Screening of all U.S.-bound air cargo still years away

It could take the Homeland Security Department another two years to ensure that all cargo is screened for weapons of mass destruction before being flown into the United States on passenger airplanes, much longer than originally estimated, a senior department official told lawmakers Thursday.

A 2007 law that Democrats wrote as soon as they took over Congress required the Transportation Security Administration to ensure that all cargo aboard passenger flights is screened for weapons of mass destruction by August 2010. The deadline applies to flights originating inside the United States and those from other countries.

But the deadline for incoming international flights will be missed, Gale Rossides, TSA's acting director, told the House Homeland Security Appropriations Subcommittee.

She said the agency might be able to ensure that only 65 percent of cargo on international flights is screened. But TSA will meet the deadline for screening all cargo aboard passenger flights originating inside the United States, she added.

TSA officials have been saying since last year that meeting the August deadline for incoming international flights most likely would not be possible. But the need for another two years is the longest estimate to be disclosed so far.

Rossides said the biggest challenge is getting cooperation from the governments of 20 countries where nearly 85 percent of all cargo comes from.

On another front, Homeland Security Appropriations Subcommittee Chairman Rep. David Price, D-N.C. and ranking member Rep. Hal Rogers, R-Ky., pressed Rossides on TSA's plan to buy and install 1,000 whole-body imaging machines at U.S. airports by next year. They questioned whether doing so is the best use of limited resources.

Rogers said the department's fiscal 2011 budget request seeks $250 million for 500 machines and another $314 million for more than 5,000 airport screeners to operate those machines.

"My position on enhancing aviation security is one of cautious urgency. For too often, government overreacts in the wake of a crisis," Rogers said.

"Let me be clear -- I'm not saying there isn't some merit in what TSA is proposing for fiscal 2011," he added. "Rather, my concern is that this costly proposal appears to be a short-term fix, not a long-term, sustainable solution that effectively balances legitimate travel, needed security and limited resources."

Price and Rogers demanded that TSA submit to Congress its spending plan for fiscal 2010 so they can better evaluate the budget request.

Rossides said TSA has determined that whole-body imaging machines offer "a significantly greater" capability and are more effective and efficient than having airport screeners physically pat down passengers. TSA does not expect that using the machines will increase wait times at airport checkpoints, she added.

But she acknowledged that the machines would not detect explosives carried inside someone's body.

TSA bought 150 whole-body imaging machines last fall, but none of those have arrived at U.S. airports yet. The department plans an announcement today of 11 airports that will receive machines in coming weeks.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.