Airport Security Norman Ashford,H.P.Martin Stanton. Clifton A.Moore, Airport Operation, pp243-265, 1997 1
Introduction Structure Responsibility Outline Airside Security Procedures Landside Security Procedures-Passenger Terminal Landside Procedures-Cargo Terminal Security Equipment and Systems Security Operations 2
Introduction Worldwide Breakdown of High Jacking Incidents 1989-1993 Hijackings 1993 1992 1991 1990 1989 Totals Sub-Saharan Africa 4 5 3 2 1 15 Asia 17 1 2 4 3 27 Europe 2 2 3 7 Latin America 1 4 5 4 2 16 Middle East and North Africa 4 1 2 2 9 North America 1 1 1 3 Central Eurasia 3 2 10 27 3 45 Incidents by Category Total Incidents, 1989-1993 1993 1992 1991 1990 1989 Civil aviation Hijackings 31 12 24 40 15 Commandeerings 2 4 1 2 0 Bombings/attempted bombings/shootings 0 0 1 2 4 General/charter aviation 5 10 10 3 5 Airport attacks 17 15 27 6 7 Off-airport attacks 20 50 47 4 3 Shootings at aircraft 9 7 10 0 2 Totals 84 98 120 57 36 Incidents not counted 13 15 13 2 6 3
Incidents against aviation by geographic region and category 1989 to 1993. 4
Structure of Planning for Security Planning to meet the needs of a security emergency requires the involvement of a number of organizations, such as: The airport administration The operating airlines The National Civil Aviation Organization (FAA, CAA, etc.) Police Military Medical services Security services Labor unions Customs Government departments 5
Responsibility and Organization Broad Principles of Universal application: 1. Feasibility. 2. Responsibility 3. Efficiency. 4. Coordination. 5. Resources. 6
Receipt of intelligence/ Threat information Threat assessment Risk assessment U.S Intelligence Agencies State Department (including Embassies) FBI Military investigative agencies Other U.S. Federal law enforcement Foreign governments (Minimal) State and Local law enforcement Intelligence/ threat information Classified and unclassified Intelligence division (ACS-400) Threat assessmentt Model use is Capabilities + Intentions =threat No threat exits Director of Civil Aviation Security (ACD-1) Civil Aviation Security Division (ACS-100) Special Programs Division (ACS-200) Intelligence Division (ACS-100) Coordinates merging of other divisions at this point in the process. Assesses vulnerability and draws up recommended or required countermeasures. Federal Air Marshal program for hijacking threats, Aviation Security Technology branch for threats involving explosives. Develops appropriate countermeasures for above. Continues input from previously completed threat assessment. Risk assessment model used is Threat + Vulnerability = risk Receipt, assessment and dissemination of intelligence/threat information. 7
Security Directive of Information Circular Dissemination Threat cannot be countered with additional security Measures-flight cancelled Department of Transportation Additional countermeasures neededsecurity directive No additional countermeasures neededinformation circular Draft of directive or circular prepared by intelligence division (ACS-400) Signed By ACS-1 Department of State Appropriate U.S. Intelligence and law Enforcement agencies on case by case basis FAA regions U.S. and overseas ATA carrier representative Appropriate Embassies and Missions FAA principal security inspector FAA aviation security field offices or units (CASFO s) Embassy Security officer and FAA liaison, FAA representative U.S. carriers corporate security office Approximately 500 (Part 107) airports serving commercial traffic (where appropriate) Host government agencies responsible for airport security U.S. carrier station representative (at airport) U.S. carrier Ground security coordinator U.S. carrier in-filght security coordinator (where appropriate) Foreign airport Security structure Varies by country, but is frequently Conducted by Several levels of government.x U.S. carrier security directive requires enhanced security and/or countermeasures. Information circular is used for informational purposes only. 8
Aviation security positions created by the Aviation Security Improvement Act of 1990 Office of secretary of transportation Director of Intelligence and security -serve as primary liaison of the secretary to the intelligence and law enforcement communities; -receive, assess, and distribute intelligence relative to long-term transportation security; -develop policies, strategies, and plans for dealing with threats to transportation security Federal Aviation Administration Associate Administrator for Civil Aviation Security -assess threats to civil aviation; -manage and guide FAA field security resources; -enforce security-related requirements; -identify related R&D requirements Federal security manager -designated focal point for federal aviation security activities at each Category X airport a Foreign security officer -assigned to each airport outside the United States at which extraordinary security measures are required a Category X airports (19) typically have a large number of passenger enplanements per year, along with departing international flights. 9
Airside Security Procedures Fencing Identification of persons Identification of vehicles Protection of aircraft on aprons Control of general aviation Transfer and interlining passengers, baggage, and cargo Aircraft isolated parking position and disposal area 10
The part to baggage carousels not open to the public for Airside Security Procedures 11
Landside Security Procedures- Passenger Terminal Security measures in the passenger terminal area are most effective in preventing subsequent unlawful acts in the air Ideally a security systems operates throughout the whole passenger facilitation process of ticketing, passenger and baggage check-in, and boating. 12
Favored by passengers Advantages and Disadvantages of centralized and Decentralized Search Procedures Advantages Minimum personnel and equipment needed to process a given number of passengers Encourages passenger spending in restaurants and duty-free and other shops Easier to have policemen on duty in on place The separation and surveillance problem is eliminated The risk of collusion is minimized Allows special measures to be taken on high risk flights Combines the advantages and disadvantages of the other systems Could be the best bet if space available in the right place to set up search points Centralized Search Disadvantages Passenger segregation in a sterile departure lounge is difficult to achieve Requires staff search Passenger separation (arriving and departing) difficult to achieve Surveillance of passengers difficult at busy airports Only one standard of search is possible, whereas high risk flights may require more thorough search Gate Search Pier Search Requires earlier call-forward of passengers Results in loss of revenue from restaurants, bars, shops, etc. Involves long waiting in crowded gate lounges with no facilities Requires more personnel and more equipment to process a given number of passengers Creates problems of search team availability of flight schedules go awry Makes a police presence difficult depending on number of gates in use at one time Allows passengers to get close to aircraft specific passengers and lines them up for attack when queuing Current gate lounges inadequate for future aircraft 13
Landside Procedures-Cargo Terminal 1. Identification. 2. Security of all doors and windows. 3. Control of access. 14
Security Equipment and Systems 1. Security fencing and manned barriers. 2. Intruder detection. 3. Lighting. 4. Metal detection. 5. Explosive and incendiary device detectors. 6. Pressure chambers. 7. Bunker. 8. Office security equipment. 15
Security Program for Security Operations 1. General 2. Organization 3. Airport Security Committee 4. Airport Activities 5. Security Measures at the Airport 6. Contingency Plans to Respond to Acts of Unlawful Interference 7. Security Training Program 8. Appendices to Security Program Lisbon Airport 16
Security check (video) 17
Security check (video) 18
Security check (video) 19
Key Terms Responsibility Airside security procedure Landside security procedure Passenger terminal Cargo terminal Security equipments and systems Security operation Jacking incidents Hijackings Security Equipment 20
Bombings Off-airport attacks Incident Security services Airport administration Feasibility Responsibility Efficiency Coordination Resources Key Terms (cont.) 21
Key Terms (cont.) Receipt of intelligence Threat information Threat assessment Risk assessment Dissemination Director of intelligence and security Associate administrator for civil Aviation Security Federal security manager Foreign security officer 22
Fencing Identification Security Program Key Terms (cont.) 23