1st Edition

Aviation and Airport Security Terrorism and Safety Concerns, Second Edition

By Kathleen Sweet Copyright 2008
    384 Pages 46 B/W Illustrations
    by CRC Press

    The Definitive Handbook on Terrorist Threats to Commercial Airline and Airport Security

    Considered the definitive handbook on the terrorist threat to commercial airline and airport security, USAF Lieutenant Colonel Kathleen Sweet’s seminal resource is now updated to include an analysis of modern day risks. She covers the history of aviation security and compares current in-flight security practices with those of other countries.

    Covering Transportation Security Administration changes in security, policy, and training regulation since 9/11, this authoritative reference:

    • Discusses a broad range of aviation terrorist incidents
    • Considers aviation security in the present geopolitical climate
    • Addresses cargo and passenger security
    • Determines how security considerations are factored into business processes
    • Details new regulations for the TSA
    • Contains an instructor’s manual with test bank
    • Documents the history of aviation security
    • Includes extensive background information on various terrorist groups

    In addition to cargo and passenger security, the text looks at airport and aviation business practices and how security considerations are factored into business processes. The first edition quickly became required reading for air service operators and airport management training programs. This edition is certain to follow suit.

    About the Author:

    Kathleen M. Sweet, Lt. Col., Ret., USAF, JD, is on the adjunct faculty at the University of Maryland, Department of Emergency Management. Lt. Col. Sweet is also a consultant with International Risk Control Ltd, London, England, and president and CEO of Risk Management Security Group, a transportation security consulting firm.

    The Aviation Industry: A national security asset

    News

    Importance of Air Transportation

    Airways

    Development of the Aviation Industry

    Airlines

    Facilities

    Airway Routes

    Deregulation

    Consequences of 11 September to the Industry

    Emergency Funding

    Protecting Public Air Transportation

    Conclusion

    References

    The Historical Hijacking Threat and Government Response: A Persistent Problem

    News

    Hijacking

    Legal Responses to Expanding Security Measures

    International Perspectives

    The Trend Begins

    Early Federal Aviation Regulations

    Airport Security Programs

    New Carrier Rules 1972

    New Airport Operator Rules 1972

    Resistance Fades

    How to Implement the New Rules

    Public Law 93–366

    Dissemination of Threat Warnings

    Recommendations of the President’s Commission

    Aviation Security Improvement Act of 1990

    The Federal Aviation Reauthorization Act of 1996

    Civil Aviation Security

    Aviation Security Research and Development Division Costs

    White House Commission on Aviation Safety and Security — The Department of Transportation Status Report

    Aviation and Transportation Security Act — P.L. 107–71

    Implementing Recommendations of the 9/11 Commission Act of 2007 (H.R. 110-1, P. L. No: 110-53)

    The National Strategy for Aviation Security

    The White House, March 26, 2007

    Security Guidelines for General Aviation Airports

    Transportation Security Administration, May 17, 2004

    Conclusion

    References

    International Solutions and Reactions

    News

    Crimes Against Humanity

    The Tokyo Convention

    Hijacking Convention: Convention for the Suppression of Unlawful Seizure of

    Aircraft

    Montreal Convention

    The Convention on the Prevention and Punishment of Crimes Against

    Internationally Protected Persons

    Bonn Agreement 1978

    International Convention Against the Taking of Hostages

    Tokyo Summit 1986

    Further Efforts

    Montreal Protocol of 1988

    Diplomatic Conference on Air Law 1991

    Convention on the Physical Protection of Nuclear Material 1980

    G-7 Summit 1995

    Lyon Summit 1996

    Ministerial Conference on Terrorism 1996

    Convention for the Suppression of Terrorist Bombings 1997

    International Convention for the Suppression of the Financing of Terrorism 1999

    United Nations

    The International Civil Aviation Organization (ICAO)and The European Civil

    Aviation Conference

    Post July 2005 British Legislation

    International Convention for the Suppression of Acts of Nuclear Terrorism

    Conclusion

    References

    Growth and Change: Aircraft As Missiles

    News

    Early Criminal Hijackings

    Terrorist Hijackings Spread

    Initial Public Responses

    Cockpit Doors

    Passenger Photo IDs

    Crew Training

    Profiling

    CAPPS II

    Secure Flight

    No Fly List

    Sky Marshal Program, Federal Air Marshal Program

    History of Significant Air Hijackings Since 1972

    31 May 1972: Lod Airport

    27 June 1976: Entebbe, Uganda

    14 June 1985: Trans World Airlines Flight 847

    21 December 1988: Pan American Flight 103

    11 September 2001

    Other hijackings in recent decades

    Conclusion

    References

    Terrorism: The Roots Remain

    News

    Introduction

    Causes of Terrorism

    Middle East

    Rival Claims

    Palestinian Liberation Organization (PLO)

    Abu Nidal

    Hamas

    Iranian Support of Terrorism

    Hezbollah

    Afghanistan: Usama Bin Laden

    Europe

    Germany

    Italy

    Spain

    Northern Ireland

    Japan

    Aum Shinrikyo

    Latin America

    Tupac Amaru (MRTA)

    Shining Path (Sendero Luminoso)

    Russia

    U.S. Domestic Terrorism

    The Order

    Nuclear Terrorism

    A Dirty Bomb

    Attack on Nuclear Power Plants

    Diversion of Nuclear Material or Weapons

    Biological and Chemical Warfare

    Conclusion

    References

    International Major Counter Terrorism Units, Law Enforcement, and Intelligence Agencies — The best defense

    News

    Introduction

    CounterTerrorist Units

    Austrian Special CountertTerrorist Intervention Unit

    Canadian Armed Forces Joint Task Force 2

    Great Britain: SAS

    Germany: GSG-9

    Israel: Sarayat Mat’Kal

    Civil Guard

    Border Guard Force

    Ireland: Army Ranger Wing

    France: Groupment d’intervention de la Gendarmerie Nationale (GIGN)

    Spain: Grupo Especial de Operaciones (GEO)

    United States: Special Forces Teams

    Operation Ice Eagle

    Local Law Enforcement

    Training

    The U.S. Customs Service

    Customs and Border Protection Bureau

    Drug Enforcement Agency

    Federal Bureau of Investigation

    The US Marshals

    Department of Homeland Security

    Transportation Security Administration

    The Immigration and Naturalization Service, U.S. Citizen and Immigration Service

    The Border Fence and The Real ID Card Program

    9-11 Commission

    Director of National Intelligence

    The Intelligence Community

    Terrorist Screening Center (TSC)

    United States Postal Inspection Service

    Interpol

    Conclusion

    References

    Screening — the last line of defense

    News

    Introduction

    Sterile Concourse

    Sterile Boarding Areas

    Departure-Gate Screening

    Screening Checkpoint Augmentation

    Law Enforcement Officers at the Gate

    Flexible Law Enforcement Response Program

    Airport Categories

    Public and Private Security Interface

    Criminal Case Law Examples

    United States versus James Edward Ware, U. S. District Court, Western

    District of Oklahoma, August 1970

    United States versus Feldman, U.S. District Court, Eastern District of New

    York, 1 May 1969

    United States versus Benrus Eugene Brown, United States District Court,

    Western District of Texas, October 1969

    Lawrence Havelock versus the U.S. Court of Appeals, Tenth Circuit June 1970

    United States versus Reid 2003 (Shoe Bomber)

    United States versus John Walker Lindh

    Case Law Summary

    Initial Screening

    Screening Procedures

    Screening Baggage

    Threat Assessment

    3-1-1 Rule

    Screening Computers and Laptops

    Discovered Contraband

    Battery Restriction

    Screening Passengers

    Cast Scope

    Rating Hand Held Metal Detectors

    Body Search

    Screening Airport and Airline Employees

    Screening Diplomats

    Registered Traveler Program

    No Fly List

    Federal Behavior Detection Officers

    Theft

    Potential TSA Ethics Issues

    Public Relations

    Airborne Aircraft Security

    Federal Flight Deck Officers

    Training Initial training will be conducted in a one-week session that will typically require volunteers to arrive mid-afternoon on a Sunday and remain through conclusion of training the following Saturday afternoon

    Conclusion

    References

    Private Security Personnel versus Transportation Administration Security Personnel: Increased supervision?

    News

    Introduction

    Criminal Guards: Foxes Guarding the Chickens

    Ergonomic Solutions

    Potential Operator Concerns with Specific Screening Technologies

    Measuring Operator Performance

    Operator Selection

    Tougher Than They Thought

    The OPT OUT Program

    Conclusion

    References

    Metal Detectors, X-Ray Inspection, Explosive Detection, and Trace Detection Devices: Will the Public Tolerate the Intrusion?

    News

    Introduction

    Metal Detectors

    Selecting a Metal Detector

    Hand-Held Body Scanners

    Testing

    Metal Detectors, Computers, and Personal Medical Devices

    X-Ray Inspection Units

    Passive Millimeter-Wave Imaging

    Active Millimeter-Wave Imaging

    Selecting an X-ray Unit

    Sizers

    Film and Laptops

    Passenger X-Ray Screening Devices

    Portable Digital X-Ray Imaging Systems

    Testing X-ray Equipment

    Detection Capabilities

    Prior X-Ray Explosive Detection Devices

    U.S. Standard

    New Computer Software

    Explosive-Detection Systems

    Three-Dimensional Imaging: Explosive Assessment Computed Tomography

    Bottled Liquid Scanners

    Trace Detection Technology Today

    Explosive Detection Devices for Baggage

    Enhancing ETD Capability

    Thermedics EGIS 3000, EGIS II, EGIS III

    Barringer IONSCAN 400B, Centurion, Sentinel II

    ION Track ITEMISER 3, Entry Scan

    Taggants

    Project Hostile Intent

    Conclusion

    References

    Cargo Security: A Loose End

    News

    Introduction

    Cargo Carrier Responsibility

    Report to Congress on Air Cargo Security

    Arming Cargo Pilots

    Suicides

    Baggage Tags

    Passenger Baggage Reconciliation

    Airport Lockers

    Container Hardening

    Blast Containment versus Blast Management

    Airmail Security

    Indirect Air Carriers

    Known Shipper

    Unknown Shipper

    GAO Status Report on Cargo Security 2002

    Strategic Plan of TSA

    Enhanced Measures

    Summary of Airforwarder’s Association Objections

    The Latest

    Vacuum Chambers

    Inspection of Hazardous Cargo

    International Cargo Standards

    TSA Inspection of Airports

    Conclusion

    References

    Security and the Rules of Law — A Slippery Slope

    News

    Introduction

    Fourth Amendment

    Administrative Search Exception

    Balancing Approach

    Less Intrusive Alternatives

    Individual Stop and Frisk Searches

    Selectee Class Stop and Frisk Search

    Consent Exception

    Other Exceptions to Fourth Amendment Requirements

    Border Searches

    Exigent Circumstances

    Reasonableness

    Probable Cause

    The Exclusionary Rule

    The Legal Authority of Private Persons to Search

    Exceptions to the Exclusionary Rule

    Inevitable Discovery

    Good Faith Exception

    Police Participation

    NonViolent Threats?

    Airport Administrative Screening Searches at Airports

    Passenger’s Right to Terminate a Search

    Alternate Viewpoint

    The War on Drugs

    Passenger Rights

    New Law in the Area of Searches

    New Technologies and the Law

    Conclusion

    References

    Foreign Airport Security: Comparison of U.S. Law and Foreign Domestic Law — Lessons Learned

    News

    Introduction

    Ground Security

    American Assessments

    Diversion Airports

    Legal Remedies

    Legislation after 11 September 2001

    AntiTerrorism Legislation in the United Kingdom

    Post 2005 London Bombings

    Canada’s War with the FLQ

    Germany

    Italy

    Profiling

    International Views of Profiling

    SAFEE

    Bomb Sniffing Dogs

    Conclusion

    References

    Technological Improvements: Some Intrusive, Some Not

    News

    Introduction

    Gore Commission

    Homeland Security: Science and Technology Directorate

    Anti Missile Defense Systems

    Microwave Holographic Imaging

    Triggered Spark Gap

    BOSS™

    Flight VU™

    BiosimMER™

    Quadrupole Resonance Devices

    Intelliscan™ 12000 Metal Detector

    Biometric Systems

    FACE IT™ Access Controls

    Imaging Technologies

    Trace-Detection Technologies

    Fuel Flammability

    Remote-Controlled Aircraft

    Improved Closed-Circuit Television Technology

    Cockpit Doors

    Conclusion

    References

    Airport Operator Concerns and Other Safety and Security Issues: The Foundations of Security

    News

    Introduction

    Airport Runway Incursions

    Passenger Interference

    Air Rage and Passenger Involvement

    Air Rage and Civil Liability

    Civil Remedies

    Conventional Weapons

    Explosives

    Nuclear and Biological Weapons

    Embracing Risk Management

    Assessing the Threat

    Law Enforcement

    Federal Resources

    Private Intelligence Services

    Stratfor Strategic Forecasting, Inc

    Jane’s Information Group

    Economist Intelligence Unit

    Flight Crew Involvement

    Conclusion

    References

    Access Controls, Perimeter Security: Another Foundation

    News

    Introduction

    Access Control

    Locks

    Access Cards

    Electronic Locks

    Sensors

    Biometric Security Systems

    Retinal Scans

    Fingerprint Verification Readers

    Voiceprint Identification

    Hand Geometry

    Facial Scan

    Signs

    Perimeter Fencing and Lighting

    Exterior Alarm Sensors

    Motion Detectors

    Microwave

    Charged Coupled Devices

    Portal Coaxial Cables

    Electric Field

    Vibration and Stress Detectors

    Closed Circuit Television

    Infrared Motion Detectors

    Active Infrared

    Passive Infrared (PIR)

    Glass-Break Detectors

    The Control Room

    Alarms

    No Power, No Security

    Media Intrusion

    Computer Security

    Kiosks

    Conclusion

    Epilogue

    Changes

    The More Things Change, The More They Remain the Same. Screeners

    Are Screeners

    Arming Pilots

    The Federal Air Marshal Program

    Emerging Technology

    Civil Liberties

    Summary

    References

    Selected Bibliography

    Index

    Biography

    Kathleen Sweet

    … a comprehensive handbook that covers the full range of aviation security, from facilities to operations. Anyone involved in this industry will want to have it available.

    —Mayer Nudell, CSC (Certified Security Consultant), writing in Security Management, April 2010