Feeds

UK border facial scan tests hit by errors and breakdowns

Calibration, reliability and tailgating issues

Beginner's guide to SSL certificates

A trial of automated border control using facial scanners is already in trouble, according to UK Border Agency (UKBA) sources quoted by the Daily Telegraph.

The scanners at Manchester airport, said one source, are breaking down on almost a daily basis, and the automatic booths are unable to detect 'tailgating', where two people go through on one passport.

Immigration officers have been able to sneak through behind passengers (which must be a bit disturbing for the passengers) without an alarm going off, and "when one breaks down, they all break down," said the source.

In addition, the Telegraph confirms Register sources who claimed in August that the system had been recalibrated immediately before the trial began because it was rejecting too many individuals. The paper claims that prior to this point the system was rejecting up to 30 per cent, but lowering the false rejection rate means at the same time an increase in the false acceptance rate - meaning that the late switch may well have compromised the security of the system.

Tailgating is not necessarily an issue, although it may become so as and when automated gates are live at more ports, and when ePassports are a higher proportion of the total in use. According to the Home Office, automated border controls using facial - and in the next ePassport generation, fingerprint - scanners will always be overseen by human immigration officers who will be able to spot passengers trying to subvert the system. When most passengers are using the gates, however, supervision will become harder, and a tailgating alarm that actually works will become more important.

Should the machinery prove unreliable and/or the false acceptance rate too high, UKBA will be placed in a tricky position. It has for some time now been proudly boasting of "tough new border checks" in immigration that make the queues "a little" longer, but the intention is for these queues to automagically decline without the need to hire more staff, as border control gets automated. So if they don't, then the entire cunning plan is in trouble.

But actually that might not be such a big issue, if you viewed it as a choice between switching back to soft old border checks that let the terrorists in, or modern badly calibrated automated border checks that let the terrorists in. Might need to spin these a bit, though... ®

Security for virtualized datacentres

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.