(ACE) Security - American Association of Airport Executives

advertisement
Cover Page
ACE – Security
Module 1
Page 2
American Association of
Airport Executives
Accreditation Module 1
Airport Certified Employee (A.C.E.) Security
The History of Aviation Security
Aviation Security Policy Development
Roles and Responsibilities
Jeffrey C. Price, M.A., C.M.
Owner - Leading Edge Strategies
Associate Professor – Metropolitan State College of Denver
Table of Contents
Introduction ..................................................................................................................................... 1
Introduction ................................................................................................................................. 1
Module 1 Objectives ....................................................................................................................... 2
Abbreviations Used in this Module ................................................................................................ 3
The History of Air Terrorism and the Development of Policy and Procedures ............................. 4
The History of Air Terrorism ...................................................................................................... 4
The International Civil Aviation Organization (ICAO).............................................................. 6
The Tokyo Convention, 1963 ................................................................................................. 8
The Hague Convention, 1970 ................................................................................................. 8
The Montréal Convention, 1971 ............................................................................................. 8
Post 9/11 and Today................................................................................................................ 9
The Beginning of Air Terror ....................................................................................................... 9
The U.S. Government Responds ............................................................................................... 11
Air Terror in the 1970s ............................................................................................................. 12
Air Terror in the 1980s ............................................................................................................. 13
Air India Flight 182 – PPBM and Checked Bag Screening.................................................. 13
TWA Flight 847 – Flight Crew Training and Grounded Aircraft ........................................ 14
Rome and Vienna – Airport Attacks ..................................................................................... 15
EgyptAir 648 – Sky Marshals and Commandoes ................................................................. 16
Air Lanka – Employee Facilitated Attack ............................................................................ 16
Pan Am Hijacking – Disable Aircraft and Ramp Security ................................................... 17
El Al Attempted Bombing – Passenger Profiling ................................................................. 17
Korean Airliner Bombing – State Sponsored Air Terror ...................................................... 17
PSA Flight 1771 – Employee Identification ......................................................................... 18
Pan Am Flight 103 – Lockerbie, Scotland ............................................................................ 18
Avianca Flight 103 Bogotá, Colombia – Narco Terrorism................................................... 21
Aviation Security Improvement Act of 1990........................................................................ 21
Air Terror in the 1990s ............................................................................................................. 22
The World Trade Center Bombing and the Oklahoma City Bombing – non aviation events
with impacts on aviation security ......................................................................................... 22
FedEx Flight 705 – Employee Hijack Attempt..................................................................... 23
Air France Flight 8969 .......................................................................................................... 23
The Manila Air Plot – Operation Bojoinka........................................................................... 25
TWA Flight 800 .................................................................................................................... 25
Aviation Security and Anti-terrorism Act of 1996 ............................................................... 26
Millennium Bomber – Airport Attack .................................................................................. 27
Problems in Aviation Security Continue .............................................................................. 28
The Airport Security Improvement Act of 2000................................................................... 28
September 11, 2001 .................................................................................................................. 29
Introduction ............................................................................................................................... 33
The Aviation and Transportation Security Act of 2001............................................................ 33
Key Issues ............................................................................................................................. 36
Aviation Security Events since 9/11 ............................................................................................. 42
LAX Airport Shooting – Terminal Attack ............................................................................ 42
Russian Airliner Bombings ................................................................................................... 43
Liquid Bomb Plot – Again .................................................................................................... 43
Attacks on Aviation Continue into the 2010’s ...................................................................... 44
Summary ................................................................................................................................... 46
The Aviation Security System: Agencies, Entities and Responsibilities ...................................... 47
The Department of Homeland Security .................................................................................... 47
The Transportation Security Administration ............................................................................ 47
The Federal Security Director ............................................................................................... 48
Federal Air Marshals............................................................................................................. 50
The Canine and Explosives Program .................................................................................... 51
Explosives Unit ..................................................................................................................... 51
Screening Passengers by Observation Techniques (SPOT).................................................. 51
Aviation Direct Access Screening Program (ADASP) ......................................................... 52
Other Government Agencies................................................................................................. 52
Airport Security ........................................................................................................................ 53
The Airport Security Coordinator ......................................................................................... 53
Law Enforcement .................................................................................................................. 53
Airport Operations ................................................................................................................ 54
Air Carrier Security................................................................................................................... 54
The Airline Station Manager ................................................................................................ 54
Aircraft Operator Security Coordinator (AOSC) .................................................................. 55
Ground Security Coordinator (GSC) .................................................................................... 55
In-Flight Security Coordinator .............................................................................................. 55
Corporate Security and Loss Prevention............................................................................... 55
Industry Organizations .................................................................................................................. 56
Summary ................................................................................................................................... 56
References ..................................................................................................................................... 57
From the Author
Ten years after 9/11, we have updated the ACE-Security modules for the third, and not
likely the last, time. Many events in aviation security occurred during the past decade and
the modules have evolved as well. This module update includes information about the
attacks on aviation since the 2007 update, as well as policy and procedural changes. The
modules are also becoming focused on the role of the Airport Security Coordinator and
the responsibilities of the airport operator in aviation security, rather than a broad-based
look at all things avsec. Consider this the Expert ASC course. This module update has
reduced some of the details in the history, policy development and airline security areas
to make room for more information related to the ASC.
While these modules will be as up-to-date as possible upon publication, the industry
never stops evolving, and threats and attacks on aviation are ongoing. If you see
something out of date, please write to me at jcprice@leadingedgestrategies.com so I can
correct it in future versions.
While Airport Security Coordinators and airport directors have different perspectives on
the role of the TSA and the Federal Security Director at their airports, it is the position of
AAAE that the best practices approach to airport security is to work cooperatively rather
than uncooperative with the federal government.
Additionally, although regulations and certain guidance documents, such as the TSA’s
Complete Airport Security Program guide, delineate what actions must be taken to
ensure compliance, Federal Security Directors and others have differing interpretations of
the regulations and the guidance. Therefore, what may be approved (or not approved) at
one airport may not be the case at another simply due to different interpretations from the
FSD’s at those locations.
Thank you,
Jeffrey C. Price, M.A., C.M.
Owner, Leading Edge Strategies
Associate Professor, Metropolitan State College of Denver
Lead Author: Practical Aviation Security: Predicting and Preventing
Future Threats, Butterworth Heinemann, 2009.
April 1, 2011
ACE – Security
Module 1
Page 6
Introduction
Introduction
The purpose the ACE-Security program is to enhance the knowledge of individuals who
operate on an airfield and share in the responsibility for the safety, operation, security and
maintenance of airports. A secondary goal is to prepare individuals for the AAAE
Certified or Accredited Member programs.
Successful study and completion of an examination over this module and three others
will result in recognition as an Airport Certified Employee – Security (ACE–Security).
The certification represents that each individual has received focused instruction on the
current operating practices and knowledge requirements of Title 49 Code of Federal
Regulations (CFR) Section 1500 (and associated parts). This course covers all sections
during a three-day period. A comprehensive, multiple-choice exam is administered on the
fifth day. A score of 70 or higher will result in certification as an ACE–Security.
The A.C.E. – Security course is designed to raise the level of awareness and
understanding of security to an airport staff member, allowing that individual to make
better decisions and judgments when assessing hazards and risks at the airport.
The program also allows the individual to implement the requirements of the
Transportation Security Administration’s regulations and best security practices.
ACE – Security
Module 1
Page 1
Module 1 Objectives
•
Explain the role of ICAO and it’s impact on aviation security regulations and
practices
•
Know the lessons learned in regards to the key terrorists and criminal attacks on
aviation
•
Explain the impact of legislation on aviation security
•
Know the roles and responsibilities of individuals and entities within the aviation
security system
ACE – Security
Module 1
Page 2
Abbreviations Used in this Module
AOA – Air Operations Area
AOSC – Aircraft Operator Security Coordinator
ASC – Airport Security Coordinator
BATF – Bureau of Alcohol, Tobacco and Firearms
CASFO – Civil Aviation Security Field Office
CHRC – Criminal History Records Check
DHS – Department of Homeland Security
EDS – Explosives Detection System
ETD – Explosives Trace Detection
FAA – Federal Aviation Administration
FBI – Federal Bureau of Investigation
FSD – Federal Security Director
GSC – Ground Security Coordinator
IATA – International Air Transport Association
IED – Improvised Explosive Device
ICAO – International Civil Aviation Organization
LEO – Law Enforcement Officer
NTSB – National Transportation Safety Board
SARP – Standards and Recommended Practices
TSA – Transportation Security Administration
WMD – Weapon of Mass Destruction
WTMD – Walk Through Metal Detector
ACE – Security
Module 1
Page 3
The History of Air Terrorism and the Development
of Policy and Procedures
The History of Air Terrorism
The development of policy and procedures within the aviation security
system are most often traced back to specific terrorist or criminal acts.
Unfortunately, many of today’s security measures have been paid for with
the deaths of innocent lives. Aviation security policy has, unfortunately,
been highly reactive. However, one is hard pressed to imagine that the
U.S. could have implemented today’s security measures if the events of
9/11 had never occurred. While there were gaps in the system, it was not
for a lack of trying to close those gaps on the part of many aviation
security practitioners who were in the industry prior to 9/11 – many of
whom are still in the industry today, still trying to keep our nation’s
airways safe.
For many Americans, the terrorist attacks on 9/11 were a shock due to the
enormity of the crime but also because no one had ever considered that
style of attack. The U.S. aviation security system, and for that matter,
much of the world’s aviation security system, was designed to prevent or
deter bombings and “traditional” hijackings, such as those conducted for
political or financial motives. Few recognized the possibility of using an
aircraft as a weapon of mass destruction.
However, versions of the aircraft-as-WMD scenario have occurred or been
attempted several previous times, both in reality and in fiction. A few are
noted here:
•
In 1970, Eastern Airlines passenger John Devivo stormed
the cockpit with a gun, ordering the pilot and first officer to
fly around until the plane ran out of fuel and crashed. Shots
were fired, wounding the copilot, and Devivo was shot
twice as bullets flew out the cockpit door into the passenger
cabin. Devivo was subdued, and the plane landed safely.
•
In 1972, three accused rapists took over a commercial
flight and threatened to crash the plane into a U.S. nuclear
power plant.
•
In 1974, Samuel Byck, armed with a handgun and a
gasoline bomb, shot his way onto a Delta Airlines jet at the
Baltimore Airport intending to crash the plane into the
White House. A police officer and the aircraft’s First
Officer were both killed. The aircraft never left the gate
before Byck himself was shot by a responding officer.
ACE – Security
Module 1
Page 4
•
Also in 1974, Army Private Robert Preston flew a stolen
helicopter to the White House, hovering for several minutes
before landing on the South Lawn.
•
In 1987, disgruntled airline employee David Burke on PSA
Flight 1771 stormed the cockpit over San Luis Obispo,
California, shot a passenger, then stormed the cockpit and
killed both pilots. He then committed suicide as the plane
plummeted out of control, crashing and killing all 43
onboard.
•
In 1994, Federal Express employee Auburn Calloway was
jump-seating on a FedEx flight when he attacked both
pilots with hammers, planning to kill the pilots and crash
the plane. Despite severe injuries to the Captain, First and
Second Officer, they were able to prevent Calloway from
taking over the plane and landed safely.
•
Also in 1994, the Armed Islamic Group took over an Air
France jetliner and planed to crash it into the Eiffel Tower
in Paris. French commandoes stormed the plane and killed
the hijackers while the plane was on the ground refueling.
•
Again in 1994, Frank Corder crashes a Cessna 150 into the
White House.
•
Even in fiction, using an aircraft as a Weapon of Mass
Destruction had been imagined. In the Tom Clancy novel,
Debt of Honor, an airline captain is himself the hijacker;
he intentionally crashes his Boeing 747 into the U.S.
Capitol. In 1999, the diary of Columbine killer Eric Harris
contains a plot to hijack an aircraft and crash it into New
York City.
However, the lack of success and an overwhelming number of bombings
and hijackings (at least 700 hijackings throughout the world since the
beginning of aviation) helped form the policies that would prevent more
casualties from these types of attacks, but may have also kept our attention
focused on a particular style of hijacking, while ignoring, or not realizing,
other options available to hijackers.
While there have been a few incidents prior to 9/11 in which hijackers
attempted to crash an aircraft into the ground, in virtually all instances,
few believed that the hijackers themselves would pilot the aircraft. In all
of the previous actual incidents, the hijackers attempted to force the pilots
to fly into the ground – which is an unlikely expectation. There are only
three exceptions – two incidents in which the aircraft captain crashed his
ACE – Security
Module 1
Page 5
own plane, and in the fictional Clancy novel above, the captain was also
the “hijacker.”
Air terrorism historically has been reflected in acts of hijacking and
bombings. There have been a handful of surface-to-air missile attacks, a
few airport shootings and bombings, and even a couple of mortar attacks
on airports, but primarily, aviation policy has been built on the premise of
preventing hijackings and bombings.
Criminal acts are also part of our aviation security record. Assaults on
airport employees, airline crewmembers and other passengers (air rage),
and sabotage of aircraft and airport facilities are on the list of common
criminal activity.
The International Civil Aviation Organization (ICAO)
The International Civil Aviation Organization (ICAO) was established in
Chicago on December 7, 1944, at the Convention on International Civil
Aviation to “…secure international co-operation and highest possible
degree of uniformity in regulations and standards, procedures and
organization regarding civil aviation matters,” which include aviation
security measures.
ICAO is a specialized agency of the United Nations charged with ensuring
the safe and orderly growth of international civil aviation throughout the
world.
The assembly meets at least once every three years. Each Contracting
State is entitled to one vote, and the majority rules. ICAO now consists of
188 member States.
ICAO’s Council adopts Standards and Recommended Practices
(SARPs) contained in Annex 17 to the Chicago Convention in 1974 for
the safeguarding of international civil aviation. The ICAO Security
Manual contains guidance material on the interpretation and
implementation of the SARPs of Annex 17.
In the wake of terrorist attacks on September 11, 2001, ICAO developed
an Aviation Security Plan of Action for strengthening aviation security
worldwide. ICAO has developed a training program to assist States in
implementing the Annex 17 aviation security standards.
ICAO’s security-related work is carried out in three inter-related areas:
policy initiatives, security audits and assistance to States that are unable to
address serious security deficiencies.
Security audits are performed under the Universal Security Audit Program
and are managed by the Aviation Security Audit (ASA) Section.
Short-term or urgent, security-related assistance to countries is available
through the Implementation Support and Development (ISD) Program,
ACE – Security
Module 1
Page 6
managed by the ISD-Security Section. Long-term project assistance is
available from the ICAO Technical Co-operation Bureau.
Security policy is the responsibility of the Aviation Security and
Facilitation Policy (SFP) Section1, which promotes the implementation of
Annex 17 through seminars and workshops from airports, airlines and law
enforcement agencies, as well as through the dissemination of guidance
material.
In addressing the evolving threat to civil aviation, ICAO relies on the
advice of experts who sit on the Aviation Security Panel. Established in
the late 1980s, the Panel is comprised of 27 members nominated by States,
and five observers from industry. The Panel develops ICAO security
policy, responses to emerging threats, and strategies aimed at preventing
future acts.
ICAO also oversees the tagging of commercial explosives by their
manufacturers, develops programs to enhance the security of travel
documents, and develops training and course material for use by civil
aviation personnel in topics such as airline and cargo security and crisis
management.
ICAO documents offer guidance and information on:
•
•
•
•
•
•
•
•
•
•
•
The protection of aircraft, including pre-flight precautions,
aircraft searches and control of access to aircraft.
Airport access control systems, physical security measures,
background checks, personnel identification systems
design, and vehicle permits.
Quality control, including security inspections and audits,
security tests and training of security staff.
Airport design as it relates to security, including
minimizing the effects of an explosion on people and
facilities.
Managing responses to unlawful acts against aviation.
Security equipment (WTMDs, X-Ray) and explosives.
Search and evacuation guidelines.
Surface to air missiles defenses that are available on
aircraft and procedures airport operators can take to
minimize the threat of surface to air missiles.
Incident command and emergency operations.
Model airport and aircraft operator security programs.
Transportation of dangerous goods.
1
In addressing the evolving threat to civil aviation, ICAO relies on the advice of experts
who sit on the Aviation Security Panel.
ACE – Security
Module 1
Page 7
To identify and correct deficiencies in the implementation of ICAO
standards, mandatory, consistent, systematic audits are central to ICAO’s
Aviation Security Plan of Action. The plan also includes methods to:
•
•
•
•
•
Identify and assess global responses to new threats and
take action that includes the protection of airports, aircraft
and air traffic control centers.
Strengthen security-related provisions in the annexes to the
Convention on International Civil Aviation to protect the
flight deck.
Coordinate with security audit programs.
Publish results of security audits but protect confidentiality
of those results.
Develop follow-up programs to assist states (countries) in
fixing deficiencies in their AVSEC (Aviation Security)
capabilities.
ICAO has held several conventions affecting aviation security including:
Tokyo, The Hague and Montreal 1971.2
The Tokyo Convention, 1963
The Tokyo Convention addressed offenses and other acts committed
onboard an aircraft that affect the safety of the flight, or individuals on the
flight.
The Hague Convention, 1970
The Hague Convention required states to make hijackings punishable by
severe penalties and to either extradite or prosecute offenders.
Additionally, it required government and countries in which a hijacked
aircraft landed to take measures to restore control of the aircraft to its
owner and “facilitate the continuation of the journey of the passengers and
crew as soon as practical…without delay return the aircraft and its cargo
to the persons lawfully entitled to it. ”
The Montréal Convention, 1971
The Montreal Convention covered attacks on aircraft, whether in-flight or
on the ground, and defined three types of offenders:
1. One who commits an act of violence against a person
onboard an aircraft in-flight that endangers the safety of the
flight.
2. A person who destroys an aircraft or causes damage to the
aircraft rendering it incapable of flight or endangers its
safety while in-flight.
2
ICAO is now headquartered in Montreal where all conferences are now held.
ACE – Security
Module 1
Page 8
3. A person who places (or causes to be placed) a device or
substance likely to destroy or damage an aircraft. In 1988,
the scope of the Montréal Convention was broadened to
cover attacks on airports.
Throughout the history of air terrorism, ICAO has made numerous
recommendations, many of which are highlighted in the text that follows
each of the security incidents outlined below.
Post 9/11 and Today
Following 9/11, the 33rd Session of the ICAO Assembly conducted in
Montreal in February of 2002, adopted Resolution A33-1, Declaration on
Misuse of Civil Aircraft as Weapons of Destruction and other
Terrorist Acts Involving Civil Aviation. As a result, ICAO recommends
a uniform approach to aviation security, including an ICAO Aviation
Security Plan of Action requiring regular, mandatory, systematic and
harmonized audits to enable the evaluation of aviation security in member
states. The program is known as the ICAO Universal Security Audit
Program (USAP) and is addressed in Module 4.
The Beginning of Air Terror
The first recorded aircraft hijacking was on February 21, 1931, in
Arequipa, Peru. Byron Rickards, flying a Pan American Ford Tri-Motor
mail plane, was approached on the ground by armed revolutionaries who
demanded to use the plane to drop propaganda leaflets over Lima, Peru.
The pilot refused to fly them anywhere and, after a ten-day stand-off, was
released after agreeing to fly one of the hijackers to Lima.
Between 1947 and 1958, 23 hijackings mostly committed by eastern
Europeans seeking political asylum were reported. The world’s first fatal
hijacking took place in July 1947, when three Romanians killed a flight
crew member (Rumerman 2007).
Another new threat started to emerge in the 1950s. The first bombing of a
commercial U.S. airliner occurred on a DC-6 as it departed Stapleton
International Airport in Denver, Colorado, on November 1, 1955.
Jack Graham placed a bomb in his mother’s luggage, hoping to cash in on
her life insurance policy. The bomb exploded shortly after takeoff and
killed all 44 people on board. Graham was executed in the Colorado gas
chamber for the crime, in what was also the first example of the
“passenger-dupe” scenario.
In 1959, Fidel Castro came to power in Cuba, and, soon after the number
of hijackings began to rise in the United States. At first, those wishing to
escape from Cuba hijacked flights; later, many hijackings were executed
by people wanting to return. In May 1961, the first American airliner was
hijacked from Miami to Cuba. Throughout the 1960s, the number of
ACE – Security
Module 1
Page 9
hijackings mostly committed by those seeking political asylum, or
criminals trying to escape a criminal act in the States continued to rise.
Throughout the 50s and 60s, other bombings occurred many times to
collect on insurance policies. As the frequency of hijackings grew, the
government began putting armed guards on aircraft when requested by the
air carriers. Thus began the first use of “air marshals,” called Sky
Marshals at the time. In September 1961, President John F. Kennedy
signed legislation that approved prison sentences of 20 years or more, or
the death penalty, for air piracy.
After Kennedy’s legislation passed, the frequency of hijackings in the U.S.
reduced, until the late 1960s, when a rash of hijackings occurred, starting
in 1968 and lasting through 1972. Hijackings also started overseas in
mostly the Middle East and were frequently tied to the Palestinian – Israeli
conflicts. During this time, the U.S. Department of Transportation placed
the total number of hijackings between 1968 and 1972 at 364, worldwide.
In August of 1969, Arab terrorists carried out the first hijacking of a U.S.
aircraft flying overseas, by diverting an Israel-bound TWA flight to Syria
(Rumerman 2007).
The late 60s also saw the first and only successful hijacking of an Israeli
El Al aircraft, although numerous subsequent attempts have occurred.
Three members of Popular Front for the Liberation of Palestine (PFLP)
hijacked an El Al plane to Rome. The aircraft diverted to Algiers, and
negotiations extended over forty days, with both the hijackers and the
hostages ultimately set free.
Following the hijacking of eight airliners to Cuba in January 1969, the
Federal Aviation Administration (FAA) created the Task Force on the
Deterrence of Air Piracy, developing a hijacker profile that could be used
along with metal detectors (magnetometers) in screening passengers. In
October of that year, Eastern Airlines began using the system, with four
more airlines following in 1970.
In 1970, the PFLP staged one of the most extraordinary hijackings ever
attempted prior to 9/11. On September 6, 1970, multiple hijackers
attempted to hijack four aircraft simultaneously, succeeding with only
three. Two of the planes were forced to fly to the Jordanian desert, while
the third went to Egypt. The pilot of the third jet, a B-747, convinced the
hijackers that the plane was too big to land in Jordan.
Two aircraft landed at Dawson’s Field, which was a former Royal Air
Force airstrip, in Jordan. The planes were evacuated, and, after a standoff
that lasted several days, the aircraft were destroyed by explosives and the
hostages released. The B-747 that landed in Egypt was wired with
explosives on approach into Cairo. Upon landing, the aircraft was
evacuated and destroyed by the hijackers, who were then taken into
custody by Egyptian officials.
ACE – Security
Module 1
Page 10
PFLP member Leila Khaled, who had previously, succeeded in hijacking
another plane, was the only attempted hijacker that failed that day. Khaled
and associate Patrick Arguello, a Nicaraguan, boarded an El Al Boeing
707 bound for Amsterdam, but two of their fellow hijackers were not
allowed on the flight as they had sequential passport numbers, which
Israeli security officials and the pilot thought to be suspicious. She and
Arguello stormed the cockpit in mid flight but were confronted by air
marshals. Arguello was shot and killed, and Khaled was wrested to the
ground out of fear she might drop one of the two hand grenades she held
in each hand. A passenger hit her on the back of her head. She soon awoke
to a vicious beating by other passengers.
Khaled claims that her intent, and in fact her orders from the PFLP, were
not to hurt any passengers, only to threaten them. This is a dangerous
assumption in the post-9/11 world, but the concept of a hostage-taker not
wanting to severely hurt or kill hostages (essentially, hostages are
bargaining “currency”) has been the basis for most hostage negotiation
strategies.
The plane landed at Heathrow Airport, and Khaled was taken into custody
by authorities. She was held for 28 days until released in a hostage
exchange with the PFLP. Six days after the initial hijacking, another
aircraft was hijacked by a Palestinan faction sympathetic to, but not part of
the PFLP, in order to be used as a bargaining tool to negotiate Khaled’s
release. In a prisoner trade with Syria, she was allowed to go free. The
growing number of hijackings overseas did not go unnoticed in the United
States.
The U.S. Government Responds
After numerous hijackings in 1970, and the discovery of three bombs on
commercial airliners that year on September 11, 1970, President Richard
Nixon announced a comprehensive anti-hijacking program, which would
become the Anti Hijacking Act of 1971. The Act created a formal federal
air marshal program (Rumerman 2007) and required the inspection of
passengers, but not their carry-on bags. Some airlines were already
screening both passengers and carry-on bags on a voluntary basis.
•
•
•
Created Title 14 CFR Part 107 Airport Security.
Brought the U.S. up to ICAO aviation security standards.
Provided for punishment of death or life imprisonment for
hijacking, which could be reduced to a maximum penalty of
five years imprisonment if the hijackers gave themselves up.
Three years later, the Anti-Hijacking Act of 1974 mandated the screening
of passengers and their carry on bags by weapons-detecting technology
and also put the responsibility of screening onto the airlines.
ACE – Security
Module 1
Page 11
Air Terror in the 1970s
With all the new security requirements in place, hijackers had to look for
new ways to hijack aircraft and to get away with it. While overseas, many
hijackings would end with the negotiated release of both the hostages and
the hijackers, in the U.S., hijackings usually ended with the death or arrest
of the hijackers at the hands of police or federal agents, as well as the
release of the hostages.
With passenger and carry-on baggage screening in place making it more
difficult to smuggle weapons on board, a rash of hijackers simply bluffed
their way along. In these incidents, a hijacker would hold an inanimate
object, such as a TV remote control, or other electronic device, and claim
to have a bomb on him or placed in the cargo hold. These types of
hijackings did not last for very long and hijackers switched to other
means, such as having airport or airline employee’s pre-place weapons
onto the aircraft they intended on hijacking.
Also, with most hijacks in the U.S. ending on airport taxiways with the
death or arrest of the hijackers, one intrepid hijacker devised a new plan.
Whether it was his real name or not, Dan Cooper, alias D.B. Cooper,
hijacked an aircraft and forced it to land in Seattle, Washington, where he
demanded $200,000 in cash and several parachutes. He released the
passengers and flight attendants, and then ordered the pilots to fly to Reno,
Nevada, and to stay below 10,000 feet. At one point during the flight, he
ordered the pilots to deploy the rear air stairs. When the plane touched
down in Reno, Cooper was not on it. The incident remains a mystery to
this day, although some of the money (marked by the FBI) was discovered
years later in a riverbed in Washington State.
After Cooper’s “escape,” approximately 20 more hijackers attempted the
same feat. Boeing aircraft manufacturers eventually invented the “Cooper
Vane,” which would prevent the rear air stairs from being deployed while
in flight.
Regardless of the methods that have been put into place to prevent, deter
or mitigate hijackings and bombings, criminals and terrorists have
always come up with other methods to circumvent these preventative
measures. This face demonstrates that aviation security is a game of
constant and never ending improvement – on both sides.
While aircraft have been the most popular targets for air terrorism, airports
and airline facilities have also been attacked. In the 1960s and 1970s,
internationally, bombers targeted some airline offices. In 1973, a bomb
went off in the international terminal building at Los Angeles International
Airport. A second bomb exploded in a locker two years later, at New
York’s LaGuardia Airport, killing 11 people. Today, locker storage is not
allowed in public areas unless the items are first searched or screened.
ACE – Security
Module 1
Page 12
Since their inception in the 1950s, surface to air missiles, also
known as Manned Portable Air Defense Systems (MANPADS)
have occasionally been used against commercial aircraft. Usually
these incidents happened in war zones, such as in the Sudan, when
Rhodesian dissidents used Russian made SAM-7 surface-to-air
missiles to bring down Air Rhodesia commercial airliners. Most
surface-to-air missile attacks have been against commercial prop
aircraft, but about seven or so have been against commercial jets.
Air Terror in the 1980s
In the early 1980s, hijackings continued to be a common occurrence,
particularly in the Middle East. In 1985, two events, the hijacking of TWA
Flight 847 and the bombing of Air India Flight 182 would make a
significant impression upon the aviation community. By the late 1980s,
two other attacks on aviation would occur and set the stage for policy
making and industry focus for the next decade. The first took place when
an employee killed the flight crew of PSA 1771 over San Diego,
California. The other killed 270 people when a bomb detonated on Pan
Am Flight 103, over Lockerbie, Scotland.
Air India Flight 182 – PPBM and Checked Bag Screening
On June 22, 1985, Air India Flight 182 exploded off the coast of Ireland,
killing 359 people. At the same time, two baggage handlers were killed
when a bomb exploded as they transferred baggage from Canadian Pacific
Flight 003 to Air India Flight 301 bound for Thailand. Both flights had
originally departed from Vancouver. If 9/11 was a watershed event that
prompted sweeping changes in a nation’s aviation security system, then
the bombings of these Air India flights could be considered Canada’s
“9/11”.
Authorities believed that both bombs were loaded onto flights that
originated in Vancouver, placed on board by a man who purchased tickets
on both flights, but boarded neither. Flight 182 had a stopover in Toronto,
before heading over the Atlantic Ocean, where it exploded just off the
Irish coast. After the bombings, ICAO called a special meeting in
Montreal, Canada, and developed an amendment to Annex 17 mandating
the reconciliation of passengers with their bags, commonly referred to as
positive passenger bag matching (PPBM). Although the PPBM process
was already in effect at the airline, it may not have been conducted on
either of these flights.
Canada also implemented the process of checked baggage screening. The
process entailed using conventional x-ray machines to conduct the
majority of the screening electronically, with questionable baggage being
diverted to personnel for individual inspection.
ACE – Security
Module 1
Page 13
Even though both ICAO and the International Air Transport
Association (IATA) mandated that PPBM be put into effect, many
countries and air carriers ignored the practice as being inefficient to flight
operations.
TWA Flight 847 – Flight Crew Training and Grounded Aircraft
On July 14, 1985, Shiite Muslim terrorists (Hezbollah) hijacked TWA
Flight 847 en-route from Athens to Rome. With 145 passengers and
crewmembers onboard the Boeing 727, the aircraft departed Athens
Hellinikon Airport bound for Rome, Italy. Shortly after takeoff, two
gunmen carrying guns and grenades seized control of the aircraft and
ordered Captain John Testrake to fly to Beirut. A third terrorist, Ali
Atwa, was supposed to be on board but missed the flight and was arrested
in Greece. The guns and grenades were already on board the aircraft,
hidden behind panels in the plane’s lavatories and likely placed there by
individuals posing as airline catering personnel.
The aircraft began a journey between Lebanon and Algiers. Passengers
and flight crewmembers were beaten in order to obtain compliance from
both Captain John Testrake and ground controllers. At each touchdown
point, some passengers were allowed to leave. Controllers at both airports
created additional problems by not allowing the aircraft to immediately
land.
Air traffic controllers in Algiers tried to close the airport, and Beirut tower
controllers shut off the runway lights during a night landing. Terrorists
threatened to crash the aircraft into the presidential palace, if they were
not given permission to land, and the runway lights came back on.
U.S. Navy diver Robert Stethem, who had been subjected to numerous
beatings during the ordeal, was shot and killed, his body thrown onto the
tarmac in Beirut. The terrorists demanded the release of Shiites in Israeli
custody, along with the third hijacker, who had been arrested at the Athens
airport.
In Algiers, fourteen more terrorists from the Amal organization along with
Ali Atwa, the hijacker who was supposed to be on the flight back in
Athens, boarded the aircraft as reinforcements. Passengers were
segregated on the basis of American or Jewish-sounding names. Among
the women was flight attendant Uli Derickson, who was credited with
saving the lives of many on board. Derickson spoke German, as did one of
the terrorists, enabling communication between the hijackers and the
hostages. The only English-speaking hijacker, Ali Atwa, missed the flight.
Derickson would intercede during passenger beatings, attempted to hide
ACE – Security
Module 1
Page 14
American, U.S. Military and Jewish identities of passengers, and
eventually negotiated the release of her crew and the women passengers.3
Captain Testrake also demonstrated leadership and courage throughout the
hijacking. As the flight headed back to Beirut for the third time, he and his
crew worked out a plan to disable the aircraft. The flight crew shut down
two of the plane’s three engines and convinced the hijackers that the
aircraft could no longer fly. Testrake also worked with mechanics and
crewmembers from Middle East Airlines to provide food and medical
assistance to his flight crew and remaining passengers.
The example of Testrake and Derickson’s bold actions throughout the
incident are a testament to the important role flight crew play in the
aviation security system. TWA 847 reiterates the need for flight crew to
be trained in how to handle volatile, and sometimes violent, situations.
The standoff continued for 18 more days, after which all of the hostages
were released. Ali Atwa, the terrorist held responsible for the hijacking, is
reportedly dead. The hijacking also was significant as the press covered it
so extensively. Media representatives were able to interview the hijackers
as the aircraft sat on the ground in Beirut and Algiers, and new satellite
technology enable the mass media to bring the images immediately into
living rooms all over the world. Video images of Captain Testrake and a
hijacker holding a gun to Testrake’s head as both peered out the cockpit
window of the plane are now a part of aviation security history.
An important lesson learned from Flight 847 is that once an aircraft is on
the ground, it must be kept on the ground. The use of aircraft as weapons
of mass destruction after 9/11 drives this point home.
Rome and Vienna – Airport Attacks
In December of 1985, the airports in Rome and Vienna were
simultaneously attacked by groups of young men armed with automatic
weapons and grenades (Wallis 1993, pp 11-12). There was much debate
over whether these groups were so-called “suicide squads,” due to the lack
of a clear escape plan. However, evidence does not substantiate this claim.
The primary targets of the attacks were passengers at the El Al ticket
counter. In the case of the Vienna attack, erratic gunfire turned out to be
the downfall of the terrorists, as a bullet pierced the glass of an airport
bank, triggering an alarm in a nearby police station.
The response from the airports was to create a common check-in counter
to protect the identity of passengers traveling to Tel Aviv. This
requirement would result in lengthy design modifications at many large
3
Derickson’s name would become a household word for the courage and strength she
showed throughout the ordeal, and her story was portrayed in a 1980s made-for-TV
movie, “The Taking of Flight 847: The Uli Derickson Story.”
ACE – Security
Module 1
Page 15
U.S. airports, as well as passenger inconvenience. However, the real
concern was the ability of airport law enforcement personnel to respond to
heavily armed gunman storming the terminal building. Airport police are a
required part of every commercial service airport security program, but,
depending on the size of the airport, they may not always be on site.
To this day at the airport in Rome, a catwalk surrounds the check-in area
of the terminal. Police officers armed with submachine guns patrol the
area. They wear body armor and are constantly vigilant, watching the
passengers in the terminal intensely. The catwalk has bulletproof glass and
hard points to provide a level of protection for the officers.
EgyptAir 648 – Sky Marshals and Commandoes
On November 26, 1985, an EgyptAir Boeing 727 was hijacked on a flight
from Greece to Cairo, Egypt. Three terrorists hijacked the flight 22
minutes after takeoff.
Egyptian sky marshals engaged in a shootout with the hijackers. The
flight landed in Malta, where some women passengers were released, but
the hijackers soon began shooting passengers with Israeli or Jewish
identities, followed by passengers with U.S. citizenship (Wallis 1993, pp
9/11).
Ten hours later, Egyptian troops stormed the aircraft, killing 56 out of 88
remaining passengers and one terrorist. One lesson that seems clear from
this incident is that only specially trained troops should be used to
storm a hijacked aircraft.
Some criticized the troops for storming the aircraft, but others pointed out
that terrorists already were killing hostages; so storming the aircraft was
an acceptable risk.
In the United States in April of 1999, law enforcement agencies were
criticized for not immediately storming Columbine high school during
student shootings that left 15 dead and over 30 wounded. The question for
incident commanders remains: is it better to use ill-prepared and ill-trained
personnel when lives are threatened, or will their use cause more damage?
Fortunately, the Columbine shootings allowed law enforcement agencies
to develop tactical response strategies to rapidly developing incidents.
Airport security personnel should ensure their law enforcement
officers are trained in these tactics and conduct exercises to be able to
rapidly respond to a hijacking or shooting in the airport.
Air Lanka – Employee Facilitated Attack
On May 3, 1986, a bomb destroyed a Lockheed L1011 belonging to the
national airline of Sri Lanka, while the plane was on the ground at
Colombo Airport. Of the 128 passengers onboard, 20 were killed and the
aircraft was destroyed. A customs officer sympathetic to a separatist
ACE – Security
Module 1
Page 16
movement was arrested and charged with sabotaging the aircraft,
emphasizing the need for employee background checks. (Wallis 1993,
pp 14).
Pan Am Hijacking – Disable Aircraft and Ramp Security
On September 5, 1986, 17 people died on Pan Am Flight 73, a 747, during
an attempted hijacking by terrorists dressed to resemble airport security
guards. With 379 passengers onboard, the aircraft sat on the tarmac of a
Karachi airport. Eventually, 22 people, including two Americans, would
die during the standoff.
This case sparked an important debate due to the actions of the flight crew.
When the first shots were fired, the captain and his flight crew used the
emergency escape ropes to leave the aircraft, following recommendations
developed in the 1970s by the Federal Aviation Administration (Wallis
1993, 15). This is also concurrent with one of the earlier lessons learned
about keeping a hijacked aircraft on the ground.
One of the terrorists had wrapped explosives around himself with the
intent to blow up himself and the aircraft over Jerusalem.
Ensuring good ramp security and thorough employee background checks
are lessons learned from this incident.
El Al Attempted Bombing – Passenger Profiling
Also in 1986, El Al airline security officials at London/Heathrow Airport
discovered an attempt by an individual to place explosives on board an
aircraft. The security officials uncovered the plot during a routine security
questioning of passengers prior to the flight. Anne Marie Murphy, who
was five months pregnant at the time, was carrying explosives in her
suitcase, unbeknownst to her.
Investigators later discovered that her boyfriend, who had placed the
explosives in her bag, was a Syrian intelligence agent. Shortly thereafter,
U.S. airlines began the process of asking “security questions,” such as,
have you packed your own bags, and have your bags been out of your
control since you packed them? While it is unlikely that these questions
ever deterred a criminal from taking an explosive or weapon on board, in
the U.S., the questions were asked by ticket agents, not security personnel
trained in detecting deceptive responses and body language. The lesson
learned here is, when adopting successful security procedures, the
procedures must retain the key elements that make the process successful,
which in this case, would be the use of trained security personnel.
Korean Airliner Bombing – State Sponsored Air Terror
In 1987, a Korean Airliner exploded enroute from Baghdad to Bangkok,
killing all 115 on board. A North Korean woman was found guilty of the
crime and said she was ordered by North Korean leader Kim Il-Sung to
ACE – Security
Module 1
Page 17
bomb the aircraft in order to deter people from attending the 1988 Summer
Olympics in Seoul, South Korea. The United States placed North Korea
on the list of countries that sponsor terrorism.
PSA Flight 1771 – Employee Identification
On December 7, 1987, USAir employee David Burke, who was placed on
investigatory leave by his supervisor due to a theft charge, boarded a
Pacific Southwest Airlines flight from San Diego to Los Angeles. Burke’s
supervisor, Raymond Thompson, was onboard the flight. What happened
next would become a landmark case and would be partially responsible for
the expansion of Federal Aviation Regulation Part 107.14 regarding
Access Control and employee credentialing.
At the time of this event, airline and airport employees were not
required to go through screening checkpoints. They needed only to
display their airport-issued identification badge or airline identification to
security screeners, and they would pass through security without being
screened. Burke, who still had his airline ID, carried a loaded .44 Magnum
pistol onto the BAE-146 aircraft. Once in flight, Burke killed his
supervisor, and then walked into the cockpit, killed both pilots and then
himself.
All 44 passengers and crew aboard died as the aircraft crashed into a
farmer’s field in California’s Santa Ana Hills.
In response, a federal law was passed requiring the “immediate seizure of
all airline employee credentials” upon termination from an airline
position. Most importantly, however, the FAA adopted a rule requiring
that all members of any airline flight crew, including the captain, be
subjected to the same security measures as the passengers. However, these
measures would only apply if the employee accessed the airport concourse
(i.e. the Sterile Area) through the security-screening checkpoint. Personnel
who accessed the sterile area through airfield access doors would bypass
the screening process.
This case reinforces the point that any airport security program should
require airport access media to be confiscated anytime an employee is
placed on leave, or when the employer perceives that the employee may
be a potential threat.
Pan Am Flight 103 – Lockerbie, Scotland
Prior to 9/11, Pan Am 103 was the most analyzed and discussed aviation
security incident. Resulting in 270 deaths, it caused a legacy airline to go
bankrupt and led to an overhaul of the U.S. aviation security system.
On December 21, 1988, a bomb destroyed a Pan Am Boeing 747 over
Lockerbie, Scotland, killing 259 passengers and crew, plus 11 citizens of
Lockerbie on the ground from falling debris.
ACE – Security
Module 1
Page 18
Investigators discovered that terrorists, employed by Libyan Airlines,
planted a bomb in checked baggage on a Boeing 727 in Malta, which then
flew to Frankfurt, Germany and then to London as Pan Am Flight 103A.
At London’s Heathrow Airport, the baggage and passengers were
switched to a Boeing 747 and the flight designated Flight 103. The
terrorists who planted the bomb never boarded the airliner, even though
Pan Am and all U.S. air carriers were required to conduct the positive
passenger bag match prior to departure. A report later issued by President
George Bush’s Commission on Aviation Security and Terrorism stated,
“passenger/baggage reconciliation is the bedrock of any heightened
civil air security system” (Wallis 1993, 33).
Intelligence agencies had knowledge that bombs had been manufactured
in West Germany for intended use against aircraft, a specific threat had
been made against Pan Am, and an ICAO study into the accidental shoot
down by the USS Vincennes of an Iranian Airbus had just been published.
The ICAO findings were unsatisfactory to Iran; they wanted the United
States to be condemned as aggressors (Wallis 1993, 27). Although the
final investigation concluded that Libya, not Iran, sponsored the terrorist
attack, U.S. airlines should have been at a heightened state of alert due
to the aforementioned situations and events.
For instance, two weeks prior to the bombing, the United States Embassy
in Helsinki received a telephone call warning that a bombing attack would
take place against a Pan-American aircraft operating between Frankfurt
and the United States. It gave details as to who would carry out the crime
and their proposed methodology (Wallis 1993, 27). Although the United
States later decided the call was phony, a judgment made even after the
bombing, the FAA did pass on details of the threat to Pan Am and
other U.S. air carriers, although it was not relayed to the passengers.
The improvised explosive device was a cassette radio player (called a
“boombox”) containing the explosive material Semtex and a timing
device. The bombing was allegedly supposed to take place over water,
which would have left little evidence of a terrorist attack. However, the
terrorists apparently did not understand how long the aircraft would be on
the ground at London’s Heathrow Airport, particularly as baggage was
moved off the 727 onto the 747, which may have resulted in the bomb
detonating before the aircraft flew over water. Also, the flight path was not
directly east, but over Scotland on a Great Circle route designed to shorten
the distance, the aircraft had to fly over the Atlantic Ocean.
The device on 103 was set to go off based on a timer, not barometric
pressure. However, some explosives are designed to go off when the
aircraft reaches a certain altitude – they are triggered with a barometric
pressure switch, which has led to luggage being screened in certain
countries, such as Israel, with pressure chambers. In 1989, shortly after the
Pan Am bombing, a French UTA DC-10 (a subsidiary of Air France)
exploded over Niger, killing 170 people on board. The bomb elements
ACE – Security
Module 1
Page 19
discovered in that attack matched the elements found in the Pan Am
bombing, which linked Libya directly to the attack. At the time of the
bombing Libya was in a territorial war with Chad, which was backed by
France.
One hotly debated issue is that the passengers were not warned that the
airline had received a bomb threat. Some argue that warning passengers
of a bomb threat hands the terrorists another tool to use against aviation.
With hundreds of hoax bomb threats made to airlines every year, thenPresident Ronald Reagan said that notifying passengers of the threats
would effectively shut down the national airspace system. However, some
of the victims advocacy groups that formed after the Lockerbie tragedy
support the notification of passengers of any threats against a particular
flight. In fact, one Pan Am victims advocacy group, the Victims of Pan
Am Flight 103, are so influential that they continue to lobby for changes
in aviation security policy and even provided input after the 9/11 terrorist
attacks.
The Pan Am bombing resulted in a United States presidential commission
on aviation security, which determined that:
1. The aviation system is seriously flawed.
2. The FAA is highly reactive.
3. There were security lapses by Pan Am and a failure to
enforce its own procedures.
4. Stricter positive passenger bag matching would have
deterred the tragedy.
The commission also resulted in the creation of the Assistant Secretary for
Transportation Security for the Federal Aviation Administration, which
would later become known as the Associate Administrator for Aviation
Security. The commission determined that the x-ray machines currently in
use at U.S. airports could not reliably detect the explosive Semtex.
The sheriff of South Strathclyde, Dumfries, and Galloway, Scotland, John
S. Mowar generated much of the evidence and information that came out
of the Lockerbie crash. Mowar’s principal findings determined that the
747 was under constant guard until it left Heathrow as Flight 103.
Baggage transferred from the Boeing 727, Flight 103 from Frankfurt, was
taken directly to the 747, but passengers were not counted to ensure that
all the passengers who boarded the 747 matched the baggage that
transferred over from the 727. The sheriff also concurred that positive
passenger bag match procedures could have prevented the crash.
Regardless, two Libyan nationals were charged with destroying the flight;
however, only Abdel-Basset al-Megrahi, former chief of security for
Libyan Airlines, would be convicted. In 2003 Libya took responsibility for
the bombing and arranged to pay compensation to the families of the
victims. Abdel-Basset al-Megrahi was convicted of murder and was
ACE – Security
Module 1
Page 20
serving a life sentences; however he only served eight years and was
released by Scottish authorities in 2009 based on compassionate grounds.
He had been diagnosed with advanced prostate cancer and was not
expected to live more than 3 months. As of this writing he is still alive
(2011) and living in Libya. Also note that this is another incident where
airline or airport employees were involved in a terrorist or criminal
act.
Avianca Flight 103 Bogotá, Colombia – Narco Terrorism
One terrorist act that was not politically motivated is worthy of note. On
November 27, 1989, a Boeing 727 operated by the Colombian national
carrier Avianca blew up while flying between Bogotá and Cali, Columbia,
killing all 107 onboard. The unusual suspect of this case is the notorious
(and the late) drug trafficker Pablo Escobar, who was alleged to have
ordered the bombing in order to kill a Colombian presidential candidate.
He also was suspected of bombing other Avianca flights in the 80’s.
There are few details regarding this crash. Drug smugglers have routinely
smuggled narcotics in commercial aircraft for several years, thus it would
not have been difficult to place a bomb onboard the aircraft where it could
not be detected. The lessons learned in this case are strict control of the
airfield, specifically monitoring who has access to aircraft, performing
background checks, and the need to warn U.S. citizens traveling abroad
of airports that do not meet minimum ICAO security requirements. By
regulation, these warnings are to be posted at screening checkpoints.
Aviation Security Improvement Act of 1990
The Pan Am bombing, along with the PSA crash, resulted in the Aviation
Security Improvement Act of 1990, which required the development of
better explosives detection systems capable of detecting common
commercial and military explosives and created FAR Parts 107.14 (Access
Control).
Prior to 1990, many airport identification badges were crudely
constructed, often created with a typewriter, a Polaroid camera and a
lamination machine, making them very easy to duplicate. Identification
badges also were not often encoded to enable the badge to access a
security door, so there were few computer records of whose identification
badge accessed a door at a particular time. Many passenger boarding
bridge doors and airfield access doors contained a simple cipher lock, and
often the combination to the lock was known both to people with and
without authorized access. The combinations to such doors were
sometimes even etched into the lock or door itself, or were so commonly
known as to be completely ineffective as a locking device.
Federal Aviation Regulation Part 107.14 Access Control was responsible
for the implementation of the comprehensive access control systems in use
at airports today. The legislation required computerized access control
ACE – Security
Module 1
Page 21
systems that maintain a record of who has access to doors and gates. The
system can immediately deny access to individuals not having authorized
access, distinguish access privileges on the airfield, and prevent
individuals without approved access media from accessing the airfield.
CCTV cameras were installed at alarmed doors and throughout airports,
and security control centers were constructed at airports. Airport
identification badges were then coded for access to certain doors based on
the individual’s access authority and need for access. Through a
computerized system, records were kept for each door or gate accessed
and by which individual’s access card.
Air Terror in the 1990s
Although the 1990s had relatively few terrorist attacks on aviation, several
other events, including the first Gulf War in Iraq, caused U.S. airports to
go on high alert. The crash of TWA 800 also affected aviation security
policies and procedures.
In addition, over the course of four days in 1994, the Irish Republican
Army lobbed mortar shells onto the airfield at the London/Heathrow
Airport. Many of the shells did not explode, no aircraft were damaged, and
no injuries were reported; however, the attack did create chaos for several
days at the airport.
The World Trade Center Bombing and the Oklahoma City
Bombing – non aviation events with impacts on aviation security
On February 26, 1993, a vehicle-borne improvised explosive device
containing 1,500 pounds of urea nitrate and fuel oil was detonated beneath
Tower One of the World Trade Center. The attack killed six and injured
over 1,000, but the terrorists’ attempt at destroying the WTC was
unsuccessful. The plotter of the attack was Ramzi Yousef, who would
later be part of the Operation Bojinka plot, to down several U.S.
commercial aircraft using liquid based explosives.
On April 19, 1995, at 9:03 a.m., a massive, vehicle-borne improvised
explosive device contained inside a Ryder rental truck detonated in front
of the Murrah Federal Building in Oklahoma City, Oklahoma, killing 168,
including several children who were in a daycare facility in the building.
U.S. citizens Timothy McVeigh and Terry Nichols were both arrested and
tried for the crime. Both were found guilty, and McVeigh was sentenced
to death. He was executed on June 11, 2001. Nichols was found guilty on
federal charges and is serving a life sentence in prison.
Both incidents impacted airport security that year. The FAA would require
the 300-foot rule to be implemented in October 1995 during heightened
security measures. The 300-foot rule prohibits vehicles from being parked
within 300 feet of the terminal building. The distance is based on bomb
blast assessments, most specifically the Oklahoma City-sized bomb, which
ACE – Security
Module 1
Page 22
was a combination of an estimated 4,000 pounds of ammonium nitrate and
fuel oil.
The 300-foot rule has been a source of consternation to airport managers
ever since. Subsequently, some airports have implemented a Bomb
Incident Prevention Plan (BIPP) or other forms of blast analysis in order to
develop strategies for protecting the terminal building and other facilities
affected by the 300-foot rule. Prevention plans generally include
reinforced structures and glazing of the glass on the terminal facility. In
some cases, these actions have resulted in airports having the 300-foot rule
reduced, reclaiming lost parking spaces.
FedEx Flight 705 – Employee Hijack Attempt
In April of 1994, FedEx second officer Auburn Calloway attempted to
hijack Flight 705. Calloway was originally scheduled to be a crewmember
on the flight, but due to crew rest requirements (his crew “timed out”), he
elected to occupy a spare seat in the cargo area.
Calloway, a former Naval Aviator, had recently been called in by airline
management to respond to discrepancies in his flight time. He was also
experiencing several personal issues, including trouble supporting his exwife and children. Upon leaving an insurance policy on his bed, he took
several hammers and a spear gun, loaded them into a guitar case, and
boarded Flight 705. Once en route, Calloway invaded the cockpit and
attempted to take over the flight.
Calloway fought with all three crewmembers while the Captain initiated
aggressive flight maneuvers to keep the hijacker off balance. The captain
was able to successfully land the aircraft, and Calloway was subdued
during the landing; however, all three flight crew members suffered
debilitating injuries, which have since prevented them from flying
commercially again.
There was speculation that Calloway wanted to crash the aircraft and
allow the insurance company to provide the payoff to his ex-wife and
children, but there has also been some speculation that Calloway intended
to crash the aircraft into FedEx headquarters in Memphis, Tennessee.
Calloway was convicted of attempted air piracy and is serving a life
sentence in a federal penitentiary. This case reinforces the need for
management to immediately revoke airport and airline access
privileges for personnel suspected of violating employee policies or the
law.
Air France Flight 8969
The Armed Islamic Group took over Air France Flight 8969 in December
1994 at Algiers. The aircraft flew to Marseille, France, where a group of
GIGN (French commandoes) stormed the aircraft and killed all four
ACE – Security
Module 1
Page 23
hijackers. This incident provides a wealth of information for airport
operators on managing a hijacking.
The hijackers were armed and dressed in the uniforms of the Algerian
presidential police. They boarded the aircraft and began checking
passengers’ passports. Flight attendants were used to this process but
noted that Algerian police were not normally armed during such
inspections.
Using assault rifles, Uzi pistols, and hand grenades, the hijackers took
over the aircraft while it was still on the tarmac. They also placed a
package of dynamite in the cockpit and another in the center of the aircraft
and wired them together. In order to confuse law enforcement snipers,
they took the uniforms of the cabin crew.
The aircraft remained on the ground in Algiers for two days, during which
time, a police officer, an embassy employee and a chef were all killed by
the hijackers, before being allowed to fly to Marseille. However, a total of
63 passengers had been freed during this time, mostly women, young
children and those with medical conditions.
Upon arrival in Marseille, the airport directed the pilot to park in a remote
area. The hijackers ordered more fuel for the plane and rigged it with
explosives, as their true motive was to crash the plane into the Eiffel
Tower. GIGN operatives, dressed as airline catering and service personnel,
inspected the aircraft, determined access points and ensured that those
points were not booby-trapped.
The hijackers requested a press conference, then ordered that the plane be
moved to the base of the tower, which put the tower in danger if the
aircraft exploded. The negotiators were also in the control tower. The
aircraft location was a disadvantage to the GIGN, who quickly reorganized their plans and assaulted the aircraft.
The firefight ensued as the airstairs carrying GIGN forces approached the
aircraft. The hijackers fired through the thin skin of the aircraft fuselage.
The front airstairs were placed too high, initially blocking the door from
coming open. Hundreds of rounds were exchanged, and grenades were
thrown. Snipers could not get a clear shot at the lead hijacker in the
cockpit until the first officer got out of the way. The first officer managed
to jump out the cockpit window, breaking his leg in the fall to the tarmac.
Snipers then shot the lead hijacker.
During the shoot-out, passengers began escaping out the rear exits. The
final hijacker held off GIGN forces for 20 minutes until being killed by
gunfire. Of the 166 passengers that were still on the flight at the time of
the raid, 13 were injured but none were killed. Some GIGN forces were
also injured but none fatally. All four hijackers were killed.
Many lessons were learned from this event. Whenever possible, raids on
aircraft should only be conducted by trained operatives, as were the
ACE – Security
Module 1
Page 24
French GIGN in this case. Also, the aircraft should be kept on the ground.
The aircraft was allowed to takeoff in this situation, as Algieran officials
would not allow French operatives onto Algerian soil and wanted the
airplane out of their country. However, in light of the true intent of the
hijackers, crashing into the Eiffel Tower, and the events of 9/11, keeping a
hijacked aircraft on ground is critically important.
Hijackers used the uniforms of police personnel to bypass security
measures. There have been numerous incidents of theft of TSA uniforms,
and police and airline uniforms are readily available on the open market,
which makes proper credentialing, even of law enforcement personnel,
even more important on an airport. A final lesson to take from this
incident is that not all hijackings end in a Hollywood style shoot out,
where nothing goes wrong for the good guys and everything goes wrong
for the bad guys. The situation continued to change throughout the event
with airport, airline, flight crew, passengers, air traffic control, negotiators
and GIGN forces constantly adjusting their perspectives and tactics.
The Manila Air Plot – Operation Bojoinka
In 1994, Ramzi Yousef, who is associated with the Al Qaeda terrorist
organization, plotted to destroy 12 U.S. airliners on international routes,
using liquid-based explosive devices, smuggled aboard in contact lens
solution containers. This was a lead-in to the second attempted attack on
aviation of this nature, which occurred in August 2006 in London. The
attack itself was part of a larger strategy called Operation Bojoinka.
Bojoinka, which also included an assassination attempt on Pope John Paul
II and President Bill Clinton, as well as an attack on the CIA headquarters
building, used a small general aviation aircraft loaded with explosives.
None of the attacks ultimately succeeded, but the plot does have
interesting similarities to attacks being attempted or discussed today.
Yousef is currently in federal custody serving a life sentence for his role in
the Bojinka plot and the bombing of the WTC in 1993. The 9/11
Commission used Yousef’s tests of airport security as an example of the
inadequacy of current technology, including metal detectors and x-ray
machines to detect components such as those that Yousef planned to use.
The attack also reinforces the need for flight crews to search aircraft
during stopovers when passengers change out.
TWA Flight 800
While not declared an aviation security incident, the crash of TWA 800
did have a significant effect on aviation security policy.
On July 17, 1996, a Boeing 747 departed John F. Kennedy Airport, New
York, bound for Paris, France. It exploded shortly after takeoff, killing all
230 people onboard. Since the explosion took place over water much of
the evidence was lost. Initially, the crash of TWA 800 was thought to
be a terrorist bombing. Later theories included speculation that the
ACE – Security
Module 1
Page 25
aircraft was shot down by a surface-to-air missile. In fact, both theories are
still widely debated by many experts in both the aviation security and
aviation safety industries. Conspiracy theories abound on the Internet, as
well.
The National Transportation Safety Board (NTSB) never determined the
exact cause of the crash but did issue airworthiness directives to examine
the wiring on all 747s. Later, mechanics would discover a fuel leak in a
Boeing 737, and the mechanics drew the conclusion that an electrical arc
onboard TWA 800, a 747, may have triggered the explosion.
What did result from the TWA 800 crash was the White House
Commission on Aviation Safety and Security, commonly referred to as
the “Gore Commission.” President Clinton ordered Vice President Al
Gore to study the issue of aviation security, specifically to enhance the
partnership between the FAA and regulated aviation parties (airlines and
airports), and report back on how to employ the latest technology to detect
explosives and weapons.
Aviation Security and Anti-terrorism Act of 1996
The Gore Commission’s recommendations resulted in the Aviation
Security and Anti-terrorism Act of 1996. The act called for the first
automated passenger-profiling program, known as “CAPPS” (computer
assisted passenger pre-screening) and changes to checked baggage
security procedures.
Part of the profiling system included additional security scrutiny for
passengers who purchase tickets with cash, had their tickets purchased by
another party, or purchased one-way tickets on the same day of their
flight. Some passengers also were selected at random.
The Act also required changes to checked baggage through the
implementation of Explosives Detection Systems (EDS)4 at all Category
X airports.5 The EDS equipment would be used for passengers who had
been profiled under the CAPPS program or for passengers whose bags had
been out of their control between the time they had packed them and
checked them in at the ticket counter.
Additional changes were made to screen carry-on baggage with the
implementation of Explosives Trace Detectors (ETD)6 at all Category X
and Category I7 airports. The Act also required the expansion of K-9
explosives ordinance detection and disposal teams at the nation’s 50
4
EDS devices work like medical CAT scan machines, x-raying each bag and “slicing” certain
questionable areas for analysis by the onboard computer.
5
Category X airports are the largest in the nation and include Los Angeles International, Chicago
O'Hare, Atlanta International, Denver International, JFK, Dallas-Fort Worth and others similarly
sized.
6
ETD uses trace particles or vapors to "sniff" narcotic or explosive elements.
7
Category I airports are the second-largest commercial service airports in the US.
ACE – Security
Module 1
Page 26
largest airports and the creation of fingerprint-based criminal history
background checks.
The regulation also introduced the Access Investigation, whereby
applicants for airport or airline identification media were required to
provide 10 years of employment history. The airport or airline then had to
verify the most recent five years of employment history. If there were
unexplained gaps in the five years, (or the ten) then the employee would
undergo a Criminal History Record Check (CHRC).8 If he or she
cleared this check, airport or airline access media could be issued. The
purpose of the 10-year check was supposed to point out areas of time in
which the applicant may have been out of the country or to determine if
the person had served time in prison. Time spent in school, or owning a
business, which could be proven with transcripts and tax forms,
respectively, counted as “employment.”
The FBI often took two to three months before findings were returned to
the airport. When a CHRC would find that the applicant was guilty of
other crimes that were not included on the disqualification list, such as
burglary or simple assault, the airport was banned from advising the
applicant’s future employer of these convictions, which meant convicted
felons worked at the nation’s airports and airlines.
Other requirements of the 1996 Act were to conduct mandatory aircraft
searches for all international flights, the establishment of an airport
consortium to discuss aviation security issues, performance standards
for screeners, and a requirement that companies and the FAA address
high turnover rates of screening personnel. However, despite the
regulation, no significant changes were made with respect to screening
standards during that time.
The establishment of the airport consortia benefited several major
commercial service airports. The consortia often consisted of airport
management and airport security managers meeting with local Federal
Bureau of Investigation (FBI), Bureau of Alcohol, Tobacco and Firearms
(BATF), FAA security, and other law enforcement agencies to discuss
aviation security issues and develop contingency plans.
The Gore Commission also concluded that attacks on airlines are
attacks on the country, not necessarily the company. This conclusion
would later be used to help justify the creation of the Transportation
Security Administration and the Department of Homeland Security, to
support the argument that security is an inherently governmental function.
Millennium Bomber – Airport Attack
In December of 1999, Ahmed Ressam was arrested at the Port Angeles,
Washington dock when he attempted to smuggle a vehicle-borne
8
Explained in detail in Module 2
ACE – Security
Module 1
Page 27
improvised explosive device (VBIED) through the Customs area. He
intended to set off the device at the International Arrivals Bradley
Terminal Building at Los Angeles International Airport.
He was caught when a suspicious Customs agent, Diana Dean, noticed
that Ressam was acting “hinky.” As inspectors took a closer look at his
vehicle, they noticed several green bags filled with a white powdery
substance.
Although the 300-foot rule was instituted in the 1990s in response to the
Oklahoma City and WTC bombings, Ressam’s attempt demonstrates that
the use of a VBIED against an airport has been considered and attempted.
To this day, the entry lanes to LAX are guarded with armed LAX police
officers that conduct targeted and random searches of vehicles. This
practice is common at Ben Gurion Airport in Israel; however, the practice
has not been adopted at most other U.S. airports, nor is it required by
regulation during normal security conditions.
Problems in Aviation Security Continue
In the 1990s, the FAA’s Red Team, a group of specially trained
operatives who are not subject to standard FAA testing protocols,
repeatedly breached airport and airline security systems across the United
States (Thomas 2003, 58). After numerous failed tests in Frankfurt,
Germany, the FAA ordered the Red Teams to quit testing because none of
the concealed items were ever found. Since the Red Team did not use
standard FAA protocol in its tests, it could not use its findings in civil
enforcement against the airlines or airports (Thomas 2003, pp 58).
ICAO also discussed chemical attacks, particularly after cult members
associated with Aum Shinrikyo released Sarin gas into the Tokyo subway
system, killing 11 and wounding over 5000, in 1995. However, again it
was considered by security agencies that a chemical weapon attack from
an aircraft would be far too complex. A terrorist could more easily
conduct a chemical gas attack inside an airport terminal, a thought that
sent airport security managers at airports such as Atlanta Hartsfield,
Seattle-Tacoma, Denver International, and others that operate
underground train systems, scrambling for contingency plans to respond to
such an attack.
The Airport Security Improvement Act of 2000
Passed just one year before the September 11th attacks, the Act
concentrated on maximizing the use of EDS machines, noting that the
machines that had been deployed were screening fewer bags in a day than
they were designed to screen in an hour. The Act also required the FAA to
enact rulemaking that would hold individuals directly accountable for
noncompliance with access control requirements, issue regulations
requiring airport operators to have a security compliance program that
rewards compliance, and ensure that airports and air carriers provide
ACE – Security
Module 1
Page 28
comprehensive and recurrent training, teaching employees their role in
airport security. The Act also required all employees at Category X and I
airports to undergo the CHRC process.
The legislation reiterated the 1996 legislation by calling for certification of
airline screeners and screening companies, strengthening background
checks and providing a better accounting of airport access media. For
several years, the FAA had been working on a rewrite of FAR Part 107
and was just wrapping up that project in the summer of 2001.
Unfortunately, many of these initiatives were still in the works on
September 11, 2001.
September 11, 2001
On 9/11, at 7:55 a.m., American Airlines Flight 11, a Boeing 767,
departed Boston bound for Los Angeles. It was hijacked and flown into
the North Tower of the World Trade Center, destroying it. At 8:05 a.m.,
United Airlines Flight 93, a Boeing 757, departed Newark bound for San
Francisco was hijacked; however, passengers fought back and the aircraft
crashes into a field in Shanksville, Pennsylvania. At 8:10 a.m. American
Airlines Flight 77, a Boeing 757, departs Washington bound for Los
Angeles. It was hijacked and flown into the Pentagon. At 8:15 a.m. United
Airlines Flight 175, a Boeing 767, departs Boston bound for Los Angeles.
It was hijacked and flown into the South Tower of the World Trade
Center, destroying it.
Everyone onboard all of the flights were killed, with a total death toll
nearing 3,000, including over 300 police and firefighters. The U.S.
government held international terrorist Osama bin Laden and the terrorist
organization Al Qaeda responsible for the attacks.
In the largest aviation terrorist attack in the world, it was discovered that
the hijackers trained at U.S. flight schools.
In 2002, President George W. Bush commissioned The National
Commission on Terrorists Attacks Upon the U.S., also known as the
9/11 Commission. The report outlined both the structure and actions of the
9/11 attacks themselves, provided a broader look into the issues that
contributed to the attacks and provided a series of recommendations for
fixing the aviation security system. The Commission concluded that,
among other failures, the civil aviation did not understand the grave
threat it faced, nor did it adjust its policies and practices to defeat the
threat. Ultimately, while there had been previous attempted hijackings
with the intent of crashing the plane into a ground target in the U.S., this
scenario had not entered into the thinking of aviation security
practitioners.
The hijackers learned how to fly at various flight schools in the United
States. They boarded the aircraft with box cutters and knives, items that
screening policy allowed at the time, and possibly mace or tear gas, items
ACE – Security
Module 1
Page 29
that were not allowed but were commonly missed at security screening
checkpoints. The Al Qaeda terrorist group was held responsible for the
attacks. Led by Osama bin Laden, Al Qaeda had been responsible for
numerous terrorist attacks worldwide, including the truck bombing of the
Khobar Towers at a U.S. Air Force Base in Saudi Arabia and the suicide
bombing of the USS Cole, a Navy cruiser.
The specific details of how the hijackers took over the cockpit are largely
unknown. However, several inferences can be drawn based on the status
of the commercial aviation security system at the time. Cockpit doors were
not reinforced, and in fact were quite flimsy, allowing easy access. With
the pilot-in-command responsible for in-flight security, according to air
carrier security and federal aviation regulations, disturbances in the cabin
often brought one of the flight crew out of the cockpit to handle the
situation. Therefore, another method of entry into the cockpit by the
hijackers could have been to cause a commotion in the cabin area, luring
one of the flight crew to open the cockpit door. The 9/11 Commission
concluded that the hijackers had previously taken the same flights as the
ones they hijacked in order to assess the flight crew procedures as related
to the cockpit (Commission 2004, pp 245).
Two of the terrorists were on CIA watch lists, but the lack of those lists
being shared with the FAA resulted in their movements going unnoticed
on 9/11. Additionally, two of the hijackers were selected for additional
screening under the CAPPS program. However, at the time, CAPPS only
required that their bags accompany them onto the aircraft thus still
enabling the hijackers to board the plane. Without a major hijacking in
several years, the industry was more focused on preventing airline
bombings rather than hijackings. This attitude was demonstrated by
security policies and procedures that focused more on preventing
bombings. Also, at one airport, two of the hijackers set off the walk-thru
metal detectors but a CCTV recording of the subsequent hand wand
process showed the process to be inadequate to finding any prohibited
items.
The public speculated on the ability of the hijackers to be able to pilot
such large commercial service aircraft. All of the hijackers held at least a
Commercial Pilot Certificate, each had over 250 hours of flying time,
and all had spent some simulator time in similarly sized aircraft. While it
may be difficult to take off and land an aircraft, or to fly it during bad
weather, flying en route in good weather and good visibility was within
the capabilities of pilots trained to the level that the 9/11 hijackers were
trained.
In describing the concept of emergency response, the 9/11 Commission
stated:
“Emergency response is a product of preparedness. On the morning of
September 11, 2001, the last best hope for the community of people
ACE – Security
Module 1
Page 30
working in or visiting the World Trade Center rested not with national
policymakers but with private firms and local public servants, especially
the first responders: fire, police, emergency medical service, and building
safety professionals”(Commission 2004, pp 278).
The faster an entity is able to recover from an attack, the less damage there
will be from that attack and the less likely the attack will be repeated due
to its limited impact.
Although the 1993 attack on the WTC had resulted in better evacuation
plans, as well as the installation of radio repeaters throughout the
buildings, there were numerous problems that could have been foreseen
and resolved. First, many in the WTC argued that if there was a fire, a roof
rescue using helicopters could be conducted. This argument was
reinforced in 1993, when a few evacuations took place by roof. Even some
in the NYPD Emergency Services Unit believed that a roof rescue was
part of the plan. However, the roof rescue plan had been removed.
There was not a helipad on the North Tower, and the South Tower helipad
was not certified by the FAA for use. As a result, several citizens
attempted to gain access to the roof but found the doors locked. While
there were police helicopters hovering in an attempt to try a roof rescue
anyway, the intense smoke and lack of visibility, flames, updrafts and
numerous antennas on both of the buildings prevented the helicopters
from landing. The important lesson here is to ensure that the emergency
plans are communicated throughout the agencies that are affected.
Other problems with response were caused by interagency conflicts
between the New York Police Department, the Fire Department of New
York, and the Port Authority Police Department, which was responsible
for law enforcement and emergency response throughout the towers.
Chain of command issues existed between the agencies, along with a
general inability of the agencies to communicate with each other due to
different radio systems. Adding to the communications problems were
jammed 911 phone lines and the fact that dispatchers who were fielding
the calls were also not aware of the proper evacuation plans for the towers.
Some dispatchers were advising individuals to go to the roof and await a
roof rescue by helicopter.
Some companies, such as Morgan Stanley, evacuated immediately, an
act that saved the lives of their employees. Other companies,
particularly in the South Tower before it had been struck by United 175,
had initially evacuated but then returned to their offices when it was
discovered that it was the North Tower that had been hit, a fatal decision
for many of them. Another challenge was that the security system
command center for the South Tower was located in the North Tower.
Many people died in the South Tower while waiting for overcrowded
elevators and were unable to access stairwells due to a lock-release order
to the building’s access control system. The software that would override
ACE – Security
Module 1
Page 31
the lock-release order was located in the North Tower and was destroyed
when the first plane hit.
Despite many failures in the response to 9/11, there were plenty of
successes. In less than 20 minutes, over 1,000 responders descended on
the Towers and initiated the largest rescue effort, ever. Thousands of lives
were saved due to the mitigation and preparedness actions taken after the
first WTC bombing and the dedication of police, fire and civilian
personnel. Casualties were also limited at the Pentagon due to the rapid
and coordinated response of police, fire and military personnel and
mitigation measures, such as safety glazing in the windows of the
Pentagon, installed after the Oklahoma City bombing.
Ultimately, the 9/11 Commission pointed to six specific weaknesses in the
aviation security system:
•
•
•
•
•
A pre-screening process that focused on detecting potential
aircraft bombers and not potential hijackers.
Sloppy checkpoint screening and permissive rules
regarding small knives.
A lack of in-flight security measures, such as air marshals
and reinforced cockpit doors.
An industry-wide strategy of complying with hijackers in a
non-confrontational manner.
A lack of protocols and capabilities for executing a
coordinated Federal Aviation Administration (FAA) and
military response to multiple hijackings and suicidal
hijackers (Elias 2005, pp 1).
Many of these weaknesses were addressed in the Aviation and
Transportation Security Act of 2001.
ACE – Security
Module 1
Page 32
The Aviation Security System since 9/11
Introduction
With few significant changes, the aviation security system stayed
essentially the same between the Gore Commission in 1996 and the
terrorist attacks of 2001. The terrorist attacks of September 11th triggered
the most sweeping changes in security in the history of aviation. Privately
contracted screeners were replaced by federal employees at almost all
commercial service airports, cockpit doors were reinforced, air marshals
put back on aircraft, and some pilots started carrying guns. But the most
significant change resulting from September 11th was the new perception
of hijackings by the United States and the world.
Hijackings were no longer considered a political act, with the strategy
of getting the negotiators to talk to hijackers as a way to peacefully resolve
the situation. As a result of the September 11th hijackings, aircraft were
now turned into weapons of mass destruction capable of leveling the
tallest buildings in the world and killing thousands of people at one time.
This change in perception was obvious in several air rage incidents taking
place after September 11th, in which passengers intervened to protect the
cockpit. One of the most significant cases of passenger intervention took
place in December of 2001, when several passengers prevented suicide
bomber Richard Reid from igniting an improvised explosive device in his
shoe.
The Aviation and Transportation Security Act of 2001
Passed on November 19, 2001, ATSA created sweeping changes in both
airport and airline security. The ATSA created the position of
Undersecretary for Transportation Security, transferring authority for
all civil aviation security functions to the TSA.
ATSA also created the position of Federal Security Director for every
commercial service airport.9 Prior to 9/11, the FAA’s Civil Aviation
Security Field Office (CASFO) handled security inspections and
enforcement at commercial service airports. The Federal Security Act of
1996 created the position of Federal Security Manager (FSM) at the
Category X airports to oversee many of the security functions. This
arrangement occasionally created conflict with the local CASFO’s “Cat X
agent,” who was also there to oversee enforcement and compliance with
the airport security plan, federal regulations and aircraft security
equipment.
9
While the legislation called for an FSD at each commercial service airport, it was soon
discovered this requiement was financially and operationally impractical. In some cases, the FSDs
are assigned to more than one commercial service airport. There is an FSD designated to oversee
security at each commercial service airport; however, not all airports have their FSD on site.
ACE – Security
Module 1
Page 33
The Federal Security Director for each airport is responsible for
overseeing baggage and passenger screening and for ensuring that airports
meet regulatory requirements. The FSD approves the Airport Security
Program and works with the airport operator on the implementation of
Security Directives and federally mandated security programs, such as
behavior detection, travel document checking and random anti-terrorism
measures.
ATSA brought Federal Air Marshals (FAM) back to the airways. The air
marshal program began in the 1970s; however, throughout the ‘80s and
‘90s the program continued to reduce its numbers, and by 9/11, only
consisted of about 33 agents, mostly operating on high-risk international
flights.
Airport perimeter security was addressed in ATSA and required airports to
develop procedures or methods to screen all personnel and goods
entering the secure area of an airport. This requirement included
establishing pilot programs to test biometric technology for access control
and developing security awareness programs for airport and airline
personnel.
Most significantly, ATSA federalized the screening workforce and
established training and employment guidelines for screening personnel.
ATSA required 100% screening of checked baggage by December 31,
2002, which was a significant requirement in terms of money and the
ability to manufacture such equipment. While all TSA screening personnel
were to be deployed by November 19, 2002, a deadline the TSA met,
meeting the checked baggage requirement was a bit more difficult, and the
definition of “screened” was interpreted to include Positive Passenger Bag
Match, in order to meet this deadline.
The requirement to screen passengers and baggage before allowing the
individual or the item on board an aircraft is placed on the aircraft
operator, not on the airport. However, the airports must be properly
equipped and designed to operate such screening devices.
At most commercial service airports within the U.S., passenger and
baggage screening is conducted by the TSA; however, it is still the
responsibility of the aircraft operator to disallow any person or item from
being placed on their aircraft that has not undergone the appropriate
screening process. This practice helps ensure that aircraft operators
conducting operations at foreign destinations continue to comply with the
same security standards they are required to comply with in the U.S.
At the time ATSA was passed, much of the EDS equipment was not
available for deployment, nor did the manufacturer’s production rate of
the equipment allow airports to meet the federal deadline of December 31,
2002, for 100% screening of checked baggage. In fact, by the end of 2002,
only a couple of airports could meet this requirement. ATSA allowed
ACE – Security
Module 1
Page 34
aircraft operators to not only use positive passenger bag matching,
but also K-9 teams, manual search, or other technology to meet the
100% checked bag requirement. To date, this “allowance” is still in
place until all commercial service airports are able to implement EDS
technology.
ATSA also addressed air cargo issues, most notably cargo on
commercial passenger airliners, but some new regulations did apply to the
“all-cargo” carriers such as UPS and FedEx. ATSA called for procedures
to be implemented as soon as practicable to screen cargo carried aboard
commercial airliners. In 2006, rulemaking for air cargo operators was
passed and was implemented in 2007.
ATSA made it illegal to assault airport screening personnel or anyone
involved with aviation security, including the flight crew. While assault
is illegal in all 50 states, ATSA made it a crime, prosecutable in federal
court.
ATSA called for the development of technology to detect or neutralize
chemical and biological weapons.
To help fund the security measures, a $2.50 per passenger fee was also
added for all passengers flying commercially.
The 300-foot went from being a contingency plan to the rule. Airports
were not allowed to keep vehicles parked within 300 feet of their terminal
building, unless the airport operator could demonstrate to the TSA that
safeguards were in place.
Criminal history record checks finally got their long needed overhaul.
Now, all employees who are granted unescorted access to the airfield are
required to undergo a CHRC. Even previously “grandfathered” employees
are required to undergo the fingerprint-based checks. Computer and
fingerprint machines in airports now allow quicker access to the FBI
databases.
One loophole in ATSA with regard to the criminal history background
check system is the lack of a requirement to verify the identity of the
individual applying for unescorted access. With false documents, an
applicant who does not have a criminal history, but may be an illegal alien
or a terrorist, can apply for an airport identification badge, clear the
background check, and be issued unescorted access media. Several
airports across the United States had hundreds of employees arrested by
the Immigration and Naturalization Service for being illegal aliens. These
employees had unescorted access to the airfield and secured areas. Many
airports now pay private contractors to verify the identity of applicants.
However, this procedure is not funded by the federal government. The
TSA issued a Security Directive subsequent to 9/11 to require airports to
verify the identity of badge applicants.
ACE – Security
Module 1
Page 35
Other requirements within ATSA include the requirement to reinforce
cockpit doors on commercial passenger airliners. Many commercial
aircraft today also have enlarged viewing holes and, in some cases, CCTV
video of the cabin.
General aviation security was addressed with regards to rules on
commercial charter or cargo flights on aircraft exceeding 12,500 pounds.
ATSA required passenger manifests on international flights coming into
the U.S. to be transmitted to TSA within 15 minutes of departure, but in
2007, new legislation was passed requiring the aircraft operator to transmit
the passenger manifest prior to departure.
Key Issues
ATSA also initiated several new programs including some designed to test
concepts and others designed to streamline the security processes,
including the Screening Partnership Program (SPP), Trusted Traveler, the
Transportation Worker Identification Credential (TWIC), and Secure
Flight.
THE SCREENING PARTNERSHIP PROGRAM (AKA OPT-OUT)
ATSA required the TSA to establish pilot projects at up to five airports
where employees of qualified private companies under federal oversight
would perform screening. The law requires those contract screeners to
meet all the requirements applicable to federal screeners. The TSA
calls this the Screening Partnership Program, but it is commonly referred
to in industry as “opt-out.” The initial opt-out airports are:
• San Francisco, Category X.
• Kansas City International, Category 1.
• Greater Rochester International (New York), Category II
• Jackson Hole Airport (Wyoming), Category III
• Tupelo Airport (Mississippi), Category IV
•
In each of the above instances, with the exception of Jackson Hole, the
airports are assigned contractors that the TSA has hired. In Jackson Hole,
designated and trained airport employees conduct the screening. All U.S.
commercial service airports have been able to apply for Opt-Out since
November 19, 2004. The total number of opt-out airports as of 2011 is 17;
however, several other airports have had applications in to the TSA for
quite some time. In 2011, the TSA made a controversial decision to reject
existing and future opt-out applications unless there was a clear benefit to
the TSA.
Congressional response has not been favorable to this decision, and the
issue is likely to continue as a topic of debate.
Opt-out allows an Airport Operator to have screening carried out by the
screening personnel of a qualified private screening company, provided
ACE – Security
Module 1
Page 36
that the level of provided screening services and protection is equal to or
greater than that provided by federal government personnel and that
the screening is provided by companies owned and controlled by U.S.
citizens. The federal government, however, maintains supervisory control
over screening personnel and performs the actual acquisition of the
contractor. The TSA notes that airport operators may be allowed to
participate in the selection process and potentially manage the private
screening company if the airport itself applies to be the screening
company (such as in the case of Jackson Hole, WY).
On April 22, 2004, the TSA released a report on performance of the pilot
program. The report used three criteria: security effectiveness, cost, and
customer and stakeholder impact. The report concluded that the
effectiveness of screening was equal to, and, in one case above the average
level, of federalized airports, and that costs were not significantly
different. When measuring customer and stakeholder impact, the results
were mixed. Some passengers felt safer with the federalized screeners and
passenger wait times at the opt-out airports were slightly lower at the
larger airports. There was not enough data available at the smaller airports
to support any conclusion on wait times.
The difference in the opt-out private screening program versus the
privatized screening companies used prior to 9/11 is that the new program
is funded and managed by the federal government, not the airlines.
Additionally, screeners must now meet certain minimum training and
performance standards, receive higher compensation and have direct
federal oversight. The use of private screening companies is common at
airports throughout the European Union and at Israel’s Ben Gurion
International Airport.
Some advantages of opt-out are that it allows airports to streamline the
hiring process of screeners (the federal process is quite lengthy and
collective bargaining is approved for TSA screeners, which some feel may
make the process of hiring and firing employees longer) and the airport
operator could conceivably use airport funds to increase staffing levels,
thus reducing passenger wait times – still the subject of debate.
Additionally, contractors have significant discretion in operational and
management decisions, including overhead, materials, recruiting,
compliance, and scheduling. The TSA’s major goals for the opt-out
program are security, customer service, competitive costs, and a privatepublic sector partnership. Contractors generally experience a lower rate of
workers compensation claims and can often cover the same
responsibilities with up to 20% less staff.
Initially, one critical area the TSA did not address is liability should a
weapon or explosive get through a private screening checkpoint and that
neglect result in death and/or destruction to an aircraft; however, this is
now changed. Under Section 44920 of Title 49, United States Code,
ACE – Security
Module 1
Page 37
airport operators are not liable for any claims for damages filed in State or
Federal court (including a claim for compensatory, punitive, contributory,
or indemnity damages) relating to the Airport Operator's decision to
submit an application to the Secretary of Homeland Security under
subsection or the decision not to submit an application; or from any act of
negligence, gross negligence, or intentional wrongdoing by a qualified
private screening company or any of its employees in any case in which
the qualified private screening company is acting under a contract entered
into with the Secretary of Homeland Security or the Secretary's designee;
or employees of the Federal Government providing passenger and
property security screening services at the airport.
Also helping to provide legal protection is the The Support Anti-terrorism
by Fostering Effective Technologies Act of 2002 (SAFETY Act), which
provides legal liability protections for providers of Qualified AntiTerrorism Technologies – whether they are products or services, which
include private screening companies. The protections extend to their
clients:the U.S. government and, potentially, the airport operator.
The role and responsibility of the FSD does not change with a privatized
screening company, but how the FSD carries out their duties does change.
With a federal work force, the FSD has direct supervision and control over
the screening workforce and the implementation of administrative
policies. With a contractor providing the workforce, the FSD has
responsibility for overall security but not direct control over the
administration of the workforce.
In 2010, the implementation of an aggressive form of pat-down at the
screening checkpoints by screening personnel renewed calls for privatized
security. However, many of the politicians who sought the private
companies were under the mistaken belief that a private company would
not use the aggressive pat-down process. This is not true. While the
personnel at the checkpoint may change with a private contractor, the
approved screening procedures do not.
TRUSTED TRAVELER
ASTA called for a Trusted Traveler program, which was rapidly renamed
Registered Traveler (RT) by the TSA, which rendered the original intent
of the program ineffectual. Trusted Traveler was to allow certain
passengers the opportunity to bypass certain or all screening processes in
exchange for telling the government more about themselves. TSA balked
at this program and approved the Registered Traveler program instead,
which only provides front-of-the-security-line privileges. RT participants
must undergo a Security Threat Assessment (STA)10 in order to confirm
that they do not pose or are not suspected of posing a threat to
10
The STA includes checking each applicant's identity against terrorist-related, law enforcement, and
immigration databases that TSA maintains or uses. RT applicants who receive an approved STA result may
become program participants (Source: http://www.tsa.gov/what_we_do/rt/index.shtm)
ACE – Security
Module 1
Page 38
transportation or national security and provide biometrics data (fingerprint
and retina scan).
The RT program is market-driven and offered by the private sector, with
TSA largely playing a facilitating role.
Some airports have expanded the RT privileges to include:
•
Modified airport configuration to minimize RT passenger
wait times, including dedicated or integrated lines and
lanes – bypassing even the frequent flyer lines.
•
Enhanced customer service for RT participants, such as
divesting assistance, concierge service for luggage, and
parking privileges.
•
Discounts for service or concessions (at certain airports).
Up until 2011, the TSA had been adamant that RT status would not result
in a lesser standard of screening for participants. However, TSA is now
reassessing the true “Trusted Traveler” concept, but, as of this writing, it is
still in its early stages.
SECURE FLIGHT (FORMERLY CAPPS II)
In 1996, the Gore Commission recommended the first passenger profiling
system, known as the Computer Assisted Passenger Prescreening System
(CAPPS). In January 2003, TSA proposed a new system called CAPPS II,
which would have required passengers to provide airlines with a large
amount of personal information to be checked against various government
databases, including the No Fly and Selectee list. The program was
massaged and ultimately became known as Secure Flight.
Under Secure Flight, TSA takes over responsibility for checking airline
passengers’ names against terrorist watch lists. TSA has now taken over
responsibility for comparing Passenger Name Record (PNR) information
of domestic air passengers to a greatly expanded list of known or
suspected terrorists in the Terrorist Screening Center (TSC) database.
Secure Flight is intended to:
•
•
•
•
Prevent individuals on the No Fly List from boarding an
aircraft.
Identify individuals on the Selectee List for enhanced
screening.
Facilitate passenger air travel by providing fair, equitable
and consistent matching process across all aircraft
operators.
Protect individuals' privacy.
ACE – Security
Module 1
Page 39
Along with Secure Flight, the Department of Homeland Security manages
the Advance Passenger Information System (APIS), which allows DHS
to collect passenger manifest information for international flights
departing from or arriving in the United States prior to boarding.
TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC)
The TWIC program provides a tamper-resistant, biometric credential to
transportation workers requiring unescorted access to secure areas of
transportation facilities – it is expected that this program will migrate to
the aviation community within a few years. In addition to TWIC being
included into ATSA, in 2004, President George W. Bush signed executive
policy Homeland Security Presidential Directive-12 (HSPD-12), which
directed the agencies to unify the government's identification badge
systems through a new standard.
The concept of the TWIC program is to improve security by establishing a
system-wide common credential, used across all transportation modes, for
all personnel requiring unescorted physical and/or logical access to secure
areas of the transportation system. TSA has plans to implement a systemwide common architecture to meet current and future, physical and logical
access requirements for all personnel, of all transportation modes, in all
TSA areas of responsibility. The goal is to have one standardized
credential that is universally recognized and accepted across the DOT, and
that can be used locally using a scalable architecture. The card will be
multi-modal and used in aviation, maritime, trucking, and other surface
transportation.
Presently, most individuals working at an airport or other transportation
facility must have an access media card (access/ID), which is encoded to
allow them access to certain areas. These cards serve as both identification
credential and access key. Challenges in implementing TWIC into the
aviation program are the large number of proprietary access control
systems at hundreds of U.S. commercial airports and the ability, by
regulation, of the airport operator to restrict access to the security areas of
the airfield. Some early TWIC cardholders claim that their credential
provides them access to any airfield, which is wrong on two accounts. The
TWIC is not an access card, only an identification card, and airport
operators through Title 49 CFR Part 1542 (Airport Security) and through
Title 14 CFR Part 139 (Public Protection) have the right to decide who can
access the Security Areas.
An additional challenge is that airport operators want to know the level of
background check that has been completed before allowing an individual
access to their airport. TWIC presently does not allow airport operators to
see the records of their cardholders.
Along with TWIC, ATSA called for the establishment of a uniform
identification system for law enforcement officers traveling with their
ACE – Security
Module 1
Page 40
firearms. This program has not moved forward independently since the
passage of ATSA and may ultimately be wrapped up in the TWIC.
ACE – Security
Module 1
Page 41
Aviation Security Events since 9/11
Shortly after 9/11, in November 2001, the Nuclear Regulatory
Commission temporarily ordered the closure of 500 general aviation
airports across the U.S., when they believed that intelligence indicated a
possible plot to attack nuclear facilities, using aircraft. The NRC ordered
the closure of any airport within a three-statue mile radius of a nuclear
facility. Commercial service airports were not affected.
Then, on December 22, 2001, Richard Reid, a British citizen and convert
to Islam, was arrested for trying to light a fuse to set off explosives
concealed in his sneakers while on American Airlines Flight 63 from Paris
to Miami. Reid was initially identified as a potential risk by contract
airport security screeners conducting routine passenger security
questioning. Reid was already considered suspicious, as he was a British
citizen, traveling on a Passport issued in Brussels while flying from France
to the United States. These inconsistencies, particularly the Brussels
passport issued to a citizen of the U.K., resulted in Reid being referred to
Paris police, who questioned and released him.
A flight attendant noticed Reid’s unusual behavior, and she, along with
other passengers, subdued him until the plane made an emergency landing
in Boston. Two doctors onboard injected him with sedatives. Reid
admitted he is a disciple of Osama bin Laden and allegedly was trained at
an Al Qaeda terrorist training camp. He pleaded guilty and is serving a life
sentence for air piracy.
In 2002 and 2003, two surface-to-air missile attacks on commercial
airliners made headlines. In November 2002, a pair of surface-to-air
missiles was fired at an El Al charter flight as it departed Mombassa,
Kenya, both missing their target. In the other incident, a DHL Airbus 300
cargo aircraft was hit with a surface-to-air missile as it departed Baghdad
International Airport. The wing caught fire; however, the aircraft landed
safely. In this incident, terrorists fired two SA-7’s at the aircraft, but only
one hit the plane. A French TV crew filmed the incident.
LAX Airport Shooting – Terminal Attack
On July 4, 2002, a gunman opened fire near the El Al ticket counter at Los
Angeles International Airport, in the Bradley International Arrivals Hall.
The attack killed two people and wounded four others. The gunman was
shot and killed by an El Al security agent.
An El Al official stated they had received prior intelligence of a potential
attack of this nature. The shooter, Hesham Mohamed Hadayet, was armed
with a .45 caliber handgun, a 9 mm handgun and a knife with a six-inch
blade. He did not have to pass through screening to reach the ticket
counters and was therefore able to enter the public areas and commence
his attacks without warning.
ACE – Security
Module 1
Page 42
In interviews conducted with LAX, it was learned that authorities, and
LAX police officers with submachine guns in a tactical response
formation, responded to the scene just moments after the El Al agent
killed Hadayet. This detail is important to note, as many airport police
officers are still ill-equipped to handle heavily armed gunman. Some
airports such as LAX and Boston/Logan have equipped some of their
police officers with submachine guns, providing their officers the
capability of an adequate response to similarly armed attackers.
Russian Airliner Bombings
In August of 2004, suicide bombers destroyed two Russian airliners. Both
bombers boarded the aircraft at Russia’s Domodedovo International
Airport. They were able to bypass some security processes, such as not
having the proper passports, by bribing airline ticketing personnel. It is
assumed that they were able to pass through the screening checkpoint
wearing the explosives as Russia’s walk-thru metal detectors, (similar to
those used in the U.S.) do not detect explosives, only metal. Over 89
passengers and crewmembers died in the bombings. Both female bombers
concealed the explosives in their braziers.
Shortly thereafter, the TSA initiated a pat-down procedure for passengers
requiring secondary screening, as well as initiated the deployment of
Portal Trace Detectors (PTDs). The PTD is slightly larger than a metal
detector, but it can detect trace elements of explosives on an individual.
These were in limited use throughout the country but have been replaced
by body imaging technology.
Liquid Bomb Plot – Again
Although the plot to blow up 11 to 12 U.S. bound commercial airliners
was originally planned in 1994 by Ramzi Yousef, the same plot,
uncovered in August 2006, seemed to catch many in the government and
the general public by surprise. The plot, uncovered by United Kingdom
MI-5 internal intelligence authorities, was similar to the Yousef plot in
that it was intended for individuals possessing small amounts of liquidbased explosives to board commercial aircraft departing the U.K. for the
United States. The explosives would be smuggled in small containers,
such as contact lens solution bottles.
After the attack was uncovered and thwarted, the resulting impacts on the
aviation industry and the flying public are still being felt. Initially, U.K.
authorities banned travelers from virtually all carry-on baggage including
laptop computers, cell phones, iPods and other personal music devices,
and nearly all liquids, including bottled water. In the United States, liquids
in excess of three ounces were banned from being carried on-board unless
the items were purchased after the passenger cleared the screening
checkpoint.
ACE – Security
Module 1
Page 43
While some individuals who are clearly less educated on the aviation
industry publicly speculated that this incident should require that
passengers not be allowed to even have carry-on bags, the complete ban
on these items was lifted after a few weeks in the U.K. and restrictions
were relaxed a bit in the U.S., as well. During the ban, many passengers
reported broken or stolen laptops, cell phones and other electronic
equipment, and millions of dollars in cosmetics and other liquids were
thrown away at security screening checkpoints.
The primary challenge during the ban was that current screening
technology is unable to detect liquid-based explosives. Although
passengers are restricted to bottles containing three ounces or less of
liquids (everything else has to be checked), there is considerable debate
about the ability of a terrorist to either 1) take on several bottles each
containing three ounces of a liquid-based explosive or 2) work with a
accessory to combine liquids and construct an explosive device once on
the aircraft.
Restricting carry-on baggage, particularly laptops for business travelers
and on ocean transit flights, limits the ability of the individual to work
while on the flight. Forcing expensive electronic equipment, particularly
laptop computers, into checked baggage opens the door for widespread
and expensive theft, property damage and identity theft and corporate
espionage if the information on the laptops is stolen and sold, not to
mention the potential invasion of privacy rights. Since a large share of
airline revenue is made from the business traveler, it is important to
accommodate their business activities, or they will seek other options,
such as private charter operations, or telephone conferencing.
Another challenge created by such policies occurs when travelers are
forced to check cell phones. If so, they are unable to use such devices
while in the boarding area prior to the flight. While this primarily affects
business travelers, it could also be a security of flight issue, as the use of
cell phones on United 93 allowed passengers to be informed of the
hijacker’s intentions, enabling them to fight back.
The rapid implementation of the liquid ban resulted in thousands of people
jamming airport ticketing and screening lines, creating a tempting target
for a suicide bomber using a personal improvised explosive device or a
VBIED. The liquid bomb plot highlights a key area that must be
addressed within aviation security, which is the need to keep up with
developing threats and technologies (for example, no technology was
being used that could detect liquid-based explosives, although the attempt
first occurred 11 years earlier).
Attacks on Aviation Continue into the 2010’s
In late 2006, there was a plot uncovered to shoot down an El Al airliner
in Geneva. This discovery resulted in El Al installing counter-MANPAD
(C-MANPAD) systems on their aircraft. These systems are similar to
ACE – Security
Module 1
Page 44
those used on military aircraft and rely on the dispensing of flares to trick
a MANPAD into following the flare instead of the aircraft.
In late 2006 and early 2007, several attacks occurred on the airport in
Madrid, Spain, a suicide bomber attempted attack at the airport in
Islamabad, Pakistan, and a vehicle-borne improvised explosive device
attack occurred on the terminal building in Glasgow, Scotland.
Also in 2007, the Implementing the Recommendations of the 9/11
Commission Act was passed, which mandated the inspection of 100% of
all air cargo, and created Fusion Centers, which serve as intelligence focal
points for homeland security related information.
In 2008, TSA personnel stopped an individual with explosive-making
materials in his backpack at the Orlando International Airport.
In 2009, Najibullah Zazi was captured while plotting an attack on the New
York City subway system. He was a shuttle bus driver at Denver
International Airport.
On December 25, 2009, Umar Farouk Abdulmutallab attempted to ignite a
bomb hidden in his underwear on board Northwest Airlines Flight 253.
Passengers and flight attendants prevented him from completing the attack
and was taken into custody on six criminal counts, including attempted use
of a weapon of mass destruction and the attempted murder of 289 people.
In 2010, al Qaeda in the Middle East took responsibility for placing two
bombs in ink printer cartridges and shipping them via air cargo. This plot
renewed a focus on both al Qaeda’s attacks on the U.S. and the world in
general, and accelerated air cargo security measures. Additionally, one of
the leaders of al Qaeda in the Middle East, Anwar Al-Awlaki, is becoming
a propaganda specialist of sorts with YouTube broadcasts and via his
magazine, Inspire. The Yemen air cargo attack was featured in an issue of
Inspire, discussing how the bombs were constructed and bragging that the
attack cost just about $4,000 for al Qaeda, but is resulting in billions of
dollars being spent by the U.S. and other countries to try to prevent future
such attacks. This is inline with one of the strategies of al Qaeda, which is
the economic weakening of the U.S.
On January 24, 2011, an apparent suicide bomber detonated their
explosives in the public terminal area of Moscow’s Domodedovo Airport,
killing over 30 people and injuring more than 150. The attacks in airport
public areas have increased debate over how to protect the airport as a
whole instead of a singular focus on the screening checkpoint.
On average, about five to six hijackings, along with numerous incidents of
air rage and airport attacks occur worldwide every year.
ACE – Security
Module 1
Page 45
Summary
Up until 9/11, many of the aviation security measures were established as
a result of a new form of attack or repeated attacks. When hijackings and
bombings increased beyond the public’s ability to tolerate them, the use of
air marshals and passenger and carry-on baggage screening were
implemented.
In the 1980s, as international terrorism focused more on aviation, and
employees became perpetrators and facilitators of air security incidents,
the aviation industry increased regulations on airport access control and
credentialing. Throughout the 1990s, moderate changes were made;
however, with few exceptions, air terrorism had virtually ceased to exist in
the U.S.
The 9/11 attacks brought the U.S. back to the forefront of air terrorism,
and the Transportation Security Administration was created along with the
passage of the Aviation and Transportation Security Act of 2001.
Throughout the 2000’s and into the 2010’s, attacks on the United States,
specifically on aviation, continue to occur. Our industry remains
challenged by having to make tough decisions about where to put our
money and resources to prevent the next attack.
Television, books and movies have provided an unending stream of ideas
for criminals and terrorists. As far back as the classic movies, “Airport,”
“Airport 75,” “77” and “79,” “Die Hard 2,” and others, Hollywood has
discovered dozens of ways to put the aviation security system to the test.
In fact, the specific strategy of hijacking an aircraft and crashing into the
nation’s Capital was explored in the plot of Tom Clancy’s book Debt of
Honor. Instead of looking at these books and movies as a source for
terrorist ideas, security professionals might view them as potential future
threats to be mitigated, prepared for, or defended against.
ACE – Security
Module 1
Page 46
The Aviation Security System: Agencies, Entities
and Responsibilities
The Department of Homeland Security
The Homeland Security Act of 2002 created the Department of Homeland
Security within the Executive Branch. Several governmental agencies
were relocated or consolidated under DHS including the U.S. Coast
Guard, TSA, the U.S. Secret Service, and the Federal Emergency
Management Agency. Former U.S. agencies such as the U.S. Border
Patrol, U.S. Customs and the U.S. Immigration and Naturalization Service
were blended into DHS and reorganized under Immigration and Customs
Enforcement (ICE) and Customs and Border Protection (CPB). The
primary mission of DHS is to: (1) help prevent terrorist attacks in the U.S.,
(2) reduce the country’s vulnerability to terrorism, and (3) assist in
recovery after an attack.
The Transportation Security Administration
Created by the Aviation and Transportation Security Act of 2001, the TSA
does not just oversee aviation security functions. The agency also oversees
maritime and land security, and certain security intelligence and
operations policy. The context of this document will address the aviation
security function.
The TSA’s organizational chart has changed frequently since the
organization’s inception. For the latest organizational chart and structure
refer to www.tsa.gov.
Of importance to aviation security practitioners with respect to the TSA is
that the agency is primarily responsible for aviation security at the federal
level. The TSA provides staffing for the screening checkpoints and
baggage screening and ensures compliance with federal transportation
security regulations. Within each commercial service airport, the TSA also
serves in an oversight capacity and an operational capacity through the
activities of the Federal Security Director and his staff.
TSA also is involved in numerous other programs, including:
The Federal Air Marshal Program – hiring, training, and operations of
FAMs.
National Explosives Detection Canine Team Program – started in 1970
by the FAA to train and certify canines and their handlers.
Training and certification of Federal Flight Deck Officers (FFDO) – the
program to provide firearms and self defense training to pilots of
commercial air carriers.
ACE – Security
Module 1
Page 47
Crew Member Self Defense Training Program – a basic self defense
awareness program combined with hands on training at a local community
college.
Armed Security Officers Program – provides armed security officers for
use on general aviation flights arriving and departing from Reagan
National Airport.
Office of Training and Development - provides rapidly deployable,
national level resources regarding all aspects of Chemical, Biological,
Radiological, Nuclear and Explosives (CBRNE).
The Federal Security Director
At the local level, most airports and airline operators work directly with
the Federal Security Director (FSD) appointed to their airport. FSD duties
include:
•
•
•
Service functions, including the screening of passengers,
checked baggage and cargo.
Regulatory functions, including airport and aircraft
operator compliance inspections and approvals of airport
security programs, oversight of the canine program and
internal investigations.
Administrative functions, including staffing, budget and
finance personnel, human resource personnel, engineering,
procurement, public relations officers and stakeholder
managers.
The Federal Security Director is responsible for providing day-to-day
operational direction for federal security functions at the nation’s
commercial service airports. The FSD is the local ranking TSA authority
at each airport and is responsible for the leadership and coordination of
TSA security activities, including tactical planning, execution, and
operating management for coordinated security services. The job
description for the FSD lists the following responsibilities:
Organizing and implementing the Federal Security Crisis Management
Response Plan.
Implementation, performance and enhancement of security and screening
standards for airport employees and passengers.
Oversight of passenger, baggage and air cargo security screening.
Airport security risk assessments.
Security technology implementation and maintenance within established
guidelines.
Crisis management.
ACE – Security
Module 1
Page 48
Data and communications network protection and recovery and its impacts
on federal security responsibilities.
Employee security awareness training.
Supervision of federal law enforcement activities within the purview of
the FSD and TSA.
Coordination of federal, state, and local emergency services and law
enforcement.
FSDs are assigned to an airport, or in the case of smaller airports, a group
of airports.
The FSD is assisted by two to three deputies, an Assistant Federal Security
Director (AFSD) for Regulatory Inspection and an Assistant Federal
Security Director for Screening. In some cases, an additional deputy for
Law Enforcement may also be included.
The AFSD – Regulatory Inspection is the principal advisor to the FSD on
all matters concerning enforcement and compliance with airport and
aircraft operator security programs and Security Directives. They plan,
coordinate, and manage an inspection program for compliance by airlines
and other airport tenants with airport and aviation security policies and
regulations. They oversee a staff of Transportation Security Inspectors
(TSIs) responsible for conducting comprehensive assessments and
investigations of airport and air carriers to:
•
•
•
•
•
•
Determine security position, monitor compliance with
applicable transportation security policies, regulations and
agreements.
