Biometrics and the Future of Travel

Blog Date:  3/10/2017
Author:  Ray Coulombe

CLEAR is a private service offered through a New York company using biometrics to verify identity—you might have seen it on your most recent flight out of town. The service has debuted in a number of cities around the United States (Dallas, Denver, Las Vegas, Seattle, Houston, and more), but most recently appeared at the Minneapolis-St. Paul International Airport in Minnesota. For just $179 travelers can bypass long security lines and go directly to the metal detector machines—in exchange for a retina scan or fingerprint.

Canada is also on the list to receive facial recognition technology during airport check in and traveler screening. Their kiosks are called the Primary Inspection Kiosk (PIK) program and have been in the works since 2015. "The new kiosks will improve border security, as well as assist in reducing wait times and congestion at Canada's busiest airports," a statement from the Canadian Border Service Agency reads.

The kiosks are designed to reduce the number of interviews with border agents at primary inspection, allowing lines to move faster and to save money on the agents’ salaries. Though some people are wary of the machines ability to interpret data better than the humans trained to detect physical traits.

Though David Cohen, CLEAR’s chief administrative officer says the retinal scanner or fingerprint pad can save time and be more predictable. “That means another 30 minutes at home, another business meeting or more time to relax before having to get to the airport,” he says in an interview with the Star Tribune.

The process is simple: After answering questions that go deep into your background (like what address you lived at in 1985) for a few minutes, CLEAR validates your driver’s license, passport, or military ID, collects all your fingerprints, performs an iris scan, and takes a high-resolution facial photo. The company claims they have 1 million members nationwide and are growing rapidly.

While the positives are CLEAR, some perceive that there’s still risk. Behind the scenes, passenger data is passed through algorithms and databases to decide who passes and who fails. If the software isn’t carefully created, bias can be written into the algorithm. Katina Michael, a biometrics expert at the University of Wollongong, says the technology could threaten privacy and raises ethical concerns. “We are steam-training right through all of these technological transitions and we’re not really thinking about the ramifications,” she said in an interview with the Guardian. “I see the perceived benefit, but what I do know is that there will be real costs, human costs, not only through the loss of staff through automation, but also through discrimination of people who may appear different.”

While a healthy dose of skepticism is always good, I really don’t see this technology being used for profiling purposes. First, why would a fingerprint or iris scan be more useful than a photo? Second, the construction and safeguards behind good biometric techniques should mitigate this concern.

 

Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Rethinking Cabling

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->


Copyright Ⓒ 2010 SecuritySpecifiers™
>