Biometric ID and Immigration Reform
Real ID Mandate Resisted in Virginia
January 3, 2009AP - Since the law's enactment in 2005, at least 42 states have considered anti-Real ID legislation, and more than half have passed measures either forbidding their states from participating or urging Congress to amend or repeal the law. At least five states have gone in the other direction, passing bills bringing their programs into compliance. Critics say they expect other states to join Virginia this year to fight against Real ID.
The program was born out of the commission that looked into the terrorist attacks of Sept. 11, 2001. It recommended that the U.S. improve its system of issuing identification documents because the hijackers had numerous licenses and state IDs. Congress approved legislation requiring states to issue licenses and ID cards that meet certain security standards.
The new IDs will be required for federal purposes, such as boarding an airplane or entering a federal building. Other federal identification, including passports and military IDs, also will be accepted.
“The bottom line is that citizens of states who do not move forward with the Real ID mandate from Congress will see real consequences,” said Laura Keehner, a spokeswoman for the Department of Homeland Security, which is in charge of the program.States had until May 2008 to implement Real ID, but the department extended that until Dec. 31, 2009. If they need more time and have met certain benchmarks, states can request an extension until May 11, 2011.
The opposition has centered around cost and privacy concerns. Homeland Security originally estimated it would cost states $14 billion to implement the program, but in January it loosened the restrictions and said the added flexibility would bring the cost to under $4 billion. Homeland Security and other agencies have given out about $500 million in grants, but state officials say that’s not enough.
Critics also claim that Real ID diminishes privacy, and they object to a national ID that would have to be shown for everyday identification purposes...
Whistleblower Says NSA Monitors Everybody, Targets Reporters and Dissidents
January 27, 2009Daily Tech - In a scenario that sounds like the ramblings of a conspiracy theorist, former NSA analyst and now-whistleblower Russell Tice unveiled a massive NSA spying and wiretap program, which he claims vacuumed up an astonishing amount of communications and financial data on journalists and innocent Americans.
The program, which he claims is a remnant of the defunded 2003 “Total Information Awareness” initiative, swept up metadata (call length, envelope information, and so on) on nearly all forms of communications in the United States, as well as full communications logs for targets selected through analysis and other methods.
Tice, who previously helped shed light on the NSA’s warrantless wiretapping facilities at AT&T switching offices, said in a Wednesday interview with MSNBC’s Keith Olbermann that the NSA “had access to all Americans’ communications — faxes, phone calls, and their computer communications.”
“It didn’t matter whether you were in Kansas, in the middle of the country, and you never made foreign communications at all. They monitored all communications.”While working for the NSA, Tice says he was tasked with looking at U.S. news, reporting, and journalist organizations, specifically for the purpose of excluding them from NSA analysis. According to Tice, however, that order was just a cover story for something completely opposite. The news organizations he targeted were instead monitored by the NSA “24/7 and 365 days a year.”
“I started to investigate that. That’s about the time when they came after me to fire me,” he said.In a follow-up interview aired Thursday, Tice revealed that the communications data was then “married in” with financial records and credit card transactions.
“This bait and switch idea, the ‘this is the discard pile, we’re not going to look at the media’ [where] it becomes apparent to you that the ‘discard’ pile is in fact the ‘save’ pile… how did that become apparent to you?” asked Olbermann.
“Well, as I was going for support for [a] particular organization, and it sort of was dropped to me that, you know, ‘this is done 24/7’,” replied Tice. “I would say, ‘I need collection at this time, at this point, for a window of time,’ and I would say, ‘will we have the capability at this particular point?’ in positioning assets.”
“I was ultimately told, ‘we don’t have to worry about that, because we’ve got it covered all the time.’ That’s when it clicked in my head that this was not being on a one-sy basis … this is something that’s happening all the time,” he said.
“Throwing that information in too… your credit card records, where you spent your money … do you have any idea what this stuff was used for?” asked Olbermann.Using criteria designed for catching terrorist-like activity – at one point, Tice speculated that if terrorists make short, 1- to 2- minute calls, then this might be a red flag applied to all such calls, such as “ordering pizza” – tens of thousands of innocent Americans were snagged into the system.
“The obvious explanation would be, if you did have a potential terrorist, you’d want to know where they’re spending money, whether they purchased an airline ticket, that sort of thing,” Tice replied.
“This is garnered from algorithms that have been put together to try to just dream up scenarios that might be … associated with how a terrorist could operate,” said Tice on Thursday. “If someone just talked about the daily news and mentioned something about the Middle East, they could easily be brought to the forefront of having that little flag put by their name that says potential terrorist.”Drawn up from anyone with a red flag, the combined communications and financial data could sit with a person for years, digitized and warehoused away.
“Then all the sudden it marries up with something else 10 years from now, and they get put on a no-fly list [without having] a clue why,” explained Tice.In most cases, spied-upon Americans didn’t do anything overtly suspicious to trigger surveillance.
The NSA Wants to Know How and WHAT You Think
Obama’s Change: Expanding the Power of the NSC and Shadow Government
Obama's NSC Will Get New Power
The Bill Nobody Noticed: National DNA Databank
December 18, 2008NaturalNews - In April of 2008, President Bush signed into law S.1858 which allows the federal government to screen the DNA of all newborn babies in the U.S. This was to be implemented within 6 months meaning that this collection is now being carried out. Congressman Ron Paul states that this bill is the first step towards the establishment of a national DNA database.
S.1858, known as The Newborn Screening Saves Lives Act of 2007, is justified as a "national contingency plan" in that it represents preparation for any sort of public health emergency. The bill states that the federal government should "continue to carry out, coordinate, and expand research in newborn screening" and "maintain a central clearinghouse of current information on newborn screening... ensuring that the clearinghouse is available on the Internet and is updated at least quarterly". Sections of the bill also make it clear that DNA may be used in genetic experiments and tests. Read the full bill: http://www.govtrack.us/congress/bill.xp ...
Twila Brase, president of the Citizens' Council on Health Care warns that this new law represents the beginning of nationwide genetic testing. Brase states that S.1858 and H.R. 3825, the House version of the bill, will:
- Establish a national list of genetic conditions for which newborns and children are to be tested.
- Establish protocols for the linking and sharing of genetic test results nationwide.
- Build surveillance systems for tracking the health status and health outcomes of individuals diagnosed at birth with a genetic defect or trait.
- Use the newborn screening program as an opportunity for government agencies to identify, list, and study "secondary conditions" of individuals and their families.
- Subject citizens to genetic research without their knowledge or consent ...
How RFID Tags Could Be Used to Track Unsuspecting People
Average consumers may not realize how many RFID tags they carry around. The devices are embedded in personal items and even some clothing.August 26, 2008
Scientific American - If you live in a state bordering Canada or Mexico, you may soon be given an opportunity to carry a very high tech item: a remotely readable driver’s license. Designed to identify U.S. citizens as they approach the nation’s borders, the cards are being promoted by the Department of Homeland Security as a way to save time and simplify border crossings. But if you care about your safety and privacy as much as convenience, you might want to think twice before signing up.
The new licenses come equipped with radio-frequency identification (RFID) tags that can be read right through a wallet, pocket or purse from as far away as 30 feet. Each tag incorporates a tiny microchip encoded with a unique identification number. As the bearer approaches a border station, radio energy broadcast by a reader device is picked up by an antenna connected to the chip, causing it to emit the ID number. By the time the license holder reaches the border agent, the number has already been fed into a Homeland Security database, and the traveler’s photograph and other details are displayed on the agent’s screen.
Although such “enhanced” driver’s licenses remain voluntary in the states that offer them, privacy and security experts are concerned that those who sign up for the cards are unaware of the risk: anyone with a readily available reader device—unscrupulous marketers, government agents, stalkers, thieves and just plain snoops—can also access the data on the licenses to remotely track people without their knowledge or consent. What is more, once the tag’s ID number is associated with an individual’s identity—for example, when the person carrying the license makes a credit-card transaction—the radio tag becomes a proxy for that individual. And the driver’s licenses are just the latest addition to a growing array of “tagged” items that consumers might be wearing or carrying around, such as transit and toll passes, office key cards, school IDs, “contactless” credit cards, clothing, phones and even groceries.
