TRANSPORTATION SECURITY ADMINISTRATION – Progress and Challenges Faced in Strengthening Three Key Security Programs, GAO, March 2012 (CORE1004)

Summary: The report discusses status and future challenges of the Transportation Security Administration’s three key security programs: The Advanced Imaging Technology (AIT), the Screening of Passengers by Observation Techniques (SPOT) and the Transportation Worker Identification Credential (TWIC) program. The two earlier programs are related to the passenger security, which not in the scope of the CORE project. The third TWIC program – an initiative for vetting backgrounds of maritime workers that require access to regulated maritime facilities and vessels – is the only program on supply chain security. The report recommends that the Department of Homeland Security (DHS) would improve its internal procedures (e.g., enrolment practices, background checking and quality control) and define and measure performance criteria for assessing the TWIC program’s efficiency and effectiveness. This GAO report discusses mainly passenger security programs that are not interesting for the CORE and for most of the project partners. However, learning about the TWIC program might be useful for at least those CORE demonstrations on maritime supply chain security. The document is available for download at: http://www.gao.gov/assets/590/589587.pdf (accessed 12.3.2016)

[s2If is_user_logged_in()]

Full review: This GAO report has only a limited use in the CORE project because of its emphasis on passenger security programs (the Transportation Worker Identification Credentials (TWIC) program is the only program discussed in the report that has something to do with supply chain security). The CORE’s maritime demonstrations may find it useful to learn about the US way for managing credentials and access to regulated maritime facilities and vessels. The CORE’s risk cluster might learn something about conducting risk-based background checks for logistics workers, and the CORE’s educational cluster might use the description of CWIT, that this report provides, to produce training material and guidebooks on how to implement and maintain access control schemes.

CORE1004

[/s2If]

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *