Aviation security
1 / 47

- PowerPoint PPT Presentation

  • Updated On :

Aviation Security . 警總 ⇒ 解嚴 ⇒ 開放天空 ⇒ 911 …. Aviation Security. ◈ Introduction ◈ Review of Attacks on Civil Aviation ◈ Regulatory Movement ◈ International Influences ◈ Review of Security technologies ◈ APB Aviation Security. 1. Introduction.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about '' - anika

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Aviation security l.jpg

Aviation Security

警總 ⇒解嚴⇒開放天空⇒911…

Aviation security2 l.jpg
Aviation Security


◈Review of Attacks on Civil Aviation

◈Regulatory Movement

◈International Influences

◈Review of Security technologies

◈ APB Aviation Security

1 introduction l.jpg
1. Introduction

◈ it is important to realize a fundament difference between

Safetyusually refers to measures taken against the threat of an


Securityrefers to protection from threats motivated by hostility

or malice

◈ While the end objective of safety and security is to minimize risk by preventing injuries and loss of lives and property!

◈ The core safety practices are designed to prevent unintentional acts whereas security practices are designed to avert intentionalacts.

Slide4 l.jpg

◈ 一般而言,將空中運輸安全分為飛航安全(flight safety)與航空保安(aviation security)兩主要部分。



2 review of attacks on civil aviation l.jpg
2. Review of Attacks on Civil Aviation

◈ The first attack on civil aviation dates back to 1930 when Peruvian revolutionaries seized a Fokker F-7 aircraft in South America.

☞ little attention and never resulted in anyinternational effort

to combat potential threats to international aviation

◈ Until the Mid-1960s, airlines and airportsgave security matters little attention.

☞ Low-technology security applications, such as airport fences,

were intended as a safety measure to separate aircraft from

wildlife rather thanterrorists.

Review of attacks on civil aviation l.jpg
Review of Attacks on Civil Aviation

◈ However, attackers against civil aviation rose rapidly in the 1967-1976 decade.

☞while there were only 32 worldwide hijackingsfrom 1961 through1967, there were 290hijacking attempts (successful and unsuccessful) worldwide during the following 4 years after 1968.

◈ In U.S., from 1930 to 1967, only 12 hijackings were attempted, the climax occurred in 1969 when 33 regularly scheduled airliners were hijacked.

☞ led to much money being spent onsecurity by the air carriers and the FAA on x-ray systems, magnetometers, training programs for screening personnel, and air marshals.

Review of attacks on civil aviation7 l.jpg
Review of Attacks on Civil Aviation

◈ Consequently, the threat of hijacking in U.S. and the actual incidences of hijackings diminishedover time.

Review of attacks on civil aviation8 l.jpg
Review of Attacks on Civil Aviation

◈ From Fig.1, all three major forms of attacks against on airliners display almost the same trend over time, rising steeply in 1967-1976decade and then declining.

Review of attacks on civil aviation9 l.jpg
Review of Attacks on Civil Aviation

◈ From 1947-1996 there were 1,098 total incidents of attacks on airliners, compared with 129 attacks on airports and 249 attacks on airline offices.

☞With regard to themodes of attack, hijackings were by far the most common form of attack on commercial aviation. Hijackings constituted 87% of all incidents on airliners during this 50-year period. ( the other were bombings, armed assault,…)

◈ While the number of attacks was on the decline, the severity of these attacks demonstrated a different trend.

☞ the decade of the1980s was a disastrous one for aviation, confirmed the existence of dangerous trend toward greater violence against air transportation. Overall, 25 planes were sabotaged by explosives, causing 1,237 casualties.

Review of attacks on civil aviation10 l.jpg
Review of Attacks on Civil Aviation

◈ By comparison, there were 650deaths in the 1970s and 286 deaths in the 1960s.

☞ things cooled off in the 1990s only the events of September 11, 2001, when 3,247(including onboard passengers, crew, and people on the ground) were killed in four separate terrorists acts on the same day

◈ The increase in severity of aviation attacks were the results of terrorists changing their tactics and philosophies and making use of new technologies.

☞ more sophisticated and lethal technologies, such as automatic weapons and deadly plastic explosives, innocuous-looking suitcases and radio into lethal bombs,…

◈ The character of airline hijackings also changed from lone hijacker (personal or political point ) of early 1960s to the 1970s as an organized terrorist tactic.

3 regulatory movement l.jpg
3. Regulatory Movement

◈ Prior to the formation of the Transportation Security Administration (TSA) in 2001, for protecting the users against terrorist and other criminal acts belonged to the FAA.

1.Airport Security

2.Air Carrier Security

3.Anti-hijacking or Air Transportation Security Act of 1974

4. Air Carrier Standard Security Program (ACSSP)

5.Indirect Air Carrier Security

6. Air Marshal Program

7.Aviation Security Improvement Act of 1990

8. Antiterrorism Act of 1996

9.White House Commission on Aviation Safety and Security, 1996

10. Aviation and Transportation Security Act of 2001

Regulatory movement l.jpg
Regulatory Movement

1.Airport Security

Under FAR (Federal Aviation Regulations) Part 107 (1972), airport were intend to prevent inadvertent entry of unauthorized persons or vehicles to the aircraft movement area and prevent damaging collisions with wildlife other than birds through fencing or other means

 Improve or establish protection against unauthorized access to air operations areas

 Establish authorized access to air operations areas through a suitable identification system

Identify vehicles operating in air operations areas

Regulatory movement13 l.jpg
Regulatory Movement

2.Air Carrier Security

Part 121 (1972), air carriers were required to adopt and implement a screening system that would detect weapons and explosives in carry-on baggage or on the person of passengers

 Prevent or deter unauthorized access to its aircraft

 Ensure that a responsible agent or representative of the certificate holder would check in baggage

Prevent cargo and checked baggage from being loaded aboard its aircraft unless they were handled in accordance with the certificate holder’s security procedures

Regulatory movement14 l.jpg
Regulatory Movement

3.Anti-hijacking or Air Transportation Security Act of 1974

this Act promulgated in 1974, contained two titles: rules requiring carriers to institute 100% screening of passenger and carry-on items, and at least 1 law enforcement officer at each passenger checkpoint during boarding and preboarding

TitleⅠ, Anti-hijacking Act (punitive provisions for hijackers and security standards for foreign air transportation and services)

 TitleⅡ, Air Transportation Security Act (security regulations for U.S. airports and carriers)

Regulatory movement15 l.jpg
Regulatory Movement

4.Air Carrier Standard Security Program (ACSSP)

Application of theregulations varied greatly across the airlines. Regulatoryrequirements were not implemented consistently across the industry.

 In early 1975 the Air Transportation Association sought to work out a Standard Security Program (ACSSP), which attempted to bring some structure to the diverse interpretations of the new rules.

 In1976, all but a few of the carriers accepted the program, which is mandatory today.

Regulatory movement16 l.jpg
Regulatory Movement

5. Indirect Air Carrier Security

FAR 109 regulations (1979) govern indirect air carrier security and provide additional protection against criminal activity.

 prescribes aviation security rules governing each air carrier, including air freight forwarders, food service, and cooperative shipping associations engaged indirectly in air transportation of goods

 each indirectly air carrier is required to have a security program designed to prevent or deter the unauthorized introduction of explosives or incendiary devices into any package cargo

Regulatory movement17 l.jpg
Regulatory Movement

6. Air Marshal Program

this statute authorized Federal Air Marshals to carry firearms on board and to make arrest without warrant

theincrease hijackingresulted in the establishment of the Anti-Hijacking Program of the Federal Aviation Administration, one element of this program was the federal Air Marshal Program

 FAA’s armed federal Air Marshal Program aboard international flights for U.S. air carriers.

 In 1985, Congress enacted Public Law 99-83, the International Security and Development Cooperation Act, which established the explicit statutory basis for the FAA-Federal Air Marshal Program

Regulatory movement18 l.jpg
Regulatory Movement

7. Aviation Security Improvement Act of 1990

this Act implemented the most comprehensive, far-reaching legislative initiative designed to improve all aspects of aviation security

 It mandates many regulatory actions affecting several agencies, requires new reports, creates new organization and staffing requirements, and empowers the FAA to promote and strengthen aviation security, more focused research and development (R&D) program.

8. Antiterrorism Act of 1996

an amendment required the FAA to ensure that the same security measures (not merely similar ones) used by U.S. carriers on routes into or from the U.S. would be implemented by non-U.S. air carriers on those routes

Regulatory movement19 l.jpg
Regulatory Movement

9. White House Commission on Aviation Safety and Security, 1996

the commission set aggressive agenda for reviewing the safety of the air transportation system and issued initial recommendations

 Special attention was given to an action plan to deploy new high-technology machines (explosives detection, human factors, aircraft container hardening, trace explosives detectors) to detect the most sophisticated explosives.

 The working group’s recommendations were passed on to the White House Commission on Aviation Safety and Security, had a major impact and given the force of law and financing by ensuring Congressional action

Regulatory movement20 l.jpg
Regulatory Movement

10.Aviation and Transportation Security Act of 2001

the 911 terrorist events of 2001 changed the face of aviation forever while fundamentally modifying the thinking and approach to security

 On November 19, 2001, Congress enacted the Aviation and Transportation Security Act (ATSA), which established the Transportation Security Administration (TSA) as an operating administration within the Department of Transportation (DOT)

 The measure, was expected to dramatically improve airport security by promoting the development and use of cutting-edge technologies, such as biometric authentication, Global Positioning System applications, enhanced communication systems, and database integration protocols.

4 international influences l.jpg
4. International Influences

◈ The cost-benefit ratio of current U.S. security efforts is insular. There is little or no overall economic benefit to improving aviation security inconsistently.

 If the terrorist were to acquire shoulder-launched missiles (a perfectly realistic scenario), present security measures would become pointless.

◈ National and international security concerns arise because such economic and technological integration is not accompanied by political integration.

 There is no central authority in world politics, much less one with power to enforce its mandates.

International influences l.jpg
International Influences

◈ the security measures produced two obvious economic effects:

1. increased costs, arise from such procedures as increased inspections, patrol, expandedscreening measures, overtime payrolls, and enforcing new parking restrictions.

2. loss of revenue, allowing only ticketed passengers past screening points reduces concession revenues, and packing lot closures reduce cash revenues.

International influences23 l.jpg
International Influences

◈ Critical point out that it would be better to spend the money on intelligence to get an accurate fix on real threat.

 U.S. carriers frequently rely on the host government to provide security at least to the degree that outlined in ICAO Annex 17.

◈ The International Security and Development Cooperation Act of 1985 gives the FAA authority to assess security measures at foreign airport in accordance with ICAO Annex 17 standards.

 The U.S. DOT also issues public warnings about the level of security at foreign airports if it falls below international standards.

5 review of security technologies l.jpg
5. Review of Security technologies

◈ Commercial aviation can be protected from the threat of explosives in two ways:

 By Preventing explosives from reaching aircraft (by using explosives detection technologies)

 By mitigating the effects of an explosive by protecting the aircraft from an onboard explosion (via aircrafthardening and hardened containers)

☞ Combined these two approaches may provide the best protection of commercial aviation

Security technologies imaging technologies l.jpg
Security technologies- Imaging Technologies

◈ Imaging Technologies

imaging technologies work either by sensing the natural radiationemitted by the human body (passive imaging) or by exposing subjects to a specific type of radiation and then measuring the radiation reflected by the body (active imaging)

☞ it can detect metallic weapons or plastic explosives by sensing the differences in reflected radiation between the human body and the weapons or explosives

 X-Ray Imaging

X-ray units used for inspecting carry-on luggage and people use low-dosage, low-energy radiation. Higher-dosage units are used for checked baggage.

Security technologies imaging technologies26 l.jpg
Security technologies- Imaging Technologies

☞ newer X-ray device display images in different colors according to the level of energyradiation, thickness, density, to differentiate among materials are metallic, organic, and so on.

 Passive Millimeter-Wave Imaging

based on the principle that any object not at absolute zero temperature will emit electromagnetic energy at all wavelengths

 Active Millimeter-Wave Imaging

uses low-energy, low-intensity reflected x-rays to scan an object to generate an image, this technique require radiation, which raises some health concerns.

Security technologies imaging technologies27 l.jpg
Security technologies-Imaging Technologies

◈ Sample imagine systemscurrently being marketed

1. American Science and Engineering (AS&E)

BodySearch Personnel Inspection System

AS&E’s 101ZZ system

PalletSearch Cargo Inspection System

2.Heimann System

3. Secure 1000 Nicolet Imaging System/Teledyne

4. Portable X-Ray Imaging System

Security technologies trace detection technologies l.jpg
Security technologies-Trace Detection Technologies

◈ Trace detection technologies

based on the directchemical identification of either particles of explosive material or vapor-containing explosive material.

☞ two distinct steps in trace detection are sample collection and chemical identification, more commonly used for baggage screening (as opposed to people screening) in aviation security

 Sample: 1. Thermedics EGIS 3000 2. Barringer Ionscan 400

3.Ion Track Itemiser4.CTX-5000SP

Security technologies explosive detection systems edss l.jpg
Security technologies-Explosive Detection Systems(EDSs)

◈ Explosive Detection Systems

includes any device or system that remotely senses a physical or chemical property of an object to detect the presence of an explosive concealed in a container

☞ the critical performance metrics for explosives detection equipment include the probability ofdetectionPd, the probability of false alarmPfa, and the throughput rate

 Samples: 1. CTX 9000 InVision Technologies

2. Vivid CT30

3.Examiner 3DX 6000

Security technologies metal detectors l.jpg
Security technologies-Metal Detectors

◈ Metal Detectors

are used broadly around all the airports and the most important source of security, involve metal detection portals for screening passengers and x-ray imaging systems for hand-carried baggage

☞ metal detectors vary from portals to handheld systems depend on the application, and not as effective as other systems, and their weakness is that they do not detect metals incapable of being magnetized, (newer generationcan search for ferrous and nonferrous objects)

 Samples: 1. Body Orifice Security Scanner (B.O.S.S.)

2. Sentrie Omni

3.PM200HD (Portal Type)

Security technologies biometrics l.jpg
Security technologies-Biometrics

◈ Biometrics

Biometrics technology devoted to identifying individuals by using biological traits and use of physiological or behavioral characteristics to determine or verify identity (so that security personnel can focus on smaller category“high-risk”passengers)

☞ Biometric systems are basically of two types: verification and recognition.

Biometric measurement variables include:

Fingerprint Facial recognition Voice recognition

Iris scan Retina Scan Hand geometry

Signature scan Keystroke scan Palm scan

 Samples: FaceIT Identix Corporation

HandKey Recognition System

Security technologies another approach l.jpg
Security technologies(another approach )

◈ Strengthening Aircraft and Baggage Containers

another approach to aviation security is to try to strengthenaircraft frames and to plan redundancies in vital systems such as controls, electrical systems, and hydraulics, to mitigate the effects of bomb blasts in flight

◈ Cockpit Door Reinforcement

On January 10, 2002, the FAA published new standards to protect cockpits from intrusion and small-arms fire or fragmentation devices, such as grenades.

◈ Computer-Assisted Passenger Screening System (CAPS)

about in 1997 several major carriers developing and testing CAPS, which permits the airline’s computer reservation system to use information in the passenger name record to exclude most passengers from further security measures

Non technological approaches l.jpg
Non-technological Approaches

◈ High-technology detection methods can yield results, but it is clear that these results are expensive and are not perfect.

◈ There are alternative technological and tactical approaches to airport security.

☞One might be able to divert some level of resources from hardware applications toward improved intelligence gathering to intercept terrorists long before they arrive at the airport.

☞ From an economic pointof view, the use of resources to gather intelligence is more attractive than elaboratesecurity technology.

◈ In spite of all that has been accomplished to ensure the safety and security of the traveling public, the terrorist, always has the upper hand. While we must protect every element of the transportation system at all times, the terrorist has the luxury of being the only one who know the time, the place, and the method of the next attack.

6 apb aviation security l.jpg
6. APB Aviation Security

◈ 機場安檢-- 係依據依國家安全法第四條及其施行細則第19條與台灣地區民航機場安全檢查作業規定等相關法規,對出、入境及過境旅客、行李、貨物(含空廚)安全檢查與航空器清艙安檢作業,兼負防劫機、防破壞、防偷渡、防走私及防滲透等維護飛安(出境安檢)、地安(入境安檢)之任務!


1. 劫機破壞者最後豋機的比例最高,主要目的係藉以掩人耳



2. 重視國際航線疏忽國內航線安檢作業 (國際普遍通病)!

Apb aviation security l.jpg
APB Aviation Security

◈ 《危險物品空運管理辦法草案》


◈ 危險品具有易爆、易燃、有毒、腐蝕和放射特性等物質,不但包括明顯危險性物質,同時也包括一般常見物品!依據國際空運協會(IATA)所制訂之《危險物品規則》,共分為九大類:

