Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity ManagementVideo Surveillance

Zalud Report: Reality and Perceptions; Perfs and Real Heroes

By Bill Zalud
March 1, 2010
Dogs have a place in airport security. U.S. Navy Petty Officer 2nd Class Autumn NoRunner-Herron, at Guantanamo Bay, and her working dog inspect incoming cargo in support of Operation Unified Response, providing humanitarian assistance to Haiti earthquake victims. U.S. Army photo by Sgt. Emily Greene


After the Christmas 2009 alleged terrorist attack on a flight from Amsterdam to Detroit, everyone and their brother had an idea or two about how to strengthen airport security. Spurred on by cable TV talking heads and talk radio, home-grown solutions ranged from shutting down the U.S. border to bringing in more technology and from sniffer dogs to the Israeli answer.

Sorry, but things aren’t so simple.

Sniffer dogs? Well, it takes longer and more dollars to train the dogs than TSA screeners. Plus, the dogs need handlers and they must be rested often.

But what about the Israeli model? That answer, which involves personal interaction and profiling, would grind American air traffic to a halt.


Drive-in Security

Heading to Atlanta’s airport by car, you can take I-85 and turn on to Camp Creek road. And your biggest headache is the traffic, poor signage and expensive parking fees. Travel out of the Ben Gurion International Airport in Israel and it's a different story. Cars heading to Ben Gurion’s terminal are stopped by security agents, who ask one or two questions. Depending on the answers or accent, some cars move into the “More Questions” lane.

In the terminal, security agents search for suspicious behavior – and that’s before check-in, where expensively-trained personnel examine travel documents and ask more questions. The Ben Gurion screeners concentrate on tone and body language. Some folks, again, find themselves in the “More Questions” line.

The Israeli system works.

That’s thanks to the willingness of Israel to spend a lot of money and the fact that Ben Gurion handles, at most, 10 million passengers a year, which is about the same as Puerto Rico’s San Juan airport and a bit fewer than Hartsfield-Jackson’s 90 million passengers. Of course, Ben Gurion isn’t the only airport game in Israel. There are 31 others, and some are really highway strips. Out of about 5,000 paved runway U.S. airports, 376 have regularly scheduled airline service.

The Israeli answer just doesn’t scale to America. And it never will.

But you just cannot stop the so-called experts and those mom and pop observers from spinning their good ideas. One of those interesting ideas is to turn airport security totally over to the marketplace. “Let’s Go Private” suggested a recent USA Today column. There probably was similar talk at January’s Shooting, Hunting Outdoor Trade Show at the Sands Expo & Convention Center in Las Vegas. But talk there suddenly turned to other matters when federal agents arrested 21 military and law enforcement products industry executives and employees following an indictment charging them with engaging in schemes to bribe foreign government officials to obtain and retain business.


Changing the Corporate Playbook

“This ongoing investigation is the first large-scale use of undercover law enforcement techniques to uncover Foreign Corrupt Practices Act (FCPA) violations and the largest action ever undertaken by the Justice Department against individuals for FCPA violations,” says Assistant Attorney General Lanny Breuer. “The fight to erase foreign bribery from the corporate playbook will not be won overnight, but these actions are a turning point. From now on, would-be FCPA violators should stop and ponder whether the person they are trying to bribe might really be a federal agent.”

The indictments allege that the defendants engaged in a scheme to pay bribes to the minister of defense for a country in Africa. In fact, the scheme was part of the undercover operation.

Also, it’s a slap in the face of our military, police and first responder heroes.

Still, there is always the corporate overachiever.

The director of a British company (He worked out of a converted rural English dairy; red flag, please.) that supplies bomb detectors to Iraq was arrested in January on fraud charges. Iraqi officials had paid a reported $85 million for the detectors, which are hand-held wands with no batteries or internal electronic components, allegedly powered by a user’s static electricity.
KEYWORDS: airport security dogs questions Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Zalund Report: There’s perception and there’s reality. And, then, there’s politics.

    See More
  • Users' Perceptions of Password Security Don't Always Match Reality

    See More
  • Security Officers: How Changing Titles Changes Perceptions

    See More

Events

View AllSubmit An Event
  • April 23, 2025

    Employee Perceptions of Workplace Safety in 2025

    ON DEMAND: Workplace safety continues to be a critical concern in 2025, with employees across industries expressing growing concerns about their safety at work.
  • November 19, 2025

    From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

    ON DEMAND: When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing