Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Can We Ever Be Safe (Again)?

    By
    Paula Musich
    -
    September 17, 2001
    Share
    Facebook
    Twitter
    Linkedin

      Last weeks terrorist attacks in New York and Washington are spawning new technology-based security efforts in places such as airports, where the days of the two questions and a quick pass through the metal detector are gone forever.

      The heightened focus on cutting-edge security technologies—everything from biometrics to smart ID cards to massive personnel databases—offers hope of a safer society. But it also raises questions about technological feasibility and the loss of personal freedoms. Within the argument, one thing seems inevitable: The greater the security measures we create, the more sophisticated and spectacular will be the measures taken to breach them.

      “With foolproof software, someones always going to find a bigger fool,” said Michael Pollard, systems support technician at Market Touch, in Alpharetta, Ga. “In the same regard, you can create a smart security system, but someone can always outsmart it.”

      In terms of identification, many airports already are going beyond the simple glance at a drivers license to make sure passengers are who they say they are. David Ben Gurion Airport in Tel Aviv, Israel, for example, has started using palm scanners from Electronic Data Systems Corp. Customers slide identification cards through a scanner and then supply a palm print to prove their print matches the print on the card.

      And while retinal and face scanning software has been available for years, implementing such systems raises several thorny issues.

      For one, its expensive. The result: “[You] would end up with some airports that can afford it while others cant, and then you just shift the problem to smaller airports,” said William Malik, an analyst at Gartner Inc., in Stamford, Conn.

      Theres also the ongoing issue of privacy.

      “With biometrics, you could easily have positive ID on everyone and instant background checks on everyone on a plane,” Pollard said. “But a lot of people already chafe at having their fingerprints on drivers licenses.”

      Greater use of smart-card authentication is a possibility, but privacy issues surround that technology as well.

      “I expect well see smart-card-based authentication,” Malik said. “The Pentagon [has] already deployed 50,000 cards to their staff. Will we see a national ID card? I dont know. We may see technology for robust authentication, but that gets into questions of social policy.”

      The privacy factor also impacts detection technology. Currently most U.S. airports depend on metal detectors for passengers and X-ray machines and sniffers for luggage. Sending the passengers themselves through X-ray machines certainly would be more thorough, but the average American traveler doesnt want the average airport employee to see under their clothes, experts say.

      Furthermore, identification raises issues of IT security.

      “Positive identification is one side of the coin,” said Jim Dullum, head of the Global Transportation Industry Group at EDS, in Plano, Texas. “The other is integrating the information of the individual. It becomes one big file, a huge series of real-time data files that need to be available. From an IT perspective, youre creating much more-massive databases … and another data security issue.”

      Basically, tracking biological data for every passenger means making sure hackers cant get access to that data, Dullum said.

      This is where privacy and security issues merge.

      “Right-wingers will say [last weeks attacks] illustrate the importance of giving law enforcement greater eavesdropping access, even to the point of prohibiting encryption [or requiring folks who use it to register their keys],” said Steve Durst, a security consultant at Skaion Corp., in Arlington, Mass. “Left-wingers will wring their hands and decry this event as a catalyst for increased social acceptance of decreased freedoms, including the freedom to keep your data private.

      Central to both is the question whether theres anything law enforcement can do in an environment where criminals are increasingly technologically savvy and where encryption or other forms of technological concealment will become more prevalent.

      Keeping track of airport travelers and their luggage is getting the bulk of the attention from security pundits in the wake of the terrorist assaults. But the airport and its environs also provide an excellent example of how human and technological security elements collide. Even with the most state-of-the-art technology, the systems are only as good as the people who run them.

      But several business travelers who in the days previous to the attacks flew through Bostons Logan International Airport—the site of two of the four hijackings that resulted in last weeks attacks—reported numerous incidents of lax security including passengers getting small items in boxes past security by placing them on the tables between metal detectors.

      “People who do the security work [in airports] make less than those flipping burgers at McDonalds,” said Gartners Malik. “There is probably something technology can do, but we have to spend more on basic blocking and tackling and make sure the people implementing the technology are treated with the right dignity and respect. We have no instances in human history where technology was able to compensate for a procedural weakness. The computer is an intelligence amplifier—something that replicates and accelerates well-defined business processes. We find computers are also stupidity amplifiers—take a poorly defined process and try to automate it and have an automated mess.”

      EDS Dullum agreed. “This is an area where when the systems become more sophisticated, the staffing will become more sophisticated. It will mean bringing in experts,” he said. “For the foreseeable future were going to do a very manual check-in process.”

      “We really believe there is going to be some scaling back of the items and luggage youre going to be able to bring onto an airplane,” Dullum said. Airports likely will require bar coding and scanning of the luggage, possibly with embedded chips in bag tags.

      In the air, the airlines are working on broadband networks for airplanes, which will give passengers and pilots better equipment for keeping in touch with people, including safety officials, on the ground.

      Paula Musich
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×