Slide36 l.jpg


1.1981.08.31, Middle East Airlines,B720客機載運5公斤炸藥於利比亞迫降炸毀,82人身亡。

2.1987.11.28, South African Airways,B747臺北起飛客機貨艙非法載運危險物品飛行途中貨艙起火,墬毀印度洋,159人喪身。

3.1987. Korean Air,B707客機因客艙攜帶危險物品,飛行途中爆炸,115人喪生。

4.1988. 12.21, Pan Am,B747客機因貨艙爆炸墬毀270人喪生。

5.1989.09.19, Union des Transport Aerins, DC-10因前貨艙危險物品飛行途中爆炸,171人喪生。

6.1989. 11.27, 哥倫比亞航空B727因機內炸彈引爆,107人死亡。

Slide37 l.jpg


7.1994.12.11, Philippine Airlines,B727因客艙發生爆炸,造成1人死亡。

8.1995.07.12, Miline Bay Air Gumey, DHC-6 Twin Otter 於巴布亞紐幾內亞,因客艙行李失火墜毀,15人喪生。

9.1996.05.11, ValuJet Airlines(超值航空),DC-9客機因攜帶氧氣瓶未依危險物品運送標準執行,致起飛不久前艙失火110人死亡。

10.1997.07.09, TAM Brazil, Fokker F-100, 因客艙底下發生爆炸,1乘客被彈出機外死亡。

11.1999.08.24, Uni-Airlines, MD-90客機花蓮機場降落滾行時客艙爆炸起火,1人死亡。(1989大華航空迫降台中CCK)

Slide38 l.jpg

◈ 一、國際航空危險物品管理

☞1950年以前大多完全禁止運送危險物品(當時稱為限制性物品Restricted Articles)基於商業需求,國際空運協會初始於1952年成立『限制性物品工作小組』籌畫制訂危險物品的國際性航空運輸規則

☞ 1956 第一版《IATA航空運送限制物品規則》實施。

☞1972 IATA危險物品(空運)規則中,採聯合國之危險物品標貼系統

☞1976 國際民航組織(International Civil Aviation Orgnization,

ICAO) 提倡以政府力量介入危險物品的國際運輸。

☞1977 ICAO危險物品專案小組舉行首次會議,起草芝加哥國際民航會


(Technical Instructions, TI)簡稱《技術指令》。

☞1982 IATA發行第二十四版的空運規則,從此完全符合ICAO國際民航


Slide39 l.jpg

☞ Dangerous Goods Regulations, DGR, 簡稱《空運規則》所依據的危險物品國際運輸法規有三方面來源:



2.聯合國『國際原子能總署』(International Atomic Enrergy Agency,

IAEA) 為安全運輸所訂定之《放射性物質安全運輸規則》。


◈ 二、國內航空危險物品管理

☞ 我國航空運輸在危險物品規範上,僅在《 民用航空法》第43條提及,而『危險物品空運管理辦法』也僅草案(主因為母法尚在修正階段)?目前尚無對於危險物品明確的管理規範,皆參考國際航空運輸協會(IATA)之規範。

Slide40 l.jpg

◈ 三、危險物品空運限制( 安檢訓練教材)

☞ 除依『空運規則』外,各國及航空公司基於自身因素考量,也可對危險物品加以限制,這種限制稱為『變異條款』(variation)

1. 禁止航空運輸之物品與物質:


☞ 絕對禁止航空運輸之物品與物質,是指在正常的航空運輸狀況下會爆炸、起危險反應、釋出危險程度的熱量、或散發出毒性腐蝕性或易燃性的氣體或蒸氣的物質或物品。

Slide41 l.jpg

2. 航空行李中危險物品

☞ 乘客或組員之攜帶行李(托運行李、隨身行李、隨身物品),不論何種攜帶方式,有兩項物品絕對禁止行李運輸 !





3. 一般貨物中隱藏的危險物品

4. 少量危險物品之航空運輸

☞原則上危險物品不可郵寄,若符合規定少量危險之 1.感染性物質(托運人危險物品申報單) 2.乾冰(托運人危險物品申報單) 3.放射性物質(活度(activity)不超過空運規則中『微量包裝漸活度限定表』之1/10),則可依規定程序運送。

Slide42 l.jpg







Slide43 l.jpg






Slide44 l.jpg

◈法規訂定 (政策)

相關法規訂定已有進步,唯大多屬程序上之制定,對於完整的管理目標與標準作業程序之訂定,仍需進一步整體規劃 !

◈ 航空保安(經費-公私部門)



2.CTX-5000 (熱中子)雖功能齊全(所費不貲)但檢測效率不佳!

3.Heimann System在預算限制(價格標)競標下減少許多原有功



Slide45 l.jpg





調必備人力 !(祥和專案→人仰馬翻!)




2. (安檢觀察勤務重點)


Slide46 l.jpg


◈ 一般市面上所稱的『毒品』,其實是醫學上的『藥物DRUG』但在法律學上稱為毒品,因嚴重危害人類健康及社會秩序,因此列為違禁品。並依其成癮性、濫用性及對社會危害性分為三級:





◈FM2、Ketamine、GHB 在歐美稱為『三大約會強姦藥』均有安眠、嗜睡、及麻醉效果,不可不慎!

Slide47 l.jpg

◈ 搖頭丸: