Mark Anthony Kassab. IT 103, Section 005. March 2, Biometric Scanners in Airports

Similar documents
Automated License Plate Recognition Technology: Social and Security Implications Jordan Nichols IT October,

3D Bio printing. Nazrawit Mekonnen IT /29/15. "By placing this statement on my webpage, I certify that I have read and understand the GMU

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

Aakriti Endlaw IT /23/16. Artificial Intelligence Research Paper

An introduction to the use of Body Scanners, the science behind the technology, and the ethical implications of these devices.

News English.com Ready-to-use ESL / EFL Lessons

To promote a stronger sense of mutual responsibility, respect, trust, and fairness among

Identifying Materials using Radio Frequency

Running Head: UP AND COMING AI TECHNOLOGY 1. AI Technology. Ben Holmes. IT-104 Section

Ethical Analysis of 3D Printing. John MacDonald IT February 10, 2017

RUNNING HEAD: Drones and the War on Terror 1. Drones and the War on Terror. Ibraheem Bashshiti. George Mason University

Senior Design Projects: Sample Ethical Analyses

Social Networks, Privacy, and Freedom of Association

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

Comprehensive Rules Document v1.1

Defining the Line of Personal Data Privacy

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

WORKSHOP JOURNAL AND HANDOUTS The Motivation Equation: Designing Motivation into Deeper Learning COSEBOC conference, April 25, 2013

RICHMOND Journal of Law and Technology

Media and Information Literacy - Policies and Practices. Introduction to the research report Albania

Graffiti Wall. school. Elementary, Middle, High school there was always a problem with tagging on

STAGE 2 LEGAL STUDIES ASSESSMENT TYPE 1: FOLIO STUDENT RESPONSE (B- STANDARD)

Public Hearing on the use of security scanners at EU airports. European Economic and Social Committee. Brussels, 11 January 2011

THE TOP STRATEGIES I VE USED TO BUILD SUCCESSFUL BUSINESSES ONLINE

GETTING TO KNOW GP:!! AN OVERVIEW! * * *!

MJ DURKIN 2016 MJ DURKIN ALL RIGHTS RESERVED mjdurkinseminars.com

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

Notice of Privacy Practices

--- ISF Game Rules ---

Running Head: AI and Robotics 1. The Applications of AI: The Uses of AI in the Field of Robotics. Michael Lam IT Professor Richard Reo

RECLAIM YOURSELF GET BACK YOUR IDENTITY AND SELF-CONFIDENCE WHEN YOU VE LOST YOURSELF IN A RELATIONSHIP BASTIAAN & CHANTALLE BLIKMAN

CBP proposes to add the following question to ESTA and to Form I-94W:

Excelling. throughh life. Empathy for others

Being in Care Being in Care

MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI.

Planning a Campaign Strategy

Thomas Jefferson High School for Science and Technology INTRODUCTION TO SCIENCE POLICY Program of Studies

INTRODUCTION. The 2015 Brookings Blum Roundtable was convened to explore how digital technologies might disrupt global development.

The challenges raised by increasingly autonomous weapons

Technologists and economists both think about the future sometimes, but they each have blind spots.

not social, spending most of one's time alone 4. a sum of money paid as a penalty or punishment 6. someone who studies and looks for answers 11.

THE OTB S AND LOCAL GOVERNMENT REVENUE REMARKS TO THE NEW YORK STATE ASSOCIATION OF COUNTIES 2006 ANNUAL FALL SEMINAR

Christina Narensky, Psy.D.

20 QUESTIONS TO HELP YOU DISCOVER WHAT YOU LOVE ABOUT YOURSELF

The Getting-It-Right Scripts for Therapists

Committee on Legal Affairs WORKING DOCUMENT

Census Response Rate, 1970 to 1990, and Projected Response Rate in 2000

Lesson 2: What is the Mary Kay Way?

(Children s e-safety advice) Keeping Yourself Safe Online

Evergreen Patient Attraction and Practice Growth Workbook A 30-Day Action Plan. Keith Rhys

Getting the Best Performance from Challenging Control Loops

Promising technologies to meet tomorrow s security challenges

Violent Video Games First Amendment United States Constitution

modified 2018 Frankenstein Culminating Activity Cloning / Genetic Engineering: Mad Scientists or Responsible Citizens?

16 WAYS TO MOTIVATE YOURSELF TO TAKE ACTION RIGHT NOW

MIDEL SAFETY INSIDE. The MIDEL Transformer Risk Report

Jeff Johnson Welcome To Video #2 In Today s Free Training Video I ll Be Revealing What Will Quickly Become

HERE S WHAT I M GOING TO TEACH YOU

Technologies that will make a difference for Canadian Law Enforcement

Finally, The Truth About Why Your Home Didn t Sell and Your Mad As Heck

Creating a Character and Character Development

(Beijing, China,25 May2017)

LESSON 8. Putting It All Together. General Concepts. General Introduction. Group Activities. Sample Deals

Before the Federal Communications Commission Washington, D.C ) ) ) ) ) ) ) ORDER. Adopted: June 29, 2010 Released: June 30, 2010

Terms and conditions APPROVED DOCUMENT. Clear design Simple language

Game Theory for Safety and Security. Arunesh Sinha

Stage 2 Legal Studies. Assessment Type 2: Inquiry

PAGES SAMPLE

Protecting Intellectual Property

Knowing Your Customers Action Guide

LESSON 2. Opening Leads Against Suit Contracts. General Concepts. General Introduction. Group Activities. Sample Deals

Anti cheating guidelines for Arbiters

1. WHAT AREAS OF LEARNING DOES THIS ASSESSMENT ADDRESS?

Focusing Software Education on Engineering

Cleansing: Releasing Mental, Emotional and Physical Clutter

Best of Booking & Party Questions

DRAFT MINUTES OF THE BVAA/CEIR/VDMA MEETING - MACHINERY DIRECTIVE

RF EMISSIONS FROM SMART GRID ELECTRIC METERS, HAN DEVICES, AND THEIR RELATIONSHIP TO THE FCC MAXIMUM PERMISSIBLE EXPOSURE LIMIT (MPE)

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

An Exploration of How Technology Use Influences Outdoor Recreation Choices

We changed that. In November 2013, Council of Division head Bob Trumpbour and vice. times for programs you said you wanted.

U.S. Army veteran says mice drove her and her autistic son out of their apartment home

HOW TO MAKE MONEY ONLINE - Video 3 - The Process

BARRIE PUBLIC LIBRARY COLLECTION DEVELOPMENT POLICY MOTION #16-34 Revised June 23, 2016

United States Court of Appeals for the Federal Circuit

CODE OF CONDUCT & GOOD PRACTICE GUIDE

Get That Office Organized (Finally!)

What is the Law of Attraction?

Writing Constructed Responses

Chapter 1. Why Is Report Writing Important? First Impressions

Hatchet Chapters 1, 2

Introduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2

Script Guide. 1. Prepare to Inspire. 2. Craft Your Conversation. 3. Scripts to Step Forward. 4. Create Curiosity. 5.

BEFORE THE SCHOOL IN THE MATTER OF

Bridge BG User Manual ABSTRACT. Sven Eriksen My Bridge Tools

Australian Airport Security The Use of Full Body Scanners

MANAGING PEOPLE, NOT JUST R&D: FIVE COMPANIES EXPERIENCES

Privacy, Ethics, & Accountability. Lenore D Zuck (UIC)

Let s Talk: Conversation

Transcription:

Mark Anthony Kassab IT 103, Section 005 March 2, 2011 Biometric Scanners in Airports By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://academicintegrity.gmu.edu/honorcode/. I am fully aware of the following sections of the Honor Code: Extent of the Honor Code, Responsibility of the Student and Penalty. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://universitypolicy.gmu.edu/1301gen.html web site. Biometric Scanners in Airports 1

