New Airport Security Technology

The perceived terrorism and crime threats have urged authorities to increase efforts to develop new screening technologies to enhance the security of the traveling public using civil aviation.

In Israel’s Ben Gurion Airport, a fully automatic baggage screening system, HBS, is already functioning. it was developed by the Israel’s Airport Authority in cooperation with Israeli experts.

 

The US Transportation Security Administration (TSA) and American Airlines, through a joint initiative, will install new screening technology, including automated security screening lanes and computed tomography (CT) scanners, at select American Airlines hubs nationwide this fall.

According to a TSA announcement, the automated screening lanes – already in use at one U.S. airport – incorporate technology and screening station modifications that enhance security effectiveness while decreasing the time travelers spend in security screening by approximately 30%. It is anticipated that the lanes would be deployed to Chicago (O’Hare), Dallas/Fort Worth, Los Angeles and Miami.

American Airlines and TSA also plan to deploy computed tomography (CT) technology at a Phoenix TSA screening checkpoint, as a pilot program set to begin by the end of 2016.

“We are proud to be working collaboratively with the TSA to support next generation screening technology at five of our hubs,” said American Airlines Chief Operating Officer Robert Isom. “These state-of-the-art lanes, along with new detection technology that will be tested in Phoenix, will enhance security effectiveness and efficiency, while improving the customer experience.”

Some of the unique features of the advanced equipment include:

  • Automated belts that draw bags into the X-ray machines, returning the bins back to queue after completion of the screening.
  • Bags with a potential threat can be directed to a separate area to allow bins behind it to continue through the system uninterrupted.
  • Property bins that are 25% larger than the bins in regular screening lanes.
  • Unique Radio Frequency Identification (RFID) tags that are attached to each bin to allow for additional accountability of items as they transit throughout the system.
  • Cameras that capture photos of the outside of the bag, which is linked to the X-ray image of the bag’s contents.

CT technology, currently only used at US airports to screen checked bags, is expected to significantly improve the throughput when added to the screening process in Phoenix. 3D CT technology could make it possible to allow passengers to leave liquids, gels and aerosols, as well as laptops, in their carry-on bags at all times. This results in a quicker throughput and less bin use. If the pilot testing is successful, TSA may deploy CT technology to other checkpoints nationwide.

TSA, in collaboration with vendors, airlines, airports, and across the counter-terrorism community, will roll out additional automated checkpoint lanes to improve the screening process as well as help minimize wait times, with hope to incorporate automated security checkpoint lanes at all US airports.

I-HLS

 

« Israeli Business Expands Its Cyber Footprint
CISOs Need Teamwork & A Strategic Framework »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

Industrial Internet Consortium (IIC)

Industrial Internet Consortium (IIC)

The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.