That’s the TWIC

Steps can be taken to ensure airport security magically complies with federal mandates

FACED with the prospect of security threats and ever-changing federal regulations, many airports have been stymied in the quest to enhance the safety of air travel. Fortunately, the evolution of the Transportation Worker Identification Credential program provides a useful guide that airports can confidently follow without fear of technology obsolescence.

TWIC’s objective is to improve security through better identity management; using end-to-end credentialing, identity proofing and identity vetting. Under TWIC, the Transportation Security Administration is issuing a uniform credential to transportation workers to tighten security and eliminate the need for multiple, redundant background checks. TWIC uses an interoperable template, which allows organizations to purchase readers from virtually any vendor, as long as the template generator and matcher conform to TWIC guidelines. In other words, adopters of TWIC will not be locked into a particular product or vendor. If users decide to switch manufacturers, they can purchase readers from a different vendor without having to reissue cards.

Likewise, TSA is planning to certify biometrics for airport use without requiring a specific credential. Airports can be proactive about security and adopt TWIC standards while retaining the interoperability and flexibility of their security systems.

There are a number of factors to consider when dealing with airport security. Some of the following measures are a direct result of mandates, such as TWIC, while others are best practices to ensure the overall safety of passengers and employees of various airports.

Carefully evaluate new processes. Often when looking at new regulations, people tend to focus too much on the technology and too little on the processes required to put technology to its best use. In the case of TWIC, it’s important to bind individuals to their identities. To that end, no one entity should have the ability to issue a credential. This way, there is a high level of trust that the process for producing and receiving the credential is secure.

For example, an employee can be required to present an I-9 document, photograph, employee record and fingerprint, which would all be digitally encrypted by a “trusted agent.” That packet would then go to a central system where background checks are conducted. Once the package is reviewed and the individual is verified, the package is sent to a secure facility where the card is printed and encoded. Once credentials are issued, individuals require three factors to verify their identities: something they have (a photo ID), something they are (a biometric fingerprint) and something they know (a PIN). Following such stringent procedures helps ensure integrity of credential issuance, provisioning and use.
Enable systems to communicate. Integration is a critical factor in airport security. Security teams are vastly more efficient when the security tools at their disposal—from access control systems to video surveillance—are able to communicate with one another.

Establish peer-to-peer relationships. Airports would be well-served to learn from the experiences of their peers. Some smaller airports, such as Little Rock, Ark., National Airport, have been using biometric technology for years. Leveraging the knowledge and experiences from others like this can help avoid costly pitfalls.

Allow for multiple security roles. In an airport environment, system integration can be challenging since different organizations are responsible for different areas. For example, the airport is responsible for securing doorways to airfields, while TSA handles passenger checkpoints. Having role-based security systems in place helps ensure that this clear delineation of duties will not be compromised. For example, security systems can be configured to make sure individuals have access only to information needed to fulfill duties.
Also, it is useful to consider systems that can be configured to adapt instantaneously to different threat levels. This involves automatically locking certain doors or sending an alert to all security personnel to revise screening practices. Taking proactive measures ensures in the event of a potential hazard, the entire facility and security team will be prepared to avert crises.

Proactive security
Surveillance is an important aspect of airline security. However, having personnel simply staring at a group of monitors is not enough. Airlines should employ proactive tools, such as video analytics, that catch and instantly alert security to any suspicious activity.
Choose an experienced partner. Select a reputable integrator well-versed both in airport regulations and enterprise security systems. Airports are much like campuses because the facility involves multiple zones and buildings, as well as various types of personnel. It is imperative to have partners with experience in installing and deploying expansive systems.

TWIC will initially be applied for credentialing and background checks on civilians at seaports. However, these common sense practices will help airports and other organizations navigate as they establish strong technologies and operating procedures to confirm the identity of their workers. The end result will be safer travel and a more secure environment for passengers and employees.

Featured

  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 2 Recap

    Day 2 was another winner at GSX 2024 in Orlando. Aisles and booths were packed with attendees looking at some of the new and latest security technology. Remember to follow the GSX Live page from Security Today, as well as SecurToday on X and Security Today on LinkedIn to find out more about what’s happening on the show floor during tomorrow’s final day. Here’s what was happening with all four of our partners during the event on Tuesday. Read Now

    • Industry Events
    • GSX
  • How Much Carbon is Your Footprint Leaving?

    A more sustainable future is not only shared responsibility, it is increasingly critical. Securitas, is inviting clients and industry partners to make a difference in an ever-evolving world that faces diverse sustainability challenges. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3