Feeds

Homeland Security takes pity on terror list Ted Kennedys

Birthdays free namesakes

SANS - Survey on application security programs

The Department of Homeland Security has finally taken pity on all those people who share a name with someone on the FBI's "terror watch list."

Today, as reported by the watch list-obsessed USA Today, the DHS told US airlines they can go a little easier on people who suffer from the so-called "Ted Kennedy problem." Senator Kennedy was temporarily barred from boarding several flights in 2004 because his name resembled the alias of a suspected terrorist.

If it wants, an airline can now clear up cases of mistaken identity simply by recording passenger birth dates. Previously, namesakes couldn't avoid heavy duty screening unless they petitioned the Transportation Security Administration (TSA) for redress, and TSA isn't exactly quick with its responses.

"Airlines have the option of providing this opportunity for passengers to give their date of birth to help us validate who the individual is," TSA spokesman Nico Melendez told us. "This will allow the to avoid certain inconveniences."

In February, the TSA rolled out a new website where Americans can complain that the FBI's list has mistakenly delayed their plans, and after just eight months, complaints arrived from more than 16,000 annoyed citizens.

According to the TSA, 97 per cent of those who complained weren't actually on the list. They merely shared a name with someone on it. As of November, the TSA needed an average of 44 days to officially resolve these cases of mistaken identity - i.e. put namesakes on a second list that says they're not on the first one.

Thankfully, the DHS has taken a step to alleviate this backlog. The only question is why it took them so long. Does it really take more than a year to realize that namesakes can be freed if airlines simply record their birth dates?

Melendez described the birth date solution as a stop gap as the TSA readies its Secure Flight program, a new passenger screening system for all airlines. "The challenge up to this point is that the passenger screening system is implemented differently from airline to airline," he said. "Secure Flight will give us a common system across the board, facilitated by the TSA."

So, the TSA was going to capture birth dates on its own, with Secure Flight. But it was slow with Secure Flight too.

Now, of course, we must wait again - for the airlines to actually roll this idea out. ®

3 Big data security analytics techniques

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.