請依下文回答第 52 題至第 56 題
The Customs Administration’s canine division last year helped customs officers ____51____ 758kg of
illegal drugs, which were valued at NT$330 million (US$11.86 million). Most of the narcotics detected
by sniffer dogs were ketamine, the agency said. Taiwan has 37 detection dogs, with each dog working
with one dog handler. Detection dogs are put ____52____ duty whenever high-risk flights arrive, and they
must finish ____53____ the luggage in about 10 minutes, it added. With the establishment of the Maritime
Express Consignments Clearance service at the Keelung Customs Office and the construction of Taiwan
Taoyuan International Airport’s Terminal 3 expected to be completed in 2026, the center said it is aiming
to expand the canine division from 37 to 44 sniffer dogs by 2025. The center said that its main task in the
next few years is to train more Labradors to find tobacco, narcotics or explosives ____54____ the Military
Police Command, the National Fire Agency, the National Police Agency, the Bureau of Animal and Plant
Inspection and Quarantine, and other agencies. The success rate of training Labrador puppies to become
detection dogs has reached more than 20 percent, as puppies born from second-generation dams tend to
be stronger and healthier, it said. As the ____55____ of puppies is expected to double in the next three years,
people living south of Taoyuan or north of Yunlin County are encouraged to become foster families of
puppies, the center said, adding that companies in central Taiwan can offer facilities for puppy training.
請依下文回答第 57 題至第 61 題
With so many people crossing borders every day, how do we know we’re not letting dangerous people
into our countries? One response is biometric identification technology. It has been developed to recognize
individuals and to identify criminals. In fact, biometric identification is not a new invention. Law
enforcement agencies have been using photographs and fingerprints as biometric identifiers since the late
19th century. Today, biometric identification technology, including both physiological and behavioral
biometrics, has become increasingly prevalent as a means of enhancing security and protecting individuals'
interests. Physiological biometrics, such as fingerprints and facial features, use human morphology to identify
or recognize individuals. Besides fingerprint scanners, there are software programs that identify faces,
palms, and irises. Scanning these physical features ensures that the person being scanned is who he or she
claims to be. Unlike personal identification numbers, which are used to access bank accounts, biometric
identifiers are extremely difficult, if not impossible, for criminals to steal.
Behavioral biometrics can also be used to identify people. Certain behaviors are unique to individuals,
such as their speech or the way they type. The classic behavioral biometric marker is a person's signature,
but it can be problematic as it can be copied. However, people do automatically recognize subtleties in the
way a person speaks, such as intonation and regional accents. Typing patterns, likewise, would be very
difficult to observe and mimic convincingly.
Biometrics can have two potential applications: identification and identity verification. Identification
uses biometric information to discover the identity of an unknown person. DNA evidence has joined
fingerprints as a common tool of law enforcement for this purpose. Today, we use passports to verify our
identity when crossing borders, but passports can be stolen or forged. An effective biometric identification
system would be difficult to fool. Because of this, many countries are considering biometric additions to
or replacements of existing identification system. India, for instance, has already implemented such a
system, which utilizes fingerprint and iris scans, in addition to photographs.
While biometric identification technology shows promise in various applications, there are ethical
concerns surrounding the development of biometric identification technology. Critics worry about the
possibility of criminal uses of the technology, as legitimate organizations can use biometric scanners to
verify personal information. And civil liberties advocates are concerned about the potential for abuse by
authorities. Therefore, policymakers will need to balance security and law enforcement against personal
freedom and privacy. Ethical considerations must be taken into account when developing biometric
identification technology.
What is the main idea of this passage?
A
The ethical problems with biometric identification
B
Biometric identification, its uses, and its challenges
C
Biometric identification and its history in law enforcement.
D
The difference between physiological and behavioral biometrics.