Podcast
Questions and Answers
What is the first phase of the trafficking process?
What is the first phase of the trafficking process?
Trafficking is solely a one-time event.
Trafficking is solely a one-time event.
False
Name one phase involved in the human trafficking process.
Name one phase involved in the human trafficking process.
Recruitment
Human trafficking involves the control of human beings with the scope of _____ .
Human trafficking involves the control of human beings with the scope of _____ .
Signup and view all the answers
Match the following trafficking phases with their descriptions:
Match the following trafficking phases with their descriptions:
Signup and view all the answers
What is one potential outcome of preventing trafficking in aviation?
What is one potential outcome of preventing trafficking in aviation?
Signup and view all the answers
Preventing trafficking has no impact on terrorist groups.
Preventing trafficking has no impact on terrorist groups.
Signup and view all the answers
What role does AVSEC have in relation to trafficking?
What role does AVSEC have in relation to trafficking?
Signup and view all the answers
Preventing trafficking may indirectly deter or reduce the ability of __________ groups.
Preventing trafficking may indirectly deter or reduce the ability of __________ groups.
Signup and view all the answers
Match the following concepts with their descriptions:
Match the following concepts with their descriptions:
Signup and view all the answers
What should interviewers understand to recognize genuine aggressive intent?
What should interviewers understand to recognize genuine aggressive intent?
Signup and view all the answers
Understanding anger does not require knowledge of its psychological factors.
Understanding anger does not require knowledge of its psychological factors.
Signup and view all the answers
What is one reason people may get angry?
What is one reason people may get angry?
Signup and view all the answers
Interviewers should analyze the psycho-__________ roots of aggression.
Interviewers should analyze the psycho-__________ roots of aggression.
Signup and view all the answers
Match the following terms with their descriptions:
Match the following terms with their descriptions:
Signup and view all the answers
What could indicate a potential issue with a child traveling with an adult?
What could indicate a potential issue with a child traveling with an adult?
Signup and view all the answers
A child controlling their own travel documents is a positive sign.
A child controlling their own travel documents is a positive sign.
Signup and view all the answers
What behavior might suggest that a child has been coached on what to say?
What behavior might suggest that a child has been coached on what to say?
Signup and view all the answers
A person appearing to be a parent or guardian but is not actually related to the ______ raises concerns.
A person appearing to be a parent or guardian but is not actually related to the ______ raises concerns.
Signup and view all the answers
Match the descriptions with the appropriate concerns:
Match the descriptions with the appropriate concerns:
Signup and view all the answers
What is a transit passenger?
What is a transit passenger?
Signup and view all the answers
A transfer passenger is someone who remains on the same flight without changing carriers.
A transfer passenger is someone who remains on the same flight without changing carriers.
Signup and view all the answers
What type of passenger is transferred to another flight of the same carrier without a stopover?
What type of passenger is transferred to another flight of the same carrier without a stopover?
Signup and view all the answers
A passenger who continues their journey on the same flight is called a __________ passenger.
A passenger who continues their journey on the same flight is called a __________ passenger.
Signup and view all the answers
Match the following types of passengers with their descriptions:
Match the following types of passengers with their descriptions:
Signup and view all the answers
What must be performed when ETD is unavailable or inoperable?
What must be performed when ETD is unavailable or inoperable?
Signup and view all the answers
Passengers must not be screened around the waist when ETD is inoperable.
Passengers must not be screened around the waist when ETD is inoperable.
Signup and view all the answers
What specific area around the waist should be included in the pat down procedure?
What specific area around the waist should be included in the pat down procedure?
Signup and view all the answers
When security screening is needed, passengers must undergo a full-body _____ down.
When security screening is needed, passengers must undergo a full-body _____ down.
Signup and view all the answers
Match the following security procedures with their descriptions:
Match the following security procedures with their descriptions:
Signup and view all the answers
Signup and view all the answers
Signup and view all the answers
Study Notes
End of Module Objective
- Based on experience and current information on aviation security, specify the nature of the threat against the air transport industry
- In accordance with ICAO Annex 17 and the ICAO Aviation Security Manual (Doc 8973 – Restricted)
Intermediate Objectives
- Explain the importance of understanding the threat
- Describe the nature of the threat to civil aviation
- Acts of unlawful interference
- Sabotage of aircraft/airport
- Acts of unlawful seizure
- Acts of attempted unlawful seizure
- Use of aircraft as weapons
- Acts of in-flight attack
- Acts of facility attack
- Acts against the safety of civil aviation
- Acts of unlawful interference
- Describe industry counter-measures
Importance of Understanding Threat
- Impossible to put in place 100% security to counter every threat
- By identifying the level of existing threat it is possible to develop counter-measures under normal situations
- Security measures must be flexible to meet changes in threat
Acts of Unlawful Interference
- Sabotage of aircraft/airport
- Acts of unlawful seizure
- Acts of attempted unlawful seizure
- Use of aircraft as weapons
- Acts of in-flight attack
- Acts of facility attack
- Acts against the safety of civil aviation
Categories of Offenders
- Two main categories:
- Hijackers
- Saboteurs
- In two forms:
- Individuals
- Groups
Individual Offenders
- Characters:
- Criminals, refugees, psychotics
- Limited resources
- Limited technical expertise
- Unpredictable
- Objective:
- Monetary gain, criminal
- Personal
- Political asylum
Group Offenders
- Characters:
- Considerable resources
- Extensive technical expertise
- Special training
- Objective:
- Political
Hijacking Techniques
- Smuggling of weapons onboard
- Concealment in hand baggage
- Collusion with airport or airline staff
- Armed assault
- Terrorist groups
- Organized with high visibility
- Command through flight deck
- Defined objectives
- Individuals
- Less organized
- Confused objectives
- Unpredictable behavior
Sabotage
- General definition: An act or omission, intended to cause malicious or wanton destruction of property, endangering or resulting in unlawful interference with international civil aviation and its facilities
Sabotage Techniques
- Devices
- Explosive
- Incendiary
- Triggers
- Timers
- Pressure-sensitive devices
- Means
- Devices in checked baggage
- Collusion with airport or airline employees
- Subterfuge through unsuspecting dupe
- Suicide bombers
Target for Sabotage
- Airport Vulnerable Points
- Runways
- Passenger terminals and vital terminal services
- Navigational aids
- Electrical supplies
- Air traffic control installations
- Aviation fuel installations
- Rescue and firefighting systems
Other Attacks at Airports
- Aim to cause maximum casualties
- Result in dramatic impact on aviation and reduced confidence in security
Industry Counter-Measures: Aviation Security
- Annex 17 (10th Edition) defines Aviation Security as safeguarding civil aviation against acts of unlawful interference. This objective is achieved by a combination of measures and human and material resources
Other Entities
- Airline operators
- Airport operators
- Air navigation service providers
- Policing authorities
- National civil aviation appropriate authority
- Aviation fuel suppliers
- Airline agents and service providers
- Airline cargo and catering operations
Module Summary
- Understanding the threat to civil aviation is essential for developing flexible counter-measures against the changing levels and nature of existing threat
- The two main categories of offenders are hijackers and saboteurs in the form of individuals or groups
- Saboteurs tend to use explosive or incendiary devices triggered by timer or pressure-sensitive devices
- The airport being a good sabotage target includes various vulnerable points
- Various contributing entities have developed international counter-measures
Intermediate Objectives (1/2)
- Define the term "Acts of unlawful interference"
- Explain the risks of unlawful interference to air cargo as a threat to civil aviation
- Recognize the purpose of the Conventions and Protocols that constitute legislative countermeasures
Intermediate Objectives (2/2)
- Define the terms "Standard" and "Recommended Practice"
- List the key responsibilities of each State in meeting ICAO requirements for aviation security
- For a given State, describe the roles and responsibilities of the national authority and other stakeholders in meeting ICAO requirements for air cargo and mail security
Acts of Unlawful Interference (ICAO Annex 17 definition)
- "Acts or attempted acts such as to jeopardize the safety of civil aviation..."
Offenders and Motivations
- Terrorists
- Individuals or groups
- Motivation: High visibility through the media
- Non-terrorists
- Individuals or groups
- Difficult to categorize attacks
- Motivation:
- Personal reasons
- Monetary gain
Air Cargo as a Target - AVSEC Focus
- Cargo may move between all-cargo and passenger aircraft
- Significant expansion of the cargo business
- Need for additional and stronger measures
- Increased awareness of the vulnerabilities in the supply chain
Air Cargo as a Target - Vulnerabilities
- Highly diverse nature of cargo shipments
- Intermodal and complex routing
- Remote locations of some cargo operations
- Presence of multiple actors in the supply chain
- “Insider threat”
Risk Context Statement – 1
- Assist ICAO in improving Standards and Recommended Practices (SARPs) and guidance material
- Offer States information and a framework to conduct risk assessments at the national level
Risk Context Statement – 2
- Reinforces the importance of risk-based approach
- Provides risk assessment method and process map
- Emphasizes importance of States' reporting and sharing of relevant information
- Provides ranking of specific risks (global perspective)
Risk Context Statement – 3 (IEDs in Cargo – Matrix 4)
- Likelihood (Medium)
- Consequences (High)
- Apply mitigation measures…
- Residual vulnerability (Medium)
- Residual risk (Medium-High)
Aviation Industry Countermeasures
- Defined at both the international and national level
- Legislative
- Example: National Civil Aviation Security Programme
- Technical
- Example: Concept of the Secure Supply Chain
- Physical
- Example: Screening
- Legislative
Legislative Countermeasures 1/3
- Chicago Convention – 1944
- Convention on International Civil Aviation
- Led to the formation of ICAO
Legislative Countermeasures 2/3
- Tokyo Convention – 1963
- Hague Convention – 1970
- Montreal Convention – 1971
Legislative Countermeasures 3/3
- Protocol for the Suppression of Unlawful Acts – 1988
- MEX Convention – 1991
- Beijing Convention – 2010
- Beijing Protocol – 2010
- Montreal Protocol – 2014
Technical Countermeasures
- There are 19 Annexes to the Convention on International Civil Aviation
- Annex 17 (Aviation Security)
Annex 17 - Security
- Definitions
- Standards and Recommended Practices (SARPs)
- Extracts of other Annexes relating to security are appended to Annex 17
Annex 17 - Definitions
- Standards: Necessary or mandatory
- Contracting States will conform
- Recommended Practices: Desirable
- Contracting States will endeavor to conform
- Contracting State: Signatory to the Chicago Convention
ICAO Manuals
- Security Manual (Doc. 8973 – Restricted)
- Supports States in the implementation of Annex 17
- Ch 13: Air Cargo and Mail
- Facilitation Manual (Doc. 9957)
Physical Countermeasures
- Control of access to security restricted areas
- Screening of passengers and their baggage
- Screening of crew members and staff
- Security measures relating to cargo, mail and other goods
- Protection of aircraft
- Protection of airport and navigation facilities
AVSEC Objective (Annex 17 – Standard 2.1.1)
- "Each Contracting State shall have as its primary objective the safety of passengers, crew, ground personnel and the general public in all matters related to safeguarding against acts of unlawful interference with civil aviation"
AVSEC Objectives and Organizations (Annex 17 – Standard 2.1.2)
- "Each Contracting State shall establish an organization and develop and implement regulations, practices and procedures to safeguard civil aviation against acts of unlawful interference taking into account the safety, regularity and efficiency of flights"
AVSEC Objectives and Organizations (Annex 17 – Standard 2.2.2)
- "Each Contracting State shall ensure that measures designed to safeguard against acts of unlawful interference are applied to domestic operations to the extent practicable, based upon a security risk assessment carried out by the relevant national authorities"
National Legislation and Organization for Security of Air Cargo
- States are obligated to establish and maintain a legislative infrastructure to support the implementation of technical and physical countermeasures
National Legislation (Annex 17, Standard 3.1.1)
- "Each Contracting State shall establish and implement a written national civil aviation security programme to safeguard civil aviation operations against acts of unlawful interference, through regulations, practices and procedures which take into account the safety, regularity and efficiency of flights."
National Legislation (Annex 17, Standard 3.1.2)
- "Each Contracting State shall designate and specify to ICAO an appropriate authority within its administration to be responsible for the development, implementation and maintenance of the national civil aviation security programme."
National Legislation (Annex 17, Standard 3.1.3)
- "Each Contracting State shall keep under constant review the level and nature of threat to civil aviation within its territory and airspace above it, and establish and implement policies and procedures to adjust relevant elements of its national civil aviation security programme accordingly, based upon a security risk assessment carried out by the relevant national authorities."
National Legislation (Annex 17, Standard 3.1.4)
- "Each Contracting State shall require the appropriate authority to define and allocate tasks and coordinate activities between the departments, agencies and other organizations of the State, airport and aircraft operators, air traffic services providers and other entities concerned with or responsible for the implementation of various aspects of the NCASP."
National Legislation (Annex 17, Standard 3.1.5)
- "Each Contracting State shall establish a national aviation security committee or similar arrangements for the purpose of coordinating security activities between the departments, agencies and other organizations of the State, airport and aircraft operators, air traffic service providers and other entities concerned with or responsible for the implementation of various aspects of the NCASP."
National Legislation (Annex 17, Standard 3.1.6)
- "Each Contracting State shall require the appropriate authority to ensure the development and implementation of a national training programme for personnel of all entities involved with or responsible for the implementation of various aspects of the national civil aviation security programme. This training programme shall be designed to ensure the effectiveness of the national civil aviation security programme."
