National databases of United States persons
Various national databases of United States persons, and their activities, have been compiled by government and private entities. Different data types are collected by different entities for different purposes, nominal or otherwise. These databases are some of the largest of their kind,[1] and even the largest ever.[2] Accessibility of government databases may be controlled by various means, such as requirement of a warrant, subpoena, or simple request from another branch of government. Commercial databases are generally established for profit. Data breaches may occur as a result of a vulnerability or publication in error.
Databases
Government
Data types | Program | Collector | Nominal purpose | Contains | Accessibility | Known breaches |
---|---|---|---|---|---|---|
Contact and educational information[3][4] | Joint Advertising Marketing Research & Studies (JAMRS) | Department of Defense | Military recruitment | Public school students 17 and older | ||
Telephone call metadata | MAINWAY | National Security Agency | Military national defense | 1.9 trillion call-detail records (estimated) | Assessed internally as "51% confidence" of being foreign | |
Consumer transactions[5][6] | Consumer Financial Protection Bureau | at least 10 million consumers | data at least partially anonymized | |||
Usual residency | Census | Census | assignment of federal representation | all persons | Confidentiality protected | |
Identity, citizenship, residency, income, employment, medical, incarceration, and contact information | Federal Data Services Hub | Internal Revenue Service and Health and Human Services | administration of the Patient Protection and Affordable Care Act | all persons | ||
Exteriors of mail | Mail Isolation Control and Tracking (MICT) | United States Postal Service | criminal surveillance | all mail | Request by law enforcement | |
Fingerprints[7] | Integrated Automated Fingerprint Identification System (IAFIS) | Federal Bureau of Investigation | criminal and civilian monitoring | 104 million persons (including 34 million non-criminals) | ||
Finger and palm prints, iris, and facial data (under development to replace the Integrated Automated Fingerprint Identification System) | Next Generation Identification (NGI) | Federal Bureau of Investigation | criminal and civilian monitoring | |||
DNA | Combined DNA Index System (CODIS) | Federal Bureau of Investigation | criminal investigation | 10 million persons | ||
Income and employment | Internal Revenue Service (IRS) | Internal Revenue Service | Tax collection | Federal taxpayers | 10,000's of 527 organization data[8] |
Private
Data types | Program or Subsidiary | Collector | Nominal purpose | Contains | Accessibility | Known breaches |
---|---|---|---|---|---|---|
Employment and salary records[9] | The Work Number | Equifax | debt collection and consumer profiling | 190 million records covering more than one-third of U.S. adults | For sale | |
Vehicle location data[10] | Vigilant Solutions | Digital Recognition Network | consumer profiling | containing at least 700 million scans | For sale | |
Vehicle location data[10] | MVTrac | repossession | "large majority" of registered vehicles[10] | For sale | ||
Vehicle location data[11] | National Vehicle Location Service | over 800 million records[11] | ||||
Firearm ownership | National Rifle Association[12] | Political campaigning | "tens of millions of people" (estimated) [12] | |||
Stolen personal data | SSNDOB [13][14][15] | Larceny | 4 million persons [15] | For sale | March 2013 [15] |
gollark: Yes I do.
gollark: Of course, liquid *inside* you may boil.
gollark: You aren't boiling because you are not a liquid.
gollark: No, it's as hot as the rest of the CPU, roughly.
gollark: > The ES runs asynchronously on a self-timed circuit and uses thermal noise within the silicon to output a random stream of bits at the rate of 3 GHz. The ES needs no dedicated external power supply to run, instead using the same power supply as other core logic. The ES is designed to function properly over a wide range of operating conditions, exceeding the normal operating range of the processor.It isn't very specific.
See also
References
- Merline, John (25 June 2013). "Think NSA Spying Is Bad? Here Comes ObamaCare Hub". news.investors.com. Investor's Business Daily. Retrieved 17 July 2013.
- Cauley, Leslie (May 11, 2006). "NSA has massive database of Americans' phone calls". USA Today. Retrieved 17 July 2013.
- Gonzalez, Juan (4 September 2009). "Back to School: Military Recruiters Increasingly Targeting High School Teens". www.democracynow.org. Democracy Now. Retrieved 14 July 2013.
- "Hanson v. Rumsfeld (Challenging DOD military recruitment database of high school students)". www.nyclu.org. New York Civil Liberties Union. Retrieved 14 July 2013.
- Sperry, Paul (3 July 2013). "Obama Credit Watchdog Snoops Personal Financial Data". news.investors.com. Investor's Business Daily. Retrieved 14 July 2013.
- Dougherty, Carter (17 April 2013). "U.S. Amasses Data on 10 Million Consumers as Banks Object". www.bloomberg.com. Bloomberg L.P. Retrieved 14 July 2013.
- "Integrated Automated Fingerprint Identification System". www.fbi.gov. Federal Bureau of Investigation. Retrieved 16 July 2013.
- Malamud, Carl (7 July 2013). "Why We Asked the I.R.S. to Temporarily Turn the Lights Off on Section 527 Data". bulk.resource.org. Public.Resource.Org. Archived from the original on 21 October 2013. Retrieved 16 July 2013.
- Sullivan, Bob (30 January 2013). "Your employer may share your salary, and Equifax might sell that data". www.nbcnews.com. NBC News. Retrieved 14 July 2013.
- Angwin, Julia; Valentino-DeVries, Jennifer (29 September 2012). "New Tracking Frontier: Your License Plates". online.wsj.com. Wall Street Journal. Retrieved 14 July 2013.
- Pilkington, Ed (17 July 2013). "Millions of US license plates tracked and stored, new ACLU report finds". guardian.co.uk. The Guardian. Retrieved 17 July 2013.
- Friess, Steve (20 August 2013). "How The NRA Built A Massive Secret Database Of Gun Owners". buzzfeed.com. BuzzFeed. Retrieved 21 October 2013.
- Acohido, Byron (26 September 2013). "LexisNexis, Dunn (sic) & Bradstreet, Kroll hacked". USA Today. Gannett Company. Retrieved 22 October 2013.
- Yegulalp, Serdar (25 September 2013). "Identity theft service planted botnets in LexisNexis, other data providers". infoworld.com. InfoWorld. Retrieved 22 October 2013.
- Krebs, Brian (25 September 2013). "Data Broker Giants Hacked by ID Theft Service". krebsonsecurity.com. Retrieved 22 October 2013.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.