0DOZLQD'DQNLHZLF]0D
,QVWLWXWHRI3V\FKRORJ\'HSDUWPHQWRI%HKDYLRXUDO6FLHQFHV
RIWKH-DJLHOORQLDQ8QLYHUVLW\
0HWKRGVRIGHWHFWLQJSRWHQWLDOWHUURULVWV
at airports
Abstract:
,QUHFHQW\HDUVWKHLQWHUHVWWRLPSURYHWKHUHOLDELOLW\RIGHFHSWLRQDQGKRVWLOH
LQWHQWLRQVGHWHFWLRQWHFKQLTXHVLVUHODWHGWRWKHQHHGRILQFUHDVLQJWKHVDIHW\
RIFLWL]HQVWKUHDWHQHGZLWKWHUURULVWDWWDFNV,QSDUWLFXODUWKH8QLWHG6WDWHV
JRYHUQPHQWWKURXJKLWVVHFXULW\DJHQFLHVLVORRNLQJIRUDQGILQDQFLQJUHVH- DUFKRQPRGHUQOLHGHWHFWLRQWHFKQLTXHV
7KHUHDUHGLIIHUHQWRSLQLRQVRQZKHWKHUZHFDQGHWHUPLQHZKRLVSODQQLQJ
DKRVWLOHDFWPHUHO\E\REVHUYLQJEHKDYLRU6RPHUHVHDUFKHUVDUHFRQYLQFHG
WKDWVFLHQWLILFPHWKRGVRIGHWHFWLQJKRVWLOHLQWHQWLRQVDPRQJRWKHUVE\GHWHF- WLQJGHFHSWLRQFDQKHOSWRFDWFKWHUURULVWVDQGSURYLGHVHFXULW\7KLVDUWLFOH
IRFXVHVRQEHKDYLRUDOPHWKRGVRIGHWHFWLQJSRWHQWLDOWHUURULVWV
Key words:7HUURULVWVDIHW\GHWHFWLRQFULPHDWWDFN
Rising crime and a high risk of terrorist attacks cause that predicting ag JUHVVLYH EHKDYLRU QRZDGD\V LV WKH DELOLW\ WKDW FDQ QRW EH XQGHUHVWLPDWHG
DQGLGHQWLI\LQJLQGLYLGXDOVZKRYHU\OLNHO\FRXOGKDYHKRVWLOHLQWHQWLRQVKDV
become a necessity. In order to protect the security of citizens, including the requirement of eliminating direct attacks on life, health or property of indi viduals, the methods based on scientific research are applied.2
1 W. Froncisz, -DNZ\NU\üNáDPVWZRF]\SUDZGRPyZQRĞüSRGJOąGDMąFPy]JÄ:V]HFKĞZLDW´
QUV
2 J. Czapska, %H]SLHF]HĔVWZRRE\ZDWHOL6WXGLXP]]DNUHVXSROLW\NLSUDZD3ROSUHVV.UDNyZ
2004, s. 32.
Systems used at airports are the examples of utilizing research findings to predict aggressive behavior: methods of detecting potential terrorists, based on the analysis of behavior, emotions visible on faces, and physiological in
dicators.
In recent years the interest to improve the reliability of deception and hos
tile intentions detection techniques is related to the need of increasing the VDIHW\RIFLWL]HQVWKUHDWHQHGZLWKWHUURULVWDWWDFNV,QSDUWLFXODUWKH8QLWHG
States government through its security agencies is looking for and financing research on modern lie detection techniques.3
7KHUHDUHGLIIHUHQWRSLQLRQVRQZKHWKHUZHFDQGHWHUPLQHZKRLVSODQ
ning a hostile act, merely by observing behavior. Some researchers are con vinced that scientific methods of detecting hostile intentions, among others by detecting deception, can help to catch terrorists and provide security. This article focuses on behavioral methods of detecting potential terrorists.
)$&6V\VWHP
In 1978, Ekman and colleagues developed the Facial Action Coding Sys
WHP)$&6ZKLFKVXSSRUWHGE\PHDVXUHPHQWVRIYRLFHDQGVSHHFKDOORZV
to increase the accuracy of lie detection (lying defined as “a deliberate choice WRPLVOHDGDWDUJHWZLWKRXWJLYLQJDQ\QRWLILFDWLRQRIWKHLQWHQWWRGRVR´4
to 90%.
FACS is a method of describing and measuring facial behavior, based on REVHUYDEOHFRPSRQHQWVRIIDFLDOPRYHPHQWFDOOHGDFWLRQXQLWV$8DQGWKH
combinations of action units are forming a facial expression. FACS describes the contraction of various muscles, leading to different facial expressions by ZKLFKZHDUHDEOHWRUHFRJQL]HHPRWLRQV,QYROXQWDU\IDFLDOH[SUHVVLRQVPL
FURH[SUHVVLRQVDUHEULHIWKH\ODVWOHVVWKDQRQHVHFRQGDQGDUHFKDUDFWHU
3 W. Froncisz, -DNZ\NU\üNáDPVWZRF]\SUDZGRPyZQRĞüSRGJOąGDMąFPy]JÄ:V]HFKĞZLDW´
QUV
4 P. Ekman, 6HOI'HFHSWLRQ$QG'HWHFWLRQ2I0LVLQIRUPDWLRQ>Z@6HOI'HFHSWLRQ$Q$GDS- WLYH 0HFKDQLVP" UHG -6 /RFNKDUG '/ 3DXOKXV 3UHQWLFH+DOO (QJOHZRRG &OLIIV 1-
1988, s. 230.
istic for experiencing one of the seven basic, universal emotions: anger, fear, disgust, contempt, sadness, surprise or happiness. Microexpressions are evo lutionarily acquired reactions occurring in the entire human species, regard
less of socialization, culture and age. In the course of socialization, people learn to control their facial expressions, and therefore it is possible to pretend H[SHULHQFLQJVSHFLILFHPRWLRQV+RZHYHUHYHQZLWKDQDELOLW\WRFRQWURODQ\
facial expressions, the current emotional state is revealed by other nonverbal messages, more difficult to control consciously.5 A number of studies indicate WKDWDOVRLPSRUWDQWLVWKHDSSHDUDQFHRIH\HVHVSHFLDOO\WKHSXSLOODU\UHIOH[
ZKROHERG\SRVWXUHZD\RIVSHDNLQJWRQHRIYRLFHDQGVSHDNLQJUDWHVSD
tial behavior and keeping personal distance.6 In addition, the first reaction of WKHIDFHZKLFKODWHUFDQEHPDVNHGIRUH[DPSOHE\SXWWLQJRQDIDNHVPLOHLV
XVXDOO\UHDO,QWHQWLRQDOIDNHH[SUHVVLRQVGLIIHUIURPWKHVSRQWDQHRXVRQHV
fake expressions are usually held for too long, moreover it is not possible to FRQWURODOOWKHPXVFOHVDVVRFLDWHGZLWKVSHFLILFIDFLDOH[SUHVVLRQV7
(NPDQKROGVWRDYLHZWKDWQRQYHUEDOLQGLFDWRUVDUHWKHPRVWDFFXUDWHDQG
promising indicators of lies, in terms of possible practical applications. He FRQFOXGHVEDVLQJRQWKHUHVXOWVRIKLVRZQUHVHDUFKWKDWSHRSOHRYHUO\UHO\
on verbal communication and are inclined to ignore or misinterpret the most explicit mimic, movement and voice indicators. The researcher also proves that training in recognizing nonverbal indicators of deception, described by him, improves the accuracy in identifying lies. Another argument in favor of this position by Ekman are the contradictions in reports of research on verbal LQGLFDWRUVRIOLHIRUH[DPSOHLWDSSHDUVWKDWWKHDQVZHUVJLYHQRQO\E\VRPH
people are indirect, evasive, and contain more information than the question required. Microexpressions are used to detect lies, and it makes possible to detect hostile intentions of the other person. To facilitate this process, Ekman suggests using a tool such as FACS, to enable assessment of facial expres
5 P. Ekman, 7HOOLQJ/LHV&OXHVWRGHFHLWLQWKHPDUNHWSODFHSROLWLFVDQGPDUULDJH, W. W.
1RUWRQ &RPSDQ\1HZ<RUN/RQGRQ
6 I. Kurcz, -Ċ]\NLNRPXQLNDFMD>Z@3V\FKRORJLD3RGUĊF]QLNDNDGHPLFNL WUHG-6WUHODX
*:3*GDĔVNV
7 P. Ekman, Telling…, op. cit.
sion, but mastering it requires a lot of time. Facial Action Coding System, ZKLFKKDVVRIDUEHHQXVHGPDLQO\LQODERUDWRU\WHVWVSURYHGWREHDUHOLDEOH
and effective method of detecting lies, because the ability to detect microex
SUHVVLRQVLVSRVLWLYHO\FRUUHODWHGZLWKWKHDELOLW\WRGHWHFWOLHV8
Recognizing signs of emotion on the face can be trained through a de
signed by Ekman computer program called F.A.C.E. Training. The program LV FRPSRVHG RI WZR W\SHV RI WUDLQLQJ 0(77 0LFUR ([SUHVVLRQ7UDLQLQJ
7RRODQG6(777KH6XEWOH([SUHVVLRQ7UDLQLQJ7RRO)$&(7UDLQLQJ
KDVEHHQVFLHQWLILFDOO\SURYHQDQGILHOGWHVWHGDQGLVQRZWKHEDVLVRIDQHZ
WHOHYLVLRQVKRZRQ)R[79/LH7R0HRIZKLFK'U3DXO(NPDQLVWKHVFL
entific consultant.9
(NPDQLVFXUUHQWO\ZRUNLQJRQWKHSURMHFWRIQHZPHWKRGVIRUUDSLGDQG
PDVVLGHQWLILFDWLRQRISHRSOHZKRVHIDFLDOH[SUHVVLRQVDQGSK\VLRORJLFDOFRU
UHODWHVRIHPRWLRQVPD\VKRZGHFHSWLRQRUKRVWLOHLQWHQWLRQV+HFRQWLQXHV
WRZRUNRQWKHLGHQWLILFDWLRQRIIDFLDOH[SUHVVLRQVRILPPHGLDWHGHDGO\LQ
WHQWFRYHULQJERWKSUHPHGLWDWHGDQGORVVRIFRQWURODWWDFNV7KHVWXG\ZLOO
LQFOXGHSHUVRQVZKRKDYHUHFHQWO\VXUYLYHGDSK\VLFDODVVDXOWWRUHVWRUHWKH
H[SUHVVLRQWKH\VDZRQWKHIDFHRIWKHSHUSHWUDWRU7KHSURMHFWLVFDOOHG'
FXEH'DQJHURXV'HPHDQRU'HWHFWRUDQGLVGHVLJQHGWRGHYHORSWKHVNLOOVLQ
detecting the subtle signs of aggression.10
Ekman’s recent scientific research is also focused on imaging facial physi ology as a method of detecting changes in the level of stress. He and his col
leagues conducted a study to prove the accuracy of estimates of the computer V\VWHPZKLFKXVHV DWKHUPDOFDPHUDPRQLWRULQJWKHUHDOWLPHFKDQJHVLQ
EORRGIORZLQWKHRUELWDOPXVFOHVSRLQWHGRXWFRUUHFWO\LQRISDUWLFL
SDQWVH[SHULHQFLQJWHQVLRQO\LQJRUQRWH[SHULHQFLQJWHQVLRQWUXWKWHOOLQJ
5HVHDUFKHUVEHOLHYHWKDWWKLVLVDUHVXOWZKLFKRSHQVZD\IRUWKHDXWRPDWHG
GHWHFWLRQRIGHFHLWLQQDWXUDOFRQGLWLRQVZKLFKLVWKHQHHGLQFUHDVLQJO\EHLQJ
8 W. Wypler,$NWXDOQHWUHQG\ZSV\FKRORJLF]Q\FKEDGDQLDFKQDGNáDPVWZHP>Z@3URILODNW\ND
VSRáHF]QDLUHVRFMDOL]DFMDUHG-.ZDĞQLHZVNL:\GDZQLFWZR,36L58::DUV]DZD
V
9)$&(7UDLQLQJ>Z@KWWSZZZSDXOHNPDQFRPGDWDRGF]\WX
10&XUUHQW3URMHFWV>Z@KWWSZZZSDXOHNPDQFRPGDWDRGF]\WX
declared from the security systems industry. The threat of terrorist attacks IRUFHVWKHXVHRIQHZVROXWLRQVWHFKQRORJLFDOO\DGYDQFHGV\VWHPVIRUTXLFN
efficient and massive monitoring of human behavior and physiology, in order WRGHWHFWFKDQJHVLQWKHOHYHORIDURXVDODVZHOODVHYDOXDWLQJLQUHDOWLPHWKH
risk of dangerous behavior, such as terrorist acts.11
)DFLDO$FWLRQ&RGLQJ6\VWHP)$&6XQGHUOLHVWKHWHFKQRORJ\XVHGE\
RIILFHUVZRUNLQJDW$PHULFDQDLUSRUWVXQGHUWKHSURJUDPLPSOHPHQWHGE\(N
man to detect suspicious passengers. The program is called SPOT (Screening 3DVVHQJHUVE\2EVHUYDWLRQ7HFKQLTXHVDQGLVEDVHGRQWUDLQLQJLQREVHUYD
tion skills to help them identify passengers at an early stage.
6327SURJUDP
$WDLUSRUWVLQWKH8QLWHG6WDWHVWKHUHDUHZRUNLQJDERXWRI%H
KDYLRXU'HWHFWLRQ2IILFHUV%'2V7KH\DUHHPSOR\HHVRI7UDQVSRUWDWLRQ
6HFXULW\$GPLQLVWUDWLRQ76$ZKLFKLVEUDQFKRI'HSDUWPHQWRI+RPHODQG
6HFXULW\'+6JRYHUQPHQWDJHQF\ZDWFKLQJRYHUWKHVDIHW\RIWKHWUDYHOLQJ
FLWL]HQVLQWKH8QLWHG6WDWHV%'2VDUHSDUWRIDIRXU\HDUROGSURJUDPFDOOHG
6FUHHQLQJ3DVVHQJHUVE\2EVHUYDWLRQ7HFKQLTXH6327ZKLFKLVGHVLJQHG
WRLGHQWLI\SHRSOHZKRFRXOGSRVHDWKUHDWWRDLUOLQHSDVVHQJHUV7KHSURJUDP
utilizes noninvasive behavior observation and behavioral analysis techniques WR LGHQWLI\ SRWHQWLDOO\ KLJKULVN SDVVHQJHUV %'2 RIILFHUV DUH LQWHQGHG WR
detect persons exhibiting behavior that indicates that they may constitute a threat to aviation and air transport security.
The program is a derivative of other successful behavioral analysis pro JUDPVZKLFKKDYHEHHQLPSOHPHQWHGE\ODZHQIRUFHPHQWDQGVHFXULW\SHU
VRQQHOERWKLQWKH86DQGDURXQGWKHZRUOG76$¶V%'2WUDLQHGVHFXULW\
officers are screening travelers for involuntary physical and physiological UHDFWLRQVZKLFKSHRSOHH[KLELWLQUHVSRQVHWRIHDURIEHLQJGLVFRYHUHG0DQL
festation of some of these behaviors does not automatically mean that an in
1137VLDP\UW]LV-'RZGDOO'6KDVWUL,73DYOLGLV0*)UDQN3(NPDQ,PDJLQJ)DFLDO
3K\VLRORJ\IRUWKH'HWHFWLRQRI'HFHLW, „International Journal of Computer Vision”, 2007, nr
V
GLYLGXDOKDVWHUURULVWRUFULPLQDOLQWHQWEXWWKLVNQRZOHGJHKHOSVWRGHWHUPLQH
ZKHWKHUDSHUVRQSUHVHQWVDKLJKHUULVNRUZKHWKHUWKHREVHUYHGEHKDYLRUKDV
a nonthreatening origin.12
BDO officers are trained to detect suspicious or unusual behavior in pas VHQJHUVWKH\GHWHUPLQHZKHWKHUWKHSDVVHQJHUVDUHDWKUHDWEDVLQJRQWKHLU
responses to a set of routine questions. Security officers ask three to four questions (e.g., „Where have you been?”, „Where are you traveling?”, „What LVWKHSXUSRVHRI\RXUWULS"´Ä'R\RXKDYHDEXVLQHVVFDUG"´ZKLOHORRN
ing for minute facial cues that may indicate deception or malicious intent.
The primary responsibility of the BDO officers is to observe the behavior of passengers going through the security checkpoint.13 Individuals exhibiting specific observable behaviors may be referred for additional screening at the FKHFNSRLQWLQFOXGLQJSHUVRQDODQGRQH¶VFDUU\RQEDJJDJHSK\VLFDOLQVSHF
tion. Referrals are based on specific observed behaviors only, not on one’s appearance, race, ethnicity or religion.
BDO officers add an element of unpredictability to the security screening SURFHVVZKLFKLVHDV\IRUSDVVHQJHUVWRQDYLJDWHEXWGLIILFXOWWRPDQLSXODWHE\
terrorists. It serves as an important additional level of security in the airport environment, requires no additional specialized screening equipment, can be easily deployed to other modes of transportation and presents yet another challenge the terrorists need to overcome in attempt to defeat the security system.
To 2011 Ekman has taught about 1,000 BDO experts and continues to consult on the program. The methodology used in SPOT has never been sub
jected to controlled scientific tests, because neither Ekman nor TSA have disclosed the specific cues used to identify potential threats, citing security reasons. Ekman has largely stopped publishing, not to provide any help to terrorists trying to cheat the system.
12%HKDYLRU'HWHFWLRQ2IILFHUV%'2/D\HUVRI6HFXULW\>Z@KWWSZZZWVDJRYGDWDRGF
]\WX
13&-&LDUDPHOOD,VS\ZLWKP\OLWWOHH\H76$UROOLQJRXWQHZµEHKDYLRUGHWHFWLRQ
RIILFHUV¶>Z@KWWSGDLO\FDOOHUFRPGDWDRGF]\WX
Evidence of the SPOT program effectiveness provides statistics: in the first phase of the program, from January 2006 to November 2009, according WRWKH76$DJHQF\EHKDYLRXUGHWHFWLRQRIILFHUVUHIHUUHGPRUHWKDQ
SHRSOHIRUUHLQVSHFWLRQZKLFKLQYROYHVFORVHUFRQWURORIEDJVDQGWHVWLQJIRU
explosives. The vast majority of those subjected to another inspection contin
XHGRQWKHLUWUDYHOVZLWKQRIXUWKHUGHOD\VEXWZHUHDUUHVWHG14
Similar safety programs are implemented in many other airports around WKHZRUOG$W+HDWKURZ$LUSRUWLQ/RQGRQWKH%ULWLVKJRYHUQPHQWLVLP
plementing behavior detection officers in a program modeled in part on the 6327ZKLOH'HSDUWPHQWRI+RPHODQG6HFXULW\LQWKH8QLWHG6WDWHVOHDGV
WKH)$67SURJUDPZKLFKXVHVVHQVRUVWRORRNDWQRQYHUEDOEHKDYLRUDQG
WKHUHE\GHWHFWVWKHSRWHQWLDOWHUURULVWVZDONLQJGRZQWKHKDOO8QLWHG6WDWHV
'HSDUWPHQWRI'HIHQVH'2'DQGLQWHOOLJHQFHDJHQFLHVKDYHH[SUHVVHGLQ
terest in similar programs.15
)$67WHFKQLTXH
76$6327SURJUDPZDVLQLWVILUVW\HDUZKHQWKH6FLHQFHDQG7HFKQRO
ogy Directorate of the U.S. Department of Homeland Security began search LQJIRUQHZPHWKRGVDQGVWDUWHGWRVSRQVRUUHVHDUFKDLPHGDWGHYHORSLQJDQG
testing tools and methodologies for identifying and assessing potential threat GHFHSWLRQ DQG KRVWLOH LQWHQW LQ UHDO WLPH RQ WKH VSRW DQG QRQLQYDVLYHO\
and at better understanding of the phenomenon of terrorism, improving na tional security, and accelerating movement of people through checkpoints.
7KLVWHFKQRORJ\ZRXOGEHVLPLODUWRRUH[FHHGLQJWKHFDSDELOLWLHVRISUHVHQW
VFUHHQLQJWHFKQLTXHVZLWKRXWLPSHGLQJWKHIORZRIWUDYHOHUV
Achieved in effect is the FAST technique (Future Attribute Screening 7HFKQRORJ\GHYHORSHGXQGHUWKH'+6SURJUDPFDOOHG6RFLDODQG%HKDY
LRUDO5HVHDUFK6%5LQDGGLWLRQWRSUHYLRXVO\XVHGPHWKRGVRIVFUHHQLQJ
14 S. Weinberger, $LUSRUWVHFXULW\,QWHQWWRGHFHLYH"Ä1DWXUH´QUV
415.
15 S. Weinberger, $LUSRUW«RSFLWV
such as SPOT. It consists in the fact that passengers passing through a secu
rity gate are monitored in terms of nonverbal signals of intent to harm oth ers. This technology is designed to catch suspicious behavior, and thereby SRWHQWLDOWHUURULVWVZLWKFDPHUDVDQGVHQVRUVPHDVXULQJVXEWOHSK\VLRORJLF
changes that can be assessed remotely and in real time, including eye move
PHQWZLGWKRIWKHSXSLOKHDUWUDWHVNLQHOHFWULFDOUHVLVWDQFHUHVSLUDWLRQUDWH
VZHDWLQJDQGSRVVLEO\EUDLQVFDQVZKLOHDSDVVHQJHULVDVNHGDVHULHVRIVSH
FLILFTXHVWLRQV)$67DOVRGUDZVDWWHQWLRQWRYLVXDOVLJQDOVVXFKDVEOLQNLQJ
UDWHDQGERG\PRYHPHQWVUHVWOHVVEHKDYLRU7KHSURFHGXUHVDQGWHFKQROR
gies necessary to receive these signals, are noninvasive and easy to integrate LQWRFURZGHGRSHUDWLQJDUHDVXFKDVDLUSRUWV,QDGGLWLRQWRGHWHFWLQJVLJQDOV
RIKRVWLOHLQWHQWLRQVXQGHUWKHSURJUDPZDVFRQGXFWHGUHVHDUFKRQWKHSRVVL
bility of automating this process using sensors and detection algorithms, and LQWHJUDWLQJWKHV\VWHPZLWKRWKHUWHFKQRORJLHVDLPHGDWLGHQWLI\LQJLQGLYLGX
DOVZKRSRVHDWKUHDWWR8QLWHG6WDWHVDYLDWLRQVXFKDVELRPHWULFWRROVDQG
databases.16
7KH GHYLFH MXVW DV WHFKQRORJ\ 3UH&ULPH LQ WKH PRYLH Ä0LQRULW\ 5H
port”, is designed to read the intentions of potential terrorists, for example DWDLUSRUWV,WUHPLQGVSRO\JUDSKEXWWKHUHLVQRQHHGRIGLUHFWFRQWDFWZLWK
DSRWHQWLDOSHUSHWUDWRU±)$67¶VVHQVRUVGRQRWFRPHLQGLUHFWFRQWDFWZLWK
monitored individual, and their action does not depend on direct questioning.
&RQWDFWVHQVRUVZHUHUHSODFHGZLWKVWDQGRIIV\VWHPVRSWLFDOVHQVRUVDQG
UDGDUVVXFKDVLQIUDUHGFDPHUDVWRPHDVXUHVXEWOHFKDQJHVLQIDFLDOWHPSHUD
ture and BioLIDAR, a laser radar that measures heart rate and respiration.
7KDWDOORZVWKHDVVHVVPHQWRIWUDYHOHUVZDONLQJGRZQWKHKDOOVWDQGLQJLQ
line, or passing through the control gate.
$FFRUGLQJWR'+6WKHGHYLFHZRUNHGSURSHUO\LQSHUFHQWSHUFHQW
ZHUHIDOVHDODUPV7KLVUHVXOWLVPXFKKLJKHUWKDQUDQGRPDQGDOVRKLJKHU
than those achieved by specially trained persons. Daniel and Jennifer Mar
tin’s malintent theory underlying the FAST technique is based on the assump tion derived from the behavioral sciences, that the hostile intentions translate
16'HFHSWLRQ'HWHFWLRQ>Z@KWWSZZZGKVJRYGDWDRGF]\WX
into specific physiological responses and behavior. Scientists have proven WKHUHODWLRQVKLSEHWZHHQSV\FKRSK\VLRORJLFDOLQGLFDWRUVDQGLQWHQWLRQV7KH
VWXG\FRQVLVWHGRI$UDELFVSHDNLQJPHQDQGOHGWRWKHFRQFOXVLRQWKDW
WKHUHLVDUHODWLRQVKLSEHWZHHQWKHLQWHQWWRGHFHLYHDQGKHDUWUDWHYDULDELOLW\
NQRZQDVUHVSLUDWRU\VLQXVDUUK\WKPLD56$17
7KH)$67SURMHFWFRQVLVWVRIWZRHOHPHQWVILUVWQHFHVVDU\DUHWKHPRG
els of hostile intent and deception, focusing on behavioral and verbal cues, DQGVHFRQGDQDXWRPDWHGVXLWHRIQRQLQYDVLYHVHQVRUVDQGDOJRULWKPV,Q
tegrated, these sensors automatically detect and track the input cues to the models. According to the developers of this technology it has the potential to UHYROXWLRQL]HWKHVFUHHQLQJDQGLQWHUYLHZLQJSURFHVVE\VXSSRUWLQJDFFHVV
control for strategic infrastructure, such as airports.18
While existing screening technologies, such as biometrics, offer the po WHQWLDOWRGHWHFWDOUHDG\NQRZQWHUURULVWVWKH)$67WHFKQRORJ\IRFXVHVRQO\
RQUHDOWLPHSV\FKRSK\VLRORJLFDODQGEHKDYLRUDOSDWWHUQVLQDQDWWHPSWWR
VWRSDQXQNQRZQWHUURULVWIURPREWDLQLQJDFFHVVWRKLVGHVLUHGORFDWLRQ6LP
SO\SXWFRPSDULQJWKHEHKDYLRURILQGLYLGXDOVZLWKHVWDEOLVKHGSDWWHUQVRI
behavior, in relation to the situational context and appropriateness of behav
LRUDOORZVWKHSUHGLFWLRQRIKXPDQDFWLRQV7KDWZDVDFKLHYHGWKURXJKPR
bile and multimodal technologies, using behavioral and physiological sensors ZKLFKSURYLGHFXOWXUDOO\QHXWUDOLQGLFDWRUVRIKRVWLOHLQWHQW%\FUHDWLQJWKH
FAST technology, DHS hopes to simplify the control of the airport by us
ing recent advances in the development of screening techniques focused on behavior.19
17 S. Weinberger, $LUSRUW«RSFLWV
18 Deception..., op. cit.
193ULYDF\,PSDFW$VVHVVPHQW8SGDWHIRUWKH)XWXUH$WWULEXWH6FUHHQLQJ7HFKQRORJ\)$67 3DVVLYH0HWKRGVIRU3UHFLVLRQ%HKDYLRUDO6FUHHQLQJ'+66 73,$D'HFHPEHU
2011.
6$)((V\VWHP
The SAFEE system (Security of Aircraft in the Future European Envi
URQPHQWLVDODUJHLQWHJUDWHGSURMHFWGHYHORSHGE\VFLHQWLVWVIURPUHVHDUFK
FHQWHUVLQWKH8.DQG*HUPDQ\ZKLFKDLPVWRUHVWRUHIXOOFRQILGHQFHLQDLU
transport. The vision of this project is to build an advanced system of aviation VDIHW\ZRUNLQJXQGHUWKHWKUHDWRIWHUURULVWDWWDFNRQWKHDLUFUDIW7KHPDLQ
objective of this system is to provide a completely safe flight from departure WRDUULYDOGHVWLQDWLRQZKDWHYHUWKHLGHQWLILHGWKUHDWVDUH7KHEDVLVRIWKH
SURMHFWLVSDVWH[SHULHQFHZKLFKKDVVKRZQWKDWSHRSOHZLWKKRVWLOHLQWHQ
tions may go through the different airport controls and security measures, ac cess an aircraft and initiate a hostile action. Therefore there is a need to secure the plane, as the last barrier of attack.20
7KHSURMHFWLVIRFXVHGRQWKHLPSOHPHQWDWLRQRIDZLGHUDQJHRIRQERDUG
systems detecting threats and providing reliable information about the threat WRWKHIOLJKWFUHZ7KHPRQLWRULQJV\VWHPRIDLUSDVVHQJHUVFDOOHG2QERDUG
Threat Detection System, designed to prevent the abduction of the aircraft, WUDFNVSDVVHQJHUVZLWKPLQLDWXUHFDPHUDVLQVWDOOHGLQHYHU\VHDWLQWKHSODQH
and analyzes their behavior. This technology has to distinguish the ordinary SDVVHQJHUVIURPWKRVHZKRPD\WKUHDWHQRWKHUVDQGWKHPVHOYHV$SSOLHGH\H
EOLQNLQJIUHTXHQF\PRQLWRUVZHUHERUURZHGIURPWKHZRUNRQOLHGHWHFWRUV
increased frequency suggests higher level of stress. Cameras have to con
tinually monitor and record every movement of the passenger, to analyze the H[SUHVVLRQRIWKHIDFHWKHIUHTXHQF\RIEOLQNLQJH\HPRYHPHQWVZHWWLQJWKH
OLSVZLWKWRQJXHDQGHYHQWKHVWDWHRIKDLUPHDQLQJDOOLQGLFDWRUVVXJJHVWLQJ
LQFUHDVHGOHYHORIVWUHVVZKLFKLQWXUQLVLQGLFDWLYHRISDVVHQJHU¶VLQWHQWWR
deceive. In addition to the cameras in the seats, installed microphones might EHLQVWDOOHGZKLFKPD\SLFNXSHYHQVRIWO\VSRNHQZRUGV$QDO\VLVRIHDFK
SDVVHQJHUEHKDYLRUZLOOEHDYDLODEOHWRWKHFUHZDQGZLOOEHDZDUQLQJVLJQDO
of the possibility of a terrorist attack, such that took place on 11 September.
20 6HFXULW\ RI$LUFUDIW LQ WKH )XWXUH (XURSHDQ (QYLURQPHQW >Z@ KWWSZZZVDIHHUHDGLQJ
ac.uk GDWDRGF]\WX
All audio and video materials about the behavior of passengers are to be reset after each flight to protect passenger rights.21
An important aspect of behavior analysis is the issue of avoiding discrimi
natory ethnic profiling, such as recognizing any person of Arab origin as a SRWHQWLDOWHUURULVW3UHVHQWHGEHORZDUHFDVHVWXGLHVRIWUDLQLQJRIIHUHGWRRI
ficers in order to develop their abilities to perceive and analyze suspicious be havior, diverting attention from the characteristics that may refer to prejudice, such as race, ethnicity or religion.
