• Nie Znaleziono Wyników

at airports

N/A
N/A
Protected

Academic year: 2022

Share "at airports"

Copied!
14
0
0

Pełen tekst

(1)

0DOZLQD'DQNLHZLF]0D

,QVWLWXWHRI3V\FKRORJ\'HSDUWPHQWRI%HKDYLRXUDO6FLHQFHV

RIWKH-DJLHOORQLDQ8QLYHUVLW\

0HWKRGVRIGHWHFWLQJSRWHQWLDOWHUURULVWV

at airports

Abstract:

,QUHFHQW\HDUVWKHLQWHUHVWWRLPSURYHWKHUHOLDELOLW\RIGHFHSWLRQDQGKRVWLOH

LQWHQWLRQVGHWHFWLRQWHFKQLTXHVLVUHODWHGWRWKHQHHGRILQFUHDVLQJWKHVDIHW\

RIFLWL]HQVWKUHDWHQHGZLWKWHUURULVWDWWDFNV,QSDUWLFXODUWKH8QLWHG6WDWHV

JRYHUQPHQWWKURXJKLWVVHFXULW\DJHQFLHVLVORRNLQJIRUDQGILQDQFLQJUHVH- DUFKRQPRGHUQOLHGHWHFWLRQWHFKQLTXHV

7KHUHDUHGLIIHUHQWRSLQLRQVRQZKHWKHUZHFDQGHWHUPLQHZKRLVSODQQLQJ

DKRVWLOHDFWPHUHO\E\REVHUYLQJEHKDYLRU6RPHUHVHDUFKHUVDUHFRQYLQFHG

WKDWVFLHQWLILFPHWKRGVRIGHWHFWLQJKRVWLOHLQWHQWLRQVDPRQJRWKHUVE\GHWHF- WLQJGHFHSWLRQFDQKHOSWRFDWFKWHUURULVWVDQGSURYLGHVHFXULW\7KLVDUWLFOH

IRFXVHVRQEHKDYLRUDOPHWKRGVRIGHWHFWLQJSRWHQWLDOWHUURULVWV

Key words:7HUURULVWVDIHW\GHWHFWLRQFULPHDWWDFN

Rising crime and a high risk of terrorist attacks cause that predicting ag JUHVVLYH EHKDYLRU QRZDGD\V LV WKH DELOLW\ WKDW FDQ QRW EH XQGHUHVWLPDWHG

DQGLGHQWLI\LQJLQGLYLGXDOVZKRYHU\OLNHO\FRXOGKDYHKRVWLOHLQWHQWLRQVKDV

become a necessity. In order to protect the security of citizens, including the requirement of eliminating direct attacks on life, health or property of indi viduals, the methods based on scientific research are applied.2

1 W. Froncisz, -DNZ\NU\üNáDPVWZRF]\SUDZGRPyZQRĞüSRGJOąGDMąFPy]JÄ:V]HFKĞZLDW´

QUV

2 J. Czapska, %H]SLHF]HĔVWZRRE\ZDWHOL6WXGLXP]]DNUHVXSROLW\NLSUDZD3ROSUHVV.UDNyZ

2004, s. 32.

(2)

Systems used at airports are the examples of utilizing research findings to predict aggressive behavior: methods of detecting potential terrorists, based on the analysis of behavior, emotions visible on faces, and physiological in

dicators.

In recent years the interest to improve the reliability of deception and hos

tile intentions detection techniques is related to the need of increasing the VDIHW\RIFLWL]HQVWKUHDWHQHGZLWKWHUURULVWDWWDFNV,QSDUWLFXODUWKH8QLWHG

States government through its security agencies is looking for and financing research on modern lie detection techniques.3

7KHUHDUHGLIIHUHQWRSLQLRQVRQZKHWKHUZHFDQGHWHUPLQHZKRLVSODQ

ning a hostile act, merely by observing behavior. Some researchers are con vinced that scientific methods of detecting hostile intentions, among others by detecting deception, can help to catch terrorists and provide security. This article focuses on behavioral methods of detecting potential terrorists.

)$&6V\VWHP

In 1978, Ekman and colleagues developed the Facial Action Coding Sys

WHP )$&6 ZKLFKVXSSRUWHGE\PHDVXUHPHQWVRIYRLFHDQGVSHHFKDOORZV

to increase the accuracy of lie detection (lying defined as “a deliberate choice WRPLVOHDGDWDUJHWZLWKRXWJLYLQJDQ\QRWLILFDWLRQRIWKHLQWHQWWRGRVR´4 

to 90%.

FACS is a method of describing and measuring facial behavior, based on REVHUYDEOHFRPSRQHQWVRIIDFLDOPRYHPHQWFDOOHGDFWLRQXQLWV $8 DQGWKH

combinations of action units are forming a facial expression. FACS describes the contraction of various muscles, leading to different facial expressions by ZKLFKZHDUHDEOHWRUHFRJQL]HHPRWLRQV,QYROXQWDU\IDFLDOH[SUHVVLRQV PL

FURH[SUHVVLRQV DUHEULHI WKH\ODVWOHVVWKDQRQHVHFRQG DQGDUHFKDUDFWHU

3 W. Froncisz, -DNZ\NU\üNáDPVWZRF]\SUDZGRPyZQRĞüSRGJOąGDMąFPy]JÄ:V]HFKĞZLDW´

QUV

4 P. Ekman, 6HOI'HFHSWLRQ$QG'HWHFWLRQ2I0LVLQIRUPDWLRQ>Z@6HOI'HFHSWLRQ$Q$GDS- WLYH 0HFKDQLVP" UHG  -6 /RFNKDUG '/ 3DXOKXV 3UHQWLFH+DOO (QJOHZRRG &OLIIV 1-

1988, s. 230.

(3)

istic for experiencing one of the seven basic, universal emotions: anger, fear, disgust, contempt, sadness, surprise or happiness. Microexpressions are evo lutionarily acquired reactions occurring in the entire human species, regard

less of socialization, culture and age. In the course of socialization, people learn to control their facial expressions, and therefore it is possible to pretend H[SHULHQFLQJVSHFLILFHPRWLRQV+RZHYHUHYHQZLWKDQDELOLW\WRFRQWURODQ\

facial expressions, the current emotional state is revealed by other nonverbal messages, more difficult to control consciously.5 A number of studies indicate WKDWDOVRLPSRUWDQWLVWKHDSSHDUDQFHRIH\HV HVSHFLDOO\WKHSXSLOODU\UHIOH[ 

ZKROHERG\SRVWXUHZD\RIVSHDNLQJ WRQHRIYRLFHDQGVSHDNLQJUDWH VSD

tial behavior and keeping personal distance.6 In addition, the first reaction of WKHIDFHZKLFKODWHUFDQEHPDVNHGIRUH[DPSOHE\SXWWLQJRQDIDNHVPLOHLV

XVXDOO\UHDO,QWHQWLRQDO IDNH H[SUHVVLRQVGLIIHUIURPWKHVSRQWDQHRXVRQHV

fake expressions are usually held for too long, moreover it is not possible to FRQWURODOOWKHPXVFOHVDVVRFLDWHGZLWKVSHFLILFIDFLDOH[SUHVVLRQV7

(NPDQKROGVWRDYLHZWKDWQRQYHUEDOLQGLFDWRUVDUHWKHPRVWDFFXUDWHDQG

promising indicators of lies, in terms of possible practical applications. He FRQFOXGHVEDVLQJRQWKHUHVXOWVRIKLVRZQUHVHDUFKWKDWSHRSOHRYHUO\UHO\

on verbal communication and are inclined to ignore or misinterpret the most explicit mimic, movement and voice indicators. The researcher also proves that training in recognizing nonverbal indicators of deception, described by him, improves the accuracy in identifying lies. Another argument in favor of this position by Ekman are the contradictions in reports of research on verbal LQGLFDWRUVRIOLHIRUH[DPSOHLWDSSHDUVWKDWWKHDQVZHUVJLYHQRQO\E\VRPH

people are indirect, evasive, and contain more information than the question required. Microexpressions are used to detect lies, and it makes possible to detect hostile intentions of the other person. To facilitate this process, Ekman suggests using a tool such as FACS, to enable assessment of facial expres

5 P. Ekman, 7HOOLQJ/LHV&OXHVWRGHFHLWLQWKHPDUNHWSODFHSROLWLFVDQGPDUULDJH, W. W.

1RUWRQ &RPSDQ\1HZ<RUN/RQGRQ

6 I. Kurcz, -Ċ]\NLNRPXQLNDFMD>Z@3V\FKRORJLD3RGUĊF]QLNDNDGHPLFNL W UHG -6WUHODX

*:3*GDĔVNV

7 P. Ekman, Telling…, op. cit.

(4)

sion, but mastering it requires a lot of time. Facial Action Coding System, ZKLFKKDVVRIDUEHHQXVHGPDLQO\LQODERUDWRU\WHVWVSURYHGWREHDUHOLDEOH

and effective method of detecting lies, because the ability to detect microex

SUHVVLRQVLVSRVLWLYHO\FRUUHODWHGZLWKWKHDELOLW\WRGHWHFWOLHV8

Recognizing signs of emotion on the face can be trained through a de

signed by Ekman computer program called F.A.C.E. Training. The program LV FRPSRVHG RI WZR W\SHV RI WUDLQLQJ 0(77 0LFUR ([SUHVVLRQ7UDLQLQJ

7RRO DQG6(77 7KH6XEWOH([SUHVVLRQ7UDLQLQJ7RRO )$&(7UDLQLQJ

KDVEHHQVFLHQWLILFDOO\SURYHQDQGILHOGWHVWHGDQGLVQRZWKHEDVLVRIDQHZ

WHOHYLVLRQVKRZRQ)R[79/LH7R0HRIZKLFK'U3DXO(NPDQLVWKHVFL

entific consultant.9

(NPDQLVFXUUHQWO\ZRUNLQJRQWKHSURMHFWRIQHZPHWKRGVIRUUDSLGDQG

PDVVLGHQWLILFDWLRQRISHRSOHZKRVHIDFLDOH[SUHVVLRQVDQGSK\VLRORJLFDOFRU

UHODWHVRIHPRWLRQVPD\VKRZGHFHSWLRQRUKRVWLOHLQWHQWLRQV+HFRQWLQXHV

WRZRUNRQWKHLGHQWLILFDWLRQRIIDFLDOH[SUHVVLRQVRILPPHGLDWHGHDGO\LQ

WHQWFRYHULQJERWKSUHPHGLWDWHGDQGORVVRIFRQWURODWWDFNV7KHVWXG\ZLOO

LQFOXGHSHUVRQVZKRKDYHUHFHQWO\VXUYLYHGDSK\VLFDODVVDXOWWRUHVWRUHWKH

H[SUHVVLRQWKH\VDZRQWKHIDFHRIWKHSHUSHWUDWRU7KHSURMHFWLVFDOOHG'