Identify potential problem areas or deviations from
prescribed standards.
Ensure overall adequacy, effectiveness and efficiency of
security posture.
Provide technical guidance to airports and air carriers on
the development and/or modification of a large number of
security plans to ensure compliance with regulatory
requirements.
Determine when enforcement action should be initiated and
recommend the type of action and level of penalty.
Review and analyze assessment reports and testing results
with special attention given to identifying unusual trends or
airport/air carrier actions that appear to have potential for
developing a security problem.
ACE – Security
Module 1
Page 49
The AFSD of Screening manages the security screening staff, including
checkpoint supervisors, manages screening operations, and administers
regulations and policies pertaining to TSA’s aviation security program.
Screeners are known as Transportation Security Officers (TSO), whose
authority is only in relation to screening, not other airport operator
functions; TSOs do not have inspection authority over airport or aircraft
operator security programs, nor are they certified law enforcement
officers. Some TSOs serve as Behavior Detection Officers (BDO), while
others work in the Travel Document Check area of the screening
checkpoint.
The AFSD for Law Enforcement is one of the few, true law enforcement
agents within the TSA (beside air marshals). AFSD-LEOs coordinate with
local and state law enforcement for protection of the airport, as well as
manage the Bomb Appraisal Officer (BAO) program.
The third division overseen by the FSD is administrative, often comprised
of stakeholder managers who coordinate with airport and aircraft operators
on security issues, public relations officers, finance, human resource and
other administrative personnel.
Federal Air Marshals
On September 11, 2001, the Federal Air Marshal program consisted of
about 30 FAMs flying mostly international flights. Today, thousands of air
marshals fly on tens of thousands of flights each month on a wide variety
of routes and aircraft. The Department of Homeland Security is naturally
reluctant to release the total number of air marshals it currently employs. It
would be a matter of simple math for terrorists to figure out the odds of air
marshals being on a particular aircraft if they knew the total number of
marshals employed by the agency.
Federal Air Marshals disguise themselves as ordinary travelers to maintain
a low profile and blend in with passengers aboard mostly high-risk routes
on U.S. carriers. They are authorized to carry firearms and work in teams
to prevent hijackings. Federal Air Marshals are trained in the Federal Law
Enforcement Training Center in Glynco, Georgia, and are badged and
credentialed federal agents. Aircraft operator requirements for carrying
Federal Air Marshals are covered in section 1544 of Transportation
Security Regulations. Air marshals must meet the highest standards for
marksmanship, for obvious reasons, and are there to protect the flight deck
from intrusion. Many times, they may not intervene in a passenger
disruption, until or unless the safety of the flight is jeopardized. In one
recent case, an individual exited an aircraft lavatory and joked to an air
marshal (unknowingly) that he was constructing a bomb in the lav. The
flight immediately landed in Denver, Colorado, and the individual was
taken into custody.
ACE – Security
Module 1
Page 50
The Canine and Explosives Program
The TSA National Explosives Detection Canine Program (NEDCP)
exists to deter and detect the introduction of explosive devices into the
transportation system. In addition, bomb threats cause disruption of air,
land and sea commerce, and pose an unacceptable danger to the traveling
public and should be resolved quickly. Explosives detection canine teams
are a proven, reliable resource to detect explosives and are a key
component in a balanced counter-sabotage program. The use of highly
trained explosives detection canine teams is also a proven deterrent to
terrorism directed towards transportation systems and provides a timely
and mobile response support to facilities, rail stations, airports, passenger
terminals, seaports and surface carriers. A more complete description of
the canine and explosives program is covered in a subsequent module.
Explosives Unit
The Explosives Unit provides an expert, rapidly deployable, national level
resource to conduct all aspects of transportation explosives security,
including: countermeasures development, testing and evaluation of
explosives effects and detection systems; explosives incident management,
technical support to DOT and other transportation security personnel;
Weapons of Mass Destruction Program Management, post-blast
investigations where a bombing is suspected; Least Risk Bomb Location
(LRBL) assistance to pilots with suspected Improvised Explosive Devices
(IEDs) in flight, and explosives security surveys and other technical
explosives assistance. Missions are performed for both U.S. and foreign
governments. A more complete description of the Explosives Unit is
covered in a subsequent module.
Screening Passengers by Observation Techniques (SPOT)
The SPOT uses Transportation Security Officers (i.e., screening
personnel) to conduct behavior observation and analysis techniques in the
public areas of the airport terminal building. The program is designed to
spot suspicious behavior and is in use by law enforcement and other
security services throughout the world (TSA 2007).
“TSA's SPOT-trained security officers are screening travelers for
involuntary physical and physiological reactions that people exhibit in
response to a fear of being discovered. TSA recognizes that an individual
exhibiting some of these behaviors does not automatically mean a person
has terrorist or criminal intent. SPOT does, however, help our security
officers focus appropriate resources on determining if an individual
presents a higher risk or if his/her behavior has a non-threatening origin.
Individuals exhibiting specific observable behaviors may be referred for
additional screening at the checkpoint to include a handwanding, limited
pat down and physical inspection of one's carry-on baggage. Referrals are
based on specific observed behaviors only, not on one's appearance, race,
ethnicity or religion” (TSA 2007).
ACE – Security
Module 1
Page 51
While SPOT has yet (as of August 2007) to catch a terrorist as he or she
attempts an attack, the program has captured several criminals or
individuals wanted by the law. Behavior pattern assessment is widely used
at many international airports.
Aviation Direct Access Screening Program (ADASP)
The Aviation Direct Access Screening Program (TSA 2007) focuses on
screening employees who already are entering the Sterile or Security
Areas of the airport. TSA personnel will dispatch to certain locations in
the airport (commonly locations where airport and airline employees and
airport tenants are moving from an airfield Security Area into the Sterile
Area) and conduct an identification check and handwand the employee. In
some cases, personnel conducting ADASP checks will perform them at a
perimeter gate where vehicles can access the Security Areas of the airfield.
The program, started in the fall of 2006, deploys officers
anywhere, anytime to inspect workers, their property and
vehicles. These officers ensure workers follow proper
access procedures when entering secure areas, display the
appropriate credentials, and do not possess items unrelated
to their work that may pose a security threat. Outside the
airport, random inspections include scrutinizing delivery
trucks or personal vehicles at access gates. Inside the
airport, roving patrols screen workers with handheld metal
detectors and examine property for threat items that are
unrelated to their work. Temporary checkpoints are also
created beyond access points to ensure access protocols
are followed and workers are screened before entering the
terminal. These measures do not impact wait times at
security checkpoints (TSA 2007)
It is important for ADASP personnel to coordinate with airport operations
and law enforcement agencies in case they need support, such as in the
case of an unruly or uncooperative employee, or if they find a threat item,
which ADASP teams have on several occasions. However, so far, in no
instance has there been proof that the threat item was intended to be used
in a terrorist attack on aviation.
Other Government Agencies
Commercial service airports, both large and small, can encounter a variety
of other government agencies, each of which has a role in the national
airspace system and some directly or indirectly in aviation security. These
other government agencies consist of Immigration, Agriculture and
ACE – Security
Module 1
Page 52
Customs inspectors, along with U.S. Post Office and FBI personnel. The
FBI often designates at least one agent to handle aviation security issues at
each field office. Additionally, FBI personnel respond to hijackings, bomb
threats and security incidents on airports.
Airport Security
Washington, D.C. may set the policy for aviation security, but it is the
local airport operator for who ensures those policies are implemented,
followed and enforced.
The Airport Security Coordinator
Another requirement of ATSA is that each commercial service airport
must have at least one Airport Security Coordinator on duty and available
24 hours a day, seven days a week. Since this is an impossible task for one
person, many airports have opted to have one primary Airport Security
Coordinator, as well as several other personnel trained to act in the Airport
Security Coordinator capacity as backup (in the event of vacations, travel,
sickness, etc.).
The Airport Security Coordinator is responsible for drafting the Airport
Security Program (ASP), which must be approved by the TSA. The
function of the ASP is outlined in more detail in the module on airport
security. The ASC must also be trained to be an ASC using the curriculum
guidelines set forth by the TSA (and outlined in Part 1542).
The ASC is responsible for conducting background checks on individuals
with unescorted access to the airfield, managing the access control system,
granting access to airlines, contractors, tenants, and vendors, conducting
security training for employees who receive an airport identification
badge, managing the security guards, and/or overseeing security
enforcement on the airfield and in the terminal building.
The ASC works with the police or sheriff’s department assigned to the
airport and other federal, state and local law enforcement agencies to
design and implement security contingency plans for bomb threats,
hijackings, airport attacks and other threats. The ASC is also responsible
for managing the airport’s K-9 bomb dog detection program.
Law Enforcement
Law enforcement agencies at an airport are responsible for enforcing laws,
just as they would be on the streets of any city or county. Additionally,
they have the responsibility to respond to screening checkpoints and
provide immediate response to security situations.
Law enforcement agencies also manage any K-9 bomb dog programs,
conduct VIP handling and are usually the first responders to any major
security incident.
ACE – Security
Module 1
Page 53
K-9 bomb detection dogs are provided by the TSA. The dogs and their
handlers are trained by the TSA, but it is the local agency’s responsibility
to provide the police officer, pay their salary, and take care of the bomb
detection dog once it is trained. Some of the expenses are reimbursed by
the TSA.
The police chief or sheriff must work closely with the ASC to provide
protection for the traveling public and affect a mutually beneficial
response to airport incidents.
Airport Operations
At larger airports, a separate division, commonly referred to as airport
operations, handles airfield inspections, security escorts, and various other
duties, but these personnel are often the first line of response and/or
detection of security problems.
Since the ASC is often an administrator role, at most airports it is the
responsibility of airport operations personnel to coordinate security guard,
law enforcement, and fire rescue response to airfield situations. Therefore,
the ASC should coordinate closely with airport operations personnel.
At small airports, airport maintenance personnel often double in the
operations role; at very small commercial service airports the operations
function may be conducted by the airport manager.
The most important point regarding airport security is the ASC drafts the
ASP. This plan is essentially a promise to the TSA, explaining how
security regulations will be met at each particular airport. The ASP is
unique to each airport, and once the TSA approves the ASP, the airport
must follow it.
Air Carrier Security
Screening was the majority of the air carrier security function prior to 9/11
and was moved to the domain of the federal government with the
enactment of ATSA. However, there are still several key air carrier
security functions.
The Airline Station Manager
At each commercial service airport, one individual is designated as the
station manager for the airline. This individual is responsible for the safe
and secure travel of the passengers on the airline, and also addresses
numerous administrative tasks like human resources, budgeting, and other
business functions.
Whenever a security incident involves a commercial aircraft, the station
manager is most often the sole representative of the airline to the airport,
the TSA, and/or law enforcement agencies. The station manager is often
the only one with the authority to make decisions on behalf of the airline.
ACE – Security
Module 1
Page 54
Aircraft Operator Security Coordinator (AOSC)
One individual is designated by each aircraft operator to be the primary
point of contact for the TSA. The AOSC is similar in role and function to
the Airport Security Coordinator and is responsible for the airline’s
compliance with federal regulations. Often, large aircraft operators will
designate additional AOSCs, one each for their major hubs.
Ground Security Coordinator (GSC)
The ground security coordinator is an airline employee who has been
trained by the airline to coordinate the security functions of each flight.
The GSC works with the airline station manager and the flight crew. In
large commercial service airports, many airline gate agent personnel are
trained as ground security coordinators. Additional information about the
role of the ground security coordinator and the role of air carrier security
is covered in a later module.
In-Flight Security Coordinator
The in-flight security coordinator is the pilot-in-command (PIC) of a
particular aircraft. The PIC has final responsibility for the safety of the
flight.
Corporate Security and Loss Prevention
Air carriers employ corporate security personnel who are responsible for
receiving and disseminating information from the Transportation Security
Administration, in addition to other risk and loss prevention duties.
Corporate security personnel also oversee the security training of flight
crews and ground personnel.
Human resource personnel often take care of ensuring that fingerprintbased CHRCs are completed. However, the AOSC is ultimately
responsible for ensuring these checks are properly conducted.
ACE – Security
Module 1
Page 55
Industry Organizations
A number of industry organizations influence aviation security policy:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
American Association of Airport Executives
Air Line Pilots Association
Air Transport Association
Airport Law Enforcement Agencies Network
Airports Council International – North America
Airline Pilots Association
Allied Pilots Association
Association of Flight Attendants
National Association of State Aviation Officials
Coalition of Airline Pilots Associations
National Air Carrier Association
National Air Transportation Association
National Business Aviation Association
Regional Airline Association
Many of these organizations speak through the TSA’s Aviation Security
Advisory Committee (ASAC). Other organizations are added or removed
from the committee depending on the issue. As an example, when the
ASAC considered general aviation airport security guidelines,
organizations such as the General Aviation Manufacturers Association, the
National Air Transport Association and the U.S. Parachute Association
were part of the committee.
Summary
The TSA employs Federal Security Directors to oversee security at each
commercial service airport, most specifically the screening function. Each
airport has its own Airport Security Coordinator who primarily controls
access to the airfield, background checks and the badging and training of
personnel.
The ASC drafts the Airport Security Program, which is an explanation of
how federal regulations will be followed and met at the airport. Local law
enforcement agencies, airport operations and maintenance personnel are
often integral to the fulfillment of the ASP – being in the airfield, they are
the so-called “tip of the spear.”
Air carriers continue to serve security roles through their station manager,
ground security coordinators and pilots.
Industry trade associations represent various interests throughout the
aviation system including airport operators, the airlines, business aircraft
operators and general aviation aircraft owners and pilots.
ACE – Security
Module 1
Page 56
References
AirDisaster.com. (2007). "Special Report: Pacific Southwest Airlines
Flight
1771."
Retrieved
8/20/07,
2007,
from
http://www.airdisaster.com/special/special-pa1771.shtml.
Commission (2004). The 9/11 Commission Report. Washington DC.
Elias, B. (2005). Aviation Security-Related Findings and
Recommendations of the 9/11 Commission. C. R. Service, Library of
Congress: 20.
Rumerman, J. (2007). "U.S. Centennial of Flight Commission."
Retrieved
8/20/07,
2007,
from
http://www.centennialofflight.gov/essay/Government_Role/security/
POL18.htm.
Thomas, A. (2003). Aviation Insecurity. New York: Prometheus Books.
TSA. (2007). "Screening Passengers by Observation Techniques (SPOT)."
Retrieved
9-7-07,
2007,
from
http://www.tsa.gov/what_we_do/layers/spot/index.shtm.
TSA. (2007). "TSA Enhances Security With Employee Screening."
Retrieved
9-7-07,
2007,
from
http://www.tsa.gov/what_we_do/layers/employee_screening.shtm.
TSA. (2007). "VIPR Teams Enhance Security at Major Local
Transportation Facilities." Retrieved 9-7-07, 2007.
Wallis, R. (1993). Combating Air Terrorism. New York: Brassey's.
ACE – Security
Module 1
Page 57
Download