In the Netherlands there is a training program called Search, Detect and 5HDFW6'5FUHDWHGE\,QWHUQDWLRQDO6HFXULW\DQG&RXQWHU7HUURULVP$FDG
emy for Police and Security Entities. The SDR is used as a tool to identify cases of potential violence, disrupting public order, illegal activity and fatal attacks. It is intended to protect public space and mass events and to increase security skills for the analysis of behavior: directs attention to behavior that might require police action, and diverts attention from the immutable char DFWHULVWLFVVXFKDVVNLQFRORU'XULQJWKHWUDLQLQJRIILFHUVOHDUQKRZSHRSOH
XVXDOO\EHKDYHLQVSHFLILFSODFHVDQGVLWXDWLRQVDQGKRZWRGHWHFWLQDEHVW
ZD\VXVSLFLRXVEHKDYLRUZKLFKGLIIHUVIURPWKHQRUP:KHQWKH\GHWHFWVXFK
EHKDYLRU WKH RIILFHUV PXVW DFW LQ D FHUWDLQ ZD\ IRU H[DPSOH UHIHU WR WKH
VXVSHFWLQDFDUHIXOLQIRUPDOZD\ZLWKRXWXVHRIIRUPDOSROLFHSRZHUV7KH
SURJUDPLQFOXGHVWKHRUHWLFDOSUDFWLFDODQGMREWUDLQLQJ6'5LVQRZDSSOLHG
at Schiphol airport and in various units of the Dutch police.
In the United Kingdom, police training is conducted under the Behavior
$VVHVVPHQW6FUHHQLQJ6\VWHP%$667KHV\VWHPZDVFUHDWHGE\0DVVD
chusetts State Police in the United States and adapted for use by the British Transport Police. The training is based on profiling of the behavior of people ZKRDUHXQGHUVWUHVVDWDLUSRUWVDQGWUDQVSRUWKXEV0DVVDFKXVHWWV6WDWH3R
OLFHDORQJZLWKFULPLQRORJLVWVKDVUHYLHZHGWKHUHFRUGLQJVRIWKHKLMDFNHUV
in the September 11 attacks, departing from Boston’s Logan International Airport and arriving at the airport before the attacks. They created a set of cri WHULDZLWKZKLFKLWLVSRVVLEOHWRLGHQWLI\WKHEHKDYLRURISHRSOHXQGHUVWUHVV
21 Security…, op. cit.
LQWKHFURZGZKHQFKHFNLQJLQDWWKHDLUSRUWRUGXULQJVHFXULW\FKHFN7KHVH
criteria have been adapted to British conditions using information gathered from the 7 July bomb attacks on the London Underground. The mandatory WUDLQLQJRI%$66SDVVHGDOOWKHRIILFHUVRI%ULWLVK7UDQVSRUW3ROLFHZRUNLQJ
LQWKH/RQGRQ8QGHUJURXQGDQGLWLVQRZDOVRDSSOLHGWRRIILFHUVZRUNLQJRQ
WKHUDLOURDGDFURVVWKHFRXQWU\7KHWZRGD\FRXUVHLQFOXGHVOHFWXUHVGLVFXV
VLRQVDQGSUDFWLFDOH[HUFLVHVERWKLQFODVVDVZHOODVLQWKHWUDQVSRUWKXEV
The training emphasizes that there is no racial or religious profile of terrorist, because the attacks are carried out by the people of all ethnic groups.22
,Q3RODQGWKH\HDUEURXJKWFKDQJHVWRWKH3ROLVK$YLDWLRQ/DZ1HZ
legislation is being adapted to the requirements of the European Union and LQWURGXFHVDFRKHUHQWV\VWHPRIFLYLODYLDWLRQVHFXULW\$FFRUGLQJWRQHZUHF
ommendations, security control at airports is to be conducted by private se FXULW\FRPSDQLHVZRUNLQJDV$LUSRUW6HFXULW\6HUYLFH62/DQGQRORQJHU
KDVWREHGRQHE\3ROLVK%RUGHU*XDUGDVLWZDVEHIRUH62/ZLOOWDNHVXFK
WDVNVDVFRQWUROOLQJSHRSOHDQGOXJJDJH7KHGXWLHVZLOOLQFOXGHSURYLGLQJ
security at the airport, among others by observing passengers and searching LQ D FURZG IRU WKRVH SHRSOH ZKR EHKDYH LQ D VXVSLFLRXV PDQQHU QDPHO\
WKURXJKWKHXVHRIEHKDYLRUDODQDO\VLVWHFKQLTXHVWKDWKDYHZRUNHGVRIDULQ
many countries.23
,QWKLVZD\VFLHQFHFDQKHOSWRSUHGLFWSUHYHQWSUHSDUHIRUDQGUDLVHDIWHU
a terrorist attack24DQGDOVRWRXQGHUVWDQGWKHFDXVHVRIWHUURULVPDQGKRZWR
resist it.25 The introduced amendments are aimed at improving aviation safety and streamlining the process of airport management.
22 3RGQLHVLHQLHVNXWHF]QRĞFLG]LDáDĔSROLFML5R]XPLHQLHG\VNU\PLQXMąFHJRSURILORZDQLDHW- QLF]QHJRL]DSRELHJDQLHPXSU]HZRGQLN5DSRUW$JHQFML3UDZ3RGVWDZRZ\FK8QLL(XURSHM
VNLHM8U]ąG3XEOLNDFML8QLL(XURSHMVNLHM/XNVHPEXUJ
233U]\V]áRĞüEH]SLHF]HĔVWZDORWQLVNZ3ROVFH-DNEĊG]LHZ\JOąGDáDSUDFD$JHQFML2FKURQ\", Ä6DIHW\DQG6HFXULW\´QUV
24 &RPEDWLQJ7HUURULVP5HVHDUFK3ULRULWLHVLQWKH6RFLDO%HKDYLRUDODQG(FRQRPLF6FLHQFHV, Raport NSTC, Washington 2005.
