AIRPORT AND TERMINAL SECURITY

Slides:



Advertisements
Similar presentations
Forensic Victimology 2nd Edition Chapter Fifteen: Forensic Victimology and Civil Remedy in Premises Liability Cases.
Advertisements

Safety For You and Your Home Community Education Specialist Mary Browning Naperville Police Department.
Airport Security – Post 9/11
WMD Crime Scene Management
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Structural Vulnerability, Risk Assessment and Land Use Issues for Transportation Infrastructure May 18, 2005 Shay K. Burrows, P.E. Senior Structural Engineer.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
BATTALION OPERATIONS SECURITY SERVICES 20 Thornton Road, Krugersdorp, South Africa Registration No: 2012/117366/07 PSIRA No: Tel:
In-depth look at ISACS Stockpile Management: Weapons Photo: MAG.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Physical Security John Schwertfeger Security Manager Duane Arnold Energy Center.
AVIATION SAFETY & SECURITY LECTURE 4: AIRPORT SECURITY
Chapter 5 Enhancing Security Through Physical Controls
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
1 MODEL ACADEMIC CURRICULUM MODULE 5 Crime Theories and Crime Opportunity.
FIRE Fires in hotels and catering establishments are fairly common and can result in injury or loss of life to employees and customers.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
2 3 Common methods used to identify hazards include:  Workplace inspection  Process or task analysis  Review and analysis of past workplace accidents.
Suvarnabhumi Airport Development Case study for Airport Security September, 2004 KOICA (NESDB) ( Incheon International Airport 2)
Chapter 2 Modern Private Security
Workplace Violence Research has identified factors that may increase the risk of violence at worksites. Such factors include working with the public or.
Three Lines of Defense Presented by the Arapahoe County Sheriff’s Office.
EGRESS AND FIRE PROTECTION
Hazard Identification
9/11 – 19 hijackers took control of four aircraft after boarding with (possibly) the following items: Mace, tear gas or pepper spray Leatherman-type multi-function.
1 Book Cover Here Chapter 21 ARSON AND EXPLOSIVES Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier.
Mission Aircrew Course Chapter 3: Survival and Urgent Care (May 2006)
O-2017 Minnesota Wing Aircrew Training: O-2017 Survival and Urgent Care.
AVIATION SECURITY.
Occupational Safety and Health 6 th Edition Lecture Notes By: Dr. David Goetsch.
Lecture 5: AIRPORT SECURITY
AVIATION SAFETY & SECURITY
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
FIRE PREVENTION. Fire Of the many hazards on site or at work, fires are the worst kind. They do a great deal of damage every year.  All fires, however.
Terrorism Citizen Corps Citizen Corps Areas of Emphasis: Crime Natural disasters Terrorism.
Chapter 8 Preventing Losses from Criminal Actions.
Exploring the Use of Roving Security Inspections to Increase Post 3/11 Rail and Bus Transit Security in the US Transportation and Development Institute.
Hazard Identification
EU Regulations & Standards on EDS for Cabin Baggage Screening: Meeting the challenges of future Anthony Parker May 6, 2015 Bahrain.
LECTURE 9 SAFETY RISK MANAGEMENT AVIATION SAFETY & SECURITY.
Security aspects in the construction and maintenance of infrastructures of the inland transport sector Richard Harris Director Intelligent Transport Systems.
Certified Protection Officer Program. Chapter 1 Unit 1 Concepts and Theories of Asset Protection Pages 3-11.
Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY
In-flight & Airport supplies ( )
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
Security in Air Transportation
Parallel Structure p18. Parallel Structure Adjective & Noun Methods used in the field of crime prevention through environmental design include security.
Hazard Identification & Safety Risk Management.  Hazard Identification and safety risk management (SRM) are the core process in the management of safety.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
Means of Egress Don Ebert- Risk Manager (509)
IAFF Always on the Front Line 1. Use shipping papers and facility documents to identify hazardous materials. 2. Use the NIOSH Pocket Guide as a chemical.
CREATED BY THE JOINT INTELLIGENCE UNIT. CRIME PREVENTION TIPS GOAL To make security companies and business owners aware of some safety tips and crime.
Application of Criminological Theory to Terrorism Prevention Detective Eric Paull Planning Research and Development Akron, OH Police Department.
CPNZ Basic Training 002 – Patrol Basics Part 1. The Role of Community Patrols Community Patrols are members of the public, they work with the Police and.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Module 8 Risk Management. Manager, Customer Services Module 8Slide - 2 Objective The learner will be able to: –Develop an understanding of Security Responsibility.
Headquarters U.S. Air Force
Chapter 2 Modern Private Security
Prevention Analysis Security Services.
M I S S I O N S T A T E M E N T THE PRIMARY MISSION OF THE SIUE POLICE DEPARTMENT IS TO PROVIDE FOR THE SAFETY AND SECURITY OF ALL MEMBERS OF THE SIUE.
Screeners and the Screener Organisation
Disaster Preparedness
Risk Management Definition
Rational Choice Theory
Air Carrier Continuing Analysis and Surveillance System (CASS)
Part F-I The Economic Theory of Crime and Punishment
Science of Crime Scenes
Environmental Criminology
Challenges Of Network Security
Presentation transcript:

AIRPORT AND TERMINAL SECURITY Passenger terminal security Surveillance Terminal personnel Baggage handling systems Terminal parking Unattended baggage Unclaimed hold baggage Public viewing areas Protection of hold baggage

SECURITY MEASURES FOR AIR CARGO 1. Aircraft carrying air cargo must operate from within a secure environment; 2. All air cargo must be subject to some degree of security control, before being placed on board a passenger-carrying aircraft, with the devotion of maximum effort to the screening of air cargo consignments whose security cannot be readily determined; and 3. A consignment of air cargo once security cleared, must be protected from interference.

SECURITY MEASURES FOR AIR CARGO 4. Active procedures should include the use of conventional X-ray equipment, explosive detection systems, hand search, simulation chambers and explosive detection dogs. 5. Preventive measures are based on the rationale that if the consignment is packed securely initially, and then kept secure thereafter, the requirement for screening or searching is reduced.

SECURITY MEASURES Catering security Pre-employment background checks Security patrols Security surveys Security tests Background checks of security staff

We all know well about the Fire Triangle. We learned that in order for a fire to burn, three things are required. They are Heat, Fuel and Oxygen. Remove any one of the three and a fire can’t happen.            HEAT FUEL   OXYGEN 

INCLINATION ASSETS OPPORTUNITY Crime, like fire, requires three components in order to occur. . These components are Inclination, Assets and Opportunity. As with fire, removal of one or more of the components will prevent the crime from occurring.            INCLINATION ASSETS   OPPORTUNITY 

INCLINATION This component describes the desire or motivation of an individual to commit a crime. Examples are: financial gain, revenge, jealousy, anger and hatred. Because inclination involves a person and their mental processes, from an airport management standpoint, it is the most difficult component to remove. Inclination exists in the realm of psychologists, sociologists and criminologists. There is little that airport managers can do to influence it.

ASSETS This component describes something to be gained by committing a crime. Assets are usually thought of as tangible objects such as an aircraft or avionics. However they may be intangible or abstract objects. In a murder, the victim is the asset. The bombing of a building could involve multiple assets. These may include the property that is destroyed. They might also include the symbol that the organization projects and the employees working in the building. The World Trade Center is an example of a symbolic asset. While it may be theoretically possible in some instances to remove assets to prevent crime, it is generally impractical or unrealistic.

OPPORTUNITY This component describes the circumstances and conditions that permit a crime to occur. Every crime has its own unique set of opportunities, but two conditions are usually present. These are: (1) Access to the asset(s), and (2) An apparent likelihood that the crime can be committed successfully with minimal risk to the perpetrator. Opportunity is the crime component that is most readily influenced by security measures. When developing an airport security program, the first priorities should be the recognition of criminal opportunities followed immediately by the initiation of actions to remove those opportunities The remainder of this manual and the accompanying assessment checklist will explore in detail the tools available to eliminate the opportunity for criminal activity at your airport.  

DETER The goal of deterrence is the creation of an environment that is unattractive to criminals. Anything that increases the likelihood that a criminal’s actions will be observed and reported to police or security personnel is a deterrent. In general, open, well lit, well used areas are less susceptible to crime. The visible presence of security measures and the use of access control devices and barriers are deterrents. Alert employees, security personnel and legitimate airport users are deterrents. A successful deterrence program makes the criminal hesitant to commit their crime in that environment. Even when the facility itself is the target, such as with anti-government terrorist attacks, a well- designed deterrence program may prevent an attack. Effective deterrents place psychological and/or physical barriers in the criminal’s path and imply to them that they have no easy opportunity to successfully commit their crime.

DELAY In spite your best efforts, some criminals may not be put off by security measures and other deterrent efforts. In these instances, your next line of defense is to delay completion of the attack. The longer it takes a criminal to complete an attack, the greater the probability that they will be observed and apprehended. Barriers such as solid doors, good locks, fencing and other physical security measures are all devices that delay a criminal’s activities. The presence of delaying measures increases both the difficulty and risk associated with a criminal’s activities. Increased delay usually equates to decreased opportunity in the criminal mind.