Security Badge Abuse at DFW Airport

Security Badge Abuse at DFW Airport

With airport security being such a serious issue, what good is a security badge allowing access to restricted areas if employees abuse their privileges by allowing family members and friends to access secure areas or to even skip checkpoints to board flights? Seems to me that is a major security breach that could lead to dangerous situations for all people in an airport environment.

NBC 5 dove into this issue by producing a segment (scroll down to see video) about the Dallas/Fort Worth International Airport by exposing government officials and top airline executives caught in the act of abusing their Secure Identification Display Area (SIDA) badges. The rules of these badges are simple:

  • Badges can only be used by on-duty employees; and
  • Badge owners are not allowed to take anyone else through employee-only areas.

And, airport employees even sign a piece of paper indicating that they have read and understand the badge rules.

So, what happened?

Badge Seizure #1

An off-duty Continental Airlines worker, obviously anxious to get back home to Ohio, used his badge to allow his whole family, including himself, his wife and their two children, to board a van at a cargo facility and be driven across the airport ramp to terminal E. They would have made it too if a police officer hadn’t heard children laughing on the airport ramp. DFW police seized his security badge.

Badge Seizure #2

Fred Cleveland, a senior vice president and chief operating officer at American Eagle Airlines, was caught escorting his wife through the employee portal so they could welcome their daughter who was flying in. Receiving what I call a “slap-on-the-wrist,” Cleveland had to complete a badge re-training program before taking re-possession of his seized badge.

Badge Seizure #3

An off-duty American Airlines pilot, apparently decided to take a trip, but when he arrived at the airport and noticed the long lines at the checkpoints, he chose to use his badge to avoid the wait. His badge was seized.

Badge Seizure #4

An American Airlines flight attendant was caught sneaking a backpack through an employee entrance, giving it to her husband boarding a flight to Germany. Sarcastic tone, “Hmmm, not suspicious at all! I’m surprised she got caught!” Her badge was seized.

Badge Seizure #5

A TSA supervisor was caught by DFW police taking another worker through an employee door, obviously a place the worker shouldn’t have been, because the supervisor’s badge was seized.

Badge Seizure #6

A Federal Aviation Administration manager was caught using his badge to board a flight for personal reasons. Officers seized his badge.

Badge Seizure #7

An analyst working for the DFW airport board, the agency that actually issues the security badges, was caught escorting her husband through an employee door to board a flight. Police seized her badge.

In all seven of the above situations, I can think of at least five terrible events that could have transpired, resulting in injuries and deaths of a huge number of people. With the 9/11 tragedy, the Boston bombings, the Newtown incident, among many others, though not all directly related to an airport scenario, you would think that government officials and top airline executives would realize just how important security protocols are to the safety and security of everyone.

Larry Wansley, airport security consultant, sums it up nicely, “Sometimes, unfortunately, humans do some really stupid things.”

Check out NBC 5's exclusive about security badge abuse at DFW airport:

View more videos at: http://nbcdfw.com.

(Source: http://www.nbcdfw.com/investigations/Airline-Airport-Employees-Caught-Abusing-Security-Badges-205288061.html)

Featured

  • Security Today Announces The Govies Government Security Award Winners for 2025

    Security Today is pleased to announce the 2025 winners in The Govies Government Security Awards. The awards honor outstanding government security products in a variety of categories. Read Now

  • Survey: 60 Percent of Organizations Using AI in IT Infrastructure

    Netwrix, a cybersecurity provider focused on data and identity threats, today announced the release of its annual global 2025 Cybersecurity Trends Report based on a global survey of 2,150 IT and security professionals from 121 countries. It reveals that 60% of organizations are already using artificial intelligence (AI) in their IT infrastructure and 30% are considering implementing AI. Read Now

  • New Research Reveals Global Video Surveillance Industry Perspectives on AI

    Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency. Read Now

  • SIA Urges Tariff Relief for Security Industry Products

    Today, the Security Industry Association has sent a letter to U.S. Trade Representative Jamieson Greer and U.S. Secretary of Commerce Howard Lutnick requesting relief from tariffs for security industry products and asking that the Trump administration formulate a process that allows companies to apply for product-specific exemptions. The security industry is an important segment of the U.S. economy, contributing over $430 billion in total economic impact and supporting over 2.1 million jobs. Read Now

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.