{"id":65,"date":"2018-04-13T10:51:24","date_gmt":"2018-04-13T14:51:24","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/?page_id=65"},"modified":"2025-05-12T11:09:02","modified_gmt":"2025-05-12T15:09:02","slug":"not-ready-for-takeoff","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/not-ready-for-takeoff\/","title":{"rendered":"Not Ready for Takeoff: Face Scans at Airport Departure Gates"},"content":{"rendered":"<p>The Department of Homeland Security is planning to spend over a billion dollars to scan travelers\u2019 faces &#8211; including Americans &#8211; as they <em>leave <\/em>the United States. The problem? There\u2019s no evidence of a large-scale problem of people leaving the country under false identities &#8211; or an apparent legal authorization to track Americans in this way. What\u2019s worse, DHS does not appear to know how accurate the system will be at catching impostors &#8211; the primary purpose for building it.<\/p>\n<p>The product of a months-long review of regulatory filings, <a href=\"http:\/\/www.airportfacescans.com\">our report<\/a> lays bare the litany of problems with DHS\u2019 proposed \u201cbiometric exit\u201d system. Released in an exclusive with the <a href=\"https:\/\/www.nytimes.com\/2017\/12\/21\/us\/politics\/facial-scans-airports-security-privacy.html\"><em>New York Times<\/em><\/a>, the report is already shaping the way prominent stakeholders view biometric systems.<\/p>\n<ul>\n<li>Our report spurred an <a href=\"https:\/\/www.reuters.com\/article\/us-usa-airports-security\/senators-seek-to-stop-expansion-of-airport-facial-scans-idUSKBN1EF29G\">oversight letter<\/a> from Senators Mike Lee (R.-Utah) and Ed Markey (D.-Mass.), calling on DHS to justify various aspects of the program.<\/li>\n<li>Senator Lee followed up with an op-ed in <a href=\"http:\/\/dailysignal.com\/2017\/12\/28\/invasive-new-airport-screenings-may-put-privacy-risk\/?mc_cid=d4c99ccc1c&amp;mc_eid=7f301efaba\"><em>The Daily Signal<\/em><\/a>. DHS\u2019 decision to scan Americans\u2019 faces without congressional authorization, he said, \u201cstands in direct conflict with the Constitution and its Fourth Amendment protection of privacy.\u201d<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The Department of Homeland Security is planning to spend over a billion dollars to scan travelers\u2019 faces &#8211; including Americans &#8211; as they leave the United States. The problem? There\u2019s [&hellip;]<\/p>\n","protected":false},"author":115,"featured_media":0,"parent":62,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-65","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/65","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/comments?post=65"}],"version-history":[{"count":64,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/65\/revisions"}],"predecessor-version":[{"id":3671,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/65\/revisions\/3671"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/62"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/media?parent=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}