How has Facial recognition changed Border security and law enforcement?

User Generated

guveqyhk

Business Finance

Crim 490

George Mason University

Description

How has facial recognition changed Border security at different ports and law enforcement in general?

How will it change law enforcement in the future?

What are the different types of facial recognition and how it functions?

How people view the technology from an outside perspective?

Has this technology improved law enforcement? Is there more progress to be made?

The center focus is the use of the facial recognition technology at Washington Dulles Airport IAD. Then to expand into the larger topic.

Please use the directions below to complete this paper.

APA FORMAT REQUIRED.

The 11th page should be the works cited page.

I have attached a rubric to help meet grading criteria.

I have also attached a few source documents to help with the research.

If there are any addition questions or information needed for the paper please let me know.

Nature of the Research Paper

Submit an 8 to 10-page paper on a technology and policing topic of your choosing. The purpose

of this paper is to examine the relationship between technology and the components of the justice system (e.g. courts, corrections, policing). In the paper discuss the technology and its application to the criminal justice system, identify and discuss both benefit and potential harm (abuses) of the use of the technology. How might this technology improve the criminal justice system, today or in the future. This paper should NOT just summarize the technology topic by way of a literature review.

This paper is assigned to students as individuals, meaning you must do the research, analysis and writing on your own, with assistance as provided in the writing lab/recitation. Try to develop your paper through an iterative process of draft, review, and revision. Use the writing center and peer review processes to assist you in the successful completion on this paper.

Grading Criteria

Below are a few of the criteria I will be using to grade the paper. Please refer to the “Research

Paper Grading Rubric” for more information and point value for each the rating criteria. You

can also find resources on effective writing at writingcenter.gmu.edu, click on the “Resources”

tab.

Critical Thinking

The more clearly, logically, and strongly you make your points, using valid reasoning and

evidence, the higher your grade.

Composition

Spelling, punctuation, grammar and constructions are important elements of composition and

should not get in the way of communicating your ideas. I strongly recommend that you read

your paper out loud to yourself and have someone proof the paper to correct any errors.

Structure and Organization

Use headings to organize your paper, and make sure the discussion flows smoothly from one

topic to another. Say what you need to say as efficiently and concisely as possible, avoiding

excess verbiage.

The sections of your paper should include:

Cover page to include Title, Class, Student’s name, date and Instructor’s name

Introduction: Introduce the topic and purpose of the paper, provide a brief overview of

the technology and how it is relevant to the criminal justice system and the likely

outcomes from its use (hypotheses).

Literature Review: Use a minimum of four sources (Academic journals, professional

journals, trade journals, law reviews, articles and or government documents).

Methods: Explain the approach to data collection through document reviews and the

method used to select the literature.

Limitation: Discuss the limitations of the literature and the application science of the

behind the technology and the need for future study if applicable.

Discussion/conclusions: Explain the technology and application, how it fits with the

justice system priorities. What are the likely outcomes (+/-) of the application of the

technology? Evaluating the advantages and drawbacks of the technology under current

and future conditions. Explaining your preferred application and your rationale for that

choice. Discuss the social (moral, ethical and legal) implications as well as organizational

expectations (cost and efficiency).

List of sources cited page: APA style sources to correspond to in-text citations.

Format

All papers should be prepared in conjunction APA format to include citations, in-quote citations

and resources. Please print single-sided, numbering the pages and stapling them together. Use 1-inch margins all the way around, single spaced and 12-point font (any font that’s easily

readable).

Use and Citation of Sources

The content of your paper should show that you used the sources provided, and the sources

should be cited appropriately (when in doubt, cite!). Be sure to use quotation marks to denote

quoted material, and cite all sources quoted and all sources you drew on to develop your ideas.

Use quotations very, very sparingly. Most of your discussion of resource material should be

paraphrased into your own words, so I know that you understand it. When I see extensive use of quotations, I assume that you’re parroting what you heard, rather than actually explaining it,

because you didn’t understand it. That will not help your grade. Failure to cite all sources you read and used, as well as citing sources you didn’t actually read and use, are both plagiarism and will result in an F on the paper and a referral to the Office of Academic Integrity.

Timeliness of Submission

All papers are due on hardcopy in class by the start of class time on the due date. If you

don’t turn it in by then, you can make a late submission by email, but there’s a 5-point-per-day

(with a day defined as a 24-hour period beginning at the start of the class on the due date)

penalty for late submissions, and no papers will be accepted more than 7 days late. You must

provide me with a hardcopy turned in during class on the due date.

If you don’t get your paper in by 7 days of the due date, you’ll get a zero for this part of your

course grade.

Unformatted Attachment Preview

CRIM 490 Research Paper Grading Rubric Category Introduction Literature Review Methodology Limitations Discussion & Conclusion List of Sources Formatting and Style Description -Identifies General Topic -Explains importance of topic to field of crim. justice -Provides brief overview of academic research -Present potential hypothesis -Addresses 4 sources -Organized by source -Provides effective overview of research & primary points in each source -Explains relevance of each source to proposed original research Points /5 /10 -Describes method for selecting research literature -Describes the criteria used to review the literature /5 -Identifies limitations in academic research -Identifies limitations in potential original research /5 -Summarizes academic research -Summarizes proposed original research -Predicts results -Identify need for further study/testing /10 -Includes all sources in Literature Review -Follows APA format -Includes URL for all electronic sources -Follows organization from Instructions -Includes Cover Page & uses Headings -Uses effective sentence structure & word choice -Uses effective punctuation -Avoids first person -Uses APA style in-text citations through-out paper Total: /5 /10 /50 Unisys Corporation; Unisys Helps Customs and Border Protection Test Facial Recognition System at Dulles Airport to Identify Imposters Entering United States Publication info: Politics & Government Business ; Atlanta [Atlanta]02 July 2015: 78. ProQuest document link ABSTRACT [...]of this testing phase of the project at Dulles, CBP is considering expanding the program to additional U.S. airports, pending budget approval. FULL TEXT 2015 JUL 2 (VerticalNews) -- By a News Reporter-Staff News Editor at Politics &Government Business -- Unisys Corporation (NYSE: UIS) announced the completion of the initial phase of testing of a facial recognition system at Dulles International Airport, Virginia, to help Customs and Border Protection (CBP) to identify imposters attempting to enter the United States using passports that are fraudulent or do not belong to them. Using an integrated solution developed by Unisys and its partners, the system captures live facial images of travelers entering the U.S., and compares those images against those stored electronically in travelers' passports. If the images do not match, the travelers may be subject to additional inspection by CBP officers. The solution was provided by Unisys under its Land Border Integration contract with CBP, awarded in 2010. As a result of this testing phase of the project at Dulles, CBP is considering expanding the program to additional U.S. airports, pending budget approval. The solution allows CBP officers to scan and display biographic and biometric information from randomly selected travelers' passports, while a desktop camera automatically captures their facial images. The officers use the system to analyze the passports' facial image and the captured images to determine whether there is a match or a need for additional processing by officers. Images of travelers taken during the test are for assessment purposes only and will not be retained or shared. The technology is a standalone system that will not communicate with any other CBP or Department of Homeland Security systems. CBP is dedicated to protecting the privacy of all travelers. "As cybersecurity and physical technologies continue to converge, technologies such as biometrics are playing an increasingly essential role in keeping us safe online and in the real world," said Amy Rall, group vice president for the Department of Homeland at Unisys Federal. "CBP's new facial recognition solution can make us safer while allowing officers to efficiently move travelers through airports with minimal disruptions - while protecting their privacy." Keywords for this news article include: Technology, Dulles Airport, Transportation, Unisys Corporation, Government Agencies Offices and Entities. Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2015, NewsRx LLC PDF GENERATED BY SEARCH.PROQUEST.COM Page 1 of 2 DETAILS Subject: Biometrics; Software industry; Airports Location: United States--US Publication title: Politics &Government Business; Atlanta First page: 78 Publication year: 2015 Publication date: Jul 2, 2015 Publisher: NewsRx Place of publication: Atlanta Country of publication: United States, Atlanta Publication subject: Political Science ISSN: 1944-267x Source type: Wire Feeds Language of publication: English Document type: Expanded Reporting ProQuest document ID: 1691054489 Document URL: https://search.proquest.com/docview/1691054489?accountid=14541 Copyright: Copyright 2015, NewsRx LLC Last updated: 2015-06-25 Database: ProQuest Central LINKS Check for full text via 360 Link, Check for full text via 360 Link Database copyright  2018 ProQuest LLC. All rights reserved. Terms and Conditions Contact ProQuest PDF GENERATED BY SEARCH.PROQUEST.COM Page 2 of 2 CRIM 490 Sec.007: Technology & Policing Guidelines for Individual Research Paper Nature of the Research Paper Submit an 8 to 10-page paper on a technology and policing topic of your choosing. The purpose of this paper is to examine the relationship between technology and the components of the justice system (e.g. courts, corrections, policing). In the paper discuss the technology and its application to the criminal justice system, identify and discuss both benefit and potential harm (abuses) of the use of the technology. How might this technology improve the criminal justice system, today or in the future. This paper should NOT just summarize the technology topic by way of a literature review. This paper is assigned to students as individuals, meaning you must do the research, analysis and writing on your own, with assistance as provided in the writing lab/recitation. Try to develop your paper through an iterative process of draft, review, and revision. Use the writing center and peer review processes to assist you in the successful completion on this paper. Grading Criteria Below are a few of the criteria I will be using to grade the paper. Please refer to the “Research Paper Grading Rubric” for more information and point value for each the rating criteria. You can also find resources on effective writing at writingcenter.gmu.edu, click on the “Resources” tab. Critical Thinking The more clearly, logically, and strongly you make your points, using valid reasoning and evidence, the higher your grade. Composition Spelling, punctuation, grammar and constructions are important elements of composition and should not get in the way of communicating your ideas. I strongly recommend that you read your paper out loud to yourself and have someone proof the paper to correct any errors. Structure and Organization Use headings to organize your paper, and make sure the discussion flows smoothly from one topic to another. Say what you need to say as efficiently and concisely as possible, avoiding excess verbiage. 1 The sections of your paper should include: • • • • • • • Cover page to include Title, Class, Student’s name, date and Instructor’s name Introduction: Introduce the topic and purpose of the paper, provide a brief overview of the technology and how it is relevant to the criminal justice system and the likely outcomes from its use (hypotheses). Literature Review: Use a minimum of four sources (Academic journals, professional journals, trade journals, law reviews, articles and or government documents). Methods: Explain the approach to data collection through document reviews and the method used to select the literature. Limitation: Discuss the limitations of the literature and the application science of the behind the technology and the need for future study if applicable. Discussion/conclusions: Explain the technology and application, how it fits with the justice system priorities. What are the likely outcomes (+/-) of the application of the technology? Evaluating the advantages and drawbacks of the technology under current and future conditions. Explaining your preferred application and your rationale for that choice. Discuss the social (moral, ethical and legal) implications as well as organizational expectations (cost and efficiency). List of sources cited page: APA style sources to correspond to in-text citations. Format All papers should be prepared in conjunction APA format to include citations, in-quote citations and resources. Please print single-sided, numbering the pages and stapling them together. Use 1inch margins all the way around, single spaced and 12-point font (any font that’s easily readable). Use and Citation of Sources The content of your paper should show that you used the sources provided, and the sources should be cited appropriately (when in doubt, cite!). Be sure to use quotation marks to denote quoted material, and cite all sources quoted and all sources you drew on to develop your ideas. Use quotations very, very sparingly. Most of your discussion of resource material should be paraphrased into your own words, so I know that you understand it. When I see extensive use of quotations, I assume that you’re parroting what you heard, rather than actually explaining it, because you didn’t understand it. That will not help your grade. Failure to cite all sources you read and used, as well as citing sources you didn’t actually read and use, are both plagiarism and will result in an F on the paper and a referral to the Office of Academic Integrity. 2 Timeliness of Submission All papers are due on hardcopy in class by the start of class time on the due date. If you don’t turn it in by then, you can make a late submission by email, but there’s a 5-point-per-day (with a day defined as a 24-hour period beginning at the start of the class on the due date) penalty for late submissions, and no papers will be accepted more than 7 days late. You must provide me with a hardcopy turned in during class on the due date. If you don’t get your paper in by 7 days of the due date, you’ll get a zero for this part of your course grade. 3 Source Document for CRIM 490 paper The global facial recognition market is expected to grow from USD 4.05 billion in 2017 to USD 7.76 billion by 2022, at a Compound Annual Growth Rate (CAGR) of 13.9% during forecast period. The 3D facial recognition software tool analyzes, identifies, and verifies the facial characteristics of individuals with high potential. The 3D facial recognition technology uses 3D geometric features of the human face, which are compared with the images stored in the database. The increased need for enhanced surveillance and monitoring at public places and the increase in use of facial recognition technologies in industries, such as the government are said to be driving the facial recognition market growth. Training and consulting services segment is expected to have the largest market share during the forecast period In the facial recognition market, the training and consulting services segment includes feasibility assessment, analysis, and advisory of large-scale governmental and military projects. It also includes requirement gathering, biometric security design, technology evaluation, and validation of biometric features. Several leading service providers offer training and consulting services in the facial recognition market. Law enforcement segment is expected to have the largest market size during the forecast period Facial recognition software and services are predominantly applied at the premises where enforcement, surveillance, and monitoring of the facial detection law is needed. Facial recognition technologies are capable of recognizing faces in real-time using webcam; providing accurate gender information; detecting age, mood, and other features; and searching faces from the database. The demand for the software is expected to have increased, due to the increasing data breaches and the enterprises’ growing need to save resources from unauthorized access. North America is expected to witness the highest growth during the forecast period Among the 5 regions, North America is expected to have the largest market size in the facial recognition market during the forecast period. The North American region has shown increased investments in the market, and several vendors have evolved to cater to the rapidly growing market. A considerable growth is expected in the region during the forecast period. Major initiatives taken for the growth of the facial recognition technology have their origin in this region. The smart city initiatives taken by the government in this region has positively impacted the adoption trend of the facial recognition technology across the region, to enhance the monitoring and improve the surveillance. In-depth interviews were conducted with Chief Executive Officers (CEOs), marketing directors, innovation and technology directors, and executives from various key organizations operating in the facial recognition market. • By Company Type: Tier I: 18%, Tier II: 48%, and Tier III: 34% • By Designation: C-Level: 22%, Director Level: 43%, and Others: 35% • By Region: North America: 23%, Europe: 48%, APAC: 16%, and MEA: 13% The report includes the study of the key players offering facial recognition solutions, hardware, and services. Aware (US), NEC Corporation (Japan), Ayonix Corp. (Japan), Cognitec Systems (Germany), KeyLemon (Switzerland), nViso (Switzerland), Herta Security (Spain), Techno Brain (Kenya), Neurotechnology (Lithuania), Daon (US), Animetrics (US), 3M Company (US), IDEMIA (France), and Gemalto (Netherlands) are some of the companies profiled in the report. The report includes an in-depth competitive analysis of these key facial recognition market players, along with their company profiles, product offerings, recent developments, and market strategies. Research Coverage The facial recognition market has been segmented on the basis of components (software tools and services), technology, use cases, end-users, and regions. The facial recognition software tools include 2D facial recognition, 3D facial recognition, and thermal face recognition. The services segment includes training and consulting services, and cloud-based facial recognition services. The technologies segment includes facial recognition software and Software Development Kit (SDK), middleware, databases, modeling and restructuring, and analytics solution. On the basis of use cases, the facial recognition market is divided into emotion recognition, attendance tracking and monitoring, access control, and law enforcement. On the basis of end-users, the facial recognition market is segmented into government, enterprises, and other end-users. The other end-users segment includes casinos, public places, automotive, mobile application, and home security systems. The government sector is further segmented as Homeland Security and military, while the enterprises sector is subsegmented into Banking, Financial Services, and Insurance (BFSI), healthcare, and retail. Finally, on the basis of regions, the facial recognition market is segmented into North America, Europe, Asia Pacific (APAC), Middle East and Africa (MEA), and Latin America. The report will help the market leaders and new entrants in the facial recognition market in the following ways: 1. The report segments the market into various subsegments, hence it covers the market comprehensively. The report provides the closest approximations of the revenue numbers for the overall market and the subsegments. The market numbers are further split across various industry verticals and regions. 2. The report helps in understanding the overall growth of the market. It provides information on the key market drivers, restraints, challenges, and opportunities. 3. The report helps in understanding the competitors better and gaining more insights to strengthen their position in the market. The study also presents the positioning of the key players based on their product offerings and business strategies
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, please find attached. Do not hesitate to seek clarification. Cheers!

Outline
Introduction
Body
Conclusion
References


Running head: FACIAL RECOGNITION

1

How Facial Recognition has Changed Border Security and Law Enforcement
Name
Institution
Instructor
Date

FACIAL RECOGNITION

2

How Facial Recognition has Changed Border Security and Law Enforcement
Introduction
Facial recognition is touted as a leading approach when it comes to the automated
biometric solutions (ABCs) the main reason being that travellers consider it as more acceptable.
In Europe and the West, in general, it's regarded as the ideal modality in second generation
passports. The facial recognition systems are installed in small kiosks and also inside the e-gates
and would typically require high-quality facial images which would allow for better performance
and greater efficiency in the security checks. The facial recognition software and related
algorithms need to be those that are not affected by non-idealities which include the expressions,
changes in the light, obstructions, among other interference that could be as a result of the
physical environment in the airports or other high-security need areas (Del Rio et al. 2016). The
algorithms are more advanced which has made the entire process more efficient and with better
success rates than use of traditional biographic means by gathering information such as the
country of origin, date of birth, passport details and so on (Mason, n.d).
The automated solutions help handle the challenges that arise from such growth
especially in the number of travellers thereby removing delays experienced from arrival
schedules. A variety of modalities have been developed which include fingerprint, iris, and facial
recognition which are just a few of the strategies that may be employed in automated border
control (ABC) systems used in airports (Del Rio et al. 2016). Quite recently there have been talks
of introducing facial recognition systems and software at the borders especially the one between
the U.S and Mexico as a way of curbing the problem of illegal entry by immigrants and other
criminal entities (Levin, 2018). In Europe, the introduction of the ABC systems in major airports
is also being instituted in the European/Schengen regions.
The Department of Homeland Security was mandated under new legislation back in 2002
a few months after the 911, attack to use biometric technology when issuing visas and screen
non-U.S citizens who come into the country. Two years later, in 2004, there were more laws that
were passed that authorized DHS to capture biometric data for non-U.S citizen as they were
exiting the country. The 911 attack had triggered the enactment of the laws; however, for several
years the U.S government had struggled to find a practical and cost-effective approach to
developing a cost-effective entry/exit system which met the congressional requirement of
keeping the country safe (Mason, n.d). Ever since collaborative strategies between the
government agencies and the U.S air travel industry has been employed in achieving that
mandate, and it has been through the use of innovative biometric applications that allowed for
better performance and experience by the travellers.

FACIAL RECOGNITION

3

Facial recognition is a biometric identifier. Biometrics are unique markers used in
identification and verification of individuals identity by using specific intrinsic or behavioral
features (Lynch, 2018). A facial recognition system is a type of computer application that
identifies and verifies an individual with the help of a digital image or by use of a video frame
from a specific source. Fingerprints are some of the most commonly used and known biometric,
and others are iris, palm print, voice, wrist, gait, and DNA. To identify the subject, the software
selects from a choice of facial features and compares them with a facial database that already
exists. That particular type is commonly applied by law enforcement agencies when carrying out
follow up investigations and identify potential perpetrators of a crime.
The facial recognition systems are used to carry out one three things which are in
identifying an unknown individual which is what law enforcement officers commonly do in
ascertaining the identity of people. The second use is in the identification of a known individual,
and such an application is commonly used in smartphones or other areas where face recognition
is used to unlock a given device. The third type, which follows the same principles of
verification systems is configured to look out for various specific features in previously
identified faces. That type is used in recognition of certain people from a crowded area or in
commercial settings where they may be unwanted. The facial recognition systems are also
commonly applied in security systems which can also be integrated with other biometric tools
such as the iris and fingerprint recognition systems. In recent times it has also been employed in
commercial settings as an identification tool (Agaga, 2018). Face recognition is poised to
become one of the most used surveillance technology, and the uptake by law enforcement
agencies is increasing at a fast rate.

Size of the biometrics market and projected growth for the U.S between 2013-2024
Washington Dulles was originally constructed in the 10,000-acre piece of land located in
Loudon and Fairfax counties in Virginia which is approximately 26 miles from the downtown
Washington D.C (MWAA, 2018). The airport has 139 airline gates which in themselves create
for a challenging security environment. The airport comprises of the signature flight support as
well as jet aviation serve as fixed base operators for the general aviation communities. The

FACIAL RECOGNITION

4

airport is a valuable asset for the community, the state, and nation at large and is seen as a
powerful economic driver for the commonwealth. The airport provides over 200,000 jobs as
direct, indirect, and induced earning a labor income of close to 9 billion and providing the State
with more than $600 million in revenue earned from taxes (MWAA, 2016). The annual spending
by the passengers comes to a total of $ 3.4 billion which is from lodging, food, car rentals, retail,
entertainment, and hiring taxis. The airport served the commonwealth with more than 10,000
flights in 2015 which was a drop of 28% in 2007 (MWAA, 2016).
An expedited and automated biometric solution has been proposed as a critical
requirement for future border controls that are vital to the security of the key infrastructures and
the nation at large. The Washington Dulles Airport has approximately139 airline gates and
various levels that the travellers arriving into the country have to go through, they departures and
ticketing level, security checkpoint level, aerotrain level that gets to every gate, the arrival and
baggage claim level and ground transportation levels that all handle visitors entering and
departing. The need for automated processes such as an airport and similar ones countrywide
cannot be over-emphasized enough, such processes are applied for use in entry points have also
partly been driven by the desire to ensure that there is better efficiency in security checks that
can still meet the needs of the rapidly growing airports and ease congestion at the electronic
gates.
Facial recognition portends to be an invaluable tool for present and future use when it
comes to the security of such critical infrastructure and as entry points to the U.S. like the
Washington Dulles Airport IAD. The report will, therefore, give special focus on the biometric
tool, assess the technology focusing on the impact that it has had on the security of entry points
such as airports and borders. It will also focus on the technology's growth, its past, where it
currently stands, and what the future of its use will be like. The focus will then change on the
impact of that the application has had in the security environment as well as to the privacy
concerns of the public, explore how it is viewed externally by the public and other stakeholders.
The report will also focus on the facial recognition usage in law enforcement and in relation to
the overall security of the public and country. Facial recognition as a biometric tool will be used
increasingly in the future; however, the tool has the potential of introducing a host of challenges
and therefore viewed negatively by the public.
Literature Review
Impact of Facial Recognition to Law Enforcement and Border Security Activities
The use of facial recognition in border security is considered as the way to go thanks to
the great advances in the technology that are now more efficient, employ smarter technology, the
algorithms are more advanced and overall the entire process is much more effective and has
better success rates than the traditional biographic applications of gathering information (Mason,
n.d). Some of the advantages of the biometric tool use in border control and other entry points
are that it is convenient. Facial recognition software and related tools are now automated
allowing the travellers a more convenient time, and they are able to scan their documents and
then proceed without physical intervention of the border security personnel and staff is it would
traditionally have been. It, therefore, reduces the time needed in processing the travellers'
documents and...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags