of committing or planning a crime. And six years after the period the document covers, none of them has been charged with any crime related to the surveillance.
Civil liberties groups have expressed anger that the five appear to have been targeted largely for having Muslim backgrounds. One such group is the Muslim Advocates, which released the following statement shortly after the story was published:



In a recent security conference held in Canada before the Canadian Security Intelligence Service (CSIS), Alexander expressed the threat in the following, cryptic way:


In its ruling, the court also rejected prosecutors’ notion that the ability to remotely wipe or lock a phone required police to search the devices immediately upon arrest before evidence could be destroyed. The court responded that police can easily prevent evidence from being remotely destroyed by turning the phone off or removing its battery, or putting it into a Faraday cage that blocks radio waves until a search warrant can be obtained.


After holding a hearing on net neutrality in Vermont this past summer, Leahy came to an invariable conclusion:
The new bill would provide a mandate regarding how the FCC deals with any sort of paid prioritization, but it wouldn’t reclassify providers. Also, the new bill would only apply to connections from internet service providers to customers’ homes, commonly referred to as last mile connections. It wouldn’t pertain to “peering”, the deals governing the ways that internet service providers connect with each other or with content providers like Netflix and Google.
The bill may face serious challenges, however. Republicans control the House and have proposed their own bill to block the FCC from reclassifying internet service providers. In this respect, net neutrality is dividing lawmakers along partisan lines, and Republicans are not expected to support the proposed Leahy-Matsui bill. But in theory, a bipartisan agreement could be reached, especially since the Leahy-Matsui bill leaves reclassification off the table.
The Davis case brought this issue to the fore because the tracking was used to make an arrest. Basically, mobile phones send signals to the nearest cell towers so that the communications network system knows where to route a call should one come in. Many providers collect and store the location of towers a customer connects to at the beginning and end of the call for billing purposes. In this case, FBI agentsobtained these records without a search warrant and used them to place the defendant, Quartavious Davis, near the scene of a number of robberies.
Additionally, Smith built on the 1976 case of United States v. Miller, which held that a person does not have Fourth Amendment rights in their bank records because they are the bank’s business records and not the customer’s private data. Together the cases are known as the “third-party doctrine,” which says that you have no Fourth Amendment interest in a third party’s business records because you have voluntarily disclosed information to the business and assumed the risk of that information being further disclosed to the government.
Last December, a District of Columbia judge held that the bulk collection of phone records violates the Fourth Amendment – regardless of Smith – and called the program “almost Orwellian.” Shortly thereafter, a different district court judge relied on Smith to give the program his stamp of approval. This month, a third federal judge was obligated to allow the warrantless collection of records to continue, but opined that the Supreme Court should overturn Smith v. Maryland. 




As documents that illustrate the NSA’s clandestine behavior continue to be leaked, the extents to which the agency has been going to gain supremacy over cyberspace are becoming ever more clear. Thanks to a new series of documents released by Snowden, it now seems that these efforts included two programs who’s purpose was to create a ““useful quantum computer” that would be capable of breaking all known forms of classical encryption.






