New Airport Security Technology

The perceived terrorism and crime threats have urged authorities to increase efforts to develop new screening technologies to enhance the security of the traveling public using civil aviation.

In Israel’s Ben Gurion Airport, a fully automatic baggage screening system, HBS, is already functioning. it was developed by the Israel’s Airport Authority in cooperation with Israeli experts.

 

The US Transportation Security Administration (TSA) and American Airlines, through a joint initiative, will install new screening technology, including automated security screening lanes and computed tomography (CT) scanners, at select American Airlines hubs nationwide this fall.

According to a TSA announcement, the automated screening lanes – already in use at one U.S. airport – incorporate technology and screening station modifications that enhance security effectiveness while decreasing the time travelers spend in security screening by approximately 30%. It is anticipated that the lanes would be deployed to Chicago (O’Hare), Dallas/Fort Worth, Los Angeles and Miami.

American Airlines and TSA also plan to deploy computed tomography (CT) technology at a Phoenix TSA screening checkpoint, as a pilot program set to begin by the end of 2016.

“We are proud to be working collaboratively with the TSA to support next generation screening technology at five of our hubs,” said American Airlines Chief Operating Officer Robert Isom. “These state-of-the-art lanes, along with new detection technology that will be tested in Phoenix, will enhance security effectiveness and efficiency, while improving the customer experience.”

Some of the unique features of the advanced equipment include:

  • Automated belts that draw bags into the X-ray machines, returning the bins back to queue after completion of the screening.
  • Bags with a potential threat can be directed to a separate area to allow bins behind it to continue through the system uninterrupted.
  • Property bins that are 25% larger than the bins in regular screening lanes.
  • Unique Radio Frequency Identification (RFID) tags that are attached to each bin to allow for additional accountability of items as they transit throughout the system.
  • Cameras that capture photos of the outside of the bag, which is linked to the X-ray image of the bag’s contents.

CT technology, currently only used at US airports to screen checked bags, is expected to significantly improve the throughput when added to the screening process in Phoenix. 3D CT technology could make it possible to allow passengers to leave liquids, gels and aerosols, as well as laptops, in their carry-on bags at all times. This results in a quicker throughput and less bin use. If the pilot testing is successful, TSA may deploy CT technology to other checkpoints nationwide.

TSA, in collaboration with vendors, airlines, airports, and across the counter-terrorism community, will roll out additional automated checkpoint lanes to improve the screening process as well as help minimize wait times, with hope to incorporate automated security checkpoint lanes at all US airports.

I-HLS

 

« Israeli Business Expands Its Cyber Footprint
CISOs Need Teamwork & A Strategic Framework »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

ProtonMail

ProtonMail

ProtonMail is an easy to use secure email service with built-in end-to-end encryption and state of the art security features.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Exabeam Cyberversity

Exabeam Cyberversity

Exabeam Cyberversity is a philanthropic program to help aspiring cybersecurity professionals navigate career options and increase industry-wide diversity through knowledge sharing and networking.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

European Cybersecurity Competence Centre (ECCC)

European Cybersecurity Competence Centre (ECCC)

The ECCC aims to increase Europe’s cybersecurity capacities and competitiveness, working together with a Network of National Coordination Centres to build a strong cybersecurity Community.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.