每日英语:Can Robots Better Spot Terrorists at Airports?
Next to have their jobs automated: airport-security screeners?
Aviation and government authorities are starting to use machines in lieu of people to verify the identities of fliers by scanning their faces, irises or fingerprints. Dozens of airports in Europe, Australia and the U.S. already employ such technology so passengers can pass immigration checks without showing identification to, or talking with, a person. Now, several major airports in Europe have started using these automated ID checks at security checkpoints and boarding gates.
The use of biometrics—computers verifying identities through physical characteristics—and other automated techniques in airport security is raising questions about the strengths of man versus machine in detecting potential terrorists. Industry officials argue the advantages outweigh the risks, and are promoting automation to help make air travel more efficient and less frustrating—and to save money.
Ultimately, the technology could "get rid of the boarding pass completely," with fliers' faces serving as their tickets, said Michael Ibbitson, chief information officer of London Gatwick Airport. Gatwick performed a trial this year in which it processed 3,000 British Airways fliers without boarding passes. The fliers scanned their irises when checking in, enabling cameras at security checkpoints and boarding gates to automatically recognize them. "We're only just starting to see what biometrics can do," he said.
Proponents, including government and industry officials, say that automation of airport security holds the promise to free human screeners so they can focus on detecting suspicious behavior or monitoring flagged travelers. And for some aspects of security, they say, computers can be more thorough and less error-prone than humans.
Critics, however, worry that relying too much on automation will dull the senses of human screeners and remove the human intuition that can detect when something just doesn't seem right.
"If you're sweating profusely, for example, the person checking your ID would notice. But that computer taking an iris scan wouldn't," said aviation-security expert Arnold Barnett, a professor at the Massachusetts Institute of Technology. A key part of airport security is "looking at all kinds of things that can't be captured by an algorithm," he said.
About 28% of the world's airports now use biometric technology, up from 18% in 2008, according to a survey by SITA, an airline IT provider.
The International Air Transport Association and Airports Council International, two of the industry's largest global trade groups, advocate automation as part of their initiative to streamline airport security. The groups say the lengthy and cumbersome security process is deterring some travelers from flying, and note that the average checkpoint now processes about 150 passengers an hour, half the rate before the terror attacks of Sept. 11, 2001.
Their "Smart Security" program will use new checkpoints at Amsterdam Airport Schiphol and London Heathrow Airport next year to test key proposals, likely including new baggage-screening software that automatically clears some simple objects like clothing without running X-ray images past human screeners.
Guido Peetermans, the program's manager, said explosives are typically very dense, but low-density items like jackets can be automatically cleared. "The reliability of the algorithm is very high," he said. "Technically, what it means is there are a certain number of images that no human operator will see."
Mr. Barnett, the aviation-security expert, said it's dangerous to let a computer categorically rule some objects as safe in baggage screening. "Maybe in the past we've never had explosives that were as low density as a sports jacket," he said. "But now [terrorists] can target sports jackets as their goal."
Airlines, airports and authorities all say that aviation security will remain a layered process that always includes some human interaction, intelligence and randomization. Major security changes, particularly at checkpoints overseen by government agencies, will take years to come to fruition.
The Transportation Security Administration currently uses biometrics to control employees' access to secure areas and verify the identities of passengers who enroll in its known-traveler program, PreCheck. But the agency said it doesn't have any current plans to use the technology to process fliers at the airport.
The U.S. does use biometrics for airport border control. Nearly 2 million frequent fliers are enrolled in trusted-traveler programs under the U.S. Customs and Border Protection that let them scan their fingerprints instead of talking to an immigration officer when re-entering the country. These biometric kiosks were used 820,000 times this summer, up 75% from the summer of 2012.
The U.S. also collects photographs and fingerprints from every foreign national entering the country.
Vahid Motevalli, an aviation-security expert and professor at Tennessee Tech University, said biometric systems protect against the liabilities of a human screener. "People get tired, bored and more prone to making errors," he said. "You hope machines don't have that problem."
From fiscal year 2010 through 2012, TSA employees were caught violating screening and security procedures nearly 2,000 times, including allowing fliers or baggage to bypass screening, according to the Government Accountability Office. The TSA said that it has "zero tolerance for misconduct in the workplace" and that it's implementing all of the GAO's recommendations to better monitor employee misconduct.
In a test of facial-recognition scanners at Amsterdam Schiphol in 2010, Dutch university and government researchers found that the machines could correctly approve almost 98% of travelers, while allowing one of every 1,000 impostors to pass, on average. The study didn't give comparable numbers for humans.
Still, in 2011, Gatwick's automated immigration kiosks twice approved travelers who were using the wrong passport, and the kiosks at the Manchester, England, airport were temporarily closed because of a similar incident, according to the U.K.'s chief immigration inspector.
Richard Bloom, director of terrorism, intelligence and security studies at Embry-Riddle Aeronautical University in Prescott, Ariz., said computers may be more reliable than humans, but they are also more predictable—making them vulnerable to sophisticated terrorists. "As long as you can find out how a machine works," he said, "people with resources can figure out how to beat it."
Mr. Motevalli counters that manual ID checks are also vulnerable. Identification documents can be counterfeit, he said, "but biometrics is much harder to defeat."
Airports and government agencies are also using automation in some less obvious areas. For years, scans of checked baggage have been largely automated to simply detect explosives. Airports in Las Vegas, Syracuse, N.Y., and Atlantic City, N.J., recently invested in unmanned, automated exit gates that bar re-entry to secure areas, replacing human guards.
Gatwick is also using facial-recognition software to calculate queues in real time at security and immigration checkpoints. The airport captures images of almost all travelers' faces as they approach the checkpoints and then uses those images to note when each traveler departs the checkpoints. The aggregate data provide an estimated wait-time.
Mr. Ibbitson, the Gatwick CIO, said the posted wait-times keep passengers flowing efficiently to the shortest security lanes and help security staff decide when to open extra lanes. The program has helped keep security wait-times almost always below five minutes, he said.
And earlier this year, the first fully automated bag-screening machine hit the market. The machine from Qylur Security Systems Inc. will automatically screen bags for any prohibited items, including weapons, liquids and explosives—without any human assistance.
It was recently tested at the Statue of Liberty, a Rio de Janeiro airport and MetLife Stadium in New Jersey, which will host the Super Bowl in February. Qylur founder Lisa Dolev, said the company has discussed the machine with government security officials in Brazil, Europe and the U.S.
每日英语:Can Robots Better Spot Terrorists at Airports?的更多相关文章
- 每日英语:Robots To Revolutionize China
A new worker's revolution is rising in China and it doesn't involve humans. With soaring wages and a ...
- 每日英语:Success Outside the Dress Code
Anyone who has felt like the odd duck of the group can take heart from new research from Harvard Bus ...
- 每日英语:These Gadgets Aim To Put Some Teeth Into The Internet Of Things
What the world needs now is a Web-enabled toothbrush. That part is clear to several oral-hygiene com ...
- 每日英语:How Pop Culture Influences Chinese Travelers
Where are Chinese tourists going to next? Pop culture may hold some clues, from blockbuster rom-com ...
- 每日英语:A Chinese Soccer Club Has Won Something!
A 1-1 tie at home was sufficient for Guangzhou Evergrande to clinch the Asian Champions League title ...
- 每日英语:Auto Makers Accelerate Efforts to Develop Self-Driving Cars
Big auto makers are steering their efforts to develop cars that drive themselves out of the labs and ...
- 每日英语:Apple Unveils New iPads
Apple Inc. 's answer to the increasingly cutthroat tablet-computer market: more product choices and ...
- 每日英语:Skull Shakes Up Human Family Tree
A newly discovered 1.8 million-year-old skull offers evidence that humanity's early ancestors emerge ...
- 每日英语:Vender Assault Shines Ugly Light on China's Urban Enforcers
The sudden death of a street vendor in Hunan province on Wednesday provoked outrage chengguan, or ur ...
随机推荐
- selectAll, unSelectAll两个操作的实现
private void updateBatchSelectionStatus() { ContactListAdapter.ViewHolder viewHolder = null; ...
- 深入浅出DOM基础——《DOM探索之基础详解篇》学习笔记
来源于:https://github.com/jawil/blog/issues/9 之前通过深入学习DOM的相关知识,看了慕课网DOM探索之基础详解篇这个视频(在最近看第三遍的时候,准备记录一点东西 ...
- startActivityForResult的使用和用法
startActivityForResult的使用和用法 startActivityForResult 和 onActivityResult在activity间传递数据 AndroidManifest ...
- SqlServer整库备份还原脚本
最近领导要求定时备份数据库(不是我的作业), 搜了一下资料还不少, 先mark一下, 得空再验证吧!!! 以下内容为转载 转自:https://www.cnblogs.com/want990/p/74 ...
- jQuery对象复制
// 浅层复制(只复制顶层的非 object 元素) var newObject = jQuery.extend({}, oldObject); // 深层复制(一层一层往下复制直到最底层) var ...
- IPsec ISAKMP(转)
IPsec ISAKMP 2010-08-10 11:47:01 标签:IPsec 职场 休闲 ISAKMP Interne 安全连接和密钥管理协议(ISAKMP)是 IPsec 体系结构中的一种主要 ...
- IT编年史 技术生命周期起步,成长,成熟和衰退四个阶段 IT历史总结
IT编年史 最近查看了大量的正史或者野史,体会了整个IT夜发展的风气云涌,颇为激动,撰写如下. 感谢google黑板报的浪潮之巅http://googlechinablog.com/2007/07/a ...
- 程序员,不要让自己做兔子(updated) 网上最近流传的一个笑话,关于兔子,狼还有一只老虎的,故事 我就是想打你了,还需要什么理由吗?谁让你是兔子 项目经理是这样当的
程序员,不要让自己做兔子(updated) 前段时间和一个朋友聊天,酒席间向我抱怨他那段时间的郁闷:项目经理从客户那里拿来一个需求,实际上就是一个ppt描述,我这个朋友拿过来看后刚开始不觉得什么,一个 ...
- 颜色传感器TCS230及颜色识别电路(转)
摘要 TCS230是美国TAOS公司生产的一种可编程彩色光到频率的传感器.该传感器具有分辨率高.可编程的颜色选择与输出定标.单电源供电等特点:输出为数字量,可直接与微处理器连接.文中主要介绍TCS23 ...
- 【C语言】练习2-9
题目来源:<The C programming language>中的习题P38 练习2-9: 在求对二的补码时,表达式x &= (x-1)可以删除x中最右边值为1的一个二进 ...