1. Case Study: Fraport AG
How to Cut the Gordian Knot?
Philipp Kriegbaum
Vice President, Security and Quality Management
Fraport AG
2. How to Cut the Gordian Knot?
Airport Security Conference
Prague, 17 and 18 September 2013
Philipp Kriegbaum
Fraport AG
3. Table of Contents
Chart 3
•Risk-based security: Who dares?
•World-wide activities striving for a paradigm
shift
•What are the airports doing?
4. Risk-based, Traveller-friendly and
EfficientSecurity - Can it be
Achieved?
Chart 4
• Gordian Knot: a
metaphor for an
intractable problem
(disentangling an
"impossible" knot)
• Solved easily by
cheating or "thinking
outside the box"
("cutting the Gordian
knot").
5. Security Risk Assessment to be
Conducted by National Authorities
Chart 5
3.1.3 Each Contracting State shall keep
under constant review the level of threat
to civil aviation within its territory, and
establish and implement policies and
procedures to adjust relevant elements of
its national civil aviation security
programme accordingly, based upon a
security risk assessment carried out by
the relevant national authorities.
Note.— Guidance material regarding
threat assessment and risk management
methodologies can be found in the
Aviation Security Manual (Doc 8973 —
Restricted).
6. How Much Security Does it Take to
Outweigh Risk?
Chart 6
risk
security
measures
the more security
measures the better
7. How Much Security Does it Take to
Outweigh Risk?
Chart 7
risk
security
measures
the more security
measures the better
less measures with
proper
implementation
8. 1977 1988 2001 2001 2006 2009 2010 2012 2014 ??
increased screening of cargo
screening of airport supplies
screening of cargo
increased body search – implementation of body scanners
restrictions on liquids, aerosols and gels (LAGs) in hand luggage
shoe screening - additional requirements for US-bound passengers (e.g. API)
separation of passengers – laptops out – staff screening - increased training requirements
100 % screening of hold baggage (beginning 1988, fully implemented 2003)
screening of passengers and hand luggage – baggage reconciliation - additional measures for high risk flights
Since the 1970ies: Dramatic Increase of Security
Requirements - With no Layer Ever Removed
9. Terrorists are a Minority in the
Community of Passengers
Chart 9
Terrorists
Travellers
Passengers
10. Security Resources are Distributed
Evenly on All Passengers
Chart 10
Terrorists
Travellers
Security
Resources
12. Major Challenge: Data and
Tracking Passengers
Chart 12
Study on Differentiation of
Passenger and Risk Groups
for
European Commission DG
MOVE Av Sec Unit
Draft Leigh Fisher,
11 July 2013
13. Table of Contents
Chart 13
•Risk-based security: Who dares?
•World-wide activities striving for a paradigm
shift
•What are the airports doing?
14. World Wide Efforts for Risk-Based
Security
Chart 14
Agency Initiative
ACIE / AEA better SECURITY
ACI WORLD
Next Generation
Screening Task Force
European Commission
Smarter aviation security
for the EU
UK DfT
Outcome-based
Security
IATA
Checkpoint of the
Future
ICAO
Next Genereation
Screening TAG
TSA TSA Pre✓™
15. Table of Contents
Chart 15
•Risk-based security: Who dares?
•World-wide activities striving for a paradigm
shift
•What are the airports doing?
16. Risk Based Security Trials - Source ACIE
Information Differentiation
Random Selection/
Unpredictability
Behaviour
Detection
Screening Point
Copenhagen
Staff screening
(EDD)
Remote screening
Zürich Staff screening Use of BDO
ADP BDO Use of BDO
Schiphol
Unpredictability
screening
technology
Unpredictability
screening
technology
Frankfurt Staff screening
Swedavia
Advanced pax
checkpoint
Advanced pax
checkpoint
Advanced pax
checkpoint
Advanced pax
checkpoint
Helsinki Staff screening
Brussels Remote screening
Heathrow
Identity
Authentification
Enhanced
Detection
Geneva
Identity
Authentification