[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Photo ID



Travis wrote...

>> Any one know how easy it would be to adapt the
>> British Photo Id software for use in airports? I
>> mean the casinos already use a primitive version
>> that goes off of photos and does not make the
>> mathmatical equation that becomes unique to
>> each person. I mean ALL airports use heavy
>> camera survealleince already. How hard would
>> it be to hook those into the FBI watch list, or
>> most wanted lists? Some airports already have
>> acess to the NCIC do'nt they? It seems a realtive
>> easy and effective tool. Last I knew the software
>> always found the people, the olnly problem was
>> that 1 in 10 was a false positive, if the person is
>> there, it found em. And given the fact that these
> areas are already watched, I can not see any
>> infringemnets of civil liberties.
>
> The down side being that terrorist organisations
> rapidly learn not to use people that can be easily
> linked to them. The authorities simply don't know
> who to look out for. This tactic has certainly been
> successful for Irish Republicans operating in
> mainland Britain for several years.

For what it's worth, a local council authorioty in the London boroughs are trialling such a system, tied into their CCTV
systems used to provide surveillance of the town centre. They've logged the profiles of a lot of known trouble-makers,
those with convictions for certain anti-social crimes (public order, hooliganism, and similar stuff); it's operated in
close cooperation with the Metropolitan Police, and so far, results appear to be encouraging. ISTR that the
false-positives were noted at 1:50, not 1:10.

HTH!

Best regards,

Roger Stenning
Organiser, The Impossible Scenarios Group
www.the-isg.co.uk
ICQ: 74721632
UK Amateur Radio call sign: G1LIW
(PGP public key available on request)
________________________________________________________
LEGAL DISCLAIMER: The views expressed in this message
may not be those of the ISG. The information in this email and
in any attachments may be confidential and/or privileged. If you
are not the intended recipient, you should not retain, copy or
use this email for any purpose, nor disclose all or any part of
its content to any other person - you should also destroy this
message, delete any copies held on your systems and notify
the sender immediately.