Big Brother Really Is Watching
Homeland Security is bankrolling futuristic profiling technology to nab terrorists before they strike.
Computerworld - The year is 2012.
As soon as you walk into the airport, the machines are watching. Are you a tourist -- or a terrorist posing as one?
As you answer a few questions at the security checkpoint, the systems begin sizing you up. An array of sensors -- video, audio, laser, infrared -- feeds a stream of real-time data about you to a computer that uses specially developed algorithms to spot suspicious people.
The system interprets your gestures and facial expressions, analyzes your voice and virtually probes your body to determine your temperature, heart rate, respiration rate and other physiological characteristics -- all in an effort to determine whether you are trying to deceive.
Fail the test, and you'll be pulled aside for a more aggressive interrogation and searches.
That scenario may sound like science fiction, but the U.S. Department of Homeland Security (DHS) is deadly serous about making it a reality.
Interest in the use of what some researchers call behavioral profiling (the DHS prefers the term "assessing culturally neutral behaviors") for deception detection intensified last July, when the department's human factors division asked researchers to develop technologies to support Project Hostile Intent, an initiative to build systems that automatically identify and analyze behavioral and physiological cues associated with deception.
That project is part of a broader initiative called the Future Attribute Screening Technologies Mobile Module, which seeks to create self-contained, automated screening systems that are portable and relatively easy to implement.
The DHS has aggressive plans for the technology. The schedule calls for an initial demonstration for the Transportation Security Administration (TSA) early this year, followed by test deployments in 2010. By 2012, if all goes well, the agency hopes to begin deploying automated test systems at airports, border checkpoints and other points of entry.
If successful, the technology could also be used in private-sector areas such as building-access control and job-candidate screening. Critics, however, say that the system will take much longer to develop than the department is predicting -- and that it might never work at all.
In the Details
"It's a good idea fraught with difficulties," says Bruce Schneier, chief technology officer at security consultancy BT Counterpane in Santa Clara, Calif.
Schneier says that focusing on suspicious people is a better idea than trying to detect suspicious objects. The metal-detecting magnetometers that airport screeners have relied on for more than 30 years are easily defeated, he says. But he thinks the technology needed for Project Hostile Intent to succeed is still at least 15 years out. "We can't even do facial recognition," he says. "Don't hold your breath."
But Sharla Rausch, director of the DHS's human factors division, says the agency is already seeing positive results. In a controlled lab setting, she says, accuracy rates are in the range of 78 to 81%. The tests are still producing too many false positives, however. "In an operational setting, we need to be at a higher level than that," Rausch says, and she's confident that results will improve. At this point, though, it's still unclear how well the systems will work in real-world settings.
Measuring Hostile Intent
Current research focuses on three key areas. The first is recognition of gestures and so-called "microfacial expressions" -- a poker player might call them "tells" -- that flash across a person's face in about one third of a second. Some researchers say micro expressions can betray a person when he is trying to deceive.
The second area is analysis of variations in speech, such as pitch and loudness, for indicators of untruthfulness.
The third is measurement of physiological characteristics such as blood pressure, pulse, skin moisture and respiration that have been associated with polygraphs, or lie detectors.
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Why Projects Fail
- CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings
- This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools
- The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution
- In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence... All Government IT White Papers
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- How to Protect Enterprise Data Yet Enable Secure Access for End Users Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT...
- All Government IT Webcasts