Orlando Trusted Traveler Program
I’ve already written about what a bad idea trusted traveler programs are. The basic security intuition is that when you create two paths through security—an easy path and a hard path—you invite the bad guys to take the easy path. So the security of the sort process must make up for the security lost in the sorting. Trusted traveler fails this test; there are so many ways for the terrorists to get trusted traveler cards that the system makes it too easy for them to avoid the hard path through security.
The trusted traveler programs at various U.S. airports are all run by the TSA. A new program in Orlando Airport is run by the company Verified Identity Pass Inc.
I’ve already written about this company and what it’s doing.
And I’ve already written about the fallacy of confusing identification with security.
Davi Ottenheimer • June 12, 2005 10:57 AM
I agree 100% with you. The first thing that comes to mind is the old “weakest link” analogy. Anyone who desires to take a “trusted traveller” path will find the easiest point of entry into the system, which will probably be far up the chain from anything even near the airport. An authorization system that relies on an external mechanism of “trust”, which is completely outside its control, could simply mean a more expensive authentication solution without any significant risk reduction (threats are the same, vulnerabilities have been shifted rather than reduced, and assets are just as valuable).