Combating Fraud with Face Recognition: Some FBI Initiatives Richard W. Vorder Bruegge Senior Photographic Technologist Federal Bureau of Investigation.

Slides:



Advertisements
Similar presentations
Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
Advertisements

Dr. Marc Valliant, VP & CTO
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Presentation to the National Commission on Forensic Sciences October 2014 Erica L. Smith Chief, Law Enforcement Statistics Unit Bureau of Justice Statistics.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Using a National Jail Network to Track Probationers, Parolees & Sex Offenders Presented by: Teresa D. McKinney Division Manager - Planning & Development.
2 Language of Computer Crime Investigation
NC DMV License and Theft Bureau
2  Established by the Florida Legislature in 1941  Funded by the Insurance Commissioner’s Regulatory Trust Fund  Chief Financial Officer Jeff Atwater.
Maryland’s Security Integration Initiative Sometimes the most common sense solutions drive success Virginia Geckler Ron Brothers.
Personal genetics in policy and social issues: Crime and forensics Personal genetics in policy and social issues: Crime and forensics.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
ACT-IAC Igniting Innovation 2014 February 6, 2014.
Automated Fingerprint Identification System (AFIS) Modernization Project Department Of Emergency Services and Public Protection Division of State Police.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
The Next Step in Biometric Data Fusion Ged Griffin APCOA Melbourne 23 February 2011.
Crimes Committed in the Presence of Children Proposed Methodology for 2008 Study.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School - Wu Laboratory
Amber Vision – June 25, 2010 Presentation to: West Virginia Board of Education Superintendent’s Leadership Institute.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
THE HEART OF LIFE ON THE BEAT THE HEART OF LIFE ON THE BEAT Roger W. Ham Chief Information Officer Commanding Officer Los Angeles Police Department Roger.
NCJIS Modernization Program
Karthiknathan Srinivasan Sanchit Aggarwal
Final Rule – Secondary School Students – Published October 27, 2010 Effective Date: 30 days from publication Implementation: 2011/12 academic cycle o 1698.
Criminal Justice Information Services Division
FBI Science & Technology Branch MISSION To facilitate the application of innovative scientific, engineering, and technical solutions in support.
LOCAL AGENCY MUST STILL RUN A FILE CHECK (QHW) TO DETERMINE WARRANTS/HOLDS II. If name is not on CCH, prints are compared to all fingerprints in AFIS for.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Federal Bureau of Investigation
Bureau of Justice Assistance Training & Technical Assistance Resources NGA Executive Policy Forum Santa Fe, NM May 2-3, 2005.
FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Criminal Justice Information Systems and Case Management Systems.
Office of Science and Technology NCITS Technical Committee M1 Biometrics Standards Chris Miles Senior Program Manager Crime Prevention.
The BOSS Project: Recent Advances in Facial Scanning Adam C. Champion.
The Nationwide SAR Initiative Briefing for the National Maritime Security Advisory Committee April 2, 2013.
Stephen Gresko Senior Criminalist Nevada State CODIS Administrator WASHOE COUNTY SHERIFF’S OFFICE FORENSIC SCIENCE DIVISION.
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
Computer Forensics Principles and Practices
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
DNA and CODIS CSI UMMC From
How do we use DNA in law enforcement and forensics? How do we use DNA in law enforcement and forensics? Personal Genetics Education Project Harvard Medical.
1 The New York State Integrated Justice Information Exchange Project BJA Regional Information Sharing Conference: Information Exchange Modeling/Business.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Forensic Science: Fundamentals & Investigations, Chapter 10 1 Introduction Document analysts examine and compare questioned documents with known material.
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
Criminal Investigations 1.The Crime Scene 2.ID Suspect 3.Informants.
Input Criminal Law (Forensic Procedures) Amendment Bill (B2-2009) 3 NOVEMBER 2009 Caring, compassionate and responsive.
SECRETARIAT OF POLICE1 Presentation to Select Committee on Security and Constitutional Affairs on the Criminal Procedures (Forensic) Amendment Act 28 July.
AAMVA: Region 1 Conference License Security & Fraud Control Connecticut DMV Document Audit Web Application (“DAW”) Lynn C. Blackwell Division Chief July.
Records and Information from DMVs for E-Verify (RIDE) Presentation for 2011 Annual Region IV Conference.
Transition of the FBI Uniform Crime Reporting (UCR) Program from the Summary Reporting System (SRS) to the National Incident-Based Reporting System (NIBRS)
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
Fraudulent and Questioned Documents. Top 5 Countries Originating Fraud.
Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator.
Brady Act Requirements In November 1993, the Brady Handgun Violence Prevention Act of 1993 (Brady Act), Public Law , was signed into law requiring.
What is AZFAA & why are we here?
Records and Information from DMVs for E-Verify (RIDE) Presentation for 2011 Annual Region II Conference.
Facial Recognition What is it and how does it work? 1. LEAs collect photo mugshots of arrestees and ask other government agencies (like the DMV or the.
INTERPOL Washington Forty years of connecting police worldwide
Facial Recognition [Biometric]
AFIS and CODIS Duyen & Ladaysha.
Automated Fingerprint Identification System upgrade project
SEARCH Annual Meeting “Washington Scene”
The WSP Notice of Arrest
Aim: How is genetics used in law enforcement?
BCS Template Presentation February 22, 2018
Background checks are required by state and federal law prior to CA/DCYF staff authorizing an individual (other than a parent) to have unsupervised access.
15-5 Automated Fingerprint Identification System
Presentation transcript:

