Professional Documents
Culture Documents
Cargo Security Awareness ETextbook 2nd Ed 2016 TCGP-79-Đã Chuyển Đổi
Cargo Security Awareness ETextbook 2nd Ed 2016 TCGP-79-Đã Chuyển Đổi
Awareness
Course eTextbook
2nd
Edition
Program
NOTICE
DISCLAIMER. The information contained in this
publication is subject to constant review in
the light of changing government
requirements and regulations. No subscriber or
other reader should act on the basis of any
such information with- out referring to
applicable laws and regulations and/or
without taking appropriate professional advice.
Although every effort has been made to
ensure accuracy, the International Air
Transport Association shall not be held
responsible for any loss or damage caused by
errors, omissions, mis- prints or
misinterpretation of the contents hereof.
Furthermore, the International Air Transport
As- sociation expressly disclaims any and all
liabil- ity to any person or entity, whether a
purchaser of this publication or not, in
respect of anything done or omitted, and
the consequences of any- thing done or
omitted, by any such person or en- tity in
reliance on the contents of this publication.
© International Air Transport Association.
All Rights Reserved. No part of this publication
may be reproduced, recast, reformatted or
trans- mitted in any form by any means,
electronic or mechanical, including
photocopying, recording or any information
storage and retrieval sys- tem, without the
prior written permission from:
Director
IATA Training and Development
Institute International Air Transport
Association 800 Place Victoria
P.O. Box 113
TABLE OF CONTENTS
Course Guide............................................................................................................................1
Introduction................................................................................................................................... 3
Introduction
The IATA Cargo Security Awareness Manual has 7 Modules, each followed by
a progress check questions with which the student can verify gained
knowledge from his readings. The training materials are all easy to read and
understand. Each subject area is dealt with in detail and examples and
exercises have been included in each module to illustrate the instruction. You
will be able to monitor your progress through self-administered sets of review
questions provided at the end of every unit.
Two major organizations playing vital role in the field of aviation cargo security.
International Civil Aviation Organization (ICAO) is focused primarily on
developing and coordinating an effective global policy and legal framework. At
the same time International Air Transport Association (IATA) in close cooper-
ation with governments, decision-makers and leading authorities such as
ICAO, the US Transportation Security Administration (TSA), the European
Commission, Transport Canada and the Canadian Air Transport Security
Authority (CATSA) working to ensure that appropriate policies are written with
the benefit of airline operational expertise and to assist member airlines
correctly to implement those policies.
The prime objective of both organizations is Safe and Secure Air Transport.
The Yemen printer cartridge incident focused attention on aviation cargo as a
weak point in global security chain. The air cargo system is a complicated
network involving variety of stakeholders including manufacturers, shipper,
freight forwarders, airport and airline. Air cargo industry handles enormous
amount of ULDs, pallets, packages, and mail carried domestically and
internationally aboard passenger and freighter aircraft. The air cargo system is
vulnerable to security threats and this advanced the need of all aviation cargo
related personnel to be trained in air cargo security awareness. This training
applies to the protection of people and assets from unlawful interference and
the necessity of ensuring all personnel have a positive attitude to security. It is
very important each individual to understand and accept philosophy of
“Security's everybody business” because this refers to personal and public
safety and security.
Propose of Air Cargo Security is to “harden” possible targets to the extent
that perpetration will not be attempted and air cargo shipments becomes
unattrac- tive for potential attacks.
This course will give you an informative overview of the aviation security
threats related to cargo and will give you basic knowledge of how security
measures are conducted.
This training will also prepare air cargo staff to understand their part in this
dynamic system. As well It may provide the foundation for all security
personnel who have to execute cargo security functions as part of their daily
routines.
The course is based on current industry regulations and publications. It
covers the following subjects and objectives:
Module 1–“Threats to Civil Aviation” will inform you about the reasons why
the aviation industry has been traditionally a popular target for terrorist and the
types of attacks that have been used against it.
Module 2–“Introduction to Cargo Security” will give you an informative
overview of cargo and its complexities. It will also introduce you to the
principles of cargo security.
Module 3–“Implementing Cargo Security Measures” will introduce you to
the fundamentals of implementing cargo security. Unlike implementing
security
Introduction 3
measures for passengers and their baggage, cargo security is much more
complex.
Module 4–“Crime Prevention & Security Quality Control Measures” will
present you one of the most common areas of threats for airfreight i.e. crime.
We will also discuss security quality control measures to reduce these threats.
Module 5–“Recognition and Management of Threats” will look at one of the
most common threats facing the aviation industry i.e. the use of explosives.
Besides explosives, you will learn that some articles are also not allowed to be
carried onto aircraft such as undeclared dangerous goods and prohibited
items.
Module 6–“Detection of Threats” will present two aspects related to
“detection of Threats” to cargo and all other items that also are carried on board
an aircraft, especially mail, catering, stores and supplies.
Module 7–“Management and Administration” will give you an informative
overview of management and administration of cargo security operations. You
will be introduced to a new concept in enhancing security using a pro-active
approach to security.
LEARNING AIDS
To help you successfully complete and enjoy the course in a productive
fashion, we have included the following learning aids:
Module Overview
At the beginning of each module, you will see an introduction that provides an
overview of the module's content. The module overview also highlights the
learning objectives of the content you will be covering.
Units
Each module is composed of several units, which include:
Unit Overview
The beginning of each unit provides you with an overview of the topics to be
covered and its learning objectives.
Study Check
At the end of each unit is a short exercise composed of multiple choice, short
answers, or matching questions. These are designed to provide you with the
opportunity to see if you understood the material. An “Answer Key” follows the
exercise so that you can check your responses.
Unit Summary
Each unit ends with a summary of the key points.
Module Summary
Each module ends with a summary which brings together the main points of
each unit.
Key Learning Points
Key Learning Points are highlighted throughout the text and are designed to
emphasis particularly important issues and facts.
USE OF LANGUAGE
We realise that there is an international audience for this and other IATA
distance education programmes, and that many students will have English as a
second language. As such, we have made every effort to keep the language in
this manual at a level which every student can understand.
Note
1. We will be using some Latin abbreviations in the text, most notably
‘i.e.’ (meaning ‘id est’ or ‘that is’) and ‘e.g.’ (meaning ‘exempli gratia’ or
‘for example’).
2. For practical reasons the terms ‘he’, ‘him’ and ‘his’ have been used to
refer to male and female persons
Module 1:
Threats to Civil
Aviation
Cargo Training Program
Module Learning
Objectives
Upon completion of
this module, you
should be
able to:
Module Introduction
This module will give you an informative overview of the aviation security
threats related to cargo and will introduce you the core concepts and
terminology which will be explored in greater depth in later modules related to
cargo security. For example, this module explains the threats to Civil Aviation in
respect to cargo which will form the foundation upon which we will understand
the concept of what and how cargo security is applied in the air cargo
environment. By understanding the threat you will begin appreciate the
important role you play in helping to make any airport or airline a safe and
secure so that passengers can have a pleasant flight to and from destinations.
In this module too, you will look at the reasons why the aviation industry has
been traditionally a popular target for terrorist and the types of attacks that has
been used against it.
You will also examine the people who have targeted this industry in the past
and their motivation in having executed these attacks. This is important to
understand as the industry still continues to be a popular target and the type of
people beginning to enter into such activities is evolving.
You will be introduced to past incidents related to cargo that were perpetrated
against aviation and how these have impacted the ever changing dynamics of
the security measures that needs to be introduced to reduce a recurrence of
similar incidents and the role you play in contributing to the effectiveness of
these measures.
Module Introduction 9
Cargo Training Program
TRUE FALSE
1. Place a check in the True or False box
beside the following statements.
(a) Threats to Aviation can be categorised
as terrorism and crime.
(b) The entry of the A380 aircraft has had
no impact on its popularity to terrorists.
(c) The 1st known hijack of an aircraft took
place in Peru.
(d) Terrorists realise that targeting civil
aviation provided greater threat to them.
2. Give four reasons why civil aviation is an
attractive target to terrorists and
criminals. Write your answer in the space
provided.
(a)
(b)
(c)
(d)
3. In the space provided ,place in order which
of these is the most common and least
common (terrorism and crime)
(a)
(b)
form of ground to air or air to air fire directed against aircraft in flight or
armed assault when on the ground;
• Improvised Incendiary Device (IID)–Threats to place an incendiary
device on an aircraft or in a terminal or other airport buildings and
aviation facilities;
• CBRN–This is the use of Chemical, Biological, Radiological and
Nuclear systems that can cause havoc if unleashed
• Hijack–Threats to seize control of an aircraft, in the air or on the ground;
• Seizure of Hostages–Threats to seize hostages in a terminal or
other airport building. Such a threat, if carried out, could lead to a
barricade situation and cause major disruption to the facility involved;
• Armed Attacks–Threats by an individual or a group to carry out an
armed attack at an airport or other facility serving civil aviation;
• Sabotage–Threats of malicious or wanton destruction to aviation
facilities and equipment. Could include the use of bombs/IEDs;
• Extortion–Intimidation of aviation industry organisations for financial gain
by threatening to attack aviation assets owned or managed by the
industry organisation;
• Violent Protest–The threat of protest by politically or issue motivated
groups from whom there is, or likely to be, intent to commit acts of
violence and/or to disrupt the operations of an airport or other aviation
facility;
• Breaches of Security–Threats to breach or compromise security
measures with the intention of gaining access to security restricted areas
of airports or to place weapons or sabotage devices on an aircraft;
• War-like Actions–Threats to an aircraft arising from its operation into
or over countries where hostile action is occurring. Threats could be in
the form of ground to air or air to air fire directed against aircraft in flight
or armed assault when on the ground;
• Missile Attacks–Threats of attack against low flying aircraft, i.e.
approach- ing or departing an airport by persons using shoulder fired
surface to air missiles;
• Suicide Attacks–Attacks executed by suicide bombers via Vehicle
bound or human carried against aviation facilities or assets.
Indirect threats can arise from actions which, while not intended to threaten
aviation, are unlawful and because they occur at an airport or on an aircraft
have the potential to pose a threat. They include:
• drug, flora and fauna trafficking;
• smuggling, e.g. currency or bullion;
• in-flight violence, e.g. assault by an individual or a group on
other passenger or flight crew; and
• work place violence.
Where trafficking and smuggling is detected at an airport, action by law
enforcement officers to apprehend the offenders could lead to a situation
where aviation operations are threatened by the offenders in their attempt to
avoid arrest. It could also lead to the grounding of aircraft due to the discovery
of illicit goods. Examples would be an offender seizing a hostage and
barricading themselves in an office or lounge in a terminal building or the
grounding of an aircraft for a search of the cargo hold.
TRUE FALSE
1. Threats can come as direct or indirect
2. Hijacks and sabotage are indirect threats
3. Suicide attacks can be vehicle or human
4. One of the motives for terrorist is to
change government or international policy
5. Employees are not a source of threat
6. Manpads and Sabotage methods were
used in the past
7. Name any two indirect threat to civil aviation
(a)
(b)
Trans World AirlinesFlight 840 was a Boeing 727-231 flying en route from
Rome’s Fiumicino Airport to Athens. A bomb was detonated on the aircraft
while it was over Argos, Greece, ejecting four American passengers (including
a nine-month-old infant) to their deaths below. Five others on the aircraft were
injured as the cabin suffered a rapid decompression. The remaining 110
passengers survived the incident as pilot Richard “Pete” Petersen made an
emergency landing.
A group calling itself the Arab Revolutionary Cells claimed responsibility,
saying it was committed because of “American arrogance” and clashes with
Libya in the Gulf of Sidra the week before. Investigators concluded that the
bomb contained one pound of plastic explosive. It is suspected it had been
placed under the seat cushion on a previous journey by a Lebanese woman
(later arrested, never convicted) who worked for the Abu Nidal Organization,
which was opposed to the peace process.
On 3 May 1986, an Air Lanka L-1011 Tristar aircraft on the ground at Colombo
prior to a flight to the Maldives, suffered a bomb explosion. The incident
occurred as passengers were boarding the aircraft prior to its departure for a
scheduled flight to the Maldives. The explosive device was placed inside a
consignment of perishable cargo that had been placed in the C2 cargo
compartment near the rear of the aircraft.
The flight had in fact been delayed because of damage caused during the
loading of the aircraft and would appear to have been timed to explode when
the aircraft was in the air. A total of 16 persons were killed and 40 persons
injured 16 of them seriously. Responsibility for the bomb attack was placed with
extremists from the Tamil separatists that operate within Sri Lanka.
December 21, 1988: PA 103 From London–New York
According to aviation security experts, the PETN explosive used in the Yemen
parcel bombs is “almost undetectable” even for sniffer dogs.
(Reuters-http://www.swissinfo.ch/eng/swiss_news/
Parcel_bombs_spark_air_freight_concerns.html?cid=28699974)
Two US-bound parcel bombs were sent to the US from Yemen. The bombs
from Yemen have been blamed on al Qaeda. The two US-bound parcel bombs
containing the lethal explosive PETN packed into computer printer cartridges
and addressed to synagogues in Chicago were found in Dubai and Britain.
http://edition.cnn.com/2016/02/24/middleeast/egypt-sissi- russian-plane-sinai/
The Egyptian authorities have not yet published a definitive report on the crash
or possible terrorism as a cause. However, the Russian Federal Security
Service said a bomb with 1 kilogram (2.2 pounds) of explosives had
detonated on board the plane. The photograph (below) shows a possible
detonator and switch.
Did You Know?
That ICAO was established in 1947?
TRUE FALSE
1. Aviation Security is proactive most of the time.
2. Terrorists have the ‘element of surprise’.
3. One of the methods used to destroy an
aircraft was by placing an explosive device on
board.
4. The bomb on board Pan Am 103 was in
a Transistor radio.
5. The flight is allowed to take off with the check-
in baggage of a passenger who is NOT on
board.
6. ICAO security requirements are found in
Annex 17.
7. Document 8973 is the same as Annex 17.
8. There were 19 hijackers who conducted
the 9/11 operations.
9. Attacks into airport facilities is also an Act
of Unlawful Interference.
Module Summary
A number of topics were discussed in this module to introduce you to threats to
aviation. The key points that were covered include the following:
(a) Aviation is and will continue to be attractive to terrorists as a target
because it is a dynamic industry that is growing in terms of both
airlines and airports.
(b) History has shown us that terrorists are creative in the methods they
have used in the past to target aviation successfully. They will continue
to be attack soft targets.
(c) Security measures will continue to increase with these attacks as
aviation tries to reduce recurrence.
(d) ICAO has therefore introduced Annex 17 and ICAO Security Manual to
help Contracting States to enhance their airport security measures so
that terrorist will not be successful in conducting Acts of Unlawful
Interference against the airports or airlines.
(e) Aviation security is still very much reactive to the threats as the terrorists
have the element of surprise. It is hoped that by being more proactive,
this will change in the future.
(f) There are new sources of threats in addition to the traditional sources
that security agencies are aware of. This is because recent trends show
that the new ‘terrorists’ have no background records of past involvement
in such acts. Terrorists are now beginning to exploit the weakness of
cargo security measures.
Module Summary 27
Answer Key Study Check 1.3
Study Check 1.1 1. False–Aviation Security is, traditionally, reactive.
1. 2. True–The terrorists have the element of
surprise against civil aviation as they choose
the date,
(a) True. These are the key threats faced by civil time, target and method.
aviation.
3. True–This was one of the techniques used by
(b) False. The introduction of the A380 aircraft terrorists in the
past. means that the terrorist can inflict greater
numbers of casualty as this aircraft can carry 4. True–The transistor radio was in a check-in bag-
up to 800 passengers. gage and was rigged to be an explosive device.
(c) True. The 1st hijack took place 21 5. False–Following the Pan Am incident, baggage
February 1931 in Peru. of a passenger NOT on board was required to be
off-loaded.
(d) False. Terrorist have the confidence that tar-
geting civil aviation provides a lesser threat 6. True–Annex 17 contains the Standards and
of them to be detected and detained. Rec- ommended Practices.
2. Four reasons for civil aviation being popular are: 7. False–Document 8973 give guidelines as to
how the security measures in Annex 17 can be
im-
(a) High profile, plemented.
(b) High passenger traffic levels, 8. True–19 hijackers who cleared security at differ-
(c) Incident will force government intervention, ent airports to board 4 aircraft.
(d) Offers limited risk to terrorists 9. True–Attacks into airport facilities are also
classi- fied as Acts of Unlawful Interference by
3. The most common to the least common ICAO.
between terrorism and crime is
(a) Crime
(b) Terrorism
Module Learning
Objectives
Upon completion of
this module, you
should be
able to:
Module Introduction
This module will give you an informative overview of cargo and its complexities.
It will also introduce you to the principles of cargo security.
We have already discussed the threats to aviation security in the previous
module. We have also discussed past incidents related to cargo that caused
death, destruction and damage.
Cargo is considered in the aviation industry as the ‘Achilles heel’, simply
because it is still the weakest link in the aviation security chain. Cargo
operations are complex and involve many stakeholders. Presently, due to the
nature of cargo and the complexity of cargo operations, it is not possible at the
present time to screen cargo 100% in all countries as is done for passenger’s
baggage.
In order for us to understand the challenges that security faces in implementing
cargo security, we will also need to understand cargo operations. This will be
discussed in this module as well.
Module Introduction 31
Cargo Training Program
Consignor
The consignor (shipper) is the originator of the cargo. They are the first link to
the cargo supply chain. The supply chain of cargo starts when the goods are
prepared for carriage or when the goods become identifiable as air cargo.
Freight Forwarder
The freight forwarder is a person or company engaged in the business of
storing and dispatching shipments on behalf of other firms or individuals and of
handling the formalities involved with such shipments.
The services provided include: tracking inland transportation, preparation of
shipping and export documents, warehousing, booking cargo space, negotiat-
ing freight charges, etc.
Shipments and items of Cargo may be moved to an Aircraft Operator
for carriage by:
Normal Freight
Normal freight is freight that is produced by a manufacturer/supplier that
requires carriage by air to reach its intended destination or consignee. It also
does not require special handling.
Consolidation
Consolidations are shipments of Air Cargo that comprises Normal Freight from
more than one consignor/shipper, usually because the amount of Freight from
some shippers are too small to use a normal shipment of Freight in its own
right or to avail better freight rates. The individual or organisation that handles
such freight is called consolidators.
A Consolidator is a freight forwarder, who will collect shipments from shippers
and smaller freight forwarders, and consolidate them into one large shipment
under a master air waybill.
Special Cargo:
Example: Dangerous Goods (DG)
Since hazardous materials are transported all over the world onboard airplanes
on a daily basis, the ICAO Dangerous Goods Technical Instructions (TI) were
created to ensure that highest possible level of safety in this type of commerce.
To ensure compliance with ICAO TI, IATA developed a manual named
“Dangerous Goods Regulations” (DGR). Dangerous goods are defined as
“articles or substances which are capable of posing a significant risk to health,
safety, property or the environment”. DGR provides a set of criteria used to
determine if the term “Dangerous Goods” applies.
Transhipment
Transhipment is a shipment that has already been transported by Air from its
point of origin to the Freight Forwarder/Aircraft Operator who will subsequently
send the shipment on to another flight.
Unaccompanied Courier Items
These are shipments received by Freight Forwarders/Aircraft Operators from
Companies who collect items from other people and undertake to deliver them
at their final destination, without a representative of the Courier Company
travelling as a passenger on the flight.
Postal Mail
These are items or shipments tendered by and intended for delivery to State
regulated/controlled postal services destined for carriage by air and distribution
in accordance with the rules of the Universal Postal Union (U.P.U.).
Diplomatic Mail
Diplomatic mail is shipments and items that are sent from State
Representatives/Embassies/Consulates for official purposes where the recipi-
ent is their Nation State.
Company Materials (COMAT)
These are shipments or Materials sent by an Aircraft Operator on their own
Aircraft, for their own use at the destination of those shipments or Materials.
Unaccompanied Baggage shipped as freight
These are personal effects sent by the shipper for any reason where they will
not be travelling on the same aircraft with its owner. An example of this is
when someone has been posted to another country for work. Usually they
have to send their personal items to that country in advance of them arriving.
These personal items that they are sending ahead of them will go under this
category of cargo.
Catering Supplies
While Catering supplies and aircraft operators’ stores and supplies are not
considered as cargo, we must also ensure security controls are applied. The
supplies intended for carriage on passenger flights can provide a means to
introduce weapons, explosive devices or substances intended for use by a
perpetrator of an act of unlawful interference. Protection against acts of
unlawful interference will require careful consideration and planning by all
organizations, security agencies and aircraft operators involved.
The ICAO Annex 17 Standard 4.6.5 defines this requirement.
This will leave the Security Screening Staff employed by Aircraft Operators and
Freight Forwarders to Screen the more dubious shipments such as:
(a) Unaccompanied personal effects,
(b) Shipments where there are discrepancies between the cargo
descriptions, weights, pieces.
(c) first time shipments, and
(d) any shipments whose Security Integrity cannot be established or is
in doubt
With this process in place, the ultimate responsibility remains with the aircraft
operator to ensure that appropriate security measures have been carried out
but in effect the Air Cargo Security Programme allows Aircraft Operators to
delegate some of that responsibility to Regulated Agents.
The concept of the regulated Agents will be explained in the next module.
Study Check 2.2
7. One of the concept for applying the principles of cargo security is that
an aircraft carrying Cargo can operate from any environment.
True or False
8. Name three methods that can be used to screen cargo.
(a)
(b)
(c)
Module Summary
In this we introduced you to Cargo flow and the various definitions used for
cargo operations so as to help you appreciate the need for effective cargo
security measures. We also discussed the definitions of the types of cargo and
the typical cargo flow process. This is to stress the complexity involved in the
movement of cargo from a consignor to the consignees. We have seen the
number of hands or players involved in the process. These are the same
issues that make cargo security so daunting and so attractive to the
terrorists today.
In this module we also discussed the reasons why cargo security is very
important and the challenges for security in relation to the complexity of cargo.
We then discussed the reasons why ICAO developed the principles of cargo
security in order to recommend a rational and pragmatic approach that will help
ensure that cargo that gets loaded on board a commercial flight is made safe
and secure and how this approach can be implemented through the Regulated
Agent Regime.We also looked at the EU’s ACC3 compliance requirement for
operators flying cargo and mail into the EU from a non-EU last point of
departure The key topics covered in this module were:
(a) the terms and definitions
(b) type of shipments
(c) the reasons for cargo security
(d) the challenges for security
(e) the principles for cargo security
(f) the application of the principles
Module Summary 49
Answer Key 7. False
Study Check 2.1 8. Methods:
1. (c) because it is the weakest link • X-ray equipment (XRY);
2. False • Explosive Detection Systems (EDS);
3. (a) Any property carried on an aircraft other • Remote Explosive Scent Tracing
than mail, stores and accompanied or Explosive Detection Dogs (RES);
mishandled
baggage. • Free Running Explosive Detection Dogs
4. (b) Air Waybill (FRD);
5. (c) who is the originator of the • Vapor Explosive Trace Detection(VPT);
cargo 6. • Particle Explosive Trace Detection (PRT) ;
(a) Directly from a consignor/shipper • Cargo and Mail Metal Detection
Equipment (MDE);
(b) From a Freight Forwarder
• Subjected to any other means (AOM).
(c) From another Aircraft Operator
(d) From Courier Companies
(e) Cruise and Shipping lines
7.
(a) Normal freight
(b) Consolidation
(c) Transhipment
(d) Unaccompanied courier items
(e) Postal mail
(f) Diplomatic mail
(g) Company stores
(h) Unaccompanied baggage
(i) Special cargo
Module Introduction
This module will introduce you to the fundamentals of implementing
cargo security. Unlike implementing security measures for passengers
and their baggage, cargo security is much more complex.
This is more so because anything and everything can go on an aircraft as
cargo. Thus cargo security can be broadly separated into two parts. One is
based on the concept of securing cargo from its source to the time it is loaded
on board the aircraft and the second part looks at the security of cargo when
it is in storage, i.e. the warehouse security itself.
We will also see how information through the e-Consignment Security
Declaration (e-CSD) and e-AWB play a crucial role in the ensuring the integrity
of the secured air supply chain.
In this module, we are going to look at how they are integrated to create
a seamless system, which we hope will help us achieve our aim of
securing cargo.
Module Introduction 53
Cargo Training Program
3.1.2 Fundamentals of
Warehouse/Building Security
In order to satisfy the International and National requirements to safeguard
Cargo for carriage by air from Acts of Unlawful Interference and criminal
activities, it is not enough to merely screen Cargo that will be loaded onto an
aircraft.
The advantage of push button systems (see figure 3.1.3a) is that it allows for a
programmed code known only to authorised entrants. Further to this, no keys
are required, eliminating the need for key control measures. Another big
advantage will be that the program can be quickly changed if compromised.
This system can therefore be used for the cage security in the cargo
warehouse.
Another system is the radio-controlled devices. One such device is the
proximity access control system (see figure 3.1.3b). This system requires
authorised persons to carry A TOKEN (radio transmitter). The token has a
coded signal and operates as a hands free device. Similar to the push button
system, codes are easy to change.
Figure 3.1.3b—Proximity Access Control System
Coded Cards
Coded cards are another simple access control system. It uses a plastic coded
card that is specific to each individual. One of the advantages of this system is
that the codes are electronically inputted thus it will be difficult to duplicate it the
card is lost. Besides the system recognises the card NOT the person.
However, using such a system by itself is not the best. It should be augmented
by PIN.
Biometric Systems
Preventive security measures for the cargo terminals not only are for people
but also for vehicles. Just as personnel require security badges, vehicles also
need to be controlled by the use of vehicle permits. These can be permanent
or temporary.
In order to enforce the control of vehicles, the warehouse facility will have
vehicle access control points (see figure 3.1.3c).
6. The area surrounding the Building should all be access controlled and
protected from interference by the implementation of a variety of
measures such as:
(a)
(b)
(c) CCTV cameras coverage
(d) Security Patrols
8. A good access control system will use a combination of systems such as:
(a) Manually operated pass system
(b) Automated pass system
(c)
(d) Surveillance
However, such a trigger had its limitations because clocks only had a 12 hour
time span that can be used to detonate the device. Thus it was decided that
cargo consignments can be left to ‘cool’ on the ground for 24 hours before they
are loaded onto the aircraft. If the cargo is intact after the 24 hours of cooling
then it is presumed to be free of any explosive devices.
This changed when clocks were digitized. Now they could go up to 24 hours.
Thus cargo was cooled for 48 hours and above to determine if there was any
time bomb in the consignment. Due to the advancement in technology and the
creative nature of the terrorists of today, we realise that explosive devices are
being activated using more advanced methods such as the mobile phone.
Therefore a more robust methodology was needed, at least until screening
technology became more advanced.
Besides traditionally the the aircraft operator is only one link in the cargo flow.
Thus the risk of an explosive device being successfully infiltrated through
security was very high. However, if the number of links to the security of cargo
can be distributed across the supply chain, then the risk can be reduced
dramatically. Therefore, it became evident that in order to secure the cargo
throughout the handling, responsibility had to be assigned to the other parties
involved.
