recommended reading

FBI gives police free tool to convert photos for facial recognition

Thinkstock

Within weeks, police nationwide should be able to obtain free software for matching photos of unidentified suspects against the FBI’s biometric database of 12 million mug shots, according to an Office of the Director of National Intelligence agency.

The FBI and Homeland Security Department are experimenting with facial recognition to determine the real names of illegal immigrants, identify persons of interest in candid photos, and fulfill other law enforcement responsibilities. To make that happen, however, law enforcement agencies at every level of government must share images with compatible technology that they can afford, former FBI officials say.

So, the bureau is offering agencies some of the equipment at no cost.

“Later this summer the FBI will deploy the Universal Face Workstation software, a free-of-charge client application that will provide users with the tools for conducting and managing facial/photo searches with a minimal resource investment,” Kshemendra Paul, program manager for the Information Sharing Environment within the Office of the Director of National Intelligence, wrote in his annual report to Congress.

The document notes the FBI database under development, the $1 billion Next-Generation Identification system, recently began testing facial recognition on images of alleged perpetrators uploaded by several state agencies. Currently, only governments with operational facial recognition technology can participate in the trial.

Those states now have access “to a national gallery of more than 12 million legally collected mug-shot photos to be searched in aid of investigations,” Paul wrote. Facial searches could one day be faster and more accurate than police lineups, advocates say.

This is not the first time the bureau has offered free biometric software to law enforcement partners.

“We provided universal latent workstations for palm prints,” Thomas E. Bush III, who helped develop NGI's system requirements while assistant director of the FBI’s criminal justice information services division between 2005 and 2009, said earlier this summer. “And we’ll probably do the same thing for face and iris.”

The existing workstation software codes images in a standard format so that authorities can cross-check their photos against pictures in any biometric ID system “from around the neighborhood and around the state to around the nation,” note the software download Web page.

The application accepts scanned images, photos from digital cameras or pictures saved as digital files. The tool then translates each copy into a new file that can be matched against images in NGI, or deposited there for others to search.

Authorized users only need a computer and email connection to the FBI’s database, according to the product specifications.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.