MIT ICAT M I T I n t e r n a t i o n a l C e n t e r f o r A i r T r a n s p o r t a t i o n

Aviaon Security Professor John Hansman

Istanbul Technical University Air Transportaon Systems and Infrastructure Air Transportaon Management Strategic Planning M.Sc. Program Module 17 : April 2014 Reasons for Aviation Security

q Hijacking and Air Piracy • Politically Motivated • Financially Motivated q Smuggling & Illegal Transport q Stowaway q Cargo Theft q Sabotage q Terrorism

2 History of Turkish Hijacks

q THY Had over 15 hijacking events since 1972

q May 3, 1972 – A DC-9 airplane of (THY) named Boğaziçi on the way from to was hijacked by four Turkish leftist militants to Sofia, Bulgaria. After landing in Sofia, they handed over the aircraft to the Bulgarian authorities and applied for political asylum.

q October 22, 1972 – THY aircraft Truva on a scheduled domestic flight from Istanbul to Ankara was hijacked and diverted to Sofia by another four members of THKO. Landed in Sofia, the hijackers handed over the airplane to the Bulgarian authorities and applied for political asylum.

q May 1, 1976 – Zeki Ejder, a Turkish citizen working in France, attempted to hijack the a DC-10 aircraft named İzmir of Turkish Airlines bound to Istanbul from Paris in order to land it in Marseille. The hijacker could be persuaded and the airliner returned safely to Charles De Gaulle Airport in Paris.

q February 13, 1977 – A police academy cadet, Adnan Mintaş, attempted to hijack the Turkish Airlines Trakya to Belgrad, Yugoslavia, which had departed from Istanbul for İzmir.

Source: Wikipedia 3 History of Turkish Hijacks

q March 19, 1977 – Turkish Airlines aircraft with 173 passengers on board flying from Diyarbakır to Ankara was hijacked by two underaged hijackers armed with hand guns to Beirut, Lebanon. wanted to go to Palestine, surrendered with the initiative of Lebanon's Prime Minister Selim al-Hoss.

q October 13, 1980 – A Turkish Airlines was hijacked on a flight from Munich, Germany to Ankara via Istanbul by four radical Islamist militants. The hijackers were arrested in Diyarbakır as the aircraft landed for refueling.

q May 24, 1981 – Four Turkish leftist militants hijacked the Turkish Airlines DC-9 on a domestic flight from Istanbul to Ankara and demanded to go to Burgas, Bulgaria. As two of the hijackers left the airliner for a while after landing, the two others were overwhelmed by the passengers.

q April 15, 1983 – Turkish Airlines aircraft Ankara, flying from Istanbul to İzmir with 6 crew and 107 passengers on board, was hijacked to Athens, Greece by Mehmet Kalkan, who was believed to be a psychopathic.

q June 28, 1985 – Turkish citizen Yusuf Örer, who was deported from Germany, attempted to hijack the Turkish Airlines on the deportation flight from Frankfurt, Germany to Istanbul for landing in Vienna, Austria. Captain pilot and he flight engineer overwhelmed him with the help of passengers immediately after the attempt.

Source:q .Wikipedia 4 History of Turkish Hijacks

q March 8, 1996 – A Boeing 727 of Cyprus Turkish Airlines on a flight from to Istanbul was hijacked by Ramazan Aydın to Munich, Germany.

q February 24, 1998 – Turkish Airlines RJ 100 bound for Ankara from Adana with 63 passengers and 5 crew on board was hijacked by Mehmet Dağ (36) to Diyarbakır. The hijacker, stating he had a bomb inside the teddy bear in his hand, wanted to divert the airliner to Iran. The passengers overwhelmed him.[2]

q March 30, 1998 – Cyprus Turkish Airlines aircraft on the way from Nicosia to Ankara was hijacked by Mehmet Ertürk, who had in his hand a lighter in the form of a hand grenade. The airliner landed in Ankara, and the hijacker was arrested.

q September 14, 1998 – A Turkish Airlines Airbus departed from Ankara for Istanbul, was hijacked by İhsan Akyüz, who was armed with a toy pistol. Following the forced landing in Trabzon, the hijacker surrendered.

q October 29, 1998 – Turkish Airlines Flight 487 on a en route from Adana to Istanbul was hijacked by a PKK terrorist on the Republic Day. The hijacker, armed with a pistol and a hand grenade demanded to fly to Zurich, Switzerland via Sofia in Bulgaria.[3]

q March 28, 2003 – Turkish Airlines aircraft Ergene enroute from Ankara to Istanbul was hijacked and forced to land in Athens, Greece. The Turkish citizen hijacker Özgür Genç surrendered. Source: Wikipedia 5 History of Turkish Hijacks

q October 3, 2006 – Turkish Airlines Flight 1476 en route from Tirana, Albania to İstanbul was hijacked by Turkish citizen Hakan Ekinci in Greek airspace. The hijacker surrendered after the forced landing in Brindisi, .

q April 10, 2007 – aircraft on the way from Diyarbakr to Istanbul was hijacked by Mehmet Gökşingöl and was forced to land at Esenboğa Airport in Ankara. Security forces overwhelmed the hijacker some time later.

q August 18, 2007 – A Palestinian and a Turkish citizen hijacked an MD-83 leased to World Focus Airlines from Nicosia to Istanbul. The hijackers, armed with a knife and fake plastic bomb, tried unsuccessfully to enter the cockpit, demanded to fly to Teheran, Iran. The aircraft landed in Antalya for refueling. The hijackers released the children and the women on board. By this opportunity, the pilots and most of the passengers escaped by jumping from the aircraft. The hijackers held a few passengers and flight attendants hostage, but surrendered five hours later.[4]

q January 5, 2011 – Turkish Airlines Flight 1754, flying from Oslo to Istanbul, was in Bulgarian airspace when, allegedly, an unsuccessful attempt was made to hijack it. The suspect allegedly said that he had a bomb and that he would blow up the aircraft unless the plane returned to . Some passengers overpowered the hijacker and the flight safely landed at Atatürk Intl. Airport.

Source: Wikipedia 6 System Requirements Objectives q Safety of Passengers and Crew • Detection and Management of; – Explosives and Incendiary Devices – Biological Agents – Hazardous Materials – Weapons – Sabotage q Cargo Crime (Illegal Transport, Import or Theft) • Nuclear Materials • Drugs and Narcotics • Agricultural Products (Fruit & Meat) • Gold and Currency • Stowaways • Other?

7 System Requirements Performance q Effectiveness against objectives • Difficult to measure success at a system level q Cost • Capital Costs – Equipment – Facilities • Operating Costs – Manpower and Training – Maintenance and Calibration q Capacity and Throughput q Flexibility and Adaptability • Response to New Threat Vectors • Response to Countermeasures

8 Strategic Architectures

q Sterile Environment with Comprehensive Screening

q Problems • Cost and Scale • Probability of Detection (POD) performance < 100% • Variable Threat Vectors • Easy to Probe • Distributed Nature of Air Transportation 9 Perimeter Security

q Airside Access • Flight Crew – Known Crew Members KCM • Ground Personnel – Fueling – Catering – Maintenance – Gate – … • Airport Personnel • Fire Fighters • Security Personnel • Contractors

10 Perimeter Security

q Controls • Identification • Challenge • Monitoring • Access Points – Gate – Terminal – Road

11 Security (Passenger)

q Overall security processes have increased q Some efficiency improvements q TSA Workforce issues

12 Key Terminal System Flows

Add’l Pax Screen Gate Security Passengers Boarding Check Drop-off Check-In Parking

Ckd Bag Bags/Cargo Screen Ground Gates Transport

Pick-up Bag Claim Parking Security Point

Airside Landside

13 Passenger Screening Controversy

q Enhanced Passenger Screening Announced April 2010 q Privacy and Radiation Concerns on Backscatter X-Ray and MMW Scanners • 63 Airports • Pilots exempted q Aggressive Patdowns for “Opt-Out” Driven by Christmas 2009 Bomb Attempts

14 q Suppression of Demand Security (Cargo)

q Yemen Bomb Plot (9/28/10) • UPS (East Midlands) and FedEx (Dubai) Aircraft Involved • Re-evaluation of 9/3/10 UPS (Dubai) Take-off Accident q Implications for Air Cargo Security Requirements • 100 % Belly Freight Screen (August 2010) • Certified Shipper Programs at Risk • Potential for 100% Screen Requirement • Lack of standard international protocols q Need to Balance Real vs Perceived Risk

15 System Requirements Operational Feasibility

16 Strategic Architectures

q Dynamic Layered Architecture • Reason Swiss Cheese Model

q Advantages • Not dependent on 100% POD • Use of Mixed Cost Elements • Deterrence - Difficult to Prove • Adaptability and Flexibility • Rotation of New Technologies

17 General Detector System

Alert or Threshold Sensor Display Logic

q Equipment Detection Performance q Human Performance q Throughput q Cost

18 Role of Technology

q Technology is one component of the Air Security System which also includes: • Humans and Human Judgment • Procedures • Physical Infrastructure (eg Barriers and Facilities) • Detection and Deterrence Strategies • Intelligence • Information Technology • Network of Trusted Agents q Technology is not a panacea • There is no magic bullet

19 Alerting Threshold Placement System Operating Characteristic Curve

Ideal Alerting System

1.0 1 0.9

0.8 2

0.7

0.6

0.5 P(SA) 0.4 Example Alerting Threshold Locations 0.3

0.2

Probability of Successful Alert Successful of Probability 0.1

0.0 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 Probability of False Alarm P(FA)

Courtesy: Jim Kuchar 20 Alerting Threshold Placement System Operating Characteristic Curve

Ideal Alerting System

1.0 1 0.9

0.8 2

0.7

0.6

0.5 P(SA) 0.4 Example Alerting Threshold Locations 0.3

0.2

Probability of Successful Alert Successful of Probability 0.1

0.0 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 Probability of False Alarm P(FA)

Courtesy: Jim Kuchar 21 Comparing Different Technologies and Systems

System A

PCD POD Spec

System B Line of Guessing

Throughput Trades System A vs System B

PFA

22 CTX 9000 Explosive Detector

500 Bags/hr

23 Integrated Human System Performance

Alert or Threshold Sensor Display Logic

q Display and Human Interface q Training q Fatigue

24 Display and Human Interfaces

Image Sources: www.airport-int.com/ and Theisen, Hannum, Murray, Parmeter, Sandia “Survey of Commercially Available Explosive Detection Technologies”.. 25 Human Performance vs. Task Load Curve Performance Performance

Task Load

26 Sensor Technologies

q Trace Detectors • Vapor • Particulate q Active Scanners • X-Ray • Neutron • High Energy Photons (NRFI) q Passive Scanners • MMW • Infrared • Visible • Radiation Detectors

27 Trace Detectors

q Targets: Explosives, Narcotics, Organics q Vapor or Particle Detectors • Depends on Vapor Pressure of Targets q General Methods • Ion Mobility Spectrometry • Chemluminescence • Thermal-Redox • Surface Acoustic Wave • Chemical Reagents • UV Fluorescence • Mass Spectrometry

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 28

Ion Mobility Spectrometry

q Vapor and Particle q Throughput 2-3 samples/min

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 29

Chemluminescence

q Chemical Reaction with Nitrates gives off IR • Limited to Nitrogen based explosives q Vapor and Particle q Throughput 2-3 Samples/ Min

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 30

Thermal-Redox

q Concentrated samples heated to release NO2 molecules • Limited to Nitrogen based explosives q Vapor and Particle q Throughput 2-3 Samples/ Min

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 31

Surface Acoustic Wave

q Material deposited on surface change wave propagation on SAW crystal detector surface. • Can be combined with Gas Chromatograph q Vapor q Not limited to explosives q Throughput 1+ Samples/ Min

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 32

Chemical Reagents

q Color change indication with chemical reaction of reagent to target substance q Particle q Throughput 1+ Samples/ Min

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 33

UV Fluorescence

q Explosive Residue reacts with polymer which fluoresces unless quenched when reacting to trace explosive materials q Particle q Throughput low

Source: William Trogler, UCSD (handprint); RedXDefense (kit), TechReview 34

Mass Spectrometry

q Molecules are ionized and filtered by mass (magnetic, ion trap, time of flight) q Sometimes combined with gas chromatography q Throughput 3 Samples/Hr

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 35

Canines

q Flexible and Portable q High Throughput q Detection performance depends on animal and training

Image Source: New York times 36 Active Imaging Systems

q Active Scanners • X-Ray – Single Energy – Dual Energy – Computed Tomography – Backscatter • Gamma Ray • Neutron – Thermal Neutron Activation – Pulsed Fast Neutron Analysis • High Energy Photons (NRFI)

37 X-Ray (Single Energy)

q Image based on absorption of X-Ray through sampling volume q High energy X-Rays can image large objects q Image density, cannot specifically identify materials

Example: Rapiscan F9000, 9MV, 425 mm steel penetration, 750 mm/sec rate

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 , Rapiscan Systems 38

X-Ray (Dual Energy)

q By using multiple energy X-Rays can get information on molecular weight (Z) • Organic (low Z), Inorganic (High Z)

Example: Rapiscan 632XR Multi Energy X Ray Imaging

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 39

Computed Tomography (CT)

q Rotating X-Ray system provides 2-D slices through the scanned object q Throughput

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005 , http://science.howstuffworks.com/airport-security6.htm 40 Backscatter X-Rays

q Imaging based on Backscattered X-Rays

AS&E Images

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005, American Science and Engineering 41 Backscatter X-Rays

q Multi View Portals

AS&E Images

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005, American Science and Engineering 42 Gamma Ray Scanners

q Gamma Ray (KeV) photons penetrate and interact with target. q Sources Cobalt 60, Cesium 137

Source: Rapiscan Product Specs 43 Thermal Neutron Activation

q Low energy neutron beam interacts with target materials giving off high energy gamma rays (eg Nitrogen 10.8MeV gamma rays) q Both neutron beam and gamma rays penetrate objects

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005, 44 Thermal Neutron Activation

Neutron Scanners

Source: Rapiscan Product Specs 45 Pulsed Fast Neutron Activation

q High energy neutron beam pulses (generated by electronic neutron generator) interacts with target materials giving off high energy gamma rays. q Higher neutron penetration and ability to look for more targets than thermal neutron methods q More expensive than thermal but more controllable

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005, 46 Nuclear Resonance Fluorescence

q High energy photon beam (3-8MeV) interacts with target.

q Backscatter allows identification of isotopes. Broad spectrum.

Source: Passport Systems, Nuclear Resonance Fluorescence Imaging in Non-Intrusive William Bertozzi1, Robert J. Ledoux2 47 Passive Imaging Systems

q Passive Scanners • Radiation Detectors • MMW • Infrared • Visible

48 Radiation Detectors

q Sensors detect radiation from target nuclear sources

Example; Mobile Radiation Portal Monitor, Photo Credit John Demers

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005, 49 Infrared Imaging Systems

q Detects thermal “black body” radiation q Does not require light q High performance systems require cooling q Perimeter monitoring

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005, CRELL 50 Visible Imaging Systems

q Low cost, low size CCD cameras q Image analysis and detection technologies q Object and perimeter monitoring

Source: Survey of Commercially Available Explosives Detection Technologies and Equipment 2004,Lisa Thiesan, David Hannum, Dale W. Murray, John E. Parmeter , DOJ Doc No.: 208861, February 2005, CRELL 51 Passive MMW Detectors

q Based on absorption of naturally generated Millimeter Waves (Terahertz) q Can operate in standoff mode q Needs background MMW Source

Source: Brijot Systems 52 Other Technologies

q Tracking and Sealing q Processing and Display q Information Technology q Other

53 Air Marshals

54 Questions

55