Page 186 - Automated Fingerprint Identification Systems (AFIS)
P. 186

STANDARDS AND INTEROPERABILITY        171



          database operated by a private vendor points up the problem. In January 2004,
          Associated Press reporter Brian Bergstein reported,


               Other states expressed worries about security. An open-records request in Georgia
               uncovered an Oct. 2 memo, for example, in which motor-vehicle department staffers
               noted that Seisint had promised “that every effort will be taken to make the database
               and the data transfer safe and secure. However, the potential for abuse still exists.”
                 The Florida files include an Oct. 7 letter in which Deputy Superintendent Mark
               Oxley of the Louisiana state police wrote that his agency would not participate
               because of “lingering concerns” about the security of the records that would be sent
               to the database. He also questioned the “ever-broadening scope extending far
               beyond the original counterterrorism mission.”
                 However, Oxley added that “most disappointing of all” was that Louisiana had to
               learn from news reports that Seisint’s founder, Hank Asher, had admitted piloting
               flights for cocaine smugglers in the 1980s. Asher has resigned from Seisint’s board.
                 Questions about Matrix still loom even in member states. New York has not
               shared any records because of questions about long-term funding and privacy laws,
               said Lynn Rasic, a spokeswoman for the governor’s office.


            If these databases are breached for malicious or fraudulent purposes, both
          public trust and data integrity might be lost. If an agency chooses to share data,
          it must be careful about both the integrity and intent of the requesting agency,
          and it must maintain ongoing audits of the use of the data by the requesting
          agency. If the host agency permits another agency to access its database, it might
          limit the time volume of access. For example, the host agency might not want
          to have its own transactions delayed due to foreign transactions in the system,
          so it might restrict foreign transactions to a time of day when the host transac-
          tions are low, or a day of the week when these foreign transactions are at a low
          point. There will need to be assurances that the foreign transactions, when they
          are allowed, follow the format of the host searches and do not take longer than
          the time for a host transaction. Ideally, the foreign transaction should flow
          through the system with the same characteristics as a native transaction; this
          would be another example of interoperability.



          8.4.2 TYPE OF SEARCH PERMITTED

          The agencies also have to agree on the types of searches to be run, whether
          they are civil searches or forensic searches. If they are forensic searches, options
          include tenprint to tenprint searches, latent to tenprint searches, tenprint to
          unsolved latent searches, or latent to unsolved latent searches. For tenprint
          searches, there may be limitations on the type of inquiry, i.e., the inquiry of
   181   182   183   184   185   186   187   188   189   190   191