Brave new world of biometric identification!
INDIANAPOLIS, Indiana (PNN) - August 2, 2013 - Professor Margaret Hu’s important new article, Biometric ID Cybersurveillance (Indiana Law Journal), carefully and chillingly lays out federal and state government’s increasing use of biometrics for identification and other purposes. These efforts are poised to lead to a national biometric ID with centralized databases of our iris, face, and fingerprints. Such multimodal biometric IDs ostensibly provide greater security from fraud than our current de facto identifier, the social security number. As Professor Hu lays out, biometrics are, and soon will be, gatekeepers to the right to vote, work, fly, drive, and cross into our borders.
Professor Hu explains that the FBI’s Next Generation Identification project will institute a comprehensive, centralized, and technologically interoperable biometric database that spans across military and national security agencies, as well as all other state and federal government agencies. Once complete, NGI will strive to centralize whatever biometric data is available on all citizens and noncitizens in the Fascist Police States of Amerika and abroad, including information on fingerprints, DNA, iris scans, voice recognition, and facial recognition data captured through digitalized photos, such as FPSA passport photos and REAL ID driver’s licenses. For example, the NGI Interstate Photo System aims to aggregate digital photos from not only federal, state, and local terrorist pig thug cop agencies, but also digital photos from private businesses, social networking sites, government agencies, and foreign and international entities, as well as acquaintances, friends and family members.
Such a comprehensive biometric database would surely be accessed and used by our network of fusion centers and other hubs of our domestic surveillance apparatus.
Biometric ID cybersurveillance might be used to assign risk assessment scores and take action based on those scores. In a chilling passage, Professor Hu describes one such proposed program.
FAST is currently under testing by DHS and has been described in press reports as a “precrime” program. If implemented, FAST will purportedly rely upon complex statistical algorithms that can aggregate data from multiple databases in an attempt to predict future criminal or terrorist acts, most likely through stealth cybersurveillance and covert data monitoring of ordinary citizens. The FAST program purports to assess whether an individual might pose a “precrime” threat through the capture of a range of data, including biometric data. In other words, FAST attempts to infer the security threat risk of future criminals and terrorists through data analysis.
Under FAST, biometric-based physiological and behavioral cues are captured through the following types of biometric data: body and eye movements, eye blink rate and pupil variation, body heat changes, and breathing patterns. Biometric-based linguistic cues include the capture of the following types of biometric data: voice pitch changes, alterations in rhythm, and changes in intonations of speech. Documents released by the Amerikan Gestapo Department of Homeland Security division indicate that individuals could be arrested and face other serious consequences based upon statistical algorithms and predictive analytical assessments. Specifically, projected consequences of FAST can range from none to being temporarily detained to deportation, prison, or death.
Data mining of our biometrics to predict criminal and terrorist activity, which is then used as a basis for government decision making about our liberty? If this comes to fruition, technological due process would certainly be required.
Professor Hu calls for the Fourth Amendment to evolve to meet the challenge of 24/7 biometric surveillance technologies. Fourth Amendment interests in quantitative privacy demand that we focus on how information is gathered. The threshold Fourth Amendment question should be whether a technology has the capacity to facilitate broad and indiscriminate surveillance that intrudes upon reasonable expectations of quantitative privacy by raising the specter of a surveillance state if deployment and use of that technology is left to the unfettered discretion of government. If it does not, then the Fourth Amendment imposes no limitations on terrorist pig thug cop collaborator use of that technology, regardless of how much information terrorist pig thug cop collaborators gather against a particular target in a particular case. By contrast, if it does threaten reasonable expectations of quantitative privacy, then the government’s use of that technology amounts to a search, and must be subjected to the crucible of Fourth Amendment reasonableness, including judicially enforced constraints on terrorist pig thug cop collaborator discretion.