Problems with airport security? Tell the TSA on its new blog
The Transportation Security Administration aims for "lively, open discussion" on airport security
TSA Administrator Kip Hawley noted on the blog that there is no time for agency personnel to answer passenger questions during the airport screening process. Screeners have no time to explain to passengers why they are asked to do certain things and can only demand that they follow orders. The blog, he said, provides a forum to explain processes and to allow passengers to suggest changes to the TSA checkpoint processes.
"One of my major goals of 2008 is to get TSA and passengers back on the same side, working together," Hawley wrote. "We need your help to get the checkpoint to be a better environment for us to do our security job and for you to get through quickly and on to your flight. We will not only give you straight answers to your questions, but we will challenge you with new ideas and involve you in upcoming changes."
Hawley noted that while he and other senior leaders at TSA participate in the discussion, a team of TSA moderators runs the blog.
"Our hosts [moderators] aren't responsible for TSA's policies, nor will they have to defend them -- their job is to engage with you straight-up and take it from there," he added. "Our postings from the public will be reviewed to remove the destructive, but not touch the critical or cranky."
As of Thursday morning, the blog had garnered 125 comments, most from passengers asking questions about common security practices like requiring passengers to remove their shoes in checkpoints or not allowing liquids over a certain number of ounces to be taken aboard a flight on carry-on luggage.
For example, one user who posted as "Anonymous" asked why some metal detectors are more sensitive than others with regard to the user's metal hip replacement.
A user who posted as "Lanz" welcomed the idea of the blog, "providing you actually make use of this blog as something other than a propaganda organ. Please allow as many comments as possible to go through, barring the to-be-expected nuts, spambots and abusive anti-government types. Number one rule of blogging -- be honest."
Another user, who posted to the blog as "I Guess I'm On the List Now," noted that the TSA is "fundamentally broken."
"Confiscating deodorant and sun block?" the user wrote. "Does anyone believe that this kabuki security theater really makes us safer? If you guys are serious about your responsibility to protect the country I suggest you start by not cutting off 'TSA approved' locks anymore, learning and sticking to your own rules and regulations especially those pertaining to passengers with medical problems … [and] immediately crack down on the threatening screeners who shout 'do you want to fly today?' anytime their crazy made-up-on-the-spot orders are questioned by passengers."
- The DDoS Threat Spectrum Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Need to Replace MS Threat Management Gateway? Read this article to learn how F5's Secure Web Gateway solution provides a full set of features that can help you successfully migrate...
- The Shortfall of Network Load Balancing Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- Leave No App Behind with Software Defined Application Services F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services that enables service injection, consumption, automation, and orchestration across...
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Web Apps White Papers | Webcasts