Using Stolen Passports Uncalled For

Using Stolen Passports Uncalled For

Using Stolen Passports Uncalled ForAccording to several media outlets, the two Iranians who used stolen passports to board the Malaysia Airlines jet that disappeared are unlikely to be linked to any terrorist groups. This is a good thing. But, I am still baffled as to how not one but two people boarded an aircraft with stolen passports, especially in the height of all the fuss over airport security.

I know when I traveled to Montreal, Canada about a month ago my passport was checked 4 times before I made it to baggage claim. And, when I was on my way back to Texas from Canada, at the airport, my boarding pass along with my passport was checked at least 4 times that I vividly recall, from security to the terminal. I understand that this is North America, but it seems that all international airports would take the time to adequately check travelers’ passports and other documents, like boarding passes.

Even if passenger documents are checked, if these documents aren’t checked against Interpol’s database of stolen and lost travel documents, travelers using them can apparently slip through layer after layer of security, as we have seen demonstrated in this tragic situation.

In fact, Interpol said that during 2013, passengers were allowed to board planes more than 1 billion times without having their travel documents checked against their Stolen and Lost Travel Documents database that was established in 2002, following 9/11 as a way to help countries protect their borders. Oh, and by the way, the database is FREE to use.

According to Interpol, the US searches their database more than 250 million times annually; the UK more than 120 million times annually; and the United Arab Emirates more that 50 million times annually, so why aren’t all countries around the world utilizing this free resource?

It would seem that with all the smartphones, tablets, laptops and other gadgets along with sophisticated technology that is used worldwide, checking Interpol’s database wouldn’t take longer than a couple of seconds. Besides, I bet there's an app for that!

Precious seconds could be all that stands in the way of preventing a horrible incident from occurring.

(Image Credit: AHMAD FAIZAL YAHYA / Shutterstock.com)

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

  • In The Clouds

    Video data storage in the cloud was a novel concept when Dean Drako founded Eagle Eye Networks back in 2012. While cloud was being used for almost all other business systems at that time, the physical security industry took a cautious and measured approach to cloud adoption. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3