Airplane bombing plot spurs targeting technology

 

Connecting state and local government leaders

Technologies for pinpointing risky passengers drew renewed attention from Homeland Security Department officials following the recent terrorist airliner bombing plot.But wrangling over privacy policy remained a pivotal factor in evaluation of the data-mining technology.

Technologies for pinpointing risky passengers drew renewed attention from Homeland Security Department officials following the recent terrorist airliner bombing plot.But wrangling over privacy policy remained a pivotal factor in evaluation of the data-mining technology.DHS secretary Michael Chertoff pledged that security officials would put added emphasis on 'targeting tools' at airports, a term generally understood to include applications that finger terrorists by sifting through vast databases about travelers.Meanwhile, one major vendor of systems that DHS and other federal agencies use to detect threats said the aircraft bombing plot focused attention on software that analyzes security camera images to help security personnel identify risky travelers.And airport security specialists said technology is evolving to help unmask terrorists by blending information from multiple sources. The merged data might include information about a traveler's nationality and itinerary, thermal-camera measurements that could signal a person's emotions, voice stress analysis and behavioral indications, such as clutching a parcel, that could hint at a plot, the sources said.DHS has been working for years to upgrade its software to identify risky air travelers and bar them from planes, amid steady complaints about its unreliable systems. The most recent project, known as Secure Flight, began two years ago after its predecessor, the Computer Assisted Passenger Prescreening System, failed over privacy and security issues.Secure Flight has also faced criticism over privacy and security. All the department's air passenger prescreening systems have relied on combining information from the various federal terrorist watch lists with other types of data about individuals. The goal is to flag risky passengers using data-mining algorithms to find hidden patterns pointing to terrorism threats.But such data-mining methods, defined broadly, still irk privacy advocates.'I think it is unfortunate that the daily headlines dictate so much of the debate over counterterrorism measures,' said privacy advocate Jim Dempsey, executive director of the Center for Democracy and Technology in Washington. 'The fact is that data mining merits further study, but it remains an unproven technology and holds dangers from a privacy and due-process standpoint.'Dempsey charged that data-mining advocates have exaggerated the technology's effectiveness. He noted that the British investigation of the most recent airliner bomb plot began with an informant's tip and gained strength from wiretaps.'I have not seen evidence of what data mining can do in the absence of some reason to believe that an individual is involved in terrorist activity,' Dempsey said.Meanwhile, James Carafano, senior fellow at the Heritage Foundation, said ill-founded privacy concerns had aborted useful data-mining work such as the Pentagon's Total Information Awareness project that could promote both security and privacy.'I think the chilling effect of the backlash to TIA has prevented people from exploring effective data-mining technologies,' Carafano said.In addition to TIA's failure, TSA has never been able to get its Secure Flight program off the ground.'TSA never was able to define its goals for Secure Flight,' Dempsey said. 'Without defined goals, you can't achieve anything.'But Carafano disagreed with Dempsey's reasoning. He said Secure Flight's tailspin resulted from misguided concerns about privacy.'Secure Flight is moribund,' Carafano said. 'It keeps running into privacy roadblocks.'TSA declined to provide detailed information on how the Secure Flight project is developing.Chertoff cited plans for beefing up targeting technologies in the initial press conference about the airliner bombing plot: 'The Immigration and Customs Enforcement will be in- creasing enforcement efforts in the international arrival areas, including the use of advanced targeting tools, special response teams including baggage and aircraft search teams, baggage X-ray equipment, specially trained K-9 units and explosive detection technology,' Chertoff said.Previously announced research projects include systems that can detect individuals' 'suspicious behavior.'Law enforcement technology officials contend that these systems do not amount to legally or ethically barred 'profiling,' such as selecting persons for search on the grounds of their race or apparent religious affiliation.Law enforcement and counterterrorism officials have studied methods for pinpointing known terrorists in a crowd such as 'gait analysis,' which distinguishes people by the way they walk. The field includes a wide range of biometric identifiers that can serve either to match individuals in a crowd to known threats or to identify previously unknown terrorists from a distance. One senior official cited body odor as one of the more recent biometric identifiers.Ian Ehrenberg, vice president and general manager of the Video Surveillance Division of Nice Systems Inc. of Rananna, Israel, said his company's software for 'exception detection,' is getting a closer look from federal and airport officials.Ehrenberg said exception detection software works by processing security camera images to filter out untoward elements, such as unattended luggage, that could signal a security problem.The software also can point out such deviant behavior as turnstile-jumping that could warrant further investigation by security personnel, he said.Airports and train stations present special problems for systems designed to flag suspect behavior. 'If you can help me define normal behavior [in an airport], you would be a very useful resource,' Ehrenberg said, alluding to the widely varying activities and emotions shown by people passing through transportation hubs.'It is not going to become a Columbo,' Ehrenberg said of the security software.But by flagging suspicious events, the software can increase the efficiency of security teams and their technology.At the same time, the exception detection software can improve privacy by fending off improper use of video cameras by bored or prurient security workers, he said. 'Military tests have proven time and time again that after 30 minutes, 95 percent of effectiveness [of video cameras monitored by workers] goes away.'As for the fallout from the most recent airliner bombing plot, 'We got quite a few calls, not just from airports but from [operators of] many transportation depots and portals,' Ehrenberg said.He added that his company provides a lot of video surveillance and exception detection technology to the Pentagon, DHS and other federal agencies.'We are on our third generation of this technology,' Ehrenberg said.

Safety Measures: U.S. Homeland Security secretary Michael Chertoff greets passengers waiting for their flight at Ronald Reagan National Airport in Washington, Aug. 11, 2006.

Jim Young


















































Suspect behavior












X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.