Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Federal Regulations Changing the Way of Port Identification

July 1, 2009
The Port of Los Angeles has decided to test a vascular biometric solution to check-in Port visitors according to TWIC regulation.


Federal regulations for our nation’s ports have finally come to a head with the implementation of TWIC. And now, instead of only having the smart card checking in workers and visitors, there is the addition of biometric readers.
     
As with any program, initial rollout of TWIC proved sluggish. The TSA realized that changes were to be made, since the 1.2 million individuals that were projected to enroll and utilize TWIC were taking much too long to check into their assigned areas. These individuals include, “Coast Guard-credentialed merchant mariners, port facility employees, long shore workers, truck drivers and others requiring unescorted access to secure areas of maritime facilities and vessels regulated by the Maritime Transportation Security Act of 2002,” according to TSA.
     
TSA decided the best option would be to incorporate an additional layer of security with a biometric solution. This would require all workers to present a smart card that contains all background check information plus a biometric of some sort.


Port of Los Angeles

The Port of Los Angeles has taken on the installation of a vascular biometric reader, which should allow workers to pass through, checked and double checked, at a rate of 3 workers in 7.6 seconds.
     
Unlike other biometric solutions, vascular patterns on the back of the hand are highly unique, and cannot be duplicated. This particular system also requires the actual blood flow through a live vein. Dual verification happens when the smart card and the vascular biometric is checked against each other, further increasing security at the Port.
     
Because of the quick throughput of the system, workers’ identification is verified quickly, which helps deter lines and wait time during ID checks.
     
Skin conditions, such as callused hands, scars or dirt, will not interfere with the identification process, either. And unlike biometric systems that read irises, this vascular biometric system works in all lighting conditions.
     
The Port of Savannah, Ga., which is particularly committed to the rules and regulations of its facilities, chose to use a vascular biometric permanently to screen its visitors.
Port of Houston Authority
     
The Port of Houston Authority (PHA) has included handheld card reader technology from Datastrip and Code-bench. Almost 7,000 workers have been enrolled in the Houston TWIC cardholder program.
     
“The Port of Houston Authority’s top priority is to maintain a secure port that ensures individuals who pose a threat do not gain access to secure areas of the nation’s maritime transportation system,” said Bill Crews, port security and emergency operations manager at PHA. “The TWIC solution allowed us to enroll thousands of transportation workers into our existing access control system in a timely manner in order to take full advantage of the increased security layer offered by the TWIC process.”
     
To meet the April 15 compliance deadline, PHA initiated an aggressive outreach program through which authorities visited trucking companies to remotely enroll drivers using mobile readers.
     
Once back at the port, the data was transmitted from the handheld devices to the port’s existing AMAG Symmetry physical access control system. The software checks cardholder data against the TSA hotlist twice daily and notifies PHA if a cardholder appears on the list.      
     
The U.S. Coast Guard will use the card readers and software to confirm the identity of TWIC cardholders during regular inspections as well as random spot checks. Additionally, this software has been installed in four of the Port’s desktop computers so that TWIC cards can be registered on-site.
     
Ports around the country are beta testing and sampling TWIC program-related technology in order to narrow down the best solution for its particular identification needs and environment. TSA, along with the U.S. Coast Guard, will be using the test-run systems for a while until a final determination can be made.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Coding

Epstein File Data Security Update: Raw Code Found in Emails

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-computing-freepik

    CISOs to developers: Changing the way organizations look at authorization policy

    See More
  • two-way-radios-1170.jpg

    Evolution of two-way radios meets changing enterprise security needs

    See More
  • laptop and phone set up for work

    Are federal regulations the watershed moment for zero trust?

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing