<<

Journal of Aviation/Aerospace Education & Research

Volume 4 Number 2 JAAER Winter 1994 Article 1

Winter 1994

A Model for Developing an Plan

Atef Ghobrial

Ken Fleming

Follow this and additional works at: https://commons.erau.edu/jaaer

Scholarly Commons Citation Ghobrial, A., & Fleming, K. (1994). A Model for Developing an Airport Security Plan. Journal of Aviation/ Aerospace Education & Research, 4(2). https://doi.org/10.15394/jaaer.1994.1118

This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Aviation/Aerospace Education & Research by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. Ghobrial and Fleming: A Model for Developing an Airport Security Plan

A MODEL FOR DEVELOPING ANAIRPORT SECURI7Y PLAN

Atef Ghobrial and Ken Fleming

In order to protect passengers, staff, , , and property, should develop, implement, and maintain a system security plan. The plan should be a complete guide for establishing and maintaining a comprehensive security program for the airport system. Increased security should be accomplished through the use of a system approach, with both proactive and law enforcement activities clearly outlined in the plan. This paper presents a model for developing an airport security plan.

INTRODUCTION devices or . The new Public Law 99-83, the Not long ago, security problems at airports were International Security and Development Cooperation confined to conventional associated with other Act of 1985, established an explicit statutory basis for the transportation modes: vandalism, theft, assault and FAA's Federal Air Marshal program. The Public Law battery, trespassing, and facility damage. Since the late 99-83 was enacted in August 1985 to direct the Secretary 19608, airports have also become the focus of other of Transportation to assess the effectiveness of security crimes, such as , hijacking, sabotage of targets measures at foreign airports served by U.S. carriers, or in the air and on the ground, and overt acts of from which foreign air carriers serve the , aggression. Between 1963 and 1971, the Assembly ofthe and those airports that pose high risk to international International Organization (ICAO) called travelers. In 1989, the FAAissued its final rule requiring three major meetings for the purpose of drafting foreign air carriers to submit their security programs (in International Conventions on the security of civil writing and inEnglish) to the FAAfor acceptance by the aviation: The (1963), the Hague Administrator. Convention (1970), and theMontreal Convention (1971). GENERAL GUIDELINES FOR DEVELOPING In 1974, a set ofstandards and recommended procedures AN AIRPORT SECURI'IY PlAN was adopted by ICAO. The document was published as In order to protect passengers, staff, airlines, aircraft, Annex 17 to the original Chicago Convention. The and property, airports should develop, implement and document is titled "Standards and Recommended Prac­ maintain a system security plan. Increased security tices-Security-SafeguardingCivilAviationAgainstAets should be accomplished through the use of a system of Unlawful Interference." approach with both proactive and law enforcement In 1969, the Federal Aviation Administration (FAA) activities clearly outlined in the plan. A system is established a Task Force on Deterrence ofAir Piracy. In composed of people, property, environment, and 1971, the FAA issued notices of proposal rule-making procedures that are integrated to perform a specific for the landmark revisions of the airport and operational function in a specific environment. The security measures. One notice proposed the issuance of elements of a system are diverse and interactive. A Part 107 of the Federal Aviation Regulations to give to successful airport security plan should integrate and airport operators the responsibility for providing coordinate the functions of each element in the system. protection against unauthorized access to air operations The airport security plan is a well-defined program areas. The second notice proposed a new Section 538 to that describes the actions to be taken to protect airlines, FAR Part 121, which required each scheduled carrier to passengers, staff, aircraft, and property against terrorist develop and implement a security program designed to or criminal acts. Security plans should not be viewed as prevent or deter the carriage aboard aircraft ofsabotage a set of theoretical procedures to follow, rather they

JAAER, Winter 1994 Page 27

Published by Scholarly Commons, 1994 1 Journal of Aviation/Aerospace Education & Research, Vol. 4, No. 2 [1994], Art. 1

A Model for Developing an Airport Security Plan

should define the objectives of the program and give directive/policy statement that establishes full enough flexibility to deal with particular events. Because commitment to security. The plan also directs timing, situations, or locations ofunlawful acts cannot be responsibility for security to an individual or a group forecast, it is necessary to leave the detailed course of and indicates full support for them. The security actions to those persons in charge of airport security. classification and copy number should appear The main objective is to ensure that the actions taken to prominently at the top of each copy of the document. safeguard the facility are coordinated with the overall Introduction to Airport System Security plan. Purpose ofAirport Security Plan In developing a security plan, lead security personnel An airport security plan is of limited value unless it at the airport should consult with the FAA, the ICAO, fully defines and implements a security program. The and other security professionals, and should review plan should emphasize identifying potential threats and security plans at similar airports. Next, authors of the areas of wlnerability, and developing proactive, security plan should collect all of the appropriate prevention-oriented approaches thatwill minimize them. security-related information within the airport. This threat and vulnerability management, as applied to This information includes the location ofthe airport, all aspects of people, property, prOcedures, and the type of traffic, the passenger mix (domestic and environment ofthe airport, is known as "system security. n international), the resources of the airport, and the Goals, Objectives and Tasks ofthe Plan capabilities of the different groups overseeing airport The primary goal of the plan, of course, is to security. implement a program that ensures system security. Broad The next step is to write the specific sections of the yet airport-specific objectives supporting thatgoal should plan. There is no standard format or layout; however, be identified; each objective should include a set of security personnel should be able to find all references reasonable and attainable tasks to achieve that objective. to their roles and responsibilities easily and quickly. The For example, the objective of a plan could be to ensure outline can be adjusted as appropriate to suit the the security of an airport or an airline against unlawful circumstances of a particular airport. acts at maximum cost-effectiveness. DEVELOPING AN AIRPORT SECURTIY PLAN Scope ofthe Plan The need for developing an airport security plan has This section should summarize the intent ofthe plan, been emphasized in many aviation management books and list personnel involved and their functions, and what (Moore, 1991; Phipps, 1991; Wells, 1992). This paper organizations are affected. provides a model for developing an airport security plan. Description of the Airport System It presents an outline of an airport security program Organizational Structure followed by a description of the different sections A brief description, preferably with a diagram, of the comprising the plan. organizations of the airport, including security Opening Pages to the Airport Security Plan committees. The opening pages ofthe security plan should include Operating Environment acknowledgment, a foreword, and a management policy Detailed information about flights by type (domestic statement. The author should acknowledge those and international), current and projected flight schedule, professionals, local and state and federal agencies, and estimated number of passengers, types of airlines international organizations that contributed to (domestic and international), political systems of developing the security plan. The foreword section countries whose airlines operate at the airport, high-risk should provide a clear understanding of how the plan is flights and so on. expected to serve as the dynamic structure for This section should also include a briefdescription of implementing an effective system security program. The the airport, including configuration, ground access, opening pages should also contain a management terminal facilities, and airside layout.

Page 28 JAAER, Winter 1994 https://commons.erau.edu/jaaer/vol4/iss2/1 DOI: https://doi.org/10.15394/jaaer.1994.1118 2 Ghobrial and Fleming: A Model for Developing an Airport Security Plan

A Model for Developing an Airport Security Plan

Current Security Conditions Training A summary containing the current security breaches, Describe the different training programs for everyone threats, and likely forms of terrorist or criminal involved in airport security. interferences. Examples include assault and battery, Airport Security Plan bomb scares, vandalism, sabotage, and terrorism. This is the main body ofthe document. It describes in Existing Security Capabilities and Practices detail the different security functions and procedures that A summary of the major proactive methods, should be carried outto safeguard passengers, personnel, prOcedures, devices, and systems that currently exist to airlines, aircraft, and property. This section covers the prevent or minimize security breaches. These may security of all elements of airport operations, including include committee work, analysis, personnel training ground access, passenger flow within the terminal, programs and passenger coaching, and proactive security passenger and screening, cargo, aircraft and auto devices. parking. Management of the Airport Security Plan Developing a solid information system for directing This section identifies those in charge of managing passenger flow, from arrival at the terminal curbside to the overall security plan and the daily activities of the the aircraft, is essential to airport security. For program. For instance, in small airports, the airport instance, installing accurate and well-displayed signs for manager can assume overseeing airport security and directing passengers to particular concourses and gates carrying out the plan on a daily basis. In larger airports, can help identify those attempting to pass through although an airport manager is ultimately accountable access-restricted areas. This procedure will also reduce for system security, daily security activities are most the incidence of questioning innocent passengers who likely coordinated by another individual. This section may not be familiar with the terminal layout and should also include a listing ofall major positions within accidentally try to enter restricted areas. the security organization and their respective Security ofPassengers from Auto Parking/Ground Access responsibilities. Depending upon the size of the airport, Points to Terminal its identity as a domestic or , and Identify security/patrolling functions performed at the traffic volume, a proactive security committee and a parking areas, who is responsible for conducting the security breach review committee could be created. function, levels of manning, hours of operations, and Finally, this section concludes by discussing the levels of means of communication. Identify locations of allowed training programs available for everyone involved in the access points to the terminal building, security/patrol security plan. It should also describe the training functions and responsibilities, and control posts by required to implement new proactive measures. The location. Also identify additional passenger-screening ·above items can be presented using the following functions (if any) at the access points, such as restricting structure: access to ticketed-passengers only and checking Management ofthe Plan validity. Identify whether the airport manager or another Security ofPassenger Flow Wzthin the Terminal individual will be in charge of daily security activities. Ideally, a security system should operate efficiently Responsibilities and Roles of throughout the whole process oftiCketing, passenger and Security Personnel and Divisions baggage check-in, and boarding. Specify the following: List the responsibilities and roles of security 1. How to control the flow ofarriving and departing personnel and the functions carried out by each. passengers. Airport Security Committees (if applicable) 2. How to control the flow of domestic and Identify each committee name, its purpose, members, international passengers. and how recommendations could be evaluated and 3. The areas where access passes are required. implemented. 4. The criteria for granting access passes, how and by

JAAER, Winter 1994 Page 29

Published by Scholarly Commons, 1994 3 Journal of Aviation/Aerospace Education & Research, Vol. 4, No. 2 [1994], Art. 1

A Model for Developing an Airport Security Plan

whom these passes are issued, and the format of of baggage (for example, visual control or closed-circuit identification cards, as well as penalties for not monitors). complying with regulations. 6. Screening methods for airport and airline 5. Regulations for the movement of merchandise employees who have access to these restricted areas. into the concessions areas. 7. Methods to deal with prohibited items discovered 6. Regulations of passenger movement from duty­ in the course of screening. free areas to gates. Security ofCargo Screening ofP~sengers and Carry-on Baggage The cargo terminal is a high-activity area that could Depending upon the type of airport, passengers must allow illegal access to the airside area and to both pass through one or more screening points. Screening passenger and cargo aircraft. An airport security plan can be conducted at a central location, piers and should specify the access points to the cargo terminal, concourses, and sometimes pre-departure at the . staff identification by access passes and cards, vehicle For every screening method, the security plan should identification, methods of surveillance of doors and specify: windows, and alarm and warning signals of open doors 1. Location of screening points, manning of these and windows. Similar rules can be established for locations, and qualifications and training of security screening mail. personnel. Airside Security 2. Methods and equipment used in screening This section includes security of aircraft, passenger passengers at different locations. and vehicle movements in the apron areas, and security 3. Methods of communications between security of interlining passengers and baggage. The FAA's personnel at these locations and central airport security. Advisory Circular 150/5200-6A includes thorough 4. Screening methods for crew flights and diplomats. guidelines for aircraft security at airports. The security 5. Screening methods for sensitive carry-on material plan should specify the following: such as cameras, laptop computers, and X-ray sensitive 1. Airlines' responsibilities for safeguarding the material. aircraft and coordination plans with the airport security 6. Screening methods for airport and airline personnel. employees who have access to restricted areas. 2. Rules for parking unattended aircraft, inspection 7. Methods to deal with prohibited items discovered of aircraft brought from maintenance hangars, and in the course ofscreening. handling hijacked or high-risk flights. Screening ofBaggage 3. How to control the flow of transit/connecting This section covers the security control of baggage passengers, especially at international airports. checked-in by passengers at airline counters that are 4. The criteria for granting access passes, how and by destined for carriage in the hold ofaircraft. The security whom these passes are issued, and the format of other plan should specify: identification cards, as well as penalties for not 1. Location of screening points, manning these complying with regulations. locations, and qualifications and training of security 5. Vehicle identification passes with periodic checks. personnel. Security ofNavigation Aids 2. Methods and equipment used in screening The plan should identify the following: baggage. 1. Rules for fencing and location of access points 3. Methods of communications between security that must be kept to a minimum. personnel at these locations and central airport security. 2. Methods of patrolling these access points and 4. Screening methods for baggage carried by crew methods of communications with the central security flights and diplomats. control unit. 5. Methods and equipment used to control the flow 3. Identification of personnel who must have access

https://commons.erau.edu/jaaer/vol4/iss2/1Page 30 JAAER, Winter 1994 DOI: https://doi.org/10.15394/jaaer.1994.1118 4 Ghobrial and Fleming: A Model for Developing an Airport Security Plan

A Model for Developing an Airport Security Plan

to inspect the navigation aids. plan are consistent with federal and international Emergency Plan organizations. In 1979, the ICAO Council adopted Amendment No. Appendix B: Glossary ofSecurity Terms 33 to ICAO Annex 14. The amendment specifies that A glossary of security terms will provide readers of states shall prepare and implement a program for the plan with information necessary to fully appreciate planning emergency measures at airports. These and comprehend its contents. emergency situations include arrival of a hijacked Appendix C: Security Forms and Logs aircraft, bomb threats against an aircraft on the ground Copies of different security-related forms and logs in or in the air, bomb threats to airport facilities, and day-to-day operations should be cataloged, labeled, and attacks ground-to-air or ground-to-ground. For each of included in this appendix. these situations, the security plan should identify the Additional Appendices location and name ofthe group that will be contacted to Because a security plan is tailored to meet the deal with the situation (for example, bomb disposal situation of a particular airport, any additional service, ambulances, fire brigade, and armed appendices that may be needed or useful may also be forces). The plan would also include procedures for included. dealing with hijacked aircraft, such as aircraft parking SUMMARY position, locations and names of support groups, and This paper presented a model for developing an evacuation procedures of airside and terminal airport security plan. There is no standard format or Phipps (1991) suggested that detailed contingency layout; however, security personnel should be able to plans should be included as annexes to master copies of find all references to their roles and responsibilities the security plan and circulated only to those with a need easily and quickly. The outline can be adjusted as to know the detailed operation ofeach contingency plan. appropriate to suit the circumstances of a particular Attachments airport. These circumstances include location, type of Appendix A: Bibliography airport (domestic or international), identity of carriers Includes a bibliography ofgood publications on airport operating at the airport, and volume ofpassenger traffic. security that contribute to the usefulness of the plan. In developing a security plan, it is necessary to leave the The bibliography also demonstrates that significant detailed course of actions to those persons in charge of research was considered and that the concepts of the airline/airport security.[J

AteC Ghobrial is the Director ofAviation Programs at Georgia State University in Atlanta. He has published numerous articles in the aviation field, and is now teaching aviation security courses. He has also been active in security-planning research for the 1996 Olympics in Atlanta.

Ken Fleming is the Director for Management and Program Development at Embry-Riddle Aeronautical University. He is a member ofthe research committee for Partners in Education, a Department ofTransportation/university effort devoted to developing research and curriculum in transportation security. He has also worked with the FAATechnical center doing cost-benfit analysis in the security field.

JAAER, Winter 1994 Page 31 Published by Scholarly Commons, 1994 5 Journal of Aviation/Aerospace Education & Research, Vol. 4, No. 2 [1994], Art. 1

A Model for Developing an Airport Security Plan

REFERENCES

Federal Aviation Administration. Security ofaircraft at airports. (Advisory Circular 150/5200-6A). Department of Transportation. Washington, DC: U.S. Government Printing Office. Federal Aviation Administration. Airport security. (FAR Part 107). Department of Transportation. Washington, DC: u.s. Government Printing Office. International Civil Aviation Organization. (1971). Security manual for the prevention of unlawful acts against civil aviation. (Document 8973). Montreal, Quebec, . International Civil Aviation Organization. (1974). Safeguarding international civil aviation acts o/unlawful interference. Annex 17 to the Conventional on International Civil Aviation. Montreal, Quebec, canada. International Civil Aviation Organization. (1976, June). (7th 00.). Annex 14 to the Conventional on International Civil Aviation. Montreal, Quebec, Canada. Moore, K. (1991). Airport, aircraft and airline security. : Butterworth Heinemann. Phipps, D. (1991). The management ofaviation security. London: Pitman Publishing.O

https://commons.erau.edu/jaaer/vol4/iss2/1Page 32 JAAER, Winter 1994 DOI: https://doi.org/10.15394/jaaer.1994.1118 6