Introduction Technology is arguably one of the fastest growing fields in the world. It is amazing to think of the strides in technology when you consider that the first computer was made only about forty years ago. However, not all technology is set on a smooth sailing path, as there are many people who oppose new technologies. There are many reasons for this opposition, among them are often fear, frugality (not wanting to spend the money required to develop the technology), close mindedness, etc. One such recent development in technology is being met with opposition. However, it is not the technology itself that people are weary of, instead it is the way that is being implemented. I m talking of course about the recent implementation of full body scanners in airports. The biometric scanners in airports are a step in the right direction towards safer travel as they provide more comprehensive security checks than metal detectors and therefore have the potential of saving countless lives. In this paper I will identify what the biometric scanner is and evaluate the implementation of these machines from an ethical, legal, social, and security standpoint. What? What is a full body scanner? Simply put, it is what it sounds like. It is a machine that renders a full body image of a person without their clothes. The scanners fall under WBI technology. WBI of course stands for whole body imaging and can be done in various ways. In the earlier days, these machines would use what it is called backscatter which is simply very weak X-ray emissions that provide a two dimensional image (Cavoukian, 2009). However, the more recent technology Biometric Scanners in Airports 2

that is now being implemented is millimeter-wave which can render a three dimensional image. In the airport setting, the scanners have replaced metal detectors the primary method of security checkpoint. Why? Why has this technology suddenly appeared in what seems like overnight? The event that started the development of a security system using these machines was the tragedy of September 11(Cavoukian, 2009). After this infamous day, funding for airport security surged and people were commissioned to figure out more comprehensive ways to check air travel passengers. Certain systems were implemented before the biometric scanners actually took hold. For example, people who looked suspicious would be subjected to a strip search. Since the recent world events had put terrorists in everybody s nightmares, every terrorist attack that was caught and stopped in the U.S and in other countries only heightened the desire for a more advanced security checkpoint system thus leaving us with the current full body scanning system we have currently. Ethical Standpoint The biometric scanners can spark debate on all frontiers of thought and indeed have since their implementation. The fact that strangers will see you naked has cause unrest within the American people. From an ethical standpoint, people say no one holds the right to violate the privacy of the air travel passengers by seeing them naked. The main argument stating that these scanners will violate ethical boundaries is that the scanners are unconstitutional, specifically under the fourth amendment (Knudsen, 2010). The fourth amendment of course states that Biometric Scanners in Airports 3

people are protected against unusual search and seizures. Proponents of the scanners argue that times have dramatically changed since the time the fourth amendment was written and that new measures must be taken for the safety of millions of people (Knudsen, 2010). This is the main argument ethically. It is a straight forward yet almost insurmountable problem in further development of this advanced system as there are so many Americans with opinions on all areas of the spectrum (Knudsen, 2010). Other then this problem mentioned above, there isn t anything else on the ethical front. Legal Standpoint Legally, the implementation of this technology does not violate any laws. One argument from opponents that could bring up legal issues is that these scanners violate the fourth amendment as stated above. However, this argument has been dissolved. The specific wording in the amendment is unusual search and seizure. These searches are not deemed unusual as it has always been customary to screen passengers at airports (Knudsen, 2010). Although these scanners are becoming more accepted as 2/3 of the American population now favor them, many say that the alternative to getting scanned should in fact be illegal (Cohen, 2010). The alternative method of screening is a more comprehensive version of standard strip search. People who have received this method of screening say that it is more invasive than the machine and should therefore be halted. However, this issue has not become too much of a problem yet as an average of only three percent of travelers go through this method a day (Cohen, 2010). Social Standpoint Biometric Scanners in Airports 4

When examining this technology (or rather its implementation) from a social perspective, it is clear that it has caused quite a bit of social unrest, but what new and advanced technology hasn t at some point in its existence? Some citizens who oppose the implementation of these machines have started websites and written blogs advocating a boycott of their use by selecting pat downs instead. Although the pat downs are not preferred over the scanners, the object is to delay the flights and throw the airport off schedule. Fortunately no such boycott has been achieved yet (Cohen, 2010). The social unrest does not come from citizens alone. The pilots union is petitioning to not go through the scans. Instead they wish to have their identities verified by biometrics (finger print scans, facial recognition, retina scans) so they can pass through lines and security quickly and get ready for their flights (Strohm, 2010). Several design changes in the technology has been made in order to alleviate some of the social pressures. One major change was to install modesty filters. These filters lower the level of detail in the scans, which helps to put some of the unrest aside. Other measures taken by the TSA include producing a very low detailed image and highlighting areas that require additional searching, and prohibiting any archiving or distribution of the scans by the airport personnel (Cavoukian, 2009). Over all, most of the American population has reported that they are in favor of the new scanners as they are in favor of enhanced airport security after recent attempts by terrorists in the U.S and around the world. Security Standpoint When analyzing this technology from a security perspective there are two directions that can be taken. The first is that these machines are providing an excellent amount of security to air travelers by revealing everything under their clothes. However, Biometric Scanners in Airports 5

when analyzing security of this technology it is important to look at it from the other direction. The question mainly asked about the security of the technology is: Is it safe for people to be getting scanned by these waves? This worry stems from the fact that backscatter uses weak X-ray waves (Cavoukian, 2009). Although prolonged exposure to X-ray waves can cause cancer, these waves are too weak and people don t travel every day making the passing through these machines, for the most part, harmless. Even with this in consideration, it doesn t matter that much because the primary type of WBI being used is millimeter waves (Strohm, 2010). These waves are radio waves and therefore do not cause damage, especially when we consider that traveling isn t an everyday thing for ordinary people. Conclusion These biometric scanners have the potential to save the lives of millions of people. People resisting new technologies is merely a phase of cycle that accompanies the implementation of any new technology. It is better to implement this new security system now, have people resist it for a few years, and prevent numerous potential terrorist attacks, rather than suffering an attack and then wishing we had used it earlier. When looking at the technology from different perspectives, the main problem according to most Americans is that they don t want to be seen naked by strangers. This fear is legitimate, but is currently being corrected by lowering the detail of the pictures and requiring the immediate discard of all images. This is a promising technology that can change air travel safety forever and should at least be explored before disregarded as a potential choice. Biometric Scanners in Airports 6

Reference Page Ann Cavoukian. (2009). Whole Body Imaging in Airport Scanners: Activate Privacy Filters to Achieve Security and Privacy. (1-8) This is a journal article. It is a valid source of information because it explains the different types of whole body imaging technology. It also talks about possible solutions to the complaints of the opposition. It helped me structure my introduction. Chris Strohm, & Sara Sorcher. (2010). TSA, Pilots weigh Biometric System for Airport Screening. Retrieved from http://proquest.umi.com/pqdweb?index=0&did=2190686031&srchmode=2&sid= 2&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=12989 48938&clientId=31810 This is a journal article. It is a valid source of information because it gives the perspective of citizens as well as the perspective of the pilots. It also gives possible solutions proposed by the pilots themselves. It helped me structure my social perspective analysis. Cohen John, & Halsey Ashley. (2010, November 23). two thirds of americans support full body scanners. Washington Post. Retrieved from http://www.washingtonpost.com/wpdyn/content/article/2010/11/22/ar2010112205514.html?hpid=topnews This is a newspaper article from the Washington post. It provided information on the thoughts of average Americans. This information helped me structure my ethical and legal perspective analyse.s Geoffrey Steinberg. (2008). Introduction to Computer Information Systems. United States Biometric Scanners in Airports 7

of America: Kendall/Hunt PublishingCompany. This is a book. In fact it is our textbook. I used the textbook so I could get some ideas of echnologies to use. It helped me settle on my topic by giving me a greater sense of computer systems and forcing to do additional research on recent technologies. Rob Stapleton. (2007). TSA to use new technology for passenger, baggage screening, 31(47), 8. This is a Journal Article that came out when the Scanners were first introduced. It is a valid source as it gave an excellent context of my topic. It helped me see the development of my topic from beginning to its current status Teresa Knudsen. (2010). Body Scanner, the Constitution, Ethics, and X-Ray. Retrieved from http://www.suite101.com/content/body-scanner-the-consitution-ethics-andxray-a187816 This is an article found online that discusses the constitutional implications of the new scanners. It was valid because it presented me with the most prevalent argument from the opposition of the implementation of this new system Biometric Scanners in Airports 8