This gave birth to the Regulated Agent Regime as promulgated by ICAO.
Traditional method
Traditionally, cargo security controls were applied at the airport by the aircraft
operator (see figure 3.2.1a).
How it works?
The ICAO definition of a regulated agent is:
“An agent, freight forwarder or any other entity that conducts business with an
operator and provides security controls that are accepted or required by the
appropriate authority in respect of cargo or mail.”
Thus a regulated agent or RA can be a freight forwarder, a shipper, a Ground
Handling Agent or a Carrier who applies appropriate security controls on cargo
and is regulated by a relevant authority.
Since the Regulated Agent regime allows for most of the security controls to be
performed away from the airport, it enables aircraft operators and airports to
focus the screening on more high-risk cargo.
The Regulated Agent is in effect being handed the responsibility of screening
and securing the cargo. However, air carriers or ground handling agents acting
on their behalf maintain the ultimate responsibility for the safety of the aircraft
and therefore must ensure compliance with all cargo security regulations.
The Concept of the Regulated Agent is broad enough for it to be applied in
different ways by the Contracting States.
Since it is the “appropriate authority” of each State that dictates the
required security controls that the Regulated Agent must apply, it has to
establish the following:
(a) Does the Country have a security controls in place to ensure cargo
cannot be loaded unless secured?
(b) How does the State define “controls”?
(c) What types of “controls” are required along the supply chain?
(d) Does the Country have a Regulated Agent scheme in place?
(e) How will the State validate a Regulated Agent?
All these and more questions will be addressed by the State's Civil Aviation
Authorities and must be clearly defined, since cargo received by the Aircraft
Operator from a Regulated Agent is deemed safe and secure and further
screening need not be applied.
Thus the potential options for qualifying a “Regulated Agent” either by
regulatory authority or airline will involve the following:
(a) Vetting of agents' premises and security program
(b) Vetting of personnel–agent, transportation providers
(c) Agent having the ability to vet shippers and transportation
providers, including premises, security systems and personnel
(d) Agent being able to comply with all regulatory requirements
Responsibilities of a regulated agent
The State can require the Regulated Agent to ensure the following:
(a) Secure premises
(b) Screening of air cargo
(c) Awareness Training for all employees involved in handling air cargo
(d) Training of screeners
(e) Secure vehicles
(f) Staff background checks
(g) Segregation areas for known/unknown cargo
e-CSD
5. The Regulated Agent regime allows for most of the security controls to
be performed within the airport.
True or False
11. What are the two ways in which the e-AWB affect cargo security?
3.2.4 Unit Summary
In this unit we have discussed the second element in the security of cargo (the
macro perspective) which is the regulated agent regime.
We have described the philosophy and concept of this regime and also the
rationale as to the reason why it was necessary for this concept to be
introduced by ICAO. We have explained the key players in this system being
the regulators (Appropriate Authority), the regulated agents and the known
consignors. We have also discussed the roles and responsibilities of each of
these agencies.
We have also looked at the use of CSD and e-CSD as one of the tools to
ensure that cargo is protected throughout its entire movement in the supply-
chain and to ensure regulated agents are held accountable.
We have described how the e-AWB is a crucial element in the transfer of
advance information to ensure a secured chain of custody.
Finally we have also mentioned the success factor for this regime which
involves everyone who plays a role in the supply chain for cargo.
Under the regime, the aircraft operator is only to accept cargo from a known
consignor and/or regulated agent. These entities are required to meet the
following requirements for the consignment:
(a) The consignment must be delivered by an established employee or
authorized representative of the known consignor or regulated
agent.
(b) the employee receiving the cargo for shipment must verify that the
consignment is indeed being delivered by the authorized representative
or established employee as indicated in the cargo security declaration or
other accompanying documents.
(c) there is no signs of tempering with the consignment; and
(d) the known consignor or regulated agent has provided a cargo security
declaration certifying that the cargo has been cleared in accordance with
their security programme; or another regulated agent has provided
notice that the cargo has been partially cleared (See IATA sample
attached to this module)
(Ref; Extract from ICAO Document 8973/8)
Cargo Handling
Once the cargo has been accepted, it must be handled properly, thus the
aircraft operator will have to:
(a) determine the level, if any, of security controls to be applied to any
given consignment;
(b) carry out appropriate security controls to the required level and record
the details of applied security controls;
(c) protect the consignment from unauthorized interference while it is in
the aircraft operator's custody, particularly after it has been made
known cargo;
(d) ensure there is no sign of tempering;
(e) ensure that all consignments have been appropriately secured
before being placed on the aircraft; and
(f) ensure that all consignments placed on board an aircraft are recorded
in the cargo manifest.
(Ref: extracted from ICAO Document 8973/8)
Cargo Storage
The IATA ISARP governing this is:
Cargo storage is also an important part of ensuring that the integrity of secured
cargo is maintained. As a rule, cargo that has been secured, i.e. made known
cargo, has to be stored separately from unsecured cargo (unknown cargo).
It is recommended that known cargo be kept in cages, compartments, rooms or
buildings that can be locked and protected from unauthorized entry until it is
loaded onto aircraft.
All cargo receipt and despatch doors should have the capacity to be closed and
locked. These doors should be armed with intrusion detection devices or other
means of protection. Egress and ingress for vehicles and personnel must also
have the capacity to be locked when not in use and be protected with intrusion
detection devices or other protective measures.
Any known cargo suspected to have been ‘compromised’ will be declared as
unknown and security controls applied to make it known again.
Another category of cargo that is to be separated from other cargo will be
Dangerous Goods. Export and import cargo are also to be clearly separated.
Any high value cargo is to be kept in a cage that is locked and the key is kept
securely.
All Cargo is to be properly labelled to allow for easy identification and
retrieval. It is also recommended that daily audit of the warehouse is
conducted to identify any unauthorised, tampered or suspect cargo.
Preparation of cargo
Where possible, the built-up pallet (BUP) cargo operations are to be carried out
both in the presence of staff as well as CCTV coverage.
The BUP is to be kept tamper-evident through shrink wrapping. Documentation
containing the contents, dimensions and weight of the cargo is also to be
raised. The Air waybill is to be controlled so that it is not exploited for illegal
usage.
Transportation of cargo
The IATA ISARP governing this is:
2. Under the regime, the aircraft operator is only to accept cargo from:
(a) Manufacturer
(b) Any freight agent
(c) Known consignor or regulated agent
Module Summary
In this module we introduced you to warehouse/building security which is
considered as the micro perspective to cargo security. This is one of two
requirements for the security of cargo. We have seen the importance of
warehouse security as it is the final ‘resting’ place for the cargo before it is
loaded onto an aircraft.
We have also seen how warehouse security can be implemented by a
combination of both physical and electronic security measures and the
importance of integrating two elements to ensure the effectiveness of the
overall security of the warehouse.
In this module we have also discussed the second element in the security of
cargo (the macro perspective) which is the regulated agent regime.
We have described the philosophy and concept of this regime and also the
rationale as to the reason why it was necessary for this concept to be
introduced by ICAO. We have been introduced to the key players in this system
being the regulators (Appropriate Authority), the regulated agents and the
known consignors and how they make the system work.
We have also looked at the use of CSD and e-CSD as one of the tools to
ensure that cargo is protected throughout its entire movement in the supply-
chain and to ensure regulated agents are held accountable.
We have also described how the e-AWB is a crucial element in the transfer of
advance information to ensure a secured chain of custody.
Finally we have also mentioned the success factor for this regime which
involves everyone who plays a role in the supply chain for cargo.
We also looked at how the security of cargo is to be maintained during
acceptance, handling, preparation, storage and transportation.
Some of the key topics covered in this module are:
(a) Fundamentals of warehouse/building security
(b) Warehouse/Building security measures
(c) Automated access control systems
(d) Fundamentals of the regulated agent regime
(e) How the concept works
(f) Responsibilities of a regulated agent
(g) Known Consignor
(h) Known and Unknown cargo
(i) Cargo acceptance
(j) Cargo handling
(k) Cargo storage
(l) Cargo preparation
(m) Cargo transportation
Module Summary 81
Attachment: IATA Consignment
Security Declaration
Cargo Training Program
Answer Key 83
Module 4:
Crime Prevention & Security Quality
Control Measures
Cargo Training Program
Module Learning
Objectives
Upon completion of
this module, you
should be
able to:
Module Introduction
This module will give you an informative overview of one of the most common
areas of threats for airfreight i.e. crime. We will also discuss security quality
control measures to reduce these threats. Although the main focus for cargo
security has been in relation to threats posed by terrorists, cargo has been
subjected to day to day criminal acts, the most common being theft.
It is therefore important for us to look at this area of weakness and discuss the
measures that have to be implemented in the warehouse to ensure that theft
and other criminal activities are controlled.
We will review the European Union's aviation security initiative–ACC3–in
response to the potential threats.
It will not be sufficient for the implementation of just security measures to
prevent criminal activities in airfreight warehouses but also to tighten up
procedural and security quality control measures.
We will therefore visit these areas as well in this module. One of the areas
that will also be discussed in this module will be how cargo security quality
control measures are to be implemented.
Module Introduction 87
Cargo Training Program
• Unit Overview
• Describe the types of criminal activities
Unit Learning
• Describe Crime prevention Techniques.
Objectives
Upon completion of this unit,
you should be able 4.1.1 Unit Overview
to:
In this unit we will introduce you to crime in cargo facilities and the crime
prevention measures necessary to reduce such crime. This is important
because, in order to be able to effectively implement cargo security measures,
we must tackle both the threats posed by a potential act of terrorism as well as
day to day criminal activities that impact airfreight security.
Thus what is required is a ‘Total Approach’ to security that covers all areas of
airfreight security. This method is sometimes called the ‘Layered’ security
concept or ‘Onion’ concept. What this means is putting in place a variety of
security measures that would be criminal or terrorist will have to beat in order to
be successful. The idea is that the more the layers, the more difficult it will
become for these criminals to be successful. In fact these layers may also
become a deterrent for criminals to even attempt their plans, knowing that their
chances of being detected will be high. This will be the focus of this unit.
Employees form the first line of defense. This is because they work in the
cargo facility daily. They know the ins and out of cargo operations and also, in
most instances, have knowledge of unethical practices or criminal related
activities that are going on in the cargo terminal, including the people who are
involved in such activities.
Thus they can be a very important source of information for security and no
effort is to be spared to win them over to become the eyes and ears of the
organization. This takes effort and time as they will not come forward with
information if they do not have trust in security or the management.
Sometimes, an incentive system that provides rewards for information leading
to the prevention and or arrest of those involved in such activities, will go a
long way in encouraging important information to come from employees.
Besides, employees:
(a) are the most important and most expensive resource
(b) can be effectively employed for optimal returns
(c) are the single most effective monitoring & control system
(d) must be given security awareness education
Security personnel are usually a small number and they cannot be expected to
be everywhere, but employees are at all locations of a cargo terminal as they
work there daily. Thus their security awareness education must cover actions
to take for a variety of possible situations such as:
(a) Those without proper security badges
(b) Unauthorized entry
(c) Suspicious personnel
(d) Unattended items
(e) Unusual activities
(f) Unattended documents
Other important topics that must be covered as part of their awareness training
can include:
(a) Personnel Security Measures
(b) Information Security Measures
(c) Physical Security Measures
(d) Standards & Procedures established and consequence of non-compliance
Such training is to be done regularly and all new employees need to undergo
such training as part of their Company Orientation programme.
The Software (Procedural Measures)
The software will be the security procedures for cargo. This will be the second
line of defense. Security procedures will cover the control of storage,
transportation and documentation for cargo. It will also include directives for the
control of assets.
Proper control of cargo documents such as the Air Waybill and other such
documents are to be implemented to prevent these documents from being
used for the commission of criminal activities. Document security will also
include procedures for the proper destruction of unused materials and control
on accessibility of sensitive information.
There must be clear written instructions on proper handing and taking over
procedures for the different teams performing shift duties at the cargo
terminals. Aviation cargo processing is moving in the direction of e-documen-
tation, thus computer security will become increasingly critical. Another
measure will be to establish employee accountability and background
screening for all those who work in the cargo terminals.
The Hardware (Physical Security Measures)
The final line of defense will be the ‘Hardware’, which will be the physical
security measures for the cargo facility. This was discussed in detail in module
3. However, just to reinforce the requirements for physical security, it will be
necessary to state that they will include:
(a) Barriers–access control devises & structures (Badges, Escorting,
hold- ing/waiting areas for personnel and vehicles)
(b) Equipment–detection, alarm, communication and control systems
(c) Personnel–Trained personnel to administer and implement the
systems (Guards, CCTV Operators, Response Teams etc)
(d) Records–Maintenance of historical and incident records & transaction logs
(e) Testing the Systems
3. If crime is not controlled to its minimum, then it can impact the following:
(a)
(b) Morale of staff
(c) Image of the organization
9. Thus their security awareness education must cover actions to take for
a variety of possible situations such as:
(a)
(b) Unauthorized entry
(c) Suspicious personnel
(d)
(e)
(f) Unattended documents
Unit
4.2.1 Principles of Security Quality Control
Learning
Objectives
Upon completion of this
unit, you should be
able to:
A key component in the successful application of aviation security measures is
ensuring that controls are being continually applied in a manner that provides
effective security. It is necessary therefore for States to ensure that a system of
quality control measures for cargo is developed and implemented for the
purpose of ensuring the continuing effectiveness of its national aviation security
programme.
This will require ensuring that cargo security processes are subject to periodic
inspection, survey, audit and testing by designated authorities to determine
compliance with required standards.
The designated appropriate authority will need to ensure that there is a legal
basis which authorizes such periodic monitoring of cargo security standards
and operating procedures that suitable reports are made highlighting any
lapses and weaknesses in security measures, recommending procedures for
their correction, and ensuring effective rectification is carried out.
The IATA ISARP says:
Thus the Cargo security will be based on the underlying principle that:
(a) Aircraft shall operate in a secured environment, thereby requiring
consign- ments of cargo transported on commercial passenger aircraft to
be subjected to some degree of security measures before they are
loaded onto the aircraft.
(b) Security measures will be used to screen and clear cargo.
(c) Cargo that has been cleared shall then be protected from unlawful
interference or contamination until they are loaded onto the
aircraft.
Unit Learning
Objectives 4.3.1 The Challenge
Upon completion of this unit, The challenge facing security officers is how to translate the regulations
you should be able to: promulgated by ICAO for the securing of cargo. This has always been the
case. This is because cargo unlike passengers and their baggage passes
through many hands along the cargo supply chain and can get contaminated
anywhere along that route. Further to this, it is not possible to screen every
piece of cargo both due to lack of screening technology and the volume of
cargo that passes through airports.
Thus it will be necessary to employ basic security measures that will act as a
minimum level of security controls that will help reduce the risk of cargo being
exploited by terrorists.
Cargo Protection
Ensuring the cargo is well protected is best achieved from ensuring both the
documentation processes as well as the physical cargo is protected. This will
include ensuring proper inventory control, security the cargo from the point of
acceptance, collection, transport as well as storage. This means that there is a
need to protect secured cargo at all times until it is loaded onto the aircraft.
Some of the ways this is done is:
(a) Screened Cargo that is received must be transferred to a secure
area awaiting dispatch and kept separate from that has not been
screened
(b) Screened cargo is kept in an area where only authorized personnel
have access
(c) Everyone entering such areas must be checked to ensure they
are authorized
(d) Visitors must be checked, especially those claiming statutory right of entry
(e) Suspicious activity must be quickly reported to security for action
(f) Security badges must be clearly displayed for easy identification
Patrolling
Depending on the size of the warehouse, security and/or operational staff
should at regular intervals conduct patrolling services. This will ensure proper
monitoring of existing processes which will ensure that there is no discrepancy
between the procedures and actual implementation on the ground.
Patrolling also ensures that those who have no access are detected and also
acts as deterrence to those who have malicious ideas. It helps to maintain the
security needs of the controlled area. There are many methods of patrolling
that can be adopted as follows:
(a) It should be done regularly; however, the timing for the patrols must
be varied to avoid a pattern.
(b) When patrolling, keep eyes and ears open to any thing or persons
that appear suspicious
(c) Look out for unidentified packages or items left at the wrong places
(d) Doors or windows that are open when supposed to be shut
(e) Any damage to fences or barriers
(f) Any suspicious activities outside of the perimeter fence
4. Patrolling ensures that those who have no access are allowed access
and also acts as deterrence to those who have malicious ideas.
True or False
(g) Smuggling goods (prohibited drugs, ciga- (g) Surveillance (physical or electronic)
rettes, alcohol)
(h) Intruder Detection Systems
(h) Terrorism ( Bomb Threats, Sabotage etc.)
(i) Challenging of strangers or unauthorized
Module Learning
Objectives
Upon completion of
this module, you
should be
able to:
Module Introduction
This module will look at one of the most common threats facing the aviation
industry i.e. the use of explosives by terrorists to cause major destruction and
catastrophic actions. Since this is a major issue, it is important that we
understand explosives, so that we can not only recognise it but also be able to
take the necessary action to prevent its successful use against the industry.
Besides explosives, we will also discuss other threats that are also not
allowed to be carried onto aircraft such as undeclared dangerous goods and
prohibited items.
Cargo can be easily exploited to introduce all of the above items onto the
aircraft as proven in some of the incidents that have been mentioned in
Module 1. Since the improvement of security measures for both passengers
and their baggage, it is expected and feared that terrorists will exploit cargo
for this purpose.
Finally, we will also discuss how to handle a bomb threat, which can be
experienced by any organisation in an airport and a cargo facility is no
exception. This module was written with extracts from ICAO’s Instructions: AS
8/11-07/26 dated 30 March 2007 entitled, “Recommended security control
guidelines for screening liquids, gels and aerosols”.
The IATA ISARPs governing this requirement are:
Sec 4.1.1 The operator shall have a process to identify security threats directed
against the operator, to include:
(i) Assessment of associated risks;
(ii) Development of appropriate response measures
Sec 4.1.2 The operator shall have a process to ensure the implementation of
appropriate security measures in response to:
(i) security threats directed against the operator
(ii) threat level issued by applicable aviation authorities
• Understanding explosives
• Describe how IEDs are detonated
Unit Learning
• Explain what is CBRN threats
Objectives
Upon completion of this unit,
you should be able 5.1.1 Unit Overview
to:
In this unit we will introduce you to a wide range of components that could be
used to build an Improvised Explosive Device (IED), which is extensively used
by terrorists against the aviation industry. In the past and also in recent times,
the industry has experienced bomb related threats and incidents. In the past,
the most common method to introduce explosive devices onto aircraft was via
baggage. However, with enhanced security measures being used in many
airports today, terrorists have become aware of the risk of being discovered if
they use this traditional method and also the difficulty of penetrating airport
security measures.
Aviation Security specialists have identified that, they will begin to look at how
to exploit other areas such as cargo, mail, catering supplies etc to penetrate
security and get IEDs onto aircraft for the purpose of blowing the plane up in
flight.
That is the reason all staff working in the airport, including those working in
the other areas such as cargo terminals, catering centers and also in postal
mail facilities need to be educated on the recognition and action on discovery
of such devices.
These four items combine to create the explosive chain. To add delay or
accuracy for the device to explode, a timer is added.
The power source provides the electricity needed to complete the
electrical circuit. For this purpose, batteries are usually used. Some
explosives use a mechanical power source. Such an explosive is a hand
grenade.
Commercial explosives
These will cause Illnesses if they are used deliberately as they can be anything
from dangerous bacteria, viruses or fungi, or biological toxins. Typhoid
poisoning has occurred in Oregon 1984 (750 people) by the Rajneesh sect,
none fatally. A simple virus has to be robust enough to survive dissemi-
nation–an ongoing problem for groups everywhere. Unreliability leads to loss
of credibility.
Radiological
Radiological threats if used will cause Illnesses through exposure to harmful
radioactive materials contaminating the environment. In the past, a caesium
capsule has been attached to an IED In an attempt by Chechen rebels in a
Moscow park, with no real difference in result. However radioactive contami-
nation by exposing nuclear materials in water or air remains a possibility.
Nuclear
5. High explosives are normally very sensitive, which means that they
do explode on their own.
True or False
9. There are a few types of switches and delay mechanisms. They include:
(a) Mechanical (watch, clockwork timer).
(b) Ambient (changes to temperature, light, sound, air pressure).
(c) Victim operated (anti-handling).
(d)
Module Summary
In this module we introduced you to a wide range of components that could be
used to build an Improvised Explosive Device (IED), which is extensively used
by terrorists against the aviation industry. We emphasized that these could be
infiltrated on board a flight through cargo as had happened in the past and also
in recent times.
The key topics covered in this module were:
(a) Understanding explosives
(b) How IEDs are detonated
(c) What CBRN threats are.
The security personnel especially those involved in screening cargo at the
terminals, and each one of us, have a role to play in detecting possible threats,
Vigilance is key!
Module Learning
Objectives
Upon completion of
this module, you
should be
able to:
Module Introduction
This module will look at two aspects related to “detection of Threats” to cargo
and all other items that also are carried on board an aircraft. We will examine
the reasons and principles involved in cargo security that will provide the ICAO
mandatory Standards that will dictate how cargo security is to be implemented.
This module will also give you an idea as to the types of cargo screening
technology that is being brought into the industry to facilitate detection of a
variety of threats that could be infiltrated through cargo into the aircraft.
It will also provide you with some techniques that can be used to screen cargo
bearing in mind that due to the nature and size of cargo, it is not going to be
possible to screen all cargo using x-ray technology.
We will also discuss the actions to take in the event of a discovery of certain
types of threats when screening cargo. The most serious being explosives.
Obviously, it will be realized that due to limitations on screening technology, it
is still very much dependent on the human factor to prevent any potential
threats from being introduced on board an aircraft through cargo.
In this module, we will also look at risk assessment and management as well
as look at ways to assess the critical business assets and processes,
evaluate a Threat, assess Vulnerability, construct a risk matrix to develop
countermeas- ures to mitigate the threats.
• Unit Overview
Unit Learning • Describe the application of the principles of cargo screening
Objectives
Upon completion of this
unit, you should be 6.1.1 Unit
able to: Overview
In this unit we will introduce you to the application of the guiding principles for
cargo security as promulgated by ICAO. The reasons and principles were
discussed in Module 2 and will be reinforced in this module. It will provide you
with not only the ICAO Standards related to the implementation of cargo
security but also how these are to be translated into practical application on the
ground.
The implementation of these measures will have to be seen in the light of
ensuring that the security of cargo is maintained throughout the supply chain.
We will also see how cargo security is applied at each stage from acceptance,
storage, transportation and loading of cargo onto the aircraft.
“4.6.1 Each Contracting State shall ensure that security controls are applied
to cargo and mail, prior to their being loaded onto an aircraft engaged in
passenger commercial air transport operations.”
Principle 1: Security Controls
“4.6.2 Each Contracting State shall establish a supply chain security process,
which includes the approval of regulated agents and/or known consignors, if
such entities are involved in implementing screening or other security controls
of cargo and mail.”
Principle 2: Implementation of Regulated Agents
“4.6.3 Each Contracting State shall ensure that cargo and mail to be carried
on a passenger commercial aircraft are protected from unauthorized inter-
ference from the point security controls are applied until departure of the
aircraft.”
Principle 3: Protection of cargo after security controls
“4.6.4 Each Contracting State shall ensure that operators do not accept cargo
or mail for carriage on an aircraft engaged in passenger commercial air
transport operations unless the application of screening or other security
controls is confirmed and accounted for by a regulated agent, or such
consignments are subjected to screening. Consignments which cannot be
confirmed and accounted for by a regulated agent are to be subjected to
screening.”
Principle 4: Application of security controls according to shipment’s
classification
Despite the fact that the transit of cargo consignments from the storage facility
and/or cargo terminal will normally take place in a security restricted area, it will
still be important to ensure that the integrity of the shipment is maintained until
the aircraft is ready for take-off.
In addition to normal procedures to protect parked aircraft, it will also be
important that during the loading of the aircraft all loading and handling
personnel:
(a) Have authorised security restricted area access
(b) Visibly wear their security restricted area permit at all times
(c) Prior to loading, search the cargo hold to ensure that there are
no suspicious items or persons
(d) Ensure that, as they load consignments on the aircraft, there is
no evidence of tampering
(e) Ensure that no unauthorised personnel has or gains access to
cargo consignments on the apron or inside the aircraft
(f) Challenge anyone not in possession of a visible valid security
restricted area permit in the vicinity of an aircraft or cargo
consignment.
Acceptance Procedures
Regulated Agents receiving secured cargo should
• check in their country database the known consignor registration and
its expiry date
• check that the consignments shows no signs of tampering
• assign a security status to the consignment and enter the
security information in their system (SPX)
• tender the consignment to the carrier accompanied by the
security information either in paper or in electronic format
Regulated Agents may also receive unknown cargo or unsecured cargo (due to
tampering evidence). In this case the Regulated agents should:
• apply security controls to the consignments which may include
security screenings (e.g. X-ray)
• assign a security status to the consignments and enter the
security information in its system (e.g. SPX)
• tender the consignment to carriers accompanied by the security
infor- mation in paper or electronic format.
Air carrier shall implement and maintain adequate measures to protect air
cargo from unlawful interference, tampering, mishandling, damage, and
criminal activities involving robbery, theft and pilferage.
Air Cargo operator may only accept cargo from regulated agents under the
following conditions:
(a) The shipment is delivered by an established employee of a regulated
agent. If the consignor delivers or arranges for delivery of the cargo,
the employee receiving the cargo verifies that it was delivered by the
person nominated on the Consignment Security Declaration
(b) There is no sign of tampering with the shipment
(c) The regulated agent has provided either an electronic or hardcopy
Consignment Security Declaration that the cargo has had security
measures applied in accordance with the Regulated Agent
Security Programme; or
(d) Another regulated agent has provided a notice that the cargo has
been partially cleared in accordance with the Regulated Agent
Security Pro- gramme. Partially cleared cargo may be accepted from
other regulated agents or forwarded to air carriers for security
clearance. Details of the partial clearance should accompany the air
waybill.
Once the cargo has been accepted, the air carrier will:
(a) Determine the level, if any, of security controls to be applied to any
given consignment
(b) Carry out appropriate security controls to the required level
(c) Protect the consignment from unlawful interference while it is in the
air carrier’s custody, particularly after it has been made “known
cargo”
(d) Ensure that all consignments have been secured to an appropriate
level before being placed in the aircraft
(e) Ensure that consignments tendered to the carrier are accompanied by
the appropriate electronic or hardcopy documentation.
(f) Ensure that all consignments placed on board the aircraft are recorded
If there are indications that some freight may have been tampered with, or
security elements such as the audit trail, tamper-evident materials or pro-
cedures do not appear to meet established standards, an investigation must be
conducted to establish whether or not the security integrity of the freight has
been maintained. In such cases screening must be carried out.
Study Check 6.1
1. In order to implement the principles for cargo security, ICAO has made
it mandatory for member States to implement:
(a) Warehouse security measures
(b) Regulated Agent Regime
(c) 100% cargo screening
2. The 3 key players for the cargo security programme will be:
(a) Known shippers/consignors, regulated agents and air carriers
(b) Air carriers, Appropriate Authority and Police
(c) Known shippers/consignors, Security and Ground handling agents
4. Under the cargo security regime, air cargo can be transported by:
(a) Transporters whose operating procedures and security measures
are certified by the Appropriate Authority
(b) Transporters who prove that they have the safest drivers
(c) Transporters whose operating procedures and security measures
have been approved by the regulated agent or the air carrier
5. One of the principles for cargo security states that, it will be important
to ensure that the integrity of the cargo shipment is maintained until it
is stored in the cargo terminal in the airport.
True or False
9. One of the condition under which an Air carrier can accept cargo
from regulated agents is when:
(a) There is no sign of tampering with the shipment
(b) The vehicle being used does not have a hard top
(c) The vehicle being used to transport the cargo is not sealed.
10. Once the cargo has been accepted, the air carrier will ensure that
all consignments placed on board the aircraft are recorded.
True or False
Unit In this unit we will look at the requirement for screening and also the methods
that are used for screening of cargo. It will also introduce you to a variety of
Learning
technology that is being brought into the industry to help security personnel to
Objectives screen cargo more effectively and detect threats that can come in many forms
Upon completion of this and such as explosive devices, chemical, biological, or radiological related.
unit, you should be Even Dangerous Goods (DG) can be exploited by terrorist to cause great
able to: danger to an aircraft. Human factor will continue to play the key role in effective
detection capability as no known technology, currently available will be able to
replace the human intelligence.
These needs have become even more evident after the 9/11 incident and the
more recent “Printer” bomb incident, as these showed the world the capability
and creative nature of the terrorists and their sheer determination to try and
attack commercial aviation.
As required by ICAO, appropriate security controls will be needed for air cargo,
courier and express parcels and mail intended for carriage on international
passenger flights. Such controls will normally be a combination of screening
and administrative procedures.
This means that all air cargo, courier and express parcels and mail intended for
carriage on international passenger flights shall be subject to appropriate
security controls by aircraft operators and/or agents or other entities desig-
nated by [appropriate authority] as “regulated agents” prior to being placed on
board an aircraft.
Cargo Training Program
Thus specific security controls will have to be applied to air cargo, courier and
express parcels and mail. Air cargo, courier and express parcels and mail
intended for carriage on international passenger flights being moved within an
airport will have to be handled and moved in a secure environment and/or
afforded sufficient security to prevent the introduction of weapons, explosives
and other dangerous devices.
Yet we have read that Cargo shipments transported by air include a wide range
of products of different size, weight and density which is real challenge for
screening personnel, but task can be completed using different scanning
techniques which will be explained in Chapter 7.2.2.
Where cargo security integrity becomes doubtful or cannot be verified that it
has been handled and secured through freight supply chain, that cargo must
be classified as ‘unsecured’ and screened.
Further to that, screening of the following should be required:
(a) Specific categories of cargo considered to pose a higher risk
(e.g. unaccompanied baggage)
(b) Consignments on specific flight under special circumstances (e.g.
flight under increased threat, when requested by the air carrier, in
case of a bomb threat, etc.)
(c) Some States may require random screening (not based on threat) of
a percentage of known cargo
Mail
The most common technology for screening of cargo is still x-ray technology.
However, due to the nature and diverse size of cargo it is always not possible
to screen cargo using x-ray technology aloe. Other options have to be
applied.
b. Explosive detection technology
This category of system can discriminate, to a degree, between explosives and
other materials and indicate this visually, by a number of means, to the
operator. These systems have typically been employed to screen the checked
baggage at airports and run in automatic mode, where a detection of an
explosive-like material in a bag will activate a diverter and allow the image to be
examined by an operator. However, they are also used for cargo screening.
c. Bulk explosives detection technology
Bulk explosives detection devices measure some bulk characteristic of
materials in an attempt to detect the possible presence of explosives. Some of
the bulk characteristics that may be measured are the X-ray absorption
coefficient; the X-ray backscatter coefficient; the dielectric constant; gamma or
neutron interaction; and the microwave, millimetre wave, or infrared emissions.
Further analysis of these parameters can result in calculated mass, density,
nitrogen content, and effective Z (effective atomic number). While none of
these characteristics are unique to explosives, they are sufficiently indicative to
point to a high probability of the presence of explosives. Fortunately, many
materials that share similar bulk characteristics with explosives are not
common in everyday items. The false alarm rate for bulk detection devices can
be low enough to allow for automatic detection of explosives and explosives-
like materials.
d. Thermal neutron activation
Thermal neutron activation (TNA) is commercially available and being used in
several airports for scanning hold baggage. The main difficulties with such
technology at the present time include cost, size and weight of the equipment.
However, this technology is now available for cargo screening as well.
The decision to use thermal, or low-energy, neutrons for the detection of
explosive materials in packages is a natural one. Neutrons have excellent
penetrating power and interact with nitrogen-rich materials, such as explosives,
in a well-known and predictable way. Thermal neutrons are absorbed by many
atoms. When a thermal neutron is absorbed there is an associated release of a
gamma ray photon (much like a phosphor gives off visible photons when
exposed to ultraviolet light). The wavelength (energy) of the emitted photon is
very specific to the atom that absorbs the neutron. Because the wavelength of
the photon is highly specific, the detection of photons of the wavelength emitted
by nitrogen when absorbing a thermal neutron indicates the presence of
nitrogen.
e. Pulse fast neutron analysis
Pulsed fast neutron analysis (PFNA) is a technique that evolved from earlier
work on investigating the use of fast neutrons to detect explosives. The PFNA
technique measures the elemental composition of the contents inside the
scanned object. A pulsed neutron created by a pulsed deuteron beam striking
a deuteron target is shined on an object. The neutrons interact with the
elemental constituents of the object and create gamma rays with energies
characteristic of the elements. From the energy and time of arrival of the
gamma rays in detectors, an elemental image of the object can be created.
These measure- ments are used to generate a three-dimensional map of the
contents inside the container.
Computer software then determines the presence of specific combinations of
elements and characterizes materials of interest. The contents of the scanned
object can therefore be determined with a high degree of accuracy. The whole
process is independent of operator interpretation since the detection of the
material does not rely on either the shape or the material of packaging used.
f. Chemical-based detection
Chemical-based detection comprises field test kits that use liquid or aerosol-
based chemicals for the identification of explosive residue. Initially, the surface
suspected of being contaminated with explosive residue (a package, clothing, a
person, etc.) is wiped with a special test paper. Then the paper is sprayed with
a series of detection chemical reagents. The presence and nature of the
explosive are revealed by a colour characteristic of the reaction of the
chemicals to the explosive residue.
g. Explosive detection dogs
Trained dogs can be an effective tool for the detection of concealed explosives.
Such dogs are used by a number of Contracting States’ security agencies,
armed forces and law enforcement organizations in applications involving
aviation security controls.
h. Simulation chambers
Simulation chambers are facilities designed to activate trigger-controlled
explosive or incendiary devices in cargo, mail or baggage by simulating
environmental flight conditions. Depending on the type of simulation chamber,
one or several parameters of flight conditions can be simulated. Operations of
these facilities are not conditioned by the type or amount of explosives, or by
the size or volume of baggage, cargo or mail. In addition Human Factors do not
impact on the performance of simulation chambers. It should be noted,
however, that simulation chambers of both types detect devices by triggering
them which may result in damage to the consignment and facility.
Study Check 6.2
12. Suspect cargo should be treated as known cargo and therefore not
be subjected to additional screening.
True or False
Do not take a
to break a
5. We need to verify all levels of threats in the total air cargo supply
chain. True or False
6.3.5 Unit Summary
In this unit, we looked at ways to assess the critical business assets and
processes, evaluate a Threat, assess Vulnerability, construct a risk matrix and
develop countermeasures to mitigate the threats.
The module also defined the principles of risk management and described how
we can apply risk management to ensure the security of the air cargo supply
chain.
Some of the key topics that were discussed in this module were:
(a) Definitions of terms
(b) How to assess risks
(c) The significance of risk management
(d) Principles of risk management
(e) Applying risk management to air cargo
Module Summary
This module looked at two aspects related to “detection of Threats” to cargo
and all other items that are carried on board an aircraft. It examined the
reasons and principles involved in cargo security and the ICAO mandatory
Standards that dictate how cargo security is to be implemented.
This module discussed the types of cargo screening technology that is being
brought into and used in the industry to facilitate detection of a variety of threats
that could be infiltrated through cargo and other items, into the aircraft.
The module explained some techniques that can be used to screen cargo
bearing in mind that due to the nature and size of cargo, it is not going to be
possible to screen all cargo using x-ray technology.
It described the actions to take in the event of a discovery of certain types of
threats when screening cargo, the most serious being explosives
We reviewed risk assessment and management and looked at ways to assess
the critical business assets and processes, evaluate a Threat, assess
Vulnerability, construct a risk matrix to develop countermeasures to mitigate
the threats.
Some of the key topics that were discussed in this module were:
(a) The application of the principles of cargo screening
(b) The requirements for screening
(c) Methods of screening and technology used
(d) Risk Assessment and Management
Cargo Training Program
Module Learning
Objectives
Upon completion of
this module, you
should be
able to:
Module Introduction
This module will give you an informative overview of management and
administration of cargo security operations. You will be introduced to a new
concept in enhancing security using a pro-active approach to security.
This will be necessary since the threats that are the industry is facing is very
dynamic and terrorists are continuously challenging the alertness and reactive
nature of aviation security.
As was mentioned earlier, Cargo is considered in the aviation industry as the
‘Achilles heel’, simply because it is still the weakest link in the aviation security
chain. This is because cargo operations are complex and very tedious. To add
to the complexity, it is not possible at the present time to screen cargo 100%
as is done for passengers baggage.
In this module we will begin to understand the importance of good security
management and administration that will help enhance cargo security oper-
ations. We will also look at the training needs for aviation security officers,
especially security screeners who are an important group who play a major part
in ensuring that explosive or other threats do not penetrate the aviation network
and harm the industry. This will be discussed in this module.
We all can accept the notion that ‘management’ is a well-tested science that
can be applied to security management as well.
Translated this means that in any organization, it is standard practice to have a
goal, or objective or an aim etc to work towards. Only if we all identify an
objective that has to be determined at the start, can we then work backwards
and then develop a strategy to achieve that objective.
It takes everyone in the organization to play their part in helping the
organization achieve its objective. Thus it is only logical that in any
organization it is the people who can make the difference. Thus people
management and development becomes an essential part of any
organizational objective. This is the new way of thinking. Thus it is necessary
to have a very good Human Resource Management (HRM) and Human
Resource Development (HRD) process in place.
This means implementing a security management system which sets out
security objectives and strategies as an integral part of daily security
operations.
This is done by systematically integrating people management into the day to
day operations of the organization, closely linking it to the achievement of
objectives, sometimes called ‘Management by Objectives’.
Human resource and human resource development
As mentioned earlier, in order to ensure that personnel have an all round
development it will be important to create a platform for them to perform at their
best, it will be necessary therefore to design and implement a good human
resource and human resource development process. This can be done by 3
simple steps. Develop the:
(a) HR Philosophy
(b) HR Objectives
(c) HRD Guiding Principles
It is very important Company Management to have clear vision how Security
System to be created and what security personnel is needed
HR Philosophy
The HR philosophy must identify what will be an aviation security officer’s
needs in order to enable them to be both professional and effective in the tasks
they undertake. Organizations’ must re-think what their product really is? In this
case, cargo security officers are involved in providing both protective and
preventative security. Thus if aviation security organizations begin to look at
their product as the security officer, rather than the services they provide, then
logically, they will begin to focus more on the training and development of the
security officer.
What this means is that over time, a well trained and well exposed security
officer will be able to provide both the protective and preventive security
functions more efficiently and professionally. This means that the service
standard that they will provide these services with will also be enhanced.
HR Objectives
Based on the above notion that the product is the security officer, the
organization can then define its HR objectives as to how it can develop this
product into a professional and efficient work machine by matching the security
officer’s needs into action as follows:
THE ORGANISATION’S PRODUCT THE PRODUCT
DEVELOPMENT SECURITY OFFICER WHO NEEDS:ACHIEVED
THROUGH:
– skills – training
– knowledge – development
– alertness – communications
– morale – reward systems
– health – personal state (wellness,
personality)
Companies can become transformed by focusing on HR management and all
processes that revolve around the Security Officer, including areas traditionally
left to the employee, such as wellness, personality, community service and
language skills.
What this means is that each of the security officers needs can then be
addressed by a relevant product development process as is shown in the
above chart. Thus skills are enhanced through training, knowledge is
enhanced through a development process, maintaining their alertness in the
operational area can be improved through up to date communications on a
variety of threats and other security related issues. Their morale will have to be
managed through appropriate reward systems and welfare and their health,
which is a very important aspect, can be managed through a good healthcare
and fitness system that must be in place in the organization.
This requires the organization to have a very structured Human Resource
Development process in place. One suggestion will be a process as per the
diagram depicted below.
The tools that security personnel use as part of their daily operations will then
become the ‘Hardware’. Since as aviation security officers, they will have to
handle a variety of equipment/technology in order to facilitate a more speedy
and accurate completion of their tasks. It will be important that management
ensure that they are provided with these tools and also to ensure that they are
trained to use these tools safely without endangering them in the process of
using them.
Study Check 7.1
5. Security companies can still do very well, even if they only focus on
the services they provide rather than their security officers.
True or False
Training usually includes two major parts: initial employment training (IET) and
on-the-job training (OJT). IET is increasingly being complemented by com-
puter-based training (CBT). OJT, on the other hand, may be quite variable and
its relation to the initial training may not always be optimal or obvious.
A critical component is Training Assessment which is necessary for deter-
mining whether or not the training provided to operators is valid (i.e.
appropriate) and is of sufficient depth and breadth to maximize the probability
that each individual operator will perform to a desired criterion level.
A related element requires an objective evaluation of operators who should
achieve, through a particular training programme, some predetermined and
objective level of performance proficiency that then has to be validated in the
operational environment. Once qualified personnel have been properly selec-
ted, trained and assessed, numerous measures have to be implemented in
order to retain qualified personnel.
CBT may be a combination of computer-based instruction and simulation.
There are CBT systems that have both the instruction and simulation built in.
These systems are also able to test the competency of the screeners from
basic level 3 to advanced level 1.
(a) Computer-based instruction consists of tutorials providing information
on a particular topic area, with questions and applied examples
interspersed throughout a training session. This enables trainees to check
their understanding and learn through feedback throughout the session.
The main objective of computer-based instruction is the development of
knowledge.
(b) Simulation, on the other hand, trains the practical skills of how to operate
an X-ray system and interpret the X-ray image by providing the trainee
with a replication of their field task.
Classroom and CBT training are usually followed by varying periods of OJT.
OJT is provided to allow for mastery of the following tasks: walk-through metal
detector; hand-held metal detector; consent search; bag search; X-ray
screening; and exit lane management. Civil aviation authorities will typically
establish the standards for OJT which would define the topics that must be
covered, the amount of time to be dedicated to each subject, and the
evaluation process for the training.
Some States require up to 99 hours of initial training for airport security
personnel, covering topics such as security objectives, legislation and struc-
tures, the national security programme, airport security objectives and
methods, and working knowledge of automated equipment (including metal
detectors, X-ray systems, and Explosives Detection Systems (EDS)). Class-
room training is usually supplemented by Computer-based Training (CBT) or
web-based training that may be more interactive.
For example, the Netherlands requires screener candidates to train and be
certified as general security officers and then undertake specialized training
and be certified to work as checkpoint screeners. The requirement is 40 hours
of specialized training for screeners, including classroom work, CBT, and role
playing. This is followed by two months of OJT and 24 hours of additional
yearly training to maintain certification.
Assessment
The assessment of the screeners will be another important part of the
training loop. There are a number of ways that they can be assessed. One of
the most effective ways is to use TIP (Threat Image Projection).
The incorporation of TIP as an element of classroom training, CBT and OJT will
enhance efforts to make objective assessment of performance levels and its
relation to earlier training programmes. This is an important way to evaluate the
effectiveness of training programmes by unobtrusively assessing performance
on the job.
7.2.3 Response and Management of
Aviation Incidents
Some of the incidents related to cargo could come in the form of discovering
a variety of threats during the screening of cargo, such as discovery of
explosive devices, undeclared DG, prohibited items, etc.
A cargo facility can be subject to unauthorized entry, sabotage, theft of cargo
and syndicated criminal activities. A bomb threat is also a possibility.
It is not possible to have one procedure to be used for all of the above incidents
mentioned but to have specific procedures written up for each type of a threat
identified. This also applies to responding, managing and reporting these
incidents.
It is for this reason that both ICAO and IATA have guidance materials on how
to handle and respond to some of the more common threats such a Bomb
Threat. They also provide different samples of reporting incident templates that
can be used for different types of incidents that aviation related organisations
can encounter. These incidents are classified under ‘Acts of Unlawful Inter-
ference’.
12. The first step is will be to ensure that a security programme is developed
for the cargo warehouse/terminal consistent with the established policy
in the national civil aviation security programme.
True or False
Module Summary
This module provided you an informative overview of management and
administration of cargo security operations. You were also introduced to a new
concept in enhancing security using a pro-active approach to security.
We have explained why this is necessary since the threats that the industry is
facing is very dynamic and terrorists are continuously challenging the alertness
and reactive nature of aviation security.
We have also highlighted that cargo is considered in the aviation industry as
the ‘Achilles heel’, simply because it is still the weakest link in the aviation
security chain because it is not possible at the present time to screen cargo
100% as is done for passengers baggage.
In this module we described the importance of good security management and
administration that will help enhance cargo security operations. We looked at
the training needs for aviation officers, especially security screeners who are
an important group who play a major part in ensuring that explosive or other
threats do not penetrate the aviation network and harm the industry. We also
discussed the importance of responding and managing aviation incidents.
The key topics covered in this module were:
(a) Human factors in security
(b) Training needs
(c) Response and management of aviation incidents
(d) Cargo specific incidents
(e) Response under regulated agent regime
(f) Procedures for responding to and reporting of aviation security incidents