Security theater is the practice of implementing Security that are considered to provide the feeling of improved security while doing little or nothing to achieve it.
The term was originally coined by Bruce Schneier for his book and has since been widely adopted by the media and the public, particularly in discussions surrounding the United States Transportation Security Administration (TSA).
Practices criticized as security theater include airport security measures, stop and frisk policies on public transportation, and clear bag policies at sports venues.
Examples of use of the term:
A 2010 United States Government Accountability Office (GAO) report found that the TSA's $900million Screening Passengers by Observation Techniques (SPOT) program, a behavioral-detection program introduced in 2007 that is aimed at detecting terrorists, had detected no terrorists and failed to detect at least 16 people who had traveled through airports where the program was in use and were later involved in terrorism cases.Jana Winter & Cora Currier, Exclusive: TSA's Secret Behavior Checklist to Spot TerroristsKevin D. Williamson, The TSA's 95 Percent Failure Rate: Security Theater as Farce, National Review (June 3, 2015). In 2013, a GAO report found that no evidence existed to support the idea that "behavioral indicators... can be used to identify persons who may pose a risk to aviation security." A separate 2013 report by the Department of Homeland Security Office of Inspector General found that the TSA had failed to evaluate the SPOT program and could not "show that the program is cost effective." The SPOT program has been described as security theater.Jeffrey Goldberg, The Things He Carried, The Atlantic (November 2008).Thomas Cincotta, Behavior Profiling: Ineffective and Expensive Security Theater, Political Research Associates (July 29, 2010). With the aim of preventing individuals on a No Fly List from flying in commercial airliners, U.S. airports require all passengers to show valid picture ID (e.g. a passport or driver's license) along with their boarding pass before entering the boarding terminal. At this checkpoint, the name on the ID is matched to that on the boarding pass, but is not recorded. In order to be effective, this practice must assume that 1) the ticket was bought under the passenger's real name (at which point the name was recorded and checked against the No Fly List), 2) the boarding pass shown is real, and 3) the ID shown is real. However, the rise of print-at-home boarding passes, which can be easily forged, allows a potential attacker to buy a ticket under someone else's name, to go into the boarding terminal using a real ID and a fake boarding pass, and then to fly on the ticket that has someone else's name on it. Additionally, a 2007 investigation showed that obviously false IDs could be used when claiming a boarding pass and entering the departures terminal, so a person on the No Fly List can simply travel under a different name.
Facial recognition technology was introduced at Manchester Airport in August 2008. A journalist for The Register claimed that "the gates in Manchester were throwing up so many false results that staff effectively turned them off." Previously matches had to be 80% the same to their passport pictures to go through, and this was quickly changed to 30%. According to Rob Jenkins, a facial recognition expert at Glasgow University, when testing similar machines at a 30% recognition level, the machines were unable to distinguish between the faces of Osama bin Laden and Winona Ryder, bin Laden and Kevin Spacey, nor between Gordon Brown and Mel Gibson.
Similarly, the Chicago Transit Authority police's deployment of random explosive-residue-swabbing checkpoints at public transit stations has been criticized as an ineffective means of security.Tim Cushing, Chicago Transit Cops Start Up Their Own Security Theater, Will Start Randomly Swabbing Bags For Explosive Residue, TechDirt (November 6, 2014). Pat-downs of fans entering arenas for National Football League and metal detectors at Major League Baseball games have also been criticized as security theater.Timothy Geigner, NFL Ramps Up Security Theatre, TechDirt (September 21, 2011). Additionally, the effectiveness of Clear and Large Bag policies at many major sports venues in the United States has been questioned repeatedly.
Credit card signatures have been a longstanding subject of scrutiny and generally referred to as theatrical measure, as they have been notably criticized for having no true effect on deterring or stopping credit card fraud.
Critics such as the American Civil Liberties Union (ACLU) have argued that the benefits of security theater are temporary and illusory since after such security measures inevitably fail, not only is the feeling of insecurity increased, but there is also loss of belief in the competence of those responsible for security.
Organizations such as the US TSA, who have implemented security theater practices, have been found to be highly ineffective, with one 2015 investigation resulting in TSA agents failing to prevent illegal items in 95% of trials. A follow up study in 2017 found similar results, though the TSA did not release an exact rate of success or failure.
Researchers such as Edward Felten have described the airport security repercussions due to the September 11, 2001 attacks as security theater.
The ACLU has reported that between October 2008 and June 2010, over 6,500 people traveling to and from the United States had their electronic devices searched at the border. The Association of Corporate Travel Executives (ACTE), whose member companies are responsible for over one million travelers and represent over $300billion in annual business travel expenditures, reported in February 2008 that 7% of their members had been subject to the seizure of a laptop or other electronic device. Electronic device seizure may have a severe economic and behavioral impact. Entrepreneurs for whom their laptop represents a mobile office can be deprived of their entire business. Fifty percent of the respondents to ACTE's survey indicated that having a laptop seizure could damage a traveler's professional standing within a company.
The executive director of the ACTE testified at a 2008 hearing of the Senate Judiciary Subcommittee on the Constitution seizure of data or computers carrying business proprietary information has forced and will force companies to implement new and expensive internal travel policies.
Because security theater measures are often so specific (such as concentrating on potential explosives in shoes), it allows potential attackers to divert to other methods of attack. This not only applies to the extremely specific measures, but can also involve possible tactics such as switching from using highly scrutinized airline passengers as attackers to getting attackers employed as airline or airport staff. Another alternate tactic would be simply avoiding attacking aircraft in favor of attacking other areas where sufficient damage would be done, such as check-in counters (as was done, for example, in the attacks on Brussels airport on 22 March 2016), or simply targeting other places where people gather in large numbers, such as cinemas.
Documents uncovered by the ACLU found that until late 2012, the US TSA maintained training manuals that exclusively focused on examples of Arab or Muslim terrorists. In 2022, the US GAO found that advanced imaging technologies by the TSA disproportionately selected passengers of minority groups for additional screening, and a follow up report in 2023 found the same issue.
The ACLU also filed a 2015 lawsuit against the TSA's SPOT program, and was successful in obtaining thousands of pages of documents regarding the program. The ACLU dropped their lawsuit against the TSA in 2017, but a report published by the organization, as well as reports published by the US GAO and a scientific advisory group found that the SPOT program had no scientific basis for effectiveness.
Discriminatory practices
See also
External links
|
|