U.S Customs and Border Protection has a new hire on hand at its Nogales, Ariz., border crossing between the United States and Mexico. CBP has installed an avatar kiosk at the checkpoint to help quickly move persons enrolled in CBP’s Trusted Traveler program through the border crossing quickly, analyzing what they say--both their words and the way they say them--for suspicious signals.
Trusted Traveler is a program that pre-screens international travelers and determines them low-risk, allowing them to pass through customs and immigration checkpoints at airports and border crossings more easily. Enrollees are put through a full background check and an interview with a CBP agent prior to being admitted, but once they are in they can take advantage of priority lanes at CBP checkpoints that move faster and perform less rigorous entrance interviews.
The new avatar speaks and understands both English and Spanish, and evaluates a travelers responses to questions with both speech recognition software and voice anomaly-detection programs. So it’s not just what you say to the avatar that counts, but how you say it. Pause too long while responding or speak in patterns indicative of deception, and the avatar might flag your response. The evaluation of the interview is then beamed to a live agent with a tablet computer, who can decide how to proceed from there. Flagged responses may lead to increased probing into a particular response by live CBP personnel.This is actually the second generation avatar--the first one was demoed from December 2011 to March of this year--but the first generation possessed some shortcomings. It only spoke and understood English, and its conversation wasn’t very natural. If the respondent began speaking before the avatar had finished asking, the computer missed the first part of the response and the query got flagged, often unnecessarily.
The University of Arizona researchers that developed the avatar have fixed some of those problems and hope that version 2.0 will be more widely deployable. Thus far, it seems to be working well enough. The researchers report that by giving their computer a face, a collar, and a tie, people tend to treat it like a real human. They even call it “sir.”
140 years of Popular Science at your fingertips.
Each issue has been completely reimagined for your iPad. See our amazing new vision for magazines that goes far beyond the printed page
Stay up to date on the latest news of the future of science and technology from your iPhone or Android phone with full articles, images and offline viewing
Featuring every article from the magazine and website, plus links from around the Web. Also see our PopSci DIY feed
For our annual How It Works issue, we break down everything from the massive Falcon Heavy rocket to a tiny DNA sequencer that connects to a USB port. We also take a look at an ambitious plan for faster-than-light travel and dive into the billion-dollar science of dog food.
Plus the latest Legos, Cadillac's plug-in hybrid, a tractor built for the apocalypse, and more.

Online Content Director: Suzanne LaBarre | Email
Senior Editor: Paul Adams | Email
Associate Editor: Dan Nosowitz | Email
Assistant Editor: Colin Lecher | Email
Assistant Editor:Rose Pastore | Email
Contributing Writers:
Rebecca Boyle | Email
Kelsey D. Atherton | Email
Francie Diep | Email
Shaunacy Ferro | Email
Big brother is a watching you and I am sure in the programming profiling is typical built into the system as well!
I think it is just this sort of program that invites complacency. Whether vetted by some software or by a person, at what point do these "trusted travelers" begin to take advantage of the system? It's going to be little old ladies and business men that have been going about their daily lives for years that one day decide they want to be a drug mule and the face on the screen politely smiles and waves them by. On the flip side I can foresee some inventive hacker causing all kinds of trouble for lots of regular people. All it takes is some altered programming with an over zealous agent and its cavity searches for everyone.
a little paranoid? anything can be hacked or abused, should we just stop advancements in technology? would that be just admitting defeat? cheers
drchuck1,
It is an odd premis you make and I agree. Government and our defensive agencies, Military, Police and a like need tools to do the job and I "DO" want to give them the tools. But it seems too, our goverment gently and ever so slowing is invading the privacy of law abiding citizens, when in fact the laws should grown in strength in protecting our freedoms, privacy and indepence. Of course currenty, it just seems our current government for the last 20 years is just frozen in politics, malipulation tactics. But enough of my soap box. Take care. ;)
privacy is an endangered species and needs to be protected, cheers
All they need now is a trap door in the floor whereby the suspect is dropped into a cell with an ED-209.