每日英语:Can Robots Better Spot Terrorists at Airports?
Next to have their jobs automated: airport-security screeners?
Aviation and government authorities are starting to use machines in lieu of people to verify the identities of fliers by scanning their faces, irises or fingerprints. Dozens of airports in Europe, Australia and the U.S. already employ such technology so passengers can pass immigration checks without showing identification to, or talking with, a person. Now, several major airports in Europe have started using these automated ID checks at security checkpoints and boarding gates.
The use of biometrics—computers verifying identities through physical characteristics—and other automated techniques in airport security is raising questions about the strengths of man versus machine in detecting potential terrorists. Industry officials argue the advantages outweigh the risks, and are promoting automation to help make air travel more efficient and less frustrating—and to save money.
Ultimately, the technology could "get rid of the boarding pass completely," with fliers' faces serving as their tickets, said Michael Ibbitson, chief information officer of London Gatwick Airport. Gatwick performed a trial this year in which it processed 3,000 British Airways fliers without boarding passes. The fliers scanned their irises when checking in, enabling cameras at security checkpoints and boarding gates to automatically recognize them. "We're only just starting to see what biometrics can do," he said.
Proponents, including government and industry officials, say that automation of airport security holds the promise to free human screeners so they can focus on detecting suspicious behavior or monitoring flagged travelers. And for some aspects of security, they say, computers can be more thorough and less error-prone than humans.
Critics, however, worry that relying too much on automation will dull the senses of human screeners and remove the human intuition that can detect when something just doesn't seem right.
"If you're sweating profusely, for example, the person checking your ID would notice. But that computer taking an iris scan wouldn't," said aviation-security expert Arnold Barnett, a professor at the Massachusetts Institute of Technology. A key part of airport security is "looking at all kinds of things that can't be captured by an algorithm," he said.
About 28% of the world's airports now use biometric technology, up from 18% in 2008, according to a survey by SITA, an airline IT provider.
The International Air Transport Association and Airports Council International, two of the industry's largest global trade groups, advocate automation as part of their initiative to streamline airport security. The groups say the lengthy and cumbersome security process is deterring some travelers from flying, and note that the average checkpoint now processes about 150 passengers an hour, half the rate before the terror attacks of Sept. 11, 2001.
Their "Smart Security" program will use new checkpoints at Amsterdam Airport Schiphol and London Heathrow Airport next year to test key proposals, likely including new baggage-screening software that automatically clears some simple objects like clothing without running X-ray images past human screeners.
Guido Peetermans, the program's manager, said explosives are typically very dense, but low-density items like jackets can be automatically cleared. "The reliability of the algorithm is very high," he said. "Technically, what it means is there are a certain number of images that no human operator will see."
Mr. Barnett, the aviation-security expert, said it's dangerous to let a computer categorically rule some objects as safe in baggage screening. "Maybe in the past we've never had explosives that were as low density as a sports jacket," he said. "But now [terrorists] can target sports jackets as their goal."
Airlines, airports and authorities all say that aviation security will remain a layered process that always includes some human interaction, intelligence and randomization. Major security changes, particularly at checkpoints overseen by government agencies, will take years to come to fruition.
The Transportation Security Administration currently uses biometrics to control employees' access to secure areas and verify the identities of passengers who enroll in its known-traveler program, PreCheck. But the agency said it doesn't have any current plans to use the technology to process fliers at the airport.
The U.S. does use biometrics for airport border control. Nearly 2 million frequent fliers are enrolled in trusted-traveler programs under the U.S. Customs and Border Protection that let them scan their fingerprints instead of talking to an immigration officer when re-entering the country. These biometric kiosks were used 820,000 times this summer, up 75% from the summer of 2012.
The U.S. also collects photographs and fingerprints from every foreign national entering the country.
Vahid Motevalli, an aviation-security expert and professor at Tennessee Tech University, said biometric systems protect against the liabilities of a human screener. "People get tired, bored and more prone to making errors," he said. "You hope machines don't have that problem."
From fiscal year 2010 through 2012, TSA employees were caught violating screening and security procedures nearly 2,000 times, including allowing fliers or baggage to bypass screening, according to the Government Accountability Office. The TSA said that it has "zero tolerance for misconduct in the workplace" and that it's implementing all of the GAO's recommendations to better monitor employee misconduct.
In a test of facial-recognition scanners at Amsterdam Schiphol in 2010, Dutch university and government researchers found that the machines could correctly approve almost 98% of travelers, while allowing one of every 1,000 impostors to pass, on average. The study didn't give comparable numbers for humans.
Still, in 2011, Gatwick's automated immigration kiosks twice approved travelers who were using the wrong passport, and the kiosks at the Manchester, England, airport were temporarily closed because of a similar incident, according to the U.K.'s chief immigration inspector.
Richard Bloom, director of terrorism, intelligence and security studies at Embry-Riddle Aeronautical University in Prescott, Ariz., said computers may be more reliable than humans, but they are also more predictable—making them vulnerable to sophisticated terrorists. "As long as you can find out how a machine works," he said, "people with resources can figure out how to beat it."
Mr. Motevalli counters that manual ID checks are also vulnerable. Identification documents can be counterfeit, he said, "but biometrics is much harder to defeat."
Airports and government agencies are also using automation in some less obvious areas. For years, scans of checked baggage have been largely automated to simply detect explosives. Airports in Las Vegas, Syracuse, N.Y., and Atlantic City, N.J., recently invested in unmanned, automated exit gates that bar re-entry to secure areas, replacing human guards.
Gatwick is also using facial-recognition software to calculate queues in real time at security and immigration checkpoints. The airport captures images of almost all travelers' faces as they approach the checkpoints and then uses those images to note when each traveler departs the checkpoints. The aggregate data provide an estimated wait-time.
Mr. Ibbitson, the Gatwick CIO, said the posted wait-times keep passengers flowing efficiently to the shortest security lanes and help security staff decide when to open extra lanes. The program has helped keep security wait-times almost always below five minutes, he said.
And earlier this year, the first fully automated bag-screening machine hit the market. The machine from Qylur Security Systems Inc. will automatically screen bags for any prohibited items, including weapons, liquids and explosives—without any human assistance.
It was recently tested at the Statue of Liberty, a Rio de Janeiro airport and MetLife Stadium in New Jersey, which will host the Super Bowl in February. Qylur founder Lisa Dolev, said the company has discussed the machine with government security officials in Brazil, Europe and the U.S.
每日英语:Can Robots Better Spot Terrorists at Airports?的更多相关文章
- 每日英语:Robots To Revolutionize China
A new worker's revolution is rising in China and it doesn't involve humans. With soaring wages and a ...
- 每日英语:Success Outside the Dress Code
Anyone who has felt like the odd duck of the group can take heart from new research from Harvard Bus ...
- 每日英语:These Gadgets Aim To Put Some Teeth Into The Internet Of Things
What the world needs now is a Web-enabled toothbrush. That part is clear to several oral-hygiene com ...
- 每日英语:How Pop Culture Influences Chinese Travelers
Where are Chinese tourists going to next? Pop culture may hold some clues, from blockbuster rom-com ...
- 每日英语:A Chinese Soccer Club Has Won Something!
A 1-1 tie at home was sufficient for Guangzhou Evergrande to clinch the Asian Champions League title ...
- 每日英语:Auto Makers Accelerate Efforts to Develop Self-Driving Cars
Big auto makers are steering their efforts to develop cars that drive themselves out of the labs and ...
- 每日英语:Apple Unveils New iPads
Apple Inc. 's answer to the increasingly cutthroat tablet-computer market: more product choices and ...
- 每日英语:Skull Shakes Up Human Family Tree
A newly discovered 1.8 million-year-old skull offers evidence that humanity's early ancestors emerge ...
- 每日英语:Vender Assault Shines Ugly Light on China's Urban Enforcers
The sudden death of a street vendor in Hunan province on Wednesday provoked outrage chengguan, or ur ...
随机推荐
- LeetCode——Combination Sum II
Given a collection of candidate numbers (C) and a target number (T), find all unique combinations in ...
- (原)lua及torch中的type
转载请注明出处: http://www.cnblogs.com/darkknightzh/p/6591641.html 说明:本文不一定正确... 如果要是variable:type(),则返回tor ...
- webservice(pers)
1. Java远程方法调用 Java远程方法调用,即Java RMI(Java Remote Method Invocation)是Java编程语言里,一种用于实现远程过程调用的应用程序编程接 ...
- <转>lua解释执行脚本流程
本文转自:http://www.cnblogs.com/zxh1210603696/p/4458473.html #include "lua.hpp" #include <i ...
- java restful接口
用json-lib的jar包输出json串: public void responseJason(HttpServletResponse response, Object obj){ ObjectMa ...
- git学习笔记(四)—— 分支管理
一.创建与合并分支 git branch //查看分支 git branch <name> //创建分支 git checkout <name> //切换分支 git chec ...
- 【Struts2】Struts2获取session的三种方式
1.Map<String,Object> map = ActionContext.getContext().getSession(); 2.HttpSession session = S ...
- spring 使用注解注入 list 或 map
1.定义一个接口或抽象类AClass 2.定义两个类实现或继承AClass,(BClass,MClass) 3.在第三个类XClass 中注入List 形如: @Autowired private L ...
- 使用 TensorFlow 的起始步骤
1 学习目标: 学习基本的 TensorFlow 概念 在 TensorFlow 中使用 LinearRegressor 类并基于单个输入特征预测各城市街区的房屋价值中位数 使用均方根误差 (RMSE ...
- linux手工释放内存
先使用sync命令以确保文件系统的完整性,sync 命令运行 sync 子例程,将所有未写的系统缓冲区写到磁盘中,包含已修改的 i-node.已延迟的块 I/O 和读写映射文件. 再执行下面任意一条命 ...