Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
security_techniques.doc
Скачиваний:
0
Добавлен:
24.08.2019
Размер:
50.18 Кб
Скачать
  1. Your body, your I.D.?

Biometrics automated identification gadgetry was once the stuff of sci-fi movies. Now, however, such technologies are gradually becoming part of daily life. Children in school districts pay for lunch by placing a finger on a scanning pad. A computer recognizes each child and bills the appropriate account for the meal. Bank members access safe-deposit boxes via hand scans. Casinos use face recognition software to identify known cheats. After the September 11 terrorist attacks biometric technologies began to be widely promoted as the most efficient way to decrease our vulnerability to unwanted incursions of all kinds.

Biometric technologies bring several advantages to the task of identifying individuals chief among them speed and accuracy. By using biological traits that are unique to each individual biometric security systems are able to distinguish people who are dangerous from those who are not, for example.

Biometrics can butress the system of PINs and passwords already in use. While passwords allow access to your personal accounts by acknowledging that the numbers and letters are correct, they do not recognize the person who provided them. By contrast, biometric data are unique to each individual. A scan maps enough key points to ensure that it is statistically unlikely for someone else to have the same pattern. That map would be fed into a digital template which would then be encrypted and stored on a portable carrier: a credit card, a personal digital assistant (PDA), your computer, or in your bank. When you need to prove that you are you, a new scan is made of your eye, hand or fingerprint and compared with a stored version.

But there is much in these new technologies to make consumers wary. First, material about our own physical persons could be collected without our knowledge. Second, information residing in biometric databases may be misfiled or lost. Finally, once images like fingerprints or faces are turned into computer data, they become vulnerable to copying or theft. Another problem is updating biometric data. Some software will update a person’s mathematical template whenever a transaction is successfully completed, to keep up with any physical changes that occur with age or injury. Fingerprints, for example, become harder to read with changes caused by wrinkles and small scars. But currently, there is no standard to require all machines to provide such updating, and it is not clear whether the entities using biometrics will be willing to pay for that.

  1. Read the text attentively to find out more about new techniques to achieve higher levels of security.

While airport security has become an obvious priority since the September 11 attacks, relatively little change has been seen in the technology used to achieve higher levels of security. Now, though, several initiatives are emerging for development and introduction of new techniques based on optical technology that might help prevent future attacks on aircraft. Efforts are under way to use lasers to detect explosives, for holographic scanning to check for hidden weapons, and to implement already mature iris-scanning technology to help identify travellers and key personnel. Some of these measures raise serious privacy concerns, however, so it remains unclear whether passengers will, for instance, accept technology that allows them to be seen ‘naked’ in exchange for a promise of safer skies.

Explosives detection is one of the key objectives of airport security. This is a difficult task because explosives do not necessarily show up on x-rays. But work now being done by The Canadian Federal Aviation Administration and Intelligent Detection Systems (IDS) indicates that traces of explosives left on the outside of luggage can be detected by lasers.

It is very difficult to avoid leaving microscopic traces of explosive on the outside of luggage if those handling the luggage have themselves packed the explosives. Conventional detection techniques, which involve wiping the luggage with solvent and then feeding the dissolved material through a gas chromatograph, are sensitive, but require that the luggage already be selected for further examination. Laser-based techniques could, in principle, scan all items of luggage. The IDS method looks for the light produced when tiny amounts of explosives are detonated by a laser pulse.

Laser inspection of luggage doesn’t raise privacy issues, because luggage is x-rayed anyway and the laser only inspects the outside of the luggage. But privacy does become an issue with efforts to use millimeter-wave radiation, which penetrates clothing to search for concealed weapons.

Millimetric radiation is generated by methods similar to those used at microwave frequencies but, because of its short wavelength, can use technology like holography, which is based on optical techniques. For detecting weapons hidden on a person’s body the radiation has the dual advantage that it penetrates clothing easily but is reflected by metal, plastic and any other material from which a weapon could be made. Scanners operating at about 100 GHz exhibit high resolution, near 3 mm, which is adequate for detecting even small weapons and distinguishing them from innocuous objects like cell phones.

A broadband rather than a single-frequency source and an original algorithm are used to reconstruct a fully three-dimensional image with good depth-of-field. The algorithm is a combination of holographic techniques derived from optical holography and synthetic aperture radar techniques which have been used to form images of terrain from aircraft.

The privacy concerns about millimeter-wave scanning are clear from the images produced. Since millimeter waves are reflected by the human body as well as by concealed objects, the scanned image shows the subject as naked. With 3 mm resolution the view is about as detailed as one would get with ordinary vision of an unclothed person 15 ft away. It seems unlikely that airport passengers will put up with being seen naked by a stranger in return for enhanced security.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]