Government database

Last updated

A government database collects information for various reasons, including climate monitoring, securities law compliance, geological surveys, patent applications and grants, surveillance, national security, border control, law enforcement, public health, voter registration, vehicle registration, social security, and statistics.

Contents

Canada

European Union

Denmark

France

Germany

In late 2010, the database contained DNA profiles of over 700,000 individuals and in September 2016 it contained 1,162,304 entries. [40]

Schengen area

Switzerland

United Kingdom

Various government bodies maintain databases about citizens and residents of the United Kingdom. Under the Data Protection Act 1998 and the Protection of Freedoms Act 2012, legal provisions exist that control and restrict the collection, storage, retention, and use of information in government databases.

Active

Disbanded

India

NATGRID: India is setting up a national intelligence grid called NATGRID, [60] which will become operational in 2013. NATGRID would allow access to each individual's data ranging from land records, Internet logs, air and rail PNR, phone records, gun records, driving license, property records, insurance, and income tax records in real time and with no oversight. [61] With a UID from the Unique Identification Authority of India being given to every Indian from February 2011, the government would be able track people in real time. A national population registry of all citizens will be established by the 2011 census, during which fingerprints and iris scans would be taken along with GPS records of each household. [62] [63] Access to the combined data will be given to 11 agencies, including the Research and Analysis Wing, the Intelligence Bureau, the Enforcement Directorate, the National Investigation Agency, the Central Bureau of Investigation, the Directorate of Revenue Intelligence and the Narcotics Control Bureau.

Interpol

Russia

Pakistan

United States

See also

Related Research Articles

<span class="mw-page-title-main">DNA profiling</span> Technique used to identify individuals via DNA characteristics

DNA profiling is the process of determining an individual's deoxyribonucleic acid (DNA) characteristics. DNA analysis intended to identify a species, rather than an individual, is called DNA barcoding.

<span class="mw-page-title-main">Forensic science</span> Application of science to criminal and civil laws

Forensic science, also known as criminalistics, is the application of science principles and methods to support legal decision-making in matters of criminal and civil law.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

<span class="mw-page-title-main">Identity theft</span> Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been legally defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

Biometrics are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

An identity document is any document that may be used to prove a person's identity. If issued in a small, standard credit card size form, it is usually called an identity card, or passport card. Some countries issue formal identity documents, as national identification cards that may be compulsory or non-compulsory, while others may require identity verification using regional identification or informal documents. When the identity document incorporates a person's photograph, it may be called photo ID.

Automated fingerprint identification is the process of using a computer to match fingerprints against a database of known and unknown prints in the fingerprint identification system. Automated fingerprint identification systems (AFIS) are primarily used by law enforcement agencies for criminal identification purposes, the most important of which is the identification of a person suspected of committing a crime or linking a suspect to other unsolved crimes.

Forensic identification is the application of forensic science, or "forensics", and technology to identify specific objects from the trace evidence they leave, often at a crime scene or the scene of an accident. Forensic means "for the courts".

<span class="mw-page-title-main">DNA Analysis Backlog Elimination Act of 2000</span> United States Act of Congress

The DNA Analysis Backlog Elimination Act of 2000 is a United States Act of Congress that primarily allows US states to carry out DNA analyses for use in the FBI's Combined DNA Index System and to collect and analyse DNA samples.

A DNA database or DNA databank is a database of DNA profiles which can be used in the analysis of genetic diseases, genetic fingerprinting for criminology, or genetic genealogy. DNA databases may be public or private, the largest ones being national DNA databases.

<span class="mw-page-title-main">Combined DNA Index System</span> United States national DNA database

The Combined DNA Index System (CODIS) is the United States national DNA database created and maintained by the Federal Bureau of Investigation. CODIS consists of three levels of information; Local DNA Index Systems (LDIS) where DNA profiles originate, State DNA Index Systems (SDIS) which allows for laboratories within states to share information, and the National DNA Index System (NDIS) which allows states to compare DNA information with one another.

The Integrated Automated Fingerprint Identification System (IAFIS) is a computerized system maintained by the Federal Bureau of Investigation (FBI) since 1999. It is a national automated fingerprint identification and criminal history system. IAFIS provides automated fingerprint search capabilities, latent searching capability, electronic image storage, and electronic exchange of fingerprints and responses. IAFIS houses the fingerprints and criminal histories of 70 million subjects in the criminal master file, 31 million civil prints and fingerprints from 73,000 known and suspected terrorists processed by the U.S. or by international law enforcement agencies.

Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Rapid DNA describes the fully automated process of developing a CODIS Core STR profile or other STR profile from a reference sample buccal swab. The “swab in – profile out” process consists of automated extraction, amplification, separation, detection and allele calling without human intervention. A machine designed to perform such rapid DNA analysis is called a DNA "magic box" by enforcement authorities.

Biometrics refers to the automated recognition of individuals based on their biological and behavioral characteristics, not to be confused with statistical biometrics; which is used to analyse data in the biological sciences. Biometrics for the purposes of identification may involve DNA matching, facial recognition, fingerprints, retina and iris scanning, voice analysis, handwriting, gait, and even body odor.

Biometrics are used by the South African government to combat fraud and corruption and to increase the efficiency of service delivery to the public.

Criminal records in the United States contain records of arrests, criminal charges and the disposition of those charges. Criminal records are compiled and updated on local, state, and federal levels by government agencies, most often law enforcement agencies. Their primary purpose is to present a comprehensive criminal history for a specific individual.

Maryland v. King, 569 U.S. 435 (2013), was a decision of the United States Supreme Court which held that a cheek swab of an arrestee's DNA is comparable to fingerprinting and therefore, a legal police booking procedure that is reasonable under the Fourth Amendment.

DNA encryption is the process of hiding or perplexing genetic information by a computational method in order to improve genetic privacy in DNA sequencing processes. The human genome is complex and long, but it is very possible to interpret important, and identifying, information from smaller variabilities, rather than reading the entire genome. A whole human genome is a string of 3.2 billion base paired nucleotides, the building blocks of life, but between individuals the genetic variation differs only by 0.5%, an important 0.5% that accounts for all of human diversity, the pathology of different diseases, and ancestral story. Emerging strategies incorporate different methods, such as randomization algorithms and cryptographic approaches, to de-identify the genetic sequence from the individual, and fundamentally, isolate only the necessary information while protecting the rest of the genome from unnecessary inquiry. The priority now is to ascertain which methods are robust, and how policy should ensure the ongoing protection of genetic privacy.

References

  1. 1 2 3 4 5 6 "National Forensic DNA Databases" Archived 2019-05-10 at the Wayback Machine , Andrew D. Thibedeau, Council for Responsible Genetics, 12 January 2011. Retrieved 6 October 2013.
  2. "National DNA Data Bank", Royal Canadian Mounted Police, 1 September 2006. Retrieved 7 October 2013.
  3. "Statistics for national DNA Data Bank", Royal Canadian Mounted Police, 30 September 2013. Retrieved 7 October 2013.
  4. "What is GEDS?", Government Electronic Directory Services, Government of Canada, 16 April 2012. Retrieved 7 October 2013.
  5. 1 2 "National Homelessness Information System" Archived 2013-10-01 at the Wayback Machine , Human Resources and Skills Development Canada, 20 February 2013. Retrieved 7 October 2013.
  6. "SEDAR Home Page".
  7. " 'Eurodac' system", Europa: Summaries of EU legislation, 11 August 2010. Retrieved 8 October 2013.
  8. "Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC", L 105/54, Official Journal of the European Union, 13 April 2006. Retrieved 20 September 2013.
  9. "Joint letter to Cecilia Malmström, European Commissioner for Home Affairs, from Dr. Patrick Breyer and 105 additional parties", 22 June 2010.
  10. "Executive Order on the Civil Registration System Act" Archived 2014-08-11 at the Wayback Machine , Executive Order No. 5 of 9 January 2013, unofficial translation by GlobalDenmark Translations, July 2013. Retrieved 6 October 2013.
  11. "About the Biobank", Danish National Biobank, 20 March 2012. Retrieved 7 October 2013.
  12. "Overview and access", Biobank Register, Danish National Biobank, 21 March 2012. Retrieved 7 October 2013.
  13. 1 2 "Main registers used", Biobank Register, Danish National Biobank, 19 March 2012. Retrieved 7 October 2013.
  14. "Clinical Biochemistry, Immunology & Genetics", Statens Serum Institut, 28 August 2013. Retrieved 7 October 2013.
  15. "Blodbank som forbryderalbum" (Blood Bank as criminal album), Jens Ejsing, Berlingske Tidende, 16 September 2007, (in Danish). Retrieved 7 October 2013.
  16. "Carnet B", Wikipédia en français, 14 July 2013. Retrieved 15 October 2013.
  17. Jean-Jacques Becker, Le Carnet B. (1973), Le carnet B: Les pouvoirs publics et l'antimilitarisme avant la guerre de 1914, Klincksieck, Paris, 226 p., ISBN   2252015195.
  18. Verdict on Vichy: Power and Prejudice in the Vichy France Regime, Michael Curtis, Arcade Publishing (New York), 2003, 440 pp, ISBN   1559706899. Retrieved 15 October 2013.
  19. "Insee Number", FamilySearch (The Church of Jesus Christ of Latter-day Saints), 7 October 2010. Retrieved 15 October 2013.
  20. "ID number policy: Report on France", Fanny Coudert, Study on ID number policies (D13.3), Future of Identity in the Information Society (FIDIS), 14 September 2007. Retrieved 15 October 2013.
  21. "Definition: National Directory for the Identification of Natural Persons / RNIPP", National Institute of Statistics and Economic Studies (INSEE). Retrieved 15 October 2013.
  22. "Safari et la (nouvelle) chasse aux Français" ("Safari and the (new) French hunting"), Jean-Marc Manach, M Blogs, La Monde, 23 December 2010. Retrieved 15 October 2013.
  23. "Cnil : trente ans contre la « tyrannie de l'ordinateur »" (CNiL: Thirty years against the "tyranny of the computer"), Chloé Leprince, Rue89, 6 January 2006. Retrieved 15 October 2013.
  24. "Les fichiers policiers contrôlés par la CNiL" (Police files controlled by the CNiL), Le Monde , 13 July 2007, (in French).
  25. "Système de traitement des infractions constatées" (STIC, Processing System for Recognized Offences) Archived 2007-05-18 at the Wayback Machine , Fichage policier: Faites valoir vos droits!, Fédération Informatique et Libertés, 2002, (in French).
  26. 1 2 "Les fichiers STIC et JUDEX détournés de leur destination initiale" Archived 2007-09-27 at the Wayback Machine , Human Rights League (LDH), 3 November 2006, (in French).
  27. "A 8 et 11 ans, ils sont menacés de fichage génétique pour vol de jouets" (in French) ("At 8 and 11 years, they are threatened by genetic filing for stealing toys"), Le Monde , 6 May 2007. Retrieved 15 October 2013.
  28. "Written Question No.: 68468", (in French), AssemblÈE Nationale, 6 April 2010. Retrieved 15 October 2013.
  29. "FIJAIS: Fichier judiciaire automatisé des auteurs d'infractions sexuelles" Archived 2013-10-16 at the Wayback Machine ("FIJAIS: Automated Criminal File of Sex Offenders"), Commission nationale de l'informatique et des libertés (CNiL), 10 June 2009. Retrieved 15 October 2013.
  30. 1 2 "National databases for law enforcement and security purposes" Archived 2014-10-21 at the Wayback Machine , Chapter II: Surveillance policies, Country report for France, Privacy International, 1 January 2011. Retrieved 15 October 2013.