Combating Fraud with Face Recognition: Some FBI Initiatives Richard W. Vorder Bruegge Senior Photographic Technologist Federal Bureau of Investigation July 2011

Outline 2 Context: NGI, BCOE & FBI FR Use Cases Examples of R&D and recent FBI FR use Facial Identification Scientific Working Group (FISWG) FBI Outreach to DMVs

Next Generation Identification (NGI)  The NGI system: –Incremental replacement of the current IAFIS –Improving current functionality and providing new functionality –Developing multimodal collection and search identification services  An upgrade to IAFIS – The FBI is developing an automated, interoperable multimodal biometric system 3 Enhanced tenprint services 2011 Palmprints and latents 2012 Photos/Facial, scars, marks, and tattoos 2013 Iris 2014

Beyond System Development The BCOE is the FBI’s program for exploring and advancing the use of new and enhanced biometric technologies and capabilities for integration into operations

Proposed FR Use Cases  Identifying, subjects, fugitives, missing persons, and persons of interest by using FR systems –From authorized LE & Govt. Sources (DMVs?) –From open sources –From images in seized systems  Tracking subjects movements to/from critical events (e.g., 9/11)  Conducting automated surveillance at lookout locations  Verifying mug shots against National Criminal Information Center (NCIC) records  Controlling access 5

Facial & Image-Based Recognition  Facial Identification (FI) - the manual examination of the differences and similarities between two facial images to determine if they represent different or the same person  Facial Recognition (FR) - the automated searching of a facial image in a computer database, resulting in a group of facial images ranked by computer-evaluated similarity  Image-Based Recognition – the automated searching of features, such as ears, hands, blemishes, and scars, marks and tattoos, in a computer database  Current FBI face and image biometric services include: –Operational Technology Division (OTD) facial identifications and court testimony at the Forensic Audio, Video, and Image Analysis Unit (FAVIAU) –Criminal Justice Information Services (CJIS) Division FACE Search Team 6

FBI Identification from Images  The FBI’s Facial Recognition/Identification work is performed within the Forensic Audio, Video, and Image Analysis Unit (FAVIAU)  The FAVIAU is one of only a few accredited laboratories in the world that conducts examinations in the disciplines of video, image, and audio analysis 7 Primarily Supports Internal FBI Casework

