ALERT Continues to Foster Collaboration at ADSA12 Workshop

On May 12-13, 2015, the Twelfth Advanced Development for Security Applications Workshop (ADSA12) was held at Northeastern University in Boston, MA. The workshop focus was, “Screening of Personnel and Divested Items at the Checkpoint,” and was a continuation of the first workshop, ADSA01. The topic was chosen in order to support the Department of Homeland Security’s (DHS) objective of improving the performance of existing technologies and to improve the passenger experience at checkpoints. Another goal of the workshop was to support DHS’s objective to increase the participation of third parties, such as researchers from academia, national labs, and industry other than the incumbent vendors, in algorithm and system development for security applications.

The following topics were addressed at the workshop: emerging hardware; emerging algorithms and processes; improving the passenger experience and assessing and using risk. The topics were addressed from the perspectives of the TSA, airlines, and passengers.

The key findings from the workshop on what can be done to solve the checkpoint problems are: use of risk based screening including under-screening; improved concept of operations; integrating systems and data; setting standards for systems interfacing, data integration and testing in lab and field; developing better hardware and reconstruction software and identifying orthogonal technologies.

The next workshop, ADSA13, is scheduled for the fall of 2015, will be a continuation of ADSA12 and will concentrate on the following topics: trace and standoff detection; video analytics; application to mass transit and federal buildings; fusing orthogonal technologies; explosive threats; networking; laboratory and red-team testing; third party development of Automated Threat Recognition and reconstruction algorithms; machine learning; prevalence shifting; (trading off Probability of Detection for Probability of False Alarm); concept of operations; measuring and using risk; deterrence; and case studies.

There are currently no comments.

Comments are closed.

The comments are closed.