Next to have their jobs automated: airport-security screeners?

Aviation and government authorities are starting to use machines in lieu of people to verify the identities of fliers by scanning their faces, irises or fingerprints. Dozens of airports in Europe, Australia and the U.S. already employ such technology so passengers can pass immigration checks without showing identification to, or talking with, a person. Now, several major airports in Europe have started using these automated ID checks at security checkpoints and boarding gates.

The use of biometrics—computers verifying identities through physical characteristics—and other automated techniques in airport security is raising questions about the strengths of man versus machine in detecting potential terrorists. Industry officials argue the advantages outweigh the risks, and are promoting automation to help make air travel more efficient and less frustrating—and to save money.

Ultimately, the technology could "get rid of the boarding pass completely," with fliers' faces serving as their tickets, said Michael Ibbitson, chief information officer of London Gatwick Airport. Gatwick performed a trial this year in which it processed 3,000 British Airways fliers without boarding passes. The fliers scanned their irises when checking in, enabling cameras at security checkpoints and boarding gates to automatically recognize them. "We're only just starting to see what biometrics can do," he said.

Proponents, including government and industry officials, say that automation of airport security holds the promise to free human screeners so they can focus on detecting suspicious behavior or monitoring flagged travelers. And for some aspects of security, they say, computers can be more thorough and less error-prone than humans.

Critics, however, worry that relying too much on automation will dull the senses of human screeners and remove the human intuition that can detect when something just doesn't seem right.

"If you're sweating profusely, for example, the person checking your ID would notice. But that computer taking an iris scan wouldn't," said aviation-security expert Arnold Barnett, a professor at the Massachusetts Institute of Technology. A key part of airport security is "looking at all kinds of things that can't be captured by an algorithm," he said.

About 28% of the world's airports now use biometric technology, up from 18% in 2008, according to a survey by SITA, an airline IT provider.

The International Air Transport Association and Airports Council International, two of the industry's largest global trade groups, advocate automation as part of their initiative to streamline airport security. The groups say the lengthy and cumbersome security process is deterring some travelers from flying, and note that the average checkpoint now processes about 150 passengers an hour, half the rate before the terror attacks of Sept. 11, 2001.

Their "Smart Security" program will use new checkpoints at Amsterdam Airport Schiphol and London Heathrow Airport next year to test key proposals, likely including new baggage-screening software that automatically clears some simple objects like clothing without running X-ray images past human screeners.

Guido Peetermans, the program's manager, said explosives are typically very dense, but low-density items like jackets can be automatically cleared. "The reliability of the algorithm is very high," he said. "Technically, what it means is there are a certain number of images that no human operator will see."

Mr. Barnett, the aviation-security expert, said it's dangerous to let a computer categorically rule some objects as safe in baggage screening. "Maybe in the past we've never had explosives that were as low density as a sports jacket," he said. "But now [terrorists] can target sports jackets as their goal."

Airlines, airports and authorities all say that aviation security will remain a layered process that always includes some human interaction, intelligence and randomization. Major security changes, particularly at checkpoints overseen by government agencies, will take years to come to fruition.

The Transportation Security Administration currently uses biometrics to control employees' access to secure areas and verify the identities of passengers who enroll in its known-traveler program, PreCheck. But the agency said it doesn't have any current plans to use the technology to process fliers at the airport.

The U.S. does use biometrics for airport border control. Nearly 2 million frequent fliers are enrolled in trusted-traveler programs under the U.S. Customs and Border Protection that let them scan their fingerprints instead of talking to an immigration officer when re-entering the country. These biometric kiosks were used 820,000 times this summer, up 75% from the summer of 2012.

The U.S. also collects photographs and fingerprints from every foreign national entering the country.

Vahid Motevalli, an aviation-security expert and professor at Tennessee Tech University, said biometric systems protect against the liabilities of a human screener. "People get tired, bored and more prone to making errors," he said. "You hope machines don't have that problem."

From fiscal year 2010 through 2012, TSA employees were caught violating screening and security procedures nearly 2,000 times, including allowing fliers or baggage to bypass screening, according to the Government Accountability Office. The TSA said that it has "zero tolerance for misconduct in the workplace" and that it's implementing all of the GAO's recommendations to better monitor employee misconduct.

In a test of facial-recognition scanners at Amsterdam Schiphol in 2010, Dutch university and government researchers found that the machines could correctly approve almost 98% of travelers, while allowing one of every 1,000 impostors to pass, on average. The study didn't give comparable numbers for humans.

Still, in 2011, Gatwick's automated immigration kiosks twice approved travelers who were using the wrong passport, and the kiosks at the Manchester, England, airport were temporarily closed because of a similar incident, according to the U.K.'s chief immigration inspector.

Richard Bloom, director of terrorism, intelligence and security studies at Embry-Riddle Aeronautical University in Prescott, Ariz., said computers may be more reliable than humans, but they are also more predictable—making them vulnerable to sophisticated terrorists. "As long as you can find out how a machine works," he said, "people with resources can figure out how to beat it."

Mr. Motevalli counters that manual ID checks are also vulnerable. Identification documents can be counterfeit, he said, "but biometrics is much harder to defeat."

