ATC Security Good Morning, I’m _______________, the 78

Slides:



Advertisements
Similar presentations
Security and Stockpile
Advertisements

NOSS: The Methodology and Early Findings
Page 1 CARE/ASAS Activity 3: ASM workshop Brétigny, 19 December 2001 Autonomous Aircraft OSED CARE-ASAS Activity 3: ASM Autonomous Aircraft OSED.
Air Traffic Management
By: Nurhan Tan, NAS Planning & Integration Date: Sept. 16, 2009 Federal Aviation Administration ACA Association of California Airports Conference S. Lake.
UNIT PHYSICAL SECURITY PLAN
Incident Command System Basic Course
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Normal and Emergency Communication Procedures
Topics of Discussion:  Introduction  Identify & describe the protocols & processes for: Lockouts Sheltering in Place Lockdown Evacuation  Active Shooter.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Miami International Airport’s Integrated Airport Management System
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Airports Authorities of India Jaipur Airports Authorities of India Jaipur
Lecture 3: Air Traffic Control Tower
Fundamentals of Writing an Essay There are many reasons for writing an essay (sometimes called a “paper”). You may want to –instruct, –inform, –impress.
© 2011 LAIC Aktiengesellschaft © Ifield Computer Consultancy Limited 2013 ATRAK-AISS Aeronautical Information System Services.
CY Segment 1 Phase 1 Tower Services Initial En Route Services Departure Clearances (DCL) Transfer of Communications Initial Check-In.
Good to Know Public Safety Information We are here to help your students navigate through and around the challenges new students face. Situational awareness.
Topics for Remote Pilot Certification Exam Alexus Garcia Unmanned Aircraft System Safety Center of Excellence University of California.
1 Emergency Management Overview Scott Ritzer Emergency Response and Security Enbridge Pipelines Inc.
computing ESSENTIALS    11 CHAPTER Information Technology, the Internet, and You computing ESSENTIALS
Information Systems Security
Computers in the Ambulatory Care Setting
Chapter 8. Electrical Systems
Royal Canadian Navy Nuclear Vessel Visit Safety Program
Senior Spouse’s Quick Reference Guide
Phase 4: Manage Deployment
Good to Know Public Safety Information
Base Maintenance Contract (BMC) Industry Day Participants
IOT – Firefighting Example
Agenda ACRP Project What is NextGen?
Air Traffic Control Communications
TYPES, AIRSPACE CLASSIFICATION, CHANGE FROM ONE TO ANOTHER
Florida Public Service Commission’s 2007 Storm Preparedness Workshop
Information Systems Sarika Agarwal.
Discovering Computers 2010: Living in a Digital World Chapter 14
MGMT 203 Airports, Airspace, and Air Traffic Control Management
© 2015 Air Force Association
Scenario on airport works
New Flight Inspection System
Control system network security issues and recommendations
FAA Flight Standards AFS-430 Fall FPAW 2016
Agenda Item 6 GNSS Operations Ross Bowie, NAV CANADA Rapporteur, Operational WG Navigation Systems Panel Thank you… Good morning… I am ... and member.
Welcome to our parent information session!
Clinical Engineering Lecture (3).
NICET Fire Alarm Tech Level 1 Practice Test # 6
Emergency Radio Services SchoolSAFE Communications
Data Communications Program
ATSEP training - general SJCS Latvijas Gaisa Satiksme (LGS) Latvia
Crown Point Community Schools Transportation Department
Wavestore Integrates… Paxton Net2 Access Control
Airports Conestoga Valley High School Aviation Technology
MGMT 203 Airports, Airspace, and Air Traffic Control Management
Chapter 8: Monitoring the Network
Chapter 8. Electrical Systems
Federal Protective Service
Lesson Five: Decision Making
Airports Conestoga Valley High School Aviation Technology
Bringing Large Commercial Airport Capabilities to Your Local Community
Toledo-Lucas County PODS Mass Dispensing Exercise
Welcome Rakshak Group of Companies Rakshak Security Services & Systems Pvt. Ltd. Pilot Project for Security Training Centre.
DATA CENTERS C21 Engineering Consultancy Services for Telecom Industry
Data Centre Environment
An Introduction to System Administration
Operational Context and Use Case Focus Group
Presentation transcript:

ATC Security Good Morning, I’m _______________, the 78 Security Forces Resource Protection Manager and I want to welcome all of you to Controlled Area Monitor Training

Overview These are the topics I will going Purpose What is a Controlled Area Physical Security Procedures Cyber Security Procedures Suggestions Summary Questions? These are the topics I will going over today and if at any time during the presentation you have any questions please feel free to ask and I will do my best to clarify

Purpose To explain current physical and cyber security measures at ATC facilities Recommend security improvements and provide feedback Resource Protection Program is designed to develop habits and attitudes in Air Force personnel that, when combined with protective measures and equipment, will enhance the security of the installation

Controlled Areas Mission essential communications facilities and computer centers, air traffic control tower facilities, RAPCONs to include off installation navigational aids and related resources, power plants, and environmental control systems critical to operational capability ATC facilities are considered Level 4 Controlled areas All areas must be inspected and certified by 78 SFS/S5C and CE before they can hold Protection Level 4 resources and be designated a Controlled Area -Mission essential communications facilities and computer centers, air traffic control tower facilities, RAPCONs to include off installation NAVAIDS, power plants, and environmental control systems critical to operational capabilitiy -Accounting and Finance -Flightline parking ramps and taxiways -Pharmacies and medical logistics vaults

Physical Procedures Entry/Exit control and escort procedures Bomb treat procedures Other emergency egress/evacuation procedures for fires, etc. Emergency entry and access procedures Internal circulation control procedures Controlled Area Training requirements and location of training documentation Key and lock control procedures Alarm test and operational procedures Challenging techniques when unauthorized personnel are observed and notification of security forces Unit Operating instructions are procedures for all personnel who work in the controlled area to follow. There are certain requirements as a minimum that they must contain: Read Slide

Access Control Unescorted Entry – granted to individuals that have an official need for routine presence within a controlled area Escorted Entry – required for individuals that are not granted unescorted entry Required to sign in on the AF Form 1109, Visitor Control Log, maintain for 90 days REAd

Security Measures Facility Managers must secure the ATC operating area at all times. Install a cipher lock or other suitable locking device at initial entry points to control towers and radar facilities. Install similar devices at the main entry point to the control tower cab and the radar operations room. Secure other entry points to the tower cab and radar operations room with manual devices, such as dead bolts, locks, hasps, etc. Secure mobile radar and tower facilities to the maximum extent possible.

Evacuation Procedures

Cyber Security Electronic Components in the Tower Cab: FDIO (Flight Data Input Output) AFAS (Airfield Automation System) STARS (Standard Terminal Automation Replacement System) ETVS Enhancced Terminal Voice System

FDIO Provides access to flight plans in the national airspace system Allows modification of flight plans Enables ATC messages between ATC facilities Connected via a secure network hosted by the base and the Atlanta TRACON

AFAS Provides access to weather information (METARs) Connected directly to weather servers hosted by the base weather office Allows controllers to make sound decisions based on current or forecasted weather conditions

STARS Provides real time information on airborne aircraft Information is received from radar Antennas. Information is then translated by the STARS computer system at an FAA Facility and disseminated to all FAA/Military towers or radar facilities in the area. FAA is in the process to transition to Satellite based tracking allowing the possibility to cyber attacks

ETVS non-blocking, fully integrated, digital voice communications system. Designed to allow air traffic controllers to communicate with planes while in the air and on the runways by use of UHF and VHF

Suggestions To add ID Scanners in conjunction with cypher locks To Install better camera security systems Ability to block entry in case of an active shooter Provide network security for Inter facility equipment Stopping public access to airfield information such as frequencies and equipment used on airfields

Summary This is what we went over today. Purpose What is a Controlled Area Physical Security Procedures Cyber Security Procedures Suggestions This is what we went over today. Remember! This is the installation commander’s program and for everything to run smoothly I need everybody’s full participation to make this work.

Do you have any Questions?