Tsas Role In Perimeter Security

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Introduction

Numerous perimeter security breach incidents have been reported in an era of heightened airport security. In 2012, a murder suspect breached the perimeter fence at a small Utah airport and crashed an aircraft before shooting himself. In the same year a jet skier climbed over the John F. Kennedy (JFK) international airport perimeter security fence after his skier stalled. On February 26, 2013 robbers bust through the Brussels airport perimeter fence in two vehicles disguised in law enforcement lights and colors. The breach was motivated by the robbery of diamonds worth 50 million exposed airport perimeter security concerns around the world airports.

The perimeter of an airport borders roads, rural pathways, coastlines, waterways, urban areas, wildlife reserves and other boarders. The average perimeter size of a U.S. midsize airport is 15 miles long. The size poses a challenge to many a challenge in providing security to most airport operators. The enhancement of perimeter security at airport is vital to protecting continued smooth of airport operations.

Every airport is concerned with terrorist threats. However, the threats are usually perceived to be high inside the passenger terminal and a lot of resources have been directed to this area in a bid to prevent terrorists from boarding aircrafts. It is important that security agencies recognize the importance of perimeter security of the airport in protecting intruders from sabotaging airport infrastructure. This is because the security of facilities, infrastructure, and strategic airport facilities is critical for aviation security.

Most airport perimeters protections mostly comprise of a physical fence, cameras, and occasional security patrols by airport police and volunteers. This is because the Transportation Security Administration (TSA) does not require airports to maintain fulltime surveillance of perimeters fences. In small airport perimeter security fences are sometimes non-existence or are just six feet high with no razor wire or intrusion prevention devices while many major airports rely on surveillance beams and cameras to secure their perimeter.

TSA’s Role in Perimeter Security

Perimeter security poses a major concern to airports and TSA but funding has been minimal. After the September 2001 terror attacks, the U.S. government provided resources to improve passenger terminal security with the aim of preventing terrorists from boarding aircrafts. The government recognized the need to upgrade airport perimeter security but has failed to provide funds available to support upgrades. The lack of funding has made airport perimeter security a risk to aviation.

TSA provides regulations for screening or inspecting individuals, goods, property, vehicles and other equipment before they enter into any secured areas of the airport. The security access regulations against unauthorized persons have significantly reduced opportunities for criminal violence and sabotage. TSA also requires security access programs to be developed by vendors with direct access to aircrafts and airfield to prevent insider attacks.

According to TSA perimeter security is a shared responsibility among federal, state and local government personnel. This is because unlike checkpoint security which is carried out exclusively by the TSA perimeter security is dependent on resources provided by the airport operator. Law enforcement personnel and, state or local personnel play a major role in carrying out perimeter security. TSA thus works in consultation with these entities to deploy personnel to secured areas of an airport to address issues ranging from criminal violence to national security concerns.

To determine whether airport operators are complying with TSA regulations and the airport security program, TSA deploys transportation security inspectors to provide an oversight of the airport’s compliance status. The oversight provides an insight as to whether the airport is ensuring mitigation of potential aviation risks associated with perimeter security.

TSA requires airports to establish access control and worker identification systems to control access to secure areas. Implementing these security measures is costly and complex especially at larger airports. However, they are able to gain efficiencies due to their size when implementing the programs. The size of the airport determines the system to implement. For example, due to the size, number of employees and numerous access points, large airports utilize complex information technology systems with network capabilities because it is cost effective while small airport utilize basic systems because of the small number of employees and access control points.

The TSA requires that all individuals, goods, properties, vehicles and other equipment that access secure area at an airport be screened and inspected at the using the same standards utilized for passengers and baggage. Extensive background checks are also required for individuals accessing secured areas of the airport. Table 1 below highlights TSA requirements for commercial airport access controls and perimeter security.

Table 1

TSA Requirements for Perimeter Security, Access Controls, and Airport Worker Security:

Assessing and testing compliance with access control requirements on an ongoing basis and annual reporting on the level of compliance.

Assessing the effectiveness of penalties and ensuring airport compliance with security procedures.

Implementing other enforcement actions as appropriate when airports are found to not be in compliance with security requirements.

Recommending to airport operators commercially available measures or procedures to prevents unauthorized access, including a review of emerging technologies and a deployment strategy for available technologies at all category X airports.

Establishing pilot programs at airports to evaluate technologies that include biometric, for access control and security programs.

Developing a plan to provide technical support and financial assistance to small and medium size airports for enhancing security.

Performing criminal history background checks and threat assessment tests to all employees and applicants for positions requiring unescorted access to secured areas.

Airports and airlines are required to develop security awareness training for employees.

Vendors with direct access to the airfield and aircraft are required to develop TSA approved security programs.

Requires screening and inspection of all persons, vehicles, equipment, goods, and property entering secured areas of commercial passenger airports.

Source: Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism

Perimeter Security Improvements and Challenges

Since 2004 TSA has taken numerous actions to strengthen airport perimeter security and access control. In 2007, TSA developed security programs to counteract vulnerability of airports to insider attacks. This included the implementation of the random worker screening program which requires workers to display credentials and prohibited possession of certain items when entering secured areas. The expansion of background checks requirements for all airport employees. The checks now include name based checks, employment checks criminal background checks and renewal of airport identification badges every 2 years. TSA also developed new security standards such as biometric access controls to strengthen perimeter and access control security.

Challenges however still exist to ensure that comprehensive perimeter security is maintained. The failure by TSA to conduct vulnerability assessments to identify gaps in perimeter screening led to the Government Accountability Office (GAO) raising concerns about perimeter security at airports across the country. In an aviation security report issued in 2011, GAO noted that TSA had failed to implement a national strategy to address perimeter security.

Airport operators are primarily responsible for perimeter security programs and TSA role thus remains that of an enforcer. They ensure that the airport security programs are in compliance with federal standards. TSA also conducts inspections to enhance security and mitigate risks that concern perimeter security. These include joint vulnerability assessments, special emphasis inspections, and testing access control processes at airports.

By 2011 TSA had still not conducted comprehensive risk assessment based threats, vulnerabilities and consequences associated with perimeter security.TSA had also not conducted vulnerability risk assessment for 87 percent of the 450 airports that are regulated by the TSA. In its own defense TSA argues that it has developed a vulnerability risk assessment strategy but has not evaluated a need to assess airport vulnerabilities nationwide.

Following GAO recommendations, DHS included an assessment of airport perimeter and access control risk in 2010 as part of a comprehensive assessment for the transportation industry. This included a variety of risk based scenarios related to airport perimeter security. The assessment has however failed to include scenarios based on potential risks associated with airport insider attacks.

Perimeter Surveillance Technology

Airport perimeters are mostly protected by man-made barriers such as chain link fences or natural barriers such as bodies of water, cliffs and other unique topographical features. Recently there has been increased interest in setting up video and electronic surveillance capabilities for perimeter security. In a program funded by the airport improvement program (AIP) the National Safe Skies Alliance which is working in partnership with airports to conduct testing and operational evaluations of security technologies that would enhance perimeter security.

Airport surveillance technologies intrusion detection systems include sensors, motion detectors, and video surveillance. These systems are monitored from a remote central location and security agents are sent to investigate disturbances. Large airports have spent millions of dollars on comprehensive perimeter security. This is because surveillance systems are costly to install and monitoring these systems is often labor intensive.

Infrared sensors and thermal imaging cameras have become the technology of choice in perimeter security. Thermal imaging has considerable range capability and has proven to be reliable and efficient. High end long range cameras have a range capability of up to 9 miles and can cost $100,000 per equipment. The short range capable cameras are less costly. To ensure cost efficiency of the system short range cameras can be positioned strategically along the perimeter fence while long range thermal cameras can be positioned in remote areas of the airport to monitor unauthorized access or movement.

Monitoring surveillance equipment has always been handled by human operators from a remote facility. This has presented a lot of human factor challenges. The challenges include missing potential threats due to lack of attention, distraction, fatigue, inadequate staffing, and failure to consider limitations in human perception and performance capabilities. Computer vision technology can be used to overcome these challenges. The system automatically detects motion and tracks and identifies intrusions and unauthorized activities within then airport perimeter. The technology is however limited in threat assessment and still requires human intervention.

The ground surveillance radar is primarily used by air traffic controllers to monitor ground movements of aircrafts and airport vehicles to prevent possible incursions or collisions. However, the information provided by the system can be used for security purposes. The surveillance data can be used to help detect individuals or vehicles in unauthorized airport operation areas.

The use of ground vehicle tracking systems, such as RFID and GPS trackers, can be used to provide situational awareness to security personnel on the movement of authorized vehicles within the airport. The system can help detect unauthorized movement of vehicles that are not positively identified as well suspicious movement of authorized vehicles.

The amount of data collected by security monitoring systems can be overwhelming for human operators charged with detecting security threats. Some level of multi sensor integration capability is needed to assimilate the data collected from the surveillance equipment (Elias, 2010). System integration can be used to pool and compare data from the various systems and provide aggregated information to security personnel.

Patrolling the Airport Perimeter

Security patrols along the perimeter have served as the primary means of intrusion determent. Airport perimeter patrols still remain an integral part of airport security. Frequent patrols along the perimeter have proven to be effective in detecting and prohibiting intrusion. The patrols are also effective in deterring unauthorized access, activity, crime and terrorist acts. Proponents of patrols contend that human patrols are more effective than technology in ensuring perimeter security. Patrols at most airports are usually carried out by airport police, airport security personnel or contract security firms.

Due to their unique security challenges some airports have adopted unique patrol methods to ensure perimeter security. The Houston George H.W. Bush international (IAH) airport in Texas enlisted the use of horseback riders to patrol large portions of the airfield. The patrols address the challenge posed by the size of the airport. The airport is on an 11,000 acre property with 3,000 acres of these being heavily wooded.

The patrol program referred to as the IAH airport Rangers Equestrian Volunteer program and was created in 2003. Applicants undergo background checks in order to participate in the program. Once approved the volunteers are issued access identification allowing them access to certain remote areas of the airport. The volunteers get to enjoy access to an extensive network of trails and prairies within the airport perimeter for riding. (Elias, 2010). They are required to carry cell phones and alert law enforcement on any suspicious activity.

The Boston Logan international (BOS) airport is surrounded by water which poses a unique security challenge. The best clamming areas also happen to be around the airport’s secured areas. Following the 9/11 attacks the airport restricted access to these areas which resulted to criticism that the restrictions were impacting negatively on the livelihood of the clammers.

The airport operator, Massport, changed the security approach and allowed some clammers back and enlisted them to aid in airport perimeter security. The clammers undergo background criminal history check and are issued identification badges. They are required to carry cell phones and are required to report suspicious activity to airport security.

Conclusion

The enhancement of perimeter security at airport is vital to protecting continued smooth of airport operations. Most airport perimeters mostly comprise of a fence, cameras, motion sensors and other devices, and occasional patrols by airport security or law enforcement personnel.

TSA regulations are aimed at preventing and detecting an authorized entry, presence and movement of individuals and vehicles in secure airport areas. The extensive background checks, security awareness, and training of all airport workers in detecting and reporting suspicious activity is important in insuring perimeter security. Many airports have implemented additional security measures based on unique features of their location. This includes community initiatives like the Houston IAH equestrian volunteer and the BOS clammers. Research and development of new technology to enhance perimeter security should be intensified. Low cost technology should be evaluated to further enhance perimeter security. Airport perimeter security has improved significantly but much needs to be done to enhance it. TSA with partnerships with airports should continually evaluate existing requirements and systems. These evaluations should include threat assessment, vulnerability risks, and consequences. The assessment of the latest technologies should be carried out to ensure their effectiveness in detecting and mitigating breaches.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now