Feeds

Anti-terror face recognition system flunks tests

Logan's Run

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

The extent of the failure of facial recognition technology in spotting terrorists in crowds has been revealed in a report on tests at Boston's Logan airport.

We knew already that the tests were a flop but the airport's official report, obtained last month by way of a Freedom of Information Act request from the American Civil Liberties Union and released yesterday, reveals the true extent of their failure.

Last year, two separate face-recognition systems at the airport's security checkpoints failed to detect volunteers posing as potential terrorists 96 times during a three month test period. The systems correctly detected these test subjects 153 times over the same period, the report states.

According to the Logan report, which was written by an independent security contractor in July last year, "the number of system-generated false positives was excessive, and as a result, the operator's workload is taxing and strenuous, requiring constant undivided attention and periodic relief, which amounts to a staffing minimum of two persons for one workstation."

Which goes to show, once again, that facial recognition systems are useless in identifying people in crowds, even if they do have a place in controlled environments.

Police in Tampa, Florida, last month announced that they were discontinuing the use of face recognition technology, saying the technology failed to prove of any benefit. In Virginia Beach, Virginia, the other town that has deployed the technology, police conceded that its system has yet to match a single person to any of the up to 30,000 mug shots it is capable of storing. Even so, local police are still pushing ahead with the trial.

By contrast, early results of a facial biometric system by Grampian police in Scotland demonstrated the value of using facial biometrics to identify suspects in a police custody suite.

Back at Logan, where 10 of the 19 terrorists involved in the September 11 attacks boarded flights - the airport is testing other security technology, including infrared cameras and eyeball scanners, USA Today reports.

The Logan trials used technology from Identix and Visage Technology. An Identix spokesman told USA Today the technology was better suited for "one-to-one" identification, such as comparing photos on passports than random searches of photo databases. Visage Technology declined comment. ®

Related stories

Face recognition fails in Boston airport
Grampian police trial facial biometrics
Brain-scans can defeat terrorism, InfoSeek founder claims
Face recognition useless for crowd surveillance
US names the day for biometric passports

Secure remote control for conventional and virtual desktops

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.