Airports and government agencies are also using automation in some less obvious areas. For years, scans of checked baggage have been largely automated to simply detect explosives. Airports in Las Vegas, Syracuse, N.Y., and Atlantic City, N.J., recently invested in unmanned, automated exit gates that bar re-entry to secure areas, replacing human guards.

Gatwick is also using facial-recognition software to calculate queues in real time at security and immigration checkpoints. The airport captures images of almost all travelers' faces as they approach the checkpoints and then uses those images to note when each traveler departs the checkpoints. The aggregate data provide an estimated wait-time.

Mr. Ibbitson, the Gatwick CIO, said the posted wait-times keep passengers flowing efficiently to the shortest security lanes and help security staff decide when to open extra lanes. The program has helped keep security wait-times almost always below five minutes, he said.

And earlier this year, the first fully automated bag-screening machine hit the market. The machine from Qylur Security Systems Inc. will automatically screen bags for any prohibited items, including weapons, liquids and explosives—without any human assistance.

It was recently tested at the Statue of Liberty, a Rio de Janeiro airport and MetLife Stadium in New Jersey, which will host the Super Bowl in February. Qylur founder Lisa Dolev, said the company has discussed the machine with government security officials in Brazil, Europe and the U.S.

每日英语:Can Robots Better Spot Terrorists at Airports?的更多相关文章

  1. 每日英语:Robots To Revolutionize China

    A new worker's revolution is rising in China and it doesn't involve humans. With soaring wages and a ...

  2. 每日英语:Success Outside the Dress Code

    Anyone who has felt like the odd duck of the group can take heart from new research from Harvard Bus ...

  3. 每日英语:These Gadgets Aim To Put Some Teeth Into The Internet Of Things

    What the world needs now is a Web-enabled toothbrush. That part is clear to several oral-hygiene com ...

  4. 每日英语:How Pop Culture Influences Chinese Travelers

    Where are Chinese tourists going to next? Pop culture may hold some clues, from blockbuster rom-com ...

  5. 每日英语:A Chinese Soccer Club Has Won Something!

    A 1-1 tie at home was sufficient for Guangzhou Evergrande to clinch the Asian Champions League title ...

  6. 每日英语:Auto Makers Accelerate Efforts to Develop Self-Driving Cars

    Big auto makers are steering their efforts to develop cars that drive themselves out of the labs and ...

  7. 每日英语:Apple Unveils New iPads

    Apple Inc. 's answer to the increasingly cutthroat tablet-computer market: more product choices and ...

  8. 每日英语:Skull Shakes Up Human Family Tree

    A newly discovered 1.8 million-year-old skull offers evidence that humanity's early ancestors emerge ...

  9. 每日英语:Vender Assault Shines Ugly Light on China's Urban Enforcers

    The sudden death of a street vendor in Hunan province on Wednesday provoked outrage chengguan, or ur ...

随机推荐

  1. [JavaScript模块演化简史]摘要

    来源于:https://zhuanlan.zhihu.com/p/26231889 # JavaScript 模块化 早期的JavaScript并没有模块化解决方案.随着单页应用与富客户端的流行,出现 ...

  2. 总结一下关于mysql 5.6 新特性

    一直断断续续的看一些mysql特性,今天总结一下,以下是列表,网址 http://mariadb.org/ (也是类似的特性), http://mysql.com/ 最近在看关于mysql新特性的一些 ...

  3. <转>字节码指令

    本文转自:http://www.cnblogs.com/nazhizq/p/6525263.html 在llimits.h文件中定义了指令的类型.其实就是32个字节. typedef lu_int32 ...

  4. Java中timer的schedule()和schedualAtFixedRate()函数的区别

    本文主要讨论java.util.Timer的schedule(timerTask,delay,period)和scheduleAtFixedRate(timerTask,delay,period)的区 ...

  5. 【解决问题】failed: java.lang.RuntimeException: org.openqa.selenium.WebDriverException: Unexpected error launching Internet Explorer.

    failed: java.lang.RuntimeException: org.openqa.selenium.WebDriverException: Unexpected error launchi ...

  6. UIAlertView/UIAlertController封装使用

    基于UIAlertView封装的JXTAlertView,这个是将之前写Demo时搞的一套快捷使用alertView的工具抽离整理出来的,并提供了C函数直接调用,像这样: jxt_showAlertT ...

  7. zabbix v3.0安装部署

    这篇文章没有写明init的部分要注意 zabbix v3.0安装部署 摘要: 本文的安装过程摘自http://www.ttlsa.com/以及http://b.lifec-inc.com ,和站长凉白 ...

  8. Linux主要shell命令详解(中)

    shell中的特殊字符 shell中除使用普通字符外,还可以使用一些具有特殊含义和功能的特殊字符.在使用它们时应注意其特殊的含义和作用范围.下面分别对这些特殊字符加以介绍. 1. 通配符 通配符用于模 ...

  9. 进阶之路(中级篇) - 015 串口控RGB三色灯

    本文由博主原创,如有不对之处请指明,转载请说明出处. /********************************* 代码功能:串口控RGB三色灯 使用函数: Serial.flush(); / ...

  10. Redis 集群_主从配置_哨兵模式

    首先:slaveof 可以在[从]服务器启动一个service服务,直接将[从]服务器定义为[从Redis] redis-server --slaveof <master-ip> < ...