Practical Aviation Security

Predicting and Preventing Future Threats
 
 
Butterworth-Heinemann (Verlag)
  • 3. Auflage
  • |
  • erschienen am 20. Juli 2016
  • |
  • 598 Seiten
 
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
978-0-12-804359-2 (ISBN)
 

Practical Aviation Security: Predicting and Preventing Future Threats, Third Edition is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today, as well as the cutting edge technologies that are shaping the future. This text equips readers working in airport security or other aviation management roles with the knowledge to implement effective security programs, meet international guidelines, and responsibly protect facilities or organizations of any size.

Using case studies and practical security measures now in use at airports worldwide, readers learn the effective methods and the fundamental principles involved in designing and implementing a security system. The aviation security system is comprehensive and requires continual focus and attention to stay a step ahead of the next attack. Practical Aviation Security, Third Edition, helps prepare practitioners to enter the industry and helps seasoned professionals prepare for new threats and prevent new tragedies.


  • Covers commercial airport security, general aviation and cargo operations, threats, threat detection and response systems, as well as international security issues
  • Lays out the security fundamentals that can ensure the future of global travel and commerce
  • Applies real-world aviation experience to the task of anticipating and deflecting threats
  • Includes updated coverage of security related to spaceport and unmanned aerial systems, focusing on IACO (International Civil Aviation Organization) security regulations and guidance
  • Features additional and updated case studies and much more


Jeffrey C. Price, MA, CM, ACE-Security, is a recognized authority on aviation security. He is a Professor in the Aviation and Aerospace Science Department at Metropolitan State College of Denver. He has worked in the field for over 20 years, most recently as a trainer for the certification programs of the American Association of Airport Executives (AAAE). His company, Leading Edge Strategies, has conducted the Airport Security Coordinator Training School. Jeff is also the original author of the Airport Certified Employee (ACE) Security program, as well as the lead author of the new Certified Member (CM) Body of Knowledge, and trains both the ACE Security and CM programs. Jeff entered airport management in the Operations Department at Stapleton International Airport in 1992, worked in operations and developed the initial airfield manager training programs for DIA, then helped open Denver International Airport in 1995. He served as the Assistant Security Director until 1998, then moved to Jefferson County Airport as the Director of Public Relations, Marketing and Property Management. He was appointed the Airport Manager at Jefferson County Airport in 1999 and served until 2002. He also was appointed to a term on the Colorado Aeronautics Board.
  • Englisch
  • Oxford
  • |
  • USA
Elsevier Science
  • 7,12 MB
978-0-12-804359-2 (9780128043592)
0128043598 (0128043598)
weitere Ausgaben werden ermittelt
  • Front Cover
  • Practical Aviation Security
  • Copyright Page
  • Dedication
  • Contents
  • Forewords
  • Preface
  • Acknowledgments
  • 1 Overview of the aviation industry and security in the post-9/11 world
  • Objectives
  • Introduction
  • The Cost of Failing to Protect Aviation and the Importance of Threat Response
  • Aviation Economics
  • Aviation Security Funding
  • Aircraft Operations: An Overview
  • Airline Management
  • Airline Economics
  • Airports: An Overview
  • Airport Ownership and Operation
  • Airport Security Operation
  • Airport Funding
  • Agencies and Organizations
  • Regulatory Agencies
  • Industry Trade Organizations
  • Conclusions
  • References
  • 2 Crime and terrorism in aviation
  • Objectives
  • Introduction
  • Air Terrorism Through the Ages
  • 1930-60: The First 30 Years
  • 1960-80: The Early "Jet Age"
  • Middle East and Asia
  • Dawson's Field
  • Airport Attacks
  • Other Notable Lessons from the 1970s
  • 1980-90: A New Wave of Attacks Brings a New Wave of Regulations
  • TWA Flight 847
  • Air India Flight 182
  • PSA Flight 1771
  • Pan Am Flight 103
  • 1990-2001: A False Sense of Security
  • FedEx Flight 705
  • Operation Bojinka (the Manila Air Plot)
  • TWA Flight 800
  • Flight Crew Suicides
  • The Millennium Bomber
  • September 11, 2001
  • Post-9/11 Attacks
  • Richard Reid (the Shoe Bomber)
  • MANPAD Attacks (Kenya and Iraq)
  • Airport attacks
  • Russian Airliner Bombings
  • London Bomb Plot
  • Northwest Flight 253 (aka, Underwear Bomber)
  • General Aviation Aircraft-IRS Building
  • Yemen Air Cargo Plot
  • Moscow Domodedovo Airport Terminal Bombing
  • Underwear Bomber II
  • Germanwings Pilot Suicide
  • The Malaysia Flights
  • Conclusions
  • References
  • 3 Policies and procedures
  • Objectives
  • Introduction
  • International Civil Aviation Organization
  • ICAO Annex 17: Security
  • ICAO Conventions Addressing Aviation Security: Pre-9/11/01
  • The Tokyo Convention (1963)
  • The Hague Convention (1970)
  • The Montreal Convention (1971)
  • Chicago (1974)
  • Montreal (1988)
  • Montreal (1991)
  • ICAO Conventions Addressing Aviation Security: Post-9/11/01
  • Universal Security Audit Program Continuous Monitoring Approach
  • Beijing (2010)
  • Montreal (2014)
  • Additional ICAO Annexes Relating to Aviation Security
  • US Aviation Policies
  • Anti-Hijacking Act of 1971
  • Anti-Hijacking Act of 1974
  • Act to Combat Terrorism (1978)
  • Aviation Security Improvement Act of 1990
  • Aviation Security and Antiterrorism Act of 1996
  • Airport Security Improvement Act of 2000
  • ATSA of 2001
  • Transportation Security Administration
  • Federal Government Takeover of the Screening Process
  • Creation of the FSD
  • Revitalization of the Air Marshal Program
  • Fingerprint-Based CHRCs
  • Screening Aviation Employees
  • Screening Checked Baggage
  • Air Cargo Security Procedures
  • Security Fees
  • Chemical and Biological Weapons
  • Cockpit Doors
  • General Aviation Charter Flights
  • Passenger Manifests on International Flights
  • Screening Partnership Program (aka, Opt-Out)
  • 9-1-1 System for Aircraft
  • Air Transportation Safety and Stabilization Act (2001)
  • Homeland Security Act of 2002
  • Vision 100: Century of Aviation Reauthorization Act
  • Aircraft operators
  • Airport operators
  • General aviation
  • Implementing the Recommendations of the 9/11 Commission Act of 2007
  • International Aviation Policies
  • European Union
  • European Civil Aviation Commission
  • Canada
  • Australia and the Asia-Pacific Rim
  • Conclusions
  • References
  • 4 The role of government in aviation security
  • Objectives
  • Introduction
  • Transportation Security Regulations
  • Part 1500: Applicability, Terms, and Abbreviations
  • Part 1502: Responsibilities of the Administrator
  • Part 1503: Investigative and Enforcement Procedures
  • Non-civil penalty enforcement
  • Assessment of civil penalties
  • Part 1507-1515
  • Part 1520: Protection of Sensitive Security Information
  • Covered persons
  • Categories of SSI
  • SSI handling requirements
  • Managing SSI
  • Part 1540: Civil Aviation Security: General Rules
  • Definitions under Part 1540.5
  • Responsibilities of passengers and other individuals and persons
  • Security threat assessments
  • Responsibilities of holders of TSA-approved security programs
  • How regulations are changed
  • Notice of Proposed Rulemaking
  • Changing an Airport or Aircraft Operator Security Program
  • Changed Condition Affecting Security
  • Intelligence and Intervention
  • Handling Intelligence Information
  • What Intelligence Information Can and Cannot Do
  • Fusion Centers, Terrorism Liaison Officers, and InfraGard
  • Domestic and Regional Aviation Security
  • North American Aerospace Defense Command
  • Department of Homeland Security
  • Transportation Security Administration
  • Federal Security Director
  • Transportation Security Inspectors
  • TSA's Office of Intelligence
  • Federal Air Marshals
  • Special Programs
  • Federal Bureau of Investigation
  • Customs, Immigrations, and Agricultural Enforcement Agencies
  • Other Federal Agencies
  • State Aeronautical Agencies
  • Local Law Enforcement
  • Required Law Enforcement Support for Commercial Service Airports
  • Conclusions
  • References
  • 5 Commercial aviation airport security
  • Objectives
  • Introduction
  • Challenge of Commercial Airport Security in the United States
  • Airport Security Coordinator
  • Airport Security Program
  • Applicability and Testing
  • Enforcing the ASP
  • Operations
  • Securing the Terminal Area
  • Sterile Area
  • Airside Security Areas
  • Practical Application of Security Areas
  • Airport PACS
  • Access Control: General Description
  • Airfield Perimeter Security
  • Vehicle Access Control Programs
  • Criminal history records check/security threat assessment
  • Personnel Identification Systems
  • Training
  • Challenge Program
  • Escorting Programs
  • Transportation Worker Identification Credential
  • Contingency Plans and Incident Management
  • Incident Management
  • Public Advisories
  • Biometrics and Perimeter Security Primer
  • Biometrics
  • Types of Airport Biometrics
  • Perimeter Security and CCTV
  • Applications for CCTV
  • Other methods to secure the perimeter
  • Conclusions
  • References
  • 6 Introduction to screening
  • Objectives
  • Introduction
  • Evolution of Screening in the United States
  • Screening Under the TSA
  • Sterile Area
  • Sterile Area Breaches
  • Screening Checkpoint Operations and Design
  • Design
  • Operations
  • Entry lane protection
  • Exit lane protection
  • Screening: Terminal Operations and Profiling
  • Travel Document Verification
  • Profiling
  • TSA's Behavior Recognition Programs
  • Aviation Watch and See Something, Say Something
  • Secure Flight
  • Intelligence-Driven RBS
  • Conclusion
  • References
  • 7 The screening process
  • Objectives
  • Screening Passenger and Carry-On Baggage
  • Passengers
  • Carry-On Baggage
  • Smart Security (Formerly Checkpoint of the Future)
  • Screening Checked Baggage
  • Checked Baggage
  • Building a Checked-Baggage EDS Screening
  • Checked-Baggage Screening Approved Alternatives
  • Screening Aviation Employees
  • Special Issues in Screening
  • Canine
  • Opt-Out: The Screening Partnership Program
  • Registered Traveler
  • Aircraft Charter Screening
  • Screening Conducted by the Domestic or Foreign Aircraft Operator
  • Conclusions
  • References
  • 8 Commercial aviation aircraft operator security
  • Objectives
  • Introduction
  • Airline Security: Historical Context
  • Aircraft Operator Standard Security Program
  • Title 49 CFR Part 1544-Aircraft Operator Security: Air Carriers and Commercial Operators
  • Applicability of the Regulations
  • Subpart B: Security Program
  • Aircraft Operator Security Programs
  • Aircraft Operator Security Operations and Screening Responsibilities
  • Airline Security Coordinators
  • Law Enforcement Operations Related to Airline Security
  • Law Enforcement Personnel
  • Carriage of Firearms in Checked Baggage
  • Carriage of Accessible Weapons
  • Prisoner Transport
  • Transportation of Federal Air Marshals
  • Security of the Aircraft on the Ground and in Flight
  • In-Flight Security
  • Other Aircraft Operator Security Requirements
  • Training
  • Contingency and incident management planning
  • Receipt of air cargo
  • Airline Security Issues
  • Positive Passenger/Baggage Matching
  • Catering and Vendor Services
  • Airline Security Staff Operations and Issues
  • Aircraft Security Requirements
  • Airline Employee Safety
  • Air Rage
  • Flight Crew Protection
  • Protecting airline personnel while traveling
  • Self-defense for crewmembers and passengers
  • Violent passenger or terrorist
  • FFDO Program
  • Foreign Aircraft Operations
  • Title 49 CFR Part 1546 Foreign Air Carrier Security
  • Threat and Threat Response
  • Additional Considerations of Foreign Air Carrier Operations
  • Border Protection
  • Global Entry
  • Conclusions
  • References
  • 9 General aviation and unmanned aerial vehicle security
  • Objectives
  • Introduction
  • Securing GA
  • How 9/11 Changed GA
  • Pilots
  • Airspace
  • Temporary Flight Restrictions
  • General Aviation Airport Security Program
  • GA Repair Stations
  • GA Airport Security Best Practices
  • State of GA Security
  • Attempts to Secure GA
  • State Actions
  • AOPA's Airport Watch
  • FBO Security
  • Secure Fixed-Base Operator Program
  • Helicopter Security
  • Training for GA Airport Security and Law Enforcement Personnel
  • Alien Flight Student Program
  • Flight School Security Awareness Training
  • Maryland-3
  • Aircraft Security Under General Operating and Flight Rules
  • 12-5 Standard Security Program
  • Agricultural Aircraft Security
  • Corporate Aviation Security
  • Intelligence
  • In-Flight Security
  • Flight Crew Training
  • Other Security Practices
  • NBAA TSA Access Certificate Program
  • DCA Access Standard Security Program
  • Unmanned Aerial Systems/Unmanned Aerial Vehicles
  • Security Implications of UAV Operations
  • Conclusions
  • References
  • 10 Air cargo security
  • Objectives
  • Introduction
  • Terrorism and Crime in Air Cargo
  • The Nature of Air Cargo
  • Known Shipper Program
  • GAO on Air Cargo
  • Aviation Security Advisory Committee: Air Cargo
  • Summary of TSA Rulemaking
  • Unknown Shippers and US Mail
  • Title 49 CFR Part 1548 Indirect Air Carrier Security
  • Certified Cargo Screening Program
  • Current Air Cargo Security Measures and Issues
  • Conclusions
  • References
  • 11 The threat matrix
  • Objectives
  • Introduction
  • Threat Matrix
  • Existing Threats: Aircraft Bombings, Aircraft Hijackings, and Airport Attacks
  • Aircraft Bombing: Passenger, Baggage, and Cargo
  • Bomb Threats
  • Aircraft Hijacking
  • Managing a hijacking incident
  • Airport Attack: Armed Assault
  • Emerging Conventional Threats
  • Airport Attack: Improvised Explosive Device (Leave-Behind Devices)
  • Vehicle-Borne Improvised Explosive Device
  • Airport Attack: Suicide or Homicide Bomber
  • Airport Attack: Perimeter Breach and Standoff Weapons
  • Aircraft Attack: MANPAD
  • Emerging Asymmetrical Threats
  • Chemical/Biological/Radiological/Nuclear Attacks
  • Chemical
  • Biological
  • Radiological
  • Nuclear
  • The Future Is Here: Insider Threat, Directed-Energy Weapons, and Cyber-Attacks
  • Directed-energy weapons
  • Unmanned aerial vehicles
  • Insider threat
  • GA aircraft
  • Cyber-attack
  • Infrastructure
  • Counterterrorism: Terrorism Defense Planning
  • Emergency Management Cycle
  • Mitigation/preparedness
  • Response
  • Recovery
  • National Response Framework9
  • National Incident Management System
  • Conclusions
  • References
  • 12 Security operations
  • Objectives
  • Introduction
  • Aviation Policing Strategies
  • Security Management Systems
  • Airport Crimes
  • Baggage Theft
  • Air Cargo Theft
  • Drug Smuggling
  • Human Trafficking
  • Ticket Fraud
  • Other Crime
  • Airport Policing Strategies
  • Counterterrorism
  • Anticrime
  • Policing GA
  • Professional Security Officers
  • Red Teaming
  • Emerging Issues
  • Conclusions
  • References
  • Index
  • Back Cover

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

85,62 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
PDF mit Adobe DRM
siehe Systemvoraussetzungen
Hinweis: Die Auswahl des von Ihnen gewünschten Dateiformats und des Kopierschutzes erfolgt erst im System des E-Book Anbieters
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok