SlideShare a Scribd company logo
1 of 53
Aviation Security
Challenges
Practical Solutions
David Alexander ICAO AVSEC PM
Professional Aviation Services (Pty) Ltd
Contents
• Background
• Onboard security
• Screening
• Airports attacks
• Countermeasures
• Some solutions
• Questions and closing
A new era in Aviation Security
• Focus on the aircraft
• Screening
• Profiling
• Intelligence
Security on board
• Sky marshals on selected flights
• Secure cockpit doors
• Security training for flight and cabin crew
• Passenger awareness
At the airport?
• Long delays
• Stringent screening (Shoes and
parcels)
• Angry passengers
Advanced screening systems
Passengers screening combining scanning,
metal detection and explosive detection
Advanced baggage screening
• Fully automated CTX screening
• Screener intervention to resolve alarms
• Some include explosive detection
The 5 stage baggage screening system
• Level 1 Fully automated
• Level 2 Operator screening
• Level 3 Alternate Technology
• Level 4 Physical examination in
presence of passenger
• Level 5 if the passenger cannot be
reconciled with the bag and the bag
will be considered as a threat and
dealt with accordingly.
Computer Tomography X-ray
Cabin baggage screening
Very difficult to get any illegal item past
screening points
Result?
• Much more difficult to get a device or
weapon on board
• Seek alternative targets
• Airport and transport facilities
Why airports and aviation?
• High profile
• Many people
• Symbol of nation
• Guaranteed the attack will make the news
Airport Attacks
Brussels Zaventem
2007 Glasgow International Airport attack
• A terrorist ramming attack which occurred
on Saturday 30 June 2007
• Security bollards outside the entrance
stopped the car from entering the terminal
• Religious motivation connected to the Iraqi
conflict
Results
• Increased security at several UK
airports
• Additional concrete bollards at
vehicle access points
By Thomas Nugent, CC BY-SA 2.0, https://commons.wikimedia.org/w/index.php?curid=13153432
Domodedovo International Airport bombing
• Explosion affected the baggage-claim
area of the airport's international arrivals
hall
• The bombing killed 37 people and injured
173 others
• Two suicide bombers, suspected to be
Islamist militants from the North
Caucasus
Airport owner charged
Dmitriy Kamenshchik, the owner of the
Domodedovo airport, charged with the
provision of services that do not meet
security standards in connection with
2011 terrorist attack that left 37 dead
2014 Jinnah International Airport attack
• 8 June 2014, 10 militants armed with
automatic weapons, a rocket launcher,
suicide vests, and grenades attacked
• 36 people were killed, including all 10
attackers, and 18 others were wounded
• The militant organisation Tehrik-i-Taliban
Pakistan (TTP) claimed responsibility for the
attack.
2016 Brussels Airport in Zaventem
• Retaliation for Belgium involvement in
attacks on ISIS
• Two suicide bombers, carrying explosives in
large suitcases, attacked a departure hall
• In two separate check in rows
Maalbeek metro station
Explosion took place in the middle carriage of a
three-carriage train at Maalbeek metro station
Brussels attacks
In the bombings, 35 people, including
three suicide bombers, were killed and
over 300 others were injured, 62
critically.
Including the attackers, seventeen
bodies were recovered at Brussels
Airport and fourteen at the metro
station
2016 Atatürk Airport attack
• Gunmen armed with automatic weapons and
explosive belts staged a simultaneous attack
at the international terminal of Terminal 2
• Forty-five people were killed, in addition to
the three attackers, and 239 people were
injured
Changing patterns
• Glasgow vehicle ramming
• Moscow suicide bomber in arrivals
• Jinnah armed assault
• Brussels suicide bombers in departure hall
• Istanbul armed assault and suicide vests in
departure area and parking area
The challenge of new
media
• Were reliant on media houses
• Now self publish
• They decide when they get attention
Method, the lone wolf and small groups
• Difficult to detect
• Prospect creates fear
• One attack causes many warnings, expense,
fear, inconvenience
Threats
“A pro-Islamic State Twitter account has
warned of a terror attack on planes
flying from Heathrow Airport across the
US independence Day weekend.”
Metro UK
(Picture: Scott Barbour/Getty Images)
Insider threat
• Very difficult to detect
• Vetting, recruitment and monitoring the key
Metrojet
• Claim the flight was downed by a soda can
IED
• Most likely planted in catering by an
“Insider”
Aftermath?
• Increased security measures in many
countries
• More delays
• Fear of travel
• Expense
Counter measures
What can be done?
Rings of protection
Outer
Middle
Inner
Sterile
Outer
• Establish at airport boundary/perimeter
• Includes fencing, lighting, signs, alarms
• Designed to channel people/vehicles through
controlled access gates and points
Rings of protection
Outer
Middle
Inner
Sterile
Middle
• Establish at exterior of buildings, terminals,
situated within airport boundary (greater
physical protection of doors, windows, roofs,
skylights)
• For open areas such as runways and aprons,
(protected by
patrolling/guarding/surveillance)
Rings of protection
Outer
Middle
Inner
Sterile
Inner
Buildings, areas, aircraft requiring maximum
protection (protected by guarding/patrolling
and additional barriers)
Rings of protection
Outer
Middle
Inner
Sterile
Sterile area
• Passengers with valid tickets
• Employees with valid permits
• EVERYBODY screened before entry
Attacks being forced to the outer ring…
A good thing?
Cooperation
• Role players working together to
design solutions
• Airport authorities, ICAO, IATA, ACI,
Police and intelligence bodies
• Learn from experience
Airport design
“Sometimes, art and function coincide. Open spaces
and high ceilings can reduce the impact of a
concussive blast.
Other times, designers are working to reduce
congestion in non-secure areas and create more
offsite checkpoints. They seek to channel
passengers in ways that take advantage of high-
tech sensors, cameras and facial recognition
software that may help police stop assailants
before they kill.”
Yahoo News By Alwyn Scott and Daniel Trotta
Information security
Ensure that your security data is safe guarded,
includes
• Security design features
• Personnel details
• Shifts
• SOP’s
• Emergency procedures
Intelligence?
• Many protest the surveillance being done
• Security and safety or privacy?
• You choose
• I want them to watch all the time
Choose
• Security and safety
• Privacy
• Choose, you cannot have both
Recruiting key
• Recruit carefully
• Select and vet correctly and thoroughly
• Look after your people
Profiling
• Essential tool despite bad press and
resistance
• Stopped many attacks
• The attackers in Istanbul had on winter coats
despite it being summer……….
Not “Criminal Minds”……
A very important tool and technique for keeping us safe
See something, say something
To report suspicious activity, contact
your local law enforcement agency.
Describe specifically what you
observed, including:
• Who or what you saw;
• When you saw it;
• Where it occurred; and
• Why it's suspicious.
If there is an emergency,
call 9–1–1.
From US DHS
Random and unpredictable
“TSA officers may use risk-based security
measures to identify, mitigate and resolve
potential threats at the airport security
checkpoint. These officers may ask you
questions about your travel to include identity,
travel itinerary and property. TSA may use a
variety of screening processes, including
random screening, regardless of whether an
alarm is triggered. In addition, TSA uses
unpredictable security measures throughout
the airport and no individual is guaranteed
expedited screening.”
https://www.tsa.gov/travel/security-screening
CCTV
• Advanced observation
• Track movement of persons
• High image quality and image manipulation
• Very valuable security tool
Training
• Training is critical
• Train EVERYBODY!
• Aviation Security Awareness
• Why is awareness important?
• What must we be aware of?
• What does awareness mean? (How is it
done?)
• What do I do if I see something?
• Who do I report it to?
Don’t train because you
must……..
• Train because it is the most effective way to create maximum
“eyes” on security and possible threats
• Train everybody, all can contribute to security
• Train for your circumstances, include practical exercises
Conclusions
• Threats and attack methods evolve all the time
• Technology is evolving to meet current (and
yesterday’s) threat
• Intelligence is key
• Human measures (profiling, recruiting, training)
are the most effective detection method
• Motivated, trained, aware personnel are the best
deterrent
Questions?
Presentation by David Alexander ICAO AVSEC PM
Professional Aviation Services (Pty) Ltd
082 308 0169 david@professional.za.com

More Related Content

What's hot

Aviation accidents and incidents
Aviation accidents and incidentsAviation accidents and incidents
Aviation accidents and incidents
stargate1280
 
overview on airport operation
overview on airport operationoverview on airport operation
overview on airport operation
AiDY
 
Ramp safety officer
Ramp safety officerRamp safety officer
Ramp safety officer
Ad Suryana
 

What's hot (20)

Safety & Security Airports
Safety & Security AirportsSafety & Security Airports
Safety & Security Airports
 
Airside Hazards And Risks
Airside Hazards And RisksAirside Hazards And Risks
Airside Hazards And Risks
 
Aviation accidents and incidents
Aviation accidents and incidentsAviation accidents and incidents
Aviation accidents and incidents
 
Ground Handling
Ground HandlingGround Handling
Ground Handling
 
Aviation safety management
Aviation safety managementAviation safety management
Aviation safety management
 
Aviation Safety Training
Aviation Safety TrainingAviation Safety Training
Aviation Safety Training
 
Aircraft accident investigation ppt
Aircraft accident investigation   pptAircraft accident investigation   ppt
Aircraft accident investigation ppt
 
Ramp Handling
Ramp HandlingRamp Handling
Ramp Handling
 
history of airport security
history of airport security               history of airport security
history of airport security
 
overview on airport operation
overview on airport operationoverview on airport operation
overview on airport operation
 
Ramp safety officer
Ramp safety officerRamp safety officer
Ramp safety officer
 
AirportSecurityPlan
AirportSecurityPlanAirportSecurityPlan
AirportSecurityPlan
 
Aviation Safety Mangement
Aviation Safety MangementAviation Safety Mangement
Aviation Safety Mangement
 
Safety & Security Airports comparison
Safety & Security Airports comparisonSafety & Security Airports comparison
Safety & Security Airports comparison
 
AIRPORT EMERGENCY PLAN FAAN.pdf
AIRPORT EMERGENCY PLAN FAAN.pdfAIRPORT EMERGENCY PLAN FAAN.pdf
AIRPORT EMERGENCY PLAN FAAN.pdf
 
Ramp safety
Ramp safetyRamp safety
Ramp safety
 
LOAD CONTROL SUPERVISOR / LOAD PLANNER
LOAD CONTROL SUPERVISOR / LOAD PLANNERLOAD CONTROL SUPERVISOR / LOAD PLANNER
LOAD CONTROL SUPERVISOR / LOAD PLANNER
 
Aviation PPT Frankfinn
Aviation PPT FrankfinnAviation PPT Frankfinn
Aviation PPT Frankfinn
 
Airport security awareness program
Airport security awareness program Airport security awareness program
Airport security awareness program
 
Threat and Error Management in Aviation
Threat and Error Management in AviationThreat and Error Management in Aviation
Threat and Error Management in Aviation
 

Viewers also liked

Airport security – aviation security
Airport security – aviation securityAirport security – aviation security
Airport security – aviation security
IIAC
 
Smartpath SLS-4000 Ground Based Augmentation System By Brian Davis,Air Traffi...
Smartpath SLS-4000 Ground Based Augmentation System By Brian Davis,Air Traffi...Smartpath SLS-4000 Ground Based Augmentation System By Brian Davis,Air Traffi...
Smartpath SLS-4000 Ground Based Augmentation System By Brian Davis,Air Traffi...
IPPAI
 
How to write a news article_mscm tools_samantha sigler
How to write a news article_mscm tools_samantha siglerHow to write a news article_mscm tools_samantha sigler
How to write a news article_mscm tools_samantha sigler
samanthasigler123
 
Step4
Step4Step4
Step4
xerx
 
Making Air Travel Safer through More Efficient Training Practices
Making Air Travel Safer through More Efficient Training PracticesMaking Air Travel Safer through More Efficient Training Practices
Making Air Travel Safer through More Efficient Training Practices
IPPAI
 

Viewers also liked (20)

Airport security – aviation security
Airport security – aviation securityAirport security – aviation security
Airport security – aviation security
 
Sustainability in Aviation By Palash roy
Sustainability in Aviation By Palash roySustainability in Aviation By Palash roy
Sustainability in Aviation By Palash roy
 
Smartpath SLS-4000 Ground Based Augmentation System By Brian Davis,Air Traffi...
Smartpath SLS-4000 Ground Based Augmentation System By Brian Davis,Air Traffi...Smartpath SLS-4000 Ground Based Augmentation System By Brian Davis,Air Traffi...
Smartpath SLS-4000 Ground Based Augmentation System By Brian Davis,Air Traffi...
 
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warrenSecuring Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
 
Communication
CommunicationCommunication
Communication
 
Elctntnqs
ElctntnqsElctntnqs
Elctntnqs
 
Effective writing skills _ transitional terms
Effective writing skills _  transitional termsEffective writing skills _  transitional terms
Effective writing skills _ transitional terms
 
How to write a news article_mscm tools_samantha sigler
How to write a news article_mscm tools_samantha siglerHow to write a news article_mscm tools_samantha sigler
How to write a news article_mscm tools_samantha sigler
 
Top ten secret inteligent agencies part one
Top ten secret inteligent agencies    part oneTop ten secret inteligent agencies    part one
Top ten secret inteligent agencies part one
 
Step4
Step4Step4
Step4
 
Making Air Travel Safer through More Efficient Training Practices
Making Air Travel Safer through More Efficient Training PracticesMaking Air Travel Safer through More Efficient Training Practices
Making Air Travel Safer through More Efficient Training Practices
 
Report writing abhi
Report writing abhiReport writing abhi
Report writing abhi
 
Airport privatisation in india
Airport privatisation in indiaAirport privatisation in india
Airport privatisation in india
 
Annex 17
Annex 17Annex 17
Annex 17
 
Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12
 
cia
cia cia
cia
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Hold baggage Screening : MIS
Hold baggage Screening : MISHold baggage Screening : MIS
Hold baggage Screening : MIS
 
Incident report writing
Incident report writingIncident report writing
Incident report writing
 
X ray Bagging Inspection System
X ray Bagging Inspection SystemX ray Bagging Inspection System
X ray Bagging Inspection System
 

Similar to Aviation security challenges: practical solutions

Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
Russell Publishing
 
Glidepath Design Interfase.pdf
Glidepath Design Interfase.pdfGlidepath Design Interfase.pdf
Glidepath Design Interfase.pdf
Sharath Kota
 
Pharma Anti-Counterfeiting Amsterdam Feb 2011
Pharma Anti-Counterfeiting Amsterdam Feb 2011Pharma Anti-Counterfeiting Amsterdam Feb 2011
Pharma Anti-Counterfeiting Amsterdam Feb 2011
Mark Edwards
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
jemtallon
 

Similar to Aviation security challenges: practical solutions (20)

Safaty at hotels
Safaty at hotelsSafaty at hotels
Safaty at hotels
 
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesThe Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security Technologies
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
 
Academy
Academy Academy
Academy
 
Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"
 
Drones
DronesDrones
Drones
 
Glidepath Design Interfase.pdf
Glidepath Design Interfase.pdfGlidepath Design Interfase.pdf
Glidepath Design Interfase.pdf
 
Cybersecurity and drones 2015
Cybersecurity and drones 2015 Cybersecurity and drones 2015
Cybersecurity and drones 2015
 
C_Stevens_Immigration.ppt
C_Stevens_Immigration.pptC_Stevens_Immigration.ppt
C_Stevens_Immigration.ppt
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
 
Pharma Anti-Counterfeiting Amsterdam Feb 2011
Pharma Anti-Counterfeiting Amsterdam Feb 2011Pharma Anti-Counterfeiting Amsterdam Feb 2011
Pharma Anti-Counterfeiting Amsterdam Feb 2011
 
Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big Events
 
I'm being followed by drones
I'm being followed by dronesI'm being followed by drones
I'm being followed by drones
 
Drone sUAV Forensics
Drone sUAV ForensicsDrone sUAV Forensics
Drone sUAV Forensics
 
Stranded jet skier breaches JFK's $100M security
Stranded jet skier breaches JFK's $100M securityStranded jet skier breaches JFK's $100M security
Stranded jet skier breaches JFK's $100M security
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
 
An infosec watershed moment
An infosec watershed momentAn infosec watershed moment
An infosec watershed moment
 
SECURITY UPDATE.pptx
SECURITY UPDATE.pptxSECURITY UPDATE.pptx
SECURITY UPDATE.pptx
 

More from Tristan Wiggill

More from Tristan Wiggill (20)

Business Fleet Africa May 2023.pdf
Business Fleet Africa May 2023.pdfBusiness Fleet Africa May 2023.pdf
Business Fleet Africa May 2023.pdf
 
Business Fleet Africa April 2023.pdf
Business Fleet Africa April 2023.pdfBusiness Fleet Africa April 2023.pdf
Business Fleet Africa April 2023.pdf
 
Business Fleet Africa March 2023.pdf
Business Fleet Africa March 2023.pdfBusiness Fleet Africa March 2023.pdf
Business Fleet Africa March 2023.pdf
 
Business Fleet Africa January 2023.pdf
Business Fleet Africa January 2023.pdfBusiness Fleet Africa January 2023.pdf
Business Fleet Africa January 2023.pdf
 
Business Fleet Africa December 2022.pdf
Business Fleet Africa December 2022.pdfBusiness Fleet Africa December 2022.pdf
Business Fleet Africa December 2022.pdf
 
Business Fleet Africa November 2022.pdf
Business Fleet Africa November 2022.pdfBusiness Fleet Africa November 2022.pdf
Business Fleet Africa November 2022.pdf
 
Business Fleet Africa October 2022.pdf
Business Fleet Africa October 2022.pdfBusiness Fleet Africa October 2022.pdf
Business Fleet Africa October 2022.pdf
 
How do we keep Gauteng moving?
How do we keep Gauteng moving?How do we keep Gauteng moving?
How do we keep Gauteng moving?
 
Gauteng Transport Authority update
Gauteng Transport Authority updateGauteng Transport Authority update
Gauteng Transport Authority update
 
Road Funding in South Africa
Road Funding in South AfricaRoad Funding in South Africa
Road Funding in South Africa
 
Self regulation and road funding perspectives from the road transport managem...
Self regulation and road funding perspectives from the road transport managem...Self regulation and road funding perspectives from the road transport managem...
Self regulation and road funding perspectives from the road transport managem...
 
Roads: So how do we pay for them?
Roads: So how do we pay for them?Roads: So how do we pay for them?
Roads: So how do we pay for them?
 
Road funding from a freight forwarding and logistics perspective
Road funding from a freight forwarding and logistics perspectiveRoad funding from a freight forwarding and logistics perspective
Road funding from a freight forwarding and logistics perspective
 
Feedback on DRiVE: Distance-based Road user charge Voluntary Experiment
Feedback on DRiVE: Distance-based Road user charge Voluntary ExperimentFeedback on DRiVE: Distance-based Road user charge Voluntary Experiment
Feedback on DRiVE: Distance-based Road user charge Voluntary Experiment
 
E-tolls: The Impact on Development in Gauteng
E-tolls: The Impact on Development in GautengE-tolls: The Impact on Development in Gauteng
E-tolls: The Impact on Development in Gauteng
 
Transport and the economy: Understanding the relationship...and the dangers
Transport and the economy: Understanding the relationship...and the dangersTransport and the economy: Understanding the relationship...and the dangers
Transport and the economy: Understanding the relationship...and the dangers
 
Sout Africa's fuel price
Sout Africa's fuel priceSout Africa's fuel price
Sout Africa's fuel price
 
The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...
The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...
The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...
 
Beneficiaries of an optimally designed transportation system
Beneficiaries of an optimally designed transportation system Beneficiaries of an optimally designed transportation system
Beneficiaries of an optimally designed transportation system
 
Road Funds and Road User Charging in SADC
Road Funds and Road User Charging in SADC Road Funds and Road User Charging in SADC
Road Funds and Road User Charging in SADC
 

Recently uploaded

bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girlsbhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
mountabuangels4u
 
Morbi Escort💋 Call Girl (Komal) Service #Morbi Call Girl @Independent Girls
Morbi Escort💋 Call Girl (Komal) Service #Morbi Call Girl @Independent GirlsMorbi Escort💋 Call Girl (Komal) Service #Morbi Call Girl @Independent Girls
Morbi Escort💋 Call Girl (Komal) Service #Morbi Call Girl @Independent Girls
mountabuangels4u
 
Mehsana Escort💋 Call Girl (Bindu) Service #Mehsana Call Girl @Independent Girls
Mehsana Escort💋 Call Girl (Bindu) Service #Mehsana Call Girl @Independent GirlsMehsana Escort💋 Call Girl (Bindu) Service #Mehsana Call Girl @Independent Girls
Mehsana Escort💋 Call Girl (Bindu) Service #Mehsana Call Girl @Independent Girls
mountabuangels4u
 
Sample sample sample sample sample sample
Sample sample sample sample sample sampleSample sample sample sample sample sample
Sample sample sample sample sample sample
Casey Keith
 
Four Famous Temples In Jammu and Kashmir
Four Famous Temples In Jammu and KashmirFour Famous Temples In Jammu and Kashmir
Four Famous Temples In Jammu and Kashmir
SuYatra
 

Recently uploaded (20)

bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girlsbhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
bhachau Escort💋 Call Girl (Ramya) Service #bhachau Call Girl @Independent Girls
 
Pauri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Pauri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot ModelPauri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Pauri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Hooghly Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Hooghly Call Girls 🥰 8617370543 Service Offer VIP Hot ModelHooghly Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Hooghly Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Mehsana Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mehsana Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMehsana Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mehsana Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Lansdowne Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Lansdowne Call Girls 🥰 8617370543 Service Offer VIP Hot ModelLansdowne Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Lansdowne Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Siliguri Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Siliguri Call Girls 🥰 8617370543 Service Offer VIP Hot ModelSiliguri Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Siliguri Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Shimla Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Shimla Call Girls 🥰 8617370543 Service Offer VIP Hot ModelShimla Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Shimla Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Udhampur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Udhampur Call Girls 🥰 8617370543 Service Offer VIP Hot ModelUdhampur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Udhampur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Morbi Escort💋 Call Girl (Komal) Service #Morbi Call Girl @Independent Girls
Morbi Escort💋 Call Girl (Komal) Service #Morbi Call Girl @Independent GirlsMorbi Escort💋 Call Girl (Komal) Service #Morbi Call Girl @Independent Girls
Morbi Escort💋 Call Girl (Komal) Service #Morbi Call Girl @Independent Girls
 
Prayagraj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Prayagraj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelPrayagraj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Prayagraj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Mehsana Escort💋 Call Girl (Bindu) Service #Mehsana Call Girl @Independent Girls
Mehsana Escort💋 Call Girl (Bindu) Service #Mehsana Call Girl @Independent GirlsMehsana Escort💋 Call Girl (Bindu) Service #Mehsana Call Girl @Independent Girls
Mehsana Escort💋 Call Girl (Bindu) Service #Mehsana Call Girl @Independent Girls
 
North Goa Call Girls 🥰 8617370543 Service Offer VIP Hot Model
North Goa Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNorth Goa Call Girls 🥰 8617370543 Service Offer VIP Hot Model
North Goa Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Lahaul Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Lahaul Call Girls 🥰 8617370543 Service Offer VIP Hot ModelLahaul Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Lahaul Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Elevate Your Busy Season Email Marketing, Holly May Webinar.pptx
Elevate Your Busy Season Email Marketing, Holly May Webinar.pptxElevate Your Busy Season Email Marketing, Holly May Webinar.pptx
Elevate Your Busy Season Email Marketing, Holly May Webinar.pptx
 
Bhimtal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Bhimtal Call Girls 🥰 8617370543 Service Offer VIP Hot ModelBhimtal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Bhimtal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Chamba Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Chamba Call Girls 🥰 8617370543 Service Offer VIP Hot ModelChamba Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Chamba Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Sample sample sample sample sample sample
Sample sample sample sample sample sampleSample sample sample sample sample sample
Sample sample sample sample sample sample
 
Discover Mathura And Vrindavan A Spritual Journey.pdf
Discover Mathura And Vrindavan A Spritual Journey.pdfDiscover Mathura And Vrindavan A Spritual Journey.pdf
Discover Mathura And Vrindavan A Spritual Journey.pdf
 
Tehri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Tehri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot ModelTehri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Tehri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Four Famous Temples In Jammu and Kashmir
Four Famous Temples In Jammu and KashmirFour Famous Temples In Jammu and Kashmir
Four Famous Temples In Jammu and Kashmir
 

Aviation security challenges: practical solutions

  • 1. Aviation Security Challenges Practical Solutions David Alexander ICAO AVSEC PM Professional Aviation Services (Pty) Ltd
  • 2. Contents • Background • Onboard security • Screening • Airports attacks • Countermeasures • Some solutions • Questions and closing
  • 3. A new era in Aviation Security • Focus on the aircraft • Screening • Profiling • Intelligence
  • 4. Security on board • Sky marshals on selected flights • Secure cockpit doors • Security training for flight and cabin crew • Passenger awareness
  • 5. At the airport? • Long delays • Stringent screening (Shoes and parcels) • Angry passengers
  • 6. Advanced screening systems Passengers screening combining scanning, metal detection and explosive detection
  • 7. Advanced baggage screening • Fully automated CTX screening • Screener intervention to resolve alarms • Some include explosive detection
  • 8. The 5 stage baggage screening system • Level 1 Fully automated • Level 2 Operator screening • Level 3 Alternate Technology • Level 4 Physical examination in presence of passenger • Level 5 if the passenger cannot be reconciled with the bag and the bag will be considered as a threat and dealt with accordingly. Computer Tomography X-ray
  • 9. Cabin baggage screening Very difficult to get any illegal item past screening points
  • 10. Result? • Much more difficult to get a device or weapon on board • Seek alternative targets • Airport and transport facilities
  • 11. Why airports and aviation? • High profile • Many people • Symbol of nation • Guaranteed the attack will make the news
  • 13. 2007 Glasgow International Airport attack • A terrorist ramming attack which occurred on Saturday 30 June 2007 • Security bollards outside the entrance stopped the car from entering the terminal • Religious motivation connected to the Iraqi conflict
  • 14. Results • Increased security at several UK airports • Additional concrete bollards at vehicle access points By Thomas Nugent, CC BY-SA 2.0, https://commons.wikimedia.org/w/index.php?curid=13153432
  • 15. Domodedovo International Airport bombing • Explosion affected the baggage-claim area of the airport's international arrivals hall • The bombing killed 37 people and injured 173 others • Two suicide bombers, suspected to be Islamist militants from the North Caucasus
  • 16. Airport owner charged Dmitriy Kamenshchik, the owner of the Domodedovo airport, charged with the provision of services that do not meet security standards in connection with 2011 terrorist attack that left 37 dead
  • 17. 2014 Jinnah International Airport attack • 8 June 2014, 10 militants armed with automatic weapons, a rocket launcher, suicide vests, and grenades attacked • 36 people were killed, including all 10 attackers, and 18 others were wounded • The militant organisation Tehrik-i-Taliban Pakistan (TTP) claimed responsibility for the attack.
  • 18. 2016 Brussels Airport in Zaventem • Retaliation for Belgium involvement in attacks on ISIS • Two suicide bombers, carrying explosives in large suitcases, attacked a departure hall • In two separate check in rows
  • 19. Maalbeek metro station Explosion took place in the middle carriage of a three-carriage train at Maalbeek metro station
  • 20. Brussels attacks In the bombings, 35 people, including three suicide bombers, were killed and over 300 others were injured, 62 critically. Including the attackers, seventeen bodies were recovered at Brussels Airport and fourteen at the metro station
  • 21. 2016 Atatürk Airport attack • Gunmen armed with automatic weapons and explosive belts staged a simultaneous attack at the international terminal of Terminal 2 • Forty-five people were killed, in addition to the three attackers, and 239 people were injured
  • 22. Changing patterns • Glasgow vehicle ramming • Moscow suicide bomber in arrivals • Jinnah armed assault • Brussels suicide bombers in departure hall • Istanbul armed assault and suicide vests in departure area and parking area
  • 23. The challenge of new media • Were reliant on media houses • Now self publish • They decide when they get attention
  • 24. Method, the lone wolf and small groups • Difficult to detect • Prospect creates fear • One attack causes many warnings, expense, fear, inconvenience
  • 25. Threats “A pro-Islamic State Twitter account has warned of a terror attack on planes flying from Heathrow Airport across the US independence Day weekend.” Metro UK (Picture: Scott Barbour/Getty Images)
  • 26. Insider threat • Very difficult to detect • Vetting, recruitment and monitoring the key
  • 27. Metrojet • Claim the flight was downed by a soda can IED • Most likely planted in catering by an “Insider”
  • 28. Aftermath? • Increased security measures in many countries • More delays • Fear of travel • Expense
  • 31. Outer • Establish at airport boundary/perimeter • Includes fencing, lighting, signs, alarms • Designed to channel people/vehicles through controlled access gates and points
  • 33. Middle • Establish at exterior of buildings, terminals, situated within airport boundary (greater physical protection of doors, windows, roofs, skylights) • For open areas such as runways and aprons, (protected by patrolling/guarding/surveillance)
  • 35. Inner Buildings, areas, aircraft requiring maximum protection (protected by guarding/patrolling and additional barriers)
  • 37. Sterile area • Passengers with valid tickets • Employees with valid permits • EVERYBODY screened before entry
  • 38. Attacks being forced to the outer ring… A good thing?
  • 39. Cooperation • Role players working together to design solutions • Airport authorities, ICAO, IATA, ACI, Police and intelligence bodies • Learn from experience
  • 40. Airport design “Sometimes, art and function coincide. Open spaces and high ceilings can reduce the impact of a concussive blast. Other times, designers are working to reduce congestion in non-secure areas and create more offsite checkpoints. They seek to channel passengers in ways that take advantage of high- tech sensors, cameras and facial recognition software that may help police stop assailants before they kill.” Yahoo News By Alwyn Scott and Daniel Trotta
  • 41. Information security Ensure that your security data is safe guarded, includes • Security design features • Personnel details • Shifts • SOP’s • Emergency procedures
  • 42. Intelligence? • Many protest the surveillance being done • Security and safety or privacy? • You choose • I want them to watch all the time
  • 43. Choose • Security and safety • Privacy • Choose, you cannot have both
  • 44. Recruiting key • Recruit carefully • Select and vet correctly and thoroughly • Look after your people
  • 45. Profiling • Essential tool despite bad press and resistance • Stopped many attacks • The attackers in Istanbul had on winter coats despite it being summer……….
  • 46. Not “Criminal Minds”…… A very important tool and technique for keeping us safe
  • 47. See something, say something To report suspicious activity, contact your local law enforcement agency. Describe specifically what you observed, including: • Who or what you saw; • When you saw it; • Where it occurred; and • Why it's suspicious. If there is an emergency, call 9–1–1. From US DHS
  • 48. Random and unpredictable “TSA officers may use risk-based security measures to identify, mitigate and resolve potential threats at the airport security checkpoint. These officers may ask you questions about your travel to include identity, travel itinerary and property. TSA may use a variety of screening processes, including random screening, regardless of whether an alarm is triggered. In addition, TSA uses unpredictable security measures throughout the airport and no individual is guaranteed expedited screening.” https://www.tsa.gov/travel/security-screening
  • 49. CCTV • Advanced observation • Track movement of persons • High image quality and image manipulation • Very valuable security tool
  • 50. Training • Training is critical • Train EVERYBODY! • Aviation Security Awareness • Why is awareness important? • What must we be aware of? • What does awareness mean? (How is it done?) • What do I do if I see something? • Who do I report it to?
  • 51. Don’t train because you must…….. • Train because it is the most effective way to create maximum “eyes” on security and possible threats • Train everybody, all can contribute to security • Train for your circumstances, include practical exercises
  • 52. Conclusions • Threats and attack methods evolve all the time • Technology is evolving to meet current (and yesterday’s) threat • Intelligence is key • Human measures (profiling, recruiting, training) are the most effective detection method • Motivated, trained, aware personnel are the best deterrent
  • 53. Questions? Presentation by David Alexander ICAO AVSEC PM Professional Aviation Services (Pty) Ltd 082 308 0169 david@professional.za.com

Editor's Notes

  1. After the 9/11 attacks the focus was placed on preventing the introduction of threats (devices, people, objects) that could be used to commit and act against the aircraft Emphasis on screening of passengers and cargo Profiling of passengers not on religious or ethnic grounds but on who could present a threat (behaviour, clothing, appearance) Sharing of intelligence on possible threats
  2. Airport attacks targeting pre security “soft” areas
  3. Police identified the two men as Bilal Abdullah, a British-born, Muslim doctor of Iraqi descent working at the Royal Alexandra Hospital,[10][11] and Kafeel Ahmed, also known as Khalid Ahmed, an engineer and the driver, who was treated for fatal burns at the same hospital.[12] The newspaper, The Australian, alleges that a suicide note indicated that the two had intended to die in the attack.[13] Kafeel Ahmed died from his injuries on 2 August.[14] Bilal Abdullah was later found guilty of conspiracy to commit murder and was sentenced to life imprisonment with a minimum of 32 years.
  4. The explosion affected the baggage-claim area of the airport's international arrivals hall.[1] Some reports have suggested that the explosion was the work of a suicide bomber, with investigators saying the explosion was caused by an "improvised device packed with shrapnel, pieces of chopped wire" and the equivalent to between two and five kilograms of TNT.[7][8] Russia's chief investigator has stated the explosion was the work of terrorists.[4] Investigators found a male head and believed it might have been that of the suicide bomber.[8][9]
  5. the attackers were foreigners of Uzbek origin who belonged to the Islamic Movement of Uzbekistan (IMU), an Al Qaeda-linked militant organisation that works closely with TTP.[3][4] The TTP later confirmed that the attack was a joint operation they executed with the IMU, who independently admitted to having supplied personnel for the attack. The attack began at 11:10 PM on 8 June and lasted until the morning around 4:00 AM of 9 June.[16] Ten attackers divided in 2 groups, stormed at two different checkpoint and attacked the cargo terminal of the airport with [17] automatic weapons, hand grenades, rocket-propelled grenades, and other explosives. The attackers were dressed as security guards, with some also wearing suicide vests. They were wearing uniforms of the Airports Security Force (ASF).[2] A senior Pakistani intelligence official said some of the militants tried to hijack a plane, but were unsuccessful.[18] Airports Security Force troops fought bravely, limited the terrorists attack and started taking them out one by one. Within 2 hours, eight of the ten militants were shot dead by the Airports Security Force troops and the remaining two blew themselves up when they were cornered. About 90 minutes after the attack began, hundreds of Rangers, Police and Army troops arrived on the scene but the majority of terrorists had already been eliminated by Airports Security Force.[19][20] The siege officially ended after five hours; 28 people, including the ten terrorists, 12 ASF personnel, one Pakistan Rangers officials, a Sindh Police official, and four PIA employees (including two senior aircraft engineers)[14] were killed in the incident.[13] At least 18 security personnel were also injured in the attack and admitted to Abbasi Shaheed Hospital.[16] Seven bodies that were burnt beyond recognition were also recovered from the airport's cold storage facility after a 28-hour rescue operation.[21]
  6. wo suicide bombers, carrying explosives in large suitcases, attacked a departure hall at Brussels Airport in Zaventem. The first explosion occurred at 7:58 a.m. in check-in row 11; the second explosion occurred about nine seconds later in check-in row 2. The suicide bombers were visible in CCTV footage.[37] Some witnesses said that before the first explosion occurred, shots were fired and there were yells in Arabic. However, authorities have stated afterwards that no shots were fired.[38][39][40][citation needed] Belgium is a participant in the ongoing military intervention against ISIL, during the Iraqi Civil War.[11] On 5 October 2014, a Belgian F-16 dropped its first bomb on an ISIL target, east of Baghdad.[12] On 12 November 2015, Iraq warned members of the coalition that Abu Bakr al-Baghdadi, the leader of ISIL, had ordered retaliatory attacks on countries involved in the coalition against ISIL.[13] Belgium has more nationals fighting for jihadist forces as a proportion of its population than any other Western European country, with an estimated 440 Belgians having left for Syria and Iraq as of January 2015.[14][15] Due to Belgium's weak security apparatus and competing intelligence agencies, it has become a hub of jihadist-recruiting and terrorist activity
  7. Refugee child
  8. Shortly before 22:00 Istanbul time, two assailants approached the x-ray scanner at a security checkpoint, and opened fire.[10] Police officers then returned fire. The assailants then detonated bombs on their persons.[11][12] Based on a security camera video, one of the bombers was about 80 feet (24 m) inside Terminal 2 (the International terminal) when he detonated his suicide bomb.[13] In the CCTV video the explosion can be seen within or near a group of people.[13] It is also believed that one of the explosions was in the parking lot across the street of the terminal.[14] A closed-circuit video of the incident showed an armed assailant walking and firing at people within the terminal. The gunman was then shot by a security officer and fell to the ground, with the security officer approaching to investigate. The officer then ran away, presumably having noticed the gunman's explosive belt. The suicide belt then detonated.[15] During and immediately after the attacks, hundreds of passengers and people inside the airport hid anywhere they could in shops, washrooms, and under benches.[16] Two of the attackers detonated explosive devices, killing themselves; one was killed, presumably by security forces.[16] There were three perpetrators who detonated their explosives in or near the terminal. However, there were reports and witnesses stating that there were four armed men running away from the blasts; this has not yet been confirmed by police personnel. A US intelligence source told CBS News that the coordinated attacks lasted only about 90 seconds.[17] Many travelers described what they saw during the attack to reporters. One man stated, "We came right to international departures and saw the man randomly shooting. He was just firing at anyone coming in front of him. He was wearing all black. His face was not masked. I was 50 meters away from him."[18] He continued, "We ducked behind a ticket counter but I stood up and watched him. Two explosions went off shortly after one another. By that time he had stopped shooting."[18] Lastly he said "He turned around and started coming towards us. He was holding his gun inside his jacket. He looked around anxiously to see if anyone was going to stop him and then went down the escalator ... We heard some more gunfire and then another explosion, and then it was over."[18] Other people who had arrived outside the terminal said that taxicab drivers were screaming, "Don't enter! A bomb exploded!" from their windows to incoming traffic.[19]
  9. Domed to dissipate explosions No choke points Barriers
  10. Includes design and shifts and personnel