Feeds

Homeland Security bungles 'pre-crime' tech test docs

Minority Report surveillance didn’t submit the paperwork

Protecting against web application threats using SSL

The US Department of Homeland Security (DHS) has been testing its behavioral monitoring CCTV system on the public without the proper paperwork.

The Future Attribute Screening Technology (FAST) system uses high-resolution cameras and other “non-invasive” sensors to monitor human behavior, including “cardiovascular signals, pheromones, electrodermal activity, and respiratory measurements,” according to a 2008 DHS report on the project. This data is then fed into a computer system running matching algorithms that suggests which people should have their collars felt by local security.

The principle behind the whole system is that people with malicious intent will exhibit certain behaviors and biological responses that can be identified. The idea is to put these systems into US border-access points, and it’s a techniques which works very well in Israel – with the rather significant difference that the Israelis use people to do the analysis, rather than relying on software.

FAST has been under development for four years, under the auspices of the DHS Advanced Research Agency, and testing on the public was conducted this summer in the US Northeast. However, the DHS neglected to sort out the proper paperwork before using people as lab bunnies, according to documentation from a Freedom of Information request submitted by the Electronic Privacy Information Center (EPIC).

“Under the existing statutes, if they roll out a new technology like this there’s a need for a privacy-impact assessment,” Ginger McCall, open government counsel at EPIC, told The Register. “They didn’t do that.”

“It seems they would have a very high false positive rate, the best they say was that it’s 70 per cent effective,” McCall said. “When you consider the kinds of suspicions they raise it’s a lot of innocent people getting stopped.”

Well, a lot of innocent people might get stopped if the system were ever put into actual use. There are no "innocents" involved in current testing, however. A DHS source familiar with the testing told The Register that all the research was conducted on volunteers who were fully aware they were being watched. None of the data was stored after analysis, nor could it be tied to individual subjects.

In fact, the happy volunteers were even provided with tasty refreshments – no skulduggery here.

Our source said that the research – which monitors changes in thermal skin conductance, heart rate, respiration, pupil variation, and blink rate – is in the very early conceptual stages, and is in no way close to deployment.

The heavily-redacted testing report shows that around 200 people were put through the system on a two-day test run in Boston earlier this year. Judging from the photos in the report, the system isn’t ready for open deployment, but was instead used in a relatively enclosed space, suggesting a scanning unit similar to the millimeter wave detectors used today.

Hewing to the FAST facts as detailed in the 2008 report, deputy DHS press secretary Peter Boogaard told The Register in an email: "The Department's Science and Technology Directorate has conducted preliminary research in operational settings to determine the feasibility of using non-invasive physiological and behavioral sensor technology and observational techniques to detect signs of stress, which are often associated with intent to do harm.

"The FAST program is only in the preliminary stages of research and there are no plans for acquiring or deploying this type of technology at this time." ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.