Security Theater - Examples

Examples

It is inherently difficult to give examples of security theater that are clear and uncontroversial, because once it is agreed by all that a measure is ineffective, the measure seldom has any noticeable influence on perceived risk. The following are examples of alleged security theater.

  • National Guardsmen carrying automatic weapons in airport lobbies in the months following the September 11 attacks. Reports varied on whether the weapons were loaded or unloaded; loaded weapons would apparently pose an extreme danger to the dense crowds found at an airport in the case of an actual incident.
  • The announcement after the September 11th suicide attacks that airports would be discontinuing curbside check-in, which had no relationship to the tactics Al Qaeda employed in hijacking the aircraft and would pose no barrier to a suicide bomber who fully intended to board the aircraft with a bomb bag anyway.
  • The air travel industry uses a screening system called Computer Assisted Passenger Prescreening System. This system relies on static screening of passenger profiles to choose which people should be searched. Systems of this nature have been demonstrated to reduce the effectiveness of searching below that of random searches since terrorists can test the system and use those who are searched least often for their operations.
  • With the aim of preventing individuals on a No Fly List from flying in commercial airliners, U.S. airports require all passengers to show valid picture ID (e.g. a passport or driver's license) along with their boarding pass before entering the boarding terminal. At this checkpoint, the name on the ID is matched to that on the boarding pass, but is not recorded. In order to be effective, this practice must assume that 1) the ticket was bought under the passenger's real name (at which point the name was recorded and checked against the No Fly List), 2) the boarding pass shown is real, and 3) the ID shown is real. However, the rise of print-at-home boarding passes, which can be easily forged, allows a potential attacker to buy a ticket under someone else's name, to go into the boarding terminal using a real ID and a fake boarding pass, and then to fly on the ticket that has someone else's name on it. Additionally, recent investigations show that obviously false IDs can be used when claiming a boarding pass and entering the departures terminal, so a person on the No Fly List can simply travel under a different name.
  • Random searches on subway systems, such as those taking place on the New York City Subway system, have been criticized by the American Civil Liberties Union and others as security theater. They allege that since such searches are only at some stations and that people may decline such a search and simply leave that station, a terrorist could simply find a station where no searches were occurring and board there..
  • Spanish national railway operator RENFE performs passenger screenings at major stations for long distance trains. However, many of those trains also stop at stations providing only a simple ticket checking, and even some unstaffed stations where passengers could board the train without a ticket, rendering the screening ineffective. Furthermore, the 2004 Madrid train bombings targeted commuter trains: at the time there were screenings at Atocha station but not on the tracks used by the bombed trains.
  • The 1950s "duck and cover" drills in U.S. public schools – which suggested that ducking under a desk is a reasonable way to protect oneself from the detonation of an atomic bomb.
  • Facial recognition technology was introduced at Manchester Airport in August 2008. A journalist for The Register claimed that "the gates in Manchester were throwing up so many false results that staff effectively turned them off. Previously matches had to be 80% the same – this was quickly changed to 30%. According to Rob Jenkins, a facial recognition expert at Glasgow University, when testing similar machines at a 30% recognition level, the machines were unable to distinguish between the faces of Osama bin Laden and Winona Ryder, bin Laden and Kevin Spacey, nor between Gordon Brown and Mel Gibson.
  • Australian airline authorities now prohibit any liquids, aerosols, and gels in a container larger than 100 ml in luggage hand carried onto international flights. They would prohibit a tube of toothpaste labeled able to contain more than 100 ml, even if it were squeezed empty. They would, however, allow the carrying on of 2 or 3 tubes of paste provided each is labeled to carry less than 100 ml.
  • As demonstrated on the Discovery Channel show It Takes a Thief, most low-end locks and security systems provide minimal actual protection against an experienced burglar. Commercially constructed doors without deadbolts can be simply overpowered by human kicks, and police response times to security alarms are frequently far too slow to catch a thief before he is finished ransacking the house and in flight.
  • The use of virus scanners to detect malware on computer systems. In order to be "scanned", a piece of malware (be it a virus, trojan horse, spyware, rootkit, etc.) needs to be identified and recognized by the company developing the software to create a "signature" for it and deploy this to machines running its software. This reveals some considerable doubts about the approach in general in that:
    • First, if a virus or piece of malware is not identified, it will not be detected in time to prevent it from delivering its payload. In the case of a rootkit it is usually insufficient to simply "scan and remove" it, requiring a restore or reinstall to guarantee a clean system.
    • Second, if the antivirus company refuses to identify a virus or other piece of malware or acknowledge it, the malware gets a free pass, regardless of damage caused or data compromised. This was the case in the Sony rootkit fiasco.
    • Third, a computer system which can be compromised via an automated method such as viruses or malware has inherent security flaws which could just as easily be exploited by an individual looking to exploit the flaw.

Read more about this topic:  Security Theater

Famous quotes containing the word examples:

    It is hardly to be believed how spiritual reflections when mixed with a little physics can hold people’s attention and give them a livelier idea of God than do the often ill-applied examples of his wrath.
    —G.C. (Georg Christoph)

    There are many examples of women that have excelled in learning, and even in war, but this is no reason we should bring ‘em all up to Latin and Greek or else military discipline, instead of needle-work and housewifry.
    Bernard Mandeville (1670–1733)

    In the examples that I here bring in of what I have [read], heard, done or said, I have refrained from daring to alter even the smallest and most indifferent circumstances. My conscience falsifies not an iota; for my knowledge I cannot answer.
    Michel de Montaigne (1533–1592)