Chris Lee MIS 304 9/30/08. What is FAST: A system designed to detect “hostile thoughts” in people walking through border posts, airports, and public places.

Slides:



Advertisements
Similar presentations
AVIATION SAFETY & SECURITY LECTURE 6 X-RAY TECHNOLOGY & BASIC EQUIPMENTS.
Advertisements

Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
Stress Management  Stress is how your body responds to demanding situations.  Stress can be positive or negative.  Is part of everyone's life  A stressor.
Ethics What is it, why is it relevant to HCI, why is it important?
Biom-Scanner A State-of-the-Art Biometric Solution for Modern Access and Time & Attendance Controls Let your fingers do the guarding ~ your KEY to worry-free.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
The Role of ITS Technology for Homeland Security Kentucky’s Experience.
National Security Changes. Dealing with 911 By: Brandon Eanes.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Remmon Remote Monitoring Solutions Excell-Benelux Helmkruid CT Nieuwegein Tel:
“OUR MISSION IS TO STRENGTHEN OUR WORLD’S SECURITY WITH BIOMETRIC TECHNOLOGY”
EMOTION Overview How Does the Brain Process Emotion? How Can You Tell if Someone is Lying? What Causes Emotion?
THE LIE DETECTOR Tim Fleck Tim Fleck Mike Gruener Mike Gruener Brian Halaburka Brian Halaburka Chris Moskaites Chris Moskaites.
The Role of Computers in Surveillance ~ Katie Hatland.
TrackIT Solutions FZLLC
Databases Chapter 11.
Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.
Lecture 11 Intrusion Detection (cont)
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Psychosomatic Illnesses
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
10 minute Mindfulness exercise Sit quietly, set a gentle alarm for 5 – 20 minutes time Close your eyes 5 deep breaths Body Scan for 1 minute Observe your.
Biometric Technology The Future of Security Alexandra Chingros.
9/11 – 19 hijackers took control of four aircraft after boarding with (possibly) the following items: Mace, tear gas or pepper spray Leatherman-type multi-function.
Department of Aviation EAC What Time Is The EAC Meeting?
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
CHAPTER 13 Logistics Systems Controls Learning Objectives To understand the use of accounting techniques for logistics system control To examine.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Smarter & Faster Borders: Are They Really? AAEA Annual Meetings NAFTA at Year Ten: Impacts & Issues for Canada, Mexico, & the United States Parr Rosson.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
LOGO AVIATION ADMINISTRATION Transportation Security Administration Chapter 2 part 2 19/8/2013.
The BOSS Project: Recent Advances in Facial Scanning Adam C. Champion.
Ideal Jobs FBI. Field Criminal Justice Criminal Justice is study of the law and is mostly of thinking of the Criminal mind. Jobs: Local law Enforcement:
Stress. Stress: the response of your body and mind to being challenged or threatened.
Customs and Border Protection (CBP) Uses of Criminal History Valerie Isbell Executive Director Passenger Systems Program Office Office of Information.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Management Consultancy
Proposed Task-Based VQEG Project Carolyn Ford, Mikołaj Leszczuk.
HOMELAND SECURITY Team #2. PRE 1973 Near non-existent security 1)NO ID required 2)Electronic Magnetometer Scan 3)Positive Scan = Search 8.
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
The Technical Challenges of Homeland Security John R Wootton V. Pres. Technology Engineered Support Systems Inc.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Are We Safer? PBS Frontline Video.
Biometrics Authentication Bruce Maggs. 2 Biometric Identifiers Fingerprints, palm prints Palm veins Hand shape Facial image DNA Iris, retinal images Odor.
Registered Traveler Jody Blanke Mercer University ALSB, Ottawa August 19, 2004.
Cryptography and Network Security Sixth Edition by William Stallings.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Tuesday, November 17, 2015 Objective: Students will be able to analyze and evaluate national security policies of the United States. Short video over.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Sampling Variability Section 8.1. Sampling Distribution Represents the long run behavior of the mean when sample after sample is selected. It is used.
Physical Security Secure the room Secure the machine – 6 ways.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Signs A Girl Likes You: Let’s Try To Read Her Mind Scoopify.
Chapter 13: Police Strategies and Tactics Seminar 8.
Controlling Your Anger
Access control techniques
Biometrics.
Outlined Plan We will have initial retinal and fingerprint scans at check-ins for passengers that go with the person’s identity. There will be retinal.
زبان بدن Body Language.
Computers and Homeland Security
Biometrics.
10 minute Mindfulness exercise
A SEMINAR REPORT ON BIOMETRICS
Shannon Joyce White House Office of Information and Regulatory Affairs
GK1 Highlights Automatic and Unbiased Emotional screening System, based on LVA Voice Analysis technology Designed for quick identification of “crime in.
Presentation transcript:

Chris Lee MIS 304 9/30/08

What is FAST: A system designed to detect “hostile thoughts” in people walking through border posts, airports, and public places. Remotely monitor crowds for the behavioral signs of a terrorist, using a computer system that scans their pulses, body language, breathing rates, and facial temperatures. Being developed by the Department of Homeland Security

Continued: Currently running at 78% on mal-intent detection and 80% on deception Production of the FAST system is approximately 3 years away from completion. The body polygraph is part of a five-year project in which the department is trying to devise ways to thwart terrorism. Another part is the Transportation Security Administration’s program — Screening Passengers by Observation Techniques (SPOT).

Problems: Critics are concerned that the program could reveal physical conditions like heart murmurs, breathing problems, and high stress levels – a blatant privacy invasion. False alarms To much information being collected: FBI’s “Next Generation Identification” system, currently still in development, seeks to catalogue almost every major identifying characteristic about the U.S. criminal population, including fingerprints, retinal prints, and tattoo/scar markings.

Business Applications: DHS researchers are designing FAST with mobility in mind, and over the long term would like to roll out portable vehicles for use in concerts, sporting events, and other public gatherings: once the technology is perfected, FAST trucks could be as common a sighting at public gatherings as “mobile toilets and catering trucks.”