Feeds

Automated profiling tech is crap, says Home Office

Um, does that include Project Semaphore, then?

SANS - Survey on application security programs

Automated passenger profiling is rubbish, the Home Office has conceded in an amusing - and we presume inadvertent - blurt. "Attempts at automated profiling have been used in trial operations [at UK ports of entry] and has proved [sic] that the systems and technology available are of limited use," says home secretary Jacqui Smith in her response to Lord Carlile's latest terror legislation review.

Furthermore, when the security services stopped trying to let the machines figure out who was a threat and went back to traditional "inituitive" stops, they were more effective. "Intelligence improved during the trials when officers reverted to the traditional intuitive methods, albeit applied in the context of intelligence provided by the security service," says Smith. "It is likely that with more effective use of intelligence, and possibly some behavioural analysis training the quality of intelligence retrieved from persons of interest will improve and the number of people stopped will decrease."

The Home Office's belated discovery that human beings acting on sound intelligence make for better policing does however raise questions about the future operation of its E-Borders programme. This is intended to track people in and out of the country, and to operate in conjunction with Advanced Passenger Data (API) and Passenger Name Records (PNR) collected via Project Semaphore. As Home Office minister Joan Ryan told Parliament in March of last year, "In January 2007 23 successes were recorded by Project Semaphore as a result of automated profiling based on passenger data."

Ryan then gave the example of a passenger who'd booked the day before, paid with cash and was due to spend just one day in the UK before a further connection. Four kilos of cocaine were found in his bags when he was stopped at Heathrow.

A Border & Immigration Agency presentation on Semaphore delivered this year in Brussels says that PNR is "used by border agencies to identify patterns and trends of behaviour and for information which can be used to support intelligence work... PNR is checked against profiles of behavioural patterns which indicate risk activity. Profiles are run to identify behaviour, not to identify individuals, and are based on evidence and intelligence."

In fairness we should point out that the BIA claims to use automated systems to produce leads which are then reviewed by real human immigration officers, but Smith's statements nevertheless indicate that attempts to place too much faith in automation have been found wanting. Given the nature of the examples given by Ryan and used in the BIA presentation, it seems likely that the machine analysis simply throws up too many false positives for it to be more of a help than a hindrance.

Carlile's report, on the other hand, indicates that the noble lord has been drinking that partuclar Kool-aid: "From my discussions with counter-terrorism police officers I know that considerable attention is being focused by the police, especially by the National Co-Ordinator of Special Branch and the National Co-Ordinator of Ports Policing, on behavioural analysis and the better use of intelligence."

Carlile, essentially, is hopeful that improvements in intelligence and intelligence handling can be used to reduce the number of intuitive stops, while Smith and her people are responding that the failure of the technology means that more intuitive stops will be more effective. Smith possibly isn't answering precisely the points Carlile makes, but this is where we came in.

Carlile feels that advanced passenger information is of vital use, but notes elsewhere in his report that there are problems in sharing information between organisations and computer systems, for legal and interoperability reasons. "Ministers should consider whether greater legal statutory clarity is required, so that useful information can be shared quickly and seamlessly. This is extremely important", he says in one of the numerous instances where he switches from the role of independently reviewing terror legislation to advocating lots more of it.

In a similar vein, he raises the entirely hypothetical threat of hijacked private aircraft being used to produce a British 9/11. "It is possible to purchase, from reputable international companies, piloted flying hours in sophisticated executive jets capable of high speed travel from continent to continent. The risk of hijacking of such aircraft is a matter of potential concern.

"Another real anxiety is the potential use of light aircraft as vehicle bombs against places of public aggregation. This is not founded on any particular intelligence, or in any operation as such. However, I know that some knowledgeable police officers and officials have ongoing concerns about the relative simplicity of terrorism conducted in this way, given the very large number of private aircraft and small airfields."

So if we paraphrase, there's no known plot or threat, the matter's of no obvious relevance to the job of reviewing terror legislation, but the cops tell me it'd be easy to hijack a plane, pack it with explosives and crash it into the Houses of Parliament. The recommended solution would not however appear to be to arrange for all transiting light aircraft to be searched. "Government and the aviation industry have a high responsibility to ensure full passenger information and effective international policing of such aircraft." Ah yes, more data, more sharing it around the world. Yum.

Lord Carlile is a Liberal peer. No, really. His most recent report and the government response can be found here. ®

High performance access to file storage

More from The Register

next story
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.