Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Man Takes Box Cutters on Plane at JFK

Security Newswire
March 3, 2011

The Transportation Security Administration said it is sending three screeners for remedial training after a passenger carried three box cutters onto a JetBlue plane at New York's Kennedy airport.

The box cutters fell out of the passenger's carry-on luggage as he was stowing it in an overhead compartment on Flight 837 to Santiago de los Caballeros, Dominican Republic, on Saturday night, authorities said. Police evacuated the flight and questioned the passenger, who said he used the box cutters for his work and had forgotten to take them out of his bag.

TSA officers re-screened all the passengers, and the flight was allowed to take off at 12:35 a.m. on Sunday, about three hours late, JetBlue said.

Three screeners will be disciplined and sent for remedial training for failing to spot the box cutters, TSA spokeswoman Ann Davis said.

"We do take the matter very seriously, and we will certainly ensure that the officers on duty at the time are remediated and disciplined appropriately," Davis said. She would not elaborate on the kind of punishment they would face.

She said images of the bag will likely be used to train officers in the future.

 

  •  
  • KEYWORDS: airport security TSA

    Share This Story

    Looking for a reprint of this article?
    From high-res PDFs to custom plaques, order your copy today!

    Recommended Content

    JOIN TODAY
    To unlock your recommendations.

    Already have an account? Sign In

    • Security's Top Cybersecurity Leaders 2024

      Security's Top Cybersecurity Leaders 2024

      Security magazine's Top Cybersecurity Leaders 2024 award...
      Cybersecurity
      By: Security Staff
    • cyber brain

      The intersection of cybersecurity and artificial intelligence

      Artificial intelligence (AI) is a valuable cybersecurity...
      Columns
      By: Pam Nigro
    • artificial intelligence AI graphic

      Assessing the pros and cons of AI for cybersecurity

      Artificial intelligence (AI) has significant implications...
      Cybersecurity Education & Training
      By: Charles Denyer
    Manage My Account
    • Security eNewsletter & Other eNews Alerts
    • eMagazine Subscriptions
    • Manage My Preferences
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    More Videos

    Sponsored Content

    Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

    close
    • Crisis Response Team
      Sponsored byEverbridge

      Automate or Fall Behind – Crisis Response at the Speed of Risk

    • Perimeter security
      Sponsored byAMAROK

      Why Property Security is the New Competitive Advantage

    • Duty of Care
      Sponsored byAMAROK

      Integrating Technology and Physical Security to Advance Duty of Care

    Popular Stories

    Coding

    AI Emerges as the Top Concern for Security Leaders

    Half open laptop

    “Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

    Shopping mall

    Victoria’s Secret Security Incident Shuts Down Website

    Laptop with coding on ground

    Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

    Gift cards and credit cards

    Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

    2025 Security Benchmark banner

    Events

    June 24, 2025

    Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

    For today's security teams, making informed decisions in the first moments of a crisis is critical.

    July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

    View All Submit An Event

    Products

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    See More Products

    Related Articles

    • Mentally-ill Man Held after Sneaking Past Security at JFK, Boarding Flights Without a Ticket

      See More
    • BLOG LOGO

      Man Accused of Selling Raven, a U.S. Spy Plane, on Ebay

      See More
    • Man Arrested in JFK Airport Security Breach

      See More

    Related Products

    See More Products
    • Photonic-Sensing.gif

      Photonic Sensing: Principles and Applications for Safety and Security Monitoring

    See More Products
    ×

    Sign-up to receive top management & result-driven techniques in the industry.

    Join over 20,000+ industry leaders who receive our premium content.

    SIGN UP TODAY!
    • RESOURCES
      • Advertise
      • Contact Us
      • Store
      • Want More
    • SIGN UP TODAY
      • Create Account
      • eMagazine
      • eNewsletter
      • Customer Service
      • Manage Preferences
    • SERVICES
      • Marketing Services
      • Reprints
      • Market Research
      • List Rental
      • Survey/Respondent Access
    • STAY CONNECTED
      • LinkedIn
      • Facebook
      • YouTube
      • X (Twitter)
    • PRIVACY
      • PRIVACY POLICY
      • TERMS & CONDITIONS
      • DO NOT SELL MY PERSONAL INFORMATION
      • PRIVACY REQUEST
      • ACCESSIBILITY

    Copyright ©2025. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing