SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Qualcomm Incorporated (QCOM) -- Ignore unavailable to you. Want to Upgrade?


To: Uncle Frank who wrote (104715)9/14/2001 8:08:44 AM
From: John Carragher  Read Replies (1) | Respond to of 152472
 
the scary thing here is it may not have stopped them. A lot of the terrorists were living among us for the last year. Had pass ports and no criminal record.
also note security is still not up to where it should be.
Airline employees intentionally breach security
September 14, 2001 Posted: 12:24 AM EDT (0424 GMT)

PHOENIX, Arizona (AP) -- Three Northwest Airlines employees intentionally breached a security checkpoint at
Sky Harbor International Airport in Phoenix as flights resumed Thursday.

Two ground crew employees cleared the checkpoint with a pocketknife and a corkscrew while a pilot passed
without proper identification, airport spokeswoman Suzanne Luber said.

"Once they did that, they turned around and said, 'Hey, look what we did,"' she said. Their point: to show that
security gaps still exist days after terrorist attacks in New York and Washington, she said.

Airport officials evacuated the terminal's north concourse and swept it for dangerous materials. Nothing was
found and the concourse was reopened.

Luber said she did not know what happened to the three employees. "We would ask that nobody intentionally try
to break security," she said.

Airport spokesman David Cavazos said the matter was referred to the Federal Aviation Administration.

A Northwest spokesman didn't immediately return a call Thursday.

Northwest provided limited service for a short time Thursday but it had canceled all flights by the evening, without
providing details.

cnn.com



To: Uncle Frank who wrote (104715)9/14/2001 10:43:24 AM
From: Jon Koplik  Respond to of 152472
 
Text of face-recognition system article.

Published Thursday, Sept. 13, 2001, in the San Jose Mercury News

Anti-terrorist technology seeks funding

BY MATT MARSHALL
Mercury News

We already have technology that may have helped identify the terrorists who hijacked four planes Tuesday. But so far, airport and government authorities haven't expressed much interest in its use -- this week's events may change their minds.

Two public companies and a slew of private companies have developed technology that can match pictures of people taken by security-checkpoint cameras with a database of known criminals. But we're a country vigilant in protecting civil liberties -- which means such cameras aren't used in the relatively light searches at airport security checkpoints.

``There are 30 companies offering this technology,'' says Roger McCarthy, an engineer and chairman of Exponent, a failure-analysis company in Menlo Park. ``And they all need money.''

Start-ups are working on other types of technology, too, but they have drawbacks. Fast Angels Ventures in Los Altos just funded MultiDigit, which has a new fingerprint-identification technology. Iris-scanning technology is also being developed. However, both technologies require time-consuming interaction with passengers, and might prove too burdensome.

The FBI's mug-shot database is much more convenient to access. Storing a face in the form of a mathematical string is a cinch, McCarthy says, and it can be searched almost in real time by a good PC. FBI officials haven't bitten yet on pitches from facial-recognition companies like Viisage, a public company in Littleton, Mass., according to CEO Thomas Colatosti. Neither the FBI nor the CIA would comment.

Critics have resisted introduction of the technology, calling it ``Orwellian.''

At the Super Bowl in Tampa earlier this year, the police tried out a surveillance system based on Viisage software. Cameras scanned every face in the crowd of 75,000 for those that matched its criminal database. The system identified as many as 19 people wanted for crimes, but no arrests were made.

When news leaked, the American Civil Liberties Union and House Majority Leader Dick Armey, R-Texas, led complaints that the ``snooperbowl'' had created a ``virtual lineup'' of innocent Americans.

Concerns about liberty should be respected. However, cameras using this technology don't save pictures of people they scan -- and they don't count how many beers you have at the bar, or detect who you're having the drink with. They only hold the graphic if a certain threshold of recognition is reached, executives and police say.

In defense of efforts to introduce the technology to scan that the area's Oceanfront, Virginia Beach Police Chief A.M. Jacocks Jr. has said, ``When people say it's Big Brother watching you, I like to say it's Big Brother watching out for you.''

Tuesday's events might merit a change of priorities. The facial-recognition software creates a `map' of the face and identifies 80 distinctive points. Like a fingerprint, a face has unique features and distances between eyes, lips and chin. For a match, 14 of those points must align with a database picture.

A face-recognition system in London has reduced crime by 34 percent, and Great Britain is expanding its use, says Visionics, another company developing software. Iceland's international airport is using Visionics software, too. However, Visionics says it will still take 90 to 180 days to develop a full-fledged system adequate for a large airport.

Visionics Chief Financial Officer Bob Gallagher says the challenge is to develop hardware that can allow multiple cameras to use software running from one source. Silicon Valley's venture capitalists might consider stepping up to the challenge.

Presumably, the perpetrators had been through many airports in preparation for the attacks Tuesday. They may be on CIA or FBI lists. Colatosti asks, with frustration: ``How did they get in the country if they're on the watch list? We have the technology to stop them on the point of entry.''

--------------------------------------------------------------------------------

Contact Matt Marshall at mmarshall@sjmercury.com or (408) 920-5920.

© 2001 The Mercury News.