Video Surveillance, Biometrics, and Privacy After 9-11 - PowerPoint PPT Presentation

About This Presentation
Title:

Video Surveillance, Biometrics, and Privacy After 9-11

Description:

Video Surveillance, Biometrics, and Privacy After 9-11 Professor Kevin Bowyer Computer Science & Engineering University of Notre Dame Disclaimers I receive research ... – PowerPoint PPT presentation

Number of Views:151
Avg rating:3.0/5.0
Slides: 73
Provided by: ndEdukw
Learn more at: https://www3.nd.edu
Category:

less

Transcript and Presenter's Notes

Title: Video Surveillance, Biometrics, and Privacy After 9-11


1
Video Surveillance, Biometrics, and Privacy After
9-11
Professor Kevin Bowyer Computer Science
Engineering University of Notre Dame
2
Disclaimers
  • I receive research funding from the Defense
    Advanced Research Projects Agency under the
    Human ID At A Distance program.
  • I have no financial interest in any biometrics
    related company.

3
Overview
  • The right to privacy.
  • Response-to-terrorism motivation.
  • State of biometric surveillance.
  • The privacy versus security tradeoff.

4
Video Surveillance or Privacy?
  • In what public places do you already assume you
    are under video surveillance?

When you walk into a building from a parking lot?
5
Video Surveillance or Privacy?
  • In what public places do you already assume you
    are under video surveillance?

When you shop at your favorite store? Or go to
your bank?
6
Video Surveillance or Privacy?
  • In what public places do you already assume you
    are under video surveillance?

When you buy gas for your car?
7
Video Surveillance or Privacy?
  • What if these daily instances of video
    surveillance were not just isolated commercial
    interests,
  • but instead all part of a networked national
    government security plan?

8
The Right to Privacy
  • The Supreme Court has explained that government
    action constitutes a search when it invades a
    persons reasonable expectation of privacy.

9
The Right to Privacy
  • Do citizens have a right to privacy from the
    government?
  • If so, what is the basis for it?
  • Where does it apply and not apply?

10
The Right to Privacy
  • But the court has also found that a person does
    not have a reasonable expectation of privacy with
    regard to physical characteristics that are
    constantly exposed to the public,

11
The Right to Privacy
  • So although the Fourth Amendment requires that a
    search conducted by government actors be
    reasonable, which generally means that there
    must be some degree of suspicion

12
The Right to Privacy
  • the scan of spectators facial characteristics
    at the Super Bowl did not constitute a search.
  • John Woodard, RAND Tech Rep.

13
The Right to Privacy
  • In summary
  • There is no clear constitutional barrier to
    government deploying a national video
    surveillance, identification, and tracking system.

14
Why Video Surveillance ID?
  • On 9-11 of 2001, nineteen terrorists hijacked
    four commercial airliners and murdered over 3,000
    people.
  • Their stated motivation is hatred for America and
    its support of Israel, plus Islamic religious
    justification.

15
Why Video Surveillance ID?
  • Some of the terrorists were known to the
    government and on watch lists.

Khalid Al-Midhar, terrorist on the plane that
crashed into the Pentagon.
Mohamed Atta, terrorist on the plane that
crashed into the WTC NT.
16
Why Video Surveillance ID?
  • Consider the following scenario outlined in a
    Business Week article on 5 November 2001

17
Why Video Surveillance ID?
  • As the Saudi Arabian Al-Midhar strolled into a
    meeting with some of Osama bin Ladens
    lieutenants in Kaula Lumpur in December 1999, he
    was videotaped by a Malaysian surveillance team.

18
Why Video Surveillance ID?
  • The tape was turned over to U.S. intelligence
    officials and, after several months, Al-Midhars
    name was put on the INSs watch list of
    potential terrorists.

19
Why Video Surveillance ID?
  • Using biometric profiling, it would have been
    possible to make a precise digital map of his
    face. This data could have been hooked to
    airport surveillance cameras.

20
Why Video Surveillance ID?
  • When cameras captured Al-Midhar, an alarm would
    have sounded, allowing cops to take him into
    custody.

21
Why Video Surveillance ID?
  • So if it worked as well as the Business Week
    article suggests, would you

22
Why Video Surveillance ID?
  • So if it worked as well as the Business Week
    article suggests, would you
  • Want it in every airport?

23
Why Video Surveillance ID?
  • So if it worked as well as the Business Week
    article suggests, would you
  • Want it in every airport?
  • and at every border crossing?

24
Why Video Surveillance ID?
  • So if it worked as well as the Business Week
    article suggests, would you
  • Want it in every airport?
  • and at every border crossing?
  • and every federal building?

25
Why Video Surveillance ID?
  • So if it worked as well as the Business Week
    article suggests, would you
  • Want it in every airport?
  • and at every border crossing?
  • and every federal building?
  • and stadiums, malls, etc?
  • If so, you would not be alone!

26
Why Video Surveillance ID?
  • In a poll just after 9-11, 86 favored use of
    face recognition technology to scan for suspected
    terrorists at various locations and public
    events.
  • Six months later, support still at 81.

27
Biometric Technologies
  • A biometric is something about a person that can
    be measured and used to identify the person.

28
Biometric Technologies
  • Numerous biometrics exist
  • Fingerprint Face
  • Iris Retinal scan
  • Hand shape Ear
  • Gait

29
Biometric Technologies
  • Different biometrics may be
  • invasive / non-invasive
  • contact / non-contact
  • near / at a distance
  • cooperative / non-cooperative

30
Biometric Technologies
  • The ideal surveillance technology would be
  • non-contact
  • at a distance
  • non-cooperative
  • also fast, cheap, and accurate.

31
Biometric Technologies
  • Commercial face recognition systems have been
    evaluated for airport security applications.
  • Recognition from gait is another hot area of
    biometrics research.

32
A Face Recognition System
Video Feed
  • Watch List
  • or Gallery

Detect Face
matching algorithm
Extract Features
Probe
(probe, possible matches)
Police
33
Some Terminology
What the system reports
innocent citizen
wanted terrorist
What is really in the scene
innocent citizen
True Negative
False Positive
  • True
  • Positive

False Negative
wanted terrorist
34
Practical Performance Tests
  • The Visionics face recognition system was tested
    at the Palm Beach Intl airport in March-April
    2002. The ACLU used FOIA to obtain a report and
    post it on the web.
  • (Visionics has now merged to become Identix.)

35
Practical Performance Tests
  • Palm Beach airport test results
  • about 50 true positives
  • 3 false alarms per hour
  • processing 10,000 images / day.
  • Is this good or bad?

36
Practical Performance Tests
  • An ACLU representative was quoted as saying that
    the Palm Beach airport evaluation results show
    that
  • face recognition is a disaster.

37
Practical Performance Tests
  • But would 50 chance of detection deter
    terrorists?
  • Would systems at two checkpoints give 3/4 chance
    of detection?
  • three systems give 7/8 chance?

38
Practical Performance Tests
  • Palm Beach airport tests also cited the
    importance of
  • Subjects head motion
  • Lighting conditions
  • Pose off-angle by 15 to 30
  • Eyeglasses and glare

39
Practical Performance Tests
  • A test of systems at Bostons Logan Airport in
    May-July 2002 showed greater true positives but
    also too many false positives to be practical.
  • The director conducting the test
  • Its not ready for prime time yet.

40
Recognition from Gait
  • Gait refers to walking pattern.
  • Johanssons 1973 work with point light display
    is a landmark result.
  • This was followed by other work showing gender
    discrimination, and recognition of known persons.

41
Recognition from Gait
  • Currently a hot topic in computer vision, DARPA
    has released a gait challenge problem composed
    of a set of video clips and a sample algorithm.
  • The first release has clips of 75 people walking
    under various conditions.

42
Recognition From Gait
Grass Concrete
  • Two surfaces, shoe types, and camera views.
  • 452 sequences (300GB)

43
Recognition from Gait
Gallery (G, A, R) 71
44
Recognition from Gait
45
Recognition from Gait
  • Just as face recognition has now run into dealing
    with the hard or real versions of the
    problem,
  • Recognition from gait also has hard problems to
    deal with in order to become a practical
    surveillance tool.

46
Recognition from Gait
  • For more details on the gait analysis challenge
    problem, see the paper by Phillips et al in ICPR
    02.

47
Biometric Technologies
  • It appears that there is modest real increase
    in security from video-based biometrics in short
    run (2-3 years).
  • But there may be a deterrent effect.
  • And technology is rapidly improving.

48
Biometric Technologies
  • Massachusetts governor Swift said she embraced
    the technology as part of security improvements
    she ordered at Bostons Logan airport to restore
    confidence in flying.
  • L. Gay, Technology face recognition has limits,
    some say, www.nando.net/technology/story/
    214481p-207c.html

49
Biometric Technologies
  • Important principles to remember
  • A person cant be recognized unless they have
    been enrolled.
  • False positives are unavoidable.
  • FPs trade against false negatives.
  • A human operator is still needed.

50
Security versus Privacy
  • The civil libertarian fear is that the desire to
    be safe from terrorism will push aside reason in
    balancing security versus privacy.

51
Security versus Privacy
  • Often quoted by civil libertarians
  • They that can give up essential liberty to obtain
    a little temporary safety deserve neither liberty
    or safety.
  • - Benjamin Franklin

52
Security versus Privacy
  • But a common opposing view is
  • Benjamin Franklin said that anyone who gives up
    essential liberties to preserve freedom is a
    fool, but maybe he didnt conceive of nuclear
    war and dirty bombs.
  • - Neil Young (musician, Lets Roll)

53
Security versus Privacy
  • The proposed tradeoff is clear
  • Loss of some amount of privacy
  • for
  • Increase by some amount in security.
  • Computing technology largely defines the
    boundaries of possible tradeoffs.

54
Media Reports / Opinions
  • A computer glitch could match the face of an
    innocent person with the digital image of a
    criminal.
  • Super bowl snooping, NY Times, Feb 4, 2001.
  • Is it really a glitch?
  • Or an unavoidable feature?

55
Media Reports / Opinions
  • On the system used at Super Bowl
  • The beauty of the system is that it is
    disguise-proof. You can grow a beard and put on
    sunglasses, and FaceTrac will still pick you out
    of a crowd.
  • Lev Grossman, Welcome to the snooper bowl,
    Time, Feb 12, 2001.

56
Media Reports / Opinions
  • Is use of the term disguise-proof in connection
    with these systems
  • Unrestrained technology optimism? Unprofessional
    journalism? Misleading the public?

57
Media Reports / Opinions
  • A woman in Texas who saw the image claimed the
    man in the picture was wanted for crimes. She
    called the Tampa police, who questioned the man,
    a construction worker. It was the wrong person
    ...
  • The system is not 100 percent accurate.
  • Electronic surveillance From Big Brother
    Fears to Safety Tool, NY Times, Dec 6, 2001.

58
Media Reports / Opinions
  • What does this incident illustrate?
  • That the computer isnt 100 accurate?
  • Or that humans arent 100 accurate?

59
Media Reports / Opinions
  • Quoting Ed Markey (D., Mass.)
  • Its chilling, the notion that 100,000 people
    were subject to video surveillance and had their
    identities checked by the government.
  • Lev Grossman, Welcome to the snooper bowl,
    Time, Feb 12, 2001.

60
Media Reports / Opinions
  • What do you think of when you hear had their
    identities checked?
  • Is this an accurate analogy?

61
Media Reports / Opinions
  • What do you think of when you hear had their
    identities checked?
  • Is this an accurate analogy?
  • What about a police lineup?

62
Media Reports / Opinions
  • What do you think of when you hear had their
    identities checked?
  • Is this an accurate analogy?
  • What about a police lineup?
  • Or a policeman on a street corner holding a photo
    of a suspect?

63
Media Reports / Opinions
  • ACLU representatives have claimed that the
    technology (1) does not work, and (2) it greatly
    threatens privacy.
  • Can both claims be true at once?

64
Ethical Issues
  • Ethical issues arise in (at least)
  • Protection of privacy.
  • Performance claims.
  • Public understanding.

65
AITP Standards of Conduct
  • Protect the privacy and confidentiality of all
    information entrusted to me.
  • Inform the public in all areas of my expertise.
  • Insure that products of my work are used in a
    socially responsible way.

66
ACM Code of Ethics
  • Respect the privacy of others.
  • Ensure that those affected have their needs
    clearly articulated.
  • System must be validated to meet requirements.

67
Software Engg Code of Ethics
  • Cooperate in efforts to address matters of grave
    public concern caused by software, ...
  • Be fair and avoid deception in all statements,
    particularly public ones, concerning software

68
Software Engg Code of Ethics
  • Ensure that specifications have been well
    documented, satisfy the users requirements and
    have the appropriate approvals.

69
Intl Biometric Ind. Assoc.
  • Accountability in Marketing Because truth is
    the key to industry credibility, members attest
    that their stated claims are accurate and can be
    independently verified by a competent authority.
  • www.ibia.org/principl.htm

70
Ethically Responsible?
  • knowing how many checkpoints these people had
    to go through, we had a high probability to
    alert, intercept, these individuals maybe August
    21-st or 23-rd when they crossed the Canadian
    border and we would have perhaps foiled the whole
    plot.
  • J. Atick, Visionics CEO, NPR Morning Edition

71
Ethically Responsible?
  • Its simply the fear of change and technology.
    Once youve adapted, you look back and say I was
    afraid of what?
  • T. Colasti, CEO of Visionics, in
  • Lev Grossman, Welcome to the snooper bowl,
    Time, Feb 12, 2001.

72
The End.
Write a Comment
User Comments (0)
About PowerShow.com