{"id":656,"date":"2019-11-27T08:31:26","date_gmt":"2019-11-27T08:31:26","guid":{"rendered":"https:\/\/guteblog.themesvillage.com\/demo6\/demo1\/?p=656"},"modified":"2019-11-28T07:12:15","modified_gmt":"2019-11-28T07:12:15","slug":"exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works","status":"publish","type":"post","link":"https:\/\/guteblog.themesvillage.com\/demo6\/exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works\/","title":{"rendered":"EXCLUSIVE This Is How the US Military\u2019s Massive Facial Recognition System Works"},"content":{"rendered":"\n<p>Over the past 15 years, the United\nStates military has developed a new addition to its arsenal. The weapon is set\nup around the world, mostly invisible, and grows more powerful by the day.<\/p>\n\n\n\n<p>That weapon is a Huge database,\nPacked with countless images of faces, irises, fingerprints, and DNA\ninformation &#8212; a biometric dragnet of anyone who has come in contact with the\nU.S. military abroad. The 7.4 million identities from the database range from\nsuspected terrorists in military zones to allied soldiers training with U.S.\nforces.<\/p>\n\n\n\n<p>Allows us to focus our lethality.\nIt is like ripping the camouflage netting off the enemy ammunition dump,&#8221;\nwrote Glenn Krizay, director of the Defense Forensics and Biometrics Agency, in\nnotes obtained by OneZero. The Defense Forensics and Biometrics Agency (DFBA)\nis tasked with overseeing the database, also known formally as the Automated\nBiometric Information System (ABIS).<\/p>\n\n\n\n<p>DFBA and its ABIS database have\nReceived little scrutiny or press given the central role they play in U.S.\narmy&#8217;s intelligence operations. However, a newly obtained presentation and\nnotes written by the DFBA&#8217;s manager, Krizay, shows the way the company\nfunctions and biometric identification was used to spot non-U.S. citizens on\nthe battlefield thousands of occasions in the first half of 2019 alone. Once\nflagged, these folks can be identified through surveillance systems on\nbattlefields, close borders around the world, and on military bases.<\/p>\n\n\n\n<p>With greater focus, and if desired,\nlethality.&#8221;<\/p>\n\n\n\n<p>The demonstration also sheds light\nBased on Krizay&#8217;s demonstration, ABIS is joined to the FBI&#8217;s biometric\ndatabase, and this is in turn connected to databases utilized by local and\nstate law enforcement. Ultimately, that means that the U.S. military can easily\nsearch against biometric information of U.S. citizens and cataloged\nnon-citizens. The DFBA is also now working to join its information to the\nDepartment of Homeland Security&#8217;s biometric database. The system will finally\namount to a global surveillance system. In his notes, Krizay summarizes a\npossible scenario in which data from a defendant in Detroit will be run against\ndata collected from&#8221;some mountaintop from Asia.&#8221;<\/p>\n\n\n\n<p>The documents, which can be\nembedded In full below, were obtained via a Freedom of Information Act request.\nThese records were presented earlier this year at a closed-door defense\nbiometrics conference known as the Identity Management Symposium.<\/p>\n\n\n\n<p>ABIS is the result of a massive\nInvestment to biometrics by the U.S. military. In accordance with national\nprocurement documents examined by OneZero, the U.S. military has spent over\n$345 million in biometric database technologies in the previous ten decades.\nLeidos, a defense contractor that mostly focuses on information technologies,\nnow manages the database in question. Ideal Innovations Incorporated functions\na subsection of this database designed to control activity in Afghanistan,\naccording to documents obtained by OneZero through another FOIA request.<\/p>\n\n\n\n<p>All these contracts, combined with\nRevelations surrounding the military&#8217;s massive biometric database initiatives,\npaint an alarming picture: A large and fast growing community of surveillance\nsystems run by the U.S. military and current anywhere the U.S. has deployed\ntroops, vacuuming up biometric data on millions of unsuspecting people.<\/p>\n\n\n\n<p>The military&#8217;s biometrics program,\nStarted in 2004, initially centered on the collection and evaluation of\nfingerprints. &#8220;In a war with no boundaries, uniforms, or defined lines of\nstruggle, understanding who is an enemy is essential,&#8221; John D. Woodward,\nJr., head of the DoD&#8217;s biometrics department, wrote in a 2004 brief.