Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

ISC First Day: TWIC Isn’t a Candy Bar; Packages Get Screened

April 1, 2009

Homeland security remains strong and visible at ISC West. One example is the Transportation Worker Identification Card program and another is package screening for corporations.

An example, L-1 Identity Solutions is showing its TWIC-Station, a new access control device capable of reading a wide range of secure government credentials based on the FIPS 201 standard including TWIC, PIV and CAC endpoint cards. The device also offers single or multi-factor authentication control with support for PIN codes and is a fixed access TWIC readers capable of matching the fingerprint of a PIV cardholder to the biometric stored on the card.

“This multi-factor authentication, multi-card type reader represents the most versatile product on the market today and is ideal for helping U.S. ports and vessel operators meet the program goals for TWIC with a highly secure, yet flexible device that is easy to install and simple to use,” said Rob Douglas, President of the Enterprise Access Division of L-1.

The federal TWIC program provides a tamper-resistant biometric credential to maritime workers requiring unescorted access to secure areas at U.S. ports and to vessels regulated under the Maritime Transportation Security Act (MTSA). The cards are also issued to all U.S. Coast Guard credentialed merchant mariners. Government employees accessing maritime ports and vessels can use a PIV or CAC identification card for entry. TWIC and PIC secure credentials are based on U.S. Federal Information Processing Standard 201 (FIPS 201) that requires all government agencies to authenticate employees, contractors, and civil servants using stronger authentication methods, including fingerprint biometrics, for access control.

The L-1 TWIC-Station meets the latest TWIC Reader Hardware and Card Application Specifications issued by the Department of Homeland Security (DHS) and Transportation Security Administration (TSA). It supports multiple credentials based on the FIPS 201 model and can read PIV fingerprints. The unit’s fingerprint algorithm is GSA-approved and FIPS 201 compliant and the UPEK TCSI fingerprint sensor offering 500 DPI is FIPS 201 compliant and FBI approved. www.l1id.com

In another example, Orsus told ISC attendees how the Virginia Port Authority launched a Trusted Agent Program with Orsus’ tracking solution to monitor visitors without the Transportation Worker Identification Credential (TWIC).

The program, being called Trusted Agent by the Virginia Port Authority, allows trusted visitors access to secure areas of the Port by providing them with a Nextel Sprint phone equipped with a radio and navigational system from Xora Co. When paired up with Situator from Orsus, it provides Command Center operators with the ability to track and monitor their whereabouts on Port property and directly contact them.

The Virginia Port Authority came up with this solution after recognizing the challenges posed by TWIC requirements. TWIC requires that anyone needing access to secure areas of Marine Transportation Security Act regulated vessels and facilities to have a Coast Guard issued identification credential or be escorted at all times.

According to Ed Merkle, Director of Port Security and Emergency Operations, Virginia Port Authority, some people coming to the port are one time visitors, such as truckers who have been trusted with bringing secure cargo across the country but do not have a TWIC card. At a cost of $132.50, the card can be expensive for one-time visitors. The other challenge is when a TWIC card carrying person forgets his card for the day. The person would then need to be personally escorted to gain access to the Port.

“That employee can be critical to you,” said Merkle. “These were the problems we were faced with and we asked what’s a possible solution? We’ve heavily invested in our security infrastructure and wanted to identify a way to further leverage it.”

Trusted Agent will enable the Virginia Port Authority to maintain TWIC compliance. The handheld device can notify dispatchers by communicating via Situator if the visitor with the device enters a restricted area, a section of the Port he is not authorized to enter or if the device doesn’t move for a pre-defined period of time.

“The Trusted Agent Solution is part of the new and expanding Situation Management Solutions Library in Situator,” said Jacob Fox, President Americas, Orsus. “This solution demonstrates the ability of Situator to provide organizations with Situation Management Solutions to address specific customer challenges in addition to empowering customers to develop their own custom solutions.” www.orsus.com

From American Science and Engineering—It has introduced at ISC two new Gemini Parcel Inspection Systems: Gemini 7555 and Gemini 100100. These systems along with the Gemini 6040 provide customers with a selection of systems to inspect everything from mail, baggage and break-bulk cargo within mailrooms, lobbies, checkpoints, airports, high threat facilities and other security-sensitive areas. Gemini continues to be the first and only conventional parcel inspection system to combine multiple technologies —AS&E’s proprietary Z Backscatter X-ray technology and dual-energy transmission — allowing operators to obtain the most information about the contents of a parcel. Operators simultaneously view two images, a Z Backscatter image and a dual-energy image, dramatically increasing the likelihood of finding hidden illegal materials. Gemini’s unique capability to detect both metallic and non-metallic threats — even in cluttered environments — makes it an invaluable inspection tool for security officials. www.as-e.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • airplane lands on runway

    US holiday travel returns to pre-pandemic levels

    See More
  • ISC2 security congress 2021

    (ISC)2 prepares for Security Congress 2021

    See More
  • New Software Platform for Improved Situational Awareness

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!