Facial Recognition Might Stop the Next Brussels

Keeping terrorists away from crowded spaces requires recognizing them before they get there, is no easy task. 
    
The departments of Defense and Homeland Security have invested in technology to prevent attacks like the one in Brussels, including facial recognition technology that can spot and flag a suspected terrorist in a car heading toward an airport or crowded subway. But bringing that technology out of the lab and getting it to airports and street corners is a lot harder than just snapping a photo.

Just hours after two bombs exploded in the public departure area of Zaventem airport and a third at the Maelbeek metro station, grainy closed-circuit television footage surfaced showing three men at the airport. Two wore black gloves on their left hands, the third a white coat. Security experts said that footage showed the likely attackers and that the gloves might have concealed detonators.

The attack on Zaventem doesn’t point to a specific weakness in airport security, said one DHS official who spoke anonymously because they were not authorized to discuss the incident with media. “The reality is, they did it in a public area of the airport. The assumption that they determined that it would be too difficult to get any deeper into the airport is a reasonable assumption to make,” the official said. “When events like this happen, we play extraordinarily close attention to them. Could it happen here? If so, how could we interdict it?”

In order to thwart an attack, a facial-recognition-based system must have access to a database that already contains the would-be perpetrator’s face, sensors that can obtain usable snapshots of people approaching the protected area, and a way to alert guards or otherwise cut off access to the target. Getting all three of those at once is the challenge of securing a place like an airport’s departure area or a metro station.

 “The reality is you’re not going to lock down the public access areas of the world, the same way you lock down a boarding area in an airport. The public wouldn’t tolerate it,” said the official.

But the US government is nearing the ability to get useful systems in place.

In 2014, the military tested a General Electric high-speed, multi-resolution camera capable of capturing a facial image even at an angle. The system was designed to ID someone in a moving car headed toward a base, but could be deployed on city streets or on the road to an airport.

“The high-resolution image can be panned and tilted using an internal device and the system is designed to capture images at a standoff range of 22 to 33 meters.  That’s up to 108 feet,” John Boyd, director of Defense Biometrics and Forensics, said in 2014. “The … images are then outputted to a machine-vision algorithm to continuously track the location of the vehicle. 

The vehicle coordinates are then used to estimate the time of arrival of the vehicle to four fixed catcher zones along a calibrated track. Some 20 high-resolution images are captured per zone as the vehicle travels five miles per hour, five to ten. The high-resolution frames are then automatically analyzed and match scores are fused into an average score to positively identify the individuals in the vehicle; and this is with tinted glass, among other things.”

In tests at Fort Belvoir, the system worked, but slowly, a Defense Department official said at the time.

“It was a demonstration sort of environment, so the van would make its approach but then have to slow down so that the computer, which was not optimized” could ingest the data. The official called the system “not deployable” but “a very positive step.” He said, “We were able to identify people in a moving vehicle. There is the feasibility of the technology being further advanced and then point it at a normal post.”

Image capture technology has advanced since then. In 2016, you don’t even need a whole face. Iris scans can provide a more useful identifier and are becoming easier to collect.

“There is some interesting capabilities in industry now where instead of doing something semi-invasive like a laser just scanning the eye, they’re actually using video,” the DHS official said.

High-definition video cameras today allow dual iris authentication at 20 to 30 feet, according to the official, who described the technology as “emerging” and said that DHS was actively testing it.

“So if someone is walking down an airport jet way, can we do iris identification and say, ‘This person has been authenticated; they’re allowed to go in the fast-track lane on the right. This person has not; they have to go the secondary screening on the left’? 

Can that device be built into the computer itself so that it’s not an add-on device, like a mouse? The answer is yes,” he said. “Years from now, we’ll look back and say, ‘Remember when we thought dual-iris [verification] with video at 20 feet was the be-all, end-all? How funny that is 20 years later when we’re doing something even better.”

In Brussels, closed-circuit cameras in the airport and the metro clearly did not deter the perpetrators, but did capture images that are being used in the investigation. Early reports indicate the men took a taxi to the airport. Could networked cameras on the road leading to Zaventem, peering into the backseat of that cab, (or in the cab itself) have saved lives? Perhaps. But image capture and iris scanning do you no good if the picture in the photo doesn’t match to a suspect in a database.

One way to populate that database is by collecting iris scans at checkpoints, as the United States has begun doing at a border crossing in Mexico. The United States also collects fingerprint samples on refugees entering the country. Of course, people don’t have warm feelings about surrendering biometric data to the government. But they might feel better about giving it away to a device that they own to unlock it. Device makers from Apple to Fujitsu are making biometric owner identification a security feature in new smartphones. This could provide a less invasive means of collecting bio data in the future, according to the DHS official.

“There’s a market reality that this is becoming consumerized. The consumer now wants these now. That makes it far more possible for industry to adapt, especially once assured-iris identification comes out on every laptop and every cell phone that you buy, or in every rearview mirror in every car. Those are the kind of things we’re monitoring,” said the official.

The Brussels bombings could provide lawmakers and border security professionals with extra cover to seek more biometric data. That could come, not in the form of a scan at the airport, but as a simple “opt-in” notification, on your phone. Giving biometric information away to the government could become much simpler. Whether doing so will actually make cities safer remains to be seen.

DefenseOne

 

« Cybercrime Is Changing
Clinton Emails Suggest Google's Assistance In Undermining Assad »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Security Magazine

Security Magazine

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

CyberESI

CyberESI

CyberESI is a Managed Security Service Provider providing 24x7 remote security monitoring and management of your mission-critical networks.

FirstPoint Mobile Guard

FirstPoint Mobile Guard

FirstPoint Mobile Guard has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.