每日英语:Can Robots Better Spot Terrorists at Airports?
Next to have their jobs automated: airport-security screeners?
Aviation and government authorities are starting to use machines in lieu of people to verify the identities of fliers by scanning their faces, irises or fingerprints. Dozens of airports in Europe, Australia and the U.S. already employ such technology so passengers can pass immigration checks without showing identification to, or talking with, a person. Now, several major airports in Europe have started using these automated ID checks at security checkpoints and boarding gates.
The use of biometrics—computers verifying identities through physical characteristics—and other automated techniques in airport security is raising questions about the strengths of man versus machine in detecting potential terrorists. Industry officials argue the advantages outweigh the risks, and are promoting automation to help make air travel more efficient and less frustrating—and to save money.
Ultimately, the technology could "get rid of the boarding pass completely," with fliers' faces serving as their tickets, said Michael Ibbitson, chief information officer of London Gatwick Airport. Gatwick performed a trial this year in which it processed 3,000 British Airways fliers without boarding passes. The fliers scanned their irises when checking in, enabling cameras at security checkpoints and boarding gates to automatically recognize them. "We're only just starting to see what biometrics can do," he said.
Proponents, including government and industry officials, say that automation of airport security holds the promise to free human screeners so they can focus on detecting suspicious behavior or monitoring flagged travelers. And for some aspects of security, they say, computers can be more thorough and less error-prone than humans.
Critics, however, worry that relying too much on automation will dull the senses of human screeners and remove the human intuition that can detect when something just doesn't seem right.
"If you're sweating profusely, for example, the person checking your ID would notice. But that computer taking an iris scan wouldn't," said aviation-security expert Arnold Barnett, a professor at the Massachusetts Institute of Technology. A key part of airport security is "looking at all kinds of things that can't be captured by an algorithm," he said.
About 28% of the world's airports now use biometric technology, up from 18% in 2008, according to a survey by SITA, an airline IT provider.
The International Air Transport Association and Airports Council International, two of the industry's largest global trade groups, advocate automation as part of their initiative to streamline airport security. The groups say the lengthy and cumbersome security process is deterring some travelers from flying, and note that the average checkpoint now processes about 150 passengers an hour, half the rate before the terror attacks of Sept. 11, 2001.
Their "Smart Security" program will use new checkpoints at Amsterdam Airport Schiphol and London Heathrow Airport next year to test key proposals, likely including new baggage-screening software that automatically clears some simple objects like clothing without running X-ray images past human screeners.
Guido Peetermans, the program's manager, said explosives are typically very dense, but low-density items like jackets can be automatically cleared. "The reliability of the algorithm is very high," he said. "Technically, what it means is there are a certain number of images that no human operator will see."
Mr. Barnett, the aviation-security expert, said it's dangerous to let a computer categorically rule some objects as safe in baggage screening. "Maybe in the past we've never had explosives that were as low density as a sports jacket," he said. "But now [terrorists] can target sports jackets as their goal."
Airlines, airports and authorities all say that aviation security will remain a layered process that always includes some human interaction, intelligence and randomization. Major security changes, particularly at checkpoints overseen by government agencies, will take years to come to fruition.
The Transportation Security Administration currently uses biometrics to control employees' access to secure areas and verify the identities of passengers who enroll in its known-traveler program, PreCheck. But the agency said it doesn't have any current plans to use the technology to process fliers at the airport.
The U.S. does use biometrics for airport border control. Nearly 2 million frequent fliers are enrolled in trusted-traveler programs under the U.S. Customs and Border Protection that let them scan their fingerprints instead of talking to an immigration officer when re-entering the country. These biometric kiosks were used 820,000 times this summer, up 75% from the summer of 2012.
The U.S. also collects photographs and fingerprints from every foreign national entering the country.
Vahid Motevalli, an aviation-security expert and professor at Tennessee Tech University, said biometric systems protect against the liabilities of a human screener. "People get tired, bored and more prone to making errors," he said. "You hope machines don't have that problem."
From fiscal year 2010 through 2012, TSA employees were caught violating screening and security procedures nearly 2,000 times, including allowing fliers or baggage to bypass screening, according to the Government Accountability Office. The TSA said that it has "zero tolerance for misconduct in the workplace" and that it's implementing all of the GAO's recommendations to better monitor employee misconduct.
In a test of facial-recognition scanners at Amsterdam Schiphol in 2010, Dutch university and government researchers found that the machines could correctly approve almost 98% of travelers, while allowing one of every 1,000 impostors to pass, on average. The study didn't give comparable numbers for humans.
Still, in 2011, Gatwick's automated immigration kiosks twice approved travelers who were using the wrong passport, and the kiosks at the Manchester, England, airport were temporarily closed because of a similar incident, according to the U.K.'s chief immigration inspector.
Richard Bloom, director of terrorism, intelligence and security studies at Embry-Riddle Aeronautical University in Prescott, Ariz., said computers may be more reliable than humans, but they are also more predictable—making them vulnerable to sophisticated terrorists. "As long as you can find out how a machine works," he said, "people with resources can figure out how to beat it."
Mr. Motevalli counters that manual ID checks are also vulnerable. Identification documents can be counterfeit, he said, "but biometrics is much harder to defeat."
