Air Transport Security
Air Transport Security
Edited by
Joseph S. Szyliowicz
University of Denver, USA
Luca Zamparini
University of Salento, Italy
Published by
Edward Elgar Publishing Limited
The Lypiatts
15 Lansdown Road
Cheltenham
Glos GL50 2JA
UK
1 Introduction1
Joseph S. Szyliowicz and Luca Zamparini
Index271
vii
viii
ix
goals of the organizations that pose the greatest threat to aviation security
today – al-Qaeda and the Islamic State (ISIS). Al-Qaeda is, of course,
responsible for the new era in aviation security, which was inaugurated
by its deadly 9/11 attacks on the World Trade Center and the Pentagon.
Though its power and influence apparently diminished following the death
of Osama Bin Laden in 2011, it has recently experienced a resurgence that
is likely to continue. Even if that does not occur, it still retains the ability
and interest in attacking aviation facilities in many countries.
ISIS, unlike al-Qaeda, sought to establish its rule over a geographic area
but it has lost almost 60 percent of the territory it controlled in Iraq and
Syria in the last few years and remains under severe pressure. Though it
will probably lose much more territory, it has demonstrated its ability to
use the internet to recruit men and women in many countries who, whether
for a shared religious orientation, support for its goals, or personal reasons,
are willing to engage in terrorist plots. Thus, regardless of what happens
on the ground, ISIS will doubtless be able to continue to attract adherents
and to organize terrorist attacks. Accordingly, it too must be considered
a continuing terrorist threat, one which has been and will continue to be
directed to aviation.
Furthermore, given the growing competition between ISIS and al-Qaeda
for global support and resources from the multinational jihadi community,
the threat to aviation is likely to increase in the years to come. And, other
groups and organizations may well follow their example. How widely avi
ation continues to be regarded as an attractive target was recently vividly
illustrated by the comments made, on February 1, 2017, by a Palestinian
leader, Fatah Central Committee member and former Palestinian negoti
ator Nabil Shaath. After condemning Europe for its lack of concern for
the fate of the Syrian people and noting that the terror attacks had led
to action, he stated: ‘Do we have to hijack your planes and destroy your
airports again to make you care about our cause?’1
Clearly, the state of global aviation security requires continuing atten-
tion. In this work, distinguished scholars explore the structure and
functioning of this global system and the evolution and current state of
the security arrangements that have been implemented in many countries.
Thus, Part I consists of a discussion of the various domestic and external
factors that have influenced the organization and functioning of the avi
ation sector. The goal of this section is to identify the context within which
security issues are defined, agendas established, decisions made, policy
formulated, and resources allocated. Furthermore, the strengths and weak-
nesses of this structure and its functioning are also identified and discussed
including an analysis of the unique characteristics of air cargo and their
implications for security.
while maintaining good business practices. Air cargo is a vast and growing
sector that transports a wide range of products, including some that are
classified as ‘dangerous goods’, in a variety of different models, each of
which presents its own security challenges. In each, numerous actors are
involved, ranging from shippers to freight forwarders to the transportation
companies. Security has always been a challenge to the industry because of
criminal activities but in recent decades the terrorist threat has led to the
development of new security processes and regulations, which, given the
nature of the supply chains, require common global practices and object
ives. Furthermore, these regulations extend well beyond merely screening
at airports and involve a wide variety of programs, procedures and tech-
nologies. Achieving a high level of security in this environment requires
the resolution of numerous complex operational issues. Safeguarding air
cargo under these conditions requires, above all, close cooperation with
regulators, and globally accepted standards and definitions.
Having established the general context which shapes global aviation and
its security, we turn our attention, in Part II, to a number of country case
studies drawn from several geographic regions (North America, South
America, Europe, Asia, Africa and Australia). All these countries have
confronted various problems in their efforts to establish effective security
policies and practices as a result of their particular situations. Accordingly,
this section has two goals. First, it seeks to identify communalities and
differences in how states define security issues, establish agendas, make
decisions, formulate policy and allocate resources. Second, it seeks to
identify the strengths and weaknesses of the security structures that these
states have established in order to draw comparative conclusions.
This section opens with Chapter 7, by Joseph S. Szyliowicz, which dis-
cusses the ‘Aviation security in the USA’. The US did not accord adequate
attention to safeguarding its extensive aviation system prior to 9/11 but
it then moved vigorously to confront the security challenge. It adopted
various new policies, rules, and regulations that established a new structure
and adopted policies that were designed to ensure that passengers could
fly safely, that cargo would be secure and that general aviation facilities
would also be adequately protected. As part of this effort, it has played an
important role in attempting to ensure that its security standards applied
beyond its borders. Nevertheless, the analysis reveals that despite all these
efforts, all parts of its aviation system – passengers, cargo, and general
aviation – still contain various shortcomings.
Chapter 8, by Kamaal Zaidi, considers ‘Aviation security policy in
Canada’. He begins by noting the multilayered security matrix, made
up of a network of laws, regulations, policies, measures, programs and
technology that serve as the guiding framework for aviation security in
security are represented by the area around the aircraft, terminal security
and preventing the aircraft from being used as a flying missile. In order to
achieve this goal various measures in terms of security personnel, strength-
ened cockpit doors and cargo containers have been adopted. The chapter
then considers the security procedures at Israel’s airport, which have, as
their aim, that no suspicious human or physical element should be able to
overcome the security checks. This is accomplished by a profiling of pas-
sengers by trained personnel. The chapter concludes with a comparative
analysis between the human and the technological elements that includes a
discussion of their related advantages and disadvantages.
Chapter 11, ‘Air transport security in Kenya’ by Evaristus Irandu,
provides a study related to an African country. It considers the relationship
between air transport and the overall development of African countries
and identifies security as one of the most relevant issues in this context.
It then reports on the continually growing trend of air transport in Kenya
and the quantity and quality of airports in the country. The chapter con-
siders the procedures and protocols that characterize security in Kenyan
airports and the agencies that are involved in these tasks. Air cargo security
is also analyzed and the roles of the various public and private stakeholders
involved are discussed. The author concludes that it is impossible to per-
form a full screening of all items. The chapter then lists and discusses other
air transport security challenges faced by Kenya, including the location of
airports, access control and airport perimeter fencing, security screening
equipment and procedures, and the training of security personnel. The
chapter finally considers the main strategies to enhance air transport secur
ity in Kenya, which include the need to implement ICAO standards, to
cooperate with other East African Community members and to implement
the Aviation Security (AVSEC) mechanism.
Chapter 12, ‘Air transport security in Malaysia’ by Priyanka Puri,
Manjit Singh Sandhu and Santha Vaithlingam, focuses on a country
that has suffered some of the worst episodes related to aviation security
in the current decade. The chapter begins by stressing the relevance that
the tragic events of 2014 have had on the perception of security by the
Malaysian airline and by the general public. It also provides a quantitative
estimate of the loss in income in the aftermath of these episodes. It then
discusses the Malaysian civil aviation industry and provides a thorough
analysis of the two episodes that occurred in 2014. The chapter then
considers air transport security in Malaysia with special attention to the
role, functions and organization of its governing body, the Department of
Civil Aviation. It also considers the main challenges that the Department
confronts including aircraft flight tracking and conflict zone risk mitiga-
tion. A thorough analysis of these topics is presented both in terms of risk
NOTE
1. https://www.memri.org/tv/nabil-shaath-int’l-peace-conference-anything-better-us-led-ne
gotiations-do-we-need-hijack-planes.
INTRODUCTION
The structure and functioning of the aviation system has changed dramati-
cally in recent years and these developments have had major contextual
and substantive implications for security policy at all levels, international,
regional, and national.
Essentially these changes can be attributed to four major trends that
have transformed transportation systems everywhere and have had major
impacts upon public policy in regards to aviation and the other modes. The
first is globalization, which has resulted in the ever increasing interaction of
public and private systems across national boundaries. This process, which
has been facilitated by information and other technological advances, has
not only led to an enormous growth in the movement of people and goods
across national boundaries but it has created complex new national and
cross national security issues. It has also contributed to the emergence of
powerful organizations in both the passenger and freight sectors, actors
who have wielded great influence in the shaping of national, regional,
and international policies. Their enhanced role has been facilitated by a
second trend, increased privatization and deregulation. As aviation has
constantly grown in economic and commercial importance, states have
granted the airlines far more freedom of action than ever before so that
they and numerous related organizations have emerged as major actors
in the development and implementation of policy, including security. A
third trend, intermodalism or multimodalism, has involved the increas-
ing integration of the various transport modes, which traditionally have
functioned as separate entities, into a single system. This trend has also
facilitated personal travel and the shipment of goods but it too has created
complex new security challenges ranging from the design of large new
facilities to effective communications between different groups of security
personnel.1 Finally, one cannot overlook the ever growing public concern
with social and political issues such as sustainable development, climate
15
change and privacy.2 All these trends may have resulted in enhanced
transport efficiency but each has also created complex new challenges for
the development of effective policies to safeguard aviation nationally and
internationally.
Any policy, including the ones that governments have adopted in regards
to aviation, can be analyzed along two dimensions – the specific issue area
involved and the policy instrument that is used to resolve it.3 Aviation
policy inevitably has to deal with a wide range of socio-economic and
political issues involving airports, airlines, and passengers. In the case of
airports for example, questions such as ownership and control, construc-
tion and expansion, degree and type of economic autonomy, frequently
arouse controversy. Similar issues arise in regards to airline regulations in
such areas as market access, routes, fares, marketing, rural air services and
safety issues among others – all of which have security implications.
Though all states have to deal with such issue areas, they have numerous
instruments available. These include outright ownership, subsidies, direct
and indirect contractual arrangements, regulatory controls and research
and development activities. Which one is selected, and how it is applied, is
determined by numerous factors including the nature and functioning of
the political system, and its socio-economic context, including financial,
social, and international considerations. As a result, wide variations exist
in the policies that are adopted and in their implementation. Thus, though
airports are still essentially controlled by public entities – national, state or
municipal governments – the relationship between the public and private
sectors has evolved over time so that today the private sector has assumed
a large role in many operations as well as becoming increasingly inte-
grated.4 Given the political variables involved, however, it is not surprising
that states exercise different degrees of control over their operation as well
as over the airlines that use them. Such variations obviously create great
difficulties in efforts to achieve the degree of harmonization that a secure
global aviation system requires.
All states, however, consider their aviation systems to be valuable
economic and social sectors whose many dimensions require governmental
attention. Australia, for example, recently published a comprehensive
‘National Aviation Policy White Paper’,5 which identified this sector as ‘an
industry of national strategic importance’ and ‘a key driver of broader eco-
nomic prosperity’,6 and established long term goals which reflect the key
actors and the potential political conflicts involved. Though the govern-
ment accords priority to safety and security, these include (1) international
aviation, (2) domestic, regional, and general aviation, (3) industry skills
and productivity, (4) consumer protection, (5) airport infrastructure, and
(6) environmental impacts. Thus, though it explicitly recognizes the critical
The earliest effort to harmonize what was then a new, albeit rapidly devel-
oping, industry occurred soon after the Wright brothers’ first successful
flight in 1903 because of the important role that this new technology
played in World War I. Shortly after its conclusion, the Paris Convention
was enacted in 1919 in order to regulate aerial navigation while recogniz-
ing that national sovereignty extended upwards. As aviation continued to
assume an ever increasing role in transporting people and goods, the need
for an international organization to regulate aviation became increasingly
obvious and in 1944, 52 countries signed the Convention on Civil Aviation
of 1944 in Chicago (the Chicago Convention), which established the
ICAO. In 1947 it became one of the specialized agencies of the United
Nations and today has 191 members.
The Convention, which became operational in 1947, noted the role that
aviation can play in enhancing international understanding as well as its
destructive potential and therefore sought to promote its growth and to
provide safe travel. To that end, it established international standards for
aircraft licensing, operations, communications and other technical dimen-
sions though security issues were not considered until terrorists began to
target aviation in the 1960s.
To counter this new threat, conventions dealing with security, both in the
air and at airports were enacted over time. The first step occurred in 1963
when the Tokyo Convention was adopted but as new types of attacks and
issues proliferated, ICAO continued to expand its role in combating terror-
ism by seeking to strengthen the international legal framework. Important
steps were taken at The Hague in 1970 to deal with the unlawful seizure of
aircraft, and at a major international conference in Montreal in 1971, when
the Convention for the Suppression of Unlawful Acts against the Safety
of Civil Aviation was accepted and a supplement that protected airports
was also agreed upon. In 1974, a very important addition to international
aviation security was made with the passage of Annex 17, an addition to
the Chicago Convention which requires each state to adopt a specific pro-
gram to safeguard its airports and planes from any type of threat. ICAO
members must create a specific national security organization responsible
for adopting a variety of such important measures as passenger, baggage
and cargo screening.12
Despite their importance, such international agreements suffer from an
important limitation – they only apply to the signatories. Thus, though
191 states are members, the Tokyo Convention has 186 signatories, The
Hague Convention 178, the Montreal Convention 174, and the latest, the
Beijing Convention of 2010, which was designed to update the Montreal
Convention, only eight states also differ in the number of conventions and
protocols (ICAO lists 48) that they commit to. Australia, for example has
signed up to 32, Switzerland 35, France 33 and the US 25.13
Nevertheless, by virtue of their membership, every member of ICAO is
required to implement a variety of measures to safeguard aviation from
terrorist attacks. The key regulation that deals explicitly with aviation
security is Annex 17 of the Chicago Convention, which shall ‘have as its
primary objective the safety of passengers, crew, ground personnel and
the general public in all matters related to safeguarding against acts of
unlawful interference with civil aviation’. In order to achieve this goal,
each state is required to create a specific program to ensure the security
of its aviation activities. These programs should include such measures
as the screening of passengers, their luggage, mail, and air cargo as well
as securing cockpit doors, safeguarding airports, background checks
and training programs for security personnel, and cooperation with
other members in such area as sharing intelligence in order to protect
the global system. The requirements imposed by previous conventions
(Tokyo, The Hague, and Montreal), which provide for the policies that
states must take in the case of hijackings are also reaffirmed and various
other annexes also impose various requirements that are designed to
enhance security.14 The attacks of 9/11 prompted further actions by
ICAO to safeguard aviation, notably its June 2002 Universal Security
Audit Program (USAP), which was specifically designed to assess the
degree to which states were actually implementing Annex 17. Within five
years, 182 audits were carried out (172 of which yielded follow-up visits
to ensure that weaknesses had been remedied), and a new set of audits
was promptly initiated in 2008.15
Annex 17 is the primary policy instrument that underlies ICAO’s efforts
to enhance global aviation security and it has been updated many times to
meet new challenges; the latest amendment, the fourteenth, took effect in
November 2014. Thus, the original focus on establishing Standards and
more developed states but including many developing states have remedied
their non-compliance but other states have failed to remedy their safety
deficiencies due to a lack of will, means or ability’.22
All efforts to achieve international legal cooperation are complicated by
the failure to agree on what constitutes the definition of ‘terrorism’. Even
though the UN’s Security Council has agreed that international terrorism
is a major contemporary threat, the international community has failed to
agree on a legal definition. This effort, which dates back over 50 years, (to
1972), has foundered because it is a form of political violence which can,
and has, taken many forms including rebellions, revolutions, civil wars,
ethnic conflicts, anti-colonialism, and ideological disputes. As a result, ‘ter-
rorism remains a diffuse concept, which is addressed worldwide through
different ways, with different means and distinctive purposes, especially
since terrorist conduct sits at the crossroads between political expression
and crime. Not coincidentally, terrorism is the topic in international law,
on which there is an unprecedented amount of disagreement.’23 From a
legal perspective the key issue is whether a terrorist act is a criminal act and
if international agreement could somehow be reached that it does qualify
as such, then international efforts to combat this threat would be greatly
strengthened.24
passenger flights do meet its standards and has signed bilateral agreements
with the US, Canada and a few other countries that exempts them from
such requirements.
Establishing all these rules and regulations, as was the case with ICAO,
often involved difficult and complex negotiations. These took place
most clearly in the Parliament where the member states sometimes could
not reach agreement on measures that had been recommended by the
Commission. One particularly troublesome area has involved financing,
whether the industry or governments should pay the costs required to
implement the security requirements. In 2009, the Commission suggested
that the costs be allocated on the basis of such principles as cost-relatedness
and equity between passengers and the airlines. This directive sparked
such controversy among the national representatives that the legislature
was never able to accept this directive and the Commission withdrew the
proposal in 2015. Another Commission proposal that aroused controversy
involved the use of body scanners, which raised both privacy issues and the
protection of the acquired data.33 Accordingly the Commission issued a
new regulation in November 2011 that leaves decisions regarding scanners
to the individual states though if they are used at an airport, specific condi-
tions apply including that they not pose a health threat, that a passenger’s
privacy is protected, and that that no data be preserved.34 Body scanners,
however, have continued to raise national concerns. In October 2016, the
Commission proposed a new regulation dealing with airport screening
equipment in order to promote innovation and eliminate delays. However,
the European Scrutiny Committee of the British House of Commons
raised various concerns and called for an ‘urgent debate’ by Parliament.35
The 2016 Brussels airport bombings raised another security issue that
has aroused much controversy – how to safeguard an airport’s landside
sections. The EU quickly organized a meeting to discuss how best to
minimize this threat, but finding common ground is no simple matter since
security policies in these areas are generally the purview of governments.
Some countries, including Israel, do restrict access to arrival and departure
zones but questions have been raised about the economic and other impli-
cations of such measures as well as their efficacy. The Airports Council
International (ACI) Europe has, for example, explicitly expressed concerns
about the utility of restricting access to these area as well as the high costs
that airports would incur if they were to make the necessary adaptations.
Not only are numerous physical changes involved but new training pro-
grams would be required as well as additional screening technologies. An
ACI official pointed out that: ‘The possible adoption of additional security
measures such as checks on persons and goods entering airport landside
spaces could be disruptive and actually create new security vulnerabilities.’36
inflight security with Argentina. The US has long used air marshalls as a
last line of defense against airplane hijackings; now each country will be
able deploy air marshalls on flights between them.39
CONCLUSION
Despite all the effort, time and money that have been expended over the
years, especially since 9/11, to ensure the security of the global aviation
system, it is clear that though there is no question that it is more secure
today than ever before, many gaps and loopholes remain that can – and
have been – exploited by terrorists. A totally secure system can never
be achieved given its global character, the different levels of resources,
capabilities, and interests of individual states, the complexities of the poli-
cymaking systems involved and the ability of terrorists to develop innova-
tive modes of attack. Still, various steps can be taken by policymakers at
different levels to help minimize existing deficiencies.
To do so it is necessary, as is the case when dealing with any problem, to
begin by defining it precisely. Yet, as noted above, an agreed-upon defini-
tion of terrorism remains elusive. Nevertheless, tackling the admittedly
difficult task of reaching agreement could yield an outcome that would
strengthen the international legal regime.40 Despite the obvious difficulties
that have dogged such efforts for decades, it might be possible to at least
make a start if certain basic principles were kept in mind. Almost all defini-
tions focus on the nature of the target – to cause harm to innocent civilians
– but such a broad definition is inevitably self-defeating for it encompasses
a very wide range of groups. Thus, though one must not overlook the
human costs involved, it is important to remember that killing civilians is
a tactic used by terrorists to achieve their goals and that it is necessary to
differentiate among them on the basis of such factors as the international
dimension involved and the ends they seek.
It is also necessary to differentiate between reactive and proactive
approaches to security policy and to recognize that existing policymaking
relies on the former. Following 9/11, efforts to strengthen aviation security
have followed successful or failed terrorist attacks and sought to prevent
their repetition. Richard Reid, the ‘shoe bomber’ attempted to blow up
a Paris to Miami flight, so the US issued rules that require passengers to
remove their shoes for screening, a precaution that has not been universally
accepted, Similarly, following another failed terrorist effort that sought to
use liquid explosives in 2006, new rules were adopted by the US, the EU
and ICAO that restrict the ability of passengers to carry liquids, aerosols
and gels onto a plane. Though such reactions may prevent a similar attack,
and recognizes the socio-economic concerns and the political realities that
must be dealt with. Yet this is the challenge that must be met if this vital
sector is to continue to enable ever growing numbers of people and goods
to flow smoothly within and between states, an obvious imperative for the
wellbeing of peoples everywhere.
NOTES
1. See Joseph S. Szyliowicz, Luca Zamparini, G.L.L. Reniers, and D.L. Rhoades,
Multimodal Transport Security, Edward Elgar Publishing, 2016.
2. Brian Slack, Theo Notteboom, and Jean-Paul Rodrigue, ‘The Nature of Transport
Policy’, p. 1. https://people.hofstra.edu/geotrans/eng/ch9en/conc9en/ch9c1en.html.
3. Ibid, pp. 2–3.
4. Ibid, p. 5.
5. Australian Government, ‘Flight Path to the Future’, National Aviation Policy, White
Paper, December 2009.
6. Ibid, p. 2.
7. Ibid, p. 6.
8. https://www.transportation.gov/policy/assistant-secretary-aviation-international-affairs.
9. Bart Elias, David R. Peterman, and John Frittelli, ‘Transportation Security Issues for
the 114th Congress’ Congressional Research Service, May 9, 2016.
10. http://airlines.org/policy-priorities-learn-more/.
11. Denise Marois, ‘Congress Ramps Up for Fight on Aviation Issues’, Aviation Daily,
January 21, 2004.
12. Paul S. Dempsey, ‘Aviation Security: The Role of Law in the War Against Terrorism’,
Columbia Journal of Transnational Law, Vol. 41, No. 3, 2003, pp. 658–61.
13. http://www.icao.int/secretariat/legal/LEB%20Treaty%20Collection%20Documents/com
posite_table.pdf.
14. Dempsey, supra n. 12, pp. 675–9.
15. Study on the Legal Situation Regarding Security of Flights from Third-countries to the
EU, Final Report. November 2010, pp. 4ff.
16. Alejandro Piera and Michael Gill, ‘Will the New ICAO- Beijing Instruments Build a
Chinese Wall for International Aviation Security’, Vanderbilt Journal of Transnational
Law, January 2014, Vol. 47, pp. 218–37.
17. Dempsey, supra n. 12, p. 649.
18. http://www.itfaviation.org/itf-civil-aviation-unions-lobbying-over-the-big-issues-at-the-
icao-assembly/.
19. http://www.aci.aero/About-ACI/Overview/Standing-Committees/Aviation-Security.
20. Michael Milde, International Air Law and ICAO, Eleven International Publishing, 2008,
cited in Standards and Recommended Practices, Wikipedia. https://en.wikipedia.org/
wiki/Standards_And_Recommended_Practices.
21. Ruwantissa Abeyratne, Aviation Security Law, Springer, 2010, p. 205.
22. Brian Day, ‘Gaps in Global Effectiveness’, http://www.icao.int/Meetings/AMC/SAR
2010/Documents/21June2010-1030-Brian_Day-Gaps_in_Global_Effectiven.pdf.
23. Inez Braber, ‘The Thorny Nature of a Terrorism Definition in International Law’, IUP
Journal of International Relations, Vol. X, No. 1, January 2016, pp. 40–55, at p. 40.
24. Abeyratne, supra n. 21, pp. 319–21.
25. http://ec.europa.eu/transport/modes/air/security_en.
26. https://www.euractiv.com/section/transport/news/germany-to-correct-airport-security-
flaws-in-aftermath-of-attacks/.
27. Ibid.
28. Jamie Dettmer, ‘Fears Mount over European Air Security’, May 21, 2016, p. 1. http://
www.voanews.com/a/fears-mount-over-european-air-security/3340255.html.
29. Ibid, p. 2.
30. ‘Aviation Security Compromised: Norway Fails to Do Background Checks on 3rd Country
Nationals’, 14 November 2016. https://www.eurocockpit.be/stories/20161114/aviation-
security-compromised-norway-fails-to-do-background-checks-on-3rd-country-n.
31. https://ec.europa.eu/transport/modes/air/safety/air-ban_en.
32. http://www.europarl.europa.eu/atyourservice/en/displayFtu.html?ftuId=FTU_5.6.8.html.
33. Ibid.
34. http://ec.europa.eu/transport/modes/air/security/aviation-security-policy/scanners_en.
35. ‘European Scrutiny Committee Recommends Urgent Debate on Aviation Security’. https://
www.parliament.uk/business/committees/committees-a-z/commons-select/european-sc
rutiny-committee/news-parliament-20151/aviation-security-request-debate-16-17/.
36. Cathy Buyck, ‘EU Experts Wary of Pushing Airport Security Measures’, Aviation Week
& Space Technology, March 31, 2016, p. 30.
37. http://www.oas.org/en/sms/cicte/programs_aviation.asp.
38. Karina Guthriez, ‘South Pacific Civil Aviation Safety and Security through Regionalism:
New Initiatives for the Pacific Aviation Safety’, Office Journal of Policing, Intelligence
and Counter Terrorism, Vol. 5, No. 1, 2010, pp. 58–73.
39. https://ar.usembassy.gov/aviation-security-agreement-signed-during-visit-of-president-
obama/?_ga=2.61391791.288183691.1522258513-1219770695.1522258513.
40. Abeyratne, supra n. 21, pp. 318–19.
3.1 INTRODUCTION
During the last century, air transport has become a pivotal industry for
the development of world trade and of other industries (i.e. tourism)
that require the national, international and intercontinental movement of
passengers and of goods. One essential requirement for the growth of air
transport for freight and persons is definitely represented by a high degree
of security. The economic consequences of terrorist acts related to air
transportation go beyond the single industry and have a vast resonance
also in the long term.1 Moreover, the network characteristics of aviation
imply that the system is secure as its weakest link (Coughlin et al., 2002;
Motevalli and Stough, 2004). This is a clear example of network external
ities that require high standards of security at all links and nodes in the air
transport network in order to avoid extreme consequences. It must also be
taken into account that the public consideration of security is not based
on actual statistics but rather on the perception of security that is com-
monly diffused. People have the tendency to consider air travel many times
riskier than the evidence should support (Boksberger et al., 2007). The
economic literature that considered risk in civil aviation was traditionally
related to the safety issue. Some of the works (see, among others, Janic,
2000) discussed also some security issues while assessing the risks related
to safety in air transport. The situation has dramatically changed after
the tragic events of September 11. Since then, many theoretical and, in
some cases empirical, researches have been devoted to assessing risk on the
basis of security and providing economic models that try and optimize the
provision of security in this industry. This chapter aims at providing a brief
review of the economics literature on air transport security by considering
the various dimensions that have to be tackled in order to reach an optimal
level of security procurement. Moreover, it will discuss the models that
have been proposed to analyse airport security screening. This appears to
be the topic that has attracted the largest share of the relevant literature.
32
The chapter is structured as follows. The next section will discuss the
importance of considering the positive externalities generated by aviation
security in order to provide an optimal social level of security. Section 3.3
will provide a brief discussion of the assessment of risk in aviation security
and its related costs. Section 3.4 will propose a model to estimate the net
benefit of aviation security. Section 3.5 will concentrate on the models of
airport security screening. Section 3.6 will conclude.
3.2
THE IMPORTANCE OF CONSIDERING THE
POSITIVE AND NEGATIVE EXTERNALITIES OF
AVIATION SECURITY
Sp
Ss
ES1
PS1
E ES3
Pp
P
PS2 ES2
Ds
Dp
Qp Qs QMAX
Q
force individuals to pay a higher price for security. In this case, ES1 will be
reached. Alternatively, the government may provide subsidies to the firms
supplying security. This would shift the supply curve downward and it
would generate the ES2 characterised by a lower price with respect to the
private equilibrium one and a higher quantity (Qs). The conjoint adoption
of government regulations and of subsidies that shift both the demand and
the supply curve leads to the maximum amount of security. Some authors
(i.e. Coughlin et al., 2002) have argued that this level of security may be
excessive. This may be related to the fact that too much security may impact
on the seamless movements of passengers and freight, with the consequent
negative externalities. We may, for example, assume that more intensive
screening for explosives and for prohibited or potential weapons may cause
longer waiting time or more personal inconveniences to travellers that may
react with a reduction of airline tickets demand with the consequent loss of
revenues for airlines (Seidenstat, 2004). It is then important that the public
administrations, but also the private firms, in charge of security compare
the potential benefits and positive externalities of a higher degree of secu-
rity (i.e. value of aircrafts, lives saved and also the perception of security
of society at large) with the related direct costs and negative externalities.
However, it should also be taken into account that the last decades have
witnessed the passage from a point-to-point aviation system to the hub-
and-spoke structure. A terrorist act in any part of the system, and especially
in one hub, determines disruptions and negative externalities in all parts
of the network. These should be computed in any exercise aiming at the
determination of the optimal level of aviation security.
The analysis that was carried out in this section is relevant to understand
the fact that, since few bombings and hijackings had characterised the two
decades before September 11, the positive externalities of security were
underestimated and most of the required financing was to be made by
airlines and airports. These economic agents were more interested in keep-
ing fares low in order to attract ever more passengers and to contain costs
in order to maximize profits. Moreover, given the low occurrence of terror
episodes in aviation (Janic, 2000), several public administrations consid-
ered that the transfer of resources from other more dangerous transport
modes or from other sectors (i.e. health care) would even increase the cost
for society in terms of casualties and deaths. In this benefit-cost analysis,
the lack of consideration of broad benefits (externalities) for the overall
population led to an insufficient provision of security (Qp in Figure 3.1). It
is also arguable that, after September 11, the emphasis on aviation security
has led to a level of service (QMAX) that is considered by some as excessive
with respect to the social optimum (QS).
The present section has conducted a joint analysis of costs and benefits
of aviation security. The next one will provide a discussion of the method-
ologies to assess risk in civil aviation.
3.3
THE ASSESSMENT OF RISK IN AVIATION
SECURITY AND ITS RELATED COSTS
A seminal paper by Sage and White (1980) determined that there are
four types of societal risks that have to be considered in models dealing
with the assessment of risk: (1) perceived risk (the one that is intuitively
felt and perceived by individuals); (2) real risk (determined on the basis
of the expected outcome of future acts of terrorism); (3) statistical risk
(quantified on the basis of available data on the episodes that have
occurred in the past); and (4) predicted risk (analytically estimated by
quantitative models that take into account relevant studies and past data).
Consequently, risk assessment should be divided into three sub-tasks that
involve risk determination, risk evaluation and risk measurement. The
first one implies the estimation of risk parameters, the probability of
The discussion that was carried out in Sections 3.2 and 3.3 allows us
to consider the net benefits that are determined by aviation security.
Stewart and Mueller (2013) have proposed a model to estimate the net
benefit of providing aviation security which is summarised in the following
relation:
where pattack is the probability that a successful terrorist act would take
place if the security measure is not adopted. Closs is the overall cost as a
result of a successful terrorist act. This includes both the direct costs and
fatalities and the local and international negative externalities. Rrisk is the
reduction of risk that the security measure determines by deterring, foiling
or protecting against a terrorist attack. Lastly, Csecurity is the cost that is
necessary to provide the risk reducing measure that allows to obtain the
expected private and social benefit. From an economic viewpoint, a secur
ity measure is considered as efficient in the cases in which the net benefit
is positive. Consequently, the security measure should be implemented as
long as its marginal (social) benefit is higher than its marginal cost. This
leads to determine that the optimal level of security is achieved when the
marginal benefit is equal to the marginal cost as is shown in the following
Figure 3.2. We are assuming, coherently with the related literature (see,
among others, Seidenstat, 2004) that the marginal cost curve (MC) has a
MC
Currency units
MB
S* S100
positive and convex shape. This means the possibility to increase the suc-
cess rate of the security measure as an increasing marginal cost. It is then
less costly to pass from a 70 per cent to an 80 per cent success rate than to
pass from an 80 per cent to a 90 per cent success rate. On the other hand,
the marginal benefit curve (MB) has a negative slope given that the prob-
ability of a disaster occurring would likely decline with the enhancement
of security.
An important conclusion can be obtained from Figure 3.2. Although
theoretically possible, a 100 per cent degree of security (S100) would imply
massive economic losses that the society may not be eager to incur. The
optimal level of security (S*) is then normally set to a standard which
is below this full security level. Aviation risks can be minimized but it is
virtually impossible to eliminate them.
The model can be used to estimate the effect of several measures related
to aviation security that can be grouped into three main subsets. The
first is related to pre-boarding security and it encompasses intelligence,
international partnerships, border protection, joint terrorism task forces,
no-fly lists and passenger pre-screening, crew vetting, behavioural detec-
tion officers, travel document checker, checkpoints, transportation security
inspectors and random employee screening. The second subset attains the
prevention of hijacking and it can be constituted by passenger resistance,
trained flight crew, law enforcement officers and air marshal services. The
last set of measures refers to the prevention of the commandeering of
the airliner through hardened cockpit doors, installed physical secondary
barriers or flight deck officers.
V5a
T Bt 2Ct
(3.2)
t50
(11 r) t
where B represents the benefits that the community may obtain in each
determined period (year) in terms of the difference in probability of a
terrorist attack between the scenario that considers the implementation of
the security measure and the one that neglects it times the overall economic
damage caused by a terrorist act. C represents the costs incurred to create
the security measure and to implement it in each time period. r is the real
interest rate that allows to discount future benefits and costs with respect
to the current period. Any determined security project will be economically
viable only if V is positive.
The productive efficiency of any security measure (i.e. the possibility for V
to be positive) clearly depends on the level of technology and innovation. The
model proposed by Gillen and Morrison allows us to analyse and evaluate the
adoption of new technologies and their interactions with security officers.
In this case, several measurement problems arise. Moreover, various issues
should be carefully estimated. First, some machines emitting radiation may
harm the passengers that are required to pass through it. Secondly, the use of
technology may impact on the privacy of individuals that may be exposed to
unreasonable searches.2 Thirdly, the adoption of screening machines raises
issues related to the necessary space and to the amount of time that is needed
to perform security checks of all passengers accessing the airside areas of
airports. The following section of this chapter will discuss this issue in detail
by presenting the main economic contributions in the field.
3.5
THE MODELS OF AIRPORT SECURITY
SCREENING
where Cw is the unit waiting time cost, g is the number of passengers arriv-
ing at the inspection system, WE is the average waiting time, C1 and C2 are
the inspection costs at stage 1 (S1) and at stage 2 (S2). The optimization
requires that stage 1 be characterised by a higher service rate and a
3.6 CONCLUSIONS
The present chapter has provided a brief introduction of the most relevant
economic issues that pertain to aviation security. It has emerged that a
good amount of security does not only benefit air passengers, freight for-
warders, airlines and the other economic actors that are directly involved
in the aviation industry. It also generates positive spillovers (externalities)
in the overall economic system.
On the other hand, it appears that too much security may impact on the
seamless movements of passengers and freight, with the consequent nega-
tive externalities. Although theoretically possible, a 100 per cent degree of
security is not viable from an economic viewpoint given that it would imply
relevant economic losses that the society may not be eager to incur. The
optimal level of security is then normally set to standards which are below
this full security level. Such standards are then modified according to the
perceived risk after the occurrence of momentous events.
A topic that has been vastly investigated by the literature is the optimiza-
tion of airport security screening. Various models have been proposed and
all of them consider the trade-off between higher security and seamless
transport. The two lines of research that seem to prevail consider that it is
important to group passengers according to the degree of risk or to segment
airpost checks in two stages: the first one privileging efficiency and speed
and the second one aiming at full accuracy. It would be important that other
issues pertaining to aviation security receive more attention in the literature.
NOTES
1. For a discussion of several instances, see the chapters in Part II of this book.
2. As Chapter 10 on aviation security in Israel will discuss, the degree of tolerance to
thorough search and investigation depends on the perceived threat by individuals.
3. For a more extended discussion of the role of technology on security screening, see
Chapter 5.
REFERENCES
Janic, M. (2000), ‘An assessment of risk and safety in civil aviation’, Journal of Air
Transport Management, 6, 43–50.
Kirschenbaum, A., M. Mariani, C. Van Gulijk, S. Lubasz and C. Rapaport (2012),
‘Airport security: An ethnographic study’, Journal of Air Transport Management,
18, 68–73.
Lazar Babu, V.L., R. Batta and L. Lin (2006), ‘Passenger grouping under constant
threat probability in an airport security system’, European Journal of Operational
Research, 168, 633–44.
Leone, K. and R. Liu (2011), ‘Improving airport security screening checkpoint oper-
ations in the US via paced system design’, Journal of Air Transport Management,
17, 62–7.
Motevalli, V. and R. Stough (2004), ‘Aviation safety and security; reaching beyond
borders’, Journal of Air Transport Management, 10, 225–6.
Nie, X., R. Batta, C.G. Drury and L. Lin (2009), ‘Passenger grouping with risk levels
in an airport security system’, European Journal of Operational Research, 194,
574–84.
Olapiriyakul, S. and S. Das (2007), ‘Design and analysis of a two-stage security
screening and inspection system’, Journal of Air Transport Management, 13,
67–74.
Oum, T.H. and X. Fu (2007), ‘Air transport security user charge pricing: An
investigation of flat per-passenger charge vs. ad valorem user charge schemes’,
Transportation Research Part E, 43, 283–93.
Sage, A.P. and E.B. White (1980), ‘Methodologies for risk and hazard assessment:
A survey and status report’, IEEE Transaction on System, Man and Cybernetics
SCM-10, 425–41.
Seidenstat, P. (2004), ‘Terrorism, airport security, and the private sector’, Review of
Policy Research, 21, 275–91.
Stewart, M.G. and J. Mueller (2013), ‘Terrorism risks and cost-benefit analysis of
aviation security’, Risk Analysis, 33, 893–908.
Tamasi, G. and M. Demichela (2011), ‘Risk assessment techniques for civil aviation
security’, Reliability Engineering and System Safety, 96, 892–9.
Yoo, K.E. and Y.C. Choi (2006), ‘Analytic hierarchy process approach for
identifying relative importance of factors to improve passenger security checks
at airports’, Journal of Air Transport Management, 12, 135–42.
These are acts or attempted acts such as to jeopardize the safety of civil avi
ation, including but not limited to: unlawful seizure of aircraft, destruction
of an aircraft in service, hostage-taking on board aircraft or on aerodromes,
forcible intrusion on board an aircraft, at an airport or on the premises of an
aeronautical facility, introduction on board an aircraft or at an airport of a
weapon or hazardous device or material intended for criminal purposes, use of
an aircraft in service for the purpose of causing death, serious bodily injury, or
serious damage to property or the environment, communication of false infor-
mation such as to jeopardize the safety of an aircraft in flight or on the ground,
of passengers, crew, ground personnel or the general public, at an airport or on
the premises of a civil aviation facility.
In view of the strongly international nature of air transport and travel and
of the fact that any unlawful act would affect the interests of a number
of states, it is fundamental that a common legal framework be prepared
at an international level aiming at detecting and preventing such criminal
activities (Camarda, 1976, p. 152).
The need for concrete initiatives designed to prevent these acts of
unlawful interference is generally dated back to the 1960s, when in-flight
aircrafts commenced to be hijacked by politically motivated groups or
43
attack came to a conclusion the following fortnight, with the freeing of all
the hostages, although the aircraft were destroyed with explosives on 12
September.
Following this incredible event, a new decisive response was required. To
this end, two additional conventions were ratified: The Hague Convention
of 16 December 1970 (which came into force the following year, on 14
October 1971), for the Suppression of Unlawful Seizure of Aircraft,
and the Montreal Convention (which was adopted at the International
Conference on Air Law, in Montreal, on 23 September 1971 and came
into force on 26 January 1973) for the Suppression of Unlawful Acts
against the Safety of Civil Aviation. In addition, to reaffirm the need to
take strong actions aimed at coping with this new emerging threat, these
two conventions managed to overcome many of the problems relating to
implementation arising from the adoption of the first Convention in 1963.
In particular, the Hague Convention widened the possibility of exercising
jurisdiction for more signatory states, making more uniform the concept
of unlawful acts against air navigation safety. The Montreal Convention
of 1971 then further widened this notion, also covering activities that are
likely to threaten civil aviation and being an accomplice in said unlawful
activities. On 22 March 1974, four years after the ‘Dawson’s Field’ event,
ICAO adopted, pursuant to Article 37 of the Chicago Convention, its
17th Annex, entitled ‘Safeguarding International Civil Aviation against
Acts of Unlawful Interference’, which came into force on 27 February
1975, and which provided for the adoption of security systems aboard
and inside aircrafts to ensure an effective safeguard of passengers, crew,
ground personnel and the general public in airport areas, to be followed
by signatory states. Moreover, to balance out the Annex, Document 8973
‘Security Manual for Safeguarding against Acts of Unlawful Interference’
was also adopted to provide precise guidelines on the implementation of
the Standards and Recommended Practices to the states.
Besides Annex 17 and Document 8973, additional provisions concern-
ing aviation security, aiming at regulating specific operational aspects and
measures to be adopted for a more effective response to and prevention
of unlawful acts in air transport are also present in further Annexes to the
Chicago Convention (Dobelle, 2008, p. 65).
The adoption of these measures, however, has not succeeded to prevent
the occurrence of further acts of unlawful interference on passenger planes
in the decades that followed.
Among the most notorious is the Lockerbie bombing of Pan Am Flight
103 on 21 December 1988 over Lockerbie in southwest Scotland. At
around 7 p.m. the airplane flickered off the radar tracking and then fell to
the ground, broken in three pieces, about two minutes later, killing all 259
people on board and 11 people living in a part of the town destroyed by the
impact of the wing section. Later the cause of the disaster was ascertained
to be an in-flight explosion, caused by a bomb, brought on board the
aircraft inside a piece of luggage in the hold (Schmid, 1993, p. 292 and
Abeyratne, 2013, p. 21).
The Lockerbie tragedy, with its 270 victims, and the Air India 182
disaster, which happened on 23 June 1985, in which 329 lost their lives
due to a bomb explosion in the front cargo hold of the Boeing 747 while it
was still en route to London, were the worst air disasters caused by an act
of unlawful interference in the history of civil aviation, at least until the
beginning of the new century.
2
THE INTERNATIONAL AVIATION SECURITY
AFTER THE 9/11 ATTACKS
and six crew member) lost their lives in the accident. The preliminary
investigation appeared to show that the aircraft had been hijacked by the
captain. Yet, on 7 February 2014, Pegasus Airlines flight PC-751 en route
to Istanbul was hijacked by a passenger. The man said he had a bomb on
board and asked to be flown to Sochi (Russia). He was led to believe that
the flight diverted to Sochi. However, the aircraft was escorted by two
Turkish F-16 fighter jets and landed safely, with no injuries or fatalities,
at Istanbul Airport. After 10 days, on 17 February 2014, another flight
(Ethiopian Airlines flight 702 en route to Rome) was hijacked by the co-
pilot. The aircraft and its passengers landed safely at the Geneva Airport
escorted by the Italian and French air force.
Therefore, ICAO’s member states, well aware of the changed conditions
of risks that may condition air transport and the security of air navigation
decided, at the close of the 37th ICAO General Assembly, held in Montreal
between 28 September and 8 October 2010, to adopt the ‘Declaration on
Aviation Security’. The Declaration, recognizing the continuing threat to
civil aviation, stresses the need to foster international cooperation among
the states throughout the enhancement of information collection and
sharing systems, including the sharing of sensitive threat information,
among member states and between concerned entities within states. The
Declaration serves this purpose by emphasizing the collective responsibil-
ity for taking appropriate action to address a worldwide problem. In add
ition, for the sake of completeness, it is also worth mentioning that on 10
September 2010, just two weeks before the ICAO 37th General Assembly,
the international community adopted two new additional instruments for
an ampler and more efficient fight against the commission of unlawful
acts against and by means of civil aviation. The Beijing Convention and
the Beijing Protocol, as of today not yet in force, extend the number of
acts criminalized and the judicial competence of states. The provisions
in the Convention regulate unlawful behaviour, while the Protocol rules
on cases of unlawful seizure of aircraft. It must be noted, finally, that the
signing of these two new instruments necessarily entails the adaptation of
their national law with the identification of the new crimes and relative
sanctions for signatory states (Abeyratne, 2011, p. 243).
On 22 March and 28 June 2016, just a few years after the Declaration,
a new cornerstone in establishing an effective and pro-active international
legal framework on Aviation Security, two bombing-terminal and suicide
attacks were conducted at two of the most important airports in Europe,
the International Airport of Brussels and the Ataturk International
Airport in Istanbul.1 These two attacks claimed the lives of 77 people,
among terminal employees, passengers, well-wishers and visitors. These
events coupled with the in-flight disintegration of Metrojet flight 9268
3
THE EU INITIAL RESPONSE TO THE 11
SEPTEMBER EVENTS.
After the tragic attacks of 11 September 2001, the EU also understood the
importance and the need to adopt a uniform system of Regulations for the
prevention of unlawful acts in civil aviation. Before this date, in fact, each
member state was individually responsible for security legislation relating
to air transport.
On 10 October 2001, a month after the tragic events of New York and
Washington, the Commission, on initiative of the European Parliament,
4
THE NEED FOR A STRINGENT SET OF AVSEC
REGULATIONS IN THE EU
January 2008. This was followed by the Council’s decision at third reading
on 4 March 2008 and of the European Parliament on 11 March 2008.
Regulation (EC) No. 300/2008 achieved its full effectiveness from 29
April 2010, with the exception of Article 4 (procedure for the common
basic standards not foreseen at the entry into force of the Regulation
and the amendment of non-essential elements of the common basic
standards), Paragraphs 2, 3 and 4, Article 8 (cooperation with the ICAO),
Article 11 (procedure for the modification of national quality control pro-
grammes), Paragraph 2, Article 15 (Commission inspections), Paragraph
1, second subparagraph, Article 17 (Stakeholders’ Advisory Group),
Article 19 (Committee procedure), and Article 22 (Commission report on
financing), which were implemented with effect from the publication of
the Regulation.
In general terms, while Regulation (EC) No. 300/2008 restricts itself
to determining only general rules to which all interventions aiming at
preventing unlawful acts are subject, without specifying the technical and
procedural details related to their practical execution, leaving technical and
procedural methods to implementation measures, it nonetheless corrected
a few operational problems which had arisen in the application of the
preceding regulation. Thus, Regulation (EC) No. 300/2008 takes account
of and provides for the need to ensure greater flexibility in the adoption of
security measures and procedures so as to take into consideration changes
in the assessment of risks and enable the introduction of new technologies
in a timely fashion.
In other words, the declared aim of the Regulation is to clarify, simplify
and further harmonize legislative provisions to reinforce civil aviation
security as a whole.
What Regulation (EC) No. 300/2008 does, as for that matter Regulation
(EC) No. 2320/2002 did, is to provide, in the Annex referred to by Article
4(1) or its subsequent amendments, the basic common rules for the protec-
tion of civil aviation from acts of unlawful interference that endanger its
safety. However, it leaves to the Commission the task of establishing both
the means of incorporating and applying common rules and the criteria
that allow member states to derogate from those rules and adopt alternative
security measures to ensure an adequate level of protection on the basis of
local risk assessment, which it may do by modifying the Regulation with a
decision adopted according to the regulatory procedure under Article 5 of
the Council Decision 1999/468/EC of 28 June 1999.
In this regard, the Commission, under Article 4(4) of Regulation (EC)
No. 300/2008, may lay down, by a decision adopted according to the pro-
cedure under Article 19(3), the criteria allowing member states to derogate
from common basic standards and adopt alternative security measures
with the ICAO and the European Civil Aviation Conference (ECAC), the
possibility of developing a mechanism to evaluate the meeting of security
requirements of flights coming from third-country airports.
The new Regulation introduces a procedure where each member state
must notify the Commission of the measures prescribed by a third country
whenever they differ from the common basic rules with regard to flights
departing from an airport in a member state to, or over, said third country.
The Commission, subsequently, must ‘draw up an appropriate response to
the third country concerned’. The Commission’s involvement is not neces-
sary when the member states have adopted more stringent measures than
the common basic standards, or the requirement of the third country is
limited to a given flight on a specific date. The Commission, moreover, has
the power to conclude agreements recognizing that the security standards
applied in a third country are equivalent to Community standards in order
to advance the goal of ‘one-stop security’ for passengers, luggage and
cargo on all flights in transit at EU airports.
Other provisions in Regulation (EC) No. 300/2008 are just as interest-
ing. As well as the national programme for civil aviation safety, a rule on
national programmes for quality control is also provided for (Article 11),
the aim of which is to enable member states to check the level of security
of civil aviation and identify and swiftly correct any deficiencies. In the
context of national quality control programmes, all airports, operators and
entities responsible for the implementation of aviation security standards
that are located in the territory of the member state concerned are to be
regularly monitored.
A specific airport security programme (Article 12) and an air carrier
security programme (Article 13) are introduced, setting out the methods
and procedures that are to be followed by the airport operator and the air
carrier in order to comply with security requirements.
Article 14 of Regulation (EC) No. 300/2008 makes it an obligation for
any other entity required to apply aviation security standards to draw up,
apply and keep an updated security programme.
In reference to the Commission’s powers of inspection, there are no
particular innovations to be recorded in Regulation (EC) No. 300/2008.
According to the new legal approach chosen by the legislature, the modal
ities for the carrying out of the Commission’s inspections should have been
adopted afterwards according to the regulatory procedure under Article
19(2).
This was the case with Commission Regulation (EU) No. 72/2010,
under which the inspections verifying the application of Regulation (EC)
No. 300/2008 must be conducted in a transparent, effective, harmonized
and consistent manner, in cooperation with the competent authorities
5
INTERNATIONAL AND EU REGULATIONS ON
PASSENGER NAME RECORDS
the use of PNRs was conceived to allow air carriers to exchange informa-
tion on personal data acquired upon booking from those passengers
who might have had to use flights from different airlines to reach their
final destination) contain much information on the individual passenger,
including name, address and email, phone numbers, terms of payment,
booking dates, seat number and information on previous non-appearances
at boarding. Such data is collected by air carriers (and in some cases by
tour operators and travel agencies) and is mainly used for commercial aims
and purposes. But these are not the only use the data is put to. Since the
1950s, this information has been used by customs offices in various states
as an instrument in the fight against terrorism and organized crime, and
consequently for purposes of security and safeguard of national interests.
PNRs are, thus, a group of data that enables the tracing of each pas-
senger for commercial uses. However, the handling of PNRs, especially
for security reasons (after the 9/11 attacks many states started to require
transmission of this information from carriers) has impinged on the users-
passengers’ right to privacy. For this reason, it is essential that processing
of this data be carried out in ways and forms ensuring the respect of
the fundamental rights of persons. This data is not to be confused with
Advance Passenger Information (API), obtained by optically reading
passports. API data is also distinguishable from PNR data for the purposes
of its collection and use. The former is, in fact, mainly used as an identity
control tool, in the monitoring of and processing of access to frontiers.
The latter is used for the prevention of terrorist acts and other serious
crimes. Because of the great number of elements present in the latter, the
use it may be put to varies according to necessity. PNR may thus be used
both for investigations and in criminal proceedings (reactively), and the
prevention of crimes (by its use in real time), and for the study and analysis
of trends, to create general movement and behaviour models of subjects
(from a pro-active point of view).
On an international perspective, the issue of the collection of PNR
data by member states has been raised for the first time during the twelfth
session of the Facilitation Division ICAO, held in Cairo between 22 March
and 1 April 2004, with the adoption of recommendation B/5, by which
it invited the same ICAO to develop guidelines addressed to contracting
states who had decided to use PNR data as an additional identification
instrument to the data API (Mendes de Leon, 2006, p. 320 and Pauvert,
2005, p. 81).
The Recommendation B/54 was followed by the adoption of the
Recommended Practice 3:48 by the ICAO Council, which was inserted
in Annex 9 (Facilitation). The Recommended Practice states that:
‘[c]ontracting States requiring Passenger Name Record (PNR) access
should conform their data requirements and their handling of such data to
guidelines developed by ICAO’.
At this regulatory intervention, ICAO, a year later, has responded by
launching, in its corollary, the guidelines for the adoption of uniform
measures for transmission and conservation by the member of such data
(Circular 309). Finally, some years later, following a recommendation
of the Facilitation Panel (FALP) in 2008, the ICAO issued, during a
FALP meeting held between 10 and 14 May 2010 in Paris, the Doc. 9944
(Guidelines on Passenger Name Record Date) with the specific purpose of
updating the guidelines contained in Circular 309, setting more stringent
criteria to be followed by contracting states in the creation of transmission,
storage and data protection systems of PNR. The new paragraphs state
that:
Contracting States requiring PNR data should consider the data privacy impact
of PNR data collection and electronic transfer, within their own national
systems and also in other States. Where necessary, Contracting States requiring
PNR data and those States restricting such data exchange should engage in
early cooperation to align legal requirements.
Article 16 and Article 87 TFEU. In fact, the latter Agreement, like all other
agreements of the same kind signed by the EU with third countries, pur-
sues two inseparable objectives, with equal importance: the fight against
terrorism and serious cross-border crimes, which is covered by Article 87
TFEU, and, secondly, the protection of personal data, which is covered by
Article 16 TFEU.
In addition, on the 14 July 2015 the negotiations for the conclusion of
an agreement with Mexico were initiated. Besides, even in the absence of
such international agreements, other countries (Russia, Mexico, United
Arab Emirates, South Korea, Brazil, Japan and Saudi Arabia), have begun
to ask the EU to transfer PNR data.
At EU level, a common approach was lacking, at least until the approval
of Directive 2016/681/EU, to be transposed by member states by 25 May
2018.
This Directive, whose legal bases are Articles 82 para. 1 letter d, 87
para. 2 letter a, and 16 TFEU, has two main objectives: on the one hand
to guarantee the security, protect the lives and safety of people, and on
the other to create a regulatory framework to protect other fundamental
rights of the person that are relevant in case personal data are collected
and processed by a public authority.
CONCLUSIONS
NOTES
REFERENCES
Abeyratne, R., ‘The Events of 11 September 2001 – ICAO’s Responses to the Security
and Insurance Crises’, Air and Space Law, Vol. XXVII, No. 6, 2002, pp. 406 et seq.
Abeyratne, R., ‘The NW 253 Flight and the Global Framework of Aviation
Security’, Air and Space Law, Vol. XXXV, No. 2, 2010, pp. 167 et seq.
Abeyratne, R., ‘The Beijing Convention of 2010: An Important Milestone in the
Annals of Aviation Security’, Air and Space Law, Vol. XXXVI, No. 3, 2011,
pp. 243 et seq.
Abeyratne, R., ‘Air Cargo Security: The Need for Sustainability and Innovation’, Air
and Space Law, Vol. XXXVIII, No. 1, 2013, pp. 21 et seq.
INTRODUCTION
63
The defense of U.S. airspace on 9/11 was not conducted in accordance with
pre-existing training and protocols. It was improvised by civilians who had
never handled a hijacked aircraft that attempted to disappear and by a military
unprepared for the transformation of commercial aircraft into weapons of mass
destruction. (Kean and Hamilton, 2004, p. 31)
We can categorize the areas where the private sector combines with the
government function of protecting the populace, into: screening technolo-
gies and personnel, access control (including perimeter security) and iden-
tity management technologies and personnel, airport law enforcement and
security personnel, intelligence and interdiction, aircraft operator security
technologies, and non-profit and trade associations.
This chapter begins with an overall discussion of the evolution of screen-
ing technologies, personnel and processes, pre and post 9/11, along with a
comparison of US practices to international standard practices. This leads
to a discussion of privatized versus government employed screening per-
sonnel and finishes with an analysis of the various screening technologies
currently in use. Next, the chapter addresses the areas of employee access
Under ICAO Annex 17, each Contracting State shall ensure that the
persons carrying out screening operations are certified according to the
requirements of the national civil aviation security program to ensure that
performance standards are consistently and reliably achieved (ICAO, 2011,
p. 4-1), and that originating passengers of commercial air transport opera-
tions and their cabin baggage are screened prior to boarding an aircraft
departing from a security restricted area (ICAO, 2011, p. 4-2).
The Aviation and Transportation Security Act of 2001 (ATSA), cre-
ated the US TSA and handed over the screening functions to the newly
formed agency. Within a year, the TSA had hired (through a private
contractor, which incidentally, also conducts much of the training for
the TSA personnel), over 45,000 new government employees to take over
long after these decisions had been made, TSA already been formed, and
federal employees were staffing screening checkpoints.
For a private contractor to provide a service typically associated with
being provided by government, there must be strict regulatory controls in
place if it is to be successful. After 9/11 many of the screening contractor
companies pointed to FAA policies and enforcement practices, rather
than their own shortcomings, for lackadaisical checkpoint security. The
Argenbright Company, which held many of the screening contracts in
the US, also held numerous private screening contracts at several airports
in Europe. Because of the higher government standards in Europe at the
time, Argenbright personnel in the UK were highly trained, in not just
screening but also the security questioning process, and were held to very
rigid standards that they often met. In the US, weaker laws mandated the
standard of performance and policies, so personnel were held to a much
lower training and performance standard. Often, it was less costly for the
airlines to pay fines for the periodic failures of their contracted screeners
to detect FAA test items, than it was to allocate more money into technol
ogies and personnel (Trento and Trento, 2006, p. 107).
In 2001, the US Government Accountability Office (GAO) examined
security screening at five international airports known for having good
screening practices, including airports in Belgium, Canada, France, the
Netherlands, and the United Kingdom. The GAO found that responsibil-
ity for screening in these countries is placed with the airport authority or
their respective federal government, which then contracts out the screening
function. Both Ben Gurion International Airport in Israel and London
Heathrow International Airport are operated by airport authorities that
contract out key elements of the screening process (supplemented in other
areas by police and government personnel). In the case of Heathrow, the
entire operation of the airport is managed by an external contracting
service (GAO, 2001, p. 2).
Despite significant evidence demonstrating that privatized security
screening can be effective if properly managed and held to high regulatory
standards, there was little public sentiment after 9/11 to allow any form of
screening that resembled the pre-9/11 privatized model (Price and Forrest,
2013, p. 148). After the passage of the ATSA, federal workers replaced
the privatized screeners throughout the nations’ 450 commercial service
airports, swelling the ranks of screeners from 12,000 to over 40,000 in
one year. The TSA’s screening function is unusual in that the government
agency acts as both the operator and regulator of the same function, and
the results have not been without challenge.
In the years following 9/11, the GAO issued several reports on screening
effectiveness and ineffectiveness, and in 2015 a scathing report drafted by
The airports that retained private contractors for screeners after 9/11 did
so under new rules. Rather than screeners contracted by the airlines and
held to risible government standards, the new private screening companies
would have to certify under TSA’s much more stringent requirements, and
be contracted and directly supervised by the TSA. Another significant
change to the post-9/11 privatized screening model is that while airports
are still required by regulation, under Title 49 CFR Part 1544, to ensure
that personnel, baggage and cargo not be allowed on to their airplane
unless first undergoing the screening process, the entity that can request
private contractors must be the airport operator. As far back as the begin-
ning of screening in the US, airport operators have never been directly
responsible for the screening process, even though this is a commonly
accepted practice throughout the world.
The five initial airports each represented a particular category of airport,
from the largest airports known as Category X,4 to the smallest known as
Category IV. The five airports5 were: San Francisco International (Cat X),
Kansas City International (Cat I), Greater Rochester International (Cat
II), Tupelo Regional, Mississippi (Cat III) and Jackson Hole, Wyoming
(Cat IV). In the case of Jackson Hole, workers employed directly by the
airport operator perform screening. In all other cases, private contractors
provide screening, with TSA supervisors and managers left in place to
monitor contract compliance and performance.
Before 9/11, employees of contracting screening companies were paid
poorly and met minimal qualifications, as companies sought to maximize
profit from their airline contracts. However, with the post 9/11 higher
standards in the areas of hiring training, and performance standards
the private sector companies have been more successful at obtaining
and retaining better qualified personnel. After the first five years of the
pilot program, some of the private screening companies were reporting
workers’ compensation rates of lower than 5 percent, as compared to the
20 percent or more workers’ compensation rates of the federal workforce.
In some cases, airport operators with private personnel experienced fewer
security breaches, fewer customer service complaints, and, depending on
the airport, faster screening lines and were able to provide the same level
of service with 20 percent less personnel than similar federally staffed
facilities. Contributing to the lower costs was that the private companies
made effective use of part-time personnel, whereas the federal workforce
was not set up to use such an advantage. The federal government has
recently allowed part-time personnel and taken other lessons from the
private contractors in an attempt to improve their own screening processes
(Price and Forrest, 2013, p. 303), but hiring and training a new federal
employee still takes several months, compared to the few weeks it can take
a private sector company to onboard personnel that are just as qualified.
Beginning in November 2004, additional airports could elect to opt out
of the federal screening program and apply for the Screening Partnership
Program (SPP). Airports must file an application to become part of the
SPP, while TSA holds the final authority both for approval of the SPP
application and contractor selection. As of 2018 over 26 airports have
elected to become part of the SPP. One airport in Montana did switch to
the SPP, but then requested to opt back in to using TSA personnel.
The SPP hit a roadblock in 2011 when TSA leadership at the time
decided that the agency would reject any further airport opt-out applica-
tions unless the airport could prove that the private screeners could provide
a security advantage over TSA personnel. This virtually impossible task
was TSAs effort to stop the migration of airports to private sector person-
nel. However, the US Congress, overall a long-time supporter of opt-out,
reversed the order burden of proof forcing the TSA to approve opt-out
applications unless they could prove that the private screeners would
provide a lesser level of security than TSA – again, a nearly impossible task
(Price and Forrest, 2013, p. 302). This chess match between the TSA and
Congress ended with Congress’ final move, which checkmated TSA, and
forced the agency to again accept SPP applications.
After being compelled to once again process SPP applications, TSA then
tried to stonewall the program on economic grounds, and explained that
privatized screening costs more money than their federal employee staffed
checkpoints. However, when a private contractor takes over, TSA leaves
a large workforce of their own in place to oversee the private screeners,
thereby creating a substantial amount of duplication of TSA supervisors
and managers, and the supervisors and managers employed by the private
company. The SPP application process is still slow, however, and newly
approved contractors are required to first offer openings to TSA personnel
already in place at the airport.
The TSA’s own studies on the SPP found that screening at SPP airports
costs approximately 17.4 percent more to operate than at airports with
federal screeners, and that SPP airports fell within the ‘average performer’
category for the performance measures included in its analysis.6 Other
studies have put the costs at 9 to 17 percent higher than at non-SPP
Less controversial than the question of who operates the screening check-
point, is the use of private security contractors and technologies developed
by private companies in the areas of airport access control, identity
management (i.e. credentialing), and perimeter security. If the screening
checkpoint can be considered the front door to aviation security, employee
access portals and the perimeter fence can be considered the back door.
ICAO Annex 17 calls for 100 percent screening of all persons, other than
passengers, accessing the security areas of an airport (ICAO, 2011, p. 4-1).
However, ICAO stops short of making this mandatory and notes that
where 100 percent screening is not being utilized, other security controls,
in accordance with a risk assessment carried out by the national authorities
responsible for aviation security, should be applied.
In the US and throughout many other countries, many airport workers
are not subjected to the same type of screening that is applied to passengers,
but instead undergo background checks, are issued airport identification
badges, and must use access-controlled doors and gates to enter airport
security areas. While some airports will stop at the background check and
the access control system as a method of other security controls, many
airports have implemented various forms of employee inspections, which
are often carried out by private contractor security personnel.
ICAO calls for airport operators to have in place an access control
system to grant pedestrian and vehicle access to the security areas of an
airfield. At airports throughout the world Physical Access Control Systems
(PACS) have been in place for several decades. PACS can range from simple
locks on a door or perimeter gate accessible with the proper key or keypad
code, to highly advanced computerized systems tied in to closed-circuit
television monitors and alarmed access points, throughout the airport.
When an unauthorized individual attempts to access a secured location,
the alarm can sound audibly at the location, and notification is made to
a security operations control center. Privately contracted personnel are
involved with airport access control systems in three primary areas, the
computerized system itself, private contractor security personnel used for
the monitoring and/or response to security alarms, and the airport badging
and credentialing software systems. Perimeter security also typically falls
within the purview of airport access control.
Most airports have an access control system that is proprietary to a
private company, which has developed the hardware, and sometimes the
software use to manage employee access. In the US, standards for access
control are published by the Radio Technical Commission on Aeronautics,
1. Credentialing
2. Biometrics
3. Physical Access Control Systems (PACS)
4. Perimeter Intrusion Detection Systems (PIDS)
5. Video Surveillance Systems
6. Security Operations Center (SOC)
7. Integration
8. Communications Infrastructure
9. Acquisition-Related Considerations
In each case noted above, private sector technologies are being utilized to
fulfill the listed functions.
Credentialing: ICAO Annex 17 requires that each Contracting State
ensure that background checks are conducted on persons other than
passengers (e.g. airport workers, contractors, vendors, tenants, airlines)
who are granted unescorted access to security restricted areas of the
airport (ICAO, 2011, p. 4-1). However, the method and thoroughness of
background checks are implemented in a variety of ways throughout the
world. In 1996, prior to the passage of the Aviation Security and Anti-
terrorism Act in the US, airport and aircraft operators were left largely to
their own devices when conducting background checks. Even a local check
of wants and warrants was not required, so it was possible for not only
convicted felons, but also those wanted for a crime, to secure a job at an
airport. The passage of the act required airport operators to implement an
access investigation process, whereby all personnel applying for an airport
access badge must first complete documentation that outlines their work
or school history for the past 10 years; the most recent five years of listed
employment were verified prior to issuance of the badge. If there were no
significant gaps in employment (defined as a gap of more than 30 days),
then the individual was eligible for an airport or airline identification
badge, which provided them access to certain security areas on an airport
and in many cases, to aircraft. However, a basic check to see if the indi-
vidual presently had a warrant out for their arrest was still not required.
If there were gaps of more than 30 days that could not be accounted for,
it triggered a fingerprint-based criminal history record check. Fingerprints
were taken by the airport or airline operator and sent to the FBI. The
process could take up to three months before the results of the check were
returned. It was estimated only 3 percent of the badged US airport worker
workforce had ever undergone the fingerprint check.
After 9/11, ATSA required that all airport workers undergo the fingerprint
check; however, the government clearly did not have the bandwidth to handle
the tens of thousands of background checks that can occur on a daily basis.
Again, it was the private sector, in this case an industry trade association,
that helped resolve the problem. The American Association of Airport
Executives (AAAE) established the Transportation Security Clearinghouse
(TSC), which provided a pass-through and a quality check for airport and air
carrier operators conducting the fingerprint check, to the FBI and eventu-
ally, when the Security Threat Assessment process was added, the TSA.
For years, the TSC vetted fingerprints and badge applications, assisted
airport operators with fingerprints that were unreadable, or for individuals
who did not have fingerprints due either to genetics or work history (such
as pavement work, which can rub fingerprints off over time), and accepted
payment to the FBI on behalf of the requesting entity. Today, AAAE still
provides this service but now has other private sector competitors, which
are collectively known as Designated Aviation Channeler (DAC).
Access control systems can prevent access by unauthorized personnel,
only to the extent that the holder of the issued airport identification badge
maintains possession of their badge and does not loan it out to others, and
prevents its loss or theft. ICAO and US regulations requires that an airport
access control system have no more than this single layer of validation in
order to access the security area of an airport. Many airport operators
have voluntarily added a second layer to their access control system in the
form of a Personal Identification Number (PIN), so that accessing a door
or gate requires both a badge and the entry of the PIN. But if someone
knows that PIN number of an airport worker, and has their airport identi-
fication badge, they can still gain access. This system also does not prevent
the loaning of the badge to a third party.
A few airport operators, who desire the highest level of access control,
have added biometrics to their access control systems. Biometrics require a
baseline measurement of an individual’s data points, using their face, fin-
gerprint, eye, voice, hand or other distinct component. An access control
system that uses biometrics often requires first that the airport identifica-
tion badge be presented to the access control reader along with a PIN,
which lets the system know whose biometrics are about to be presented.
The individual then presents their hand, finger etc., depending on the bio-
metric in use, which is then compared to their biometric data on file with
the airport credentialing office. While not impossible to defeat, biometrics
greatly reduces the chances of an individual loaning their badge, or of a
badge being used by someone other than the badge holder. The rise in the
use of biometrics in the aviation security industry can also be traced to the
private sector, specifically the casino industry.
With the exception of some early adopters, such as San Francisco
International Airport, which has had a hand scan biometric system since
1993, biometrics were in widespread use at casinos (mostly passive facial
recognition), long before their use spread to the airport industry. Casino
operators are concerned with individuals that may attempt to cheat the
system or gain an advantage over the casino, such as blackjack players
that use a card counting strategy, but are also interested in providing a
higher level of customer service to their big players. A player who feels
they are treated better will stay at the casino longer, and casino owners
know that the longer they play, the more the casino earns. Biometrics at
the hotel check-in or throughout the casino can allow operators to spot
card cheats, card counters and identify high value customers (Powell et
al., 2003).
In the early days of airport access control systems, the airport ID
badge was primarily understood to be ‘the badging process’. With the
addition of background checks, that includes criminal history, intelligence
checks through various databases and wants and warrants checks, along
with government credentialing standards, the process morphed into ‘the
credentialing process’. Today, technologies have created efficiencies not
previously available, allowing the industry to move to the concept of
‘identity management’.
Identity management is an integrated credentialing process that reduces
the redundancies of having to conduct data entry on an individual multiple
times. Once an individual’s personal information is entered into a database,
various other approved entities can access the database in order to take
actions, such as approving the issuance of an airport identification badge,
approving a change to the individual’s access authority, or approving
access to another area, such as the customs area of an airport. Many
Airports are required under both safety and security regulations to pre-
vent access of unauthorized personnel onto the airfield. Most often this
requirement is fulfilled by using a perimeter fence averaging 7–9 feet in
height, with some form of barbed wire over the top. Airports with higher
levels of intrusions, or at higher risk, may have additional delaying fences,
and in some cases, PIDS, but these are not required by US federal law.
Airport breaches onto the airfield are actually fairly common – the
vast majority are either innocent mistakes, or intentional access either to
attempt to chase down an aircraft that is departing without them, or to
take a shortcut from one area to another without having to walk around
or drive around the airport. Also, there have been numerous instances of
drunk drivers following an authorized vehicle through a perimeter gate, or
in some extreme cases, driving through a perimeter gate and on to the air-
field. In one notable incident at the John F. Kennedy Airport in New York,
an individual who was jet skiing in the waters off the coast of the airport
ran out of fuel, at night. He swam to the shore of the airport, climbed the
security fence, which did include a PIDS in place (a motion sensor system,
which may have failed to activate or the alarm was ignored), and made
his way all the way to an aircraft before encountering an airline employee.
Another notable incident occurred at the San Jose Airport in California
when an individual jumped the airport perimeter fence and accessed a
commercial flight, stowing away in the wheel well, and somehow survived
the journey all the way to Hawaii where he was discovered.
However, with few exceptions there have not been many attacks on
aviation by individuals coming through the perimeter locations, which has
resulted in the low-level of acceptance of PIDS in the industry. The private
sector offers a variety of PIDS, including virtual fences, fence mounted
sensor systems, video surveillance systems (both in the visual spectrum and
infrared) and even mobile detection systems using unmanned ground and
air vehicles (e.g. drones). The private sector already has the technology
and solutions should Contracting States or ICAO require the inclusion of
PIDS at airports.
ICAO calls for the patrol by security guards and/or police of the entire
airport and its surroundings, and to be available to respond to incidents
of unlawful interference with aircraft or airport operations. In many cases,
One of the best defenses against unlawful acts of interference with civil
aviation is the ability to detect and stop an attack, long before it gets to the
CONCLUSIONS
The private sector has long played an important role in securing aviation.
The international model for screening is characterized by the use of private
sector personnel providing front-line screening and security functions
supported by government employed police personnel for those times when
armed intervention is necessary. The use of private sector personnel is cost
effective for the airport and aircraft operators, but their use in the US was
called into question after September 11, 2001. While the 9/11 Commission
did not point to screening as a security failure that resulted in the attacks,
it did point to significant shortcomings in their overall performance.
However, in an industry with tight profit margins (i.e. aircraft operators)
or when public funds are involved (airport operators in certain circum-
stances) performance will meet, but not exceed, regulatory requirements.
The requirements for private contracts in the US pre-9/11 were well below
the levels required in many European countries.
While the US TSA and US law allow for privatized screeners both public
sentiment and reluctance on the behalf of airport operators, along with a
lengthy and difficult approval process through TSA, has resulted in very
slow growth of private sector screening providers.
NOTES
1. It was later established by the US National Transportation Safety Board that TWA 800
was an aircraft accident.
2. The FAA did not expressly prohibit knives with blades under four inches, as the agency
did not consider knives to be menacing, most local laws allowed carriage of such knives,
and many knives would have been difficult to detect unless the sensitivity of the metal
detecting technologies in use at the time was greatly increased – which would also have
had the effect of slowing down the screening lines (Kean and Hamilton, 2004, p. 84).
3. The security system is not set up to detect fake weapons or bombs, particularly if they are
innocuous items that are later constructed, post checkpoint, to resemble an explosive device.
4. Categories related to the number of annual passenger boardings, known as enplanements.
5. Category notations are at the time of the 2001 ATSA passage.
6. Notably, TSA does not report the performance of the checkpoints staffed by TSA per-
sonnel, so it is difficult to determine if ‘average performer’ is above or below TSA-staffed
checkpoints.
REFERENCES
FBI (n.d.). ‘16 Critical Infrastructures’. Retrieved May 2, 2016, from https://www.
infragard.org/.
GAO (2001). ‘Aviation Security: Terrorist Acts Demonstrate Urgent Need to
Improve Security at the Nation’s Airports’. US General Accounting Office 2001:
No. GAO-01-1162T.
Gore, A. (1997). White House Commission on Aviation Safety and Security, Final
Report to President Clinton. Retrieved from www.fas.org/irp/threat/212fin~1.
html.
ICAO (2011). International Civil Aviation Organization: Annex 17 (9th edn).
Montreal: ICAO.
Kean, T.H. and L. Hamilton (2004). The 9/11 Commission Report. Washington,
DC: National Commission on Terrorist Attacks upon the United States.
McCartney, S. (2016, April 28). ‘The Air-traffic System US Airlines Wish They
Had’. The Wall Street Journal, pp. D1–D2.
PARAS Program/Safe Skies (n.d.). Retrieved May 2, 2016, from https://www.
sskies.org/paras/.
Powell, G.L., L.A. Tyska and L.J. Fennelly (2003). Casino Surveillance and Security:
150 Things You Should Know. Alexandria, VA: ASIS International.
Price, J.C. and J.S. Forrest (2013). Practical Aviation Security: Predicting and
Preventing Future Threats (2nd edn). Waltham, MA: Butterworth-Heinemann.
RTCA (2015). Standards for Airport Security Access Control Systems (Rep. No.
RTCA DO-230F). Washington DC: RTCA.
RTCA (2016). Online Store. Retrieved May 1, 2016, from http://www.rtca.org/
store_product.asp?prodid=1129.
Sylves, R.T. (2015). Disaster Policy and Politics: Emergency Management and
Homeland Security (2nd edn). Washington, DC: CQ Press.
Trento, S.B. and J.J. Trento (2006). Unsafe at Any Altitude: Failed Terrorism
Investigations, Scapegoating 9/11, and the Shocking Truth about Aviation Security
Today. Hanover, NH: Steerforth Press.
INTRODUCTION
The world has changed dramatically in the past 25 years, with the need for
increased security an ever-present factor. Although the air cargo industry
(the ‘Industry’) continues to grow and remains a robust and integral ele-
ment of global commerce, changes in security requirements have imposed
a high cost along the way. It is nearly impossible to calculate the millions
of dollars the Industry has spent, especially in the past 10 years, as a result
of continually increasing security measures required by regulators at the
global, regional, or national level. The current threat environment dictates
the need for secure measures, and through these the Industry can protect
its brands, assets and people, and of course the flying public. As such,
Industry must continually strive for measures that find a balance between
good business practices and providing realistic results, while protecting the
high value of global commerce traveling the air cargo supply chain.
Air cargo has played an essential role in regional commerce since the earli-
est days of aviation. With the advent of the jet age, volumes have grown
dramatically, and while never approaching the volume of surface transport
(land or ocean), air cargo has played an increasingly important role in the
global supply chain.
Air cargo transports virtually all commodities, with the exception of bulk
products. The highest value goods make up the vast majority of shipments.
These include products such as: high-technology items, p harmaceuticals,
85
perishable food products, oil and gas equipment, automotive and machine
parts, emergency supplies and artwork, as well as animals and athletic
equipment. Historically, mail (letters/documents as well as parcels and
packages) was a base commodity, with the latter increasing as the former
decreases. This is in large part due to the rapid increase in individual ship-
ments moving in the ‘e-commerce’ area. In remote areas, more mundane
products such as household goods and supplies now rely on air cargo.
Most people have personal electronic devices that were built using a global
supply chain linked by air. Amazon, Alibaba, eBay and other e-commerce
websites rely on the express delivery services made possible by aviation to get
those devices, and so much more, to their customers. Almost 340 billion letters
and 6.7 billion postal parcels are sent every year, and air transport plays an
essential role in their delivery.2
Security of air cargo has always been a factor within the Industry, given
the historic value of cargo shipped and the relatively open environment in
which it was transported. As evidenced by the theft of a major shipment
of cash and jewelry from the Lufthansa cargo terminal at New York City’s
Lufthansa facility in 1978, the relatively simple security measures then
in place were easily circumvented by insider knowledge. This event was
related to security of the product itself, not a threat to aviation. Special
protections and limitations of the transport of certain dangerous goods
were in the domain of the various civil aviation authorities. Considering
the current state of global security, it is hard to imagine an individual
being able to walk up to a passenger airline cargo counter and tender a
shipment, paying by cash, check or credit card, and showing identification
only primarily as a means to validate the payment. This was fairly common
throughout much of the world even into the 1990s.
In 1988, Pan Am flight 103 en route from London to Detroit was
destroyed over Lockerbie Scotland by the detonation of a bomb secreted
in luggage, timed for detonation once the aircraft was in flight. In the after-
math, aviation security from a regulatory perspective increased, but was still
primarily centered on passengers and passenger aircraft, and understand-
ably so. This targeted focus resulted in stronger security measures for air-
ports and airlines, but as these changes were largely confined to the airport
environment, the full air cargo supply chain was not significantly affected.
Industry recognized the need for enhanced measures to protect cargo,
especially with the increased volumes of high value products moving glob-
ally in support of the technology boom. As a result, new security processes
were developed and introduced with partners in the ground handling, cart-
age and forwarding sectors, but there was no great degree of commonality.
Companies across the board also began conducting background checks
on certain personnel, especially on employees with physical access to the
While it is the responsibility of any individual state to secure its air cargo
supply chain, it is also important for Industry that any regulations having
SARPs are not used directly to regulate any country, but are the common
structure to which any country will adhere if they engage in global air com-
merce, helping to secure the ‘more than 100,000 daily flights in aviation’s
global network to operate safely and reliably in every region of the world’.4
All member states utilize these SARPs, either implementing them as
written as their own baseline security measures, or framing their own,
often more extensive security programs from this foundation. The SARPs
latter are referred to as Indirect Air Carriers (IACs) in the US, rather than
Regulated Agents. Since many freight forwarders engage in ocean freight
or other logistics services, only some of them fall under the scope of the
IAC SSPs. More recently, shippers have been added under a voluntary, but
still fully regulated program.
Most of the regulations implemented have been very prescriptive,
with specific actions and procedures carefully spelled out. More recently,
some states have attempted to move toward more of an ‘outcome based’
approach, working with Industry to set specific security objectives, and
then allowing companies to develop their own measures through which
to attain the desired result. While generally welcomed by Industry, this
approach remains a challenge, as it leaves security measures and their
effectiveness open to interpretation by inspectors.
quickly apparent that the desires and goals of legislators and regulators
were not readily transferrable to the operational and practical reality of
the air cargo industry. Convincing regulators that baggage and cargo were
more dissimilar than similar was not an easy task. Although Industry fully
understood the reasons and underlying need behind the new regulations,
implementation was not easy.
As a result of these challenges, some states began to expand their
regulatory authority to enable screening cargo further ‘upstream’ from the
airlines or airport. Forwarders and Regulated Agents, based on additional
measures put in place, on a strictly voluntary basis, have been allowed
to actually screen the cargo prior to its consolidation and tender to the
airline. In even more limited cases, shippers too have become voluntarily
regulated, so that they can screen cargo within the packing and ship-
ping process, thus avoiding damage to products and packaging later on.
However, this is a very limited subset of the shipping community. In the
US, for example, fewer than 1,400 shipper locations are certified for this
capability, out of millions of air cargo shippers. All of this also entailed
additional, more secure methods of transport prior to air transport, and
additional detailed regulations were put in place to cover acceptance and
verification procedures.
The wide variety of programs and procedures, coupled with wide vari-
ations in the approval of screening technology, adds operational as well as
capital cost to Industry. A carrier (or forwarder for that matter) that oper-
ates globally must be compliant with the wide range of security programs
for each country in which they operate, and must train its employees for all
of them. Recent initiatives among some state regulators to more effectively
recognize and harmonize their respective programs have been helpful, but
still remain a challenge.
OPERATIONAL ISSUES
Given the complexities and costs of securing and screening air cargo
globally, the process would still be relatively simple and straightforward
if all shipments were moving strictly from Point A to Point B, with no
intermediate stops. Unfortunately that is far from the norm, especially for
global movement of goods. Even within a seemingly concise geography
such as the US, China or Brazil, where domestic air cargo is widely used,
a typical shipment will make multiple stops, moving via ground transport,
feeder aircraft, and perhaps even through one or more transfer hubs. All of
this is invisible and seamless to the shipper and consignee. This is especially
true in the express mode, but also within the passenger operator environ-
ment. Most of them still use the hub-and-spoke model for efficiencies of
filling passenger seats, so cargo follows the same flow.
Further complications abound in the global arena. A shipment moving
in the passenger model from Durban, South Africa, will be picked up by
a local freight forwarder, may fly on a domestic South African airline,
be transferred to an international carrier at Johannesburg, be flown to
Frankfurt (with perhaps intermediate stops and aircraft transfers), be fur-
ther transferred to a US flag carrier for uplift to Chicago, and then even be
transferred to a regional US carrier for its last leg to Minot, North Dakota.
A shipment moving via a freighter aircraft may be routed similarly. Despite
common perceptions, express shipments may also move via passenger air-
craft in multiple legs prior to being transported in the express carrier’s own
equipment, or even be transferred from the express carrier to a passenger
carrier at some intermediate point, based on capacity issues in its own fleet.
Even with the global standards established by ICAO, it is extremely dif-
ficult for state regulators to understand and accept that the proper security
measures have been uniformly applied throughout the process. How can
they verify the background checks at the origin location? (And that issue
is also sensitive, as many country’s privacy laws actually limit the use of
such checks.) How do they know that the security measures have been
thoroughly applied at each airport transfer point? Even in circumstances
where a single carrier is involved end-to-end, it is difficult to verify that all
is as it should be.
Typically, regulatory authorities at the destination country develop
security programs not only for cargo uplifted within their countries, but
they also have legal jurisdiction to implement security measures for cargo
moving into their state. In the latter case, this authority only extends
from the Last Point of Departure (LPD) inbound, so they must rely on
the practices put in place by other states to a large degree. If they are not
fully comfortable with the process, shipments which have made multiple
stops en route, and built up in large ULDs (upper or lower decks), may be
required to be off-loaded, taken apart, and the pieces individually and fully
screened in accordance with the destination country’s regime at the LPD.
For the carrier who has transported that shipment, this leads to the neces-
sity of following multiple security procedures for the very same shipment:
one at the origin, one at the transfer point, and one in accordance with the
security program of the country of destination. All of this comes at a high
cost in time and labor.
