FBI begins installation of $1 billion face recognition system across America
Published: 08 September, 2012, 00:38

FBI logo.(Foto fromen.wikipedia.org)
TAGS: SciTech, Information Technology, USA, Security, FBI
Birthmarks, be damned: the FBI has officially started rolling out a state-of-the-art face recognition project that will assist in their effort to accumulate and archive information about each and every American at a cost of a billion dollars.
The Federal Bureau of Investigation has reached a milestone in the development of their Next Generation Identification (NGI) program and is now implementing the intelligence database in unidentified locales across the country, New Scientist reports in an article this week. The FBI first outlined the project back in 2005, explaining to the Justice Department in an August 2006 document (.pdf) that their new system will eventually serve as an upgrade to the current Integrated Automated Fingerprint Identification System (IAFIS) that keeps track of citizens with criminal records across America .
“The NGI Program is a compilation of initiatives that will either improve or expand existing biometric identification services,” its administrator explained to the Department of Justice at the time, adding that the project, “will accommodate increased information processing and sharing demands in support of anti-terrorism.”
“The NGI Program Office mission is to reduce terrorist and criminal activities by improving and expanding biometric identification and criminal history information services through research, evaluation and implementation of advanced technology within the IAFIS environment.”
The agency insists, “As a result of the NGI initiatives, the FBI will be able to provide services to enhance interoperability between stakeholders at all levels of government, including local, state, federal, and international partners.” In doing as such, though, the government is now going ahead with linking a database of images and personally identifiable information of anyone in their records with departments around the world thanks to technology that makes fingerprint tracking seem like kids' stuff.
According to their 2006 report, the NGI program utilizes “specialized requirements in the Latent Services, Facial Recognition and Multi-modal Biometrics areas” that “will allow the FnewBI to establish a terrorist fingerprint identification system that is compatible with other systems; increase the accessibility and number of the IAFIS terrorist fingerprint records; and provide latent palm print search capabilities.”
Is that just all, though? During a 2010 presentation (.pdf) made by the FBI’s Biometric Center of Intelligence, the agency identified why facial recognition technology needs to be embraced. Specifically, the FBI said that the technology could be used for “Identifying subjects in public datasets,” as well as “conducting automated surveillance at lookout locations” and “tracking subject movements,” meaning NGI is more than just a database of mug shots mixed up with fingerprints — the FBI has admitted that this their intent with the technology surpasses just searching for criminals but includes spectacular surveillance capabilities. Together, it’s a system unheard of outside of science fiction.
New Scientist reports that a 2010 study found technology used by NGI to be accurate in picking out suspects from a pool of 1.6 million mug shots 92 percent of the time. The system was tested on a trial basis in the state of Michigan earlier this year, and has already been cleared for pilot runs in Washington, Florida and North Carolina. Now according to this week’s New Scientist report, the full rollout of the program has begun and the FBI expects its intelligence infrastructure to be in place across the United States by 2014.
In 2008, the FBI announced that it awarded Lockheed Martin Transportation and Security Solutions, one of the Defense Department’s most favored contractors, with the authorization to design, develop, test and deploy the NGI System. Thomas E. Bush III, the former FBI agent who helped develop the NGI's system requirements, tells NextGov.com, "The idea was to be able to plug and play with these identifiers and biometrics." With those items being collected without much oversight being admitted, though, putting the personal facts pertaining to millions of Americans into the hands of some playful Pentagon staffers only begins to open up civil liberties issues.
Jim Harper, director of information policy at the Cato Institute, adds to NextGov that investigators pair facial recognition technology with publically available social networks in order to build bigger profiles. Facial recognition "is more accurate with a Google or a Facebook, because they will have anywhere from a half-dozen to a dozen pictures of an individual, whereas I imagine the FBI has one or two mug shots," he says. When these files are then fed to law enforcement agencies on local, federal and international levels, intelligence databases that include everything from close-ups of eyeballs and irises to online interests could be shared among offices.
The FBI expects the NGI system to include as many as 14 million photographs by the time the project is in full swing in only two years, but the pace of technology and the new connections constantly created by law enforcement agencies could allow for a database that dwarfs that estimate. As RT reported earlier this week, the city of Los Angeles now considers photography in public space “suspicious,” and authorizes LAPD officers to file reports if they have reason to believe a suspect is up to no good. Those reports, which may not necessarily involve any arrests, crimes, charges or even interviews with the suspect, can then be filed, analyzed, stored and shared with federal and local agencies connected across the country to massive data fusion centers. Similarly, live video transmissions from thousands of surveillance cameras across the country are believed to be sent to the same fusion centers as part of TrapWire, a global eye-in-the-sky endeavor that RT first exposed earlier this year.
“Facial recognition creates acute privacy concerns that fingerprints do not,” US Senator Al Franken (D-Minnesota) told the Senate Judiciary Committee’s subcommittee on privacy, technology and the law earlier this year. “Once someone has your faceprint, they can get your name, they can find your social networking account and they can find and track you in the street, in the stores you visit, the government buildings you enter, and the photos your friends post online.”
In his own testimony, Carnegie Mellon University Professor Alessandro Acquisti said to Sen. Franken, “the convergence of face recognition, online social networks and data mining has made it possible to use publicly available data and inexpensive technologies to produce sensitive inferences merely starting from an anonymous face.”
“Face recognition, like other information technologies, can be source of both benefits and costs to society and its individual members,” Prof. Acquisti added. “However, the combination of face recognition, social networks data and data mining can significant undermine our current notions and expectations of privacy and anonymity.”
With the latest report suggesting the NGI program is now a reality in America, though, it might be too late to try and keep the FBI from interfering with seemingly every aspect of life in the US, both private and public. As of July 18, 2012, the FBI reports, “The NGI program … is on scope, on schedule, on cost, and 60 percent deployed.”
Stratfor emails reveal secret, widespread TrapWire surveillance system
Published: 10 August, 2012, 11:23
Edited: 11 August, 2012, 01:35

AFP Photo / Valery Hache
TAGS: SciTech, Terrorism, Internet, Information Technology, USA, WikiLeaks, Anonymous, Security, FBI, CIA, DHS
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.
Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it's the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation's ties are assumed to go deeper than even documented.
The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.
Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.
On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.
Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the servers of WikiLeaks supporter sites were reported to be dropping upwards of 40 gigabits of traffic per second. On Friday, WikiLeaks tweeted that their own site was sustaining attacks of 10 Gb/second, adding, "Whoever is running it controls thousands of machines or is able to simulate them."
According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be "analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”
In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.
What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).
“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”
In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product “can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.”
An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.”
Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the "See Something, Say Something" program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.
In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.
News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.
Here’s a predicament: you don’t want the government using high-tech face scanning technology to track every inch of your walk to the post office, but you also don’t want to take a sledgehammer to your neighborhood surveillance camera. What do you do?
Don’t worry, concerned citizen! Big Brother may indeed be watching, but that doesn’t mean you have to make his unwarranted surveillance mission easy to operate.
Although little news has developed as of late in regards to TrapWire, a global surveillance operation that RT blew the cover off of nearly two weeks ago, opposition waged at the world-wide intelligence network is still rampant. Now in one of the newest videos uploaded to the Web to make people aware of TrapWire, a person claiming to be involved with Anonymous is trying to spread a YouTube clip that offers helpful suggestions on how to rage against the machine, properly and peacefully.
Last week, hacktivists proposed several campaigns aimed at eliminating TrapWire feeds by rendering the equipment thought to be linked to the intelligence system completely useless. In lieu of smashing camera lenses and spraying surveillance gear in sudsy liquid, though, a new video, “Anonymous – Fighting TrapWire,” offers instructions on how to prevent the acceleration of the surveillance state by means of passive resistant.
“Many of you have heard the recent stories about TrapWire,” the video begins. “Constant video surveillance is an issue we presently face. However, there are a number of ways that you can combat this surveillance.”
From there, the clip’s narrator offers a few suggestions and helping the average American avoid getting caught in TrapWire without resorting to the destruction of property.
“Wearing a mask is a common way to keep your identity hidden,” the voice explains, “However, a mask does not protect against biometric authentication. In addition, this can also cause problems depending where you want to go.”
“Another way to avoid facial recognition is to tilt your head more than 15 degrees to the side,” the clip continues. “Due to limits in their programming, they will not be able to detect that a face is present, though there are very obvious cons to doing this. Using a similar method, you can distort your face through elaborate makeup. This method also takes advantage of software limits as the computer will not be able to detect a face. But these are tiresome ways that tend to draw attention to yourself. Surely there are better solutions to avoid being added to a database.”
The narrator also explains that laser pointers have been documented to disrupt the powers of surveillance cameras and that, “With nothing more than a hat, some infrared LEDs, some wiring and a 9 Volt battery,” it’s a piece of cake to render oneself completely invisible. By rigging a DIY system of small lights affixed to a baseball cap, the video claims you can create a device that “guarantees complete anonymity to cameras while appearing perfectly normal to the rest of the world.”
“While the government may be hell bent on watching us at every moment of every day, we are not helpless. There are always ways of fighting back. Let's remind them that 1984 was not an instruction manual,” the video concludes.
Replies
AFP - Indian Premier Manmohan Singh warned Saturday over the use of social media to inflame ethnic tensions after online threats and text messages sparked a mass exodus of migrants from southern cities.
The use of "social media to aggravate the communal situation is a new challenge", Singh told a conference of senior police officials in New Delhi.
"We need to fully understand how these new media are used by miscreants... and devise strategies to counter the propaganda that is carried out by these new means," he said.
Tens of thousands of migrant workers and students from India's northeast fled last month from the high-tech centre of Bangalore and other southern cities.
The unprecedented exodus was triggered by inflammatory text messages and videos posted online which warned that Muslims would target them in reprisal for deadly clashes between the tribals and Muslims in remote Assam state.
The government imposed a two-week ban on bulk messages that ended in late August and blocked some Internet pages to halt the spread of incendiary material that could fuel tensions.
Ethnic clashes in India's northeastern state of Assam between the Bodo tribals and Muslims have claimed around 90 lives and prompted some 400,000 people to take refuge in camps.
India is a hugely diverse nation which prizes a reputation for secular tolerance but where ethnic and religious tensions often simmer beneath the surface.
The use of the text messages and videos posted online to stir up fears have been deeply alarming to Indian authorities.
Singh also spoke of "increasing infiltration attempts" by Pakistan-based militants into Indian Kashmir and across India's international border with Pakistan as the South Asian rivals held peace talks in Islamabad.
The warning came as Indian Foreign Minister S.M. Krishna was on a three-day visit to Pakistan, where he was to hold talks with his Pakistani counterpart Hina Rabbani Khar.
Last year, the nuclear-armed rivals resumed a tentative peace process that had collapsed after Islamist gunmen from Pakistan entered the coastal city of Mumbai by sea and killed 166 people in 2008.
While violence in Indian Kashmir has declined, militants are "maintaining their ability to use the sea route" to launch an attack against India, Singh warned.
India and Pakistan have fought three wars since independence in 1947, two of them over Kashmir. Each of them hold part of the Himalayan region but claim it in full.