Airports and government agencies are also using automation in some less obvious areas. For years, scans of checked baggage have been largely automated to simply detect explosives. Airports in Las Vegas, Syracuse, N.Y., and Atlantic City, N.J., recently invested in unmanned, automated exit gates that bar re-entry to secure areas, replacing human guards.
Gatwick is also using facial-recognition software to calculate queues in real time at security and immigration checkpoints. The airport captures images of almost all travelers' faces as they approach the checkpoints and then uses those images to note when each traveler departs the checkpoints. The aggregate data provide an estimated wait-time.
Mr. Ibbitson, the Gatwick CIO, said the posted wait-times keep passengers flowing efficiently to the shortest security lanes and help security staff decide when to open extra lanes. The program has helped keep security wait-times almost always below five minutes, he said.
And earlier this year, the first fully automated bag-screening machine hit the market. The machine from Qylur Security Systems Inc. will automatically screen bags for any prohibited items, including weapons, liquids and explosives—without any human assistance.
It was recently tested at the Statue of Liberty, a Rio de Janeiro airport and MetLife Stadium in New Jersey, which will host the Super Bowl in February. Qylur founder Lisa Dolev, said the company has discussed the machine with government security officials in Brazil, Europe and the U.S.
每日英语:Can Robots Better Spot Terrorists at Airports?的更多相关文章
- 每日英语:Robots To Revolutionize China
A new worker's revolution is rising in China and it doesn't involve humans. With soaring wages and a ...
- 每日英语:Success Outside the Dress Code
Anyone who has felt like the odd duck of the group can take heart from new research from Harvard Bus ...
- 每日英语:These Gadgets Aim To Put Some Teeth Into The Internet Of Things
What the world needs now is a Web-enabled toothbrush. That part is clear to several oral-hygiene com ...
- 每日英语:How Pop Culture Influences Chinese Travelers
Where are Chinese tourists going to next? Pop culture may hold some clues, from blockbuster rom-com ...
- 每日英语:A Chinese Soccer Club Has Won Something!
A 1-1 tie at home was sufficient for Guangzhou Evergrande to clinch the Asian Champions League title ...
- 每日英语:Auto Makers Accelerate Efforts to Develop Self-Driving Cars
Big auto makers are steering their efforts to develop cars that drive themselves out of the labs and ...
- 每日英语:Apple Unveils New iPads
Apple Inc. 's answer to the increasingly cutthroat tablet-computer market: more product choices and ...
- 每日英语:Skull Shakes Up Human Family Tree
A newly discovered 1.8 million-year-old skull offers evidence that humanity's early ancestors emerge ...
- 每日英语:Vender Assault Shines Ugly Light on China's Urban Enforcers
The sudden death of a street vendor in Hunan province on Wednesday provoked outrage chengguan, or ur ...
随机推荐
- 【mysql】使用xtrabackup在线增量备份及恢复数据库
一.Percona Xtrabackup 简介 1.Xtrabackup bin目录文件 介绍 1)innobackupex innobackupex 是xtrabackup的一个符号链接 . in ...
- 使用 kubectl drain 从集群中移除节点
对节点执行维护操作之前(例如:内核升级,硬件维护等),您可以使用 kubectl drain 安全驱逐节点上面所有的 pod.安全驱逐的方式将会允许 pod 里面的容器遵循指定的 PodDisrupt ...
- Xcode7 运行iOS10以上系统(10.1、10.2、10.3)解决Could not find Developer Disk Image
由于历史原因,需要在Xcode7上真机运行下app,无奈手机系统已是10.3了,一运行, 就提示:Could not find Developer Disk Image 解决办法: 1.找到xcode ...
- ios实例开发精品文章推荐(8.5)
IOS基础知识记录 IOS基础知识记录一 http://www.apkbus.com/android-131902-1-1.htmlIOS基础知识记录二 http://ww ...
- Java正则应用
private List<String> find(String reg, String str) { Matcher matcher = Pattern.compile(reg).mat ...
- 谁说C语言很简单?
前两天,Neo写了一篇<语言的歧义>其使用C语言讨论了一些语言的歧义.大家应该也顺便了解了一下C语言中的很多不可思异的东西,可能也是你从未注意到的东西. 是的,C语言并不简单,让我们来看看 ...
- MySQL经常使用技巧
建表 每一个表都有一个id字段,最好为UNSIGNED.如 INT(9) UNSIGNED NOT NULL 在表使用一段时间后,使用PROCEDURE ANALYSE得到建议,如select * f ...
- RecylerView 的使用方法
package com.cardvalue.sys.fragment; import android.content.Intent; import android.net.Uri; import an ...
- Shell脚本开发规范
一.前言 由于工作需要,最近重新开始拾掇shell脚本.虽然绝大部分命令自己平时也经常使用,但是在写成脚本的时候总觉得写的很难看.而且当我在看其他人写的脚本的时候,总觉得难以阅读.毕竟shell脚本这 ...
- django -- 为模式增加方法
在django中模式中的方法是行级的.也就是说它操作是表里的行.不是整个表 一.模式定义: from django.db import models # Create your models here ...