<\/p>\n\n\n\n<p>Defense contracted Lockheed Martin\nto start constructing a biometrics database to get an initial fee of $5\nmillion. The department suggested that it had been just able to successfully\nretrieve five favorable games from 150 biometric searches. A later contract\nwith defense industry giant Northrop resulted in similarly disappointing\nresults with reports of&#8221;system instability, inconsistent processing times,\nsystem congestion, transaction errors, and also a 48-hour outage.&#8221;<\/p>\n\n\n\n<p>By 2016, the DoD had begun to\ncreate Severe investments in biometric data collection. This year, the Defense\nDepartment deputy secretary Robert O. Work designated biometric identification\nas a critical capability for nearly everything the department does: fighting,\nintelligence gathering, law enforcement, safety, company, and\ncounter-terrorism. Military leaders began to speak of biometric technology as\na&#8221;game changer,&#8221; and directives from the DoD not only encouraged\nusing their technology by analysts, but also by soldiers on the ground. Troops\nwere taught to collect biometric information whenever possible.<\/p>\n\n\n\n<p>The Identical year, a defense firm\nNamed Leidos, that had acquired a huge portion of Lockheed&#8217;s government IT\ncompany, secured a $150 million contract to construct and deploy what&#8217;s now\ncalled the DoD ABIS system.<\/p>\n\n\n\n<p>Added over 213,000 people to the\nBEWL, a subset of DoD&#8217;s ABIS database, according to a Government Accountability\nOffice report. During that same period, the Department of Defense arrested or\nkilled more than 1,700 people around the world on the grounds of forensic\nmatches, the GAO report states.<\/p>\n\n\n\n<p>Krizay&#8217;s presentation indicates\nThat the United States utilized biometric matching to identify 4,467 people on\nthe BEWL list in the first two quarters of 2019. The presentation slide breaks\ndown the numbers: 2,728 of those games were of opposing forces carried out in\nthe&#8221;theater,&#8221; or area of where U.S. troops have been controlled.<\/p>\n\n\n\n<p>Presentation slides from Glenn June\n2019. Presentation in full below.<\/p>\n\n\n\n<p>DFBA claims that it has data on 7.4\nMillion unique identities inside its ABIS database, a vast majority of those\nsourced from military operations in Afghanistan and Iraq, according to the\nagency&#8217;s website.<\/p>\n\n\n\n<p>That number is continually growing.\nThe documents suggest the DoD can collect biometric information in detainees,\nvoter enrollments, army enlistments in partner countries, employment vetting,\nor information given to the military.<\/p>\n\n\n\n<p>&#8220;Almost every operation\nprovides The chance to collect biometrics,&#8221; a 2014 document on military\nbiometrics says. &#8220;While quality is desired over amount, maximizing\nenrollments from the database will likely identify more persons of\ninterest&#8221;<\/p>\n\n\n\n<p>A graphic from a 2014 procedural\nDocument representing military usage of biometrics.<\/p>\n\n\n\n<p>ABIS also enables different\nOperations and missions in order to produce their own biometric watchlists.\nThese databases can be be plugged into custom-built military cellular devices\nused to scan fingerprints, irises, and match faces against databases, based on\na 2014 file outlining biometric procedures across the branches of the armed\nforces.<\/p>\n\n\n\n<p>Display slides from Glenn Krizay,\nmanager of the Defense Forensics and Biometrics Agency. June 2019. Presentation\nin full below.<\/p>\n\n\n\n<p>&#8220;Fusion of an established\nidentity And information we all know about allows us to decide and act with\nincreased attention, and if desired, lethality,&#8221; Krizay wrote in his\ndemonstration.<\/p>\n\n\n\n<p>But much is still unknown about how\nThe DFBA and defense agencies utilize facial recognition and biometric\ninformation. A FOIA request which would return information about those systems\nwas denied in part by the U.S. Army.<\/p>\n\n\n\n<p>&#8220;Public release would be tantamount\nTo supplying uncontrolled overseas access,&#8221; the response letter stated.<\/p>\n\n\n\n<p>In his presentation notes for the\nAnnual Identity Management Symposium, Krizay hints at the future of DFBA and\nABIS.<\/p>\n\n\n\n<p>&#8220;We will still need to reveal\nAdversary broker networks, identify and track proxy forces, protect our rear\nareas and lines of communication, accounts for enemy prisoners of war, and\nidentify high value individuals,&#8221; he wrote.