Next to have their jobs automated: airport-security screeners?

Aviation and government authorities are starting to use machines in lieu of people to verify the identities of fliers by scanning their faces, irises or fingerprints. Dozens of airports in Europe, Australia and the U.S. already employ such technology so passengers can pass immigration checks without showing identification to, or talking with, a person. Now, several major airports in Europe have started using these automated ID checks at security checkpoints and boarding gates.

The use of biometrics—computers verifying identities through physical characteristics—and other automated techniques in airport security is raising questions about the strengths of man versus machine in detecting potential terrorists. Industry officials argue the advantages outweigh the risks, and are promoting automation to help make air travel more efficient and less frustrating—and to save money.

Ultimately, the technology could "get rid of the boarding pass completely," with fliers' faces serving as their tickets, said Michael Ibbitson, chief information officer of London Gatwick Airport. Gatwick performed a trial this year in which it processed 3,000 British Airways fliers without boarding passes. The fliers scanned their irises when checking in, enabling cameras at security checkpoints and boarding gates to automatically recognize them. "We're only just starting to see what biometrics can do," he said.

Proponents, including government and industry officials, say that automation of airport security holds the promise to free human screeners so they can focus on detecting suspicious behavior or monitoring flagged travelers. And for some aspects of security, they say, computers can be more thorough and less error-prone than humans.

Critics, however, worry that relying too much on automation will dull the senses of human screeners and remove the human intuition that can detect when something just doesn't seem right.

"If you're sweating profusely, for example, the person checking your ID would notice. But that computer taking an iris scan wouldn't," said aviation-security expert Arnold Barnett, a professor at the Massachusetts Institute of Technology. A key part of airport security is "looking at all kinds of things that can't be captured by an algorithm," he said.

About 28% of the world's airports now use biometric technology, up from 18% in 2008, according to a survey by SITA, an airline IT provider.

The International Air Transport Association and Airports Council International, two of the industry's largest global trade groups, advocate automation as part of their initiative to streamline airport security. The groups say the lengthy and cumbersome security process is deterring some travelers from flying, and note that the average checkpoint now processes about 150 passengers an hour, half the rate before the terror attacks of Sept. 11, 2001.

Their "Smart Security" program will use new checkpoints at Amsterdam Airport Schiphol and London Heathrow Airport next year to test key proposals, likely including new baggage-screening software that automatically clears some simple objects like clothing without running X-ray images past human screeners.

Guido Peetermans, the program's manager, said explosives are typically very dense, but low-density items like jackets can be automatically cleared. "The reliability of the algorithm is very high," he said. "Technically, what it means is there are a certain number of images that no human operator will see."

Mr. Barnett, the aviation-security expert, said it's dangerous to let a computer categorically rule some objects as safe in baggage screening. "Maybe in the past we've never had explosives that were as low density as a sports jacket," he said. "But now [terrorists] can target sports jackets as their goal."

Airlines, airports and authorities all say that aviation security will remain a layered process that always includes some human interaction, intelligence and randomization. Major security changes, particularly at checkpoints overseen by government agencies, will take years to come to fruition.

The Transportation Security Administration currently uses biometrics to control employees' access to secure areas and verify the identities of passengers who enroll in its known-traveler program, PreCheck. But the agency said it doesn't have any current plans to use the technology to process fliers at the airport.

The U.S. does use biometrics for airport border control. Nearly 2 million frequent fliers are enrolled in trusted-traveler programs under the U.S. Customs and Border Protection that let them scan their fingerprints instead of talking to an immigration officer when re-entering the country. These biometric kiosks were used 820,000 times this summer, up 75% from the summer of 2012.

The U.S. also collects photographs and fingerprints from every foreign national entering the country.

Vahid Motevalli, an aviation-security expert and professor at Tennessee Tech University, said biometric systems protect against the liabilities of a human screener. "People get tired, bored and more prone to making errors," he said. "You hope machines don't have that problem."

From fiscal year 2010 through 2012, TSA employees were caught violating screening and security procedures nearly 2,000 times, including allowing fliers or baggage to bypass screening, according to the Government Accountability Office. The TSA said that it has "zero tolerance for misconduct in the workplace" and that it's implementing all of the GAO's recommendations to better monitor employee misconduct.

In a test of facial-recognition scanners at Amsterdam Schiphol in 2010, Dutch university and government researchers found that the machines could correctly approve almost 98% of travelers, while allowing one of every 1,000 impostors to pass, on average. The study didn't give comparable numbers for humans.

Still, in 2011, Gatwick's automated immigration kiosks twice approved travelers who were using the wrong passport, and the kiosks at the Manchester, England, airport were temporarily closed because of a similar incident, according to the U.K.'s chief immigration inspector.

Richard Bloom, director of terrorism, intelligence and security studies at Embry-Riddle Aeronautical University in Prescott, Ariz., said computers may be more reliable than humans, but they are also more predictable—making them vulnerable to sophisticated terrorists. "As long as you can find out how a machine works," he said, "people with resources can figure out how to beat it."

Mr. Motevalli counters that manual ID checks are also vulnerable. Identification documents can be counterfeit, he said, "but biometrics is much harder to defeat."

Airports and government agencies are also using automation in some less obvious areas. For years, scans of checked baggage have been largely automated to simply detect explosives. Airports in Las Vegas, Syracuse, N.Y., and Atlantic City, N.J., recently invested in unmanned, automated exit gates that bar re-entry to secure areas, replacing human guards.

Gatwick is also using facial-recognition software to calculate queues in real time at security and immigration checkpoints. The airport captures images of almost all travelers' faces as they approach the checkpoints and then uses those images to note when each traveler departs the checkpoints. The aggregate data provide an estimated wait-time.

Mr. Ibbitson, the Gatwick CIO, said the posted wait-times keep passengers flowing efficiently to the shortest security lanes and help security staff decide when to open extra lanes. The program has helped keep security wait-times almost always below five minutes, he said.

And earlier this year, the first fully automated bag-screening machine hit the market. The machine from Qylur Security Systems Inc. will automatically screen bags for any prohibited items, including weapons, liquids and explosives—without any human assistance.

It was recently tested at the Statue of Liberty, a Rio de Janeiro airport and MetLife Stadium in New Jersey, which will host the Super Bowl in February. Qylur founder Lisa Dolev, said the company has discussed the machine with government security officials in Brazil, Europe and the U.S.

每日英语:Can Robots Better Spot Terrorists at Airports?的更多相关文章

  1. 每日英语:Robots To Revolutionize China

    A new worker's revolution is rising in China and it doesn't involve humans. With soaring wages and a ...

  2. 每日英语:Success Outside the Dress Code

    Anyone who has felt like the odd duck of the group can take heart from new research from Harvard Bus ...

  3. 每日英语:These Gadgets Aim To Put Some Teeth Into The Internet Of Things

    What the world needs now is a Web-enabled toothbrush. That part is clear to several oral-hygiene com ...

  4. 每日英语:How Pop Culture Influences Chinese Travelers

    Where are Chinese tourists going to next? Pop culture may hold some clues, from blockbuster rom-com ...

  5. 每日英语:A Chinese Soccer Club Has Won Something!

    A 1-1 tie at home was sufficient for Guangzhou Evergrande to clinch the Asian Champions League title ...

  6. 每日英语:Auto Makers Accelerate Efforts to Develop Self-Driving Cars

    Big auto makers are steering their efforts to develop cars that drive themselves out of the labs and ...

  7. 每日英语:Apple Unveils New iPads

    Apple Inc. 's answer to the increasingly cutthroat tablet-computer market: more product choices and ...

  8. 每日英语:Skull Shakes Up Human Family Tree

    A newly discovered 1.8 million-year-old skull offers evidence that humanity's early ancestors emerge ...

  9. 每日英语:Vender Assault Shines Ugly Light on China's Urban Enforcers

    The sudden death of a street vendor in Hunan province on Wednesday provoked outrage chengguan, or ur ...

随机推荐

  1. Easyui入门视频教程 第04集---Easyui布局

    目录 目录 ----------------------- Easyui入门视频教程 第09集---登录完善 图标自定义   Easyui入门视频教程 第08集---登录实现 ajax button的 ...

  2. hibernate注解note

    @Id标识主键属性 1.hibernate5.2 mysql5.7 不需要实现 serializable也可以? 2.主键255的长度我生成了? @GeneratedValue主键生成策略 1.主键设 ...

  3. IP首部格式[转载]

    TCP 传输首部是 IP首部,所以把IP首部格式 拿过来研究下,看IP首部解码过程:   来源:51CTO博客,地址:http://lihuan.blog.51cto.com/4391550/7999 ...

  4. 【HTML】input标签中alt属性和title属性的比较

    经常用到这两个属性,但是一直没有总结他们的区别.现在我对他们两个的用法做一下总结: 相同点:他们都会飘出一个小浮层,显示文本内容. 不同点: 1.alt只能是元素的属性,而title即可以是元素的属性 ...

  5. 《JAVA与模式》之简单工厂与工厂方法

    一.简单工厂 1.1 使用场景 1.工厂类负责创建的对象比较少: 2.客户只知道传入工厂类的参数,对于如何创建对象(逻辑)不关心: 3.由于简单工厂很容易违反高内聚责任分配原则,因此一般只在很简单的情 ...

  6. fork()和写时复制

    写时复制技术最初产生于Unix系统,用于实现一种傻瓜式的进程创建:当发出fork(  )系统调用时,内核原样复制父进程的整个地址空间并把复制的那一份分配给子进程.这种行为是非常耗时的,因为它需要: · ...

  7. linux中chkconfig 启动程序顺序介绍

    1)redhat的启动方式和执行次序是: 加载内核 执行init程序 /etc/rc.d/rc.sysinit          # 由init执行的第一个脚本 /etc/rc.d/rc $RUNLE ...

  8. eclipse热部署配置

    1. 方法一 打开server.xml,找到 比对下:改成下面这样: <Context docBase="dreamlive" path="/ROOT"  ...

  9. spring 下载

    Spring官网(https://spring.io/)改版后,直接下载Jar包的链接,下面汇总 1.直接输入地址,改相应版本即可:http://repo.springsource.org/libs- ...

  10. Web安全之XSS(Cross Site Scripting)深入理解

    XSS的含义 XSS(Cross Site Scripting)即跨站脚本.跨站的主要内容是在脚本上. 跨站脚本 跨站脚本的跨,体现了浏览器的特性,可以跨域.所以也就给远程代码或者第三方域上的代码提供 ...