FXEH 'DQJHURXV'HPHDQRU'HWHFWRU DQGLVGHVLJQHGWRGHYHORSWKHVNLOOVLQ

detecting the subtle signs of aggression.10

Ekman’s recent scientific research is also focused on imaging facial physi ology as a method of detecting changes in the level of stress. He and his col

leagues conducted a study to prove the accuracy of estimates of the computer V\VWHPZKLFKXVHV DWKHUPDOFDPHUDPRQLWRULQJWKHUHDOWLPHFKDQJHVLQ

EORRGIORZLQWKHRUELWDOPXVFOHVSRLQWHGRXWFRUUHFWO\LQRISDUWLFL

SDQWVH[SHULHQFLQJWHQVLRQ O\LQJ RUQRWH[SHULHQFLQJWHQVLRQ WUXWKWHOOLQJ 

5HVHDUFKHUVEHOLHYHWKDWWKLVLVDUHVXOWZKLFKRSHQVZD\IRUWKHDXWRPDWHG

GHWHFWLRQRIGHFHLWLQQDWXUDOFRQGLWLRQVZKLFKLVWKHQHHGLQFUHDVLQJO\EHLQJ

8 W. Wypler,$NWXDOQHWUHQG\ZSV\FKRORJLF]Q\FKEDGDQLDFKQDGNáDPVWZHP>Z@3URILODNW\ND

VSRáHF]QDLUHVRFMDOL]DFMD UHG -.ZDĞQLHZVNL:\GDZQLFWZR,36L58::DUV]DZD

V

9)$&(7UDLQLQJ>Z@KWWSZZZSDXOHNPDQFRP GDWDRGF]\WX 

10&XUUHQW3URMHFWV>Z@KWWSZZZSDXOHNPDQFRP GDWDRGF]\WX 

(5)

declared from the security systems industry. The threat of terrorist attacks IRUFHVWKHXVHRIQHZVROXWLRQVWHFKQRORJLFDOO\DGYDQFHGV\VWHPVIRUTXLFN

efficient and massive monitoring of human behavior and physiology, in order WRGHWHFWFKDQJHVLQWKHOHYHORIDURXVDODVZHOODVHYDOXDWLQJLQUHDOWLPHWKH

risk of dangerous behavior, such as terrorist acts.11

)DFLDO$FWLRQ&RGLQJ6\VWHP )$&6 XQGHUOLHVWKHWHFKQRORJ\XVHGE\

RIILFHUVZRUNLQJDW$PHULFDQDLUSRUWVXQGHUWKHSURJUDPLPSOHPHQWHGE\(N

man to detect suspicious passengers. The program is called SPOT (Screening 3DVVHQJHUVE\2EVHUYDWLRQ7HFKQLTXHV DQGLVEDVHGRQWUDLQLQJLQREVHUYD

tion skills to help them identify passengers at an early stage.

6327SURJUDP

$WDLUSRUWVLQWKH8QLWHG6WDWHVWKHUHDUHZRUNLQJDERXWRI%H

KDYLRXU'HWHFWLRQ2IILFHUV %'2V 7KH\DUHHPSOR\HHVRI7UDQVSRUWDWLRQ

6HFXULW\$GPLQLVWUDWLRQ 76$ ZKLFKLVEUDQFKRI'HSDUWPHQWRI+RPHODQG

6HFXULW\ '+6 JRYHUQPHQWDJHQF\ZDWFKLQJRYHUWKHVDIHW\RIWKHWUDYHOLQJ

FLWL]HQVLQWKH8QLWHG6WDWHV%'2VDUHSDUWRIDIRXU\HDUROGSURJUDPFDOOHG

6FUHHQLQJ3DVVHQJHUVE\2EVHUYDWLRQ7HFKQLTXH 6327 ZKLFKLVGHVLJQHG

WRLGHQWLI\SHRSOHZKRFRXOGSRVHDWKUHDWWRDLUOLQHSDVVHQJHUV7KHSURJUDP

utilizes noninvasive behavior observation and behavioral analysis techniques WR LGHQWLI\ SRWHQWLDOO\ KLJKULVN SDVVHQJHUV %'2 RIILFHUV DUH LQWHQGHG WR

detect persons exhibiting behavior that indicates that they may constitute a threat to aviation and air transport security.

The program is a derivative of other successful behavioral analysis pro JUDPVZKLFKKDYHEHHQLPSOHPHQWHGE\ODZHQIRUFHPHQWDQGVHFXULW\SHU

VRQQHOERWKLQWKH86DQGDURXQGWKHZRUOG76$¶V%'2WUDLQHGVHFXULW\

officers are screening travelers for involuntary physical and physiological UHDFWLRQVZKLFKSHRSOHH[KLELWLQUHVSRQVHWRIHDURIEHLQJGLVFRYHUHG0DQL

festation of some of these behaviors does not automatically mean that an in

1137VLDP\UW]LV-'RZGDOO'6KDVWUL,73DYOLGLV0*)UDQN3(NPDQ,PDJLQJ)DFLDO

3K\VLRORJ\IRUWKH'HWHFWLRQRI'HFHLW, „International Journal of Computer Vision”, 2007, nr

  V

(6)

GLYLGXDOKDVWHUURULVWRUFULPLQDOLQWHQWEXWWKLVNQRZOHGJHKHOSVWRGHWHUPLQH

ZKHWKHUDSHUVRQSUHVHQWVDKLJKHUULVNRUZKHWKHUWKHREVHUYHGEHKDYLRUKDV

a nonthreatening origin.12

BDO officers are trained to detect suspicious or unusual behavior in pas VHQJHUVWKH\GHWHUPLQHZKHWKHUWKHSDVVHQJHUVDUHDWKUHDWEDVLQJRQWKHLU

responses to a set of routine questions. Security officers ask three to four questions (e.g., „Where have you been?”, „Where are you traveling?”, „What LVWKHSXUSRVHRI\RXUWULS"´Ä'R\RXKDYHDEXVLQHVVFDUG"´ ZKLOHORRN

ing for minute facial cues that may indicate deception or malicious intent.

The primary responsibility of the BDO officers is to observe the behavior of passengers going through the security checkpoint.13 Individuals exhibiting specific observable behaviors may be referred for additional screening at the FKHFNSRLQWLQFOXGLQJSHUVRQDODQGRQH¶VFDUU\RQEDJJDJHSK\VLFDOLQVSHF

tion. Referrals are based on specific observed behaviors only, not on one’s appearance, race, ethnicity or religion.

BDO officers add an element of unpredictability to the security screening SURFHVVZKLFKLVHDV\IRUSDVVHQJHUVWRQDYLJDWHEXWGLIILFXOWWRPDQLSXODWHE\

terrorists. It serves as an important additional level of security in the airport environment, requires no additional specialized screening equipment, can be easily deployed to other modes of transportation and presents yet another challenge the terrorists need to overcome in attempt to defeat the security system.

To 2011 Ekman has taught about 1,000 BDO experts and continues to consult on the program. The methodology used in SPOT has never been sub

jected to controlled scientific tests, because neither Ekman nor TSA have disclosed the specific cues used to identify potential threats, citing security reasons. Ekman has largely stopped publishing, not to provide any help to terrorists trying to cheat the system.

12%HKDYLRU'HWHFWLRQ2IILFHUV %'2 /D\HUVRI6HFXULW\>Z@KWWSZZZWVDJRY GDWDRGF

]\WX 

13&-&LDUDPHOOD,VS\ZLWKP\OLWWOHH\H76$UROOLQJRXWQHZµEHKDYLRUGHWHFWLRQ

RIILFHUV¶>Z@KWWSGDLO\FDOOHUFRP GDWDRGF]\WX 

(7)

Evidence of the SPOT program effectiveness provides statistics: in the first phase of the program, from January 2006 to November 2009, according WRWKH76$DJHQF\EHKDYLRXUGHWHFWLRQRIILFHUVUHIHUUHGPRUHWKDQ

SHRSOHIRUUHLQVSHFWLRQZKLFKLQYROYHVFORVHUFRQWURORIEDJVDQGWHVWLQJIRU

explosives. The vast majority of those subjected to another inspection contin

XHGRQWKHLUWUDYHOVZLWKQRIXUWKHUGHOD\VEXWZHUHDUUHVWHG14

Similar safety programs are implemented in many other airports around WKHZRUOG$W+HDWKURZ$LUSRUWLQ/RQGRQWKH%ULWLVKJRYHUQPHQWLVLP

plementing behavior detection officers in a program modeled in part on the 6327ZKLOH'HSDUWPHQWRI+RPHODQG6HFXULW\LQWKH8QLWHG6WDWHVOHDGV

WKH)$67SURJUDPZKLFKXVHVVHQVRUVWRORRNDWQRQYHUEDOEHKDYLRUDQG

WKHUHE\GHWHFWVWKHSRWHQWLDOWHUURULVWVZDONLQJGRZQWKHKDOO8QLWHG6WDWHV

'HSDUWPHQWRI'HIHQVH '2' DQGLQWHOOLJHQFHDJHQFLHVKDYHH[SUHVVHGLQ

terest in similar programs.15

)$67WHFKQLTXH

76$6327SURJUDPZDVLQLWVILUVW\HDUZKHQWKH6FLHQFHDQG7HFKQRO

ogy Directorate of the U.S. Department of Homeland Security began search LQJIRUQHZPHWKRGVDQGVWDUWHGWRVSRQVRUUHVHDUFKDLPHGDWGHYHORSLQJDQG

testing tools and methodologies for identifying and assessing potential threat GHFHSWLRQ DQG KRVWLOH LQWHQW  LQ UHDO WLPH RQ WKH VSRW DQG QRQLQYDVLYHO\

and at better understanding of the phenomenon of terrorism, improving na tional security, and accelerating movement of people through checkpoints.

7KLVWHFKQRORJ\ZRXOGEHVLPLODUWRRUH[FHHGLQJWKHFDSDELOLWLHVRISUHVHQW

VFUHHQLQJWHFKQLTXHVZLWKRXWLPSHGLQJWKHIORZRIWUDYHOHUV

Achieved in effect is the FAST technique (Future Attribute Screening 7HFKQRORJ\ GHYHORSHGXQGHUWKH'+6SURJUDPFDOOHG6RFLDODQG%HKDY

LRUDO5HVHDUFK 6%5 LQDGGLWLRQWRSUHYLRXVO\XVHGPHWKRGVRIVFUHHQLQJ

14 S. Weinberger, $LUSRUWVHFXULW\,QWHQWWRGHFHLYH"Ä1DWXUH´QUV

415.

15 S. Weinberger, $LUSRUW«RSFLWV

(8)

such as SPOT. It consists in the fact that passengers passing through a secu

rity gate are monitored in terms of nonverbal signals of intent to harm oth ers. This technology is designed to catch suspicious behavior, and thereby SRWHQWLDOWHUURULVWVZLWKFDPHUDVDQGVHQVRUVPHDVXULQJVXEWOHSK\VLRORJLF

changes that can be assessed remotely and in real time, including eye move

PHQWZLGWKRIWKHSXSLOKHDUWUDWHVNLQHOHFWULFDOUHVLVWDQFHUHVSLUDWLRQUDWH

VZHDWLQJDQGSRVVLEO\EUDLQVFDQVZKLOHDSDVVHQJHULVDVNHGDVHULHVRIVSH

FLILFTXHVWLRQV)$67DOVRGUDZVDWWHQWLRQWRYLVXDOVLJQDOVVXFKDVEOLQNLQJ

UDWHDQGERG\PRYHPHQWV UHVWOHVVEHKDYLRU 7KHSURFHGXUHVDQGWHFKQROR

gies necessary to receive these signals, are noninvasive and easy to integrate LQWRFURZGHGRSHUDWLQJDUHDVXFKDVDLUSRUWV,QDGGLWLRQWRGHWHFWLQJVLJQDOV

RIKRVWLOHLQWHQWLRQVXQGHUWKHSURJUDPZDVFRQGXFWHGUHVHDUFKRQWKHSRVVL

bility of automating this process using sensors and detection algorithms, and LQWHJUDWLQJWKHV\VWHPZLWKRWKHUWHFKQRORJLHVDLPHGDWLGHQWLI\LQJLQGLYLGX

DOVZKRSRVHDWKUHDWWR8QLWHG6WDWHVDYLDWLRQVXFKDVELRPHWULFWRROVDQG

databases.16

7KH GHYLFH MXVW DV WHFKQRORJ\ 3UH&ULPH LQ WKH PRYLH Ä0LQRULW\ 5H

port”, is designed to read the intentions of potential terrorists, for example DWDLUSRUWV,WUHPLQGVSRO\JUDSKEXWWKHUHLVQRQHHGRIGLUHFWFRQWDFWZLWK

DSRWHQWLDOSHUSHWUDWRU±)$67¶VVHQVRUVGRQRWFRPHLQGLUHFWFRQWDFWZLWK

monitored individual, and their action does not depend on direct questioning.

&RQWDFWVHQVRUVZHUHUHSODFHGZLWKVWDQGRIIV\VWHPV RSWLFDOVHQVRUVDQG

UDGDUV VXFKDVLQIUDUHGFDPHUDVWRPHDVXUHVXEWOHFKDQJHVLQIDFLDOWHPSHUD

ture and BioLIDAR, a laser radar that measures heart rate and respiration.

7KDWDOORZVWKHDVVHVVPHQWRIWUDYHOHUVZDONLQJGRZQWKHKDOOVWDQGLQJLQ

line, or passing through the control gate.

$FFRUGLQJWR'+6WKHGHYLFHZRUNHGSURSHUO\LQSHUFHQWSHUFHQW

ZHUHIDOVHDODUPV7KLVUHVXOWLVPXFKKLJKHUWKDQUDQGRPDQGDOVRKLJKHU

than those achieved by specially trained persons. Daniel and Jennifer Mar

tin’s malintent theory underlying the FAST technique is based on the assump tion derived from the behavioral sciences, that the hostile intentions translate

16'HFHSWLRQ'HWHFWLRQ>Z@KWWSZZZGKVJRY GDWDRGF]\WX 

(9)

into specific physiological responses and behavior. Scientists have proven WKHUHODWLRQVKLSEHWZHHQSV\FKRSK\VLRORJLFDOLQGLFDWRUVDQGLQWHQWLRQV7KH

VWXG\FRQVLVWHGRI$UDELFVSHDNLQJPHQDQGOHGWRWKHFRQFOXVLRQWKDW

WKHUHLVDUHODWLRQVKLSEHWZHHQWKHLQWHQWWRGHFHLYHDQGKHDUWUDWHYDULDELOLW\

NQRZQDVUHVSLUDWRU\VLQXVDUUK\WKPLD 56$ 17

7KH)$67SURMHFWFRQVLVWVRIWZRHOHPHQWVILUVWQHFHVVDU\DUHWKHPRG

els of hostile intent and deception, focusing on behavioral and verbal cues, DQGVHFRQGDQDXWRPDWHGVXLWHRIQRQLQYDVLYHVHQVRUVDQGDOJRULWKPV,Q

tegrated, these sensors automatically detect and track the input cues to the models. According to the developers of this technology it has the potential to UHYROXWLRQL]HWKHVFUHHQLQJDQGLQWHUYLHZLQJSURFHVVE\VXSSRUWLQJDFFHVV

control for strategic infrastructure, such as airports.18

While existing screening technologies, such as biometrics, offer the po WHQWLDOWRGHWHFWDOUHDG\NQRZQWHUURULVWVWKH)$67WHFKQRORJ\IRFXVHVRQO\

RQUHDOWLPHSV\FKRSK\VLRORJLFDODQGEHKDYLRUDOSDWWHUQVLQDQDWWHPSWWR

VWRSDQXQNQRZQWHUURULVWIURPREWDLQLQJDFFHVVWRKLVGHVLUHGORFDWLRQ6LP

SO\SXWFRPSDULQJWKHEHKDYLRURILQGLYLGXDOVZLWKHVWDEOLVKHGSDWWHUQVRI

behavior, in relation to the situational context and appropriateness of behav

LRUDOORZVWKHSUHGLFWLRQRIKXPDQDFWLRQV7KDWZDVDFKLHYHGWKURXJKPR

bile and multimodal technologies, using behavioral and physiological sensors ZKLFKSURYLGHFXOWXUDOO\QHXWUDOLQGLFDWRUVRIKRVWLOHLQWHQW%\FUHDWLQJWKH

FAST technology, DHS hopes to simplify the control of the airport by us

ing recent advances in the development of screening techniques focused on behavior.19

17 S. Weinberger, $LUSRUW«RSFLWV

18 Deception..., op. cit.

193ULYDF\,PSDFW$VVHVVPHQW8SGDWHIRUWKH)XWXUH$WWULEXWH6FUHHQLQJ7HFKQRORJ\ )$67  3DVVLYH0HWKRGVIRU3UHFLVLRQ%HKDYLRUDO6FUHHQLQJ'+66 73,$ D 'HFHPEHU

2011.

(10)

6$)((V\VWHP

The SAFEE system (Security of Aircraft in the Future European Envi

URQPHQW LVDODUJHLQWHJUDWHGSURMHFWGHYHORSHGE\VFLHQWLVWVIURPUHVHDUFK

FHQWHUVLQWKH8.DQG*HUPDQ\ZKLFKDLPVWRUHVWRUHIXOOFRQILGHQFHLQDLU

transport. The vision of this project is to build an advanced system of aviation VDIHW\ZRUNLQJXQGHUWKHWKUHDWRIWHUURULVWDWWDFNRQWKHDLUFUDIW7KHPDLQ

objective of this system is to provide a completely safe flight from departure WRDUULYDOGHVWLQDWLRQZKDWHYHUWKHLGHQWLILHGWKUHDWVDUH7KHEDVLVRIWKH

SURMHFWLVSDVWH[SHULHQFHZKLFKKDVVKRZQWKDWSHRSOHZLWKKRVWLOHLQWHQ

tions may go through the different airport controls and security measures, ac cess an aircraft and initiate a hostile action. Therefore there is a need to secure the plane, as the last barrier of attack.20

7KHSURMHFWLVIRFXVHGRQWKHLPSOHPHQWDWLRQRIDZLGHUDQJHRIRQERDUG

systems detecting threats and providing reliable information about the threat WRWKHIOLJKWFUHZ7KHPRQLWRULQJV\VWHPRIDLUSDVVHQJHUVFDOOHG2QERDUG

Threat Detection System, designed to prevent the abduction of the aircraft, WUDFNVSDVVHQJHUVZLWKPLQLDWXUHFDPHUDVLQVWDOOHGLQHYHU\VHDWLQWKHSODQH

and analyzes their behavior. This technology has to distinguish the ordinary SDVVHQJHUVIURPWKRVHZKRPD\WKUHDWHQRWKHUVDQGWKHPVHOYHV$SSOLHGH\H

EOLQNLQJIUHTXHQF\PRQLWRUVZHUHERUURZHGIURPWKHZRUNRQOLHGHWHFWRUV

increased frequency suggests higher level of stress. Cameras have to con

tinually monitor and record every movement of the passenger, to analyze the H[SUHVVLRQRIWKHIDFHWKHIUHTXHQF\RIEOLQNLQJH\HPRYHPHQWVZHWWLQJWKH

OLSVZLWKWRQJXHDQGHYHQWKHVWDWHRIKDLUPHDQLQJDOOLQGLFDWRUVVXJJHVWLQJ

LQFUHDVHGOHYHORIVWUHVVZKLFKLQWXUQLVLQGLFDWLYHRISDVVHQJHU¶VLQWHQWWR

deceive. In addition to the cameras in the seats, installed microphones might EHLQVWDOOHGZKLFKPD\SLFNXSHYHQVRIWO\VSRNHQZRUGV$QDO\VLVRIHDFK

SDVVHQJHUEHKDYLRUZLOOEHDYDLODEOHWRWKHFUHZDQGZLOOEHDZDUQLQJVLJQDO

of the possibility of a terrorist attack, such that took place on 11 September.

20 6HFXULW\ RI$LUFUDIW LQ WKH )XWXUH (XURSHDQ (QYLURQPHQW >Z@ KWWSZZZVDIHHUHDGLQJ

ac.uk GDWDRGF]\WX 

(11)

All audio and video materials about the behavior of passengers are to be reset after each flight to protect passenger rights.21

An important aspect of behavior analysis is the issue of avoiding discrimi

natory ethnic profiling, such as recognizing any person of Arab origin as a SRWHQWLDOWHUURULVW3UHVHQWHGEHORZDUHFDVHVWXGLHVRIWUDLQLQJRIIHUHGWRRI

ficers in order to develop their abilities to perceive and analyze suspicious be havior, diverting attention from the characteristics that may refer to prejudice, such as race, ethnicity or religion.

In the Netherlands there is a training program called Search, Detect and 5HDFW 6'5 FUHDWHGE\,QWHUQDWLRQDO6HFXULW\DQG&RXQWHU7HUURULVP$FDG

emy for Police and Security Entities. The SDR is used as a tool to identify cases of potential violence, disrupting public order, illegal activity and fatal attacks. It is intended to protect public space and mass events and to increase security skills for the analysis of behavior: directs attention to behavior that might require police action, and diverts attention from the immutable char DFWHULVWLFVVXFKDVVNLQFRORU'XULQJWKHWUDLQLQJRIILFHUVOHDUQKRZSHRSOH

XVXDOO\EHKDYHLQVSHFLILFSODFHVDQGVLWXDWLRQVDQGKRZWRGHWHFWLQDEHVW

ZD\VXVSLFLRXVEHKDYLRUZKLFKGLIIHUVIURPWKHQRUP:KHQWKH\GHWHFWVXFK

EHKDYLRU WKH RIILFHUV PXVW DFW LQ D FHUWDLQ ZD\ IRU H[DPSOH UHIHU WR WKH

VXVSHFWLQDFDUHIXOLQIRUPDOZD\ZLWKRXWXVHRIIRUPDOSROLFHSRZHUV7KH

SURJUDPLQFOXGHVWKHRUHWLFDOSUDFWLFDODQGMREWUDLQLQJ6'5LVQRZDSSOLHG

at Schiphol airport and in various units of the Dutch police.

In the United Kingdom, police training is conducted under the Behavior

$VVHVVPHQW6FUHHQLQJ6\VWHP %$66 7KHV\VWHPZDVFUHDWHGE\0DVVD

chusetts State Police in the United States and adapted for use by the British Transport Police. The training is based on profiling of the behavior of people ZKRDUHXQGHUVWUHVVDWDLUSRUWVDQGWUDQVSRUWKXEV0DVVDFKXVHWWV6WDWH3R

OLFHDORQJZLWKFULPLQRORJLVWVKDVUHYLHZHGWKHUHFRUGLQJVRIWKHKLMDFNHUV

in the September 11 attacks, departing from Boston’s Logan International Airport and arriving at the airport before the attacks. They created a set of cri WHULDZLWKZKLFKLWLVSRVVLEOHWRLGHQWLI\WKHEHKDYLRURISHRSOHXQGHUVWUHVV

21 Security…, op. cit.

(12)

LQWKHFURZGZKHQFKHFNLQJLQDWWKHDLUSRUWRUGXULQJVHFXULW\FKHFN7KHVH

criteria have been adapted to British conditions using information gathered from the 7 July bomb attacks on the London Underground. The mandatory WUDLQLQJRI%$66SDVVHGDOOWKHRIILFHUVRI%ULWLVK7UDQVSRUW3ROLFHZRUNLQJ

LQWKH/RQGRQ8QGHUJURXQGDQGLWLVQRZDOVRDSSOLHGWRRIILFHUVZRUNLQJRQ

WKHUDLOURDGDFURVVWKHFRXQWU\7KHWZRGD\FRXUVHLQFOXGHVOHFWXUHVGLVFXV

VLRQVDQGSUDFWLFDOH[HUFLVHVERWKLQFODVVDVZHOODVLQWKHWUDQVSRUWKXEV

The training emphasizes that there is no racial or religious profile of terrorist, because the attacks are carried out by the people of all ethnic groups.22

,Q3RODQGWKH\HDUEURXJKWFKDQJHVWRWKH3ROLVK$YLDWLRQ/DZ1HZ

legislation is being adapted to the requirements of the European Union and LQWURGXFHVDFRKHUHQWV\VWHPRIFLYLODYLDWLRQVHFXULW\$FFRUGLQJWRQHZUHF

ommendations, security control at airports is to be conducted by private se FXULW\FRPSDQLHVZRUNLQJDV$LUSRUW6HFXULW\6HUYLFH 62/ DQGQRORQJHU

KDVWREHGRQHE\3ROLVK%RUGHU*XDUGDVLWZDVEHIRUH62/ZLOOWDNHVXFK

WDVNVDVFRQWUROOLQJSHRSOHDQGOXJJDJH7KHGXWLHVZLOOLQFOXGHSURYLGLQJ

security at the airport, among others by observing passengers and searching LQ D FURZG IRU WKRVH SHRSOH ZKR EHKDYH LQ D VXVSLFLRXV PDQQHU QDPHO\

WKURXJKWKHXVHRIEHKDYLRUDODQDO\VLVWHFKQLTXHVWKDWKDYHZRUNHGVRIDULQ

many countries.23

,QWKLVZD\VFLHQFHFDQKHOSWRSUHGLFWSUHYHQWSUHSDUHIRUDQGUDLVHDIWHU

a terrorist attack24DQGDOVRWRXQGHUVWDQGWKHFDXVHVRIWHUURULVPDQGKRZWR

resist it.25 The introduced amendments are aimed at improving aviation safety and streamlining the process of airport management.

22 3RGQLHVLHQLHVNXWHF]QRĞFLG]LDáDĔSROLFML5R]XPLHQLHG\VNU\PLQXMąFHJRSURILORZDQLDHW- QLF]QHJRL]DSRELHJDQLHPXSU]HZRGQLN5DSRUW$JHQFML3UDZ3RGVWDZRZ\FK8QLL(XURSHM

VNLHM8U]ąG3XEOLNDFML8QLL(XURSHMVNLHM/XNVHPEXUJ

233U]\V]áRĞüEH]SLHF]HĔVWZDORWQLVNZ3ROVFH-DNEĊG]LHZ\JOąGDáDSUDFD$JHQFML2FKURQ\", Ä6DIHW\DQG6HFXULW\´QUV

24 &RPEDWLQJ7HUURULVP5HVHDUFK3ULRULWLHVLQWKH6RFLDO%HKDYLRUDODQG(FRQRPLF6FLHQFHV, Raport NSTC, Washington 2005.

25 P.E. Rubin, %HKDYLRUDO6FLHQFHDQG6HFXULW\UHIHUDWZ\JáRV]RQ\SU]HG6XEFRPPLWWHHRQ

Investigations and Oversight Committee on Science, Space, and Technology, U.S. House of Representatives 2011.

(13)

%LEOLRJUDSK\

%HKDYLRU'HWHFWLRQ2IILFHUV %'2 /D\HUVRI6HFXULW\>Z@KWWSZZZWVD

JRY GDWDRGF]\WX 

&LDUDPHOOD&-,VS\ZLWKP\OLWWOHH\H76$UROOLQJRXWQHZµEHKDYLRU

GHWHFWLRQRIILFHUV¶>Z@KWWSGDLO\FDOOHUFRP GDWDRGF]\WX 

&RPEDWLQJ7HUURULVP5HVHDUFK3ULRULWLHVLQWKH6RFLDO%HKDYLRUDODQG(FR- nomic Sciences, Raport NSTC, Washington 2005.

&XUUHQW3URMHFWV>Z@KWWSZZZSDXOHNPDQFRP GDWDRGF]\WX  Czapska, J., %H]SLHF]HĔVWZR RE\ZDWHOL 6WXGLXP ] ]DNUHVX SROLW\NL SUDZD,

3ROSUHVV.UDNyZ

'HFHSWLRQ'HWHFWLRQ>Z@KWWSZZZGKVJRY GDWDRGF]\WX  Ekman, P., 6HOI'HFHSWLRQ$QG'HWHFWLRQ2I0LVLQIRUPDWLRQ>Z@6HOI'H-

FHSWLRQ$Q$GDSWLYH 0HFKDQLVP" UHG  -6 /RFNKDUG '/ 3DXOKXV

3UHQWLFH+DOO(QJOHZRRG&OLIIV1-V

Ekman, P., 7HOOLQJ/LHV&OXHVWRGHFHLWLQWKHPDUNHWSODFHSROLWLFVDQGPDU- riage::1RUWRQ &RPSDQ\1HZ<RUN/RQGRQ

)$&(7UDLQLQJ>Z@KWWSZZZSDXOHNPDQFRP GDWDRGF]\WX  Froncisz, W., -DNZ\NU\üNáDPVWZRF]\SUDZGRPyZQRĞüSRGJOąGDMąFPy]J,

Ä:V]HFKĞZLDW´QUV

Kurcz, I., -Ċ]\NLNRPXQLNDFMD>Z@3V\FKRORJLD3RGUĊF]QLNDNDGHPLFNL W, UHG -6WUHODX*:3*GDĔVNV

3RGQLHVLHQLH VNXWHF]QRĞFL G]LDáDĔ SROLFML 5R]XPLHQLH G\VNU\PLQXMąFHJR

SURILORZDQLDHWQLF]QHJRL]DSRELHJDQLHPXSU]HZRGQLN. Raport Agencji 3UDZ 3RGVWDZRZ\FK 8QLL (XURSHMVNLHM 8U]ąG 3XEOLNDFML 8QLL (XURSH

jskiej, Luksemburg 2010.

Privacy Impact Assessment Update for the Future Attribute Screening Tech

QRORJ\ )$67 3DVVLYH 0HWKRGV IRU 3UHFLVLRQ %HKDYLRUDO 6FUHHQLQJ

'+66 73,$ D 'HFHPEHU

3U]\V]áRĞü EH]SLHF]HĔVWZD ORWQLVN Z 3ROVFH -DN EĊG]LH Z\JOąGDáD SUDFD

$JHQFML2FKURQ\"Ä6DIHW\DQG6HFXULW\´QUV

Rubin, P.E., %HKDYLRUDO6FLHQFHDQG6HFXULW\UHIHUDWZ\JáRV]RQ\SU]HG6XE

(14)

committee on Investigations and Oversight Committee on Science, Space, and Technology, U.S. House of Representatives 2011.

6HFXULW\RI$LUFUDIWLQWKH)XWXUH(XURSHDQ(QYLURQPHQW>Z@KWWSZZZ

VDIHHUHDGLQJDFXN GDWDRGF]\WX 

7VLDP\UW]LV3'RZGDOO-6KDVWUL'3DYOLGLV,7)UDQN0*(NPDQ

P., ,PDJLQJ)DFLDO3K\VLRORJ\IRUWKH'HWHFWLRQRI'HFHLW, „International -RXUQDORI&RPSXWHU9LVLRQ´QU  V

Weinberger, S., $LUSRUWVHFXULW\,QWHQWWRGHFHLYH" „Nature”, 2010, nr 465, V

Wypler, W., $NWXDOQHWUHQG\ZSV\FKRORJLF]Q\FKEDGDQLDFKQDGNáDPVWZHP

>Z@ 3URILODNW\ND VSRáHF]QD L UHVRFMDOL]DFMD UHG  - .ZDĞQLHZVNL

:\GDZQLFWZR,36L58::DUV]DZDV

Cytaty

Powiązane dokumenty

[r]

2) bo jednoznacznie odpowiada na często dziś stawiane pytanie: czy kryzys w UE już się skoń­ czył? Nie, kryzys ani w UE, ani w Europie się nie skończył - i nigdy się nie

wektor k p  zaś zbiorem sił  wystę pują cych w wę zł ach superelementu wywoł anych sił ami zewnę trznymi. M oim zdaniem , powyż sze okreś

Świadczą o tym wymownie wpisane do jego indeksu, z czasem jednak skreślone i niepotwierdzone podpisem prowadzących, zajęcia z zakresu filologii polskiej (m.in. kontynuacja

fueros exclusivos, la aplicabilidad del resto de criterios de competencia de- pende de la autonomía de la voluntad de las partes. Éstas pueden o no pac- tar una cláusula de

Opowieści dotyczyły problematycznego terminu „modernizm”, ale nieubłaganie doprowadziły nas do sieci słów – „modernizm” [modernism] i jego rodzeństwa:

O m aw iane są kom petencje poszczególnych nauk religiologicznych do zajm ow ania się kw estią praw dziw ości religii, i to nie tylko chrześcijaństw a, ale także

Studia doktoranckie odbyła w Instytucie Studiów Politycznych Polskiej Akademii Nauk w Warszawie oraz na Wydziale Nauk Społecznych Uniwersytetu Śląskiego w Katowicach.