Does TWIC really work?

Checking TWIC card at the Port of Baltimore (Photo: U.S. Coast Guard)

Transportation Worker Identification Credentials are used at the Port of Baltimore and other key transit hubs, but the TWIC program remains a work in progress. (Photo: U.S. Coast Guard)

Lawmakers are raising questions about whether the Department of Homeland Security's biometric Transportation Worker Identification Credential program is on track and providing any real security value.

At a June 4 Senate Homeland Security and Governmental Affairs Committee hearing, ranking Republican Tom Coburn of Oklahoma asked the panel of federal port security officials how truck driver Jeffrey Savage used his TWIC card to enter Naval Station Norfolk in March and fatally shoot Petty Officer 2nd Class Mark Mayo. Savage had a previous manslaughter conviction when he applied for the TWIC.

TWIC applicants with a voluntary manslaughter charge applying for the credential now would initially be denied a TWIC, replied Steven Sadler, assistant administrator for intelligence and analysis at the Transportation Security Administration. That ruling could then be appealed, he said.

The card, which contains the bearer's fingerprint data and is supposed to be available to card readers at critical port facilities, has been controversial almost from the program’s inception. The rollout process, and the screening of the card-holders, remain a point of contention for the agencies using TWIC, the largest standardized biometric identification program used by the federal government across industries.

TWIC cards are issued by the TSA to transportation workers, such as port employees and truckers, who have access to potentially sensitive infrastructure, to ensure they don't pose a security threat. But readers for the cards haven't been installed at all port facilities.

The program has faced numerous delays and technical difficulties since it was launched under the Maritime Transportation Security Act of 2002. Lawmakers and Government Accountability Office officials have long voiced their frustration with the program.

"Are we doing anything with TWIC? I get it. The goal makes sense, but the concern is, how are we enhancing port security overall?" Sen. Kelly Ayotte (R-N.H.) asked during the hearing. "Are we doing better?"

"Compared to nothing," responded Stephen Caldwell, GAO's director for homeland security and justice issues. "You don’t have people getting the cards who have committed espionage against the U.S. or who have committed terrorism crimes, but that’s a pretty high bar.” He conceded, however, that the program was originally aimed at preventing a dire national security incident, not comparatively lower-level offenses.

"We had concerns about the program all along," he said, noting that the Navy no longer uses TWIC as a stand-alone credential in the wake of the Norfolk shooting.

A report presented at the hearing by Caldwell noted that while the TSA and Coast Guard have been administering the TWIC program, they have not implemented GAO's 2011 recommendations to assess weaknesses in the program.

Sadler defended the program, noting that it is the first time any government agency has tried to find out exactly who is accessing U.S. ports and to establish some kind of control over the sprawling facilities. "I’m not sure before who knew nationally who was going in and out of the ports,” Sadler said. “Every single day we have one common standard, one credential with one common background check. In some places, you once had to buy multiple credentials in the same state.”

About the Author

Mark Rockwell is a staff writer at FCW.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at or follow him on Twitter at @MRockwell4.

The Fed 100

Read the profiles of all this year's winners.


  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group