Big Brother Really Is Watching
Homeland Security is bankrolling futuristic profiling technology to nab terrorists before they strike.
Computerworld - The year is 2012.
As soon as you walk into the airport, the machines are watching. Are you a tourist -- or a terrorist posing as one?
As you answer a few questions at the security checkpoint, the systems begin sizing you up. An array of sensors -- video, audio, laser, infrared -- feeds a stream of real-time data about you to a computer that uses specially developed algorithms to spot suspicious people.
The system interprets your gestures and facial expressions, analyzes your voice and virtually probes your body to determine your temperature, heart rate, respiration rate and other physiological characteristics -- all in an effort to determine whether you are trying to deceive.
Fail the test, and you'll be pulled aside for a more aggressive interrogation and searches.
That scenario may sound like science fiction, but the U.S. Department of Homeland Security (DHS) is deadly serous about making it a reality.
Interest in the use of what some researchers call behavioral profiling (the DHS prefers the term "assessing culturally neutral behaviors") for deception detection intensified last July, when the department's human factors division asked researchers to develop technologies to support Project Hostile Intent, an initiative to build systems that automatically identify and analyze behavioral and physiological cues associated with deception.
That project is part of a broader initiative called the Future Attribute Screening Technologies Mobile Module, which seeks to create self-contained, automated screening systems that are portable and relatively easy to implement.
The DHS has aggressive plans for the technology. The schedule calls for an initial demonstration for the Transportation Security Administration (TSA) early this year, followed by test deployments in 2010. By 2012, if all goes well, the agency hopes to begin deploying automated test systems at airports, border checkpoints and other points of entry.
If successful, the technology could also be used in private-sector areas such as building-access control and job-candidate screening. Critics, however, say that the system will take much longer to develop than the department is predicting -- and that it might never work at all.
In the Details
"It's a good idea fraught with difficulties," says Bruce Schneier, chief technology officer at security consultancy BT Counterpane in Santa Clara, Calif.
Schneier says that focusing on suspicious people is a better idea than trying to detect suspicious objects. The metal-detecting magnetometers that airport screeners have relied on for more than 30 years are easily defeated, he says. But he thinks the technology needed for Project Hostile Intent to succeed is still at least 15 years out. "We can't even do facial recognition," he says. "Don't hold your breath."
But Sharla Rausch, director of the DHS's human factors division, says the agency is already seeing positive results. In a controlled lab setting, she says, accuracy rates are in the range of 78 to 81%. The tests are still producing too many false positives, however. "In an operational setting, we need to be at a higher level than that," Rausch says, and she's confident that results will improve. At this point, though, it's still unclear how well the systems will work in real-world settings.
Measuring Hostile Intent
Current research focuses on three key areas. The first is recognition of gestures and so-called "microfacial expressions" -- a poker player might call them "tells" -- that flash across a person's face in about one third of a second. Some researchers say micro expressions can betray a person when he is trying to deceive.
The second area is analysis of variations in speech, such as pitch and loudness, for indicators of untruthfulness.
The third is measurement of physiological characteristics such as blood pressure, pulse, skin moisture and respiration that have been associated with polygraphs, or lie detectors.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses
- IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center
- IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results
- Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data... All Government IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts