Recent Airport Perimeter Breaches

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Numerous perimeter security breach incidents have been reported in an era of heightened airport security. In 2012, a murder suspect breached the perimeter fence at a small Utah airport and crashed an aircraft before shooting himself. In the same year a jet skier climbed over the John F. Kennedy (JFK) international airport perimeter security fence after his skier stalled. On February 26, 2013 robbers bust through the Brussels airport perimeter fence in two vehicles disguised in law enforcement lights and colors. The breach was motivated by the robbery of diamonds worth 50 million exposed airport perimeter security concerns around the world airports.

Introduction

The perimeter of an airport constitutes areas that border roads, rural pathways, coastlines, waterways, urban areas, wildlife reserves and other boundaries. The average perimeter size of a U.S. midsize airport is approximately 15 miles long. The area size poses serious security challenges to airport operators providing perimeter security. Enhanced perimeter security program is therefore vital for the protection and security of airport operations.

Every airport is concerned with terrorist threats. However, the threats are usually perceived to be high inside the passenger terminal in a bid to prevent terrorists from boarding aircrafts. A lot of resources have therefore been directed to this section of the airport. Perimeter security is critical for the security of facilities, infrastructure, and strategic airport facilities is critical for aviation security. Security agencies recognize the importance of perimeter security of the airport in protecting intruders from sabotaging airport infrastructure. They however fail to provide adequate resources and technology still lags behind.

Most airport perimeters protections mostly comprise of a physical fence, cameras, and occasional security patrols by airport police and volunteers. This is because the Transportation Security Administration (TSA) does not require airports to maintain fulltime surveillance of perimeters fences. In small airport perimeter security fences are sometimes non-existence or are just six feet high with no intrusion prevention devices while in many major airports surveillance beams and cameras secure the perimeter.

TSA’s Role in Perimeter Security

Perimeter security poses a major concern to airports and TSA but funding has been minimal. After the September 2001 terror attacks, the U.S. government provided resources to improve passenger terminal security with the aim of preventing terrorists from boarding aircrafts. The government recognized the need to upgrade airport perimeter security but failed to avail funds to support upgrades. The lack of funding has therefore made airport perimeter security a risk to aviation.

TSA’s role in perimeter security is restricted to enforcement. TSA provides regulations for screening or inspecting individuals, goods, property, vehicles and other equipment before they enter into any secured areas of the airport. These security access regulations against unauthorized persons have significantly reduced opportunities for criminal violence and sabotage. TSA also requires security access programs to be developed by vendors and airport operators for employees with direct access to aircrafts and airfield. This is aimed at preventing insider attacks.

TSA views perimeter security as a shared responsibility between federal, state and local government. Unlike checkpoint security, which is carried out exclusively by the TSA, perimeter security is dependent on manpower and resources provided by the airport operator, state and local governments. Law enforcement, state and local government, and airport personnel play a major role in carrying out perimeter security. TSA works in consultation with these entities to provide security to secured areas of an airport and to address issues ranging from criminal violence to national security concerns.

To ensure that airport operators are in compliance of TSA regulations and airport security programs TSA assigns transportation security inspectors to provide an oversight. The oversight ensures that airports are capable of mitigating potential security risks associated with perimeter security and also provides feedback on areas that need improvement.

TSA requires airports to establish access control and worker identification systems to control access to secure areas. Implementing these security measures is costly and complex especially at larger airports. The size of the airport determines the system to be implemented. For example, large airports utilize complex information technology systems with network capabilities due to number of employees and numerous access points. Small airport utilize basic systems because of the small number of employees and access control points.

The TSA requires that all individuals, goods, properties, vehicles and other equipment that access secure area at an airport be screened and inspected at the using the same standards utilized for passengers and baggage. Extensive background checks are also required for individuals accessing secured areas of the airport. Table 1 below highlights TSA requirements for commercial airport access controls and perimeter security.

Table 1

TSA Requirements for Perimeter Security, Access Controls, and Airport Worker Security:

Assessing and testing compliance with access control requirements on an ongoing basis and annual reporting on the level of compliance.

Assessing the effectiveness of penalties and ensuring airport compliance with security procedures.

Implementing other enforcement actions as appropriate when airports are found to not be in compliance with security requirements.

Recommending to airport operators commercially available measures or procedures to prevents unauthorized access, including a review of emerging technologies and a deployment strategy for available technologies at all category X airports.

Establishing pilot programs at airports to evaluate technologies that include biometric, for access control and security programs.

Developing a plan to provide technical support and financial assistance to small and medium size airports for enhancing security.

Performing criminal history background checks and threat assessment tests to all employees and applicants for positions requiring unescorted access to secured areas.

Development of security awareness training for all airport and airline employees.

Development of TSA approved security programs for vendors with direct access to the airfield and aircraft.

Screening and inspection of all persons, vehicles, equipment, goods, and property entering secured areas of commercial passenger airports.

Source: Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism

Perimeter Security Improvements and Challenges

Since 2004 TSA has taken numerous actions to strengthen airport perimeter security and access control. In 2007, TSA developed security programs to counteract vulnerability of airports to insider attacks (Goverment Accounting Office, 2011). This included the implementation of the random worker screening program which requires workers to display credentials and prohibited possession of certain items when entering secured areas. The expansion of background checks requirements for all airport employees. The checks now include name based checks, employment checks criminal background checks and renewal of airport identification badges every 2 years. TSA also developed new security standards such as biometric access controls to strengthen perimeter and access control security.

Challenges however, still exist to ensure that comprehensive perimeter security is maintained. The failure by TSA to conduct vulnerability assessments to identify gaps in perimeter screening led to the Government Accountability Office (GAO) raising concerns about perimeter security at airports across the country. In an aviation security report issued in 2011, GAO noted that TSA had failed to implement a national strategy to address perimeter security.

Airport operators are primarily responsible for perimeter security programs and TSA role thus remains that of an enforcer. TSA ensures that the airport security programs are in compliance with federal standards. TSA also conducts inspections to enhance security and mitigate risks that concern perimeter security. These include joint vulnerability assessments, special emphasis inspections, and testing access control processes at airports.

Unfortunately by 2011 TSA had not conducted comprehensive risk assessment based threats, vulnerabilities and consequences associated with perimeter security. TSA had also not conducted vulnerability risk assessment for 87 percent of the 450 airports under its regulation. In its own defense, TSA argued that it has developed a vulnerability risk assessment strategy but had not seen the need to assess airport vulnerabilities nationwide.

In 2010, following recommendations from GAO DHS included the assessment of airport perimeter and access control risk as part of a comprehensive assessment for the transportation industry. This included a variety of risk based scenarios related to airport perimeter security. The assessment however, failed to include scenarios based on potential risks associated with airport insider attacks.

Styles of Perimeter Security

Surveillance Technology

Recently there has been increased interest in the use of video and electronic surveillance technology to provide perimeter security. In a program funded by the airport improvement program (AIP), the national safe skies alliance worked in partnership with airports have conducted testing and operational evaluations of security technologies to enhance perimeter security (Airports Council International).

Airport surveillance technologies include intrusion detection systems such as sensors, motion detectors, and video surveillance. These systems are monitored from a remote central location and security agents are sent to investigate disturbances. Surveillance systems are costly to install and monitoring these systems is often labor intensive. Large airports spend millions of dollars on surveillance equipment to provide comprehensive perimeter security.

Infrared sensors and thermal imaging cameras have become the technology of choice in perimeter security. This is because thermal imaging has considerable range capability and has proven to be reliable and efficient. High end long range cameras have a range capability of up to 9 miles and can cost up to $100,000. To ensure cost efficiency less costly short range cameras can be positioned strategically along the perimeter fence while long range thermal cameras can be positioned in remote areas of the airport to monitor unauthorized access or movement.

Monitoring surveillance equipment has always been handled by human operators from a remote facility. This has presents a lot of human factor challenges. These include lack of attention, distraction, fatigue, inadequate staffing, and failure to consider limitations in human perception and performance capabilities. Computer vision technology is used to overcome these challenges. The system automatically detects motion and tracks and identifies intrusions and unauthorized activities within the airport perimeter. The technology then uses human intervention to assess detected threat.

The ground surveillance radar which is primarily used by air traffic controllers to monitor ground movements of aircrafts and airport vehicles can be used for security purposes. The surveillance information provided by the system data can be used to help detect individuals or vehicles in unauthorized airport operation areas. The use of ground vehicle tracking systems, such as RFID and GPS trackers, can be used to provide situational awareness to security personnel by detecting unauthorized movement of vehicles within the airport.

The amount of data collected by security monitoring systems can be overwhelming for human operators charged with detecting security threats. Some level of multi sensor integration capability is needed to assimilate the data collected from the surveillance equipment (Elias, 2010). System integration can be used to pool and compare data from the various systems and provide aggregated information to security personnel.

Patrolling the Airport Perimeter

Since time in memorial security patrols along the perimeter have served as the primary means of intrusion determent. Today airport perimeter patrols still remain an integral part of airport security. Frequent patrols along the perimeter have proven to be effective in detecting and prohibiting intrusion. The patrols are also effective in deterring unauthorized access, activity, crime and terrorist acts. Patrols at most airports are usually carried out by airport police, airport security personnel or contract security firms.

Due to unique security challenges some airports have adopted unique patrol methods to ensure perimeter security. The Houston George H.W. Bush international (IAH) airport in Texas enlisted the use of horseback riders to patrol large portions of the airfield. The patrols address challenges posed by the size of the airport. The airport is on an 11,000 acre property of which 3,000 acres is heavily wooded.

The patrol program was created in 2003 and is referred to as IAH airport Rangers Equestrian Volunteer program. Volunteer applicants have to undergo background checks in order to participate in the program. Once approved the volunteers are issued access identification allowing them access to certain remote areas of the airport. For their participation volunteers get to enjoy free access to an extensive network of trails and prairies within the airport perimeter for riding (Elias, 2010). It is mandatory that volunteers carry cell phones and alert law enforcement on any suspicious activity.

The Boston Logan international (BOS) airport also has a volunteer patrol system. BOS is surrounded by water and the best clamming areas are around the airport’s secured areas. These two factors pose a unique security challenge. Following the 9/11 attacks the, the airport operator, restricted access to the clamming areas which resulted to criticism that the restrictions were negatively impacting on the livelihood of the clammers.

Massport bowed to public pressure and changed the security approach allowing some clammers back. It also enlisted them to aid in airport perimeter security. The clammers have to undergo background criminal history check and are issued identification badges. They are required to carry cell phones and are required to report suspicious activity to airport security.

Conclusion

Every airport is concerned with security threats that can result from perimeter breaches. The enhancement of perimeter security at airport is therefore critical in protecting continued smooth of airport operations. Airport perimeters are mostly protected by man-made barriers such as chain link fences or natural barriers such as bodies of water, cliffs and other unique topographical features. The use of video and electronic surveillance technology for perimeter has increased recently. The new technologies are providing opportunities for better surveillance while mitigating negative human factors.

Most airport perimeters security mostly comprise of a fence, cameras, motion sensors and other devices, and occasional patrols by airport security or law enforcement personnel. The assessment of the latest technologies should be carried out to ensure their effectiveness in detecting and mitigating breaches. A hybrid system that uses patrols and technology should be encouraged by airports. This is because technology is efficient in detecting intrusion whereas human intervention is equally important in assessing the threat.

Research and development of new technology to enhance perimeter security should be intensified. The assessment of the latest technologies should be carried out to ensure their effectiveness in detecting and mitigating breaches. Due to unavailability of funding low cost, efficient and effective technology should be researched to make it affordable for small and medium size airports.

Proponents of patrols contend that human patrols are more effective than technology in ensuring perimeter security. Many airports have implemented unique security patrols based on unique features of their location. Community initiatives like the Houston IAH equestrian volunteer and the BOS clammers are boosting perimeter security while benefiting the communities’ around the airport. The initiatives also provide public relation opportunities for airport through incorporating the community as part of its security detail.

TSA should continue to strengthen regulations aimed at preventing and detecting unauthorized entry, presence and movement of individuals and vehicles in secure part of the airport. The extensive background checks, security awareness, and training of all airport workers in detecting and reporting suspicious activity are important in preventing insider attacks.

Airport perimeter security has improved significantly but much needs to be done to enhance it. TSA in partnership with airports should continually evaluate existing requirements and systems. These evaluations should include threat assessment, vulnerability risks, and consequences.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now