Profiling

March 2006 Security Services & Risk Management

There is a great discussion about profiling going on in the comments to the previous post. To help, here is what I wrote on the subject in the book Beyond Fear (pp. 133-7):

Good security has people in charge. People are resilient. People can improvise. People can be creative. People can develop on-the-spot solutions. People can detect attackers who cheat, and can attempt to maintain security despite the cheating. People can detect passive failures and attempt to recover. People are the strongest point in a security process. When a security system succeeds in the face of a new or coordinated or devastating attack, it is usually due to the efforts of people.

On 14 December 1999, Ahmed Ressam tried to enter the US by ferryboat from Victoria Island, British Columbia. In the trunk of his car, he had a suitcase bomb. His plan was to drive to Los Angeles International Airport, put his suitcase on a luggage cart in the terminal, set the timer, and then leave. The plan would have worked had someone not been vigilant.

Ressam had to clear customs before boarding the ferry. He had fake ID, in the name of Benni Antoine Noris, and the computer cleared him based on this ID. He was allowed to go through after a routine check of his car's trunk, even though he was wanted by the Canadian police. On the other side of the Strait of Juan de Fuca, at Port Angeles, Washington, Ressam was approached by US customs agent Diana Dean, who asked some routine questions and then decided that he looked suspicious. He was fidgeting, sweaty, and jittery. He avoided eye contact. In Dean's own words, he was acting 'hinky'. More questioning, there was no one else crossing the border, so two other agents got involved - and more hinky behaviour. Ressam's car was eventually searched, and he was finally discovered and captured. It was not any one thing that tipped Dean off; it was everything encompassed in the slang term 'hinky'. But the system worked. The reason there was not a bombing at LAX around Christmas in 1999 was because a knowledgeable person was in charge of security and paying attention.

There is a dirty word for what Dean did that chilly afternoon in December, and it is profiling. Everyone does it all the time. When you see someone lurking in a dark alley and change your direction to avoid him, you are profiling. When a storeowner sees someone furtively looking around as she fiddles inside her jacket, that storeowner is profiling. People profile based on someone's dress, mannerisms, tone of voice ... and yes, also on their race and ethnicity. When you see someone running toward you on the street with a bloody axe, you do not know for sure that he is a crazed axe murderer. Perhaps he is a butcher who is actually running after the person next to you to give her the change she forgot. But you are going to make a guess one way or another. That guess is an example of profiling.

To profile is to generalise. It is taking characteristics of a population and applying them to an individual. People naturally have an intuition about other people based on different characteristics. Sometimes that intuition is right and sometimes it is wrong, but it is still a person's first reaction. How good this intuition is as a countermeasure depends on two things: how accurate the intuition is and how effective it is when it becomes institutionalised or when the profile characteristics become commonplace.

One of the ways profiling becomes institutionalised is through computerisation. Instead of Diana Dean looking someone over, a computer looks the profile over and gives it some sort of rating. Generally profiles with high ratings are further evaluated by people, although sometimes countermeasures kick in based on the computerised profile alone. This is, of course, more brittle. The computer can profile based only on simple, easy-to-assign characteristics: age, race, credit history, job history, etc. Computers do not get hinky feelings. Com-puters also cannot adapt the way people can.

Profiling works better if the characteristics profiled are accurate. If erratic driving is a good indication that the driver is intoxicated, then that is a good characteristic for a police officer to use to determine who he is going to pull over. If furtively looking around a store or wearing a coat on a hot day is a good indication that the person is a shoplifter, then those are good characteristics for a storeowner to pay attention to. But if wearing baggy trousers is not a good indication that the person is a shoplifter, then the storeowner is going to spend a lot of time paying undue attention to honest people with lousy fashion sense.

In common parlance, the term 'profiling' does not refer to these characteristics. It refers to profiling based on characteristics like race and ethnicity, and institutionalised profiling based on those characteristics alone. During World War II, the US rounded up over 100 000 people of Japanese origin who lived on the West Coast and locked them in camps (prisons, really). That was an example of profiling. Israeli border guards spend a lot more time scrutinising Arab men than Israeli women; that is another example of profiling. In many US communities, police have been known to stop and question people of colour driving around in wealthy white neighbourhoods (commonly referred to as 'DWB' - Driving While Black). In all of these cases you might possibly be able to argue some security benefit, but the trade-offs are enormous: Honest people who fit the profile can get annoyed, or harassed, or arrested, when they sre assumed to be attackers.

For democratic governments, this is a major problem. It is just wrong to segregate people into 'more likely to be attackers' and 'less likely to be attackers' based on race or ethnicity. It is wrong for the police to pull a car over just because its black occupants are driving in a rich white neighbourhood. It is discrimination.

But people make bad security trade-offs when they are scared, which is why we saw Japanese internment camps during World War II, and why there is so much discrimination against Arabs in the US going on today. That does not make it right, and it does not make it effective security. Writing about the Japanese internment, for example, a 1983 commission reported that the causes of the incarceration were rooted in "race prejudice, war hysteria, and a failure of political leadership". But just because something is wrong does not mean that people will not continue to do it.

Ethics aside, institutionalised profiling fails because real attackers are so rare: Active failures will be much more common than passive failures. The great majority of people who fit the profile will be innocent. At the same time, some real attackers are going to deliberately try to sneak past the profile. During World War II a Japanese American saboteur could try to evade imprisonment by pretending to be Chinese. Similarly, an Arab terrorist could dye his hair blond, practice an American accent, and so on.

Profiling can also blind you to threats outside the profile. If US border guards stop and search everyone who is young, Arab, and male, they are not going to have the time to stop and search all sorts of other people, no matter how hinky they might be acting. On the other hand, if the attackers are of a single race or ethnicity, profiling is more likely to work (although the ethics are still questionable). It makes real security sense for El Al to spend more time investigating young Arab males than it does for them to investigate Israeli families. In Vietnam, American soldiers never knew which local civilians were really combatants; sometimes killing all of them was the security solution they chose.

If a lot of this discussion is abhorrent, as it probably should be, it is the trade-offs in your head talking. It is perfectly reasonable to decide not to implement a countermeasure not because it does not work, but because the trade-offs are too great. Locking up every Arab-looking person will reduce the potential for Muslim terrorism, but no reasonable person would suggest it. (It is an example of 'winning the battle but losing the war'.) In the US, there are laws that prohibit police profiling by characteristics like ethnicity, because we believe that such security measures are wrong (and not simply because we believe them to be ineffective).

Still, no matter how much a government makes it illegal, profiling does occur. It occurs at an individual level, at the level of Diana Dean deciding which cars to wave through and which ones to investigate further. She profiled Ressam based on his mannerisms and his answers to her questions. He was Algerian, and she certainly noticed that. However, this was before 9/11, and the reports of the incident clearly indicate that she thought he was a drug smuggler; ethnicity probably was not a key profiling factor in this case. In fact, this is one of the most interesting aspects of the story. That intuitive sense that something was amiss worked beautifully, even though everybody made a wrong assumption about what was wrong. Human intuition detected a completely unexpected kind of attack. Humans will beat computers at hinkiness-detection for many decades to come.

And done correctly, this intuition-based sort of profiling can be an excellent security countermeasure. Dean needed to have the training and the experience to profile accurately and properly, without stepping over the line and profiling illegally. The trick here is to make sure perceptions of risk match the actual risks. If those responsible for security profile based on superstition and wrong-headed intuition, or by blindly following a computerised profiling system, profiling will not work at all. And even worse, it actually can reduce security by blinding people to the real threats. Institutionalised profiling can ossify a mind, and a person's mind is the most important security countermeasure we have.

A couple of other points (not from the book):

* Whenever you design a security system with two ways through - an easy way and a hard way - you invite the attacker to take the easy way. Profile for young Arab males, and you will get terrorists that are old non-Arab females.

* If we are going to increase security against terrorism, the young Arab males living in our country are precisely the people we want on our side. Discriminating against them in the name of security is not going to make them more likely to help.

* Despite what many people think, terrorism is not confined to young Arab males. Shoe-bomber Richard Reid was British. Germaine Lindsay, one of the 7/7 London bombers, was Afro-Caribbean. Here are some more examples:

In 1986, a 32-year-old Irish woman, pregnant at the time, was about to board an El Al flight from London to Tel Aviv when El Al security agents discovered an explosive device hidden in the false bottom of her bag. The woman's boyfriend - the father of her unborn child - had hidden the bomb.

In 1987, a 70-year-old man and a 25-year-old woman - neither of whom were Middle Eastern - posed as father and daughter and brought a bomb aboard a Korean Air flight from Baghdad to Thailand. En route to Bangkok, the bomb exploded, killing all on board.

In 1999, men dressed as businessmen (and one dressed as a Catholic priest) turned out to be terrorist hijackers, who forced an Avianca flight to divert to an airstrip in Colombia, where some passengers were held as hostages for more than a year-and-a-half.

The 2002 Bali terrorists were Indonesian. The Chechnyan terrorists who downed the Russian planes were women. Timothy McVeigh and the Unibomber were Americans. The Basque terrorists are Basque, and Irish terrorists are Irish. The Tamil Tigers are Sri Lankan.

And many Muslims are not Arabs. Even worse, almost everyone who is Arab is not a terrorist - many people who look Arab are not even Muslims. So not only are there a large number of false negatives - terrorists who do not meet the profile - but there are an enormous number of false positives: innocents that do meet the profile.

Bruce Schneier is the founder and CTO of Counterpane Internet Security. He can be contacted at [email protected]. To subscribe to a free monthly newsletter providing summaries, analyses, insights and commentaries on security: computer and otherwise, visit http://www.schneier.com/crypto-gram.html





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Visualise and mitigate cyber risks
Security Services & Risk Management
SecurityHQ announced its risk and incident management capabilities for the SHQ response platform. The SHQ Response Platform acts as the emergency room, and the risk centre provides the wellness hub for all cyber security monitoring and actions.

Read more...
Eighty percent of fraud fighters expect to deploy GenAI by 2025
Security Services & Risk Management
A global survey of anti-fraud pros by the ACFE and SAS reveals incredible GenAI enthusiasm, according to the latest anti-fraud tech study by the Association of Certified Fraud Examiners (ACFE) and SAS, but past benchmarking studies suggest a more challenging reality.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...