Aviation Security Challenges Practical Solutions David Alexander ICAO
- Slides: 53
Aviation Security Challenges Practical Solutions David Alexander ICAO AVSEC PM Professional Aviation Services (Pty) Ltd
Contents • • Background Onboard security Screening Airports attacks Countermeasures Some solutions Questions and closing
A new era in Aviation Security • Focus on the aircraft • Screening • Profiling • Intelligence
Security on board • Sky marshals on selected flights • Secure cockpit doors • Security training for flight and cabin crew • Passenger awareness
At the airport? • Long delays • Stringent screening (Shoes and parcels) • Angry passengers
Advanced screening systems Passengers screening combining scanning, metal detection and explosive detection
Advanced baggage screening • Fully automated CTX screening • Screener intervention to resolve alarms • Some include explosive detection
The 5 stage baggage screening system • Level 1 Fully automated • Level 2 Operator screening • Level 3 Alternate Technology • Level 4 Physical examination in presence of passenger • Level 5 if the passenger cannot be reconciled with the bag and the bag will be considered as a threat and dealt with accordingly. Computer Tomography X-ray
Cabin baggage screening Very difficult to get any illegal item past screening points
Result? • Much more difficult to get a device or weapon on board • Seek alternative targets • Airport and transport facilities
Why airports and aviation? • High profile • Many people • Symbol of nation • Guaranteed the attack will make the news
Airport Attacks Brussels Zaventem
2007 Glasgow International Airport attack • A terrorist ramming attack which occurred on Saturday 30 June 2007 • Security bollards outside the entrance stopped the car from entering the terminal • Religious motivation connected to the Iraqi conflict
Results • Increased security at several UK airports • Additional concrete bollards at vehicle access points By Thomas Nugent, CC BY-SA 2. 0, https: //commons. wikimedia. org/w/index. php? curid=13153432
Domodedovo International Airport bombing • Explosion affected the baggage-claim area of the airport's international arrivals hall • The bombing killed 37 people and injured 173 others • Two suicide bombers, suspected to be Islamist militants from the North Caucasus
Airport owner charged Dmitriy Kamenshchik, the owner of the Domodedovo airport, charged with the provision of services that do not meet security standards in connection with 2011 terrorist attack that left 37 dead
2014 Jinnah International Airport attack • 8 June 2014, 10 militants armed with automatic weapons, a rocket launcher, suicide vests, and grenades attacked • 36 people were killed, including all 10 attackers, and 18 others were wounded • The militant organisation Tehrik-i-Taliban Pakistan (TTP) claimed responsibility for the attack.
2016 Brussels Airport in Zaventem • Retaliation for Belgium involvement in attacks on ISIS • Two suicide bombers, carrying explosives in large suitcases, attacked a departure hall • In two separate check in rows
Maalbeek metro station Explosion took place in the middle carriage of a three-carriage train at Maalbeek metro station
Brussels attacks In the bombings, 35 people, including three suicide bombers, were killed and over 300 others were injured, 62 critically. Including the attackers, seventeen bodies were recovered at Brussels Airport and fourteen at the metro station
2016 Atatürk Airport attack • Gunmen armed with automatic weapons and explosive belts staged a simultaneous attack at the international terminal of Terminal 2 • Forty-five people were killed, in addition to the three attackers, and 239 people were injured
Changing patterns • Glasgow vehicle ramming • Moscow suicide bomber in arrivals • Jinnah armed assault • Brussels suicide bombers in departure hall • Istanbul armed assault and suicide vests in departure area and parking area
The challenge of new media • Were reliant on media houses • Now self publish • They decide when they get attention
Method, the lone wolf and small groups • Difficult to detect • Prospect creates fear • One attack causes many warnings, expense, fear, inconvenience
Threats “A pro-Islamic State Twitter account has warned of a terror attack on planes flying from Heathrow Airport across the US independence Day weekend. ” Metro UK (Picture: Scott Barbour/Getty Images)
Insider threat • Very difficult to detect • Vetting, recruitment and monitoring the key
Metrojet • Claim the flight was downed by a soda can IED • Most likely planted in catering by an “Insider”
Aftermath? • Increased security measures in many countries • More delays • Fear of travel • Expense
Counter measures What can be done?
Rings of protection Outer Middle Inner Sterile
Outer • Establish at airport boundary/perimeter • Includes fencing, lighting, signs, alarms • Designed to channel people/vehicles through controlled access gates and points
Rings of protection Outer Middle Inner Sterile
Middle • Establish at exterior of buildings, terminals, situated within airport boundary (greater physical protection of doors, windows, roofs, skylights) • For open areas such as runways and aprons, (protected by patrolling/guarding/surveillance)
Rings of protection Outer Middle Inner Sterile
Inner Buildings, areas, aircraft requiring maximum protection (protected by guarding/patrolling and additional barriers)
Rings of protection Outer Middle Inner Sterile
Sterile area • Passengers with valid tickets • Employees with valid permits • EVERYBODY screened before entry
Attacks being forced to the outer ring… A good thing?
Cooperation • Role players working together to design solutions • Airport authorities, ICAO, IATA, ACI, Police and intelligence bodies • Learn from experience
Airport design “Sometimes, art and function coincide. Open spaces and high ceilings can reduce the impact of a concussive blast. Other times, designers are working to reduce congestion in non-secure areas and create more offsite checkpoints. They seek to channel passengers in ways that take advantage of hightech sensors, cameras and facial recognition software that may help police stop assailants before they kill. ” Yahoo News By Alwyn Scott and Daniel Trotta
Information security Ensure that your security data is safe guarded, includes • • • Security design features Personnel details Shifts SOP’s Emergency procedures
Intelligence? • Many protest the surveillance being done • Security and safety or privacy? • You choose • I want them to watch all the time
Choose • Security and safety • Privacy • Choose, you cannot have both
Recruiting key • Recruit carefully • Select and vet correctly and thoroughly • Look after your people
Profiling • Essential tool despite bad press and resistance • Stopped many attacks • The attackers in Istanbul had on winter coats despite it being summer……….
Not “Criminal Minds”…… A very important tool and technique for keeping us safe
See something, say something To report suspicious activity, contact your local law enforcement agency. Describe specifically what you observed, including: • • Who or what you saw; When you saw it; Where it occurred; and Why it's suspicious. If there is an emergency, call 9– 1– 1. From US DHS
Random and unpredictable “TSA officers may use risk-based security measures to identify, mitigate and resolve potential threats at the airport security checkpoint. These officers may ask you questions about your travel to include identity, travel itinerary and property. TSA may use a variety of screening processes, including random screening, regardless of whether an alarm is triggered. In addition, TSA uses unpredictable security measures throughout the airport and no individual is guaranteed expedited screening. ” https: //www. tsa. gov/travel/security-screening
CCTV • Advanced observation • Track movement of persons • High image quality and image manipulation • Very valuable security tool
Training • Training is critical • Train EVERYBODY! • Aviation Security Awareness • Why is awareness important? • What must we be aware of? • What does awareness mean? (How is it done? ) • What do I do if I see something? • Who do I report it to?
Don’t train because you must……. . • Train because it is the most effective way to create maximum “eyes” on security and possible threats • Train everybody, all can contribute to security • Train for your circumstances, include practical exercises
Conclusions • Threats and attack methods evolve all the time • Technology is evolving to meet current (and yesterday’s) threat • Intelligence is key • Human measures (profiling, recruiting, training) are the most effective detection method • Motivated, trained, aware personnel are the best deterrent
Questions? Presentation by David Alexander ICAO AVSEC PM Professional Aviation Services (Pty) Ltd 082 308 0169 david@professional. za. com
- Doc 9941
- Sdn security challenges and solutions
- Private secuirty
- Nick sabatini & associates llc
- Practical packaging solutions
- Managing the aging workforce challenges and solutions
- Security and ethical challenges
- Theo dimitrakos
- Security and ethical challenges
- Ibm security products
- Computer security principles and practice solutions
- Forefront security solutions
- Qradar mssp
- Enterprise security solutions
- Modulo security solutions
- Sirius cybersecurity
- Enterprise cabling & security solutions
- Security solutions for ibm
- Osi security architecture in network security
- Security guide to network security fundamentals
- Wireless security in cryptography and network security
- Visa international security model in information security
- Electronic mail security in network security
- Cnss security model 27 cells example
- Integrity in e commerce
- Building security software
- Security guide to network security fundamentals
- Security guide to network security fundamentals
- Saaq module 7
- Usap audit
- Icao fsmp
- Icao doc 9774
- Outer horizontal surface
- Icao approach classification
- Efod icao
- Icao maps
- Icao annex 10
- Icao annex 6
- Norma icao para fotos
- Annex 17 to the chicago convention
- Annex 15 icao
- Doc 4444 icao 2019
- Icao safety management system
- Icao annex 19 summary
- Guidance on the issuance of snowtam
- Icao wacaf
- ıcao annex 1
- Icao annexes 1 to 19
- Icao annexes 1 to 19
- Doc10066
- Rome icao
- Icao doc 9863
- Icao usoap protocol questions
- Icao annex 14 chapter 9