National databases of United States persons

Various national databases of United States persons, and their activities, have been compiled by government and private entities. Different data types are collected by different entities for different purposes, nominal or otherwise. These databases are some of the largest of their kind,[1] and even the largest ever.[2] Accessibility of government databases may be controlled by various means, such as requirement of a warrant, subpoena, or simple request from another branch of government. Commercial databases are generally established for profit. Data breaches may occur as a result of a vulnerability or publication in error.

Databases

Government

Data typesProgramCollectorNominal purposeContainsAccessibilityKnown breaches
Contact and educational information[3][4]Joint Advertising Marketing Research & Studies (JAMRS)Department of DefenseMilitary recruitmentPublic school students 17 and older
Telephone call metadataMAINWAYNational Security AgencyMilitary national defense1.9 trillion call-detail records (estimated)Assessed internally as "51% confidence" of being foreign
Consumer transactions[5][6]Consumer Financial Protection Bureauat least 10 million consumersdata at least partially anonymized
Usual residencyCensusCensusassignment of federal representationall personsConfidentiality protected
Identity, citizenship, residency, income, employment, medical, incarceration, and contact informationFederal Data Services HubInternal Revenue Service and Health and Human Servicesadministration of the Patient Protection and Affordable Care Actall persons
Exteriors of mailMail Isolation Control and Tracking (MICT)United States Postal Servicecriminal surveillanceall mailRequest by law enforcement
Fingerprints[7]Integrated Automated Fingerprint Identification System (IAFIS)Federal Bureau of Investigationcriminal and civilian monitoring104 million persons (including 34 million non-criminals)
Finger and palm prints, iris, and facial data (under development to replace the Integrated Automated Fingerprint Identification System)Next Generation Identification (NGI)Federal Bureau of Investigationcriminal and civilian monitoring
DNACombined DNA Index System (CODIS)Federal Bureau of Investigationcriminal investigation10 million persons
Income and employmentInternal Revenue Service (IRS)Internal Revenue ServiceTax collectionFederal taxpayers10,000's of 527 organization data[8]

Private

Data typesProgram or SubsidiaryCollectorNominal purposeContainsAccessibilityKnown breaches
Employment and salary records[9] The Work NumberEquifaxdebt collection and consumer profiling190 million records covering more than one-third of U.S. adultsFor sale
Vehicle location data[10]Vigilant SolutionsDigital Recognition Networkconsumer profilingcontaining at least 700 million scansFor sale
Vehicle location data[10]MVTracrepossession"large majority" of registered vehicles[10]For sale
Vehicle location data[11]National Vehicle Location Serviceover 800 million records[11]
Firearm ownershipNational Rifle Association[12]Political campaigning"tens of millions of people" (estimated) [12]
Stolen personal dataSSNDOB [13][14][15]Larceny4 million persons [15]For saleMarch 2013 [15]
gollark: Yes I do.
gollark: Of course, liquid *inside* you may boil.
gollark: You aren't boiling because you are not a liquid.
gollark: No, it's as hot as the rest of the CPU, roughly.
gollark: > The ES runs asynchronously on a self-timed circuit and uses thermal noise within the silicon to output a random stream of bits at the rate of 3 GHz. The ES needs no dedicated external power supply to run, instead using the same power supply as other core logic. The ES is designed to function properly over a wide range of operating conditions, exceeding the normal operating range of the processor.It isn't very specific.

See also

References

  1. Merline, John (25 June 2013). "Think NSA Spying Is Bad? Here Comes ObamaCare Hub". news.investors.com. Investor's Business Daily. Retrieved 17 July 2013.
  2. Cauley, Leslie (May 11, 2006). "NSA has massive database of Americans' phone calls". USA Today. Retrieved 17 July 2013.
  3. Gonzalez, Juan (4 September 2009). "Back to School: Military Recruiters Increasingly Targeting High School Teens". www.democracynow.org. Democracy Now. Retrieved 14 July 2013.
  4. "Hanson v. Rumsfeld (Challenging DOD military recruitment database of high school students)". www.nyclu.org. New York Civil Liberties Union. Retrieved 14 July 2013.
  5. Sperry, Paul (3 July 2013). "Obama Credit Watchdog Snoops Personal Financial Data". news.investors.com. Investor's Business Daily. Retrieved 14 July 2013.
  6. Dougherty, Carter (17 April 2013). "U.S. Amasses Data on 10 Million Consumers as Banks Object". www.bloomberg.com. Bloomberg L.P. Retrieved 14 July 2013.
  7. "Integrated Automated Fingerprint Identification System". www.fbi.gov. Federal Bureau of Investigation. Retrieved 16 July 2013.
  8. Malamud, Carl (7 July 2013). "Why We Asked the I.R.S. to Temporarily Turn the Lights Off on Section 527 Data". bulk.resource.org. Public.Resource.Org. Archived from the original on 21 October 2013. Retrieved 16 July 2013.
  9. Sullivan, Bob (30 January 2013). "Your employer may share your salary, and Equifax might sell that data". www.nbcnews.com. NBC News. Retrieved 14 July 2013.
  10. Angwin, Julia; Valentino-DeVries, Jennifer (29 September 2012). "New Tracking Frontier: Your License Plates". online.wsj.com. Wall Street Journal. Retrieved 14 July 2013.
  11. Pilkington, Ed (17 July 2013). "Millions of US license plates tracked and stored, new ACLU report finds". guardian.co.uk. The Guardian. Retrieved 17 July 2013.
  12. Friess, Steve (20 August 2013). "How The NRA Built A Massive Secret Database Of Gun Owners". buzzfeed.com. BuzzFeed. Retrieved 21 October 2013.
  13. Acohido, Byron (26 September 2013). "LexisNexis, Dunn (sic) & Bradstreet, Kroll hacked". USA Today. Gannett Company. Retrieved 22 October 2013.
  14. Yegulalp, Serdar (25 September 2013). "Identity theft service planted botnets in LexisNexis, other data providers". infoworld.com. InfoWorld. Retrieved 22 October 2013.
  15. Krebs, Brian (25 September 2013). "Data Broker Giants Hacked by ID Theft Service". krebsonsecurity.com. Retrieved 22 October 2013.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.