To help mitigate this to the greatest degree possible, many countries have
worked toward mutual recognition agreements. Under these agreements,
regulators from both (or multiple) states will share their respective security
programs, allow initial and ongoing inspections to ensure compliance, and
then formally accept each other’s programs for ‘upstream’ shipments on an
inbound basis. This has proven beneficial for carriers operating through
the major cargo hubs in Europe, North American and other countries,
which account for a large percentage of global air cargo flows, but is still
limited to a great degree.
Following all of the changes to security programs following 9/11,
which were primarily aimed at securing cargo transported on passenger
aircraft, regulators were somewhat taken aback at the apparent ease with
which terrorists were able to exploit security measures for shipments
moving into the express mode from certain origins. Certainly the most
significant disruptive event was the October 2010 computer printer
bombs tendered and transported (via both passenger and all-cargo/
express aircraft). Two separate shipments were tendered by individuals
to UPS and FedEx facilities in Sana’a, Yemen, for movement to the
US. They were essentially the same; boxes with the contents described
as ‘printers and household goods’, a not uncommon description for
personal shipments. However, each printer contained a standard printer
cartridge, packed with high explosives, with a timing triggering device
utilizing mobile phone technology, artfully wired and soldered into the
printers. They were first flown via a passenger plane operated by Yemen
Air to the express operator’s hubs in the Middle East, where they were
transferred to the respective express carriers’ own operations. Both
routed them via their hubs in Europe for ongoing shipment to the US.
X-ray screening used at the initial hubs did not detect any anomaly, as the
tradecraft involved in the creation of these improvised explosive devices
(IEDs) was light years ahead of the common perceptions of even just a
few years earlier. Both shipments were fortunately intercepted only by
the availability of intelligence provided by friendly sources, averting a
potential disaster in the air.
While this led to some initial dramatic responses by regulatory author
ities, Industry also began to see an even greater willingness to collaborate
between regulators and Industry. As this so-called ‘Yemen incident’ was
clearly targeted at the US and two of its airlines (with the plot fully
reported in Al-Qaeda’s online Inspire Magazine), the US took an early lead
in developing a targeted, risk-based program known as Air Cargo Advance
Screening (ACAS). It began the process in early 2011 with a pilot program
involving express, freighter, and passenger carriers, as well as a number of
global freight forwarders. Rather than having a focus simply on the validity
and security of a shipper, this program was designed to analyze the risk for
each individual shipment.
While the US has been undertaking its pilot, the EU as well as Canada
have been pursuing similar programs. The EU, with only minimal actual
testing, has now issued draft regulations, requiring the implementation
of the European version of ACAS, called PREloading Consignment
Information for Secure Entry (PRECISE), by 2020. As the EU has not
established a central targeting center for its program, carriers operating
into the multiple EU countries have to establish numerous data link
systems, adding to the cost and burden. Canada’s version, called Preload
Air Cargo Targeting (PACT) is not yet within the regulation develop-
ment phase. Other countries have expressed interest, but are awaiting
the outcome of further testing among the existing three programs before
proceeding.
For Industry, it is essential that these programs mirror each other to the
greatest degree possible. If they do not, then the potentially different data
elements, mitigation and resolution procedures within each one would
prove to be untenable for the large numbers of shipments that would tran-
sit the multiple advance data regimes. Industry associations and members,
along with the World Customs Organization (WCO) and ICAO, have
thus developed a Joint Working Group on Advance Data Information, to
harmonize these programs under a common platform, called Pre-Loading
Advance Data Information (PLACI). The group has met regularly since
mid-2014, and based on pilot testing in the US as well as the draft regula-
tions in the EU, has identified numerous technical and operational issues
that will need full resolution in order to achieve this goal. Despite the
challenges, for the first time there is a new channel of cooperation between
civil aviation and customs authorities, both at the state level, and also at the
ICAO and WCO level, which is highly encouraging. This chapter remains
open, and Industry as well as regulators hold out hope that this approach
remains a viable one.
much of the world. With this, the profile of shippers has changed even
more dramatically. Small businesses and individuals now rely on this mode,
whether directly or through the various postal organizations. An extremely
high volume of the latter now moves via air, and now also includes
numerous larger shipments in addition to small packages. As a result, the
opportunities for bad actors to utilize this channel to perform a terrorist
act have grown exponentially.
The more regulators know about these shippers, and have the ability to
incorporate the most current Intel in the risk analysis process, the better
Industry can focus its attention on eliminating the risk. To help support
this, Industry needs to move more rapidly to an electronic data environ-
ment, to help facilitate the flow of cargo information for both operational
and regulatory use. All of this must be done in parallel with still paying
close attention to the basics of securing the supply chain elsewhere, and
being mindful of ever-changing threats. Looking at the potential cost, some
passenger carriers have begun to opt out of the cargo arena altogether.
Industry can also be encouraged by the opportunities presented by the
development of new, even more powerful X-ray equipment to allow larger
cargo configurations to be screened effectively and efficiently. But the cost
is as yet unknown, and regulators have not yet approved that level, so it
likely will not be in the near future.
Everyone recognizes that there is no solution, regulatory or otherwise,
risk based or prescriptive, that provides security with 100 percent certainty.
Industry must continue a strong collaborative approach with regulators,
and advocate for globally accepted standards and definitions that will
make operations and training more efficient while attaining the security
desired by all. Only this approach will help in finding solutions that keep
the Industry safe, secure and healthy.
NOTES
Policy applications
INTRODUCTION
105
Although the first attack took place in 1933, that event was regarded as
an isolated incident. Not until 1955 was another American plane attacked.
Seeking to collect his mother’s life insurance a man placed a bomb on a
plane, killing 44 persons. Five years later the first suicide bomber blew up
a plane, again motivated by life insurance considerations. During these
years, airline security did not receive much attention in the US since there
were few incidents and most of them involved criminal acts. And little
changed, though hijackings increased markedly during the 1967–1976
period when people sought to flee from Castro’s regime in Cuba. Only
when the first politically motivated attack took place overseas in 1968,
when three Palestinians hijacked an El Al flight in 1968 to free Palestinian
prisoners, did heightened concerns about aviation security emerge. The
issue assumed much greater importance when Pan Am 103 exploded over
Lockerbie Scotland, in 1988, the worst security disaster in the history of
US civil aviation.6
A Presidential Commission on Aviation Security and Terrorism was
established the following year and the Aviation Security Improvement Act
was enacted in 1990. Although this legislation mandated various reforms,
screening, for example, rose from $600 million in 2001 to $3,300 million in
2003; baggage inspections climbed from zero to $800 million.
Implementing such dramatic changes would obviously not be an easy
matter even with the most careful planning and numerous weaknesses
continued to characterize aviation security, weaknesses that were caused, to
a significant degree, by the absence of an integrated, coherent strategy. As
a result, the new measures were neither systematic nor comprehensive, even
though billions of dollars were spent and the system was marked by various
weaknesses. As late as 2007 these included inadequate intelligence gather-
ing, analysis and distribution, divided and vague responsibilities, ineffective
passenger and baggage screening, inadequately trained flight crews and air
marshals, and inadequate security personnel training standards.9
The system that was put in place suffered from another deficiency – no
thought was given to the possibility that terrorists might innovate. Thus,
the emphasis remained on preventing passengers from carrying weapons of
any sort including scissors or knives or box cutters on board and, though
thousands were seized, subsequent attackers used different tactics which
led to an expansion of what should be checked. The capture of Harry Reid
the ‘shoe bomber’, for example, resulted in a new policy – all passengers
now had to remove their shoes for inspection. And, when terrorists devised
a new method of attack – liquid explosives – another requirement was
added: passengers were forbidden to bring liquids and gels on board.
The most dramatic changes have involved passenger and baggage screen-
ing for, since 2011, every passenger is no longer viewed as an equally
dangerous threat. The new Risk Based Security (RBS) approach attempts
to identify the hazardous passengers. Thus the ‘PreCheck’ program, which
was implemented partly to minimize delays and frustrations, permits pas-
sengers, for a fee, to undergo a background check that entitles those who
are approved to a faster security process. Though helpful, this program
still could not accommodate ever growing numbers of passengers so the
TSA initiated the ‘Managed Inclusion’ Program, which permits randomly
selected passengers who are considered low risk by Screening of Passengers
by Observation Techniques (SPOT) officers and canine teams (PSCs), and
who do not trigger explosive residue detection equipment, to participate
in the PreCheck process. This program was soon abandoned, however, as
evidence mounted that the focus was on speed and not security.10
RBS relies on a multi-layered approach consisting of many separate and
complementary programs that are structured so that if a potential threat
evades one layer, it will be captured by another.11 Its key element, the
passenger and baggage screening process, relies heavily on technology such
as X-ray machines to check the luggage and X-ray scanners and advanced
imaging technology (AIT) to detect concealed items that have eluded the
X-ray machines. These technologies are supplemented by two programs,
mentioned above, teams of dogs trained to detect explosives (PSCs) and
the SPOT.
Using these programs, officers screened, in 2015, almost 2 million pas-
sengers per day with 1.6 billion carry-on bags and 432 million checked
bags, discovering 2,653 firearms at 236 airports.12 These figures, which
indicate the scale of the problem, do not, however, capture the security
reality, for covert tests have exposed the fallibility of the screening process
on many occasions. In 2007, for example, Government Accountability
Office (GAO) personnel carried explosive components on their persons
and in their carry-ons through the screening process.13 Since then, as noted
above, various changes have been implemented but these have not solved
the problem, for, in early 2015, undercover agents carried weapons and
explosives past the screeners at various major airports, 67 times out of 70
attempts.14 This outcome did not surprise the Inspector General of the
DHS, for previous covert tests had yielded similar results – one in 2011
on the AIT machines of the time, a second in 2012 on access controls and
a third in 2014 on checked baggage, which revealed that more than half a
billion dollar investment designed to remedy failures detected in 2009 had
yielded no improvement.15
Several factors contribute to this state of affairs, the most obvious being
the failure to adequately assess programs before they are introduced.
The SPOT program, which cost about $900 million by 2015, is a notable
example. The first validation study was carried out in 2011, four years after
its initiation. And, a subsequent meta-analysis revealed that that study
had been seriously flawed and that there was no evidence that the SPOT
program enhanced airport security. Similarly, no effort was made to deter-
mine the effectiveness of the canine teams or in what areas they could be
most effective when they were deployed in 2011. Two years later, the GAO
noted that the TSA would ‘have benefitted from completing operational
assessments of PSCs before deploying them on a nation-wide basis to
determine whether they are an effective method of screening passengers
. . .’.16 The Managed Inclusion Program, which had been widely criticized
for its reliance on the questionable SPOT and canine teams programs,
and which also underwent no assessment of its effectiveness as an overall
system before its inception in 2013, was terminated in 2015.
Such shortcomings are also evident in one of the major policy i nnovations
adopted after 9/11 to enhance the screening process – the replacement of
AIRCRAFT SECURITY
The RBS layers extend to the plane itself and include the hardened
cockpit doors, probably the most effective reform introduced after 9/11,
allowing trained pilots to carry a gun, and the Federal Air Marshall
Service (FAMS), whereby thousands of officers in plain clothes travel
millions of miles as passengers on various domestic and international
flights considered high risk. The effectiveness of this program, which
dates back to the 1970s, depends upon two factors: an appropriate risk
assessment program that assigns them to actual high risk flights and the
quality of the training and morale of the officers involved. But these
have not been the guiding principles that have been applied. Rather, the
program has focused on coverage, on placing air marshals on as many
flights as possible and on professional judgments rather than a rigorous
risk based approach.26 Furthermore, serious questions have been raised
about the administration of the program regarding such personnel issues
as the training officers receive, difficult working conditions, the extent
of misconduct, including sexual scandals and the high resignation rate.27
Even if the agency were to undergo the necessary changes and resolve
such issues, however, a fundamental question still deserves careful
consideration – how much added protection does this program actually
provide?
Securing airports and planes involves more than all the measures dis-
cussed above, for millions of vendors, contractors, airport, airline and
federal employees, have access to secured areas. Though various security
procedures have been implemented – in 2014 over 13 million employees
were screened28 – experts agree that the insider threat is a very serious
one that has not received the attention it requires. The International Air
Transport Association, for example, began its position paper in 2015 as
follows: ‘There is growing concern . . .’ and noted the wide range of threats
that insiders posed including obtaining classified information, launching
cyber-attacks, and smuggling weapons and people.29 Developing measures
to deal with this threat is complicated by such factors as the costs and
difficulties involved in screening all insiders, and the uniqueness of each
airport and the policies it follows.
The difficulties involved are evident given the inability of the TSA to
screen even a small subset of insiders, its own employees. The TSA’s efforts
to do so have long been criticized and changes have been implemented over
time, but its screening process still contains numerous weaknesses. A recent
investigation, for example, found thousands of incomplete records includ-
ing immigrants without passport numbers. Its efforts to screen the wider
population are also ineffectual. In 2016, the JFK police union criticized the
TSA for ‘a lack of attention to screening of all airport workers’. Despite
its acknowledged dangers, the insider threat remains a serious national
problem for not only are the screening processes of limited effectiveness
but just three out of the 457 airports screen all their employees and bags.30
It should be noted, however, that the TSA’s Aviation Security Advisory
Committee, recognizing the seriousness of this threat, has recently issued
a number of recommendations designed to minimize this vulnerability
though their effectiveness obviously remains to be seen.
Perimeter Issues
Even if such measures minimize the insider threat, one cannot ignore the
‘outsider threat’, for it is not particularly difficult to enter even a major
passenger airport illegally. Over 200 people succeeded in doing so between
2004 and 2015, more than a quarter reached the parking areas, and five
even managed to climb onto a plane.31
Nor should one overlook the danger posed by unchecked vehicles that
can be driven up to an airport. The freedom to do so raises the devastating
possibility that one or more explosive packed vehicles could crash into a
crowded terminal, as happened in Glasgow in 2007. The TSA has issued
INFORMATION SECURITY
In today’s world, a terrorist can be much further from an airport and still
stage an effective strike. Cyber-attacks against aviation infrastructure have
been taking place for years and are difficult to prevent for many reasons,
including the key role played by the private sector and the numerous obs
tacles that efforts to create effective public private partnerships in the security
area inevitably encounter. Yet such efforts remain essential given the vulner-
ability of aircraft systems and airports. At the beginning of this decade,
for example, 2.9 million attacks were blocked in one year at Los Angeles’
three commercial airports.35 The implications for security are obvious since
include, as the GAO recently noted: (1) protecting air traffic control (ATC)
information systems; (2) protecting aircraft avionics used to operate and
guide aircraft; and (3) clarifying cybersecurity roles and responsibilities
among multiple FAA offices.40
The growing concern with airspace security has finally led the FAA to
take some important steps to meet existing and potential threats to the
system. These include a five-year study to identify and remedy weaknesses
in aircraft systems and the establishment of a joint government-industry
committee to recommend new cybersecurity safeguards. Furthermore, the
2016 FAA Extension, Safety, and Security Act requires the FAA to develop
a ‘framework of principles and policies to reduce cybersecurity risks to the
national airspace system, civil aviation and agency information systems
using a total systems approach that takes into consideration the interactions
and interdependence of different components of aircraft systems and the
national airspace system’.41 The success of these efforts remains to be seen,
but, hopefully, this legislation will lead to the emergence of new policies
that will secure the NextGen system from insider as well as external threats.
AIR CARGO
arrangements at the screening site and along the supply chain. The cargo
which arrives at the airport from non-CCSP organizations is screened
there. For inbound cargo, the TSA seeks to ensure that the foreign security
measures meet US standards.42
These measures are not foolproof. Most obviously, the baggage screening
that takes place at the airport is prone to all the issues discussed earlier. And
the CCSP program is also subject to many of the same problems ranging from
the security of the facility to the insider threat. Inbound cargo poses many
additional issues. Screening cargo requires appropriate technology but this
is an area of concern. The TSA provides an Air Cargo Security Technology
List (ACSTL) containing 16 manufacturers and over 100 items divided
into three sections, ‘qualified, ‘approved’ and ‘grandfathered’. However, the
Security Manufacturers Coalition has noted that ‘many of the screening
technologies listed were not specifically designed for the many complex con-
figurations of air cargo, including commodity type and density levels’.43 The
Air Cargo Advisory Group (GACAG) recognizes this and other shortcom-
ings in air cargo security but correctly places it within a global context, urging
the International Civil Aviation Organization (ICAO) to develop global
standards not only for new technologies but for existing screening practices
and requirements as well.44 Dealing with all the problems posed by air cargo
requires effective administration but the existing organizational structure, as
noted above, is characterized by various shortcomings that complicate efforts
to achieve a high level of cargo security. In 2007, for example, the GAO
recommended that the TSA and Customs and Border Patrol (CBP) define
their specific roles, but by 2012 little had changed.45
GENERAL AVIATION
specific obligations and does not hold GA facilities to the same standards
as regular airports. It does not even establish standards for obtaining fed-
eral financing. Only those that are within the closed District of Columbia
area are required to meet various security standards.46
Though this system has aroused considerable criticism, it has been vig-
orously defended by the Aircraft Owners and Pilots Association (AOPA),
which argues that ‘[t]he aircraft and pilots of America’s general aviation
(GA) community do not pose a significant terrorist threat to the United
States . . . (because) [a] comprehensive range of proven measures are in
place. . .’.47 This optimistic perspective, however, makes two assumptions,
each of which has been questioned. The first is that the risk level is low; the
second, that the existing security is adequate
Given the character and diversity of the GA system, the degree of
voluntary compliance, the number of municipal, state, and federal agen-
cies involved, and the problems in securing commercial airports, it is to
be expected that weaknesses in the existing security arrangements have
been identified. A recent TSA report that assessed the degree to which
the various GA elements were implementing security measures found that
these varied considerably. While 9 percent of the larger airports possessed
an emergency contact list, only 19 percent had an identification system for
passengers, cargo and baggage, and only 44 percent of airports possessed
a security training program. The biggest problem, however, involved threat
assessments and immigration violations where numerous ‘weaknesses’
were identified.48 A related study also found problems in the screening
process for foreign students enrolling in flight schools.49
The TSA, often with the support of AOPA, has taken various measures
to strengthen GA security by enhancing cooperative efforts, expanding
the profiling program, and ruling that passengers on planes over 12,500
lbs be subject to the Secure Flight program watch list. How effectively
this measure will be implemented has been questioned, however, given the
small amount of money that has been requested for this program.50 This
rule reflects the TSA’s focus on the larger aircraft but small ones also pose
a potential threat for they may serve as a missile (as occurred in 2002), an
effective smuggling tool or a delivery system for deadly agents.51 Thus,
GA’s vulnerabilities are likely to continue to exist and the issue of how best
to deal with them remains to be resolved.
Underlying all the problems discussed above is the nature and functioning
of the organization that is responsible for developing, implementing and
CONCLUSIONS
Clearly, despite all the policies that have been adopted and the billions that
have been invested, much remains to be done to safeguard the aviation
system from terrorist attacks. Though the TSA has implemented many
new programs, primarily to enhance passenger security, including the
deployment of new screening technologies and a risk based approach
designed to identify threats without unduly burdening the great majority
who pose no threat, serious gaps remain. There is no shortage of specific
suggestions on how to improve the situation. These include, in regards to
the insider terrorist threat, for example, enhanced intelligence cooperation
and pre-employment clearances, limiting access only to assigned work
places, enhanced education and training for internal security officers,
including how to react to a terrorist incident, and improved employee
accountability and dispute adjudication.
Though such measures may well represent useful changes, achieving
a higher level of aviation security requires a new approach to planning,
operations, and enforcement. Until now the primary focus has been on
safeguarding airplanes and airports, but given the range of assets that
are vulnerable and the many new potential threats ranging from cyber to
physical to biological, chemical, and nuclear to drones, a new approach is
desirable. Furthermore, the costs of a successful attack will vary greatly
depending on the event. The loss of an airplane is tragic; the disruption
of the US economy as a result of a successful attack on air cargo could be
catastrophic.
Billions have been spent but these huge expenditures have not resulted in
the creation of a secure system. Indeed, some security measures, especially
those with dubious efficacy should be eliminated or at least greatly reduced.
In any case, when considering future innovations, care should be taken to
assess not only their potential efficacy but their costs and benefits as well.
Such assessments should not be limited to specific aviation security pro-
jects, for these are part of a larger issue, how to protect the country’s criti-
cal infrastructure, including transportation. Thus, difficult questions need
to be asked and resolved including: How big should the security budget
be? What amount should be allocated to aviation security as compared to
other transportation modes? What trade-off is acceptable between security
and other societal requirements such as civil liberties and the flow of trade?
Unless such questions receive the attention they deserve, no appropriate
strategic plan for aviation security can be implemented.
Achieving aviation security, however, requires more than a sound and
effective national program; an international perspective is essential for threats
to passengers and air cargo can originate, as various tragic incidents have
shown, outside the US. Indeed, the DHS recently imposed new security
requirements for all foreign commercial flights. One hundred and eighty
airlines from approximately 280 airports in 105 countries are affected.56
Successful implementation of these new regulations will enhance global avi
ation security but international cooperation is obviously required. Achieving
such cooperation is seldom easy, given the character of the international
system and the widespread hypocrisy and application of double standards
that often characterizes state behavior. Still, a wise diplomatic policy can help
to overcome such obstacles and thus contribute greatly to the achievement of
aviation security not only in the US but throughout the globe.
NOTES
1. http://www.transtats.bts.gov/Data_Elements.aspx?Data=1.
2. These figures are drawn from official US statistics: see www.bts.gov.
3. http://www.transtats.bts.gov/freight.asp.
4. https://www.airfreight.com/blog/top-5-u.s.-airports-for-air-freight-tonnage-in-2014.
5. http://www.bloomberg.com/news/articles/2014-07-03/boeing-cargo-planes-lose-to-boeing
-passenger-planes.
6. Judy Rumerman, ‘Aviation Security’, U.S. Centennial of Flight Commission
(Washington, DC, 2003), http://www.centennialofflight.net/essay/Government_Role/sec
urity/POL18.htm.
7. Gore Commission, Final Report, February 12, 1997.
8. Mary Schiavo, ‘September 11 Was Failure of Government’, http://www.cnn.com/SPECI
ALS/2001/trade.center/flight.risk/stories/part1.schiavo.access.html.
9. R. Johnstone, ‘Not Safe Enough: Fixing Transportation Security’, Issues in Science and
Technology, Winter 2007, Vol. 23(2), pp. 51–60.
10. Jennifer Grover, ‘Aviation Security: TSA’s Managed Inclusion Process Expands
Passenger Expedited Screening but TSA Has Not Tested its Security Effectiveness’,
GAO Report, March 2015.
11. ‘Layers of Security’, Transportation Security Administration, TSA.gov.20perimeter5.
12. ‘TSA 2015 Year in Review’, The TSA blog, January 21, 2016.
13. GAO, ‘Aviation Security: Vulnerabilities Exposed through Covert Testing of TSA’s
Passenger Screening Process’, GAO-08-48T, November 15, 2007.
14. Justin Fishel, Pierre Thomas, Mike Levine, and Jack Date, ‘Undercover DHS Tests Find
Security Failures at US Airports’, ABC News, June 1, 2015, http://abcnews.go.com/
ABCNews/exclusive-undercover-dhs-tests-find-widespread-security-failures/story?id=31
434881.
15. Statement of Peter V. Neffenger, Administrator, TSA, before the United States House
of Representatives, Committee on Homeland Security, July 29, 2015, p. 3.
16. ‘TSA Explosives Detection Canine Program: Actions Needed to Analyze Data and Ensure
Canine Teams are Effectively Utilized’, United States, GAO Report, January 2013.
17. GAO-16-704: September 7, 2016.
18. CNN, ‘TSA to Investigate Racial Profiling Claims’, August 14, 2012, https://www.cnn.
com/2012/08/14/travel/tsa-profiling-accusations/index.html.
19. Michael S. Schmidt and Eric Lichtblauaug, ‘Racial Profiling Rife at Airport, U.S.
Officers Say’, New York Times, August 11, 2012.
20. ACLU, ‘ACLU Sues TSA for Records on Discredited “Behavior Detection” Program’,
March 19, 2015.
21. GAO, ‘Aviation Security: #Efforts to validate TSA’s Passenger Screening Behavior
Detection Program Underway’, May 2010.
22. GAO, ‘Aviation Security: Rapid Growth in Expedited Passenger Screening Highlights
the Need to Plan Effective Security Assessments.’ GAO Report to Congressional
Requesters, December 2014.
23. ‘TSA is Increasing Procurement and Deployment of Advanced Imaging Technology,
but challenges to its effort and other areas of aviation security remain’. GAO March 17,
2010, pp. 8–9.
24. ‘Airport Passenger Screening Using Backscatter X-Ray Machines: Compliance with
Standards’, The National Academies Press, 2015.
25. GAO, ‘DHS Oversight and Coordination of Research and Development Should be
Strengthened’, September 12, 2012.
26. GAO, ‘Federal Air Marshall Service: Actions Needed to Better Incorporate Risk in
Deployment Strategy’, May 2016, GAO 16-582.
27. Michael Grabell, ‘The TSA Releases Data on Air Marshal Misconduct, 7 Years
After We Asked’, ProPublica February 24, 2016, https://www.propublica.org/article/
tsa-releases-data-on-air-marshal-misconduct-7-years-after-we-asked.
28. TSA Blog, 2015, https://www.tsa.gov/blog.
29. IATA, ‘Insider Threat in Civil Aviation, Position paper for 2015/2016’, https://www.iata.
org/policy/Documents/insider-threats-position.pdf.
30. Jeff Peques, CBS News, ‘TSA Blasted for “Insider Threat” Security Gap’, May 15, 2016,
http://www.cbsnews.com/videos/tsa-under-fire-for-insider-threat-security-gap/.
31. Martha Mendoza and Justin Pritchard, ‘AP Investigation Details Perimeter Breaches at US
Airports’, April 9, 2015, https://www.nbcconnecticut.com/news/national-international/
AP-Investigation-Details- Perimeter-Breaches-at-US-Airports--299210461.html.
32. Billie H. Vincent, ‘Aviation’s Continuing Vulnerabilities to Vehicle Borne Improvised
Explosive Devices, Individual Suicide Bombers, Suitcase Explosive Devices Attacks at
Airports’, May 2009.
33. Matt Schroeder, ‘Countering the MANPADS Threat: Strategies for Success’, Arms
Control Today, September 2007.
34. Hillel Avihai, ‘MANPADS, Countermeasure: Sky Security vs. Ground Security’, ICT
articles, https://www.ict.org.il/Article/1019/MANPADS-Countermeasure-Sky-Security-
vs-Ground-Security.
35. John McCarthy and William Mahoney, ‘SCADA Threats in the Modern Airport’,
University of Nebraska at Omaha, 2012, pp. 142–5.
36. Kim Zelter, ‘Hacked X-Rays Could Slip Guns Past Airport Security’, WIRED,
February 11, 2014.
37. DHS, Office of Inspector General, ‘Audit of Security Controls for DHS Information
Technology Systems at Dallas/Fort Worth International Airport’, September 2014.
38. DHS, Office of Inspector General, ‘Audit of Security Controls for DHS Information
Technology Systems at John F. Kennedy International Airport’, January 2015.
39. GAO, ‘Information Security: FAA Needs to Address Weaknesses in Air Traffic Control
Systems’, GAO-15-221, January 29, 2015, p. 1.
40. GAO, ‘Air Traffic Control: FAA Needs a More Comprehensive Approach to Address
Cybersecurity as Agency Transitions to NextGen’, April 2015, p. 1.
41. Vesna Brajkovic, ‘Breakdown: FAA Extension, Safety, and Security Act of 2016’,
AviationPros, July 19, 2016, http://www.aviationpros.com/blog/12233900/breakdown-
faa-extension-safety-and-security-act-of-2016.
42. Bart Elias, ‘Screening and Securing Air Cargo: Background and Issues for Congress’,
Congressional Research Service, December 2, 2010.
43. ‘In the Eyes of the Security Manufacturers Coalition, Aviation Security’, Aviation Security
International, https://www.asi-mag.com/eyes-security-manufacturers-coalition/.
44. Handy Shipping Guide, ‘Air Cargo Screening and Security Technology Needs
Beefing Up Say Freight Forwarders and Shippers’, 12 December, 2013, http://www.
handyshippingguide.com/shipping-news/air-cargo-screening-and-security-technology-
needs-beefing-up-say-freight-forwarders-and-shippers_5179.
45. GAO, ‘Aviation Security: Actions Needed to Address Challenges and Potential
Vulnerabilities Related to Securing Inbound Air Cargo’, May 2012, p. 13.
46. DHS, Office of Inspector General, ‘TSA’s Role in General Aviation Security’ OIG-09-69
May 2009.
47. AOPA, ‘AOPA’s Airport Watch Security’, https://www.aopa.org/advocacy/airports-and-
airspace/security-and-borders/airport-watch-security.
48. GAO, ‘General Aviation Security, Weaknesses Exist in TSA’s Process for Ensuring
Foreign Flight Students Do Not Pose a Security Threat’, July 18, 2012, GAO-12-875.
49. Ibid.
50. National Security Law Brief, ‘Insecurity in General Aviation’, October 12, 2015, p. 1.
51. ‘TSA Employees Tell House Panel: Poor Leadership, Retaliation Undermining
Security’, Washington Times, http://www.washingtontimes.com/news/2016/apr/27/tsa-
employees-tell-house-panel-poor-leadership-ret/, p. 2.
52. ‘Why So Many TSA Workers are Leaving and How to Stop It’, http://thehill.com/blogs/
pundits-blog/homeland-security/285103-why-so-many-tsa-workers-are-leaving-and-ho
w-to-stop-it.
53. Bradford Blevins, ‘Guest Column: How TSA Leaders Can Put the Organization Back on
the Right Track’, Government Security News, http://gsnmagazine.com/node/47398?c=
airport_aviation_security.
54. ‘“We remain an agency in crisis”, TSA Kansas Security Director Jay Brainard said
when testifying for the House Committee on Oversight and Government Reform on
Wednesday, according to The Washington Post’: ‘“Biggest bullies in government”: TSA
admits they’re an “agency in crisis”’, Anthony Hennen, Redalertpolitics.com, May 2,
2016.
55. https://www.wired.com/story/dhs-tsa-laptop-ban-extra-security.
56. https://www.dhs.gov/news/2017/06/28/fact-sheet-aviation-enhanced-security-measures-
all-commercial-flights-united-states.
INTRODUCTION
Aviation security is the foundation of secure air and ground travel in any
country. Without safety and security in the transportation sector, there
is no stability and progress. As the second largest nation in the world in
area, Canada has introduced many layers of security in its 31 airports.
But two major events have shaped Canada’s approach to aviation security:
(1) the bombing of Air India Flight 182 in 1985, and (2) terrorist attacks
on September 11, 2001 in the United States. Canada’s aviation security
consists of a security matrix consisting of federal agencies, police, airlines,
intelligence services, airport authorities and security companies. Indeed,
aviation security is a team effort – it requires strong communication,
exchange of information and coordination between these entities to deliver
safe and secure travel and commerce.
Since the 9-11 attacks, Canada has responded with its own approaches to
aviation security. As you will see in the subsequent paragraphs, numerous
laws and policies have shaped Canada’s aviation security. These changes over
the years are designed to streamline tourism and commerce, but also to avoid
compromising the security of airports and border crossings. The challenge is
clear – millions of passengers enter airports and board planes with various
items, while airport personnel enter into restricted areas. As such, it is under-
stood that the aviation security framework must have proper resources and
measures in place to safeguard everyone and avoid disruption in air travel.
The first section of this chapter describes the definition and guiding
principles of aviation security in Canada. The second section outlines the
multilayered security matrix maintained by federal agencies and others in
helping provide aviation security. The third section describes some of the
technological layers of security. The fourth section discusses the various
programs and measures of aviation security in Canada. The fifth section
explains the policies and laws that directly impact the Canadian aviation
sector. Finally, the current trends and issues in Canadian aviation security
are highlighted.
123
●● GOVERNMENT
● Transport Canada
● Canadian Air Transport Security Authority (CATSA)
● Public Safety Canada
● Canada Border Services Agency (CBSA)
● Canadian Security Intelligence Service (CSIS)/Department of
National Defence (DND)
● Royal Canadian Mounted Police (RCMP)/Provincial or
Municipal law enforcement
●● PRIVATE
● Airport authorities
● Commercial airlines
● Cargo companies
● Aviation Document Holders (pilots, flight attendants, air traf-
fic controllers, aircraft maintenance engineers)
sexual acts. The basis for canceling the pilot’s TSC was that his proven
sexual acts, on a balance of probabilities, were enough to ‘unlawfully inter-
fere with civil aviation’, and therefore to deny him access to restricted areas
of the airport. The applicant pilot denied that his sexual conduct would
interfere with his duties as a pilot, and that it would adversely affect civil
aviation. He distinguished his case from previous cases where membership
in criminal organizations was used to revoke the TSCs.
However, the Federal Court of Canada, upon judicial review, rejected the
pilot’s arguments. First, the court pointed to section 4.8 of the Aeronautics
Act (1985), where the Minister may grant or refuse a security clearance
to any person, or suspend or cancel a security clearance. Second, the
court referred to provisions in the Canadian Aviation Security Regulations
(CARs) and the Transportation Security Clearance Program Policy. Both
the regulations and policy required the removal of persons without proper
identification from restricted areas of airports, particularly if the Minister
believed that person would unlawfully interfere with civil aviation. In
applying this rule, the court held that there was enough linkage between
the pilot’s past incidences of sexual conduct and his current duties as a
pilot, and that there was an escalating pattern of sexual indiscretion. The
concern was about future conduct that interfered with civil aviation. The
court made it clear that although sexual conduct need not itself directly
involve aviation security, this type of behavior was inappropriate for a pilot
who could disrupt services on board a flight. This case therefore reveals
how one’s TSC can be removed by a federal agency on account of one’s
criminality unrelated to aviation security threats.
The cases found above reveal how TSCs represent a layer of security
managed by Transport Canada. The legal standard to be applied for a
security clearance is a balance of probabilities, where the Minister may
refuse a TSC if a reasonable person would suspect an applicant’s past con-
duct would likely lead to future unlawful interference with civil aviation.
The standard is fact-based, and it depends largely on the circumstances.
But the objective is to retain those airport personnel that would keep the
airport safe and secure.
AIRPORT AUTHORITIES
Transport
Air Carriers
Canada
●● on-board screening
●● restricted area identification card.
number; and (7) class/cabin and record locator number. The purpose of
the BPSS system is to detect any fraudulent or inconsistent information,
as this method cannot detect boarding passes that have been altered or
duplicated. Here, a boarding pass is scanned twice – initially by a CATSA
officer (using a handheld device) when a passenger enters a screening
queue, and then again by a stationary device prior to the X-ray machine.
The results are displayed on a monitor visible to a screening officer.
CATSA has installed closed-circuit television (CCTV) in most Canadian
airports to watch the movements of passengers from the waiting line
(screening queue) until they have been processed by screening officers.
The CCTV technology is managed by the Security Operations Centre at
CATSA’s head office, which means that live feeds can only be viewed at
this location. Footage from cameras is retained for 30 days, after which it
is overwritten. But, if required, the footage may be viewed by authorized
screening officials through software application. Only a warrant or court
order would allow the release of such footage under certain circumstances.
CATSA has produced signage to make passengers aware that CCTV is
being used to monitor and record their movements through the screening
process.
Air cargo security is essential because any attack or delay on cargo cre-
ates significant disruptions in commercial trade and commerce. Designed
to secure the supply chain, air cargo security consists of containment of
an Improvised Explosive Device (IED) in the cargo and (2) of an all-cargo
aircraft for use as a weapon. At present, all air cargo must be secured
prior to being loaded onto an aircraft. This includes cargo undergoing
Transport Canada-approved screening methods such as X-ray or canine
searches. In 2006, Transport Canada received $39 million to develop an
Air Cargo Security Program, while in 2009 it received an additional $14.3
million to implement air cargo security measures. The 2010 federal budget
saw Transport Canada receive $95.7 million over a period of five years to
apply its Air Cargo Security Program.
●● CASAP
●● Canadian Air Carrier Protective Program
board a civilian aircraft. In all three provisions (Sections 76, 77, and 78),
the offences committed outside of Canada are deemed to be committed
in Canada.
The following laws are relevant to aviation security in Canada:
allows several persons and entities to ‘assist’ the Minister of Public Safety
and Emergency Preparedness in the administration of the Act, including
the Ministers of Transport, Citizenship and Immigration, member of the
RCMP, Director or employee of the CSIS and an officer or employee of
the CBSA.
A critical issue explored by aviation security experts relates to the
security of an airplane. Answering this is Part 8 of the CARs, dealing with
‘aircraft security’. These provisions deal with prohibited items on board a
flight, as well as escort officers. Sections 526(1) and (2) of CARs indicates
that an air carrier must prevent anyone on board to carry or access a
weapon or explosive substance. Section 527(1) requires an air carrier to
prevent anyone with a loaded firearm on board an aircraft, unless there is
an in-flight security officer. Under section 529, any unloaded firearm must
be stored so that it is inaccessible to any person on board other than crew
members. In-flight officers have different powers on board an aircraft.
Section 531 of CARs allows an air carrier to authorize a peace officer to
carry unloaded firearms if that officer acts in the course of their duties or
informs the air carrier that a firearm will be on board. Here, the officer
must present identification to the air carrier, and must complete a form
used by the air carrier to authorize such a firearm on board. This form
can be used to inform both the pilot and crew members about the officer’s
presence on board. However, section 532(2) allows a peace officer acting
undercover to request that the air carrier avoid revealing their presence on
board.
For airport security, section 455(1) of CARs outlines the regulatory
framework to coordinate and integrate airport security by requiring
an operator of an aerodrome to establish an airport security program.
As part of this program, the operator of an aerodrome must provide a
security policy statement and adopt a security awareness program to all
persons employed at the aerodrome, while implementing a process to
respond to breaches of security. A current scale map of the aerodrome
must identify all restricted areas and security barriers. Under section
458(1) of CARs, an operator of an aerodrome must also have a security
committee to help advise on and comply with aviation security laws,
while promoting the sharing of information for the airport security
program.
A summary of the relevant policies and legislation for aviation security
in Canada is found below in Table 8.1.
●● Regulation of drones
●● Right to protest in Canadian airports
There have been concerns about how personal data is being used by the
CATSA. In 2011, a report was submitted by the Privacy Commissioner
of Canada entitled Privacy and Aviation Security: An Examination of the
Canadian Air Transport Security Authority. The purpose of the report
was to determine whether CATSA had used adequate controls to protect
passengers’ personal data, and whether its policies and procedures violated
any privacy laws under the federal Privacy Act. This law restricts any
federal agency to improperly use personal data of passengers more than is
necessary for any of their aviation security programs. This report focused
on CATSA’s collection and use of passenger information, and its use of
aviation security technology (such as FBS technology and closed-circuit
television). The report concluded that some personal data collected by
CATSA was unrelated to its mandate given under the CATSA Act, and
was therefore ultra vires – some of its collection activities went beyond its
legislative authority. Other recommendations were that CATSA should
permanently delete all personal data held as electronic or hard copies that
it does not have the authority to collect. However, its collection of personal
data from boarding pass bar codes was justified. The report made it clear
that CATSA should only collect personal data for security incidents.
In February 2016, the federal government conducted a review of
Canada’s Transportation Act. Key recommendations were made with
respect to aviation security. First, passenger screening should be more
efficient by replacing the current approach with a more intelligence-driven,
risk-based screening process. Second, the federal government should create
a public reporting system known as the Civil Aviation Issues Reporting
System (CAIRS). This informal reporting system should allow anyone
to provide feedback on safety issues or problems with Transport Canada
services. It is not designed for immediate emergency safety issues – that
requires one to contact the Civil Aviation Contingency Operations, or
CACO).
In May 2015, Transport Canada received comments from aviation
stakeholders across Canada with respect to drones, or Unmanned Air
Vehicles (UAVs). Drones are nowadays a popular feature of business and
personal recreation use. But drones can be used for illegal and dangerous
purposes, thereby representing a threat to aviation security. At present,
the CARs require that a UAV operator obtain a Special Flight Operations
Certificate (SFOC) from Transport Canada. However, this depends on
two factors — the weight of the UAV and whether it will be used for
recreational or non-recreational purposes. The rule (as based on Transport
CONCLUSION
efficient to protect the best interests of not only Canadians, but all those
connected with the aviation sector.
REFERENCES
INTRODUCTION
After hosting the 2014 World Cup, which attracted the highest recorded
attendance since the 1994 World Cup, Brazil hosted one of the larg-
est global athletic events last year, the Olympic Games (FIFA, 2015;
The International Olympic committee, The Organization, 2017). On the
positive side, neither event experienced the security problems that critics
had feared. Brazilian security forces were able to manage the small-scale
protests that occurred during the World Cup as well as avoid riots and/
or major violence after the soccer loss to Germany (Day, 2014). Brazilian
police took over security screening outside of Olympic venues after the
contracted private firm failed to hire enough personnel and managed to
avoid any major incidences (Connors et al., 2016).
Unfortunately, deepening economic crisis and the massive cost overruns
from the World Cup soured many in Brazil on the huge capital investments
necessary to host the Olympic Games (Boadle, 2015). Brazil’s economy
shrank 3.8 percent in 2015 and 3.3 percent in 2016 (The World Factbook,
2017). Brazil experienced a major political crisis as it attempted to get rid
of government corruption and scandal by impeaching their first female
president on charges of manipulating the federal budget (Romero, 2016).
Inflation has risen to 8.4 percent and the Brazilian REAL has declined
over 20 percent against the US dollar since 2016 (CNBC, 2017; The World
Factbook, 2017).
While Brazil ranks fifth in the world in both population and landmass
and tenth in overall economy, the $15 billion spent on the World Cup was
a difficult pill to swallow (Wade, 2015). Originally, the government planned
for almost 75 percent of the spending to be directed toward general
transportation, security, and communication, but as the cost of construct-
ing the new sports stadiums rose money had to be diverted from other
projects, leaving almost half of the infrastructure projects unfinished after
the World Cup (CIA Factbook, 2015; Matheson, 2014). In addition to
144
the unfinished infrastructure, problems with the sewage system and poor
water quality issues were blamed for serious bacterial infections detected
in several athletes in Brazil for an Olympic test regatta. These issues, which
many expected to be addressed before the 2016 Olympics opened, were
unfortunately never eliminated, exposing 12 million locals, athletes, and
visitors in Rio to varying levels of contamination in water (Brooks and
Barchfield, 2015; Tomkiw, 2016).
Like every developing country, Brazil has internal and external security
challenges. Internationally, disputes continue with Uruguay over Brasilieria,
an island in Quarai River. Illegal smuggling of narcotics and weapons, as
well as paramilitary activities on the borders of Brazil-Uruguay and Brazil-
Colombia continue to trouble the country (The World Factbook, 2017).
Internally, Brazil faces high crime rates in its major cities. While Brazil is
the leading digital nation in South America, online frauds losses cost the
economy billions of dollars. Transportation safety in Brazil is also a major
concern for the growing economy of Brazil. The road network outside major
cities varies across the country from extremely poor in rural areas to good in
major cities. Ground and air cargo theft remain problematic (Security, 2017).
The World Cup and the Olympics were presented as an opportunity
for Brazil to invest in security and transportation infrastructure in ways
that would provide long-term economic and social benefits, propelling the
nation to the next level of economic development and growth. While plans
were aimed at all modes of transportation, the air transportation system
was a significant target for investment because of its overall importance to
the economy and the special events. Sadly, like much of the transportation
system, the quality of the infrastructure was poor and congested, hamper-
ing the arrival of foreign guests for the events (Williams, 2016).
After a brief overview of the geographic and demographic landscape
of Brazil, this chapter will explore the current air transportation system
including the airlines, airports, aircraft manufacturers, air traffic manage-
ment system, and aviation maintenance and training facilities. Next, the
safety and security of the Brazilian air transport system will be reviewed.
Finally, the regulatory and security framework governing the aviation
sector will be examined.
OVERVIEW
marily by air or road. A significant portion of the air travel to the interior
involves non-commercial, general aviation aircraft and airports.
AIR TRANSPORTATION
Airlines
Like many countries, the airline sector of Brazil has experienced a high level
of instability over the past three decades. During the 1990s, four carriers
dominated the Brazilian air transport sector (Varig, VASP, Transbrasil,
and TAM). Varig Airlines was considered the flag carrier and served as
the main international airline of Brazil. In 2001, GOL began flying as the
first low cost, domestic carrier in Brazil. Intense fare competition in Brazil
forced Varig to split in 2005 with GOL acquiring portions of Varig’s assets.
Shortly after the Varig breakup, Transbrasil and VASP went out of busi-
ness leaving TAM as the Flagship international carrier and GOL as the
chief domestic airline. In 2008, David Neeleman of JetBlue fame, founded
AZUL and began to grow rapidly. Avianca is the flag carrier of Colombia
and the world’s second oldest airline. In 2010, OceanAir of Brazil (founded
in 1998) was rebranded as Avianca Brazil since it was by then controlled
by Avianca holdings (Brazilian Airlines, 2015). In 2011, GOL acquired
Webjet to gain access to landing slots at several Brazilian airport and
announced an investment of $100 million by US carrier, Delta Airlines
(Kiernan, 2015). In this same year, TAM was acquired by LAN Airlines of
Chile (LATAM). For the period 2010–2013, these carriers enjoyed rising
passenger numbers and healthy load factors, although this did not always
result in positive operating income (Table 9.2).
Airlines are notoriously sensitive to the economic cycle and the economic
crisis of 2015 has taken its toll; airlines in Brazil announced combined
losses of USD $400 million for the first half of 2015 (Garcia, 2015). This
crisis led many carriers to seek additional investment. GOL announced an
additional $56 million investment by Delta Airline while AZUL received
$100 million from United Continental Holdings (Kiernan, 2015). The
Chinese HNA Group also announced a $450 million investment in AZUL,
making it the largest single shareholder of the company (Brazilian Airlines,
2015). Unfortunately, these investments were not enough to offset the
declines in passenger traffic. Overall, 2015 was a year of net losses for
Brazilian carriers (Table 9.2).
Airports
Aircraft Manufacturing
General Aviation
The general aviation (GA) sector, which includes all nonmilitary and non-
scheduled passenger and cargo flights, plays a significant role in Brazilian
aviation. In one of the latest reports on this sector, Brazil has 8,700 GA
owners and a fleet of 13,094 registered aircraft. The majority of these
aircraft are propeller, piston engine aircraft (Brazilian Association for
General Aviation, 2012). It is estimated that GA serves over 3,400 airports
or roughly 75 percent of the country (Agence France-Presse, 2012). Many
of the destinations are in the less developed interior where unbridged river
systems and unpaved roads make small aircraft GA a very viable option.
The largest category of GA after private aircraft is air taxi. This category
includes both fixed wing and rotor aircraft. These aircraft are available for
hire on a single or annual time/hour-share basis. There are 183 certified
air taxi companies and 314 companies offering specialized services such
as aerial surveying, photography, and inspection (Brazilian Association
for General Aviation, 2012). The six busiest GA aerodromes are located
in the metropolitan areas adjacent to São Paulo, Rio de Janeiro, Curitiba,
Goiania, and Belo Horizonte: Campo de Marte, Jacarepagua, Bacacheri,
Air traffic systems were first deployed following World War II and were
based on the new technology of ground-based radar. Once combined with
positive voice control, these systems served for over five decades as the
primary means of controlling air traffic. As the technology aged and air
traffic grew, these systems came under increasing strain. Like many other
countries, Brazil began to experience radar outages and system failures that
caused flight delays and cancellations. These became quite serious in 2008
and prompted the government to develop a long range plan for improve-
ment (CAPA, 2008). Around the world, these older systems are being
replaced with satellite-based systems for aircraft tracking and text-based
internet communications. In advance of the World Cup, Brazil began the
process of modernizing its military controlled system with expanded and
upgraded communication infrastructure for departure and inflight control
(SITA, 2014; Tompkins, 2015). Plans call for the new technologies to be
deployed across 23 airports by 2016 (Vivion, 2014).
Aircraft Maintenance
153
2,730 kg (helicopters) upheld, per type service
per aircraft model (e.g., non-destructive
testing, floats, emergency
equipment, rotor shovels,
screen coating)
Class 2 – Metal Class 2 – Conventional Class 2 – All other Class 2 – Aircraft
structure aircraft, with engines with over 400 propellers, per model instruments, per
maximum approved H.P., per model instrument type
takeoff weight up to
5,670kg (aircraft) or
2,730 kg (helicopters)
per aircraft model.
25/07/2018 10:56
Table 9.4 (continued)
154
5,670 kg (aircraft) or accessory model
2,730 kg (helicopters)
per aircraft model
Class 4 – Metal
structure aircraft, with
maximum approved
takeoff weight over
5,670kg (aircraft) or
2,730 kg (helicopters)
per aircraft model
25/07/2018 10:56
Safety and security in Brazilian aviation 155
Safety
Cargo Security:
to and from the airport as part of the risk assessment and planning
processes.
●● Maintain stringent control and checking over shipping documents.
Regulation
DISCUSSION
After a number of years as one of the stars of the BRIC countries, the
World Cup and Olympic Games were intended to showcase a Brazil that
was ready to shed the label of developing nation and assume a leading
role beyond Latin America. A massive building plan to improve the infra-
structure was designed to reassure the world that the host of two of the
largest sporting events in the world was a safe, secure, and modern nation.
Unfortunately, the world watched as Brazil grappled with economic and
political crisis brought on by massive spending, corruption, and allegations
of waste. The threat of the Zika virus only added to international concerns
over water quality, sanitation, and the ability of the government to deal
with its pressing issues (Rios, 2016). Amid protesters from both sides of the
political spectrum in Brazil and deepening financial crisis, the Government
of Brazil raced to complete critical transportation infrastructure necessary
to get thousands of foreign visitors to and from the athletic events in safety
and security (Williams, 2016; Winter, 2016). For Brazil, the only good news
was that the athletic events did not experience any acts of terrorism nor
result in major domestic violence.
Economic crisis is always bad for aviation and the financial results in
Table 9.2 bear witness to the plight of Brazilian Airlines before 2016.
The World Cup and the Olympic Games were expected to increase both
domestic and international air traffic. The trends, however, are not good.
In the last quarter of 2015, airline passenger numbers took their largest
drop in six years as airlines raced to cut capacity. Viracopos airport,
whose new $800-million-dollar terminal sat gleaning but largely empty,
was further witness to the turmoil in Brazilian aviation. Its new terminal
was to become the largest hub in Latin America and bigger than London’s
Heathrow by 2042. The bad news continued for 2016 as the latest traffic
report from Brazil showed the first annual traffic decline since 2003.
Domestic traffic in 2016 decreased by 5.7 percent as capacity (total number
of seats available) fell by 5.9 percent. International traffic posted slightly
better results, although these two were negative at 20.27 percent for traffic
and 23.07 for capacity (Flightglobal, 2017). Unfortunately, it appears that
even these high profile events cannot make up for the slumping domestic
economy. Only time will tell if the investments made to strengthen Brazil’s
aviation infrastructure have created a safer and more secure system.
REFERENCES
Boadle, A. (2015). ‘Brazil’s most costly soccer stadium may not host the Olympic
games’. Available at: http://www.reuters.com/article/us-brazil-olympics-idUSKC
N0SL2PG20151027#BGDGKcXgFqzyltWg.97.
Brazil (2005). Comando da Aeronáutica. RBHA 145: empresas de manutenção de
aeronaves. Brasília-DF, 2005.
Brazilian Airlines (2015). available at http://www.brazilianairlines.com/.
Brazilian Association for General Aviation (2012). ‘2nd Yearbook of Brazilian
General Aviation’. Available at: http://www.abag.org.br/anuario_aviacao/docum
ents/2ndYearbookofBrazillianGeneralAviation.pdf.
Brooks, B. and J. Barchfield (2015). ‘Rio’s waters are so filthy that 2016 Olympians
risk becoming violently ill and unable to compete’, Business Insider. Available at:
http://www.businessinsider.com/rios-filth-is-already-spoiling-the-2016-summer-
olympics-2015-7.
BusinessUSA (2013). Aerospace Industry Overview in Brazil. Available at http://
business.usa.gov/.
Canaday, H. (2015). ‘Latin American Air Growth Strong, MRO Support Fragmented’,
Aviation Week & Space Technology, January 13, 2015. Available at: http://aviation
week.com/mro/latin-american-airline-growth-strong-mro-support-fragmented.
CAPA (2008, Sep 11). ‘Air Traffic Control still causing disruption in Brazil’.
Available at: CAPA – Centre for Aviation: https://centreforaviation.com/analysis/
air-traffic-control-still-causing-disruption-in-brazil-3687.
Carrington, D. (2010). ‘First Amazon bridge to open world’s greatest rainforest to
development’, The Guardian. Available at: http://www.theguardian.com/environ
ment/2010/jul/29/manaus-bridge-amazon-rainforest (accessed August 7, 2013).
CIA Factbook (2015). ‘The World Factbook: Brazil’. Available at: https://www.cia.
gov/library/publications/the-world-factbook/geos/br.html.
CNBC (2017, February 2). ‘US Dollar/Brazilian Real FX Spot Rate’. Retrieved
from CNBC, Real Time Quote: http://data.cnbc.com/quotes/BRL%3D.
Connors, W., B. Parkin, and R. Jelmayer (2016). ‘Brazil police take over security
screening at Rio Olympics’. The Wall Street Journal. Available at: 7/29/2016https://
www.wsj.com/articles/brazil-police-to-take-over-security-screening-at-rio-olym
pics-1469814374.
Day, J. (2014). ‘Big events, big risks: Lessons from Brazil’s World Cup’, Forbes.
Available at: http://www.forbes.com/sites/riskmap/2014/09/29/big-events-big-ris
ks-lessons-from-brazils-world-cup/.
Duran, R. (2013). ‘Safety at Airports’, Brazil Business. Updated April 16, 2013.
Available at: http://thebrazilbusiness.com/article/safety-at-the-airports.
FIFA (2015). 2014 FIFA World Cup Brazil in numbers. Available at: http://www.
fifa.com/worldcup/news/y=2014/m=9/news=2014-fifa-world-cup-braziltm-in-nu
mbers-2443025.html.
Flightglobal (2015). São Paulo Guarulhos International Airport-Traffic. Available
at: https://dashboard.flightglobal.com/app/profiles/#/airport/summary/-13502?s
ea rchTerms=%22Sao%20Paulo%20Guarulhos%20International%20Air
port%22&federated=true
Flightglobal (2017). ‘ANALYSIS: Brazil Airport Concessions Face Financial
Crunch’. Available at: https://www.flightglobal.com/news/articles/analysis-bra
zil-airport-concessions-face-financial-443116/.
FreightWatch Security Net (2011). ‘FreightWatch Security Net Creates New Air
Cargo Tracker’, SupplyChainBrain. Available at http://www.supplychainbrain.
com/general-scm/regulation-compliance/single-article-page/article/freightwatch-
security-net-creates-new-air-cargo-tracker/.
Garcia, M. (2015). ‘Brazil’s airline crisis is a perfect storm of economic woes
and bad politics’, Skift. Available at: http://skift.com/2015/12/10/brazils-airline-
crisis-is-a-perfect-storm-of-economic-woes-and-bad-politics/.
IATA (2015a). Special report: Brazil. Available at: http://airlines.iata.org/reports/
special-report-brazil.
IATA (2015b). IATA Operational Safety Audit. Available at: http://www.iata.org/
whatwedo/safety/audit/iosa/Pages/index.aspx.
ITA – International Trade Administration (2013). Brazil Aviation Factsheet 2013.
Available at: https://www.trade.gov/td/otm/assets/aero/Brazil_Aviation2013.pdf.
Kiernan, P. (2015). ‘Brazil’s Gol Airline deepens Delta Ties’, Wall Street Journal.
Available at: http://www.wsj.com/articles/brazils-gol-airline-deepens-delta-ties-1
436567281.
Lohmann, G. and G. Lipovich (2013). ‘Low cost carriers in South America’. In
The Low Cost Carrier Worldwide, eds. Sven Gross and Michael Luck, Ashgate
Publishing Ltd., UK.
Machado, M.C., L.M. Soto Urbina and M.A. Gomes Eller (2013). ‘Aeronautical
Maintenance Companies: A Preliminary Study’. Proceedings from the POMS
22nd Annual Conference, Reno NV, April 29 to May 2, 2011, Available at: http://
www.pomlearning.org/reno/fullpapers/020-0472%20Aeronautical%20Maintena
nce%20Companies.pdf.
Matheson, V. (2014, June 28). ‘Were the Billions Brazil Spent on World Cup
Stadiums Worth It?’ Retrieved from FiveThirtyEight: https://fivethirtyeight.com/
features/were-the-billions-brazil-spent-on-world-cup-stadiums-worth-it/.
McKinsey and Company (2010). Study of the Air Transport Sector in Brazil. Rio
de Janeiro, Brazil: McKinsey and Company.
Myer, B. (2015). ‘Cargo theft on the rise at Brazilian airports’, American Shipper,
April 9, 2015. Available at: http://www.americanshipper.com/Main/ASD/Cargo_
theft_on_the_rise_at_Brazilian_airports_59937.aspx.
Population density, Food and Agriculture Organization and World Bank popula-
tion estimates. (2016). Retrieved from The World Bank, Data: http://data.
worldbank.org/indicator/EN.POP.DNST.
Rios, E. (2016). ‘No, the summer Olympics will not be leaving Rio’, Mother Jones.
Available at: http://www.motherjones.com/media/2016/05/moving-olympics-rio-
brazil-london-zika-dilma.
Romero, S. (2016, August 31). ‘Dilma Rousseff is Ousted as Brazil’s President in
Impeachment Vote’. Retrieved from The New York Times: https://www.nytimes.
com/2016/09/01/world/americas/brazil-dilma-rousseff-impeached-removed-pres
ident.html.
Security, U.S. (2017). Brazil 2016 Crime & Safety Report: Brasilia, Brazil 2016
Crime & Safety Report: São Paulo, Brazil 2016 Crime & Safety Report: Rio de
Janeiro. Retrieved from Reports, Crime & Safety Reports: https://www.osac.gov/
majorevents/Pages/ContentReportDetails.aspx?cid=21812.
SITA (2014). ‘Brazil upgrades air traffic technology for World Cup and Olympics’.
Available at: http://www.sita.aero/pressroom/news-releases/brazil-upgrades-air-
traffic-technology-for-world-cup-and-olympics.
The International Olympic Committee, The Organization (2017, February).
Retrieved from Olympics | Olympic Games, Medals, Results, News | IOC: https://
www.olympic.org/about-ioc-institution.
The World Factbook (2017, January 12). Retrieved from US Central Intelligence
Agency: https://www.cia.gov/library/publications/the-world-factbook/geos/br.ht
ml.
Tomkiw, L. (2016, August 1). ‘Rio Olympics Water Problems: Athletes, Tourists
Warned About Pollution, Bacteria, Viruses’. Retrieved from International Business
Times: http://www.ibtimes.com/rio-olympics-water-problems-athletes-tourists-
warned-about-pollution-bacteria-viruses-2396487.
Tompkins, R. (2015). ‘Harris, CpqD to support Brazilian Air Force air traffic control’.
Available at: http://www.upi.com/Business_News/Security-Industry/2015/07/27/
Harris-CPqD-to-support-Brazilian-Air-Force-air-traffic-control/7581438015856/.
US Department of Transportation (2014). ‘The economic impact of civil aviation
on the US economy’, Office of Performance Analysis. Available at: https://www.
faa.gov/air_traffic/publications/media/2014-economic-impact-report.pdf.
Vivion, N. (2014). ‘Brazil upgrades air traffic technology ahead of the World Cup/
Olympic double header’. tnooz. Available at: http://www.tnooz.com/article/upgr
ading-air-traffic-technology-ahead-world-cupolympic-double-header/.
Wade, S. (2015, January 20). ‘FIFA returns $100M to Brazil; World Cup cost $15
billion’. Retrieved from USA Today: http://www.usatoday.com/story/sports/
soccer/2015/01/20/fifa-returns-100m-to-brazil-world-cup-cost-15-billion/22050
583/.
Williams, O. (2016). ‘Rio 2016 Olympics: What Brazil is worrying about with
100 days to go’, CNN. Available at: http://edition.cnn.com/2016/04/27/sport/
olympics-rio-2016-countdown-100-days-to-go/.
Winter, B. (2016). ‘Why Brazil’s crisis could get worse’, CNN. Available at: http://
edition.cnn.com/2016/04/20/opinions/brazil-crisis-winter/index.html.
World Airline News (2015). Available at: https://worldairlinenews.files.wordpress.
com/2015/07/embraer-orders-graph-1.jpg.
INTRODUCTION
Aviation security in Israel has become one of the most challenging topics
of national security, and the Israeli experience reflects many aspects of
aviation security worldwide.
Broadly speaking, the evolution of the Israeli security strategy regarding
the civilian aviation industry, takes us back to July 23, 1968, when El-Al
flight 426 Boeing 707 bound for Tel Aviv from Rome was hijacked by three
members of the ‘Popular Front for the Liberation of Palestine’ (PFLP),
founded in late 1967 by Dr. Waddi Haddad and Dr. George Habash, and
was forced to land in Algeria.1
This incident which marked the birth of aviation terrorism in the Middle
East, may certainly be regarded as the first spark in a long history of avi
ation terrorism which affects the entire civilian aviation industry worldwide,
not only due to the fact that since this incident, many other terrorists have
adopted various tactics of terrorism which are aimed at aircraft, but also –
and perhaps more importantly – because of the Israeli philosophy of the
meaning of the civilian aircraft, which represents a national icon (despite
the fact that most airlines today are privatized).
In this chapter, a window to the aviation security in Israel will be
presented and, yet, this window will be narrower rather than wide, due to
national security issues.
However, the author will share his experience regarding aviation secur
ity, following his employment by the Israeli flag airline El-Al (1992–1997),
and following his expertise in aviation terrorism, which was the topic of
research of his Ph.D. thesis (2006).2
This chapter will present a brief history of aviation terrorism with
regard to the Israeli carriers, but the main focus will be on the Israeli avi
ation security philosophy, which offers a unique perspective of the strategy
of preventing terrorist attacks aimed at the Israeli carriers. This strategy, of
which some aspects were adopted by other airlines and/or national decision
making, emphasizes the understanding that the Israeli perception of the
163
Look for the bomber rather than the bomb, do not rely only on technology
detection and pay attention to the passengers’ intention, and sky security starts
with ground activity. (Avihai, 2006)
These assumptions were taken into account while establishing the Israeli
aviation security philosophy.
The Israeli experience has shown with no doubt, that once a terrorist has
managed to overcome all security measures at the airport and is on board
with the intention to hijack the plane, well-trained security personnel is the
answer. This practice took place in the ‘Dawson Field affair’ of September
1970, when a security guard managed to foil Leila Khaled’s and her col-
league’s (Patrick Arguello) intention to hijack the plane. His action, as well
as the maneuver of the pilot, emphasized the necessity for a means which
is considered as the ‘last line’ which will face hijacking attempts.
The presence of armed personnel on a civilian aircraft is a sensitive issue,
involving security, political and international implications. Some other
airlines have adopted the practice of armed personnel on board, but some
past incidents relating to foreign airlines showed that the effectiveness of
this means depends on the training of the security guard. Israeli on-board
security personnel are the chosen few from many, and they are subject to
constant checks, training and regular personnel characteristic checks.13
But armed personnel is only one of the measures that are implemented
The Israeli perception regarding aircraft security is based on the ‘sterile area’,
meaning, that only authorized personnel will have access to the airplane, and
this refers to cabin cleaners, mechanical/maintenance personnel, fuel and
catering personnel and others. No person will enter the aircraft without being
checked manually by Israeli or local authorized trained personnel.
This practice, which is unique to the Israeli airline, is possible due to the
fact that the entire Israeli fleet, which involves three airlines: El-Al, Arkia
and Israair, contains less than a hundred aircraft (some other airlines –
European, American and Asian – hold fleets of hundreds and thousands
of aircraft).
The aim of this practice is to ensure that the aircraft has been monitored
from the moment it landed until it takes off.
Perhaps the most well-known incident which has been an integral part of
any aviation security person training plan, was the ‘Nezar Hindawi’ case
(known to security personnel as the ‘Ann Murphy case’), of April 17, 1986
at Heathrow airport, when an Israeli security officer managed to foil a
Syrian-Palestinian plot to sabotage an Israeli jumbo jet bound for Tel Aviv
from New York via London, using an Irish girl named Ann Mary Murphy,
who was Nezar Hindawi’s fiancée.
Hindawi’s operators succeeded in installing 1.5 kg of Semtex explosives,
equipped with a sophisticated timer, slipping through the British security
checks at Heathrow airport. Following an interview held by the author
with the security officer, he admitted that there were certain suspicious
signs in Murphy’s behavior.
The security officer decided to re-check Murphy’s bag, and when he
picked it up and walked 10 to 15 meters away from the check-in counter to
the X-ray machine, he realized that the bag was too heavy for its size and
weighed at least 1 kg more than it should have.
The fact is that without the Israeli security officer’s ‘gut feeling’, 375
passengers could have perished. It was not the technology that prevented
this deadly attack from being carried out, but a well-trained and highly
motivated security officer. Not luck played a role in this incident, but well-
trained personnel who made the difference between success and a major
catastrophe.
The necessity of monitoring every single element, passenger or piece of
luggage before entering the Israeli aircraft is the ‘hard core’ of the Israeli
strategy, and a well-known experience of any passenger who is about to
embark on an Israeli jet (but also for passengers who wish to fly to Israel
with a foreign carrier or who are about to leave Israel with an Israeli carrier
or a foreign one).
To emphasize the airport security personnel aspect, two issues should
be highlighted:
Field affair’), where four terrorists were assigned to take over the Israeli jet,
knowing that security personnel were placed on board, and therefore they
decided to recruit another two terrorists, in addition to Patrick Arguello
and Leila Khaled.
The hero of this incident was, undoubtedly, the aircraft captain, Uri
Bar-Lev. First, he succeeded in preventing the embarkation of two of
the four terrorists (only Leila Khaled and Patrick Arguello succeeded in
boarding, despite the security checks).
The security officer, who warned Bar-Lev of his suspicions regarding
the two Senegalese passport holders, alerted Bar-Lev to the fact that
‘something was odd . . . I couldn’t tell exactly what, but something was
wrong . . . causing Bar-Lev to re-check their passports’.16 Bar-Lev discov-
ered that these two ‘passengers’, who had bought two first-class tickets and
had checked in at the last minute, presented passports with consecutive
numbers and, as a result, he refused permission for these passengers, who
appeared to be two of the four terrorists, to board the Israeli airline.
Even if technology today is able to signal when two or more passports
with consecutive numbers are presented and screened, it is important to
remember that this event occurred more than 40 years ago, when such
technology was not available, so that the human eye had to replace the
technology which, as mentioned above, was unavailable at that time.
This evidence emphasizes the critical role of human inspection in
observing suspicious behavior such as body-language. Suspicious answers
resulting from questioning (known as the ‘profile system’), based on past
incidents, clearly show that tragic results could have been avoided. These
‘suspicious signs’ cannot be detected efficiently by machinery. On the other
hand, machinery does not suffer from fatigue, erosion, or short-memory
relating to suspicious behavior, or from strikes caused by union policy.
Despite the critical role of human inspection, it has certain limitations,
and the ‘human factor’ does not produce 100 percent results. There have
been cases where ‘passengers’ have succeeded in boarding an aircraft
without a flight ticket (at least on one occasion during the 1990s, a journal-
ist boarded an El-Al flight to Kenya, after bypassing security checks), or,
when a mentally ill male managed to reach the gate at Ben Gurion Airport,
one of the most secure airports worldwide, with a non-valid ticket, after
being inspected by security personnel.
And yet, airport security does not end in the description above. Should
you land at any international airport flying an Israeli airline somewhere
around the world, be sure that many eyes are watching the aircraft. Some
of them are visible. Some of them are watching and monitoring the aircraft
even before touch-down, during taxiing, while parking and during take-off.
These measures are aimed at preventing terrorists from targeting the Israeli
jet using MANPADS or other rocket launchers. Again, the Israeli experience
has shown that terrorists have not given up their efforts to target an Israeli jet,
and launching a missile against the aircraft is one of their favored tactics.17
As to the first threat, Israel faced a wake-up call on November 28, 2002,
when twin SA-7 (Strella) missiles were launched at ‘Arkia’ Boeing 757 flight
582, bound for Tel Aviv from Mombasa. The combination of malfunction
as well as unprofessional activation of the missiles, saved Israel from the
worst aviation catastrophe conducted by terrorists. This incident was the
trigger for offering a defensive system, adopted from a military aircraft,
which deals with this kind of threat by using flares that divert the infra-
red missile from the aircraft. This system, named ‘Flight Guard’, was
not adopted by the Israeli aviation industry for various reasons, but one
disadvantage of the system was that it aimed at confronting first generation
MANPADS such as the SA-7, while terrorists are equipped with modern
and sophisticated missiles, such as the advanced Russian SA-14, SA-16 etc.
or even the American ‘Stinger’ missile. These missiles are equipped with
the technology that enables them to distinguish between the main target,
i.e. the aircraft and flares. During 2015, a new sophisticated system named
‘Magen Rakia’ (‘Sky Shield’), developed in Israel (as well as the Flight
Guard system), was adopted and already installed under the aircraft belly.19
As to the threat of using the aircraft as a flying missile, Israel has
adopted a well-established procedure which is aimed to ensure that no
unidentified aircraft will penetrate the Israeli airspace without being
identified. This system refers to civilian aircraft but also takes into account
CONCLUSIONS
When Leila Khaled tried to hijack the El-Al jet, the captain Uri Bar-Lev
declared that ‘My aircraft will not be hijacked!’
This statement represents, perhaps by the best example, the philosophy
of the Israeli aviation security.
The perception of the Israeli aircraft by the Israeli authorities is far
more significant than just another civilian target. It represents the exist-
ence of the state of Israel despite constant efforts, since the first day of
the creation of the state, to delegitimize its existence. Since the first day
there has been only one successful hijacking of an Israeli jet in July 1968,
Israel has invested enormous efforts in order to establish a proven security
strategy regarding securing the Israeli aircraft. Despite the fact that none
of the Israeli carriers are national flag carriers owned by the government,
the aircraft remain a top target for terrorists who wish to achieve mega-
publicity by managing to target an Israeli aircraft. For them, hijacking-
for-bargaining is no longer a preferred tactic, but rather sabotaging the
aircraft or using a shoulder missile at the aircraft and, in a worse scenario,
using the aircraft as a flying missile, or launching small UAV aircraft and
the horrific but possible option, loading it with WMD.
This chapter emphasized the understanding that only a well-established
synergy between the technological platform and the ‘human eye detection
platform’, can offer efficiency as proven with regard to Israeli history of
aviation terrorism.
Source: Avihai, H., Evolution and Escalation of Aviation Terrorism: From Bargaining Chip
Fashion to Total Destruction Orientation, Ph.D. thesis (2006).
NOTES
1. The first officer, trainee Avner Slapak, was interviewed by the author, during his Ph.D.
research, as to the circumstances of this incident.
2. Evolution and escalation of aviation terrorism: From bargaining chip fashion to total
destruction orientation, Ph.D. thesis (2006), Anglia Ruskin University, UK.
3. Refers to the ‘Nezar Hindawi case’ of April 17, 1986 (Avihai, 2006).
4. Gearty, 1991, p. 10.
5. This incident refers to the PFLP attempt to hijack three aircraft (TWA, SwissAir and
El-Al). As to the Israeli jet, the two hijackers, Patrick Arguello and Leila Khaled, tried
to hijack the Boeing 707 bound for New York from Tel Aviv via Amsterdam. The
presence of an Israeli armed security personnel on board the aircraft, alongside the
courageous maneuvering of the captain, Uri Bar-Lev, prevented this attempt to hijack
the plane. Finally, no less than four aircraft were hijacked including a Pan Am jumbo
jet and a British VC-10 jet (BOAC) and later exploded on the ground (three airplanes
were exploded at an abandon airfield in Zarka, Jordan, while the Pan Am jumbo jet
was exploded at Cairo airport, Egypt, in all these cases, without the passengers being
harmed, who were released in exchange for jailed terrorists in Switzerland and Leila
Khaled in Britain (Avihai, 2006).
6. This sabotage attempt was conducted by Ahmed Jibril, founder of the Popular Front
for the Liberation of Palestine – General Command – PFLP-GC. Jibril’s expertise was
sabotaging aircraft using a barometric trigger. Another interesting point was the fact
that probably Jibril’s ‘finger prints’ were related to the sabotage of the explosion of Pan
Am flight on December 1988 over Lockerbie, with regard to a Libyan-Iranian plot to
target American airlines (Avihai, 2006).
7. This incident is considered as the ‘top incident’ with regard to the establishment of
the Israeli security philosophy which considers the ‘human eye detection’, which will
be introduced broadly in this chapter. The security officer who discovered the hidden
Semtex bomb was interviewed by the author, during his Ph.D. research. This incident is
also well known to Israeli security and decision making, due to what was related to the
Israeli Prime Minister, Yizhak Shamir. who saw this incident, if successfully conducted,
as a ‘Casus Belly’ against Syria, after presenting hard evidence that the Syrian leadership
was involved in this incident (Avihai, 2006).
8. Man Portable Air Defense System.
9. The El-Al captain jet was Uri Bar-Lev, who was captain of the El-Al flight 219 jet that
was planned to be hijacked on September 6, 1970 (Avihai, 2006).
10. This incident marked the beginning of the development of an airborne counter missiles
system, first named ‘Flight guard’ and the latest system named ‘Magen Rakia’ [Sky Shield],
which has already been installed on an Israeli aircraft on specific routes (Avihai, 2006).
11. The Sabena incident is considered to be the first ever successful commando assault on a
hijacked aircraft (Avihai, 2006).
12. For further discussion as to the synergy of technological and personnel detection
platform, see Avihai, 2007.
13. Israel was not the pioneer in assigning armed personnel on board, but so far, generally
speaking, Israel is the only state where this practice is an integral element of an interna-
tional commercial flight (Avihai, 2006).
14. During the author’s flights abroad, he always watches the cockpit door, counting the
times that the door is opened during flight, and monitoring the cabin crew’s operation
with regard to securing the cockpit while the door is opened. Some additional measures
were taken especially after the 9/11 attack, and yet, the measures taken are not compa-
rable to the measures taken on board an Israeli flight.
15. The record player bomb was given to two unwitting English female passenger accom-
plices (Avihai, 2006).
16. Captain (Ret.) Uri Bar-Lev was interviewed by the author on March 9, 2005.
17. Further discussion will focus on the counter-missile systems, installed on board the
Israeli jets.
18. The 9/11 attack was the first successful attempt, but it is important to emphasize that
previous attempts were foiled, such as the ‘Bojinka Plot’ of December 11, 1994 or the
Air France hijacking at Algeria on December 24, 1994.
19. The author flew in a domestic flight with an Airbus jet operated by ‘Israair’ airline, and
saw the Sky Shield system. This is a small system whose main advantage, besides its
capability to confront advanced shoulder missiles, also has the possibility to be taken
off and placed in another airplane within one hour. This function allows it to be trans-
ported easily with no need to equip each aircraft with the system, but only on high-risk
flights or on specific routes.
20. http://www.iaa.gov.il/he-IL/rashot/projects/Pages/HBS-system.aspx.
21. Richard C. Reid (28) also named Abdul Raheem, a member of Al-Qaeda, boarded the
jet with 10 ounces of plastic explosives (TATP – Triacetone Triperoxide) hidden in his
shoes. Reid had attempted to board the same flight the previous day, December 21, the
13th anniversary date of the Pan Am bombing (December 21, 1988), but he was delayed
by suspicious French authorities. There is evidence that on December 11 the FAA had
issued a warning to airlines that someone might attempt to board an aircraft with a
weapon in a shoe. In addition, there is evidence that the original plan was to blow up
two US jets in mid-air simultaneously. The other terrorist, Saajid Mouhammed Badat
(25), decided to withdraw from the plot. He was convicted in a British court on April 23,
2005 and sentenced to thirteen years for his role in assisting Reid after admitting that he
planned to bring the bomb on board (Avihai, 2006).
REFERENCES
INTRODUCTION
Air transport is one of the most important drivers of the world economy.
However, in recent years, it has become an easy target for terrorist attacks.
Hence, a safe and secure aviation system is a critical component of a
country’s overall economic development (Atanasov and Chenane, 2013;
Elzawi and Eaton, 2016). The importance of the aviation industry in
the economic development of Kenya and the rest of Africa cannot be
gainsaid. At present, aviation remains the safest, fastest and most reliable
form of transport in the world. Air transport is an important facilitator of
economic activity and trade. As such, airports are not just communication
hubs but are the core of both regional and international trade. The slow
aviation infrastructure development pace in Africa, therefore, has implica-
tions not just for the aviation industry but also for African development in
general. Understanding the role security plays in assuring passenger and
operator confidence has convinced many that adequate security is crucial
to the aviation sector’s ability to deliver and to sustain a sound aviation
industry and vibrant economies.
As Wells and Young (2004) observe, the most significant issue faced by the
airport in the 21st century is airport security. Airport security concerns all
areas and all users of the airport, not limited to travelers, airport police force
and so on. To guarantee airport security, different procedures are designed
to detect, prevent and respond to chemical acts. Airport security includes
an array of techniques and methods used in protecting airports and aircraft
from crime. Large numbers of people pass through airports. Such gatherings
present a target for terrorism and other forms of crime. Similarly, the high
concentration of people on large airliners, the potential high mortality rate
of attacks on aircraft, and the ability to use a hijacked airplane as a lethal
weapon provide an alluring target for terrorism (Wells and Young, 2004).
This chapter begins by discussing recent trends in air transport in
Kenya. The expansion of aviation industry as witnessed by growth of
airports and increase in volume of passenger and cargo traffic is examined.
180
The chapter then critically examines air transport security in Kenya. This
is achieved by, firstly, discussing the air transport security situation in the
country and, secondly, by examining the main challenges faced in address-
ing aviation security. It then proceeds to discuss possible solution options
to address air transport security issues in the country such as adoption of
International Civil Aviation Organization (ICAO) standards, establishing
Aviation Security (AVSEC) mechanisms and cooperation with other
African states. The chapter concludes by suggesting policy issues that
need to be considered urgently in the country to ensure that the aviation
industry is secure in the future.
Being a major mode of long distance transport within and between nations,
air transport is a crucial facilitator of economic development for any coun-
try. Air transport has become increasingly important to the economy of
Kenya. At present, it is the second most important transport service in the
country in terms of its share in the total value of output from the transport
sector (Government of Kenya, 2009; Gitau, 2011). The aviation sector in
the country has recorded significant growth in the recent past, both in
passenger and cargo transport. The aviation industry in Kenya is highly
competitive and heavily dominated by foreign investors. It consists of the
national airline (Kenya Airways), over 15 foreign commercial airlines with
regional offices in the country, 27 other foreign airlines which operate in
the country but without regional offices, and 13 other local private airlines.
The leading international airlines, including British Airways, Air France,
KLM, Swissair, Alitalia and South African Airways, fly in and out of
Kenya. Some of the firms offering charter services in Kenya are owned by
locals, often in partnership with foreign investors (Gitau, 2011).
Kenya has more than 200 airports and airfields, 15 of which have paved
runways, including four with runways longer than 3,000 meters. About 35
airfields can be considered commercial. Four airports handle international
flights: Nairobi’s Jomo Kenyatta International Airport (JKIA), Mombasa’s
Moi International Airport (MIA), Eldoret International Airport and
Wajir International Airport (KAA, 2010). Other facilities include Wilson
Airport in Nairobi; airports at Malindi, Kakuma and Kisumu; and numer-
ous airstrips throughout the country. The Northern Corridor Transport
Improvement (NCTI) project approved in mid-2004 included US$41
million for aviation. The funds were earmarked to enhance facilities and
safety at JKIA and MIA, including perimeter fencing, new navigation,
security and baggage-handling equipment (European Union, 2009).
Airport Security
In the earliest days of air travel, there were no threats to the sector. People
moved around the airport or boarded their flight(s) without feeling threat-
ened and, hence, aviation security was only a minor concern. However,
with the increasing number of aviation attacks globally, the concept of
aviation security is now high on the list of priorities, especially after the
September 11 attacks (KCAA, 2012).
Location of airports
The location of most airports in Africa renders them particularly vulner-
able to missile attacks. Most approaches to runways in Africa are located
in bushy areas or residential areas with a high density of population that
is difficult to police and susceptible to acts of unlawful interference. This
Stakeholder Roles
Regulators Implement Annex 9 and 17 Standards in National Aviation
regulatory framework
Develop and ensure implementation of NCASP and/or
National Air Cargo Security Programs
Develop Regulations and provide oversight
Approve Security Programmes for RAs, A/c Operators and
Airport
Provide guidelines to stakeholders
Conduct validation at origin and transfer points
Balance between security and facilitation
Certification, continuous monitoring and enforcement on
supply chain entities
Maintenance of a database on RAs and KCs as applicable
KCs/Shippers Originator/sender of cargo/goods
Develop and implement SOPs in line with the NCASP
Secure premises and security culture
Apply security controls during handling, packaging,
storage of cargo for air transport
Secure loading and transport (if applicable)
Hauliers To read, sign and implement Haulier Security Protocols
developed by the Regulator
Validation and monitoring may be conducted by RAs or
KCs under Regulator’s direction
Security awareness training
RAs Develop and implement RASPs and SOPs in line with the
NCASP and/or national regulations
Apply security controls and account for security status of
consignments
Background checks and training of staff
Creating and maintaining an audit trail
Could be Freight Forwarders, Airlines, GHAs
Secure premises, handling facilities, transport system
Installation of ICT (EDI) infrastructure to support cargo
data exchange
Designation of KCs (if delegated by the Regulator)
Transport logistics
Airport operator Develop and implement cargo security standards in ASPs
Provide the requisite infrastructure for cargo handling and
flow:
● Security to airside, access points, ramp security
● Background checks and training of staff
● Not to forget infrastructure for transfer cargo
Stakeholder Roles
Airlines De-facto RAs
Develop and implement cargo standards in AOSPs
Ensure secure cargo process flow
Background checks and training of staff
Installation of ICT Infrastructure to support cargo data
exchange
Security of cargo during transfer
Security of cargo on the ramp, during loading and
unloading
Air transportation for cargo on Pax A/c or All-Cargo A/c
Designation of KCs (if delegated by the Regulator)
Note: AOSPs = Aircraft Operator Security Programs; ASPS = Aircraft Security Programs;
EDI = Electronic Data Interchange; ICT = Information, Communications and Technology;
GHAs = Ground Handling Agents; KC = Known consignor; NCASP = National Civil
Aviation Security Program; RA = Regulated Agent; RASPs = Regulated Agent Security
Programs; SOPs = Standard Operating Procedures.
Technology
Instead of imposing burdens on passengers who are required to report
many hours before their flight for security screening, Kenyan airports
could adopt a better approach of making use of improved technology,
such as the following:
POSSIBLE OPTIONS
In order to enhance air transport security in Kenya, there is need for the
country to implement ICAO standards and to cooperate with other East
African Community (EAC) members and also implement the AVSEC
mechanism.
ICAO Standards
to acts of unlawful interference. It also requires that each member state has
as its primary objective the safety of passengers, crew, ground personnel
and the general public in all matters related to safeguarding against acts of
unlawful interference with civil aviation (Milde, 2008). Annex 17 further
imposes on all member states the development of a National Civil Aviation
Security Program and the creation of a governmental organization commit-
ted to aviation security, such agency to develop and implement appropriate
regulations. In addition, member states must develop ‘a security-training
platform, share aviation threat information, and otherwise cooperate with
other [ICAO Member] states on their national security programmes’.