<\/p>\n\n\n\n<p>The demonstration suggests that the\nDepartment hopes to integrate biometrics widely into security measures.<\/p>\n\n\n\n<p>&#8220;We have already shown we\ncan&#8217;t Protected our personnel systems,&#8221; he wrote. &#8220;If Wikileaks can\nobtain over a half a thousand of our accounts, what can the likes of China or\nRussia do?&#8221;<\/p>\n\n\n\n<p>DFBA also aims to better\nincorporate ABIS with other similar databases across the government. Even with\nDFBA being pitched as the central point of digital biometrics for the army, the\ndepartment remains not able to share data with the Department of Homeland\nSecurity&#8217;s biometrics system due to formatting issues. In 2021, the DoD is\nexpected to give a contract to get a new version of its biometrics program, one\nwhich brings identification software to the cloud and adds even more\ncapabilities.<\/p>\n\n\n\n<p>&#8220;In case Wikileaks can obtain\nover a Half a thousand of our reports, what can the likes of China or Russia\ndo?&#8221;<\/p>\n\n\n\n<p>Meanwhile, critics of facial\nRecognition and biometric technology both in and outside of government fret\nabout the truth of the technologies and how it is used, particularly in regards\nto bias inherent in a lot of machine learning, as well as privacy violations.<\/p>\n\n\n\n<p>The U.S. Commerce Departments&#8217; When\nimplemented in combat situations, such discrepancies could have deadly\nconsequences for individuals misidentified by automated systems.<\/p>\n\n\n\n<p>&#8220;It&#8217;s unlikely That We&#8217;ll ever\nAchieve a stage where every single demographic is equal in performance\nthroughout the board, whether that is age, sex or race,&#8221; Charles Romine,\nmanager of the Information Technology Lab at NIST, advised the House Homeland\nSecurity Committee in June 2019. &#8220;we would like to understand just exactly\nhow much the difference is.&#8221;<\/p>\n\n\n\n<p>Executives at Leidos, the Builder\nwho built ABIS, don&#8217;t share similar issues about the validity of their data.\n&#8220;Interestinglythe latest U.S. National Institute of Standards and\nTechnology (NIST) evaluations show that the top-performing algorithms really\nwork with black faces compared to white faces,&#8221; Leidos Vice President John\nMears composed on the Leidos site.<\/p>\n\n\n\n<p>It is not clear which tests Mears\nis Referring to on the NIST website, but when contacted concerning that quote,\nNIST did not support his own claim.<\/p>\n\n\n\n<p>&#8220;As a wide blanket statement\nit is Not right,&#8221; a NIST spokesperson informed OneZero, adding a report\nstudying demographics in facial recognition is now underway.<\/p>\n\n\n\n<p>Leidos declined to comment with\nthis Story, also referred all questions regarding the DoD when asked how it\nassessed for prejudice in its facial recognition algorithms.<\/p>\n\n\n\n<p>This technical challenge Isn&#8217;t\nSlowing down the adoption of biometrics. It&#8217;s uncertain how many identities\nhave been added to ABIS because Krizay&#8217;s demonstration, or because DFBA last\nupdated its site. Every indicator suggests the military is simply growing its\ncapacity of collecting a growing number of data.<\/p>\n\n\n\n<p>As that data is further connected\nTo sources like the Department of Homeland Security, the U.S. military&#8217;s\nsurveillance program grows stronger.<\/p>\n\n\n\n<p>&#8220;We Aren&#8217;t wandering in the\ndark,&#8221; Krizay composed in his presentation. &#8220;We all know who people\nare and more of what they Have done&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past 15 years, the United States military has developed a new addition to its arsenal. The weapon is set up around the world, mostly invisible, and grows more powerful by the day. That weapon is a Huge database, Packed with countless images of faces, irises, fingerprints, and DNA information &#8212; a biometric dragnet &#8230;<\/p>\n","protected":false},"author":2,"featured_media":657,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[33,37,102,240],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>EXCLUSIVE This Is How the US Military\u2019s Massive Facial Recognition System Works - Guteblog Demo6<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EXCLUSIVE This Is How the US Military\u2019s Massive Facial Recognition System Works - Guteblog Demo6\" \/>\n<meta property=\"og:description\" content=\"Over the past 15 years, the United States military has developed a new addition to its arsenal. The weapon is set up around the