Security Badge Abuse at DFW Airport

Security Badge Abuse at DFW Airport

With airport security being such a serious issue, what good is a security badge allowing access to restricted areas if employees abuse their privileges by allowing family members and friends to access secure areas or to even skip checkpoints to board flights? Seems to me that is a major security breach that could lead to dangerous situations for all people in an airport environment.

NBC 5 dove into this issue by producing a segment (scroll down to see video) about the Dallas/Fort Worth International Airport by exposing government officials and top airline executives caught in the act of abusing their Secure Identification Display Area (SIDA) badges. The rules of these badges are simple:

  • Badges can only be used by on-duty employees; and
  • Badge owners are not allowed to take anyone else through employee-only areas.

And, airport employees even sign a piece of paper indicating that they have read and understand the badge rules.

So, what happened?

Badge Seizure #1

An off-duty Continental Airlines worker, obviously anxious to get back home to Ohio, used his badge to allow his whole family, including himself, his wife and their two children, to board a van at a cargo facility and be driven across the airport ramp to terminal E. They would have made it too if a police officer hadn’t heard children laughing on the airport ramp. DFW police seized his security badge.

Badge Seizure #2

Fred Cleveland, a senior vice president and chief operating officer at American Eagle Airlines, was caught escorting his wife through the employee portal so they could welcome their daughter who was flying in. Receiving what I call a “slap-on-the-wrist,” Cleveland had to complete a badge re-training program before taking re-possession of his seized badge.

Badge Seizure #3

An off-duty American Airlines pilot, apparently decided to take a trip, but when he arrived at the airport and noticed the long lines at the checkpoints, he chose to use his badge to avoid the wait. His badge was seized.

Badge Seizure #4

An American Airlines flight attendant was caught sneaking a backpack through an employee entrance, giving it to her husband boarding a flight to Germany. Sarcastic tone, “Hmmm, not suspicious at all! I’m surprised she got caught!” Her badge was seized.

Badge Seizure #5

A TSA supervisor was caught by DFW police taking another worker through an employee door, obviously a place the worker shouldn’t have been, because the supervisor’s badge was seized.

Badge Seizure #6

A Federal Aviation Administration manager was caught using his badge to board a flight for personal reasons. Officers seized his badge.

Badge Seizure #7

An analyst working for the DFW airport board, the agency that actually issues the security badges, was caught escorting her husband through an employee door to board a flight. Police seized her badge.

In all seven of the above situations, I can think of at least five terrible events that could have transpired, resulting in injuries and deaths of a huge number of people. With the 9/11 tragedy, the Boston bombings, the Newtown incident, among many others, though not all directly related to an airport scenario, you would think that government officials and top airline executives would realize just how important security protocols are to the safety and security of everyone.

Larry Wansley, airport security consultant, sums it up nicely, “Sometimes, unfortunately, humans do some really stupid things.”

Check out NBC 5's exclusive about security badge abuse at DFW airport:

View more videos at: http://nbcdfw.com.

(Source: http://www.nbcdfw.com/investigations/Airline-Airport-Employees-Caught-Abusing-Security-Badges-205288061.html)

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • New Uses for AI

    New applications of AI in IP cameras are delivering precise detection, robust search capabilities, elevated data analysis and enhanced image quality. When combined with built-in analytics, AI can help streamline forensic investigations and also supports several mission-critical business functions. Read Now

  • The Critical Missing Piece

    As technology advances, security programs have invested heavily in advanced systems and sensors. These sensors generate massive amounts of data, often overwhelming the security teams tasked with monitoring them. AI technology promises to sift through this data, using logic and reasoning to differentiate potential threats from non-threats. Read Now

  • Computers Beginning to Come Back Online After CrowdStrike Caused Crash Friday

    Computers around the world are beginning to come back online after a defective update to Windows machines from cybersecurity provider CrowdStrike Friday affected almost 9 million machines. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3