International aviation security cooperation is strongly advocated by
ICAO and unanimously supported by its member states due to the
cross-boundary nature of aviation security threats. International aviation
measures are stipulated in the ICAO SARPs relating to the prevention or
deterrence of unlawful acts of interference against civil aviation, particu-
larly Annex 17, for security. These call upon all states to use clearly estab-
lished criteria for risk assessments extended beyond international flights to
include intra-state flights. The objective is the establishment of a National
Civil Aviation Security Program (NCASP) or other appropriate document
by each contracting state that appropriately defined the responsibility for
evaluation and implementation of civil aviation security.
Annex 17 to the Chicago Convention identifies acts of unlawful inter-
ference: or attempted acts likely to jeopardize the safety of civil aviation
and air transport, such as unlawful seizure of aircraft in flight, unlawful
seizure of aircraft on the ground, hostage-taking on board aircraft or at
aerodromes, forcible intrusion on board an aircraft, at an airport or on
the premises of an aeronautical facility, introduction on board an aircraft
or at an airport of a weapon or hazardous device or material intended
for criminal purposes, and communication of false information such as
to jeopardize the safety of an aircraft in flight or on the ground, of pas-
sengers, crew, ground personnel or the general public, at an airport or on
the premises of a civil aviation facility.
Kenya is a signatory to the Chicago Convention, and in accordance with
Article 37 of the Convention, she is obligated to comply with the ICAO
SARPs. The Kenya Civil Aviation (Amendment) Act was enacted on
October 24, 2002 and became effective on the same day. The Act amended
the Civil Aviation Act Cap.394 of the Laws of Kenya and established the
KCAA as an autonomous corporate body that took over the functions of
the Directorate of Civil Aviation (DCA) and the licensing of air services
previously under Civil Aviation Board (CAB). It performs two broad key
functions; to provide air navigation services in Kenya’s Flight Information
Region (FIR) and to regulate the aviation industry in Kenya.
The EAC Civil Aviation Safety and Security Oversight Agency (CASSOA)
African states have co-operated with other member states for the improve-
ment of aviation security. One such cooperation is the East African
Community Civil Aviation Safety and Security Oversight Agency (EAC
CASSOA). EAC CASSOA was established and commenced operations on
June 1, 2007, as an autonomous self-accounting body of the EAC follow-
ing the signing of the Protocol for the Establishment of EAC CASSOA by
the three founder Partner States of Kenya, Uganda and Tanzania on April
18, 2007. Rwanda and Burundi have since harmonized their civil aviation
laws in line with EAC CASSOA. The major challenge facing the EAC is to
ensure safe, secure and efficient civil aviation for travel within the Partner
States as well as to and from other parts of the globe. The establishment of
EAC CASSOA in EAC provides a common framework and mechanism for
the Partner States to fulfill their international safety and security oversight
obligations as provided by the Convention in an effective and efficient way.
The purpose of EAC CASSOA is to help Partner States meet the require-
ments of the ICAO. This involves developing consensus among the Partner
States, coordinating activities, sharing technical expertise and facilities,
and achieving effective oversight of civil aviation safety and security.
AVSEC Mechanism
Over the years, various initiatives have been made in order to enhance
aviation security in Africa. In each of these initiatives, Kenya has been
actively involved. These include:
In this chapter, it has been established that air transport security is a major
challenge facing each country throughout the world and Kenya is not an
exception. It has also been observed that providing adequate security for
air passengers, cargo, planes and infrastructure is a much more daunting
task for Africa than other regions. This is because of location of airports,
poor and/or inadequate screening equipment and lack of well-trained
personnel especially in the AVSEC mechanism. Despite the challenges
faced, Kenya like other countries in Africa has made strides with assistance
of ICAO to enhance security at her airports.
It should be appreciated that no one agency, airline, or government has
all the answers for improving aviation security. Therefore, the way forward
must be through broad partnerships between governments and stakehold-
ers in the aviation industry in which no country is left out. If one country
is left out then the global security chain will be weakened.
Given the real threat to aviation security worldwide, all ICAO member
states (including Kenya) should start using armed pilots on some flights,
and armed undercover officers on passenger flights. Greater effort should
also be made by aviation authorities in Kenya, Africa and the rest of the
world to sensitize air passengers on how best to prevent any terrorist
attacks on flights.
REFERENCES
12.1 INTRODUCTION
199
put air transport security at the forefront of air transportation agenda and
policy in high level conferences taking place around the world.
In terms of the eight tragedies (Appendix), five involved Asian carriers
– Malaysia Airlines (MAS), AirAsia (AA) and TransAsia (TA). Media
reporting in 2014 to present has mainly focused on the infamous tragedies
involving two MAS flights. The public has criticized and questioned
the safety and security of MAS (a Malaysian national carrier) and
more importantly Malaysia’s current security practices and accountability.
Malaysia’s safety and security in civil aviation came into question in early
2014 as a result of two major incidents resulting in 537 deaths involving
the national carrier.
The Malaysian national carrier, MAS, was formed in 1937, when
the Straits Steamship Company and Imperial Airways formed Malayan
Airways Limited in Malaysia (Christina 2015). The company’s first com-
mercial flight was in 1947 (Khazahnah Nasional 2014). MAS has been
operating for 79 years and flies 40,000 passengers on 330 flights each day
to 50 destinations (Bishop 2014).
In the last decade, MAS was known in the aviation community as an
excellent service provider holding more than 100 awards (Kim 2014)
from industry groups such as Skytrax UK and the World Travel Awards
for the quality of MAS cabin crew, food and general excellence (Jansen
2014). From 2014 onwards, MAS has not won any international accolades
(Jansen 2014).
In terms of air transport security, the Malaysia has had a total of six
reported aviation accidents in the last 40 years (Table 12.1). Before 2014,
MAS had one of the best safety records in the aviation industry with just
two fatal tragedies in 58 years (Jansen 2014) (Table 12.1). However, the
long held positive perception the carrier had as a competent safe air travel
service provider dramatically changed for the worst on March 8, 2014.
Any threat to safety can cause a decrease in, or total absence of tourist
activity not only in a particular hostile destination, but also very often in
neighboring regions or countries (Cavlek 2002). Tourist perceived safety is
considered a prerequisite in travel decision making (Pinhey and Iverson 1994;
Pizam et al. 1997; Roehl and Fesenmaier 1992; Sönmez et al. 1999; Sönmez
and Graefe 1998), specifically poor perceived safety has been found often
to act as a deterrent to international travel (Floyd et al. 2004; George 2003).
Despite rising passenger volume entering Malaysian airports, the eco-
nomic backlash post MH370 was estimated to sum up to a loss of RM120
million affecting travel and related industries in Malaysia as a result
of outrage and avoidance of Malaysia by Chinese tourists2 over events
surrounding flight MH370 (Kong 2014). Evidently, safety perceptions
influenced the sudden change in demand in 2014 for MAS specifically.
Notes:
1 The table indicates that ASK has increased by 1.2%, which means MAS utilization
of the fixed number of aircraft seats has improved from 2013 to 2014, this could be
because of lower priced tickets and reduction of flight routes offered by MAS after
the disappearance of MH370. Whereas, the other KPIs indicate that overall passenger
numbers have decreased from 2013 to 2014 based on a low RPK, load factor and
passengers carried.
2 Revenue Passenger Kilometre (RPK) measures passenger traffic. RPK = number of
paying passengers x kilometers flown.
3 Available Seat Kilometer (ASK) indicates the extent to which an airline is utilizing the
fixed number of seats in terms of number of kilometers flown. If all of the seats on
the plane are not sold, then the ASK of the airline is operating at below capacity. Long
instances of unavailable seats on an airline can cost an airline millions of dollars. ASK =
The number of seats available for sale x number of kilometers flown.
4 Load factor measures the capacity utilization = RPK/ASK.
Before the MAS tragedies, airline safety was not on the top of the minds
of most passengers because safety is taken for granted by consumers
(Iyengar 2015). Post MH370 and MH17, safety of MAS will act as a factor
which will influence traveler’s purchase intentions (Iyengar 2015). In fact,
on September 2014, MAS reported a drop in revenue per passenger, load
factor and number passengers carried around 12–13 percent in compari-
son to 2013 (Table 12.2) (CAPA 2014).3
When a customer avoids a company, this has severe consequences for a
company’s bottom line. According to industry reports, this has been the
case for MAS. In the first 10 days after the MH370 tragedy, the company
saw a huge commercial impact with 10 straight days of an average of
100,000 cancellations a day (Manjur 2015). Today’s security perception of
Malaysian civil aviation has changed as a result of unprecedented compli-
cations involving MAS flight MH370 and flight MH17 in 2014.
Aviation professionals believe that the public awareness of air travel risk
and airline safety increased, as a result of the hyperbolic media reporting
after the disappearance of MH370 (Beardmore 2015). Indirect exposure to
the air travel tragedies was largely through media and this includes both:
(1) media coverage of the actual tragedies of 2014 and 2015; and (2) the
subsequent weeks of coverage that reviewed a particular air travel tragedy
in greater detail divulging the consequences regarding injured and dead
passengers, which often entailed images of destroyed aircrafts.
Statistically, consumers are aware that there is little chance that the same
situation will ever happen again, however logical information steps aside
for more emotional information when our body is giving us information on
whether there is danger or not (Aeronewstv 2014). Hence, all people need
to see are pictures of planes crashing of one company or more and these
images will have a forceful impact on the mind (Aeronewstv 2014). Thus,
a single event or a series of tragedies involving an airliner can increase risk
perception, safety concerns and erode the favorable image of a brand and
ultimately impact future revenue and profitability. Humans are far more
sensitive to risk that is catastrophic, which kills people all at once in one
place (e.g. plane crash) than individuals are about risks which is chronic,
where the victims are spread out over space and/or time (e.g. smoking)
(Grose 1995).
Conversely, based on statistics, flying by air is less risky than other
transportation modes. For instance, riding a motorcycle is more than 3,000
times more likely to cause harm than flying (Bennett 2015). In addition, it
should be noted that there is a global downward trend of number of airline
fatalities since 1946 (Figure 12.1) whereas there is an upward trend in the
number of flights taking off (Figure 12.2). Such statistics absolutely put air
travel risk into perspective. Based on the aforementioned metrics, there is
no question that flying is a less risky way to travel than other transporta-
tion modes.
Nonetheless, research shows that risk perception is not a matter of
numeric facts (Reichel et al. 2009; Grose 1995). When a well-publicized
crisis occurs, consumers are made aware of the possible harm and physical
threat to their wellbeing (Grose 1995).
According to Bennett (2015) and Beardmore (2015), the 2014 MAS
disasters have twisted the perception of airline safety and air travel risk. As
events continue to spiral on and relations between Malaysian air transport
service providers and customers become strained, it raises the question
of what impact MH370’s disappearance and MH17 missile shooting in a
conflict zone have on the air transport industry’s security. Perhaps the most
pressing question is: What are the air transport industry and governing
bodies doing in terms of air transport security in Malaysia?
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
Source: Tolan et al. (2014).
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
2,429
1976
1977
1978
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
761
2014
Air transport security in Malaysia 205
60M
59M
45M
30M 30M
29M 28.8M 27.8M 29M
27.3M 27.5M
15M
The objective of this chapter is to discuss the present state of air transport
security in Malaysia with a focus on aircraft flight tracking and conflict zone
risk. In order to meet this objective, the chapter is divided into four sections:
Malaysia’s civil aviation industry (section 12.2), commercial aviation inci-
dents in Malaysia (section 12.3), air transport security in Malaysia (section
12.4), and challenges, implications and recommendations (section 12.5).
100 millions
85M
81M
80 millions
Number of passengers
65M 68M
60 millions 59M
40 millions
20 millions
divide between East and West Malaysia. Today, civil aviation is an integral
part of Malaysia’s economy and vision to be a developed nation (referred
to as wawasan 2020 or vision 2020) (Ehambaranathan et al. 2015; Soltani
et al. 2015; Eriksson 2015).
Malaysia’s Vision 2020 aspirations are economically supported by the
country’s goal and strategy to be a leading aviation nation in Asia Pacific.
Most recent reports suggest that the civil aviation sector contributes RM7.3
billion (1.1 percent) to the Malaysian gross domestic product (GDP) (Oxford
Economics 2011). In addition, there are RM17.2 billion in ‘catalytic’ benefits
through tourism, which raise the overall contribution of the civil aviation
sector to RM24.5 billion or 3.6 percent of the Malaysian GDP (Oxford
Economics 2011). A total of 345,000 Malaysian people are employed at pres
ent as a result of the catalytic effects of civil aviation (Khazahnah Nasional
2014). All these points together demonstrate the significance of aviation and
the benefits to the Malaysian economy. Thus, the Malaysian government
continues to support liberalization (through policies such as the open skies
agreement) and structural transformation (i.e. meeting air traffic volume by
developing a new airport called KLIA 2 and ultimately increasing airport
space) (Department of Civil Aviation Malaysia 2015a).
Moreover, studies have shown that the national carrier, MAS contrib-
utes an estimated RM6.9 billion toward the annual GDP (Khazahnah
Nasional5 2014). Experts explain that the aviation industry has one of the
highest economic multipliers of any industry – 12x, versus the typical 1–3x
of other industries (Khazahnah Nasional 2014). Therefore, the aviation
industry holds great economic importance to Malaysia. Furthermore,
Khazahnah Nasional (2014) asserts that for every one person employed by
MAS, another four jobs are created elsewhere in the economy (Khazahnah
Nasional 2014).
Thus, based on the evidence above, the critical importance of the air
transportation industry thriving for Malaysians and MAS cannot be
understated. Civil aviation provides much to the nation’s economy con-
necting Malaysia and her people to global markets, facilitating trade,
expanding export markets, and generating tourism (Department of Civil
Aviation Malaysia 2015a).
However, recent commercial aviation incidents in Malaysia (explained
in section 12.3) have disrupted the air transportation industry. As result of
such incidents, the industry has faced economic loss and negative percep-
tions. Problems in air transport security in Malaysia have caused disorder
in both Malaysian and global civil aviation.
12.3
COMMERCIAL AVIATION ACCIDENTS IN
MALAYSIA
Note: 1 The transponder – which identifies the plane and transmits its altitude and
location to ground controllers – was turned off at 1.21 a.m. local time as the aircraft flew
into Vietnamese airspace from Malaysian air traffic control over the South China Sea, a
vulnerable point noted by aviation experts in a Reuters report as Malaysian and Vietnamese
controllers could assume that the plane was the other’s responsibility.
Source: Table adapted from Office of the Chief Inspector of Air Accident Ministry of
Transport Malaysia (2014).
12.4
AIR TRANSPORTATION SECURITY IN
MALAYSIA
212
• Provides flight location data at
least once per minute
• Controllable by flight crew
• Multiple solutions Airline
Aircraft Tracking
Normal Operations
• Possible Subset of ATS
surveillance
• Used for Airline Operational ATS/RCC
function
• Controllable by Flight Crew
• Multiple solutions
SWIM
Figure 12.4 Global aeronautical distress and safety system formulated by ICAO
25/07/2018 10:56
Air transport security in Malaysia 213
There are 13 divisions in DCA, which report to the director general of the
DCA5 (Department of Civil Aviation Malaysia 2015d). This chapter only
focuses on Aviation Security Division (ASD).
ASD’s main responsibility is safeguarding domestic and international
civil aviation against acts of unlawful interference (Department of Civil
Aviation Malaysia 2015b). ASD’s responsibilities are guided by ICAO
Annexes 9, 17, and 18 and DOC 8973 and DOC 9284. ASD heads six sub-
divisions (aviation security program, transportation of dangerous goods
by air, investigation, intelligence, training certification, annual audit); each
sub-division has its own independent function as displayed in Table 12.4.
12.5
CHALLENGES, IMPLICATIONS AND
RECOMMENDATIONS
Recommendations in civil aviation are formulated through international
collaborative effort via organizations and governments (rather than local
institutions working alone) based on real-life challenges and implications
faced by air travel service providers. In the case of flights MH370 and
MH17, recommendations were put forth by ICAO, IATA and DSB
for two main challenges – aircraft flight tracking and conflict zone risk
mitigation.
Further, the flight MH370 tragedy has focused the world’s attention and
exposed areas that previously were not seen to be high risk in the past.
In March 2016, ICAO Council adopted new provisions for distress flight
tracking. The provisions focus on three key areas:
The principle governing the MH17 incident lies in Article 3 of the Chicago
Convention. Abeyratne (2014, p. 1). Article 3 articulates that Annex 3
states that contracting states recognize that every state must refrain from
resorting to the use of weapons against civil aircraft in flight and that, in
case of interception, the lives of all persons on board and the safety of
aircraft must not be endangered.
According to MH17 investigations (conducted by DSB under the
compliance of the Chicago Convention), the aviation parties involved in
the MH17 incident did not identify the risks of armed conflict in Eastern
Ukraine. The DSB articulates three civil aviation best practices to be
adopted after the conclusion of the MH17 investigation:
by ICAO and draw upon input from all member states35 (ICAO Journal
2015b). Additionally, ICAO has also revamped the risk assessment process
for airlines by including factors that increase risk in conflict zones:
DSB has pointed out that the focus of risk assessment has typically been
on ground (place of departure and destination); this is addressed in Annex
17 of Chicago Convention (Dutch Safety Board 2015). However, Annex
17 does not explicitly include the assessment of potential threats in foreign
airspace at cruising altitude.36 Due to the past Annex 17, operators have
focused on the safety of their take-off and landing locations (Dutch Safety
Board 2015). Hence MH17 reveals a lack of regulations related to risk
management in relation to upper airspace (Dutch Safety Board 2015).
In order to facilitate an effective assessment of the risks posed by
conflict areas based on the threat analysis, ICAO in 2015, identified a
number of factors (listed above) that increase risk for a civil aircraft being
shot down (Dutch Safety Board 2015). These factors need to be included
in states’ and operator’s risk analysis.
IATA published for the 9th edition of the IOSA Standards Manual (ISM)
on September 1, 2015, the issues of over flight of armed conflict zones
(IATA 2016b). The guidance material relating to IOSA Standard DSP
1.12.2 was amended to include armed conflict zones (IATA 2016b, p. 4):
DSP 1.12.2: The Operator shall have a safety risk assessment and mitigation
program in the organization responsible for the operational control of flights
that specifics processes to ensure:
(i) Hazards are analysed to determine the corresponding safety risks to aircraft
operations;
(ii) Safety risks are assessed to determine the corresponding safety risks to
aircraft operations; and
(iii) When required, risk mitigation actions are developed and implemented in
operational control.
Guidance:
. . .
Hazards are relevant to the conduct of aircraft operations are typically associ-
ated with: . . .
● Operations in airspace affected by armed conflict.
Operator accountability
In aviation today, it is not clear which flight routes pass over which conflict
zones. Airlines should provide public accountability for flights chosen, at
least once a year (Dutch Safety Board 2015). DSB also recommends that
IATA ensure that IATA members agree on the method to publish informa-
tion regarding flight routes over conflict zones and making operators
accountable for that information (Dutch Safety Board 2015).
Whilst DSB appreciates the essential need for information and intel-
ligence which may affect the safety of passengers and crew, DSB also rec-
ognizes the highly complex and politically sensitive area of international
coordination required for conflict zone risk assessment (IATA 2016b).
However, IATA has responded by not making such prominent changes
as recommended by DSB on transparent operator accountability practices
regarding conflict zones and flight routes. Instead, IATA believes that
providing the public with access on IATA’s website of members with IOSA
certification is sufficient. This is because the IOSA certification today now
includes over flying conflict zones risk in the risk analysis of an airline
(IATA 2016b).
There were several problems that arose in locating the physical aircraft of
flight MH370. Firstly, there was the absence of conventional data such as
the aircraft’s last known position, altitude, speed, actual flight route (ICAO
NOTES
1. Revenue Passenger Kilometers measures actual passenger traffic, specifically the sales
volume carried by IATA members. RPK = the number of revenue-paying passenger
onboard a flight? distance travelled in kilometers.
2. 153 out of 239 of passengers onboard were Chinese.
3. MAS delisted from the stock exchange on December 12, 2014. Performance results of
2015 are not available.
4. International governing body of aviation, part of the United Nations.
5. Khazahnah Nasional is the wealth fund or investment arm of the Government of
Malaysia.
6. Kuala Lumpur International Airport.
7. A device identifying jets to ground controllers.
8. This Annex conveys aircraft accident and incident investigation.
9. Part XII conveys Investigation of Accidents in Malaysian Civil Regulations 1996.
10. NTSB is the state member of ICAO that represents state of design and manufacture of
the aircraft in this situation.
11. AAIB is the state member of ICAO that represents state of design and manufacture for
the aircraft engines in this situation.
12. There was only a no-fly zone which was in place up to 32,000ft.
13. 9N314M warhead installed on the Buk surface-to-air missile system.
14. Other scenarios that could have led to the disintegration of the airplane were consid-
ered, analyzed and excluded based on the evidence available.
15. Based on preliminary findings, there were no technical and operational issues found
with aircraft or crew prior to ending of voice recordings. Damage in the forward section
of aircraft suggests that the aircraft was penetrated by a large number of high-energy
objects from outside the aircraft.
16. State of Registry and state suffering fatalities.
17. State of Design and Manufacture.
18. State having suffered fatalities.
19. State having suffered fatalities.
20. On September 3, 2015, French officials conveyed that the flaperon debris found on
Reunion Island belonged to the MH370 plane. To present day, investigation has been
discontinued by the governments involved because there has been little success in
concluding the reason for flight MH370 disappearance in the three-year investigation.
21. MAS flight MH370, MAS flight MH17, TransAsia Airways flight GE222, Air Algerie
flight AH5017, Indonesia Air Asia flight QZ8501, TransAsia Airways flight GE235,
Germanwings flight 9525, Metrojet flight 9268.
22. Established by Article 44 of the Chicago Convention signed at Chicago on December 7,
1944. ICAO has 191 contracting states.
23. Malaysia Airlines is the only Malaysian carrier that is an IATA member, this means
AirAsia and Malindo Air are not IATA members.
24. The Convention establishes rules of airspace, aircraft registration and safety, and details
the rights of the signatories in relation to air travel; it also exempts air fuels from tax.
25. There are 96 articles which establish rules on airspace, aircraft registration, safety and
details of the rights of state members who have signed the Chicago Convention. The
Convention also details issues and recognition of certificates of airworthiness, operating
certificates and licenses.
26. ICAO sets objectives for safety in the Global Aviation Safety Plan (GASP) which is
coordinated and supported by regional implementation under ICAO’s regional aviation
groups or Tactical Air Support Groups (TASGs).
27. The 37th Session of ICAO Assembly of the International Civil Aviation Organization
(ICAO) held on September 28, 2010 officially recognized that ICAO has three stra-
tegic objectives: safety, security and environment protection and sustainability of air
transport.
28. State Safety Programme is an integrated set of regulations and activities aimed at
improving safety.
29. IOSA stands for IATA Operational Safety Audit.
30. These regulations come into operation on March 31, 2016.
31. A process established by the operator that maintains and updates at standardized
intervals a ground based record of the four dimensional position of individual aircraft
in flight.
32. This principle applies that every state is responsible for its own airspace and determines
independently how and by whom the airspace is used.
33. A body that addresses issues related to safety and security of civil aircraft operating in
airspace affected by conflict to study concepts for sharing risk data and create guidance
for developing risk assessments that states can use to decide when to issue warnings or
close airspace.
34. NOTAM stands for an unclassified notice filed with an aviation authority to warn
aircraft pilots of potential hazards along a flight route or at a location that could affect
the safety of the flight. NOTAMs are created and transmitted by government agencies
and airport operators under guidelines specified by Annex 15.
35. Only certain users will be able to add data, and ICAO says it will not be responsible for
information from anonymous sources.
36. It does not prevent states from assessing on air risks if necessary.
37. Uses existing equipment and re-purposes air traffic control data. This ground-based
software upgrade allows airlines to follow aircraft positions and identify any unexpected
deviations or gaps in position reports. Because it utilizes existing equipment, the
solution is highly cost effective. SITA OnAir has designed a solution that works using
the AIRCOM Server ACARS message handling system, which airlines already have
in place, so the cost and disruption are minimal. AIRCOM FlightTracker enables the
airline to proactively obtain ADS-C tracking data immediately when it detects a gap in
data from other sources.
REFERENCES
com/solutions-engineering-ever-safer-greener-and-connected-mobility-vehicles/
safety-root-group-s-call-de>.
Brown, V. 2014, ‘Aviation safety, security improvements crucial, Liow tells ICAO
Council’ Nation/The Star Online, accessed May 9, 2016, from <http://www.thestar.
com.my/news/nation/2014/10/28/liow-at-icao-speech/>.
CAPA. 2014, ‘Malaysia Airlines 1H2015 outlook: more losses as capacity levels are
maintained prior to transition’, Centre for Aviation, accessed December 15, 2014,
from <http://centreforaviation.com/analysis/malaysia-airlines-1h2015-outlook-
more-losses-as-capacity-levels-are-maintained-prior-to-transition-201123>.
Cavlek, N. 2002, ‘Tour operators and destination safety’, Annals of Tourism Research,
vol. 29, pp. 478–96.
Chong, A. and J.Y. Chang. 2016, ‘Security competition by proxy: Asia Pacific
interstate rivalry in the aftermath of the MH370 incident’, Global Change, Peace
and Security, vol. 28, no. 1, pp. 75–98.
Christina, L. 2015, ‘The importance of cultural intimacy in airlines cabin operations
and its impact on passenger satisfaction: a case study on Singapore airlines’, accessed
July 10, 2016, from <http://www.academia.edu/12363093/The_Importance_of_
Cultural_Intimacy_In_Airlines_Industry_Case_Study_Singapore_Airlines>.
Constable, S. 2015, ‘ICAO Asia/Pacific SAR Task Force Bangkok, Thailand,
6–10 July 2015’, accessed July 12, 2016, from <http://www2010.icao.int/APAC/
Meetings/2015%20APSARTF4/IP04%20Presentation%20GADSS%20Overview.
pdf>.
Croft, J. 2015, ‘ICAO on path to improved flight tracking, conflict zone alerts’,
Aviation Week Network, accessed May 10, 2016, from <http://aviationweek.com/
commercial-aviation/icao-path-improved-flight-tracking-conflict-zone-alerts>.
Department of Civil Aviation Malaysia. 2006, ‘Laws of Malaysia: Civil Aviation
Act 1969’, accessed July 10, 2016, from <http://www.dca.gov.my/wp-content/
uploads/2015/02/civil-aviation-act-1969.pdf>.
Department of Civil Aviation Malaysia. 2015a, ‘Malaysia: A vital hub in the
Asia Pacific region’, accessed July 12, 2016, from <http://www.dca.gov.my/wp-
content/uploads/2015/02/SP_Malaysia_final.pdf>.
Department of Civil Aviation Malaysia. 2015b, ‘Aviation Security’, Department of
Civil Aviation Malaysia, accessed July 12, 2016, from <http://www.dca.gov.my/
sectors-divisions/aviation-security/>.
Department of Civil Aviation Malaysia. 2015c, ‘Director General of Civil Aviation’,
accessed May 1, 2016, from <http://www.dca.gov.my/about-dca/director-general
-of-civil-aviation>.
Department of Civil Aviation Malaysia. 2015d, ‘Organisation Chart/Department
of Civil Aviation Malaysia’, accessed July 12, 2016, from <http://www.dca.gov.
my/about-dca/organisation-charts/>.
Department of Civil Aviation Malaysia. 2016, ‘Civil Aviation Regulations 2016’,
Department of Civil Aviation Malaysia, accessed May 10, 2016, from <http://
www.dca.gov.my/civil-aviation-regulations-2016/>.
Dutch Safety Board. 2014, Preliminary report crash involving Malaysia Airlines
Boeing 777-200 flight MH17, The Hague, accessed from <http://www.dca.gov.
my/publications/>.
Dutch Safety Board. 2015, ‘Investigation crash MH17, 17 July 2014 Donetsk’,
accessed July 10, 2016, from <https://www.onderzoeksraad.nl/en/onderzoek/2049/
investigation-crash-mh17-17-july-2014/publicatie#fasen>.
Ehambaranathan, E., S. Chalapati and S. Murugasu. 2015, ‘The determinants
travel experience and perceptions of risk and safety’, Journal of Travel Research,
vol. 37, pp. 171–7.
Sönmez, S.F., Y. Apostolopoulos and P. Tarlow. 1999, ‘Tourism in crisis: Managing
the effects of terrorism’, Journal of Travel Research, vol. 38, pp. 13–18.
The National. 2016, ‘Pilots blamed for Taiwan’s TransAsia Airways flight GE222 crash’,
The National, accessed February 14, 2016, from <http://www.thenational.ae/world/
east-asia/pilots-blamed-for-taiwans-transasia-airways-flight-ge222-crash>.
The Nationals. 2015, ‘Australia leads oceanic trial to improve aircraft tracking’,
The Nationals, accessed July 12, 2016, from <http://nationals.org.au/austr
alia-leads-oceanic-trial-to-improve-aircraft-tracking/>.
‘The World Factbook’ n.d., accessed May 30, 2016, from <https://www.cia.gov/
library/publications/the-world-factbook/geos/my.html>.
Tolan, C., T. Patterson and A. Johnson. 2014, ‘Is 2014 the deadliest year for flights?
Not even close’, accessed from <http://www.cnn.com/interactive/2014/07/travel/
aviation-data/>.
Wainscott-Sargent, A. 2016, ‘Aircraft tracking in a post-MH370 world’, accessed
July 15, 2016, from <http://www.aviationtoday.com/av/issue/departments/prod
ucts/Aircraft-Tracking-in-a-Post-MH370-World_87843.html>.
West, K. 2014, ‘Is there a future for Malaysia Airlines after flights MH370
and MH17?’, The Guardian, accessed February 1, 2016, from <http://www.
theguardian.com/world/2014/jul/29/is-there-a-future-for-malaysia-airlines>.
Yahoo News. 2015, ‘“Series of errors” caused Air Algerie crash: report’, Yahoo
News, accessed February 8, 2016, from <http://news.yahoo.com/series-errors-
caused-air-algerie-crash-report-223946075.html>.
APPENDIX
Date Deaths
2014, March 8 ●
MAS
flight MH370 disappeared from radar. At 239
time of writing cause of disappearance and the
location of the aircraft is unknown. However,
debris of a flaperon has been found in Reunion
Island.
2014, July 17 ●
MAS flight MH17 shot down by surface-to-air 298
missile in Ukraine. Investigations on who is
responsible are still ongoing.
2014, July 23 ●
TransAsia Airways flight GE222 crashed due to 48
pilot error and bad weather.
2014, July 24 ●
Air Algerie flight AH5017 crashed to the 116
ground due to pilot error.
2014, December ● Indonesia Air Asia flight QZ8501 crashed into 162
28 the Java Sea as a result of pilot error, poor
alternatives for technical malfunction and
bad weather. The flight was not permitted by
authorities to fly Surabaya-Singapore route.
2015, February 4 ●
TransAsia Airways flight GE235 crashed only 43
two minutes after taking off into a nearby river
from Songshan Airport in Taipei as a result of
basic mistakes by pilot.
2015, March 24 ● Germanwings flight 9525 crashed into the 150
French Alps, which was found to be caused
deliberately by the co-pilot on a suicide mission.
2015, October ●
Metrojet flight 9268 crashed into the Sinai 224
31 Peninsula. The reason for the crash is still
under investigation. Russia, UK and the
USA have reasons to believe that plane was
brought down by a bomb and the Islamic State
group is responsible, however Egypt refutes
this hypothesis. Until the investigations have
concluded, cause is unknown.
Note: 1 Details of air travel tragedies are accurate to what we know at time of writing.
Flight MH370 and flight 9268 are still undergoing investigations for cause of tragedy and
flight MH17 is undergoing investigation to find person/party responsible for the shooting
down of flight MH17.
Source: Adapted from Elvey (2016); The National (2016); Yahoo News (2015); Ap (2015);
Molko (2015); Botelho and Haddad (2015); Sonawane (2016).
INTRODUCTION
231
security measures in Japan have changed over time. Next, it discusses the
balance between aviation security and the convenience of airport services in
Japan. Finally, it proposes some suggestions for the enhanced security sys-
tems that will be necessary for our international airports when Japan serves
as the host country for the Olympic Games in 2020 and in the future as well.
The ‘Yodo-Go’ case was the first indication that the concept of aviation
security had to be taken seriously in Japan.
On March 31, 1970, nine members of the Japanese Communist League-
Red Army Faction (a predecessor of the Japanese Red Army) brought
swords, knives, and firearms onto a plane and invaded the cockpit. They
hijacked Japan Airlines Flight 351, also called ‘Yodo-Go’, while flying
from Haneda to Fukuoka with 138 crew members and passengers. Their
destination was Pyongyang, North Korea, and their purpose was exile.
This was the first hijacking case involving a plane that had departed from
Japan. As a case of hijacking was previously not believed to occur in Japan,
the country had no solutions to it. Succumbing to the criminals’ demands,
the Japanese government (the Sato Cabinet) released the Red Army mem-
bers and sent them to Pyongyang. Five days later, the ‘Yodo-Go’ case was
settled (National Police Agency, 2005).
On October 4, two days after the ‘Dhaka case’ was settled, the Japanese
government set up a committee on the ‘prevention of non-humanitarian
violence . . . such as hijacking’ in the Cabinet Secretariat and began serious
work on anti-hijacking measures for commercial airplanes. The govern-
ment established some preventive measures against hijacking on October
13 of the same year and ordered thorough security measures for domestic
air carriers. Japan released its complete ‘preventive measures against
hijacking’ on November 8 (Ministry of Transport, 1982). The government
advocated the following five points as the main points of all anti-hijacking
measures:
Most people who watched the live news of the terrorist attacks on the two
buildings of the World Trade Center can still remember what they were
doing at that time on September 11, 2001. Anyone who was going to board
a plane later that day surely has an even stronger memory of the day. The
attacks shook the safety and security of airplane travel to the core.
Due to the time difference between Japan and the US, the event
occurred at night in Japan. Since most airports had closed for the day,
work at the airports was not majorly affected. On the next day, however,
Japan strengthened its aviation security system and raised the alert level
of its airports to the severest ‘high alert’. According to the emergency
instructions of the JCAB, security screening for all passengers became
particularly thorough. Every airport was a scene of confusion as a system
of security checks that was completely different from those followed under
the conventional security level was implemented with a preparation time of
only a few hours. Due to the need to keep the JCAB instructions private,
the aircraft operations staff and security screeners who performed security
checks were even more confused than the passengers at the airports. This
was the first time that the air raid alert level had been raised to the highest
in the history of Japan’s aviation security. Just after September 11, in
Japan, as in the US, security screening of anything that was to be put on
airplanes, including passengers, baggage, and cargo, became stringent.
On September 11, instructions on the ‘reinforcement and thorough secur
ity measures (KOKU-SO No. 7012, means one of the CAB Guidelines)’
were issued by the MLIT in response to the terrorist attacks in the US.
However, the instructions for ‘thorough security measures’ from the JCAB
were vague expressions making judgment difficult for security screen-
ers. Whereas it was obvious that items such as knives and scissors were
prohibited in carry-on luggage, judgments regarding everything slightly
less dangerous were entrusted to the screeners. The on-site operation of
security checks was thus confused. Because it was difficult to establish that
an item was not dangerous, even items such as needles, toothpicks, nail
clippers, small nose-hair scissors, and sewing kits were not admitted onto
planes in carry-on luggage depending on a screener’s judgment. Given the
sense of ‘danger’ that each screener perceived, a different judgment was
given for each item.
Later, counterterrorism was the first priority all over the world, and an
emphasis on security dominated the aviation security system. It has been
15 years since these developments. As the menace of terrorism appears
to have faded, no one is able to insist strongly on security. The European
Union has begun to push airport administration to consider the service
13.2
PROBLEMS TO BE SOLVED IN THE AVIATION
SECURITY SYSTEM OF JAPAN
After the 9/11 attacks, like all foreign airports, security alert levels at
airports in Japan immediately jumped to the highest level. The instructions
from JCAB were vague, advising a ‘thorough security check’ and ‘articles
which may kill and wound people are prohibited for carry-on in the plane’.
Airline companies and security screeners did not have careful, detailed
instructions from JCAB. At security check-points just after the September
11 attacks, judgment of what was permissible for carry-on in the plane was
entrusted to each screener.
At that time, every passenger understood that security management was
much more important than any other airport service. They recognized that
such strict security screening was for their safety. Japanese airport security
management is still higher than before the 9/11 attacks, although the level
is more relaxed today than in the immediate aftermath.
JCAB is the agency responsible for giving civilian aviation security instruc-
tions in Japan, but the agency does not bear the full expense of modifying
security screening. Because security screening is the responsibility of airline
companies in Japan, they bear the cost of screening. The security measures
for safe navigation of airplanes impose a heavy financial cost on airlines.
As the aviation security system is strengthened by JCAB instructions, the
expense to airlines grows bigger (Keidanren Policy and Action, 2014).
From January 1, 2006, ICAO requested member nations to inspect all
hold baggage in the same way as carry-on baggage before loading onto
airplanes. Although inspection for all hold baggage was already carried
out by X-ray equipment in Japan, it is difficult to find explosive substances
using only using X-ray imaging. Therefore, JCAB decided to introduce
explosive substance detection devices, which used medical computerized
tomography scan technology, to large airports. With the introduction
of the new explosive substance detection equipment, the security level
rose markedly. However, the cost per unit was high, and the expense for
JCAB Boarding
Supervision
Commission
Staff, Crew
Screening
Security Company Passenger/Baggage
that no organization exists that can watch aviation security at the macro
level. In other words, in an emergency, only organizations acting at the
micro level exist. Each organization has its own effective rules, but it is
impossible to assign those rules to other organizations. There are some
incompatible gaps between each organization. If a situation occurs in
which all organizations are involved, it is clear that a problem will occur in
the ability for communication across Japan. We have already learned that
communication was negatively impacted by clumsy cooperation between
organizations on September 11, 2001, in the US.
Soon after the 9/11 attacks, the US crisis management system ironically
fell into a management crisis, and delay and disorder affected on-site
communication. The US government realized that a single organization,
responsible for giving instructions in cooperation with related counter-
parts, was necessary in the event of a security emergency. In the airports
of Japan, various organizations mingle together. It is necessary to build a
system in Japan that can respond to emergencies quickly and effectively.
13.3 CONCLUSIONS
s ecurity for passengers. Airports are essential infrastructure for any coun-
try, and they are vital for connecting Japan to foreign countries. Through
its airports, many people come to Japan from all over the world.
The Japanese government seeks to raise the annual number of foreign
tourists visiting Japan to 20 million by 2020. The remaining time for
preparation is short, but we can and must do it for a secure future.
REFERENCES
INTRODUCTION
245
NARRATIVE
Pre-9/11
reportedly stood down after the incident and then subjected to retraining
and monitoring. More worryingly perhaps, in response to the incident, the
federal Transport Minister was quoted as saying ‘I am not going to com-
ment on aviation security matters or reveal the methods we use to check the
systems’ (Bolton and McKenna, 2001, p. 1).
many years, involving numerous claims and counter claims, and conflict-
ing evidence, played out in the Australian media and Indonesian courts.
The whole imbroglio regarding Corby’s baggage was never resolved
in an Australian judicial forum, but the issue opened up the first major
doubts about the benign official security assessments outlined in the
previous section. The idea of gangs using luggage to transport contraband
generated widespread alarm regarding the potential for luggage tampering.
One of the more noticeable effects was the shrink-wrapping and locking of
baggage to reduce access (Guerrera, 2005; Medew, 2005).
The Corby case generated more questions than answers about avi
ation security. The overlapping Kessing case put these concerns onto a
much more substantial evidence base (McIlveen, 2006). Kessing was an
Australian Customs Service Intelligence Officer who provided reports on
suspected organised crime within aviation to customs officials in 2004.
In mid-2005 the main national newspaper The Australian published
summaries of the reports (Chulov and Porter, 2005a; 2005b). The reports
identified major concerns about criminals based inside Sydney airport
who used passenger luggage to convey contraband within the country. It
was alleged that security camera blackspots were used to evade detection.
Airport staff were also suspected of stealing from baggage and smuggling
stolen property. The reports identified key failures in employee screening,
including the employment of persons with criminal records and with
known associations with criminal gangs (Chulov, 2005; Chulov and Porter,
2005c; Chulov and Shanahan, 2005).
Kessing was charged and convicted with the unauthorised communica-
tion of government documents. There was a widespread assumption
that he had passed the reports to The Australian, although he denied the
charge. For some in government Kessing was a traitor who had broken the
law. For others, he was a hero who sacrificed his career in the interests of
public safety. Certainly, the disclosures and the prosecution all pointed to
the inevitable conclusion that security was inadequate and that denials and
cover ups exacerbated the problem (Kearney, 2007).
In response to the issues raised by the Kessing case, the federal govern-
ment commissioned a security expert from the United Kingdom, Sir John
Wheeler, to conduct an enquiry into the state of aviation security. The
report – An Independent Review of Airport Security and Policing for the
CRITIQUE
The narrative account set out above charts a complex, often tortuous,
path of change in aviation policy and practice in Australia. The process
evidences a number of notable features. The first is that change was largely
driven by unforeseen events and crises as the threat landscape changed,
mainly through events occurring outside the country. There were a number
of improvements to security in the immediate aftermath of 9/11, but a
climate of complacency persisted. The bizarre events of the Schapelle
Corby drug trafficking arrest, and subsequent disclosure of confidential
customs intelligence reports, both of which highlighted vulnerabilities in
aviation security, led to the damning Wheeler Review in 2005. The Wheeler
recommendations – especially the emphasis on the need for better risk
management – should have seen the end of a reactive approach. However,
the implementation process and subsequent changes only confirmed an
ongoing pattern of ad hoc responses to new threats and scandals.
The second aspect of the story concerns the problem of government
secrecy, cover ups and persecution of whistleblowers. It has only been
through the repeated exposure of security failings by a free press that the
public has been informed and some progress prompted. The treatment of
security whistleblower Allan Kessing was a textbook example of ‘shooting
the messenger’, highlighting how far authorities would go to hide security
weaknesses and their own culpability. The Kessing case demonstrated the
need for a national security strategy that includes public interest protec-
tion for whistleblowers who go outside government. However, the issue
has been conspicuously absent from government reviews, and there is no
reason to think that the situation could not reoccur (see Brown, 2013).
The third feature, closely related to the first, concerns the need to estab-
lish a comprehensive and sustained risk management process. Modern
security management principles are strongly premised on the concept of
regular, in-depth, data-rich reviews highlighting threats, vulnerabilities,
strengths and weaknesses; appropriate upgrades and system tests (includ-
ing penetration tests); clearly assigned security responsibilities horizontally
and vertically; adequate training of all staff in security responsibilities;
and adequate screening of all staff – all premised on the need for, and
possibility of, continuous improvement (Draper and Ritchie, 2014). The
CONCLUSION
REFERENCES
Abbott, T. (2014, 12 September). National terrorism public alert level raised to
high. Available at https://www.facebook.com/TonyAbbottMP/posts/1015282381
3673646.
ACC (2009). Australian Crime Commission submission to the Parliamentary Joint
Committee on the Australian Crime Commission Inquiry into the Adequacy of
Aviation and Maritime Security Measures to Combat Serious and Organised
Crime. Canberra; Australian Crime Commission.
AFP (2006). Annual report. Canberra: Australian Federal Police.
Albanese, A. (2008, 6 May). More money for security updates at regional airports.
O’Brien, N. (2008, 2 June). Airport policing units in disarray. The Australian, p. 5.
O’Connor, B. (2009, 29 December). Australian Federal Police to Lead Airport Security
across Australia. Retrieved from http://www.ministerhomeaffairs.gov.au/www/
ministers/oconnor.nsf/Page/MediaReleases_2009_FourthQuarter_29December2
009AustralianFederalPolicetoLeadAirportSecurityAcrossAustralia, accessed 28
April 2010.
Pinkney, M. (2000, 11 February). Tackling terrorists. Herald-Sun, p. 21.
PJCACC. (2009). Annual Report 2007–08. Canberra: Parliamentary Joint Committee
on the Australian Crime Commission, Parliament of Australia.
Prenzler, T., and A. Milroy (2012). Recent inquiries into the private security indus-
try in Australia: Implications for regulation. Security Journal, 25(4), 342–55.
Rural and Regional Affairs and Transport References Committee (2016). Current
inquiries. Retrieved from http://www.aph.gov.au/Parliamentary_Business/Com
mittees/Senate/Rural_and_Regional_Affairs_and_Transport
Seymour, B. (2015). Submission by Bryan Seymour, Reporter, Seven Network
(Australia), Inquiry into Airport and Aviation Security. Available at https://www.
aph.gov.au/Parliamentary_Business/Committees/Senate/Rural_and_Regional_
Affairs_and_Transport/Aviation_security/Submissions.
Stewart, C. (2002, 15 May). Spies, gadgetry and top troops to protect the home
front. The Australian, p. 4.
The Guardian (2015). All of Australia’s national security changes since 9/11 in a timeline.
Retrieved from http://www.theguardian.com/australia-news/ng-interactive/2015/
oct/19/all-of-australias-national-security-changes-since-911-in-a-timeline.
The Times (2006, 3 November). Airline liquids ban to be relaxed, p. 29.
Truss, W. (2015, 30 March). Australia moves to strengthen cockpit security. Retrieved
from http://minister.infrastructure.gov.au/wt/releases/2015/March/wt095_2015.
aspx.
Vaile, M. (2006, 8 December). New air security regulations for carry on baggage.
Retrieved from http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;q
uery=Id%3A%22media%2Fpressrel%2FXWQL6%22.
Vaile, M., J. Lloyd, and D. Kelly (2007). Building a strong future for regional Australia
2007–2008. Retrieved from http://www.budget.gov.au/2007-08/ministerial/html/
index_dotars.htm.
Verrier, J. (2003). Australia’s self-image as a regional and international security
actor: Some implications of the Iraq war. Australian Journal of International
Affairs, 57(3), 455–71.
Wainwright, R. (2000, 28 July). Tarmac arrest exposes security blunders. The
Sydney Morning Herald, p. 3.
Walters, P. (2005, 2 November). ASIO fears terror cells among us. The Australian, p. 1.
Wheeler, J. (2005). An Independent review of airport security and policing for the
Government of Australia. Canberra: Department of Transport and Regional
Services.
White House Commission on Aviation Security (1997). Final report to President
Clinton. Washington: Author.
Wilkins, R. (2009). Report of a review of the Australian Federal Police’s response to
an incident at Sydney Airport on 22 March 2009. Canberra: Minister for Home
Affairs.
Williams, M. (2007, 12 April). Regional flights carry airport security risk. The
Advertiser, p. 30.
263
has also stressed the importance of a good balance between security meas-
ures and a seamless passenger experience. Nevertheless, in this case at least,
it is not possible to conclude that the involvement of the private sector has
improved the performance of anti-terrorist strategies and policies.
The Australian case study reinforces the point made earlier, that
improvements in aviation security have been mainly determined by a reac-
tion to surprise events – though these took place in other countries. In most
cases, the changes have involved the adoption of new technologies and
procedures that had been tested elsewhere. Despite all the improvements,
however, the need to pass from episodic interventions to a comprehensive
and sustained risk management process has not yet been satisfied. What
is required is a strategy that highlights threats, vulnerabilities, strengths
and weaknesses, and recognizes the importance of continually adopting
appropriate upgrades.
In Brazil too an effective strategy to combat terrorism has not yet been
implemented. The Civil Aviation National Agency (ANAC) is responsible
for aviation security but its priorities differ markedly from those of most
other countries because its primary security concern is not with terrorism
but with crime prevention at the airports, at safeguarding both cargo and
the property of passengers. Furthermore, general security at Brazilian
airports is difficult to manage due to a failure to invest adequately in both
people and technology. There are fewer security and law enforcement
officers working inside airport facilities than many experts consider appro-
priate and limited surveillance technologies and physical or electronic
barriers. Not surprisingly, IATA has concluded that Brazil’s idiosyncratic
approach to aviation raises many issues including jeopardizing its contri-
bution to the development of the industry.
Israel presents a sharp contrast to the Brazilian case. While Brazil seems
to be a laggard in dealing with the terrorist threat, Israel is a country that
has spent the last decades in developing and enforcing a rigorous develop-
ment of policies and practices to ensure the security of its aviation sector.
These are based on a series of important assumptions. The first one is that
the aircraft represents the state of Israel and therefore should be regarded
as a national symbol whenever it lands, takes-off, and flies. Second,
the focus of security is above all on the passenger and on his luggage.
Accordingly, the security measures are based on security circles or layers,
visible and invisible technologies, and highly trained personnel. Lastly,
the average Israeli citizen is willing to accept some inconvenience while
undergoing security checks, as the price for feeling secure. A recent trend
in Israeli security philosophy is the use of more enhanced technological
solutions that, in some cases (i.e. baggage scrutiny), substitute for the
human factor.
The US also accords a high priority to aviation security, and has adopted
the multilayered risk based approach. Yet, despite the expenditure of bil-
lions of dollars, the system retains various deficiencies. The Transport
Security Administration (TSA) has often implemented policies such as the
deployment of technologies and the use of behavioural indicators before
ensuring that they will yield positive results. Such shortcomings reflect
a fundamental organizational weakness, for as the General Accounting
Office noted as recently as October 17, 2017, the ‘Use of sound program
management and oversight practices is needed to avoid repeating past
problems’. Other weaknesses include the inability of baggage screeners to
detect weapons even though the number seized continues to grow annually.
Nevertheless, the US has also taken many important steps to enhance avi
ation security in other countries because it recognizes the dangers posed by
last-point-of-departure airports.
The Malaysian case further highlights the degree to which threat
perceptions influence security decisions. Aviation security in Malaysia
is administered by a subdivision of the Department of Civil Aviation,
whose responsibilities include ensuring the safe and orderly growth of civil
aviation throughout Malaysia. Its policies have changed dramatically in
recent years because Malaysia has been hit by several episodes related to
aviation security. These have raised the awareness of the government and
of the Malaysian population of the need for enhanced security, especially
because of the extensive and long-lasting coverage that they have received
on national and international media.
Consequently, the Malaysian government decided it had to react strongly
and did so in an innovative way that deserves widespread attention – it
chose not to adopt peculiar security measures but rather to stringently
follow the International Civil Aviation Organization (ICAO) recommenda-
tions. It has also been a strong advocate for global standards in aircraft
tracking and conflict zone risk mitigation, so that the rules and measures
taken in Malaysia are in line with enhanced international standards.
The analysis of aviation security in Kenya makes it quite clear that pro-
viding adequate security for passengers, cargo, planes, and infrastructure
is a much more daunting task for Africa than other regions of the world.
Kenyan efforts at achieving a high standard of security are handicapped by
many factors including the location of its airports, poor and/or inadequate
screening equipment and lack of well-trained personnel especially in
security technologies. The lack of resources is a fundamental reason that
explains the limited investment in technology and the personnel weak-
nesses. Fortunately, this problem has gained widespread recognition and,
despite the challenges faced, the situation in Kenya and in other African
countries has been improving as a result of the assistance given by ICAO
to enhance security at its airports. However, the Kenyan case also serves
to highlight another necessary requirement to enhanced security that has
already been noted above – the relationship between the state and the many
stakeholders in the aviation sector should be cooperative and reinforcing.
Regrettably, Kenya, however, does not seem to possess such a partnership.
Overall, these case studies permit us to highlight, once again, the degree
of heterogeneity that exists among the security strategies and policies that
are deployed in the various regions of the world. In some cases, the differ-
ences are due to budget constraints, as in the case of Kenya. In other cases,
this is due to the need to reconcile privacy, efficiency, and security (as in the
case of Canada and Japan).
Of all the cases, the Israeli one is generally considered to have achieved the
highest level of aviation security and has attracted considerable attention
for its effectiveness in anticipating and preventing attacks. However, it is
unlikely that many of its policies will be widely adopted elsewhere. To export
their protocols and practices requires a similar cultural orientation towards
such issues as privacy and to apply, in a larger context, the protocols that are
adopted in their single major airport would create obvious difficulties.
The analysis of both parts of this book, the methodological chapters
that constitute Part I and the case studies that form Part II lead us to pro-
pose general conclusions, some of which may already have emerged, but
which bear repetition. First, in general, security regulations are enhanced
as responses to unlawful acts and not before. Second, it also appears to be
important to find a fair balance between the need to secure air transport
and to safeguard the individual’s fundamental rights and freedoms. Third,
there is no conclusive evidence about any improved efficiency when security
procedures and protocols are deployed by private firms. It is thus impor-
tant that there be a high degree of interaction between private firms and
governments for the development of new and more effective technologies
and security procedures. Fourth, a multilayered security matrix appears to
be the best option to prevent unlawful acts and to provide certainty that if
one layer is breached, the others can still deploy their activities and block
an attack. Finally, an effective aviation security regime requires a high level
of coordination of information and resources between agencies, nation-
ally, regionally, and internationally.
Clearly, much remains to be done but when considering future steps,
it is imperative to take into account the rapid growth and technological
changes that are taking place in this sector. Technology has an important
role to play and a continuing emphasis on the development of new tech-
nologies is essential. However, new technologies are often deployed before
their efficacy has been effectively verified due to the pressures to increase
security in ever more crowded facilities. Furthermore, technologies, even
REFERENCES
IATA (2016), Building the Future. IATA Training Catalog 2016–2017, IATA.
271
Chicago Convention (1944) 3, 19–20, Customs and Border Patrol (CBP) 67,
22, 44–5, 90, 191, 211 116
Annex 3 of 217 cyber-attacks 3, 18, 49, 77, 113, 115
Annex 6 of 216 cybersecurity 49, 115
Annex 17 of 23, 27, 184, 192, 246 in United States 114
Article 3 of 217
Document 8973 45 dangerous goods 7, 86, 88, 213, 234
national civil aviation security data mining 64
program 192 Dawson Field affair (1970) 44–5, 167,
Safeguarding International Civil 170–71
Aviation against Acts of Declaration on Aviation Security
Unlawful Interference 45 (2010) 48
sovereignty, principle of 218, 221 defense in depth, security principle of
Civil Aviation Act (2013), Kenya 183 78
Civil Aviation Issues Reporting System Department of Homeland Security
(CAIRS) 139 (DHS), US 69, 107, 240
Civil Aviation National Agency Sensitive Systems Directives 114
(ANAC), Brazil 8, 151, 158, 266 Designated Aviation Channeler (DAC)
certificated repair stations 152 75
civil aviation operations, safety of 211 Directorate General for Mobility and
Civil Aviation Safety and Security Transport (DG MOVE) 91
Oversight Agency (CASSOA) 194 distress flight tracking 217
‘Clipper Maid of the Seas’ jumbo jet DO-230F Standards for Airport
168 Security Access Control Systems
closed-circuit television (CCTV) 73, 74
131, 139 ‘Domestic flights vulnerable to attack’
closing airspace, definition for 218, 222 report (2016) 257
cockpit doors, reinforced 6, 9, 17, 20, dual-filing, issues of 99
37, 78–9, 107, 111, 168, 194, 248 Dutch Safety Board (DSB) 208
cockpit voice recordings 217
Commonwealth Aviation Transport East African Community (EAC) 191
Security Act (2004) 246 Civil Aviation Safety and Security
Computerized Tomography (CT) 175, Oversight Agency (CASSOA)
239 194
conflict zone risk 205, 210, 217–20 economics of aviation security
assessment of 218–20 airline tickets demand 34
closing airspace, definition for 218 consequences of terrorist acts on
operator accountability regarding 32
220 cost benefit analysis 38
Convention for the Suppression of growth of air transport for freight
Unlawful Acts against the Safety and persons 32
of Civil Aviation 19 marginal benefit curve 37
Convention on Civil Aviation see marginal cost curve 36
Chicago Convention (1944) models of airport security screening
Correctional Service Canada (CSC) 38–40
128 net benefits 36–8
crimes against passengers 8, 155–6 net present value 38
Criminal Code of Canada 133 positive and negative externalities
Critical Elements (CE) 184 of 33–5
cross-border crimes 58 risk assessments 35–6