world, mostly invisible, and grows more powerful by the day. That weapon is a Huge database, Packed with countless images of faces, irises, fingerprints, and DNA information &#8212; a biometric dragnet ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/guteblog.themesvillage.com\/demo6\/exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works\/\" \/>\n<meta property=\"og:site_name\" content=\"Guteblog Demo6\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-27T08:31:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-28T07:12:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/guteblog.themesvillage.com\/demo6\/wp-content\/uploads\/sites\/10\/2019\/11\/daniela-roa-h1-ltmjr0bc-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/#website\",\"url\":\"https:\/\/guteblog.themesvillage.com\/demo6\/\",\"name\":\"Guteblog Demo6\",\"description\":\"Wordpress Themes, Plugins, and Tutorials for beginners\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/guteblog.themesvillage.com\/demo6\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/guteblog.themesvillage.com\/demo6\/wp-content\/uploads\/sites\/10\/2019\/11\/daniela-roa-h1-ltmjr0bc-unsplash.jpg\",\"contentUrl\":\"https:\/\/guteblog.themesvillage.com\/demo6\/wp-content\/uploads\/sites\/10\/2019\/11\/daniela-roa-h1-ltmjr0bc-unsplash.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works\/#webpage\",\"url\":\"https:\/\/guteblog.themesvillage.com\/demo6\/exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works\/\",\"name\":\"EXCLUSIVE This Is How the US Military\\u2019s Massive Facial Recognition System Works - Guteblog Demo6\",\"isPartOf\":{\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works\/#primaryimage\"},\"datePublished\":\"2019-11-27T08:31:26+00:00\",\"dateModified\":\"2019-11-28T07:12:15+00:00\",\"author\":{\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/#\/schema\/person\/c9dca833d95ba8c2d921b5f0c4484a7d\"},\"breadcrumb\":{\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/guteblog.themesvillage.com\/demo6\/exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/exclusive-this-is-how-the-us-militarys-massive-facial-recognition-system-works\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/guteblog.themesvillage.com\/demo6\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EXCLUSIVE This Is How the US Military\\u2019s Massive Facial Recognition System Works\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/#\/schema\/person\/c9dca833d95ba8c2d921b5f0c4484a7d\",\"name\":\"guteblog\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/guteblog.themesvillage.com\/demo6\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/guteblog.themesvillage.com\/demo6\/wp-content\/uploads\/sites\/10\/2019\/07\/Image-250-x-250-125x125.png\",\"contentUrl\":\"https:\/\/guteblog.themesvillage.com\/demo6\/wp-content\/uploads\/sites\/10\/2019\/07\/Image-250-x-250-125x125.png\",\"caption\":\"guteblog\"},\"description\":\"Guteblog theme is designed to show off the power of the block editor. It features custom styles for all the default blocks and is built so that what you see in the editor looks like what you'll see on your website. Guteblog theme is designed to be adaptable to a wide range of websites, whether you\\u2019re running a photo blog, launching a new business, or supporting a non-profit. Featuring ample whitespace and google font with classic body text, it's built to be beautiful on all screen sizes.\",\"sameAs\":[\"https:\/\/www.facebook.com\/\",\"https:\/\/instagram.com\/\",\"https:\/\/linkedin.com\/\",\"https:\/\/pinterest.com\/\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/\",\"https:\/\/youtube.com\/\"],\"url\":\"https:\/\/guteblog.themesvillage.com\/demo6\/author\/guteblog\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/posts\/656"}],"collection":[{"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/comments?post=656"}],"version-history":[{"count":1,"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/posts\/656\/revisions"}],"predecessor-version":[{"id":725,"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/posts\/656\/revisions\/725"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/media\/657"}],"wp:attachment":[{"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/media?parent=656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/categories?post=656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guteblog.themesvillage.com\/demo6\/wp-json\/wp\/v2\/tags?post=656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}