News and Document archive source
copyrighted material disclaimer at bottom of page

NewsMinesecuritybigbrotherdatabases — Viewing Item


Terror databases

Original Source Link: (May no longer be active)
   http://story.news.yahoo.com/news?tmpl=story2&u=/ap/20021029/ap_wo_en_po/us_terror_biometrics_2

http://story.news.yahoo.com/news?tmpl=story2&u=/ap/20021029/ap_wo_en_po/us_terror_biometrics_2

U.S. military building database of terror suspects' fingerprints, faces, voices
Tue Oct 29, 3:48 PM ET
By JIM KRANE, AP Technology Writer

NEW YORK - The United States is compiling digital dossiers of the irises, fingerprints, faces and voices of terrorism suspects and using the information to track their movements and screen foreigners trying to enter the country.

Since January, military and intelligence operatives have collected the identifying data on prisoners in Afghanistan and at the U.S. naval base in Guantanamo Bay, Cuba. There are also plans to extend the collection process to Iraq in the event of a U.S. invasion.

With this project, the U.S. government has taken biometrics — the measuring of human features — well beyond its most common use to date: verifying people's identities before giving them access to computers or secure areas.

"We're trying to collect every biometric on every bad guy that we can," said Lt. Col. Kathy De Bolt, deputy director of the Army battle lab at Fort Huachuca, Arizona, where the biometric tools being used were developed.

"Any place we go into — Iraq or wherever — we're going to start building a dossier on people of interest to intelligence. Even if they get released, we have face and voice clips. When they come into one of our checkpoints, we can say, `You're this bad guy from here.'"

In biometrics, optical, thermal and audio scanners are used to record a person's features. Mathematical algorithms are then used to reduce that information to digital data. Some biometrics are more reliable than others. For example, the intricate patterns in the iris, the colored part of the eye, are considered better identifiers than even fingerprints.

The U.S. biometric system, known as the Biometrics Automated Toolset, or BAT, includes about 50 laptop computers equipped with scanners. The information on suspects is stored in a central database at a U.S. intelligence agency — De Bolt declined to say which one — in the Washington area.

An additional 400 laptops are being prepared for a possible Iraq invasion, said Anthony Iasso, a software engineer at Northrop Grumman Corp. who leads the project at Fort Huachuca.

So far, BAT data has been shared with both the FBI (news - web sites) and the Immigration and Naturalization Service to help check the identities of incoming foreigners and of foreigners arrested inside the United States, officials said.

"Anytime anyone is taken into custody for investigation by INS, they're checked against this system," said a U.S. immigration official, speaking on condition of anonymity. He would not say whether the data has led to any arrests.

De Bolt and Iasso said the BAT system aims to track the global movements of terrorists.

If a person catalogued and released in Afghanistan later turns up at a checkpoint in the Philippines — perhaps using a different identity — officials might begin investigating the suspect's background and links to others, De Bolt said. The suspect does not have to be apprehended, fingerprinted, or even identified by name.

U.S. authorities are supplementing the dossiers by adding surveillance photos and fingerprints gathered from, say, drinking glasses or magazine covers found in terrorist haunts. A suspect's dossier might also contain text from prisoner interrogations, video or sound clips and digital images of scanned items seized during a search, Iasso said.

The database can also be searched by soldiers via satellite telephone from a battlefield, De Bolt said.

___

On the Net:

Fort Huachuca battle lab: http://futures.hua.army.mil/bcbl

DoD Biometrics: http://www.c3i.osd.mil/biometrics



matrix
3 million americans dna in federal dabase { June 3 2006 }
Aclu warns big brother
Bookstore record seizures { June 22 2003 }
British company offers homeland security database { December 12 2004 }
Everychild in england on safety list database
Expand dna databases
FBI broke law when collection domestic data { June 14 2007 }
Fbi reach in citizens financial records { November 12 2003 }
Fbi terror watch list has half million names { June 13 2007 }
Fbi wants fingerprints iris scans in database { January 15 2008 }
Federal plans database for all college and university students { November 29 2004 }
Feds sift americans banking records for terror { June 23 2006 }
Florida new counterterrorism database { August 6 2003 }
Immigration database lawsuit
Lexisnexis database personal information hacked
Medical info { August 13 2002 }
Minn state run police database shut down { December 18 2003 }
National crime information center database
New computer communcation homeland security network { February 24 2004 }
Nsa mines millions ordinary americans phone records
Parents shoot down statewide immunization database { March 31 2005 }
Pentagon creating student database { June 23 2005 }
Pentagons data collection jetblue
Pre crime
Rfids on sanfransisco library books
Single terror watch list
South carolina storing baby dna { June 25 2002 }
System use 50 times data loc { May 19 2003 }
Terror databases
Terror list denies citizens economic services { March 27 2007 }
Terror list has 5 million { January 20 2004 }
Us fingerprint british and other allies { April 2 2004 }

Files Listed: 32



Correction/submissions

CIA FOIA Archive

National Security
Archives
Support one-state solution for Israel and Palestine Tea Party bumper stickers JFK for Dummies, The Assassination made simple