FBI-DMV Face Pilot  Departments of Motor Vehicles (DMVs) have deployed FR systems to reduce fraud since 1997  The BCOE-sponsored pilot program with the North Carolina DMV has led to more than 700 leads including: –1 federal fugitive apprehension –6 state fugitive apprehensions –1 missing person resolution  For the pilot, CJIS provides probe photos and names to run in the NC FR system against DMV photos  The BCOE is working to expand the FR pilot to additional DMVs Probe Photo 8

How is FACEMASK-S&T being used operationally today? Face Search, then name search  Fugitives include subjects with wants and warrants in NCIC records in North Carolina and surrounding states (Virginia, Tennessee, Georgia, South Carolina) Subject demographics not brought up unless there is a probable match based on face or name search. FR search yields image, DL # and score. “Matches” used for lead development, only – not conclusive. FBI does not see, review, or retain any PII data on “non-match” (“innocent citizens”)

FACEMASK – S&T Statistics to date Total numbers of searches: ~3000 Hits on face search: 380 Hits on name search: 320* *Cautionary Statistic: Significant number of FR MISSES – Provides insight into how many times one might miss a subject.

11 Automatic Face Detection and Recognition (AFDAR) in Videos and Still Images  USG-owned software application  Expedite analyst review of videos and still images  Potential for use in terrorism and child pornography cases – Automatically locate faces and compare against others (either internal to video/image set or external).  Review/analysis of unmanned/unmonitored surveillance videos.

13 Cluster Base - Origins  Originally called “AFDAR-C”  Analyst tool designed to expedite review of still images.  Applies AFDAR face detection and clustering to still images. –Includes both “clusters” and “close clusters”  Allows analyst to identify & verify links between images and image clusters.

14 Cluster Base – Applied to Recent Investigation  Criminal Enterprise obtained multiple names and SSNs from temporary workers.  Multiple IDs would be sold to a single person.  These people would use these IDs to get mortgages, credit cards, etc.  Investigators identified several states in which fraudulent IDs were being used.

15 Cluster Base – Applied to Recent Investigation  One state identified as known location of activity – FBI requested DMV photos of subjects with specific SSNs and names (known fraud) –14,000+ provided  ~100 Known Suspects from 2 nd state included with 14K+, then Cluster Base run… –36 “Strong Hits”, including leader of criminal enterprise –Total 70 images matching to 36 subjects found in this set  Cluster Base still being used to find multiple offenders

17 Standards - FISWG  Facial Identification Scientific Working Group (FISWG)  Sponsored by the BCOE and established in 2009  Mission - “develop consensus standards, guidelines, and best practices for the discipline of image-based comparisons of human features”  Participants include federal, state, local, and international government agencies, as well as invited non-governmental organizations  Next meeting November 14-18, 2011 in Orlando, FL  Visit

18 FISWG Organization – 5 Subcommittees  FR Systems  Capture and Equipment  One-to-One Comparisons  Training  Outreach  Documents intended to establish standards and consolidate information.

Developing the FBI Training Curriculum 19

20 FBI Outreach To DMVs  FBI has established a Facial Searching Service Team to aid FBI investigations.  Hope is to have this team facilitate authorized searches of DMV FR databases to locate wanted, warranted, and missing persons.  Letters requesting information on DMV FR systems have been mailed to 46 states to date.  13 responses so far (but some only mailed in last two weeks). –Thanks to those who have answered…

21 FBI Outreach To DMVs – Letter Sent  Does your state DMV have a FR system or plan to have a FR system in the future?  Does your state permit the FBI or Law Enforcement agencies to search your FR database remotely or in person?  Will your agency search photos for the FBI?  Has a Memorandum of Understanding or any other agreement been signed between your state or agency and the FBI regarding searching your DMV FR system?  Who is your primary point of contact for the use of your state’s FR system? Please provide their contact information.  From a legal perspective, are there any privacy protection provisions in the controlling legal authority for your state, including legislative code, administrative regulation or executive order, if so, what are they?

Questions / Comments Contact Information: Richard Vorder Bruegge Additional Resources:

23