ICE and the UTILIZATION of IRIS SCANNING

published 10/18/25

In 1996, Lancaster County Prison became the first in the nation to install an iris scanner for identification.  By 2006, iris scanning was used in 47 states by local jails and some prisons. Other eye scanning tech used to imprison people is Eye Detect, a lie detector test pushed by CIA agent polygraph expert Don KrapohlEyedetect has yet to be successfully contested.

Prison surveillance profiteer bi2technologies claims its Iris capturing system captures over 265 points and unique  characteristics, after scanning results are received in 8 seconds or less.  BI2 claims that one iris template contains more data than finger, face, and hand templates combined. “Iris recognition was proven to have the highest biometric accuracy, with no false matches in over two million cross-comparisons according to the Biometric Product Testing Final Report”(19 March 2001, Center for Mathematics and Scientific Computing, National Physics Laboratory, U.K.).

 

Iris recognition processing chain. 

(a)  Iris image.

(b)  Iris detection.

(c) Normalized iris texture.

(d) Pre-processed iris texture.

(e)+(f) Iris-codes of applied feature extractor for sample image 001-02 of the IITDv1 database.

 

 

 

 

 

 

 

 

 

 

 

 

Bi2’s Inmate Recognition and Identification System (IRIS) works with the Mobile Offender Recognition & Identification System (MORIS).  ICE’s contract with Bi2 Technologies nationwide web-based iris biometric network and database gives ICE “instant and unlimited  access to over 5 million booking records for over 1.5 million unique individuals enrolled by more than 247 agencies”.

 

MORIS gives access to any information and datapreviously entered into the Inmate Identification and Recognition System (I.R.I.S) national database. The system operates iOS, Android and  Microsoft platforms, so it can be used on cell phones, tablets, I-Pads  and laptops.  Comprehensive arrest, and incarceration history on offenders, which includes mugshots, state ID, federal ID, offense, aliases, charges, and arrest details. And could be used to enter anyone into a database.

Biometric Identification Transnational Migration Alert Program  (BITMAP), a host-country-led initiative in which HSI trains and equips  foreign counterparts to conduct tactically targeted collection of  biometric and biographic data on suspect individuals via mobile  biometric collection devices. BITMAP aims to strengthen law  enforcement investigation, border security and counterterrorism efforts  in the U.S. and in partner nations by providing foreign law enforcement  with biometric/biographic collection capability.The strategic vision of the BITMPAP initiative is to develop a global network of foreign law enforcement partners whose biometric collection  and investigative missions are mutually beneficial and “inextricably  intertwined with HSI’s goal to protect the homeland.”

One agreement signed in Santiago on July 30, 2025, by U.S. Secretary of Homeland  Security Kristi Noem and senior Chilean officials, the agreement enables  both nations to exchange biometric identifiers—such as fingerprints and  iris scans

FACIAL AND IRIS RECOGNITION BIOMETRICS at AIRPORTS:

Currently, CBP uses biometric facial comparison technology to process travelers entering the United States at 238 airports, including all 14 CBP Preclearance locations and 57 locations for international air departures.  BITMAP is used to make nominations to the Terrorist Screening Database (TSDB) todetermine suitability ICE may also share BITMAP information with other U.S. federal agenciesoperating in the area that have an investigative interest.

The shared BITMAP data serves policing needs of both DHS and the FBI. ICE transmits BITMAP data to FBI’s Next Generation Identification system in support of the parties’ respective criminal law enforcement missions. Homeland Security Investigations (HSI) also shares BITMAP biometric data with the Department of State via the Automated Biometric Identification System(IDENT,) for which the Department of State accesses. Foreign law enforcement partners share their BITMAP information with (HSI)  in a joint effort to identify transnational criminals, “Known or Suspected Terrorists”(KST), gang members and other persons of interest. Bitmap creates Nation-specific Targeting Selection Criteria by tagging data with foreign partner Identifier codes, which were derived to cover the range of persons captured within BITMAP and record the reason for enrollment:

  • International and National Security: This code applies to non-U.S. persons10 who may pose an international or national security risk to the United States, or its foreign partners based on the foreign partners’ intelligence of the individual’s terrorism-related activity, or information obtained during regular or irregular migration activity.
  • Gang Members: This code applies to non-U.S. persons associated with a gang or gang member known for criminal activity (e.g., MS-13). Foreign law enforcement partners apply their regional knowledge to identify gang members. • Persons of Interest (POI): A Person of Interest code is selected for non-U.S. persons suspected of criminal activity that would reasonably be considered felonious under U.S law, or who have been convicted of certain crimes.

While ICE is spreading eye scanning databases into the reach of all its new $50k recruits via MORIS.  It has shown to be completely incapable of keeping safe the information it keeps in its pocket now via cellphones pointed at people in cities like Chicago, NY, LA, Philly, Phoenix, San Diego, Denver, Miami, Atlanta. And now seen invading Puerto Rico.  An investigation by the US DEPARTMENT OF HOMELAND SECURITY OFFICE OF INSPECTOR GENERAL FOUND MANY ISSUES WITH ICE MOBILE PHONES, including:             

– ICE allowed employees and contractors to download risky applications onto gov mobile devices with MORIS software.                                                                                                                                                                          

-DHS required the Defense Information Systems Agency’s (DISA) and Security Technical Implementation Guides (STIGs)  mobile device security settings. And 3 components to complete a security authorization process to measure and mitigate mobile device risks.  Of the 45 settings reviewed, 33 (73%) did not meet DISA STIG standards. ICE developed two custom mobile device applications, One of the applications contained three critical and five high-risk vulnerabilities.

-ICE Allowed Employees and Contractors to Download Risky Applications onto Mobile Devices

-ICE did not effectively implement controls over disposed of, lost, or stolen ICE-issued mobile devices. Between 5,309 and 7,224 out of 20,810 disposed-of ICE mobile devices lacked documentation and therefore may not have been sanitized before leaving ICE custody. Additionally, the documentation for 87 of 188 mobile devices that were sanitized before disposal was missing signatures or included signatures of ICE staff who potentially did not have the proper authority.

DURING THE INVASION OF IRAQ, NEOCOLONIAL INVADING FORCES of IRAQ AND AFGHANISTAN CAPTURED BIOMETRICS OF PEOPLE IN THEIR OWN LANDS LIKE THEY WERE DOING IN THE PRISONS OF PENNSYLVANIA.