25 P.E. Rubin, %HKDYLRUDO6FLHQFHDQG6HFXULW\UHIHUDWZ\JáRV]RQ\SU]HG6XEFRPPLWWHHRQ
Investigations and Oversight Committee on Science, Space, and Technology, U.S. House of Representatives 2011.
%LEOLRJUDSK\
%HKDYLRU'HWHFWLRQ2IILFHUV%'2/D\HUVRI6HFXULW\>Z@KWWSZZZWVD
JRYGDWDRGF]\WX
&LDUDPHOOD&-,VS\ZLWKP\OLWWOHH\H76$UROOLQJRXWQHZµEHKDYLRU
GHWHFWLRQRIILFHUV¶>Z@KWWSGDLO\FDOOHUFRPGDWDRGF]\WX
&RPEDWLQJ7HUURULVP5HVHDUFK3ULRULWLHVLQWKH6RFLDO%HKDYLRUDODQG(FR- nomic Sciences, Raport NSTC, Washington 2005.
&XUUHQW3URMHFWV>Z@KWWSZZZSDXOHNPDQFRPGDWDRGF]\WX Czapska, J., %H]SLHF]HĔVWZR RE\ZDWHOL 6WXGLXP ] ]DNUHVX SROLW\NL SUDZD,
3ROSUHVV.UDNyZ
'HFHSWLRQ'HWHFWLRQ>Z@KWWSZZZGKVJRYGDWDRGF]\WX Ekman, P., 6HOI'HFHSWLRQ$QG'HWHFWLRQ2I0LVLQIRUPDWLRQ>Z@6HOI'H-
FHSWLRQ$Q$GDSWLYH 0HFKDQLVP" UHG -6 /RFNKDUG '/ 3DXOKXV
3UHQWLFH+DOO(QJOHZRRG&OLIIV1-V
Ekman, P., 7HOOLQJ/LHV&OXHVWRGHFHLWLQWKHPDUNHWSODFHSROLWLFVDQGPDU- riage::1RUWRQ &RPSDQ\1HZ<RUN/RQGRQ
)$&(7UDLQLQJ>Z@KWWSZZZSDXOHNPDQFRPGDWDRGF]\WX Froncisz, W., -DNZ\NU\üNáDPVWZRF]\SUDZGRPyZQRĞüSRGJOąGDMąFPy]J,
Ä:V]HFKĞZLDW´QUV
Kurcz, I., -Ċ]\NLNRPXQLNDFMD>Z@3V\FKRORJLD3RGUĊF]QLNDNDGHPLFNL W, UHG-6WUHODX*:3*GDĔVNV
3RGQLHVLHQLH VNXWHF]QRĞFL G]LDáDĔ SROLFML 5R]XPLHQLH G\VNU\PLQXMąFHJR
SURILORZDQLDHWQLF]QHJRL]DSRELHJDQLHPXSU]HZRGQLN. Raport Agencji 3UDZ 3RGVWDZRZ\FK 8QLL (XURSHMVNLHM 8U]ąG 3XEOLNDFML 8QLL (XURSH
jskiej, Luksemburg 2010.
Privacy Impact Assessment Update for the Future Attribute Screening Tech
QRORJ\ )$673DVVLYH 0HWKRGV IRU 3UHFLVLRQ %HKDYLRUDO 6FUHHQLQJ
'+66 73,$D'HFHPEHU
3U]\V]áRĞü EH]SLHF]HĔVWZD ORWQLVN Z 3ROVFH -DN EĊG]LH Z\JOąGDáD SUDFD
$JHQFML2FKURQ\"Ä6DIHW\DQG6HFXULW\´QUV
Rubin, P.E., %HKDYLRUDO6FLHQFHDQG6HFXULW\UHIHUDWZ\JáRV]RQ\SU]HG6XE
committee on Investigations and Oversight Committee on Science, Space, and Technology, U.S. House of Representatives 2011.
6HFXULW\RI$LUFUDIWLQWKH)XWXUH(XURSHDQ(QYLURQPHQW>Z@KWWSZZZ
VDIHHUHDGLQJDFXNGDWDRGF]\WX
7VLDP\UW]LV3'RZGDOO-6KDVWUL'3DYOLGLV,7)UDQN0*(NPDQ
P., ,PDJLQJ)DFLDO3K\VLRORJ\IRUWKH'HWHFWLRQRI'HFHLW, „International -RXUQDORI&RPSXWHU9LVLRQ´QUV
Weinberger, S., $LUSRUWVHFXULW\,QWHQWWRGHFHLYH" „Nature”, 2010, nr 465, V
Wypler, W., $NWXDOQHWUHQG\ZSV\FKRORJLF]Q\FKEDGDQLDFKQDGNáDPVWZHP
>Z@ 3URILODNW\ND VSRáHF]QD L UHVRFMDOL]DFMD UHG - .ZDĞQLHZVNL
:\GDZQLFWZR,36L58::DUV]DZDV