Real ID deadline here, driver services centers crowded
MEMPHIS, Tenn. — The Department of Homeland Security said Wednesday is the last day to obtain your real ID to board flights and enter federal buildings.
WREG went to two Driver Services Centers on Wednesday, and both locations had long lines with most people waiting to get their real ID.
'I got here at about 10:50 a.m., and I think it's like close to 1 p.m. now, if not, it's already 1 p.m. And we've just been sitting out in lines, like this whole time,' said Rheagan Crenshaw, a native Memphian. People brought chairs. We've just all been hoping we had the proper documents.'
TSA says no delays at Memphis airport as REAL IDs roll out
For months and weeks, lines at Driver Services Centers have been filled with people getting their REAL IDs.
It is to have a black or gold star on your driver's license or state ID.
'I actually have a flight today. It was originally supposed to be at 6 a.m., but we moved it to 7 a.m. I live here, but I go to school in Virginia, so I had to finish my final, fly back before the deadline. So, today was literally my only day to like get this done,' said Crenshaw.
Bring the following to the Driver Services Center: proof of U.S. citizenship, your social security card number, and two proofs of residency.
If you plan to board a flight and don't have a REAL ID or a passport, there are other forms of identification you can use, but TSA says you may have to go through additional screening.
► MORE INFO: Acceptable ID at the airport
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
For the latest news, weather, sports, and streaming video, head to WREG.com.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
3 hours ago
- Forbes
TSA Warns iPhone And Android Users—You Need This At Airport
New airport warning for smartphone users There is no subject that's more contentious in cyber security circles than so-called juice jacking. It generates fresh headlines most years, when one government agency or another issues a new alert ahead of the holidays. Stories are written and cyber eyebrows are raised — there are more stories than attacks. But still those stories come. But now a new warning suggests there may be a risk for travelers after all. Juice jacking theoretically strikes when you plug your phone into a public charging cable or socket at an airport or hotel, and instead of it being a dumb charger, it's a computer behind the scenes extracting data from your device. This is very different to dangerously crafted attack cables that include a malicious payload in the cable itself. The latest government warning (and headlines 1,2) come courtesy of TSA. 'When you're at an airport, do not plug your phone directly into a USB port,' it says. 'Bring your TSA-compliant power brick or battery pack and plug in there.' This is because 'hackers can install malware at USB ports (we've been told that's called 'juice/port jacking').' TSA also warns smartphone users 'don't use free public WiFi, especially if you're planning to make any online purchases. Do not ever enter any sensitive info while using unsecure WiFi.' This public Wi-Fi hijacking threat is almost as contentious as juice-jacking amongst cyber experts. TL;DR, while it comprises your location, any encrypted data flowing to or from your device from websites or apps should be safe. Your bigger risk is downloading an app from the malicious access point's splash page, filling in online forms, or being redirected to fraudulent login pages for Microsoft, Google or other accounts. The usual advice applies — use passkeys, don't log in to linked or popup windows but use usual channels, and don't give away personal information. You should also be wary of which Wi-Fi hotspots you connect to — are they the real service from the hotel or airport or mall you're in, or cleverly named fakes. As for juice jacking, there is now a nasty new twist to the existing narrative, which while theoretical for now, could fuel attacks that actually work. A new research paper has introduced 'a novel family of USB-based attacks' called ChoiceJacking, which the researchers say, 'is the first to bypass existing Juice Jacking mitigations. The Austrian research team "observed that these mitigations assume that an attacker cannot inject input events while establishing a data connection. However, we show that this assumption does not hold in practice. We present a platform-agnostic attack principle and three concrete attack techniques for Android and iOS that allow a malicious charger to autonomously spoof user input to enable its own data connection.' This is more an issue for Android than iOS, but it's not something for most users to worry about. That said, if you think you might be the target for attacks or if you travel to higher risk parts of the world, I would strongly recommend not using public charging points without some form of data shield or public WiFi without a VPN. You should also be wary of unlocking your device when it's plugged into anything you don't own and control. Interestingly, Google and Samsung have both been better defending devices against USB data extraction, albeit this masks itself as an accessory. There are also new updates for both iOS and Android to reboot devices locked for more than 3 days, which also protects against physical cable attacks. On ChoiceJacking, Kaspersky says 'both Apple and Google blocked these attack methods in iOS/iPadOS 18.4, and Android 15," but "unfortunately, on Android, the OS version alone doesn't guarantee your smartphone's safety… That's why Android users who have updated to Android 15 are advised to connect their smartphone to a known safe computer via a cable and check whether a password or biometric confirmation is required. If not — avoid public charging stations.'

Travel Weekly
6 hours ago
- Travel Weekly
Dispatch, Newark Airport: A surprisingly smooth journey
Newark is currently atop the list of most beleaguered U.S. airports, rife with delays and cancellations due to air traffic control problems and runway repairs. Imagine my surprise when I had one of the most pleasant experiences in United's Terminal C, pretty much ever, over Memorial Day weekend. First, I'll address the lead-up to my family's Orlando trip. Not pleasant. United had been chopping Newark flights on routes with high frequency to reduce Newark congestion, and sure enough, United canceled our departure and return flights. I had to make some pretty major changes. With the FAA implementing a temporary Newark flight cap on May 20, I checked the United app daily to make sure our flights were still scheduled. They were. Fewer planes means fewer people Once our Lyft dropped us off at the airport, we practically soared through security. I have TSA PreCheck, but because my group was flying on separate tickets (long story), I braved the regular security line with them. No problem: The wait was two to three minutes. I barely had time to pull out our passports at security check (thanks, Real ID) before entering the scanner area. Then we were on the concourse, which was blessedly empty. Our flight boarded on time. Taxi-line holdups? Nope. We were airborne shortly after leaving the gate. Now for the caveats. It was just two flights, and maybe it was just a fluke, a light day. I didn't depart at my usual early morning time, when Newark seems especially busy. And there weren't any weather or radar meltdowns (as far as I know) to derail operations. I'm not saying Newark should stick to a light operation. It's bad for the bottom line for airlines that have had to slash capacity, and it's no good the concourse concessionaires that depend on busy passenger traffic. As for the onboard experience, yes, the cabins were packed. On our return from Orlando, the flight was oversold and the United gate agent was trying to entice passengers to switch to a later departure for $700 in flight credits. We stuck to our original seats, and our flight arrived at Newark early. And when we deplaned in Terminal A around 6:30 p.m., the concourse traffic was light. I retrieved my bag and then peeked upstairs to check the wait for both PreCheck and regular security. Less than five minutes, according to the signage.
Yahoo
6 hours ago
- Yahoo
What the Tech: TSA airport warning
If you fly, there is a good chance your phone, tablet, or computer will need recharging at some point. Free charging stations are a welcome sight for travelers. You'll find them in airport terminals, hotel lobbies, and under seats at the gate. Just plug in your phone, recharge, and you're good to go. In a recent Facebook post, TSA warned travelers that these convenient ports could carry a hidden risk. The government has issued a warning about a threat known as 'juice jacking.' This is a type of cyberattack where criminals could potentially rig USB charging ports to install malware on your phone or steal personal data while you're charging. So, how likely is this to happen? Technically, it's possible. USB cables are designed not only to supply power but also to transfer data. That's why you can move photos from your phone to a computer with a cable. In theory, a bad actor could modify a public USB port to compromise your device. However, the odds of this happening at an airport or hotel are extremely low. In fact, there has never been a confirmed case of juice jacking occurring in the real world. One reason is that modern smartphones include built-in protections. If you plug your device into a computer or an unfamiliar accessory, you'll see a pop-up asking whether you trust the connection. If that message appears when you're using a public port or shared charging station, the safest choice is to select 'Don't Trust.' Still, federal agencies say it's smart to be cautious. You can read the warning from the FCC here: TSA Juice Jacking Warning To stay safe, consider these tips while traveling: Use your own charging block and plug into a standard electrical outlet Bring a portable battery or power bank to charge on the go Buy a USB data blocker or charge-only cable, which allows power to flow but blocks data transfer Never leave your phone unattended while it charges in a public place In my opinion, plugging in a cable to charge a phone using an outlet on the wall carries a much bigger risk than a 'Juice Jacked' charging station. Unattended phones can be stolen, and what happens frequently is that people walk away and go to the gate, forgetting the phone is plugged in. One more safety note: if you bring a portable power bank, be sure to pack it in your carry-on bag. The FAA prohibits lithium-ion batteries from being stored in checked luggage or overhead bins because they can overheat or catch fire. The biggest threat at the airports? Logging on to what you think is a secure public WiFi network when it is, in fact, a network set up by a cybercriminal. Connecting to those networks runs the risk of having malware installed on your phone. While juice jacking may not be a widespread threat, it is always better to be safe than sorry, especially when it comes to your personal information. But in terms of things to worry about on your next trip, just remember to keep your phone and portable batteries with you. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.