Feeds

Top airline bosses launch assault on airport ID card plan

And can we mention your border plans are rubbish too?

High performance access to file storage

The bosses of the UK's major airlines have attacked plans to force airport workers to enrol in the national ID card scheme, claiming that "the UK aviation industry is being used for political purposes on a project which has questionable public support."* If anything the move, they say, could reduce security by adding a "false sense of security to our processes."

In a letter sent to home secretary Jacqui Smith under the auspices of the British Air Transport Association, the bosses of airlines including British Airways, Virgin, BMI and EasyJet, the MDs and CEOs of several airports and the general secretary of airline union BALPA express their "determined opposition" to the proposal. It will add extra processes, costs and risks to "an already comprehensive system of identity and record checks", and airside staff "are already the subject of extremely thorough vetting and criminal records checks." ID cards add nothing to this, they say.

And while we're here, can we add that you're screwing up border controls, on our tab? "The UK aviation industry continues to work with the Home Office on a wide variety of initiatives (such as e-Borders) which are adding financial burdens and inconvenience to companies and their customers, but without any compensatory benefits."

For example, they say, there are the more rigorous immigration checks which have been introduced accompanied by "insufficient resources and consequently much longer queues." Junk the cards, they tell Smith, and "the priority for Government attention should be the improved efficiency of border processes which would result in a more reliable operation and better levels of service for the travelling public." ®

* Coincidentally, the Identity & Passport Service this week claimed that support for ID cards remained steady at 59 per cent. Equally coincidentally, No2ID this week denounced the IPS 'tracking research' approach as spin, and published its own independently-conducted research that showed the public split 50-50 on ID cards, but two to one against the underlying database. More details here.

Combat fraud and increase customer satisfaction

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.