Advanced imaging technology is designed to bolster security by safely screening passengers for metallic and non-metallic threats—including weapons, explosives and other objects concealed under layers of clothing.

Commercial Pilot Barred After Refusing Full-Body Scan

A pilot was denied from passing through security at Memphis International Airport Oct. 15 after he refused to submit to a full-body scan or a manual pat down.

Michael Roberts, a pilot for Houston-based ExpressJet Airlines, left the airport after Transportation Security Administration officials asked him to leave.

Roberts recounted his experience on The Pipe, a forum for aviation professionals. He said as he was passing through security on his way to work, he was asked to pass through an advanced imaging technology (AIT) unit, which screens passengers for metallic and non-metallic threats—including weapons, explosives and other objects concealed under layers of clothing. Roberts told TSA officers that he did not to go through the AIT unit because he thought it was invasive.

In his post on The Pipe, Roberts said, “These devices enable screeners to see beneath people’s clothing to an extremely graphic and intrusive level of detail (virtual strip searching).”

After refusing, Roberts said he was told he would have to go through a secondary screening, which would involve a TSA officer frisking him. Roberts declined. Since he could not enter the terminal, Roberts was told he could go home. He was detained before leaving and was questioned by TSA officials and airport security.

TSA began deploying advanced imaging technology in 2007. Currently, there are 259 imaging technology units at 58 airports.

“Deploying advanced imaging technology at these airports strengthens our ability to protect the traveling public in the face of evolving threats to aviation security,” said Department of Homeland Security Secretary Janet Napolitano. “Through the Recovery Act, we are able to continue our accelerated deployment of enhanced technology as part of our layered approach to security at airports nationwide.”

TSA said it ensures passenger privacy through the anonymity of AIT images—a privacy filter is applied to blur all images; in the operational mode images are permanently deleted immediately once viewed and are never stored, transmitted or printed; and the officer viewing the image is stationed in a remote location so as not to come into contact with passengers being screened.

After leaving the airport and arriving home, Roberts learned that TSA had contacted his supervisor in Houston about the incident. “Shortly after I got home, my boss called and said they had been contacted by the TSA,” Roberts said. “I suppose my employment status at this point can best be described as on hold.”

A USA Today/Gallup poll found that 78 percent of air travelers approve of U.S. airports’ using AIT units. The poll was conducted Jan. 5-6, 2010, using interviews from 542 air travelers.

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3