9/11 Security Analysis

686 Words2 Pages

Understanding a few areas where technology can be very beneficial is beneficial. Specifically, security measures or screening methods need to be reviewed. Since 9/11 many different areas have changed in the way airports conduct business. Security is always a serious concern and needs critical thinking. Airport security is not an area to lose focus on when it comes to security processes needed. One area needing some prevention and is a concern is the insider threat.

An insider threat can happen in just about any area needing employment. The old saying, "a wolf in sheep's clothing" is not to far off for the security screening professional. Security screeners are needed in many different security positions and could look a little different …show more content…

In the past, security screeners have had some insider threat concerns. Some examples would be, smuggling drugs, not screening certain individuals, stealing, or causing serious destruction to assets. The last thing a country needs is an insider threat attacking and causing chaos at airports or on an airline. The insider threat needs to be checked at the door and this can be done with a proper screening process.

Furthermore, the screening process is a twofold process. First, each employer needs to ensure background checks and interviews are conducted properly. A background check should consist of filling out a questionnaire with specific questions needing further review. The further review is to have management or a private investigator ask question based off how each applicant answers questions. Also, fingerprinting needs to take place to ensure a wants and warrants check is cleared.

Also, a financial check needs to not be missed. Security personnel employed by companies should not have serious financial concerns. Airport security is a critical position to national security. The last concern management and leadership needs to have is an airport screener getting paid off to give information. Not only would information be given out, but letting individuals access unauthorized areas could be concerning. After all pre-screening methods have check out, an interview needs to

Open Document