April 22, 2014
Let’s talk irony on safety-and-security. The news of the curious and curious passenger to fly to Hawaii without a ticket can garner a laugh and/or reveal the gaps in security. Big news on security breach as a “16-Year-Old Survives Unharmed Stowed Away In Wheel Well Of California To Hawaii Flight, Say FBI Officials” proving front end threat must be balanced by securing the total ecosystem.
“If it is to be believed, “A 15-year-old boy found his way onto an airport’s tarmac and climbed into a jetliner’s wheel well, then flew for five freezing hours to Hawaii. The boy, who lives in Santa Clara, Calif., hopped out of the left rear wheel well of a Boeing 767 on the Maui airport tarmac Sunday, according to the FBI. Authorities found the high school student wandering the airport grounds with no identification. He was questioned by the FBI and taken by ambulance to a hospital, where he was found to be unharmed.”
“FBI spokesman Tom Simon in Honolulu said the teen climbed into the left rear wheel well of the first plane he saw in San Jose. “He got very lucky that he got to go to Maui but he was not targeting Maui as a destination,” Simon said. He passed out in the air and didn’t regain consciousness until an hour after the plane landed in Hawaii, Simon said. When he came to, he climbed out of the wheel well and was immediately seen by airport personnel who escorted him inside where he was interviewed by the FBI, Simon said,” reports API and Huffington Post.”
A lot of intention is made in the front end of security while the back territory of the airport ecosystem goes undetected. Consider, all the front end security that is placed on the passenger to take off shoes, go through detectors and yet, a vulnerable system has allowed one young boy to become a stow away. Business Intelligence is vital to supporting a changing security.
The view of process engineering is to assess all vulnerabilities and not to become complacent. It is easier to monitor the big items or at the top of the funnel to syphon or manage resources. The problem is that breaches occur where ever humans or boy can penetrate a critical or less critical path.
Security is the balance of technology and human dynamics to locate the vulnerabilities that continue to persist. Every time security is determined tight is the time when analysis of gaps are necessary.