TWIC IDs could leave secure areas open to a terrorist attack, GAO finds

The Transportation Worker Identification Credential (TWIC) secure identification card is not as secure as necessary to prevent a potential terrorist attack at U.S. ports, according to a Government Accountability Office report released this month.

In its report, GAO found that the Transportation Security Administration does not have adequate processes in place to ensure that the TWIC biometric ID cards don't fall into the wrong hands. TSA cannot guarantee that only qualified applicants receive TWIC IDs, people who have received TWIC ID cards remain eligible to have them, and reviewers apply standard criteria for evaluating applicants with criminal records, according to the report.

In addition, undercover GAO auditors exposed physical security weaknesses at several U.S. ports by entering secure areas with counterfeit TWIC cards and real cards obtained fraudulently, the report states.

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Tue, May 17, 2011 Fort Huachuca

I agree 100% with the report -- I have a TWIC based on a semi-valid need. The process requires two visits to a location to get the card - both visits require two forms of valid ID - - but I was never questioned on the true verified need to have the card . . . .

Thu, May 12, 2011 RayW

Any ID system (currently) that is not based on a face to face vouchering of the person is subject to fraud. If man can create a perfect ID, then someone else can make a perfect forgery. And the more user friendly the ID has to be, the more vulnerable it is.

Then you have the human factor to make mistakes and to bend rules, in most cases no stereotyping since all must be equally treated and to the lowest common denominator. That means that checklist investigations are performed that can not/are not allowed to see beyond a narrow range of questions. And the folks who are dishonest know how to tweak their responses/environment to get the "right" answers.

The Chinese have forged/compromised CAC certificates, Mexicans have forged US driver licenses and forged US Social Security cards that look real, and the list goes on.

The problem with better and better ID, is that most people expect "better" to mean "more secure", and that is true, for a few days. But after that, the "better" only means the honest folks are less likely to just walk in. Then the people inside become more lax and assume that the bad guys who want in have the same disadvantage as folks outside who do not care.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group