{"id":909,"date":"2009-12-10T00:00:00","date_gmt":"2009-12-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/10\/internet-posting-prompts-tsa-investigation\/"},"modified":"2021-12-30T11:38:22","modified_gmt":"2021-12-30T11:38:22","slug":"internet-posting-prompts-tsa-investigation","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/10\/internet-posting-prompts-tsa-investigation\/","title":{"rendered":"Internet posting prompts TSA investigation"},"content":{"rendered":"<p>Five Transportation Security Administration employees have been placed on administrative leave since it was discovered that sensitive guidelines about airport passenger screening were posted on the Internet.  The move was disclosed as senators questioned administration officials yesterday about the second embarrassing security flap at the Homeland Security Department in as many weeks.  Assistant Homeland Security Secretary David Heyman told senators yesterday that a full investigation into the Internet security lapse is under way, and that the TSA employees have been taken off duty pending results of that probe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Homeland Security Department has also stopped posting documents with security information, either in full or in part, on the Internet until the TSA review is complete, Mr. Heyman told the Senate Homeland Security and Governmental Affairs committee.<\/p>\n<p>Among many sensitive sections, the document outlines who is exempt from certain additional screening measures, including U.S. armed forces members, governors and lieutenant governors, the Washington, D.C., mayor and their immediate families.<\/p>\n<p>It also offers examples of identification documents that screeners accept, including congressional, federal air marshal and CIA ID cards; and it explains that diplomatic pouches and certain foreign dignitaries with law enforcement escorts are not subjected to any screening at all.<\/p>\n<p>http:\/\/www.post-gazette.com\/pg\/09344\/1019885-84.stm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-909","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=909"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/909\/revisions"}],"predecessor-version":[{"id":3396,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/909\/revisions\/3396"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}