ADSA13 Final Report
Total Page:16
File Type:pdf, Size:1020Kb
for Securityfor Applications Development Advanced Strategic Study Workshop Series Advanced Development for Security Applications October 2015 Workshop Final Report Final OctoberWorkshop 2015 Screening of Personnel and Divested Items at the Checkpoint - Part II ADSA13 ADSA13 October 2015 Workshop ALERT 2015Publication Awareness and Localization ofof Explosives-RelatedExplosives-Related Threats This material is based upon work supported by the U.S. Department of Homeland Security under Award Number 2013-ST-061-ED0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the offi cial poli- cies, either expressed or implied, of the U.S. Department of Homeland Security. Advanced Development Final Report for Security Applications October 2015 Workshop Table of Contents 1. Executive Summary 3 2. Disclaimers 5 3. Introduction 6 4. Discussion 7 5. Acknowledgements 14 6. Workshop Planning and Support 15 7. Appendix: Notes 16 8. Appendix: Agenda 17 9. Appendix: Previous Workshops 20 10. Appendix: List of Participants 21 11. Appendix: Presenter Biographies 25 12. Appendix: Questionnaire 39 13. Appendix: Questionnaire Responses 40 14. Appendix: Acronyms 81 15. Appendix: Minutes 87 16. Appendix: Presentations 141 Advanced Development Final Report for Security Applications October 2015 Workshop This page intentionally left blank. Advanced Development Final Report for Security Applications October 2015 Workshop 1. Executive Summary A workshop focused on screening of personnel and divested items at the checkpoint was held at Northeastern University (NEU) in Boston on October 28-29, 2015. This workshop was the thirteenth in a series dealing with ad- vanced development for security applications (ADSA13). The workshop was a continuation of the twelfth workshop, ADSA12. The topic of screening of personnel and divested items at the checkpoint was chosen as the workshop topic in order to support the Department of Home- land Security’s (DHS) objective of improving the performance of existing tech- nologies and to improve the passenger experience at checkpoints. Another goal of the workshop was to support DHS’s objective to increase the partici- pation of third parties, such as researchers from academia, national labs, and industry other than the incumbent vendors, in algorithm and system develop- ment for security applications. The following topics were addressed at the workshop: • Emerging hardware, algorithms and processes, • Concept of operations, • Testing, • Improving the passenger experience, and • Assessing and using risk. The topics were addressed from the perspectives of the following stakehold- ers: • Passengers, • TSA, • Airlines, and • Airports. The key indings from the workshop on what can be done to improve the ex- perience for the stakeholders at the checkpoint, per the editors of this report, are as follows. • Addressing the checkpoint from the perspectives listed above resulted in three competing drivers: o Strengthen security, o Increase operational eficiency, and o Improve passenger experience. • Silver bullets do not exist to solve these goals simultaneously. 3 Advanced Development Final Report for Security Applications October 2015 Workshop • Improvements may be made by developing orthogonal technologies that can be fused with extant technologies. However, improvements are re- quired in the following areas related to fused technologies: o Speciication, o Testing, and o Networking. • Video tracking of passengers and divested objects may be used to improve throughput and to support risk-based screening. • Vendor neutral airports and standards – there is strong interest when standards and neutrality save time and effort, especially for the vendors. • Standards, such as the interface to the baggage handling system, are use- ful when they reduce the development efforts of vendors. • Game theory and risk-based screening may be useful for allocating re- sources via a Dynamic Aviation Risk Management Systems (DARMS), but may not ind “the needle in a haystack.” • Deterrence may be useful, but test methods are required. • Advances may be coming in AIT ATR, Terahertz, ETD, CT reconstruction and image enhancement, but it is important to consider how it will be in- tegrated and deployed to the operating environment. Not all capabilities will ind a market. • Working with OEMs has the potential to educate new developers. • New methods are needed to decrease time from the emergence of a threat to ield deployment, including ATRs to detect the threat. At the meeting, it seemed that ADSA14 (Spring 2016) should address devel- oping and deploying technologies that can be fused. 4 Advanced Development Final Report for Security Applications October 2015 Workshop 2. Disclaimers This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Northeastern University nor any of their employees makes any warranty, ex- pressed or implied, or assumes any legal liability or responsibility for the ac- curacy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any speciic commercial product, process or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States government or Northeastern University. The views and opinions of authors expressed herein do not necessarily state or relect those of the United States government or Northeastern University, and shall not be used for advertising or product endorsement purposes. This document summarizes a workshop at which a number of people partic- ipated by discussions and/or presentations. The views in this summary are those of ALERT and do not necessarily relect the views of all the participants. All errors and omissions are the sole responsibility of ALERT. This material is based upon work supported by the U.S. Department of Home- land Security under Award Number 2013-ST-061-ED0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the oficial policies, either ex- pressed or implied, of the U.S. Department of Homeland Security. 5 Advanced Development Final Report for Security Applications October 2015 Workshop 3. Introduction The Explosive Division (EXD) of US Department of Homeland Security (DHS) Science & Technology Directorate (S&T), in coordination with the Transpor- tation Security Administration (TSA), has the objectives of improving the per- formance of existing technologies and to improve the passenger experience at checkpoints. One tactic that DHS is pursuing to achieve these objectives is to create an environment in which the capabilities and capacities of the estab- lished vendors can be augmented or complemented by third-party algorithm and hardware development. A third-party developer in this context refers to academia, National Labs, and companies other than the incumbent vendors. DHS is particularly interested in adopting the model that has been used by the medical imaging industry, in which university researchers and small commer- cial companies develop technologies that are eventually deployed in commer- cial medical imaging equipment. A tactic that DHS is using to stimulate third-party algorithm and hardware development is to sponsor a series of workshops addressing the research op- portunities that may enable the development of next-generation technologies for homeland security applications. The series of workshops are entitled “Ad- vanced Development for Security Applications (ADSA)”. The workshops are convened by Professor Michael B. Silevitch as part of the DHS Center of Ex- cellence (COE) for Awareness and Localization of Explosives-Related Threats (ALERT) at NEU. ADSA13 was held on October 28-29, 2015 at NEU. The workshop focused on screening of personnel and divested items at the checkpoint. The workshop was a continuation of the twelfth workshop, ADSA12. This report discusses what transpired at the workshop and details a summary of the indings and recommendations. 6 Advanced Development Final Report for Security Applications October 2015 Workshop 4. Discussion 4.1 Objectives The objective of the workshop was to improve the performance of screening passengers and divested items for explosives. The topics that were addressed centered on the following points. • Emerging hardware: o THz. o Photon counting detectors for X-rays. o Coded aperture. o X-ray backscatter. o Explosive trace detection. • Emerging algorithms and processes: o Video tracking of passengers and their divested items. o Simulations. o Image super resolution. o Iterative CT reconstruction. • Emerging processes: o Concepts of operations. o Vendor neutral airports. o Common interfaces. o Fused systems. • Improving the passenger experience: o Improving throughput and reducing divestiture. o Integration of detection systems at the checkpoint. o Managed inclusion and exclusion of passengers. • Assessing and using risk: o Risk-based screening (RBS). o Game theory. o Deterrence. o Developing and verifying models of adversary behaviors. • Other: o Role of third parties in the development of enhanced explosive detec- 7 Advanced Development Final Report for Security Applications October 2015 Workshop tion equipment. o Reducing time for ATR deployment.