You are on page 1of 7

LECTURE NOTES

91533 - AVIATION ANCILLARY SERVICE


BBA – AIRLINE AND AIRPORT MANAGEMENT
SEMESTER – III

1
UNIT – 5

PLANNING AND DESIGN CONSIDERATION FOR SECURITY AT


AIRPORT

1. Parking, curbsides, and ground transportation—As noted, unattended


vehicles are prohibited within 300 feet of the terminal building, causing:

 Fewer conveniently located parking spaces, as airport operators have


closed portions of parking facilities located within 300 feet of terminals,
thereby reducing space availability and increasing walking distances.
 Reduced curbside demand resulting from stricter curbside enforcement,
reduced curbside dwell times, and fewer motorists using the curbsides–
particularly those waiting for deplaning passengers.
 Less convenient bus and van services, as drivers are unable to leave their
vehicles to help carry baggage from the terminal or linger at the curbside
waiting for potential customers.

2. Pre- and post-security concessions—Concession revenues, both pre- and


post–security, have been affected because of the restriction that only ticketed
passengers are allowed beyond security, and the wait times for passenger
screening are uncertain. This restriction has also complicated the delivery of
food and merchandise to and the removal of trash from these sites.

3. Passenger screening areas/points—The new requirements and procedures


for screening passengers and baggage have increased passenger processing
times and the area required to accommodate screening equipment and passenger
queues.

4. Ticketing counters and lobbies—At some airports, airline ticket counter


passenger queues and delays have increased as a result of the changes in check-
in procedures, longer processing times, and more checked baggage because of
the carry-on baggage restrictions.

5. Passenger arrival patterns—Some airlines now request that passengers


arrive 2 hours before their scheduled departure time to allow sufficient time for
potential delays at the ticket counter and passenger screening areas. In response,
passengers have dramatically increased their arrival times prior to flights,
resulting in greater accumulation of passengers in the terminals

2
Physical Protection

Airport and aircraft operators provide protection through a combination of


mobile patrols or fixed posts staffed by police, other security officers, or
contract uniformed personnel; security systems and devices; lockable building
entrances and gates; and cooperation of local law enforcement agencies. The
degree of normal and special protection is determined by completion of a
vulnerability assessment and a crime prevention assessment.

Crime Prevention

The local police department may collect and compile information about
criminal activity on or against property under the control of the airport, provide
crime prevention information programs to the occupant and federal agencies
upon request, and conduct crime prevention assessments in cooperation with
appropriate law enforcement agencies.

Recordkeeping

In addition to physical protection, airport operators also need to keep records of


incidents, personnel access, or other activities. Some of the records (such as
personnel access) may be collected automatically. Recordkeeping needs,
including some video applications, may affect IT systems, cable designs, and
equipment locations, as well as require secure data storage. These needs should
be coordinated early in the design process.

STANDARDS AND RECOMMENDED PRACTICES

The terms 'Standard' and 'Recommended Practice' in aviation are used by


International Civil Aviation Organisation (ICAO) with specific definitions:

Standard

Any specification for physical characteristics, configuration, material,


performance, personnel or procedure, the uniform application of which is
recognised as necessary for the safety or regularity of international air
navigation and to which Contracting States will conform in accordance with the
Convention; in the event of impossibility of compliance, notification to the
Council is compulsory under Article 38 of the Convention.

3
Recommended Practice

Any specification for physical characteristics, configuration, material,


performance, personnel or procedure, the uniform application of which is
recognised as desirable in the interest of safety, regularity or efficiency of
international air navigation, and to which Contracting States should endeavour
to conform in accordance with the Convention.

SARPs

The most important legislative function performed by ICAO is the formulation


and adoption of Standards and Recommended Practices (SARPs) for
international civil aviation. These are incorporated into the 19 technical annexes
to the Convention on International Civil Aviation, also known as the Chicago
Convention.

Of critical importance to the future of civil aviation and to the international


community at large are the measures taken by ICAO to prevent and suppress all
acts of unlawful interference against civil aviation throughout the world. SARPs
for international aviation security were first adopted by the ICAO Council in
March 1974, and designated as Annex 17 to the Chicago Convention.

Annex 17 has been adopted in six languages – Arabic, Chinese, English,


French, Russian and Spanish.

ACCESS CONTROL AND ALARM MONITORING MECHANISM

Discretionary Access Control (DAC)

With a discretionary access control system (DAC) the owner of the company
can decide how many people have access to a specific location. Each access
control point has a list of authorised users. Every time a keycard is swiped, a
PIN is punched, or a fingerprint is scanned, the system checks the credential
against the list and either allows or denies access based on the previously set
allowances.

DAC systems are considered to be the most flexible and offer the highest
number of allowances compared to other types of access control. Because it’s
the most flexible, it’s also not as secure as some other types, especially
mandatory access control systems. Since one person has total control over the
system, he or she might grant access to someone who shouldn’t have it.

4
Discretionary access control systems are best for companies that expect the
most ease of use and flexibility.

Mandatory Access Control (MAC)

On the other end of the spectrum, mandatory access control systems (MAC) are
the most secure type of access control. Only owners and custodians have access
to the systems. All the access control settings are preset by the system
administrator and can’t be changed or removed without his or her permission.

Instead of creating an access list on each individual entry point like in a DAC
system, a MAC system works by classifying all the users and grants them
access to areas based on the system’s programming. If you have 150 employees,
you’re going to need 150 user permissions set up in the system.

Mandatory access control systems are the strictest and most secure type of
access control, but they’re also the most inflexible. In order to change
permissions, the administrator has to reprogram the specific user’s access, not
just the security lists at the entry point. MAC systems are primarily used by
companies and agencies that require the utmost levels of security.

Role-Based Access Control (RBAC)

Role-based access control (RBAC) is quickly becoming the most popular type
of access control. Instead of assigning permissions to individual users like in a
MAC system, an RBAC system works by assigning permissions to a specific
job title. It cuts down on the time required to set up or change user access.

For example, if you have 20 salespeople, two managers, and three accountants,
you wouldn’t have to create 25 individual security profiles in the system. You’d
only have to create three: one for each separate job title. When employees gets
promoted, just give them credentials that fit the new role and they’re good to go.

Rule-Based Access Control

Not to be confused with the other “RBAC,” rule-based access control is


commonly used as an add-on to the other types of access control. In addition to
whatever type of access control you choose, rule-based access control can
change the permissions based on a specific set of rules created by the
administrator.

5
If your business closes at 5 p.m., there’s no need for anyone to have access to
your main office, even managers, after closing. With rule-based access control,
you can set a rule to deny access to everyone from 5 p.m. to 9 a.m. the next
morning. Rules can be created for just about any occasion.

SECURITY SCREENING INFRASTRUCTURE AND PROCEDURES

Most airports have numerous screening checkpoints situated in different areas


of its facility. Passenger, cabin baggage, hold baggage, cargo, and non-
passenger screening are typical checkpoints.

These airport checkpoints screen and process people, belongings, and cargo
nonstop to prevent the entry of prohibited and dangerous items. Let’s briefly run
through the different types of security screening checkpoints typically found at
airports.

Hold Baggage Screening (HBS)

What is screened Passengers’ checked baggage handed over to the


airlines
Methods: Computed Tomography (CT) system, explosives detection
system (EDS), X-ray system, explosives trace detection (ETD), physical
search
Typical Throughput: Liquids, aerosols, and gels (LAGs) of any amount,
clothes, shoes, accessories, electronics, toiletries, food, souvenirs
Allowable Items: Sharp objects (knives, box cutters, scissors), firearms,
ammunition, sporting equipment, alcohol, self defense sprays, martial arts
weapons, tools
Prohibited Items: Loose lithium batteries, e-cigarettes and vaping
devices, realistic replicas of explosives, safety matches, flares, chlorine
and liquid bleach

Passenger Pre-Board Screening

 Who is screened Passengers entering the secure area of the airport


 Methods: Walk-through metal detector, hand-held metal detector, full-
body scanner, partial or full pat-down, explosives trace detection

6
Cabin Baggage Screening (CBS)

 What is screened Passengers’ carry-on baggage and personal belongings


 Methods: X-ray system, explosives trace detection, physical search
 Typical Throughput: Clothes, shoes, accessories, jewelry, cell phones,
laptops, tablets, eReaders, toiletries, medication, food/snacks, literature
 Allowable Items: E-cigarettes and vaping devices, lighters, ice skates and
rollerblades, disposable razors, undeveloped camera film
 Prohibited Items: Firearms, ammunition, sporting equipment (baseball
bats, golf clubs, ski poles), LAGs over a certain amount, fireworks, hover
boards, gel candles

Cargo Screening

 What is screened Cargo and packages tendered for air transport


 Methods: X-ray system, explosives trace detection, explosives detection
system, electronic metal detection (EMD) system, canine search, physical
search
 Prohibited or Restricted Items: Lithium batteries, ivory, fireworks,
hazardous materials (HazMat)

Non-Passenger Screening

Who is screened Airport employees, airline staff, and contracted workers


accessing restricted areas of the airport along with their personal items.
Includes flight and cabin crews, baggage handlers, maintenance
personnel, customer service representatives, caterers, etc.
Methods: X-ray system, walk-through metal detector, hand-held metal
detector, full-body scanner, partial or full pat-down, explosives trace
detection, physical search

******************

You might also like