Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

Addressing Profiling Changes to the Department of Justice

By Bob Liscouski, John Halinski
February 1, 2015

We’ve gotten pretty good at collecting all sorts of data from cameras and other sensors – but in the end, it is what we do with the information that counts. Surveillance technologies provide the capability to capture the minutest details, but the real value in collecting information is in its analysis. While technology allows us to observe behaviors that predict criminal intent and can interdict before events occur, often this data is subverted by security professionals and law enforcement misinterpretation based on spurious factors.

Recently the Department of Justice (DOJ) announced that it would be releasing new regulations concerning the use of “profiling” by law enforcement officials and agencies. Based on media interpretation and a misunderstanding of this announcement, one element of the announcement grabbed the headlines – that the Department of Homeland Security’s Transportation Security Administration (TSA) and the U.S. Customs and Border Protection (CBP) would be exempted from the new regulations on the use of profiling. This media interpretation immediately elicited the expected outcry from civil libertarians concerned with the misuse of profiling as a surveillance and policing technique.

Unfortunately the interpretation by the media of the new DOJ regulations has some important flaws. First, it was reported that certain agencies that deal with counter-terrorism would be exempt from the new regulations. These reports especially highlighted an exemption for agencies that conduct security operations in the areas of airports and border crossings. Of course this has caused alarm among civil rights and religious groups that believe they are already profiled by federal agencies in those locations.  However, the truth is that profiling has not been in use by most agencies since the previous DOJ guidelines were put out in 2003. 

Profiling based on race, culture, and religious affiliation has been shown to have significant flaws in multiple studies and is not used by most law enforcement agencies. This type of profiling in reality is the stuff of shows and movies. Real and effective security is accomplished by identifying suspicious behavior, not individuals singled out by profiling.

Secondly, the misinterpretation of the DOJ regulations adds to the misunderstanding of the techniques which are utilized by DHS. At TSA, profiling is a catch-all and misused term. The Department of Homeland Security and its components do not profile. In fact, within DHS there is constant review, education and quality control measures in place to ensure that its employees do not “profile.” Every policy, program and person within DHS is subject to scrutiny by its Office of Civil Liberties and Rights, legal counsels and the DHS Inspector General. When allegations of profiling have been leveled against various elements of the DHS in the past, after extensive investigation these allegations were not substantiated. DHS has enhanced and continues to modify their programs and has training, education and stringent quality control measures to ensure that their personnel do not profile anyone based on race, religion, gender or sexual orientation.

The proposed exemption for airports is a hot button for groups that have raised questions about TSA’s Behavior Detection Program (BDO). The BDO program trains TSA officers to look for passengers showing signs of stress, fear or deception as a way to detect terrorists. The BDO programs looks for behaviors, not individuals who fit a profile. Sound methodology and rigorous training, education and oversight have been built into the BDO program to preclude profiling.

While surveillance technologies are invaluable to security eff           orts, no technology or system can take the place of security professionals to fully use and interpret information. It is for this reason that the BDO program is so important.

Improper terminology by the media antagonizes the general public and makes the job of security organizations and law enforcement agencies more difficult. Classifying law enforcement surveillance and observation techniques as “profiling” is misleading and causes tension between the public and security and law enforcement. Most law enforcement and security agencies utilize techniques to assess behavior because classifying individuals or profiling them leads to mistakes. Identifying criminal behaviors, understanding patterns and anomalies based on observation or utilizing proper surveillance, and classifying risk based on behaviors are much more effective ways of mitigating threats.

Security is a fine balancing act to respect the rights of individuals and simultaneously protect the public. Let’s not mislabel surveillance and observation programs as something they are not. Let’s allow security professionals to do their work and protect against terrorism.  

 

  

KEYWORDS: national security profiling security risk management TSA screening

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bob Liscouski has more then 30 years of experience in security and law enforcement, and he is the Executive Vice President of Integrated Strategies Group. Liscouski and ISG have founded four additional firms — Steel City Re, Edge360, Axio Global and Convergent Risk Group.

John Halinski is a partner in S&R Investments LLC of Manassas. He’s the former Deputy Administrator of the TSA.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Changing the Definition of Surveillance in the Age of Converged Risk

    See More
  • Using Security Convergence to Enable the Enterprise

    See More
  • Finding the Right Technology to Unlock Cloud and Mobile Surveillance

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing