Aviation Security Management PDF
Document Details
Uploaded by RevolutionarySchrodinger1709
American College of Dubai
Nash Dsouza
Tags
Summary
This document analyzes the role of threat assessment in managing risk within aviation security management, highlighting the importance of identifying potential risks, allocating resources, and collaborating among stakeholders in the aviation sector.
Full Transcript
THE ROLE OF THREAT ASSESSMENT IN MANAGING RISK WITHIN AVIATION SECURITY MANAGEMENT Nash Dsouza TABLE OF CONTENTS 1. Introduction ………………………………………………………………………………………………… 2. Importance of Threat Assessment in Aviation Security Management………………………………………...
THE ROLE OF THREAT ASSESSMENT IN MANAGING RISK WITHIN AVIATION SECURITY MANAGEMENT Nash Dsouza TABLE OF CONTENTS 1. Introduction ………………………………………………………………………………………………… 2. Importance of Threat Assessment in Aviation Security Management…………………………………………………………………………………………… … 3. Examples and how threat information has changed security measures to reduce the risk of a threat event occurring. ……… 4. References……………………………………………………………………………………………… ….. INTRODUCTION Aviation security management is Crucial in ensuring the aviation sector's credibility and security. It serves as a critical factor in aviation security allowing effective risk management. Threat assessment consists of a careful analysis and evaluation of possible risks to aviation, enabling a variety of safety protocols to be implemented and altered accordingly. This paper will investigate the purpose of threat evaluation in risk management within aviation security management and present two examples indicating threat information has transformed security measures to reduce the risk of threat occurrences. Importance of Threat Assessment in Aviation Security Management: Risk assessments can carefully and accurately determine potential scenarios, being detailed and extensive in analysing each type. Concerns could be aimed at airports, terminals, or other locations such as fuel farms, facilities that control air traffic, or navigation equipment. Moreover, the different types of aviation like passenger aircraft, general aviation, and cargo-only aircraft are also possibly at risk. (Berti, 2019) There are various advantages in using threat assessment in aviation security. Some of which may include: Risk mitigation: Aviation security experts can use threat assessment to detect and analyse possible hazards and vulnerabilities in the aviation system. Understanding the unique vulnerabilities that the sector faces allow security solutions to be devised and executed to effectively minimize these risks. This proactive strategy aids in the prevention of security events and the possibility of threats materializing. (Risk Management | SKYbrary Aviation Safety, n.d.) Allocation of Resources: Threat assessment helps security managers efficiently distribute resources. By Recognizing the unique vulnerabilities that the aviation sector faces allows them to prioritize and deploy resources, such as personnel, technology, and finance, to the most at-risk regions. This enables efficient resource use and increases the efficacy of security measures. Identifying Potential risks: Evaluating threat allows for the detection and comprehension of potential aviation security risks. It entails assessing the character and capacity of possible adversaries by studying numerous aspects such as sabotage, insider threats, cyber threats, and terrorism. Security experts may create focused and effective security solutions by thoroughly examining these risks. Collaboration and Information Sharing: Improvised explosives and person borne IEDs still represent a major threat as an instrument of choice in efforts to target civil aircraft and airport facilities. Screening protocols are crucial in the aviation security system for deterring and detecting these potential threats. However, they are susceptible to fail due to inefficient implementation. (Hwang Ho-won, 2018) The importance of collaboration among airports, airlines, security teams and other relevant parties plays a vital role. It emphasizes the need of threat assessment in communication of information, coordination of safety protocols and cooperatively tackling frequent pain points as well as new threats. Informed Decision making: Although crucial, finding strategies to maximize data-driven decision making when information is obtained from various organizations and stakeholders may prove to a tedious task. As described in GASP, data decision making can aid to facilitate the shift to a predictive and systematic approach in aviation safety management. As a result of the increased complexity of global air transportation networks, efficient data management and analysis is now regarded as essential for enhancing both local and global security measures. (Kende et al., 2022) Informed Decision-making underlines the significance of evidence-based decision- making solidified by thorough risk assessments. Examples and how threat information has changed security measures to reduce the risk of a threat event occurring. Example 1: On September 11, 2001, the upsetting terrorist attacks against the World Trade Centre and the Pentagon had a profound impact on aviation security worldwide. They signify as a vital example of just how threat information has transformed security protocols to diminish the risk of a threat event reoccurring. (September 11 Attacks - Wikipedia, 2001) Moreover, the September 11 attacks highlighted commercial aviation’s vulnerability to planned hijacks and the usage of aircrafts as weapons. (Josephs, 2021) Security Measures Implemented Reinforced Cockpit Security: The threat assessment underlined the necessity to reinforce cockpit security to stop unauthorized access and the takeover of airplanes by bombers and terrorist. In April 2003, in unity with ATSA and a January 2002 decree, TSA worked together with the FAA and airborne carriers to strengthen cockpits accesses on commercial airlines to protect them from small firearms, invasion and explosive items such as grenades. By April 2003, all airborne carriers met the prerequisite to be consider secure. (Diane Gerace, 2021) Additionally, the FAA also ordered and tasked airlines to enhance the locks on the cockpit doors so that the only way to enter would be from the inside of the cockpit. This change enabled pilots to have complete authority over who enters. (Verger, 2021) Strengthened Passenger Screening: Prior to September 11, 2001, Anyone, including people who were not traveling, were able to go to the terminal and access the secure area by passing through the security gate. (Diane Gerace, 2021) The threat data gathered led to an essential alteration of passenger screening protocols. An intense emphasis was placed on airport security, and precautions were established in order to prevent such assaults from occurring again in the future. Amid the new guidelines, only individuals with tickets to travel on the day would be permitted through the security checkpoint, Sharp things would be prohibited in carry-on luggage. In December 2002, The Transportation Security Administration (TSA) was founded by the United States government, and it implemented more stringent passenger screening processes. Advanced image technologies, full-body scanners, as well as intensive physical inspections were used to discover hidden weapons and prohibited objects. Lastly, in September 2006, (TSA) strengthened safety precautions by conducting more arbitrary staff screenings, increasing canine patrols, strengthening aviation freight security measures, enforcing stricter ID verification requirements, and dispatching more qualified security personnel in bomb evaluation and screening by observation procedures. (Diane Gerace, 2021) Impact: The introduction of enhanced passenger screening procedures and enhanced cockpit security considerably decreased the likelihood of an identical occurrence happening. The threat assessment completed following the September 11 attacks had a direct impact on these safety precautions. The airline industry adopted pre-emptive actions to reduce recognized risks and avert future hijackings and assaults by improving passenger screening standards and bolstering cockpit control. Example 2: The failed shoe bomb assault on American Airlines Flight 63 by Richard Reid in December 2001 was a crucial catalyst for modifications in security measures to lessen the probability of identical threat incidents reoccurring. (Richard Reid - Wikipedia, 2013) The incident brought to light the potential use of explosive substances hidden within footwear and highlighted flaws in airport security measures. (“Shoe Bomber” Richard Reid Attempts to Detonate Bombs on Paris-Miami Flight | HISTORY, 2001) Security Measures Implemented Deployment of Explosive Trace Detection Technology: Following the shoe bomb scare, the introduction and implementation of explosive trace detection equipment was expedited. Security officers can use this technology to identify trace quantities of exploding substances on shoes and other personal items. It is vital in identifying possible risks and improving the efficiency of passenger screening. In March 2010, The Transportation Security Administration (TSA) formally deployed hundreds of sophisticated imaging technology equipment at US airports. These devices, commonly referred to as "full-body scanners," serve to identify explosives, non-metallic weapons, and various types of hazards that are concealed beneath layers of clothes and therefore avoid detection by ordinary metal detectors. By the end of 2010, around 500 AIT computers had been distributed across the country. (Diane Gerace, 2021) By the help of threat assessment, these security protocols play a crucial role in identifying potential threats and enhancing the effectiveness of passenger screening. Liquids and Gels Restrictions: The shoe bomb incident additionally impacted policy modifications regarding the carry-on for liquids and gels on board flights. In August 2006, along with the addition of air marshals and shoe removal regulations, TSA also banned Liquids and gels. British officials prevented a terrorist plot to ignite liquid bombs on board ten commercial airplanes flying from London to locations throughout the United States and Canada. Prosecutors in the United Kingdom said that the would-be terrorists planned to conceal the explosives as beverages in 500-milliliter plastic bottles. (Schaper, 2021) Based on threat assessments suggesting emerging adversary tactics, limitations on the amount of liquids and gels permitted in carry-on luggage were implemented. This security measure was designed to prevent the smuggling of liquid bombs disguised as ordinary objects. Impact The deployment of explosive trace detection technology procedures, as well as limits on fluids and gels, dramatically lowered the likelihood of a shoe bomb threat scenario arising. These security solutions were designed to address the specific danger discovered through threat assessment, improving the ability to detect, and limiting the possible risk provided by hidden bombs in footwear. Conclusion The threat information acquired through sophisticated threat assessment techniques forced considerable improvements in security measures in both cases. The shoe bomb danger was handled with the installation of increased passenger screening processes, including shoe removal, and upgraded screening technology, as well as the imposition of liquid and gel limitations. Similarly, increasing passenger screening methods and reinforcing cockpit safety were immediate steps taken after the threat assessment made following the September 11 attacks. The preceding instances illustrate how threat assessment influences and develops security measures, minimizing the likelihood of threat occurrences in aviation. References: https://www.skybrary.aero/articles/risk- management#:~:text=Risk%20mitigation%20%2D%20If%20the%20risk,if%20th is%20is%20economically%20feasible. https://unitingaviation.com/news/security-facilitation/the-importance-of-risk- assessment-in-aviation- security/#:~:text=To%20understand%20risk%2C%20one%20must,results%20in%20 areas%20of%20vulnerability. 이주형, & Hwang Ho-won. (2018, June). The Study on the Implementation of ICAO Global Aviation Security Plan - Review and Propose the Implementation plans of Global Aviation Security Plan in Republic of Korea -. Journal of the Aviation Management Society of Korea, 16(3), 73–92. https://doi.org/10.30529/amsok.2018.16.3.005 https://www.itu.int/dms_pub/itu-s/opb/journal/S-JOURNAL-ICTF.VOL1-2018- 2-P07-PDF-E.pdf Kende, M., Livingstone, S., Minehane, S., Minges, M., Molloy, S., & Sciadas, G. (2022). GLOBAL CONNECTIVTY REPORT 2022. CHAPTERS 3-4. ACCELERATING PROGRESS TOWARDS UNIVERSAL AND MEANINGFUL CONNECTIVITY & THE CRITICAL ROLE OF MIDDLE-MILE CONNECTIVITY. SYNCHROINFO JOURNAL, 8(4), 22–32. https://doi.org/10.36724/2664-066x-2022-8-4-22-32 https://www.sskies.org/images/uploads/subpage/PARAS_0026_InsiderThreat Mitigation.FinalReport_.pdf Richard Reid - Wikipedia. (2013, August 27). Richard Reid - Wikipedia. https://en.wikipedia.org/wiki/Richard_Reid “Shoe bomber” Richard Reid attempts to detonate bombs on Paris-Miami flight | HISTORY. (2001, December 22). HISTORY. https://www.history.com/this-day-in-history/shoe-bomber- richard-reid-flight A Look at How Airport Security Has Evolved Post 9-11 | PHL.org. (2021, June 11). A Look at How Airport Security Has Evolved Post 9-11 | PHL.org. https://www.phl.org/newsroom/911-security-impact Verger, R. (2021, September 9). The post-9/11 flight security changes you don’t see. Popular Science. https://www.popsci.com/technology/airport-security-changes-since-9-11/ Schaper, D. (2021, September 10). It Was Shoes On, No Boarding Pass Or ID. But Airport Security Forever Changed On 9/11. NPR. https://www.npr.org/2021/09/10/1035131619/911- travel-timeline-tsa September 11 attacks - Wikipedia. (2001, September 11). September 11 Attacks - Wikipedia. https://en.wikipedia.org/wiki/September_11_attacks Josephs, L. (2021, September 11). How the Sept. 11 terrorist attacks forever changed air travel. CNBC. https://www.cnbc.com/2021/09/11/how-9/11-forever-changed-air-travel.html