Risk
8/7/2009
11:51 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

TSA OKs Biometric Security For Flight Crews

The stage is set for a Transportation Security Administration pilot program that accelerates flight crew security screening in airports.

The Transportation Security Administration has approved standards for a new security program that sets the stage for nationwide expansion of a program that will use biometric identifiers to verify flight crew members.

The system, called CrewPASS (short for Crew Personnel Advanced Screening System), allows flight crew members who opt into the program to move quickly through security checkpoints by checking biometric credentials, an airline-issued ID, and another form of identification against a database of airline employees that includes pictures of employees for further verification.

Airline security being what it is after 9/11, some flight crew members will be pulled aside for random screening even after going through CrewPASS, but the system should accelerate crew members through security.

Currently, airline crew members have to go through the same process as airline passengers, though they can often be observed being taken to the front of long passenger security lines.

CrewPASS was created by the Air Line Pilots Association International in 2007 and further developed in conjunction with the TSA, partially in response to a law passed to fulfill the recommendations of the 9/11 Commission. Provisions in that law required that the TSA create plans for an ID management system for flight crew members that would expedite their security checkpoint process.

Pilot CrewPASS programs are currently in place at airports in Baltimore, Pittsburgh, and Columbia, S.C., with contractor ARINC.

Though privacy worries have long been cause for pause, biometrics are increasingly being used and considered by government agencies as another tier of security.

Sen. Charles Schumer, (D-N.Y.), recently said he would be introducing a bill that would require all government contractors to use biometric identifiers as part of E-Verify, a forthcoming system that aims to prevent undocumented immigrants from doing government work.

In a panel discussion earlier this week, Department of Defense officials lauded the importance of biometrics in military security.


InformationWeek Analytics has published an independent analysis on strategic security. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.