Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

All Eyes on Access

June 5, 2006
The iWatch campaign at Halifax Airport uses bold and clearly articulated posters to get all airport workers involved in the access control security effort.
Programs that involve all employees in access controls, such as iWatch at Halifax Airport, extend the number of eyes viewing the facility and its perimeter beyond a typical security operations center.

When people visit Halifax International Airport, they need not be alarmed if they’re being watched with greater interest than usual. It’s nothing personal.

Halifax International Airport Authority (HIAA) recently launched iWatch -- a new program designed to increase awareness of security threats and encourage the airport community to report suspicious activity. It’s the first and most comprehensive airport security awareness program of its kind in Canada. And it’s part of HIAA’s ongoing efforts to stay ahead of the security curve.

Airport security has always been a top-of-mind challenge for Halifax International Airport and other airports. According to the Canadian Air Transport Security Authority (CATSA), over 738,000 prohibited items were intercepted at pre-board screening checkpoints in Canada’s major airports in 2005. And of those, there were 2,147 critical incidents, such as discovery of a prohibited weapon or explosive, during the same period.

Still broader airport security threats pose a different challenge, since terrorist or criminal acts can take place anywhere in the airport vicinity -- from the perimeter fence to the parking lot.
 

Upon a report from employees through the iWatch program, security can better train its efforts such as Venessa and Brian responding to an employee report of suspicious baggage.

More access control eyes needed

“Airports are more than just terminals and runways. They’re busy commercial neighborhoods; and that means we must be vigilant everywhere there’s a possible threat,” said Eleanor Humphries, HIAA president and CEO. “We believe a community-focused program like iWatch can help make airport security more far-reaching and effective. When you have security agencies working together with businesses and individuals in the area, you create a powerful network of allies.”

This network is vital to helping on-site police and security agencies keep a look-out for suspicious activity. It’s this inclusive approach that gives iWatch its distinct community flavor. In fact, HIAA consulted a diverse range of individuals and businesses in the community while developing the campaign -- from baggage handlers to pilots to ground-service workers. One message came through loud and clear: We’re all concerned about airport security; how can we get involved?

iWatch harnesses the commitment of airport workers and provides them tools to recognize and report suspicious behavior. Posters, brochures and other information are widely distributed throughout the airport community. The material provides clear guidelines on types of suspicious behavior to report. Community members are encouraged to “watch out -- call in” to a central security phone number. Newsletters and updated bulletins also help keep access controls uppermost in people’s minds.

“We all have a vested interest in airport security,” said Peter Clarke, HIAA vice president, operations. “The ultimate goal of iWatch is to create a security culture that reaches deep into the airport community and helps employees identify suspicious activity that may set off alarm bells, thus reducing security infractions and potential breaches.”

Potential terrorist or criminal acts are always on the radar of airport police and security agencies. But airport security incidents -- such as unattended baggage or unauthorized people entering secure areas -- can also have serious ripple effects. So, with a workforce of close to 5,500 people, or nearly 11,000 eyes, the Halifax International Airport community is now ready, willing and better able to keep a closer watch on suspicious activity. V
 

A Remember Dec. 7th poster from historical archives underscores the impact of such communications.

SIDEBAR: Poster Campaigns Have Effective History

If you’ve lived through World War II or are a frequent viewer of programs on the History Channel, you know that posters were effective means of encouraging citizens and factory workers to take up their role in the war effort. Remember Pearl Harbor was an ongoing theme. During the Cold War, military and military contractor company walls were covered with posters alerting employees to keep their eyes open for potential intruders. More recently, retail security operations use posters and often a telephone number to an outsourced firm to encourage sales associates to report colleagues stealing from the store. A new twist: Some corporations show employees a “poster-like” splash page warning as their desktop computer starts up.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Eyes on the Road

    See More
  • the standoff

    The Standoff wraps up; Attackers breach perimeters of all six organizations and gain access to corporate networks

    See More
  • Software Connects Disparate Access Control Systems Across All Geographic Locations

    See More

Related Products

See More Products
  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products

Events

View AllSubmit An Event
  • September 25, 2025

    Cloud or On-Premise: Navigating Access Control and Cybersecurity Choices

    ON DEMAND: Join Schneider Electric for an in-depth webinar exploring the critical decisions security professionals face when choosing between cloud-based or on-premise access control solutions. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing