National databases of United States persons

Last updated

Various national databases of United States persons, and their activities, have been compiled by government and private entities. Different data types are collected by different entities for different purposes, nominal or otherwise. These databases are some of the largest of their kind, [1] and even the largest ever. [2] Accessibility of government databases may be controlled by various means, such as requirement of a warrant, subpoena, or simple request from another branch of government. Commercial databases are generally established for profit. Some other databases are available for free usage with various states across the United States. Typical instances include Colorado Resident Directory [3] and many others out there on the internet. Data breaches may occur as a result of a vulnerability or publication in error.

Contents

Databases

Government

Data typesProgramCollectorNominal purposeContainsAccessibilityKnown breaches
Contact and educational information [4] [5] Joint Advertising Marketing Research & Studies (JAMRS) Department of Defense Military recruitmentPublic school students 17 and older
Telephone call metadata MAINWAY National Security Agency Military national defense1.9 trillion call-detail records (estimated)Assessed internally as "51% confidence" of being foreign
Consumer transactions [6] [7] Consumer Financial Protection Bureau at least 10 million consumersdata at least partially anonymized
Usual residency Census Census assignment of federal representation all personsConfidentiality protected
Identity, citizenship, residency, income, employment, medical, incarceration, and contact information Federal Data Services Hub Internal Revenue Service and Health and Human Services administration of the Patient Protection and Affordable Care Act all persons
Exteriors of mail Mail Isolation Control and Tracking (MICT) United States Postal Service criminal surveillanceall mailRequest by law enforcement
Fingerprints [8] Integrated Automated Fingerprint Identification System (IAFIS) Federal Bureau of Investigation criminal and civilian monitoring104 million persons (including 34 million non-criminals)
Finger and palm prints, iris, and facial data (under development to replace the Integrated Automated Fingerprint Identification System) Next Generation Identification (NGI) Federal Bureau of Investigation criminal and civilian monitoring
DNA Combined DNA Index System (CODIS) Federal Bureau of Investigation criminal investigation10 million persons
Income and employment Internal Revenue Service (IRS) Internal Revenue Service Tax collectionFederal taxpayers10,000's of 527 organization data [9]

Private

Data typesProgram or SubsidiaryCollectorNominal purposeContainsAccessibilityKnown breaches
Employment and salary records [10] The Work Number Equifax debt collection and consumer profiling190 million records covering more than one-third of U.S. adultsFor sale
Vehicle location data [11] Vigilant SolutionsDigital Recognition Networkconsumer profilingcontaining at least 700 million scansFor sale
Vehicle location data [11] MVTrac repossession "large majority" of registered vehicles [11] For sale
Vehicle location data [12] National Vehicle Location Serviceover 800 million records [12]
Firearm ownership National Rifle Association of America [13] Political campaigning"tens of millions of people" (estimated) [13]
Stolen personal dataSSNDOB [14] [15] [16] Larceny 4 million persons [16] For saleMarch 2013 [16]

See also

Related Research Articles

<span class="mw-page-title-main">Identity theft</span> Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been statutorily defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's disadvantages or loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

LexisNexis Risk Solutions is a global data and analytics company that provides data and technology services, analytics, predictive insights and fraud prevention for a wide range of industries. It is headquartered in Alpharetta, Georgia, and has offices throughout the U.S. and in

RELX plc is a British multinational information and analytics company headquartered in London, England. Its businesses provide scientific, technical and medical information and analytics; legal information and analytics; decision-making tools; and organise exhibitions. It operates in 40 countries and serves customers in over 180 nations. It was previously known as Reed Elsevier, and came into being in 1993 as a result of the merger of Reed International, a British trade book and magazine publisher, and Elsevier, a Netherlands-based scientific publisher.

LexisNexis is a part of the RELX corporation that sells data analytics products and various databases that are accessed through online portals, including portals for computer-assisted legal research (CALR), newspaper search, and consumer information. During the 1970s, LexisNexis began to make legal and journalistic documents more accessible electronically. As of 2006, the company had the world's largest electronic database for legal and public-records–related information.

<span class="mw-page-title-main">Carl Malamud</span> Technologist, author, and public domain advocate

Carl Malamud is an American technologist, author, and public domain advocate, known for his foundation Public.Resource.Org. He founded the Internet Multicasting Service. During his time with this group, he was responsible for developing the first Internet radio station, for putting the U.S. Securities and Exchange Commission's EDGAR database on-line, and for creating the Internet 1996 World Exposition.

<span class="mw-page-title-main">MAINWAY</span> NSA database of US telephone calls

MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and T-Mobile.

<span class="mw-page-title-main">Data breach</span> Intentional or unintentional release of secure information

A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen, altered or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice, organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media. Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a "leak".

<span class="mw-page-title-main">Trailblazer Project</span>

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.

<span class="mw-page-title-main">Bloomberg Law</span> Online legal research service

Bloomberg Law is a subscription-based service that uses data analytics and artificial intelligence for online legal research. The service, which Bloomberg L.P. introduced in 2009, provides legal content, proprietary company information and news information to attorneys, law students, and other legal professionals. More specifically, this commercial legal and business technology platform integrates Bloomberg Law News with Bloomberg Industry Group's primary and secondary legal content and business development tools.

<span class="mw-page-title-main">Syrian Electronic Army</span> Hacker group affiliated with the Syrian government

The Syrian Electronic Army is a group of computer hackers which first surfaced online in 2011 to support the government of Syrian President Bashar al-Assad. Using spamming, website defacement, malware, phishing, and denial-of-service attacks, it has targeted terrorist organizations, political opposition groups, western news outlets, human rights groups and websites that are seemingly neutral to the Syrian conflict. It has also hacked government websites in the Middle East and Europe, as well as US defense contractors. As of 2011 the SEA has been "the first Arab country to have a public Internet Army hosted on its national networks to openly launch cyber attacks on its enemies".

<span class="mw-page-title-main">William Binney (intelligence official)</span> Former U.S. intelligence official and cryptoanalyst; whistleblower

William "Bill" Edward Binney is a former intelligence official with the United States National Security Agency (NSA) and whistleblower. He retired on October 31, 2001, after more than 30 years with the agency.

<span class="mw-page-title-main">Tailored Access Operations</span> Unit of the U.S. National Security Agency

The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General Michael Hayden.

<span class="mw-page-title-main">PRISM</span> Mass surveillance program run by the NSA

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.

<span class="mw-page-title-main">Edward Snowden</span> American whistleblower and former NSA contractor (born 1983)

Edward Joseph Snowden is an American and naturalized Russian former computer intelligence consultant and whistleblower who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and subcontractor. His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes intelligence alliance with the cooperation of telecommunication companies and European governments and prompted a cultural discussion about national security and individual privacy.

Identity theft involves obtaining somebody else's identifying information and using it for a criminal purpose. Most often that purpose is to commit financial fraud, such as by obtaining loans or credits in the name of the person whose identity has been stolen. Stolen identifying information might also be used for other reasons, such as to obtain identification cards or for purposes of employment by somebody not legally authorized to work in the United States.

<span class="mw-page-title-main">Global surveillance disclosures (2013–present)</span> Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British, Canadian and New Zealand intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times, the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad, Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).

<i>Colorado Revised Statutes</i> Legal code of Colorado, United States

The Colorado Revised Statutes (C.R.S.) are a legal code of Colorado, the codified general and permanent statutes of the Colorado General Assembly.

Lex Machina, Inc. is a company that provides legal analytics to legal professionals. It began as an IP litigation research company and is now a division of LexisNexis. The company started as a project at Stanford University within the university's law school and computer science department before launching as a startup in Menlo Park, California. Lex Machina provides a SaaS product to legal professionals to aid in their practice, research, and business.

<span class="mw-page-title-main">Alex Stamos</span> Greek American computer scientist

Alex Stamos is a Greek American computer scientist and adjunct professor at Stanford University's Center for International Security and Cooperation. He is the former chief security officer (CSO) at Facebook. His planned departure from the company, following disagreement with other executives about how to address the Russian government's use of its platform to spread disinformation during the 2016 U.S. presidential election, was reported in March 2018.

References

  1. Merline, John (25 June 2013). "Think NSA Spying Is Bad? Here Comes ObamaCare Hub". news.investors.com. Investor's Business Daily . Retrieved 17 July 2013.
  2. Cauley, Leslie (May 11, 2006). "NSA has massive database of Americans' phone calls". USA Today. Retrieved 17 July 2013.
  3. "Colorado Residents Directory", coloradoresidentdirectory.com, Retrieved November 24, 2022.
  4. Gonzalez, Juan (4 September 2009). "Back to School: Military Recruiters Increasingly Targeting High School Teens". www.democracynow.org. Democracy Now . Retrieved 14 July 2013.
  5. "Hanson v. Rumsfeld (Challenging DOD military recruitment database of high school students)". www.nyclu.org. New York Civil Liberties Union . Retrieved 14 July 2013.
  6. Sperry, Paul (3 July 2013). "Obama Credit Watchdog Snoops Personal Financial Data". news.investors.com. Investor's Business Daily . Retrieved 14 July 2013.
  7. Dougherty, Carter (17 April 2013). "U.S. Amasses Data on 10 Million Consumers as Banks Object". www.bloomberg.com. Bloomberg L.P. Retrieved 14 July 2013.
  8. "Integrated Automated Fingerprint Identification System". www.fbi.gov. Federal Bureau of Investigation . Retrieved 16 July 2013.
  9. Malamud, Carl (7 July 2013). "Why We Asked the I.R.S. to Temporarily Turn the Lights Off on Section 527 Data". bulk.resource.org. Public.Resource.Org. Archived from the original on 21 October 2013. Retrieved 16 July 2013.
  10. Sullivan, Bob (30 January 2013). "Your employer may share your salary, and Equifax might sell that data". www.nbcnews.com. NBC News . Retrieved 14 July 2013.
  11. 1 2 3 Angwin, Julia; Valentino-DeVries, Jennifer (29 September 2012). "New Tracking Frontier: Your License Plates". online.wsj.com. Wall Street Journal . Retrieved 14 July 2013.
  12. 1 2 Pilkington, Ed (17 July 2013). "Millions of US license plates tracked and stored, new ACLU report finds". guardian.co.uk. The Guardian . Retrieved 17 July 2013.
  13. 1 2 Friess, Steve (20 August 2013). "How The NRA Built A Massive Secret Database Of Gun Owners". buzzfeed.com. BuzzFeed. Archived from the original on 21 August 2013. Retrieved 21 October 2013.
  14. Acohido, Byron (26 September 2013). "LexisNexis, Dunn (sic) & Bradstreet, Kroll hacked". USA Today . Gannett Company . Retrieved 22 October 2013.
  15. Yegulalp, Serdar (25 September 2013). "Identity theft service planted botnets in LexisNexis, other data providers". infoworld.com. InfoWorld. Retrieved 22 October 2013.
  16. 1 2 3 Krebs, Brian (25 September 2013). "Data Broker Giants Hacked by ID Theft Service". krebsonsecurity.com. Retrieved 22 October 2013.