National Aviation Security Committee
- Government agencies and industry representatives
- Advises on security policy/regulation
- Reviews and monitors current procedure
- Makes recommendations
- Model national civil aviation security programme is found in the Security Manual
Appropriate National Authority Responsibilities (1/2)
- Develop, implement and maintain the NCASP
- Define and allocate tasks
- Coordinate activities
Appropriate National Authority Responsibilities (2/2)
- Monitor security compliance
- Develop and disseminate proactive practices and procedures
Organization of Security
- Appropriate Authority
- Policy Section
- Implementation of NCASP
- Oversight
- Quality Control Measures
- Policy Section
- Regulated Entities
- (Airport and Aircraft Operators, Regulated Agents and other entities)
International and Regional Organizations
- Regional:
- European Civil Aviation Conference (ECAC)
- Latin American Civil Aviation Conference (LACAC)
- African Civil Aviation Conference (AFCAC)
- Arab Civil Aviation Commission (ACAC)
- Promote co-ordination of air transport including security within their regions
Industry Organizations (1/2)
- International Air Transport Association (IATA)
- Airports Council International (ACI)
Trafficking and Predictive Strategies
- Special Handling Techniques
Examples of Trafficking
- Drugs
- Weapons
- Animals
- Humans
Trafficking
- BEHAVIOR ASSESSMENT
- DOCUMENT CONTROL
- WHY
Terrorism and Trafficking
- Terrorist groups engage in HUMAN trafficking of persons for three primary reasons:
- Funding
- Fear (suicide bombers)
- Recruitment (forced marriages)
Terrorist Groups Trafficking
- Trafficking of organs by ISIS and affiliated armed groups for financing
- Boko Haram's use of child beggars for fundraising
- Forced marriages in Mali by Ansar Dine and Al Qaeda in the Islamic Maghreb
- Forced marriages of females abducted by Boko Haram involving sexual exploitation
- Kidnapping of Eritrean migrants in Libya by ISIL for sexual exploitation, including in forced marriage
- Trafficking of Yazidi women and girls by ISIS for sexual exploitation and slavery.
Human Trafficking
- Various crime types
UN Palermo Protocol
- The Palermo Protocol is a binding legal instrument that creates an obligation for all countries that ratify it to prevent, suppress, and punish human trafficking.
Difference between human trafficker and migrant smuggler
- Trafficking is not a single event, it is a process involving different phases:
- Recruitment
- Transportation
- Control of human beings with the scope of exploitation.
- PURPOSE
- Sexual slavery
- Forced labour
- Commercial exploitation for the trafficker or others
- The extraction of organs or tissues.
Profit
- Human trafficking is a multi-billion dollar enterprise affecting 24.9 million men, women and children globally, with intersections across all modes of transportation, including the aviation sector.
ICAO Doc 10171
- A Comprehensive Strategy for Combating Human Trafficking in the Aviation Sector
- Recent investigations indicate a clear link between human trafficking and international terrorism where trafficking is used as a means of funding terrorism.
- Preventing trafficking may indirectly deter or reduce the ability of terrorists or criminal groups seeking to take advantage of aviation and thus mitigating risk.
AVSEC Role in Preventing trafficking activities
- Recognizing behaviours typically associated with human trafficking is the FIRST step in identifying suspected victims.
Indicators
- Is the person disoriented or confused, or showing signs of mental or physical abuse?
- Is the person fearful, timid, or submissive?
- Does the person show signs of having been denied food, water, sleep, or medical care?
- Does the person appear to have suffered injuries as a result of an assault or aggression?
- Does the person defer to another person to speak for him or her or someone who seems to be in control of the situation, e.g., where they go or who they talk to?
- Is the person (especially children) accompanied by someone claiming to be a parent or guardian who is in fact not related to the child?
- Is the person in control of their own travel documents?
- Does the person appear to be coached on what to say? Does the potential trafficker appear to have rehearsed what to say in relation to the victim?
- Does the person have freedom of movement?
- Does the person avoid eye contact? Or on the contrary, do they try to establish eyes contact?
- Does the person have few or no personal possessions?
- Are the answers provided by this person consistent?
- Is the person branded with tattoos indicating adherence to somebody else?
- This could also be a departmental function whether the airline prefers to avoid key person dependency.
- Does the person provide inconsistent responses from the person(s) travelling with him/her when asked questions?
- Is the person wearing appropriate clothing? Does his/her appearance fit the route of travel or weather? Is this person speaking of modelling, dancing, singing, hospitality job or something similar in a location (without knowing who will be meeting him/her upon arrival, and with few details about the job); or is this person speaking of living in the same household of employer, being in debt to employer, living under inhumane conditions (cramped spaces, etc.,)?
- Are there any unusual circumstances that just do not feel right to you?
Professional Identification
- Distracting Aggression
- Genuine Aggression
Profilers are Threats to Possible Perpetrators
- When the brain perceives a THREAT, it prepares the body to survive it by enervation of the sympathetic nervous system.
- Sympathetic arousal, also commonly known as the emergency, or “fight or flight” system, through neural and chemical (adrenaline) stimulation causes many physiological changes in the body.
Handling Aggressive Passengers
- Genuine Aggression is often born out of frustration.
- There are times when an interviewee will fake aggression in an attempt to create an argument and escape the interview.
- Interviewers should be able to recognize genuine aggressive intent through understanding its psycho-physiological roots.
Why do people get angry?
- Misunderstanding
- Feel they are not being heard
- Being fatigued or hungry
- Feeling like they are getting a runaround
- Baggage (bad prior experience)
- Having suffered a loss
- Feeling they are not being treated fairly
- Lack of feeling empowered
Warning signs that lead to physical violence
- Passenger becomes anxious.
- Passenger starts acting nervous, or demonstrating a lot of displacement activity. (When you see these early signs that may lead up to violence, you need to be supportive and continue to offer help to the Passenger)
- Face blanches or pales.
- Speech becomes incoherent.
- Passenger becomes defensive.
- Passenger begins to act irrational or belligerent, or challenging.
Diffusion of Genuine Aggression (SOFTEN Protocol)
- Smile with discretion : nonverbally let the suspect know you care about them and that you are not becoming angry.
- Open body positioning : demonstrates that you are being truthful with the suspect and open with them.
- Forward body lean : shows you are interested in what they are saying.
- Territory : do not forget the rules of proxemics.
- Eye Contact: proper eye contact is a sign of truthfulness.
- Nod Attentively : to show the suspect you are paying attention
Diffusion of Genuine Aggression
- To further demonstrate that you are interested and paying attention to the passenger, ask questions and restate his concerns.
- Use phrases that begin with, "I want to help you," preceded or followed by the suspect's name.
- Continue to use alternatives
The rules of proxemics
- Proxemics is the understanding and use of interpersonal body distances.
- Breaking any of these rules could be interpreted as impolite or even threatening.
Non-verbal Behavior Indicative of Truth and Deception
- Truthful
- Genuinely friendly
- Direct answers
- Good eye contact
- Cooperative
- Lighthearted
- Composed
- Relaxed
- Talkative
- Overall truthful appearance
- Relaxed and confident
- Face to face body alignment
- Increased use of illustrators
- Natural and settled foot and body positions
- Deceptive
- Overly friendly
- Evasive answers
- Poor eye contact
- Uncooperative
- Scared
- Nervous facial movements
- Nervous bodily movements
- Non-talkative
- Overall deceptive appearance
- Tense and defensive
- Evasive body alignment
- Use of adaptors
- Tense, repetitive, restless foot movements
Threats and Risks to Civil Aviation
- To explain the meaning of the terms "Threat" and "Risk", and the relationship between the two
- Demonstrate how threat/risk factors affect security measures
- Understand current threat levels operating in the aviation industry
- Explain reasons why civil aviation is an attractive target and how the attacks are carried out
- State what are the types of people or organisations who may pose a threat to civil aviation and their motives
- Examine past security incidents
ICAO Annex 17, Standard 3.1.4
- Each Contracting State shall keep under constant review the level of threat to civil aviation operations within its territory and adjust relevant elements of its national civil aviation security programme accordingly.
Threat
- “Threat” is a measure of the likelihood, or probability, that an attempt will be made to attack a particular target.
- It is defined as "the probability of an attack being attempted against the target within a specified time frame"
The threat depends on 2 factors:
- The intent or desire to attack the target (i.e. the attractiveness of the target)
- The capability to do so
Risk
- Risk is a judgment of the probability of an attack being successfully carried out against a target.
- It involves not only threat, but also the ease by which the target may be attacked - the vulnerability
Risk = Threat + Vulnerability
Conventional Wisdom
- Very little one can do to affect the threat.
- Therefore, action concentrates on reducing the vulnerability.
Vulnerability
- Passengers and crew
- The aircraft
- Airline staff
Threat Groups
- Terrorists
- Criminals
- The mentally disturbed
- Employees (disaffected, and those with criminal motive)
- Refugees
- Other Governments
Motives of Threat Groups
- To gain publicity for their cause
- To gain release of prisoners or other terrorists
- To change government or international policy
- To undermine and discredit authorities who oppose their cause
- To target individuals for assassination who are possibly unsympathetic to their cause
- To frighten the public and disrupt normal life
- To obtain money by threat or blackmail
Demands of Perpetrators
- Criminal extortion of money
- Seeking asylum from persecution
- Political purposes:
- Release of prisoners
- Propaganda
Module Summary (Trainees can now)
- Explain the meaning of the terms "Threat" and "Risk", and the relationship between the two
- Demonstrate how threat/risk factors affect security measures
- Understand current threat levels operating in the aviation industry
- Explain reasons why civil aviation is an attractive target and how the attacks are carried out
- State what are the types of people or organisations who may pose a threat to civil aviation and their motives
- Appreciate how the problem has evolved
Behavior Detection
- Impact of a new technique on human factors
- Introducing new techniques/technologies in aviation security
- Not a guarantee for an increased performance
- Arouses new expectations from the operators
- Impact on Human Factors
- The introduction of Behavior Detection in TSA is one example
- Assessing threat posed by persons through behavioral detection
- Risk-based approach to aviation security
- Identify persons who may pose a threat
- Additional security measures
- Recognition of behavioral characteristics
- Can be applied to the general public, passengers and other
Behavior Detection in France
- 2009: Pilot project at Paris - Charles de Gaulle Airport
- 2011: extension to Paris - Orly Airport
- Based on the TSA BD Programme : SPOT
- Objective: to adapt SPOT in a different culture and organization
- Complementary measure at the checkpoint
Behavior Detection and Human Factors
- Two major considerations:
- Designing a new set of tasks, with dedicated staff:
- An opportunity to reconsider Human Factors good practices
- Behavior Detection relies 100% on the human competency:
- Raises the question of efficiency and reliability
- Need of careful thinking on:
- Staffing
- Overseeing of activities
- Performance evaluation
- Designing a new set of tasks, with dedicated staff:
- Consideration given to Human Factors good practices
- Interest in the task
- Responsibility, autonomy
- Professional reward
- Work identity
- Perception of control by passengers
- Change in role
- Team work
- Feed-back activities
- Further investigations :
- Fatigue management
- Monotony
- Technique relying 100% on the human competency
- Observation, decision making, investigation:
- What to observe? How to decide ?
- Human factor : strengh or weakness ?
- What can be observed, what human limitations ?
- Observation, decision making, investigation:
- Two axes for answers :
- Grounded premises: provide a framework
- Validity of the disposal
- Ex. « Terrorists don't fear to die but to fail their mission »
- Thorough work on the professionnalisation and the implementation conditions
- Selection, training, monitoring, decision-support tools
- Further investigations :
- What measurement of performance ?
- Key factors for success :
- Rely on academic studies
- Ensure close follow-up of the operations
- Support the construction of this new activity
Suspicious and Anomalous Behavior
- Suspicious behavior detection
- Fits negative behavior pattern
- Anomalous behavior detection
- Does not fit positive behavior pattern
- Example domains
- Passengers at the airport
- Reckless drivers
- Misuse of server access
- Shoplifting
- Pirate vessels
- An elderly person at home
Kinds of Passengers
- 01 – JOINING
- The joining passenger is the passenger traveling from the point of origin or resuming his journey from the point of stopover.
- 02 – TRANSIT PASSENGER
- A transit passenger is continuing his journey by the same flight of the same carrier.
- 03 – TRANSFER PASSENGER
- A – On-line transfer passenger
- A passenger who is transferred to another flight of the same carrier, without stopover.
- B – Interline transfer passenger
- A passenger who is transferred to a flight of another carrier, without stopover.
- A – On-line transfer passenger
- 04 – Premium Customer (JOINING – TRANSIT - TRANSFER)
- Egyptair Premium Customers are separated into two categories :
- A) By cabin class Customers
- First Class & Business Class
- B) By Frequent Traveler Cards
- Star Gold & Star Silver
- A) By cabin class Customers
- Egyptair Premium Customers are separated into two categories :
Egyptair Plus Frequent Flyer Program (FFP)
- Various card types with related mileage thresholds
Baggage Allowance
- Piece Concept
- Class
- Max Weight
- Number of Pieces
- Max Dimension
- Carry-On Policy
- Class
- Max Weight Per Piece
- Number of Pieces
Scope
- All passenger (originating and interlined from an aircraft operator or another air carrier) must be subjected to a security interview
Basic Rules
- During the interview, originating passenger must have possession of all their accessible property and checked baggage.
- The passenger and interviewer must be able to communicate in a common language.
- A passenger who cannot communicate in a language understood by the interviewer must a extra security procedures.
- The interviewer may interview the passenger through an interpreter if :
- The interpreter is an Egyptair employee.
- The interview is conducted with no more than one passenger (or family unit) at a time.
- The interpreter is fluent in the passenger's language.
Upon initial contact with each passenger: The interviewer must determine whether the passenger, documentation, and/or accessible property and checked baggage.
If not, the interviewer must proceed with the security interview, review the passenger documentation, and observe the passenger's appearance and behavior.
Purpose
- The purpose of the security interview is to resolve or confirm suspicious signs detected in the course of this interview and observation.
- A suspicious sign is resolved when the passenger provides a satisfactory explanation and/or documentation corroborating his or her story.
Confirmation of the suspicious sign
- A suspicious sign is confirmed when the passenger's explanation or documentation fails to resolve the suspicious sign
- In which case the passenger must have extra security procedures. The determination of extra security proceduresstatus is made on a case-by-case basis
Extra security procedures
- All passengers have Extra security procedures and their accessible property must be screened as outlined below at either:
- Checkpoint
- Boarding gate
- Gate hold area
- by Egyptair and Cairo Airport Police Authority.
Possible Exemptions
- Heads of State, Heads of Government, Dignitaries at the level of Cabinet Ministers or above, Ambassadors
- Permanent Representatives to the UN and the Organization of Egypt
- Presenting a valid non-EGYPT passport, certified by the Department of State, certifying that the individual are accredited to the EGYPT or to a United Nations mission.
Extra security procedures (Option 1)
- Wearing disposable gloves collect a sample of the passenger's hands, top of socks, belt buckle, and pockets when applicable
- In addition, collect a sample of the disposable gloves worn by the screener who conducted the sampling and immediately process the sample through the ETD.
- Resolve any ETD alarm by conducting a full-body pat down and by screening the accessible property of the passenger. All ETD alarms must be resolved before allowing the passenger to board the aircraft.
Extra security procedures (Option 2)
- Wearing disposable gloves, conduct a full-body pat down of the passenger. In addition, collect a sample of the passenger's hands and the disposable gloves worn by the screener to conduct the pat down and process the sample through the ETD.
- Resolve any ETD alarm by contacting local law enforcement authorities and screening the accessible property of the passenger. All ETD alarms must be resolved before allowing the passenger to board an aircraft.
Extra security procedures (Other options if ETD is unavailable)
- Pat down around the entire waist, including the belt and the belt buckle if the passenger is wearing one.
- Pat down the centerline in front and back of pant legs from waist to bottom of pants, including the zipper/buttons/crotch area by patting down the inner thighs from the knee to the crotch area until you meet resistance
- For skirts and dresses, contour the skirt fabric to the passenger's body to enable the pat down, pat down the front and back of leg area from waist to the lower end of the garment, and pat down the inner thighs upward from the knee to the crotch area until you meet resistance
- Pat down the vertical center line (buttons/zippers) of clothing worn above waist area and also the vertical center of the back of these articles of clothing
- Remove footwear worn by PAX extra security procedures and conduct screening using physical search
- Notify a law enforcement authority for any threat indications that cannot be resolved.
- Footwear must be screened for signs of alteration, tampering, and unusual weight, the existence of any component of an improvised explosive device (IED) or the existence of any item on the TSA Prohibited Items List using X-ray.
- Outer coats and jackets must be removed prior to search and physically examined to determine if the garments are unusually heavy or there are any inconsistencies with the general appearance or feel of these garments, the contents of the garments (such as items in the pockets) must also be examined as described in the screening of accessible property.
- Egyptair must ensure that no one other than its employees, and representatives, the Police Authority have access to the contents or any compartments of PAX extra security procedures checked bags after they have been screened.
General
- The appropriate authorities must be notified immediately if passenger:
- Documents
- A forged or altered passport
- An invalid passport
- Multiple passport or other substitute travel documents that contain conflicting data
- Property
- Any unauthorized type of explosive, incendiary, weapon, ammunition, or other prohibited or dangerous item.
- Documents
Notification of Authorities
- The passenger may be transported ONLY after being screened as an extra security procedures AFTER the authorities have notified Egyptair that the passport/substitute travel document is valid or the item in question is not prohibited or dangerous.
Application of Interview
- Elements of Interviewees Selection
- Elements noted during observing a passenger's documentation, appearance and behavior (Elements are non-discriminatory and must be applied in a uniform and consistent manner)
- Critical signs.
- Suspicious signs.
- Positive signs.
- Mandatory baggage control questioning.
- Criteria to designate passengers as PAX extra security procedures.
- Procedures to clear selectee items.
- Procedures to clear baggage.
- Passenger displaying ANY of the critical signs must have extra security procedures.
Elements: Appearance and Behavior
- Suspicious Signs
- Identification of a positive sign
- Proceed directly to the mandatory baggage control questioning
- No positive sign identified
- Check for and resolve the suspicious signs in passenger documentation
Elements: Positive Signs
- Family members traveling together, limited to mother or father and one or more children 12 years of age and under
- Diplomats representing the country of embarkation/disembarkation or serving in either country
- Designated "best customers," officers, directors, managers, or guest of the foreign air carrier
- According to data provided by it to station
- Egypt military or UN personnel who are nationals of the country of embarkation and present valid military ID and travel or leave orders, this positive sign extends to accompanying family members who present dependent ID cards
- Passenger 12 years of age and under
- Frequent flyers who present a valid U.S. passport or valid passport from the country of embarkation
- The name embedded in the frequent flyer membership card matches the name on the ticket and passport
- A minimum of one year member of the frequent flyer program and verifies the passenger has accumulated 20,000 actual flight miles in his or her frequent flyer account
- Passenger has traveled on at least six one-way or round-trip tickets
- Groups consisting of 8 or more individuals
- Having a designated group leader, each group member must be known to the leader, tickets are issued from a common source, no additional/substitutions to the group on current itinerary without a valid reason and members should have a common background
Elements: Suspicious Signs Documentation
- Passport of a country other than that of embarkation or disembarkation
- Ticket purchased in country other than that of embarkation or passport nationality
- Ticket purchased or changed within 24 hours of scheduled flight
- Tickets purchased in manner unusual to place of issue
- Ticketed routing is out of the ordinary
- On-way ticket
- Ticket/travel authorization appears to have been forged, altered, or stolen.
Elements: Mandatory Baggage Control Questioning
- Prior to interviewing the passenger, the interviewer must inform the passenger of the reason for the questioning.
- The preferred statement is, " I am going to ask you some questions about your baggage because it has happened in the past that passengers have received, without their knowledge, items which turned out to be dangerous to passengers and the flight (such as bombs or weapons).”
- The purpose of this statement is to sensitize the passenger of the need to answer the interview questions honestly
Post-Questioning Procedures
- Determine if the passenger owns the baggage to be checked or carried onboard and all of its contents
- If the baggage has remained in the passenger's control from the time the baggage was packed until the time of check-in, in the event of a negative response that cannot be satisfactorily resolved, process the baggage in question
- If the passenger has received and is carrying any articles received from others. These articles may be packages, medicine, books, or any other items
- Determine if the passenger has any battery-operated, electrical, or electronic items or items that were purchased, repaired, or out of the passenger's control during his or her trip.
Screening Point and Boarding Gate Security Procedures
- Describe passenger and baggage screening process
- Explain procedures for dealing with security removed items
Supervisor's Role in Screening
- Liaise in monitoring security and facilitation procedures
- Receive reports relating to prohibited items detected during the screening process
- Assist in actions to deal with illegal items found during screening process
- Ensure items are handled according to airline security procedures
- Placed in appropriate container
- Sealed and tagged
- Claim receipt or tag given to passenger
- Guidance material in IATA Security Manual
- Removed item is placed in the aircraft hold
- Record or log entry is made at the screening point
Safe Carriage of Removed Item
- Completion of automated or manual tag process for positive passenger and baggage match
Items Confiscated During Screening Process
- Consider denying passenger carriage
- Inform passenger that the item cannot be carried
- Notify authorities as prescribed in the airline operations or security procedures
Special Handling
- Heads of State
- Senior government officials
- Law enforcement officers
- Very Important Persons (VIPs) and Commercially Important Persons (CIPs)
- Other special passengers
Boarding Gate Security Procedures
- Ensuring sterility and accessing control of sterile gate area (locked doors or guards)
- Controlling jetway or air bridges access to prevent unauthorised access
- Reconcile boarding card and passport, examine boarding card and ticket coupon to verify passenger profiled
- Identify interline or transit passengers and ensure profile questioning is conducted
- Ensure reconciliation of interline or transit passengers with checked baggage
- Ensure ground transport vehicles security cleared, arrange for and monitor additional document check, aircraft side (during increased threat)
Flight Closing Security
- Correct head count is vital
- All checked-in passengers on board
- "No show" discrepancy must be resolved
- Baggage of checked-in passenger who is not on board must be off-loaded
Security Status Notification Process
- Actions may involve off-load of missing passengers' baggage
- Pre-flight security check of aircraft conducted, correct count of boarded passengers
- No-show passengers identified and baggage tag number notified for off-load of baggage
- Notify ramp services of tag numbers for loading of stand-by baggage, notify airline aircraft dispatch movements controller of status
Types of Security Emergency
- Acts of unlawful seizure
- Sabotage
- Bomb threats
Supervisor's Tasks
- Prescribed in airline emergency procedures
- Assist in initiation of airline emergency procedures
- Assist in initiation of emergency notification list
- Initiate immediate record-keeping log
- Obtain information from passenger records as necessary
- Ensure protection of airline
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the phases of human trafficking and the roles of aviation security in prevention. This quiz will cover key concepts related to trafficking and aggression, helping you understand critical elements in recognizing and addressing these issues.