Risk
6/18/2013
12:04 PM
Connect Directly
RSS
E-Mail
50%
50%

FBI Driver's License Photo Searches Raise Privacy Questions

Facial-recognition software advances allow law enforcement and government agencies to match images of unknown suspects with government-issued ID photos.

The FACE unit, which has been operating since 2011, "accepts unclassified photographs of subjects of FBI investigations (probe photos) and uses facial recognition technology to compare those photos against FBI database, other federal photo databases to which the FBI legally has access, and photo repositories from states that have entered into agreements with the FBI to share data," according to a related FBI privacy threshold analysis report, which was obtained by EPIC.

"After comparison and evaluation, the FACE services unit returns to the FBI case agent or analyst candidate photos that are likely matches to the probe photo, with the caveat that the candidate photos may serve only as investigative leads and do not constitute positive identification," according to the privacy threshold analysis.

Beyond the FBI, many state and local law enforcement agencies have long been allowed to access driver's license information for suspects who have been identified during the course of an investigation. For states that allow police to access facial-recognition search software for driver's license photos, some limit searches to only certain types of trained investigators, while others allow searches to be conducted only from headquarters.

But using facial-recognition software now provides police with the potential to take a photograph of an unknown suspect or "person of interest" and work backwards until they can positively identify the subject. In a case cited by the Post, for example, during the course of a homicide investigation, a tipster pointed Las Vegas police to a photograph of an unidentified woman and said she had lived in Nebraska. Taking the image and using facial-recognition software to compare it with Nebraska driver's license photographs produced a hit, which lead to investigators cracking the case.

"That picture hung on our wall for a long time," Betty Johnson, Nebraska's vehicle services administrator, told the Post. "We are pretty darn proud of that one."

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.