Feeds

No-fly list grounds US Air Marshals

Bureaucrat's memo takes on blacklist madness

The essential guide to IT transformation

One aspect of the American response to air safety in the year after the September 11 attacks that generated relatively little controversy was welcome expansion of the Federal Air Marshal program - other than some concerns about what kind of weapons could be used safely within a pressurized cabin, really, who could complain about extra beat cops in the sky? Airport rent-a-cops, that's who.

According to the Washington Times, in the years since the widespread dissemination of terrorist watch lists, airline customer service reps have repeatedly turned away frustrated Federal Air Marshals (FAMS) whose names match or bear an uncomfortable resemblance to names on whatever dodgy watch list is at hand. Feeling safer now?

"In some cases, planes have departed without any coverage because the airline employees were adamant they would not fly,” one unnamed air marshal told the paper. “I've seen guys actually being denied boarding.” Another unnamed marshal chimed in that a colleague “has been getting harassed for six years because his exact name is on the no-fly list.”

The database gnomes are notoriously stubborn about revising inaccurate information, prefering to hoard as much information as they can, whether useful or not. With the expansion of private security databases and their related lists, as we have noted before, the problem will inevitably get worse. Although the FAMS are employed by the Transportation Security Administration (TSA) - ahem, the same outfit that distributes those watch lists to the airlines - the upper bureaucracy of the TSA could apparently only muster up a feeble memo to address the problem.

Really, what more do we expect out of the assistant director of flight operations?

Gregory Alter, spokesman for the Federal Air Marshal Service, acknowledged that "in rare instances air marshals, like all travelers, are occasionally misidentified as being on a watch because of name or personal identifier similarities to individuals actually on the lists,” but, he added, the new security directive (SD) “mitigates any misidentification concerns by empowering airlines to quickly clear an air marshal’s status after positively identifying their law enforcement status.”

Oh really? Aggressive enforcement of inaccurate leads is a waste of manpower, and no flurry of bureaucratic memoranda will ever properly vet a security database. That requires the kind of vigilence and determination not typically associated with data entry gnomes. Databases will always expand, and fiasco will follow upon fiasco. Ask Canadian Karen Allen, whose husband, after forty-five years of crossing to the States to go shopping, single-handedly shut down an entire border crossing the other day.

Ten to fifteen agents surrounded the car of the suspicious Canucks. “My daughter-in-law was also handcuffed and I was patted down,” said Karen Allen. “And all of this happened in front of my two very scared grandchildren. Myself and the children were directed to the customs office,” said Mrs. Allen.

“I wonder what would have happened to the children had I not been there. Apparently Chris’s name was similar to a black guy who broke out of jail in some southern state. He was released once they decided he was blonde haired, blue eyed, had freckles, and had particularly pale skin. We were told it would likely happen again when Chris tries to cross the border,” she said. “It is totally unbelievable, and if we hadn’t already paid for our trip to Disney World we wouldn’t be going.”

At least she had Disney World. What kind of make-believe world the TSA is flying in is anybody's guess. ®

The essential guide to IT transformation

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
Australia deflates Valve with Steam sueball
Alleges breaches of Oz consumer law
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.