The Impact of Biometric Technology on Aviation Security and Safety Harvard Case Solution & Analysis

The Impact of Biometric Technology on Aviation Security and Safety Case Solution


Due to the occurrence of these changes, thus, the number of questions have been bring up regarding philosophy of the security of aviation uniformly applied to all. In the public debate, this arguments and a line of reasoning has been crystallized and manifested. One most significantly important outcome of this debate is to renew the concern in order to change the screening persons receiving objective of reducing the security drain on passengers and improving the performance. There are two ways that can be used to approach the preferential treatment in the screening. The first and foremost is to identify the individual who might pose comparatively more risk and allocate more resources of security to them, this process is termed as profiling. The second significant method is to identify the one who most likely pose lower risk as compared to others, also the entry of the pre-approved traveler can be facilitated by the process called trusted traveler program (BRIAN A. JACKSON, 2011).

This extensive review would most likely examine the profiling, but the analysis on the trusted traveler program is less. To create a new trusted traveler program (TTP) that is used to utilize the true management of risk requires a re-verification process and controlled enrollment; at airport a confirmation process ensures that there are only those individuals who are utilizing trusted traveler screening lanes as well as the checkpoint process that tend to reflect the traveler’s low risk nature (A Better Way: Building a World Class System for, 2017).

The most basic rationale behind the trusted traveler program (TTP) is that the important resources required for security would most probably transfer from the low risk travelers to remaining unknown risk populace. It is being foreseen that through dedicating more resources of security to the unknown risk populace would most likely upsurge the possibility of recognizing those passengers who has been looking for and contemplating to carry missiles through the checkpoints in order to attacks on the airplanes. The same logic being applied by trusted traversal program to the employees of the transportation security administration (TSA). At many airfields, the employees of TSA screened neither subsequent times nor first time when they intent to pass in the secure sterile area all over the day and the reason is that they are trusted and had a background check.  In addition to this, at many of the airfields, the employees who at background check such as, airport shops, airport kiosk volunteers and airport police are considered having unibiometric allaccess badges and are low risk, the unibio metric allaccess badges tend to allow them to enter into the secure sterile area and bypass the screening security (riley, 2011). For many years, it has been precedent and it is analyzed that there has been no terrorist events which are associated with this model demonstrating that the similar technology can be successfully utilized by the trusted traveler program.

In 2010, the administrator of the transportation security administration (TSA) i.e. John Pistole has been directing the activity so that the methods could be better explore to make effective strategy for the trusted traveler program (TTP). The formulation of the new and effective strategy requires to study and examine the technologies and procedures that have been used by TSA, how security processes and procedures has been carrying out and how has been the screening conducted. The new and effective risk based security initiative is implementing by TSA. It is needed for TSA to assess the program so that the screening security model of passenger would be evolved and security threats would be avoided (Transportation Security Administration, n.d.).


In 2011, the risk based security has been introduced by the TSA administrator i.e. Pistole to the general public and to TSA. Over the period of time, the new security protocols were being examined by the program in order to improve and enhance the screening model of passenger or traveler at the selected airfields all around the United States through using the security pilot risk based program.

  1. TSA Risk-Based Initiative

The major steps has been taken by TSA administrator i.e. John S. Pistole so that he would be able to incorporate the risk based passenger screening security initiative. In June 2011 in his testimony, he has been contemplating to conduct more risk as well as identifying the screening. He intended to test a system used for verifying identity in order to enabling the security detectives of TSA to confirm employment status and distinctiveness of the pilots. The new expediting screening program has been introduced by the security initiatives passenger screening model which are screening for travelers 12 and under, pre-check expedite screening, screening for travelers who are 75 and older, known crew members (KCM) and screening for U.S service members Department of Defense Common Access Card (DoD CAC) (Transportation Security Administration:Progress and Challenges Face in Strengthening Three Key Security Programs, 2012).

  1. Pre-Check (TSA Pre™) Expedited Screening

Screening is the part of pre check expedited screening. The pre check passengers tend to sign up, must go through a background check and lastly must identify their identity through picture. After completing all this steps, trusted travelers would become eligible to be part of the screening lane and they would get the multiple passenger expedited screening benefits. In addition to this, the aviation security can also be enhanced or improved by this pre check screening program through putting more emphasis on the individuals who has not been screened and who tend to partake for the purpose of advancing the process of screening of passengers and travel experience.............


This is just a sample partical work. Please place the order on the website to get your own originally done case solution.

Share This


Save Up To




Register now and save up to 30%.