TSA Approves Biometric Readers For TWIC Pilot

The Transportation Security Administration has approved four biometric readers from Sagem Morpho for deployment in critical pilot tests of the Transportation Worker Identification Credential program at major U.S. ports including Los Angeles, New York and Long Beach, Calif.

“TSA approval means that Sagem Morpho biometric readers meet the highest standards for protecting the security of biometric information passed between a person, a TWIC card and the reader,” said James Conniff, Sagem Morpho senior director for access control. “Major U.S. ports participating in the TWIC pilot implementation now have approval to purchase and deploy the Sagem Morpho readers.”

In July, Sagem Morpho -- a developer of biometric solutions including fingerprint, iris and facial recognition -- submitted three fixed physical access control biometric readers and one handheld portable reader to TSA for ICE testing.

The Sagem Morpho products included were the MA120w, MA521, OMA521 Outdoor, and Morpho Check portable. The Morpho OMA521 and MA521 are the only biometric readers with “fake finger detection” capability to receive TSA approval. The OMA device is also one of the few such readers designed specifically for use in the harsh outdoor environments typically found in ports.

“Once deployed by TSA, the Sagem Morpho biometric readers will ensure that access to U.S. port facilities and vessels is strictly limited to workers with authentic TWIC smart cards containing unique biometric identification information,” Conniff said.

Mandated by the Maritime Transportation Security Act, the TWIC program is jointly administered by TSA and the U.S. Coast Guard. The goal of the program is to issue biometric credentials in the form of tamper-resistant smart cards to the nearly one million longshoremen, sailors, truck drivers and other laborers who work at U.S. port facilities and vessels.

TWIC cards and readers must meet Federal Information Processing Standards No. 201 (FIPS-201), which require nationwide interoperability to guarantee that biometric identification data can be recognized and verified at any maritime port.

TSA has already begun issuing TWIC cards. Each contains a Card Holder Unique Identifier (CHUID), which includes personal information (name, address, picture, etc.) and a Federal Agency Smart Credential Number (FASCN). Also, encrypted into the card is a unique digital biometric identifier, usually a fingerprint. This information can only be unlocked, or decrypted, with a privacy key uniquely associated with that card. To gain access to a secure port facility, the worker must have his or her TWIC card read by an approved device.

All Sagem Morpho products approved by the TSA TWIC ICE program feature contactless smart card readers and the capability to decrypt the biometric from the TWIC card using the unique TWIC privacy key read from the card.

Featured

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.