RFID tags have been likened to barcodes that broadcast their information, and the comparison is apt in the sense that the tiny devices have been used mainly for identifying parts and inventory, including cattle, as they make their way through supply chains. Instead of having to scan every individual item’s Universal Product Code (UPC), a warehouse worker can register the contents of an entire pallet of, say, paper towels by scanning the unique serial number encoded in the attached RFID tag. That number is associated in a central database with a detailed list of the pallet’s contents. But people are not paper products. During the past decade a shift toward embedding chips in individual consumer goods and, now, official identity documents has created a new set of privacy and security problems precisely because RFID is such a powerful tracking technology. Very little security is built into the tags themselves, and existing laws offer people scant protection from being surreptitiously tracked and profiled while living an increasingly tagged life.
Beyond Barcodes
The first radio tags identified military aircraft as friend or foe during World War II, but it was not until the late 1980s that similar tags became the basis of electronic toll-collection systems, such as E-ZPass along the East Coast. And in 1999 corporations began considering the tags’ potential for tracking millions of individual objects. In that year Procter & Gamble and Gillette (which have since merged to become the world’s largest consumer-product manufacturing company) formed a consortium with Massachusetts Institute of Technology engineers, called the Auto-ID Center, to develop RFID tags that would be small, efficient and cheap enough to eventually replace the UPC barcode on everyday consumer products.
But the possibility that the security of such cards could be compromised is just one reason for concern. Even if tighter data-protection measures could someday prevent unauthorized access to RFID-card data, many privacy advocates worry that remotely readable identity documents could be abused by governments that wish to tightly monitor and control their citizens.
China’s national ID cards, for instance, are encoded with what most people would consider a shocking amount of personal information, including health and reproductive history, employment status, religion, ethnicity and even the name and phone number of each cardholder’s landlord. More ominous still, the cards are part of a larger project to blanket Chinese cities with state-of-the-art surveillance technologies. Michael Lin, a vice president for China Public Security Technology, a private company providing the RFID cards for the program, unflinchingly described them to the New York Times as “a way for the government to control the population in the future.” And even if other governments do not take advantage of the surveillance potential inherent in the new ID cards, ample evidence suggests that data-hungry corporations will.
Living a Tagged Life
According to the patent, here is how it would work in a retail environment: an “RFID tag scanner located [in the desired tracking location]… scans the RFID tags on [a] person…. As that person moves around the store, different RFID tag scanners located throughout the store can pick up radio signals from the RFID tags carried on that person and the movement of that person is tracked based on these detections…. The person tracking unit may keep records of different locations where the person has visited, as well as the visitation times.”
Protecting the Public
If RFID tags can enable an amusement park to capture detailed, personalized videos of thousands of people a day, imagine what a determined government could do—not to mention marketers or criminals. That is why my colleagues in the privacy community and I have so firmly opposed the use of RFID in government-issued identity documents or individual consumer items. As far back as 2003, my organization, CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering)—along with the Privacy Rights Clearinghouse, the Electronic Privacy Information Center, the Electronic Frontier Foundation, the American Civil Liberties Union, and 40 other leading privacy and civil liberties advocates and organizations recognized this threat and issued a position paper that condemned the tracking of human beings with RFID as inappropriate.
In response to these concerns, dozens of U.S. states have introduced RFID consumer-protection bills—which have all been either killed or gutted by heavy opposition from lobbyists for the RFID industry. When the New Hampshire Senate voted on a bill that would have imposed tough regulations on RFID in 2006, a last-minute floor amendment replaced it with a two-year study instead. (I was appointed by the governor to serve on the resulting commission.) That same year a California bill that would have prohibited the use of RFID in government-issued documents passed both houses of the legislature, only to be vetoed by Governor Arnold Schwarzenegger.
On the federal level, no high-profile consumer-protection bills related to RFID have been passed. Instead, in 2005, the Senate Republican High Tech Task Force praised RFID applications as “exciting new technologies” with “tremendous promise for our economy” and vowed to protect RFID from regulation or legislation.
Meanwhile the RFID train is barreling forward. Gigi Zenk, a spokesperson at Washington’s licensing agency, recently confirmed that there are 10,000 enhanced licenses “on the street now—that people are actually carrying.” That’s a lot of potential for abuse, and it will only grow. The state recently mustered a halfhearted response, passing a law that designates the unauthorized reading of a tag “for the purpose of fraud, identity theft, or for any other illegal purpose” as a class C felony, subject to five years in prison and a $10,000 fine. Nowhere in the law does it say, however, that scanning for other purposes such as marketing—or perhaps “to control the population”—is prohibited. We ignore these risks at our peril.
No comments:
Post a Comment