  31. "Généralisation du fichage biométrique volontaire des voyageurs dans les aéroports français" Archived 2007-09-09 at the Wayback Machine (Generalization of the voluntary filing of biometric profiles for travelers in French Airports), Le Monde (AFP), 8 August 2007, (in French).
  32. "French Parliament approves Net censorship". La Quadrature du Net. 2010-02-11. Retrieved 16 February 2010.
  33. "Un superlogiciel pour traquer la délinquance" (A grand software platform to track crime), Jean-Marc Leclerc, Le Figaro , 22 June 2009, (in French).
  34. "Le fichier Périclès, grand mix de données personnelles" (The Pericles file, a large aggregation of personal data), Olivier Dumons , Le Monde , 29 June 2009, (in French).
  35. "European Court of Human Rights finds that storing fingerprint data is privacy violation", Cédric Lindenmann, Lexology, 14 June 2013. Retrieved 8 October 2013.
  36. "GeneWatch UK - Germany". genewatch.org. Retrieved 29 December 2016.
  37. "Germany's DNA database" . Retrieved 29 December 2016.
  38. "National DNA Intelligence Databases in Europe – Report on the Current Situation" (PDF). Retrieved 29 December 2016.
  39. Peerenboom, E. (1 June 1998). "Central criminal DNA database created in Germany". Nature Biotechnology. 16 (6): 510–511. doi:10.1038/nbt0698-510. ISSN   1087-0156. PMID   9624672. S2CID   28662677.
  40. Käppner, Joachim. "Justiz: Verräterische Proben". Süddeutsche Zeitung (in German). Retrieved 29 December 2016.
  41. "The Schengen Information System (SIS)", The Schengen area and cooperation, Europa, 3 August 2009.
  42. "The British Secret Service in Neutral Switzerland" Archived 2007-04-30 at the Wayback Machine , Daniele Ganser, Intelligence and National Security, Vol. 20, No. 4 (December 2005), pp. 553–80 (p. 557).
  43. "DNA database helps crack crime", Swissinfo (International Service of the Swiss Broadcasting Corporation), 24 June 2002. Retrieved 6 October 2013.
  44. "Evaluation of the 4-year test period of the Swiss DNA database", P. Voegeli, C. Haas, A. Kratzer, and W. Bär, International Congress Series, 1288 (2006), Elsevier, pp. 731-733, ISSN   0531-5131, doi : 10.1016/j.ics.2005.10.058. Retrieved 6 October 2013.
  45. "Fingerprint Database - IDENT 1" Archived 2013-07-24 at the Wayback Machine , The Scottish Government, 14 May 2013. Retrieved 13 October 2013.
  46. "Motorists to give fingerprints", BBC News, 22 November 2006. Retrieved 5 October 2013.
  47. "The issue - Biometric identification" Archived 2013-10-17 at the Wayback Machine , TES Connect (Times Educational Supplement), 13 August 2010. Retrieved 18 September 2013.
  48. 1 2 "New ECHR judgment: DNA database breaches human rights!", Nick Graham and Shona Harper, Lexology, 23 December 2008. Retrieved 8 October 2013.
  49. Scullion, Aaron (25 September 2003). "Smart cards track commuters". BBC News.
  50. Sheth, Niraj (2 November 2007). "London's Congestion Fee Begets Pinched Plates". Wall Street Journal. Retrieved 2 November 2007.
  51. "Paying billions for our database state", Henry Porter and Afua Hirsch, Liberty Central Blog, The Guardian, 24 April 2009. Retrieved 18 September 2013.
  52. "Fears over privacy as police expand surveillance project", Paul Lewis, The Guardian, 14 September 2008. Retrieved 18 September 2013.
  53. "Protection of Freedoms Bill", Home Office, 11 February 2011. Retrieved 28 September 2013.
  54. "Giant database plan 'Orwellian'". BBC News. 15 October 2008. Retrieved 17 October 2008. Lib Dem home affairs spokesman Chris Huhne said: 'The government's Orwellian plans for a vast database of our private communications are deeply worrying.' 'I hope that this consultation is not just a sham exercise to soft-soap an unsuspecting public.'
  55. "Bill stages — Identity Documents Act 2010", UK Parliament, 21 December 2010. Retrieved 28 September 2013.
  56. "Identity Cards Bill", House of Lords, 30 January 2006. Retrieved 28 September 2013.
  57. "Comment: ID cards by the backdoor?" Archived 2010-06-11 at the Wayback Machine , Ian Dunt, Politics.co.uk, 6 June 2010. Retrieved 7 June 2010.
  58. "Quick answer: Identity cards", UK Government, 30 May 2013. Retrieved 28 September 2013.
  59. Espiner, Tom (11 February 2011), Government destroys final ID cards data Archived 2011-02-13 at the Wayback Machine , ZDNet UK, 10 February 2011. Retrieved 13 June 2011.
  60. "Centralised System to Monitor Communications", reply by Shri Gurudas Kamat, Minister of State for Communications and Information Technology in Rajya Sabha, Press Information Bureau, 26 November 2009. Retrieved 17 September 2013.
  61. Mohan, Vishwa (2 October 2009). "MHA to make security data tamper-free". The Times Of India. TNN. Retrieved 17 September 2013.
  62. India to prepare NPR with 2011 Census Archived 2012-09-05 at the Wayback Machine , iGovernment (9.9 Mediaworx), 24 April 2008. Retrieved 17 September 2013.
  63. "Election Commission to use Census data, GPS to track voters", Rediff (Delhi), 25 August 2008. Retrieved 17 September 2012.
  64. "Fingerprints - A Unique Identity" Archived 2016-04-02 at the Wayback Machine , Interpol, Youngzine, 29 July 2012. Retrieved 8 October 2013.
  65. " Russian Spies, They've Got Mail: Regulations Allow Security Services to Tap Into Systems of Internet Providers", Sharon LaFraniere, Washington Post, 7 March 2002. Retrieved 6 October 2013.
  66. "Russia - Surveillance of communications", Statewatch News, June 2000. Retrieved 6 October 2013.
  67. 1 2 3 4 5 "National ID and the REAL ID Act", Electronic Privacy Information Center. Retrieved October 11, 2013.
  68. Office of the Inspector General, Social Security Administration, Performance Indicator Audit Archived 2011-06-05 at the Wayback Machine , 2005.
  69. "Social Security Administration's Death Master File". National Technical Information Service. Retrieved 25 January 2013.
  70. Mark E. Hill and Ira Rosenwaike, "The Social Security Administration’s Death Master File: The Completeness of Death Reporting at Older Ages", Social Security Bulletin, Vol. 64, No. 1 (2001/2002), p. 45.
  71. "Social Security Death Index Interactive Search". RootsWeb.(subscription required)
  72. "The Real ID Act of 2005 (contained in P.L. 109-13)", National Conference of State Legislatures. Retrieved October 11, 2013.
  73. " The History of Federal Requirements for State Issued Driver’s Licenses and Identification Cards", National Conference of State Legislatures. Retrieved October 11, 2013.
  74. "AP Interview: USPS takes photos of all mail" Archived 2013-08-24 at the Wayback Machine , Associated Press (AP), 2 August 2013.
  75. "U.S. Postal Service Logging All Mail for Law Enforcement", Ron Nixon, New York Times, July 3, 2013. Retrieved 25 September 2013.
  76. "Fbi — Iafis". Fbi.gov. 1999-07-28. Archived from the original on 2012-09-21. Retrieved 2012-09-14.
  77. Dizard III, Wilson P. "FBI plans major database upgrade" Archived 2007-09-27 at the Wayback Machine . Government Computer News, 28 August 2006. Retrieved 2 February 2007.
  78. "FBI — Next Generation Identification". Fbi.gov. Retrieved 19 April 2013.
  79. Lipowicz, Alice "FBI's new fingerprint ID system is faster and more accurate, agency says -- GCN" Archived 2014-11-19 at the Wayback Machine . Government Computer News, 9 March 2011. Retrieved 9 October 2013.
  80. "MorphoTrak Chosen as Biometric Provider for FBI Next Generation Identification Program". Morpho. 8 September 2009. Archived from the original on 19 November 2014. Retrieved 19 April 2013.
  81. "Frequently Asked Questions (FAQs) on the CODIS Program and the National DNA Index System", Federal Bureau of Investigation. Retrieved 12 October 2013.
  82. "CODIS-NDIS Statistics", Federal Bureau of Investigation, August 2013. Retrieved 12 October 2013.
  83. "FBI Shows Off Counterterrorism Database", Ellen Nakashima, Washington Post, 30 August 2006. Retrieved 12 October 2013.
  84. "EFF files lawsuit to gain information on FBI database", Grant Gross, InfoWorld, 17 October 2006. Retrieved 12 October 2013.
  85. "Report on the Investigative Data Warehouse", Electronic Frontier Foundation (EFF), April 2009. Retrieved 12 October 2013.
  86. "Secret Cold War documents reveal NSA spied on senators", Matthew M. Aid and William Burr, Chicago Tribune, 26 September 2013. Retrieved 12 October 2013.
  87. "Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans", Book III: Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, Report No. 94-755, United States Senate, 94th Congress, 2d Session, 23 April 1976. Retrieved 12 October 2013.
  88. Cauley, Leslie (11 May 2006). "NSA has massive database of Americans' phone calls". USA Today. Retrieved 11 May 2006.
  89. "Three Major Telecom Companies Help US Government Spy on Millions of Americans". Democracy Now! . 12 May 2006. Retrieved 15 May 2006.
  90. "Pentagon to Shutter Anti-Terrorism Database", Dina Temple-Raston, All Things Considered, National Public Radio (NPR), 21 August 2007. Retrieved 6 October 2013.
  91. "Defense Department to Close TALON System", Sara Wood, American Forces Press Service, 21 August 2007. Retrieved 6 October 2013.
  92. "Homeless Management Information Systems" Archived 2017-05-21 at the Wayback Machine , U.S. Department of Housing and Urban Development (HUD). Retrieved 11 October 2013.
  93. "HMIS Project Management Topics and Tools", Center for Social Policy, McCormack Graduate School of Policy Studies, University of Massachusetts Boston, 28 December 2004. Retrieved 11 October 2013.
  94. "Electronic case filing saves space, time, improves access to documents", Tanya White Cromwell, Kansas City Business Journal, 2 March 2003. Retrieved 11 October 2013.