Wednesday, July 17, 2019
Airport Security, Past and Post 9/11 Essay
Only from incidences of air piracy, terrorism, and changes in the social and governmental climate globewide has airdrome warrantor easy morphed through the rulings of the Federal Aviation Administration (FAA). hardly the attacks of September 11th 2001 had changed airdrome tribute immensely in the matter of days. Michael Chertoff, the emboldenant attorney world(a) in charge of the criminal division at the Justice Department during the attack of 9/11 stated, Like numerous spate at the time, I thought it was a fly error. Chertoff was the head of native land protective cover in 2005 to 2009.To his thinking, since the end of the Cold War, lead developments support profoundly changed the world and therefore the world of security affrights. whizz was that globalization radically changed the probcap adapted impact of a network or flat an individual, offering the ability to travel, communicate, and exchange money. Two, the technology re brand-newing has al uttered peop le to ca usance massive destruction with estimable the push of a b arlyton. The thirdly was the increase of unchecked space where there is no true radiation diagram of law, has enabled terrorists to recruit, plan, and train undetected.During a discussion, Chertoff outlined the shift in the nations approach to security, one he argued snuff ited forwards the attacks of 9/11. The treats of that day only served to play up something we hadnt recognized and which the law had not adequately accounted for, and underscored the collect for a new framework aimed at combatting terrorism. What are the events that had shaped airport security before the attacks of September 11th 2001? Airline hijackings were very public in the mid to late 1960s.They approximately usually were committed by individuals seeking transport into Cuba. This caused air hoses to gull policies of blanket all leaveengers and cornerstones before they are to senesce the aircraft. The FAA applied this new po licy in an parturiency to avert the carrying of weapons used to compel hijackings. During the mid-1970s through the archean 1980s, dual high-profile terrorist hijackings and attacks were carried out overseas and shocked the travelling public and the air passages, arising potential problems of acts of terrorism toward the airline manufacture within the U.S. However incidents in example of those were tranquil perceived as an event that would never happen to or in the United States. This perfectionistic thinking was shattered in 1987 when a Pacific Southwest Airlines ex-employee do use of an expired identification badge to endure through security, board a company tarry liner with a weapon and shoot his supervisor, the pilot and co-pilot leaving the aircraft to go down with 38 people aboard. Not only was this not a terrorist event, entirely it came from within the ranks of the airline industry itself.This event, attached with the 1988 outpouring of PanAm Flight 103 over Lock erbie, Scotland, demanded attention to the take on for supererogatory airport security measures. This stimulated the Presidents focus on on Aviation Security and act of terrorism (1989) and the following passage of the Aviation Security cash earn Act of 1990. Since these incidences, the FAA has applied numerous measures to protect against this and other(a) parts of acts of air piracy and terrorism in the U. S. n earlyish of the measurements were practical maculation others included physical and electronic security measures.The Abundance of the focus had been on uniformisation the recover of persons into the trading operations realms at airports, therefore adjustment nark to aircrafts. In 1989, the Federal Aviation regulation was written into law. It mandated that an airport must be able to implement control over an employees full to gain doorway to the airports operations orbit using an access control system.In detail, this regulation states that any airport wi th a regular rider aircraft service (one flight per day) that consumes 60 place or more must be able to (1. Ensure that only the persons authorized to crap access to the secured areas by the airport operators security program are able to acquire that access. (2. ) To examine that such access is denied immediately at the access points to the individuals who do not obtain the authority of access. (3. ) mickle apart persons who are authorized to have access to only particular portions of the secured areas and persons who are authorized to have access only to other portions of the secured area. (4. ) Have the strength to limit an individuals access by time and date.This consequently new regulation crapd an outbreak of airport access control systems. Systems in which were knowing to incorporate unified access control and word picture ID systems that operated as a single common database to implement the commandments of the Federal Aviation Regulation. Regrettably, the requirem ents had pushed the envelope of the technology uncommitted at the time, and many of the systems that were installed had showd less than satisfactory results. ? The FAA alike is in the work on of formulating a rewrite of farther about 107.A Notice of Proposed Rule Making has been issued that includes run-in that could significantly impact access control at airside. If passed as now proposed, the rule would require airports to be able to immediately assess alarms from monitored doors at airside and to constitute a log of the alarm, alarm verification and the answer to each alarm. Short of placing law enforcement officers on each concourse, the solution is the installation of large numbers game of CCTV cameras that are integrated with the access control system to provide automatic call-up at the monitoring location.Other succeeding(a) security issues universe addressed with regard to airside operations security center around use and covering of passenger hairgripgage and air cargo. One area of major(ip) concern and concentration is on addressing the threat of unscreened/unaccompanied luggage. President Clinton created the White House Commission on Aviation Safety and Security. In the energise of the crash of TWA Flight 800 he asked the commission to focus its attention first on the issue of security, including an action plan to deploy new high-technology baggage natural covering and explosives detection systems.One system that entrust be implement to protect aircraft against bombings is the electronic passenger/bag reconciliation system. Such systems have been in use in Europe for some(prenominal) grades, but credibly are several years from being implemented throughout the aviation system in the U. S. They utilise an electronically encoded tag or barcode that is attached to the luggage, and a magnetic strip, barcode or other discernable medium on the back of the embarkation pass, to match the luggage with passengers boarding the airp stree t.As a passenger boards the aircraft, the boarding pass is swiped through a card reader, which supplies passenger culture to the system database. If a passenger checks a bag and does not board the aircraft, a computer resolves this pair in the tracking database and issues an alarm indicating this disparity. The bag then is retrieved from the aircraft and showned for content. This system prevents anyone from checking a bag with an explosive cunning onto a flight they do not board.The new Terminal One international facility at JFK Airport in smart York forget be one of the first U. S. acilities to be equipped with this type of electronic passenger/bag match system. some other area of baggage security that is changing is the concealment of bags and parcels that are loaded onto aircraft. In the past, general cover of baggage for domestic flights has not been performed. Until the last several years, progress electronic screening of international outward-bound baggage was limit ed. But an increase in terrorist acts, including the bombings of the human Trade Center and the federal building in Oklahoma City, has convinced government and industry that spare bag screening is necessary.As technology improves, this screening someday could include not only explosives, but also devices that present other types of threats. Since the machines are as well as expensive and large for airports/airlines to provide enough equipment to scan all bags with high-tech screening, a three-stage screening abut has been established. Stage one utilizes more conventional high-speed x-ray scanners to look inside luggage and parcels. In stage two, suspect bags are routed to conveyor queues while x-ray images are re-evaluated.They then are routed any to a bypass conveyor or to third stage screening, which consists primarily of one of two types of advanced technology screening equipment. One type uses computed tomography, a scan technology similar to a medical examination CAT sca n. Another type uses dual-energy x-ray scanning to produce a three-dimensional image of the contents. As machines become faster and less expensive, airports will have enough machines to scan all luggage. New airport terminals under design are providing space for sevenfold machines and will be the first facilities to provide nose candy percent screening of all bags.Since space requirements for these machines are so significant, the security consultant should be concern in new building design early on to ensure that adequate space is provided for the machines and baggage staging. One method or system being considered as a means to streamline the need for drawn-out bag screening is passenger profiling. This methodological analysis utilizes a passenger profiling database containing certain passenger criteria to classify luggage for screening, thereby eliminating the need to scan all bags with high-tech screening equipment.Use of this database information could classify a passenger a s low risk and whitethorn eliminate the need for advance bag screening of bags checked by that person. One major airline has developed software for this office which has been tested at a major hub airport location, but the system is very controversial and may or may not be implemented for general use. If and when the system is implemented, it will have extensive systems integration impacts that will require integration of airline common use erminal equipment host computers, bag handling equipment, airport security systems and explosives detection systems. This will require the security consultant to interface security systems with airline operations systems that in the past have been a non-issue when designing airport security systems. Since most of the systems mentioned above are information technology based, it will require the consultant to become increasingly internal about local area networks, wide area networks and the world wide web.Changes also are taking place with tech nological advances in systems utilized at the security screening checkpoint where passengers and their carry-on baggage are screened antecedent to boarding the aircraft. One such advance is in the method used to watch the exit lane. New systems are being developed which will tending with the arduous task of watching the exit lane in state to improve security at this portal and to decrease operating costs.Presently, this task is through with(p) manually with a posted security deem, but a person in this position is theme to distractions, can daydream or at poky nighttime periods may fall asleep for suddenly durations. New systems use electronic detection to deal the direction of traffic through the lane and produce alarms when a person enters the lane from the wrong direction. These systems may be used to supplement the existing oblige post or may replace the guard position, thereby decreasing the operations cost. What are the major focuses of landside/non-regulated security issues at airports now and through the year 2000?A primary area of concern is park facilities. Security concerns and public safety awareness has increase with the rise in crime over the past several years. Crime in position facilities has rise proportional to crime rates in most cities. Parking facilities present opportunities for crime since vehicles are left wing for extended periods of time, and people traversing to and from their vehicles are subject to closing off and are more vulnerable. Crime concerns at lay garages include vehicle theft, vandalism, vehicle break-in and crimes against persons.Security directors at colleges, hospitals, shopping malls, manufacturing plants, sports facilities and other places with large put facilities have been focusing on security in this area for the last few years. In order to provide increased public safety, airport operations and police departments are beginning to take a more serious look at the need for implementing additional securi ty methods and systems in their public and employee pose facilities. What types of systems will be installed to reduce crime in airport parking facilities?Systems similar to those that have been installed at parking garages and lots associated with the other types of public and cloak-and-dagger sector facilities previously mentioned. There is and will sojourn to be a very heavy furiousness on CCTV systems because they act as a dear deterrent to crime, as well as a tool to verify alarms. But with so many cameras required to watch large parking garages having multiple parking levels and many aisles, integration of other systems will be required to automate and simplify the process of trying to watch and utilize large numbers of cameras.Systems that already are widely used in other types of public parking are bonnie more common at airport parking facilities, including emergency phones, ambient noise alarms and wireless face-to-face assistance alarms. Additional systems including such items as agile video motion detection are in the process of being developed and will be used in the future to further assist with automated camera watching.Other areas of concern for alter landside security at airports include supervision of roadways, security at station platforms for automated train systems, security for vendors, protection of ATMs and guarding of toll plaza booths. In project with both landside and airside security issues are the expansion and improvements to the communication theory and emergency operations centers that monitor and control most of the systems mentioned in this article. Upgrades to these facilities generally require relocation of or modifications to nearly all these systems.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.