That’s the TWIC

Steps can be taken to ensure airport security magically complies with federal mandates

FACED with the prospect of security threats and ever-changing federal regulations, many airports have been stymied in the quest to enhance the safety of air travel. Fortunately, the evolution of the Transportation Worker Identification Credential program provides a useful guide that airports can confidently follow without fear of technology obsolescence.

TWIC’s objective is to improve security through better identity management; using end-to-end credentialing, identity proofing and identity vetting. Under TWIC, the Transportation Security Administration is issuing a uniform credential to transportation workers to tighten security and eliminate the need for multiple, redundant background checks. TWIC uses an interoperable template, which allows organizations to purchase readers from virtually any vendor, as long as the template generator and matcher conform to TWIC guidelines. In other words, adopters of TWIC will not be locked into a particular product or vendor. If users decide to switch manufacturers, they can purchase readers from a different vendor without having to reissue cards.

Likewise, TSA is planning to certify biometrics for airport use without requiring a specific credential. Airports can be proactive about security and adopt TWIC standards while retaining the interoperability and flexibility of their security systems.

There are a number of factors to consider when dealing with airport security. Some of the following measures are a direct result of mandates, such as TWIC, while others are best practices to ensure the overall safety of passengers and employees of various airports.

Carefully evaluate new processes. Often when looking at new regulations, people tend to focus too much on the technology and too little on the processes required to put technology to its best use. In the case of TWIC, it’s important to bind individuals to their identities. To that end, no one entity should have the ability to issue a credential. This way, there is a high level of trust that the process for producing and receiving the credential is secure.

For example, an employee can be required to present an I-9 document, photograph, employee record and fingerprint, which would all be digitally encrypted by a “trusted agent.” That packet would then go to a central system where background checks are conducted. Once the package is reviewed and the individual is verified, the package is sent to a secure facility where the card is printed and encoded. Once credentials are issued, individuals require three factors to verify their identities: something they have (a photo ID), something they are (a biometric fingerprint) and something they know (a PIN). Following such stringent procedures helps ensure integrity of credential issuance, provisioning and use.
Enable systems to communicate. Integration is a critical factor in airport security. Security teams are vastly more efficient when the security tools at their disposal—from access control systems to video surveillance—are able to communicate with one another.

Establish peer-to-peer relationships. Airports would be well-served to learn from the experiences of their peers. Some smaller airports, such as Little Rock, Ark., National Airport, have been using biometric technology for years. Leveraging the knowledge and experiences from others like this can help avoid costly pitfalls.

Allow for multiple security roles. In an airport environment, system integration can be challenging since different organizations are responsible for different areas. For example, the airport is responsible for securing doorways to airfields, while TSA handles passenger checkpoints. Having role-based security systems in place helps ensure that this clear delineation of duties will not be compromised. For example, security systems can be configured to make sure individuals have access only to information needed to fulfill duties.
Also, it is useful to consider systems that can be configured to adapt instantaneously to different threat levels. This involves automatically locking certain doors or sending an alert to all security personnel to revise screening practices. Taking proactive measures ensures in the event of a potential hazard, the entire facility and security team will be prepared to avert crises.

Proactive security
Surveillance is an important aspect of airline security. However, having personnel simply staring at a group of monitors is not enough. Airlines should employ proactive tools, such as video analytics, that catch and instantly alert security to any suspicious activity.
Choose an experienced partner. Select a reputable integrator well-versed both in airport regulations and enterprise security systems. Airports are much like campuses because the facility involves multiple zones and buildings, as well as various types of personnel. It is imperative to have partners with experience in installing and deploying expansive systems.

TWIC will initially be applied for credentialing and background checks on civilians at seaports. However, these common sense practices will help airports and other organizations navigate as they establish strong technologies and operating procedures to confirm the identity of their workers. The end result will be safer travel and a more secure environment for passengers and employees.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.