SlideShare a Scribd company logo
1 of 3
Download to read offline
16
intersecJanuary2008
A
irport perimeters are typically
protected by fences designed to
delineate land ownership and
dissuade pedestrian access. Chain-link
fences of various types are most
commonly used for long-perimeters
due to their low unit cost, but chain-
link fences present a delay to pedestrian
attack that is measured in seconds, and
no delay to a vehicle attack. This is why
in October 2003 a Ford Mustang was
able to drive through a double
perimeter fence at San Diego
International Airport in California and
cross an active runway.
Vehicles have been used as weapon
systems for decades. One of the earliest
examples was on 16 September 1920,
when the Italian anarchist Mario Buda
drove a horse-drawn cart-bomb to the
corner of Wall Street and Broad Street
in New York and detonated it outside
the offices of J P Morgan, killing 40
people. Today in Iraq and elsewhere in
the world, suicide car bombs will be
used, as they have been almost daily
since the euphoria of Iraq’s liberation
subsided. Together with Mikhail
Kalashnikov’s rifle, the suicide car
bomb now appears to be the weapon of
choice for the anti-democracy terrorist.
Thankfully, since 11 September 2001,
the risk of an aircraft being attacked by
passengers from within the cabin has
been significantly reduced, as too has
the risk of an attack on passengers
within an airport terminal building.
Although the terminal building at
Glasgow Airport was attacked by a
vehicle in June 2007, its mitigation
system was successful at defeating the
vehicle and the only casualty was the
terrorist himself. But little has been
done to mitigate the risk posed by
vehicles attacking an aircraft while on
the ground or during those precarious
moments during the take-off sequence.
The reason for a lack of aircraft
protection may not be the technical
difficulty. Protecting the airport is the
responsibility of the airport owner. Yet
protecting an aircraft and its passengers
is primarily the responsibility of the
aircraft operator. Internationally, Annex
17 of the Convention on International
Civil Aviation gives guidance on
safeguarding civil aviation against acts
In light of the 2007 attack on Glasgow airport, Matthew Walton-Knight
suggests that the next generation of terrorist attacks on
aircraft will be from ground vehicles
UNDER
SIEGE
of unlawful interference. It requires
governments to establish security
programmes with their airport owners.
In Europe, the European Civil Aviation
Conference Document 30 Part Two
guides the implementation of Europe-
wide aviation security measures. In
Britain, under both Common Law and
Section Four of the Health and Safety at
Work Act, airport owners have an
obligation to provide – as far as
reasonably practicable – safe premises
for aircraft operations. But the cost of
airport security in Britain is causing
airport owners concern as, unlike road
and rail security, airport security costs
fall completely to airport owners.
Terrorists have and will attack airports
for they are high-value, target-rich
environments – in March 1994 the
Provisional Irish Republican Army (IRA)
attacked London’s Heathrow Airport.
Pragmatically, there are four attack
scenarios in which a vehicle with – or
even without – an explosive device
could easily attack an aircraft on the
ground at an airport. In the first
scenario, a vehicle bomb detonates in
the vicinity of a moving or stationary
aircraft. A line of stationary, fuelled and
fully-laden passenger aircraft queuing to
take-off presents a most attractive target
to a terrorist intent on generating mass
casualties. Thankfully this attack
scenario has not yet been realised, but
the effect of a close proximity
detonation of even a small vehicle bomb
on an aircraft would be catastrophic.
In the second scenario, a vehicle
could strike an aircraft where the
particularly vulnerable components are:
the undercarriage to trip-up the aircraft,
or the engines to initiate a fire. In
October 2000, a Singapore Airlines
Boeing 747 was taking off from Taipei
Airport in Taiwan and struck stationary
construction equipment and vehicles,
killing 83 people on-board. An aircraft
could also potentially swerve off the
runway to avoid an attack vehicle. In
July 2006, a Russian S7 Airbus A-310
skidded off the runway at Irkutsk Airport
in Siberia and struck a building, killing
124 people on-board.
Another hypothetical scenario could
see an aircraft attempting to avoid a
vehicle strike but hit debris – deliberately
placed or not – from an attack vehicle.
In July 2000, an Air France Concorde
taking off from Paris Charles de Gaulle
Airport struck a small item of debris on
the runway that was thrown-up,
punctured a fuel tank and caused a fire.
The aircraft crashed minutes later,
killing all 109 people on aboard.
Accepting that aircraft are highly
vulnerable to terrorist attack when on
the ground, there is much that can be
done to mitigate this risk. But in order
to progress, two principles must be
acknowledged. Firstly, once an attack
vehicle is within the secure airside
perimeter of an airport, little can be
done to restrain it. Airports are designed
to give near complete freedom of
movement for vehicles airside in order
to allow aircraft movement and
emergency response. Short of a
significant armed engagement, effectively
nothing can stop an attack vehicle once
it is airside. The vehicle must be stopped
prior to penetrating the airside perimeter.
Secondly, the focus of any perimeter
security system must be on the terrorist
attacker, not on the security system.
Many manufacturers promote
impressive perimeter security systems,
but this can easily move the focus away
from the terrorist attacker to the
security system. Sun Tzu reminds us
that, “If you know yourself and your
enemy, then you need not fear the
result of a hundred battles; if you know
yourself but not the enemy, for every
victory you will suffer a defeat.” In
counter-terrorism, one defeat is one too
many; the focus must remain on the
terrorist attacker, not on the security
system, to ensure “no defeats”. By
focusing on the perimeter security
system and not on the attacker, defences
can easily become out of balance, in
that they give differing levels of residual
risk along the perimeter – the proverbial
robust front gate but undefended
tradesman’s entrance. This either
provides a weakness that can be
exploited by terrorists, or leads to
uneconomic defences through the
overprovision of protection in some areas.
An ideal perimeter protective system
should deliver similar levels of residual
risk throughout its entire length.
Halting an attack vehicle at the
perimeter is difficult. Vehicles are able to
breach many obstacles, especially when
they are driven by determined terrorists
with no intention of escape or indeed of
their own survival. This means that the
spectrum of risk mitigation solutions is
limited, but still includes some fences,
blocks, bollards, walls and ditches. But
the perimeter engineering solution is
only an element, one layer in the
perimeter defences of an airport – all
obstacles can be breached, given
adequate time and resources. Securing a
perimeter is not just a process of placing
fences and barriers, nor of adding
intruder detection systems and cameras
to an existing perimeter fence. It
involves the application of a
methodology that allows the security
team to understand – and ideally to
adopt – the mindset of the terrorist
attacker. Few outside the army or
security services are educated to
conceptualise in this manner and
consequently there is value in using a
military-style methodology for long-
©GettyImages
17
intersecJanuary2008
PEER REVIEW
Eric Yap
A qualification should be made on the
airport perimeter security issue. While
it is true that airport perimeters are
generally protected by chain-link
fences that are often complemented by
several other layers of security (both
passive and active systems) that need
not necessarily be conspicuous. This is
particularly true for major aviation
centers which would naturally be high
on value to terror groups. Examples of
such airports in Asia would be Hong
Kong International Airport, Kuala
Lumpur International Airport and
Singapore’s Changi Airport.
My take is that terror groups have
easier options to explore within an
airport context than to penetrate
through highly visible defences.
Passenger terminals offer an extremely
attractive target and like subways, it is
almost impossible to check very
person without bringing the system to
a standstill.
perimeter security.
Airports are inviting high-value
target-rich environments. If attacked
they would give terrorists extensive
media coverage, considerable political
leverage and, depending on the strategy,
potentially massive loss of life. There
would also be significant financial and
business continuity implications.
Unquestionably, an attack on an airport
would achieve the purpose of terrorism
– to terrorise. Mitigation of the risk
posed by a vehicle attack on an aircraft
while on the ground at an airport
should be a priority. It is the logical next
form of terrorist attack our air
transportation networks will face.
Although the primary onus lies with
aircraft operators, airport owners have
an obligation to ensure their airports
are safe and secure. Effective mitigation
strategies will focus on defeating the
terrorist attacker at or before he
penetrates the airside perimeter, rather
than on constructing potentially
nugatory perimeter security systems.
Attack vehicles must be prevented from
penetrating the perimeter, for once
inside their effect would be catastrophic. A
vehicle attack would be highly effective
for a terrorist and, with the perimeter
defences currently found on most
airports, it is easy to achieve.
Regrettably, unless aircraft operators
and airport owners are more proactive
at risk mitigation, a vehicle attack on an
aircraft at an airport is now just a
matter of time.
intersecJanuary2008
18
i
UNDER SIEGE
The 2007 Glasgow Airport attack was thwarted by effective perimeter security but the threat remains
©GettyImages
Matthew Walton-Knight CEng PMP
works for MMM Group in
Vancouver, Canada. He previously
served in the British Army’s Corps
of Royal Engineers and worked for
Arup Security Consulting.
If you have any questions or
comments about this article, please
email us: comment@intersec.co.uk

More Related Content

What's hot

Chpt 5 commercial airport avsec
Chpt 5 commercial airport avsecChpt 5 commercial airport avsec
Chpt 5 commercial airport avseccarlinclarke
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutionsTristan Wiggill
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONPaul Mears Phd.
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Danladi Caleb
 
NiDAR MAST 2016_pdf
NiDAR MAST 2016_pdfNiDAR MAST 2016_pdf
NiDAR MAST 2016_pdfRob Balloch
 
Aviation insurance
Aviation insuranceAviation insurance
Aviation insuranceAkramMad1
 
Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)🇫🇷 Π P. DΣBIΕN ©
 
Piracy faqs_28 august 2013
Piracy faqs_28 august 2013Piracy faqs_28 august 2013
Piracy faqs_28 august 2013Brian Dsilva
 
Safeguarding International civil aviation against acts of unlawful interference
Safeguarding International civil aviation against acts of unlawful interferenceSafeguarding International civil aviation against acts of unlawful interference
Safeguarding International civil aviation against acts of unlawful interferenceMomina Riaz
 
Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelinesnwvirus
 
Majumdar, Dave - 2015, 141-2-1344
Majumdar, Dave - 2015, 141-2-1344Majumdar, Dave - 2015, 141-2-1344
Majumdar, Dave - 2015, 141-2-1344Dave Majumdar
 
Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014captlouis
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patternsNoel Tan
 
history of airport security
history of airport security               history of airport security
history of airport security Hasin Raheel
 
Aviation Insurance
Aviation Insurance Aviation Insurance
Aviation Insurance Mitch Naku
 
Maritime and Aviation security
Maritime and Aviation securityMaritime and Aviation security
Maritime and Aviation securityAnurag Sharma
 

What's hot (20)

Chpt 5 commercial airport avsec
Chpt 5 commercial airport avsecChpt 5 commercial airport avsec
Chpt 5 commercial airport avsec
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutions
 
Avsec policy
Avsec policyAvsec policy
Avsec policy
 
Security Aspects in Aviation Sector
Security Aspects in Aviation SectorSecurity Aspects in Aviation Sector
Security Aspects in Aviation Sector
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATION
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
 
NiDAR MAST 2016_pdf
NiDAR MAST 2016_pdfNiDAR MAST 2016_pdf
NiDAR MAST 2016_pdf
 
Aviation insurance
Aviation insuranceAviation insurance
Aviation insurance
 
Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)
 
Piracy faqs_28 august 2013
Piracy faqs_28 august 2013Piracy faqs_28 august 2013
Piracy faqs_28 august 2013
 
Safeguarding International civil aviation against acts of unlawful interference
Safeguarding International civil aviation against acts of unlawful interferenceSafeguarding International civil aviation against acts of unlawful interference
Safeguarding International civil aviation against acts of unlawful interference
 
Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelines
 
Majumdar, Dave - 2015, 141-2-1344
Majumdar, Dave - 2015, 141-2-1344Majumdar, Dave - 2015, 141-2-1344
Majumdar, Dave - 2015, 141-2-1344
 
AIRPORT SECURITY
AIRPORT SECURITYAIRPORT SECURITY
AIRPORT SECURITY
 
Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
Aviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical SolutionsAviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical Solutions
 
history of airport security
history of airport security               history of airport security
history of airport security
 
Aviation Insurance
Aviation Insurance Aviation Insurance
Aviation Insurance
 
Maritime and Aviation security
Maritime and Aviation securityMaritime and Aviation security
Maritime and Aviation security
 

Viewers also liked

Water & Environment Magazine Feb 2005
Water & Environment Magazine Feb 2005Water & Environment Magazine Feb 2005
Water & Environment Magazine Feb 2005Matthew Walton-Knight
 
RE Journal Checkpoints December 2006
RE Journal Checkpoints December 2006RE Journal Checkpoints December 2006
RE Journal Checkpoints December 2006Matthew Walton-Knight
 
10 free ways to promote your book
10 free ways to promote your book10 free ways to promote your book
10 free ways to promote your bookDana Marton
 
20 Steps to Success
20 Steps to Success20 Steps to Success
20 Steps to SuccessDana Marton
 
Resume Presentation
Resume PresentationResume Presentation
Resume PresentationD'yani Wood
 
Presentation final
Presentation finalPresentation final
Presentation finalRoy Hibbert
 
Andromeda Loans
Andromeda LoansAndromeda Loans
Andromeda LoansP N Shetty
 
Laporan bahasa indonesia
Laporan bahasa indonesiaLaporan bahasa indonesia
Laporan bahasa indonesiaMiranti Amalla
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSVarinder Singh Walia
 

Viewers also liked (15)

Nrg presentation
Nrg presentationNrg presentation
Nrg presentation
 
Water & Environment Magazine Feb 2005
Water & Environment Magazine Feb 2005Water & Environment Magazine Feb 2005
Water & Environment Magazine Feb 2005
 
RE Journal Checkpoints December 2006
RE Journal Checkpoints December 2006RE Journal Checkpoints December 2006
RE Journal Checkpoints December 2006
 
10 free ways to promote your book
10 free ways to promote your book10 free ways to promote your book
10 free ways to promote your book
 
Tabung gas 3 kg
Tabung gas 3 kgTabung gas 3 kg
Tabung gas 3 kg
 
20 Steps to Success
20 Steps to Success20 Steps to Success
20 Steps to Success
 
Resume Presentation
Resume PresentationResume Presentation
Resume Presentation
 
Presentation final
Presentation finalPresentation final
Presentation final
 
My family
My familyMy family
My family
 
Andromeda Loans
Andromeda LoansAndromeda Loans
Andromeda Loans
 
Laporan bahasa indonesia
Laporan bahasa indonesiaLaporan bahasa indonesia
Laporan bahasa indonesia
 
Chemoprevention
ChemopreventionChemoprevention
Chemoprevention
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
 

Similar to Intersec January 2008

A TASK BASED information break down of COUNTERING UAV
A TASK BASED information break down of COUNTERING UAVA TASK BASED information break down of COUNTERING UAV
A TASK BASED information break down of COUNTERING UAVEdwin Hofte
 
UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019ChadCogan
 
The Imperative Need for Anti-UAV Systems in Port Security
The Imperative Need for Anti-UAV Systems in Port SecurityThe Imperative Need for Anti-UAV Systems in Port Security
The Imperative Need for Anti-UAV Systems in Port SecurityNovoQuad
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised finalbekahpars
 
Understanding the Need for Counter Unmanned Aircraft Systems
Understanding the Need for Counter Unmanned Aircraft SystemsUnderstanding the Need for Counter Unmanned Aircraft Systems
Understanding the Need for Counter Unmanned Aircraft SystemsNovoQuad
 
Transparent Armour Main Doc
Transparent Armour Main DocTransparent Armour Main Doc
Transparent Armour Main DocAdrian O' Dwyer
 
The Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
The Need for C-UAS: Protecting Critical Infrastructure from Drone IntrusionsThe Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
The Need for C-UAS: Protecting Critical Infrastructure from Drone IntrusionsNovoQuad
 
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docxMohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docxgilpinleeanna
 
Domestic drones – toys or dangerous air vehicles
Domestic drones – toys or dangerous air vehicles Domestic drones – toys or dangerous air vehicles
Domestic drones – toys or dangerous air vehicles MichaelIzquierdo
 
Establishments that Need Drone Safety More than Ever
Establishments that Need Drone Safety More than EverEstablishments that Need Drone Safety More than Ever
Establishments that Need Drone Safety More than EverNovoQuad
 
Regulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVsRegulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVsSireesh Pallikonda
 
Aircraft Design_Addressing Security Concerns
Aircraft Design_Addressing Security ConcernsAircraft Design_Addressing Security Concerns
Aircraft Design_Addressing Security ConcernsShalini Levens
 
From Tracker to Jammer - Navigating Drone Defense
From Tracker to Jammer - Navigating Drone DefenseFrom Tracker to Jammer - Navigating Drone Defense
From Tracker to Jammer - Navigating Drone DefenseNovoQuad
 
Logistic insurance ch4 aviation insurance
Logistic insurance ch4 aviation insuranceLogistic insurance ch4 aviation insurance
Logistic insurance ch4 aviation insuranceNarudh Cheramakara
 
Drone Threats in Building and Infrastructure Projects
Drone Threats in Building and Infrastructure ProjectsDrone Threats in Building and Infrastructure Projects
Drone Threats in Building and Infrastructure ProjectsNovoQuad
 
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market ReportsCounter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market ReportsDefense Report
 
Securing National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologySecuring National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologyNovoQuad
 
How Drone Guns Are Shaping the Future of Security
How Drone Guns Are Shaping the Future of SecurityHow Drone Guns Are Shaping the Future of Security
How Drone Guns Are Shaping the Future of SecurityNovoQuad
 

Similar to Intersec January 2008 (20)

A TASK BASED information break down of COUNTERING UAV
A TASK BASED information break down of COUNTERING UAVA TASK BASED information break down of COUNTERING UAV
A TASK BASED information break down of COUNTERING UAV
 
403 8
403 8403 8
403 8
 
UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019
 
The Imperative Need for Anti-UAV Systems in Port Security
The Imperative Need for Anti-UAV Systems in Port SecurityThe Imperative Need for Anti-UAV Systems in Port Security
The Imperative Need for Anti-UAV Systems in Port Security
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised final
 
Understanding the Need for Counter Unmanned Aircraft Systems
Understanding the Need for Counter Unmanned Aircraft SystemsUnderstanding the Need for Counter Unmanned Aircraft Systems
Understanding the Need for Counter Unmanned Aircraft Systems
 
Transparent Armour Main Doc
Transparent Armour Main DocTransparent Armour Main Doc
Transparent Armour Main Doc
 
The Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
The Need for C-UAS: Protecting Critical Infrastructure from Drone IntrusionsThe Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
The Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
 
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docxMohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
 
Domestic drones – toys or dangerous air vehicles
Domestic drones – toys or dangerous air vehicles Domestic drones – toys or dangerous air vehicles
Domestic drones – toys or dangerous air vehicles
 
Establishments that Need Drone Safety More than Ever
Establishments that Need Drone Safety More than EverEstablishments that Need Drone Safety More than Ever
Establishments that Need Drone Safety More than Ever
 
Regulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVsRegulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVs
 
Aircraft Design_Addressing Security Concerns
Aircraft Design_Addressing Security ConcernsAircraft Design_Addressing Security Concerns
Aircraft Design_Addressing Security Concerns
 
Luxury or Liability
Luxury or LiabilityLuxury or Liability
Luxury or Liability
 
From Tracker to Jammer - Navigating Drone Defense
From Tracker to Jammer - Navigating Drone DefenseFrom Tracker to Jammer - Navigating Drone Defense
From Tracker to Jammer - Navigating Drone Defense
 
Logistic insurance ch4 aviation insurance
Logistic insurance ch4 aviation insuranceLogistic insurance ch4 aviation insurance
Logistic insurance ch4 aviation insurance
 
Drone Threats in Building and Infrastructure Projects
Drone Threats in Building and Infrastructure ProjectsDrone Threats in Building and Infrastructure Projects
Drone Threats in Building and Infrastructure Projects
 
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market ReportsCounter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
 
Securing National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologySecuring National Events with Anti-Drone Technology
Securing National Events with Anti-Drone Technology
 
How Drone Guns Are Shaping the Future of Security
How Drone Guns Are Shaping the Future of SecurityHow Drone Guns Are Shaping the Future of Security
How Drone Guns Are Shaping the Future of Security
 

Intersec January 2008

  • 1. 16 intersecJanuary2008 A irport perimeters are typically protected by fences designed to delineate land ownership and dissuade pedestrian access. Chain-link fences of various types are most commonly used for long-perimeters due to their low unit cost, but chain- link fences present a delay to pedestrian attack that is measured in seconds, and no delay to a vehicle attack. This is why in October 2003 a Ford Mustang was able to drive through a double perimeter fence at San Diego International Airport in California and cross an active runway. Vehicles have been used as weapon systems for decades. One of the earliest examples was on 16 September 1920, when the Italian anarchist Mario Buda drove a horse-drawn cart-bomb to the corner of Wall Street and Broad Street in New York and detonated it outside the offices of J P Morgan, killing 40 people. Today in Iraq and elsewhere in the world, suicide car bombs will be used, as they have been almost daily since the euphoria of Iraq’s liberation subsided. Together with Mikhail Kalashnikov’s rifle, the suicide car bomb now appears to be the weapon of choice for the anti-democracy terrorist. Thankfully, since 11 September 2001, the risk of an aircraft being attacked by passengers from within the cabin has been significantly reduced, as too has the risk of an attack on passengers within an airport terminal building. Although the terminal building at Glasgow Airport was attacked by a vehicle in June 2007, its mitigation system was successful at defeating the vehicle and the only casualty was the terrorist himself. But little has been done to mitigate the risk posed by vehicles attacking an aircraft while on the ground or during those precarious moments during the take-off sequence. The reason for a lack of aircraft protection may not be the technical difficulty. Protecting the airport is the responsibility of the airport owner. Yet protecting an aircraft and its passengers is primarily the responsibility of the aircraft operator. Internationally, Annex 17 of the Convention on International Civil Aviation gives guidance on safeguarding civil aviation against acts In light of the 2007 attack on Glasgow airport, Matthew Walton-Knight suggests that the next generation of terrorist attacks on aircraft will be from ground vehicles UNDER SIEGE
  • 2. of unlawful interference. It requires governments to establish security programmes with their airport owners. In Europe, the European Civil Aviation Conference Document 30 Part Two guides the implementation of Europe- wide aviation security measures. In Britain, under both Common Law and Section Four of the Health and Safety at Work Act, airport owners have an obligation to provide – as far as reasonably practicable – safe premises for aircraft operations. But the cost of airport security in Britain is causing airport owners concern as, unlike road and rail security, airport security costs fall completely to airport owners. Terrorists have and will attack airports for they are high-value, target-rich environments – in March 1994 the Provisional Irish Republican Army (IRA) attacked London’s Heathrow Airport. Pragmatically, there are four attack scenarios in which a vehicle with – or even without – an explosive device could easily attack an aircraft on the ground at an airport. In the first scenario, a vehicle bomb detonates in the vicinity of a moving or stationary aircraft. A line of stationary, fuelled and fully-laden passenger aircraft queuing to take-off presents a most attractive target to a terrorist intent on generating mass casualties. Thankfully this attack scenario has not yet been realised, but the effect of a close proximity detonation of even a small vehicle bomb on an aircraft would be catastrophic. In the second scenario, a vehicle could strike an aircraft where the particularly vulnerable components are: the undercarriage to trip-up the aircraft, or the engines to initiate a fire. In October 2000, a Singapore Airlines Boeing 747 was taking off from Taipei Airport in Taiwan and struck stationary construction equipment and vehicles, killing 83 people on-board. An aircraft could also potentially swerve off the runway to avoid an attack vehicle. In July 2006, a Russian S7 Airbus A-310 skidded off the runway at Irkutsk Airport in Siberia and struck a building, killing 124 people on-board. Another hypothetical scenario could see an aircraft attempting to avoid a vehicle strike but hit debris – deliberately placed or not – from an attack vehicle. In July 2000, an Air France Concorde taking off from Paris Charles de Gaulle Airport struck a small item of debris on the runway that was thrown-up, punctured a fuel tank and caused a fire. The aircraft crashed minutes later, killing all 109 people on aboard. Accepting that aircraft are highly vulnerable to terrorist attack when on the ground, there is much that can be done to mitigate this risk. But in order to progress, two principles must be acknowledged. Firstly, once an attack vehicle is within the secure airside perimeter of an airport, little can be done to restrain it. Airports are designed to give near complete freedom of movement for vehicles airside in order to allow aircraft movement and emergency response. Short of a significant armed engagement, effectively nothing can stop an attack vehicle once it is airside. The vehicle must be stopped prior to penetrating the airside perimeter. Secondly, the focus of any perimeter security system must be on the terrorist attacker, not on the security system. Many manufacturers promote impressive perimeter security systems, but this can easily move the focus away from the terrorist attacker to the security system. Sun Tzu reminds us that, “If you know yourself and your enemy, then you need not fear the result of a hundred battles; if you know yourself but not the enemy, for every victory you will suffer a defeat.” In counter-terrorism, one defeat is one too many; the focus must remain on the terrorist attacker, not on the security system, to ensure “no defeats”. By focusing on the perimeter security system and not on the attacker, defences can easily become out of balance, in that they give differing levels of residual risk along the perimeter – the proverbial robust front gate but undefended tradesman’s entrance. This either provides a weakness that can be exploited by terrorists, or leads to uneconomic defences through the overprovision of protection in some areas. An ideal perimeter protective system should deliver similar levels of residual risk throughout its entire length. Halting an attack vehicle at the perimeter is difficult. Vehicles are able to breach many obstacles, especially when they are driven by determined terrorists with no intention of escape or indeed of their own survival. This means that the spectrum of risk mitigation solutions is limited, but still includes some fences, blocks, bollards, walls and ditches. But the perimeter engineering solution is only an element, one layer in the perimeter defences of an airport – all obstacles can be breached, given adequate time and resources. Securing a perimeter is not just a process of placing fences and barriers, nor of adding intruder detection systems and cameras to an existing perimeter fence. It involves the application of a methodology that allows the security team to understand – and ideally to adopt – the mindset of the terrorist attacker. Few outside the army or security services are educated to conceptualise in this manner and consequently there is value in using a military-style methodology for long- ©GettyImages 17 intersecJanuary2008
  • 3. PEER REVIEW Eric Yap A qualification should be made on the airport perimeter security issue. While it is true that airport perimeters are generally protected by chain-link fences that are often complemented by several other layers of security (both passive and active systems) that need not necessarily be conspicuous. This is particularly true for major aviation centers which would naturally be high on value to terror groups. Examples of such airports in Asia would be Hong Kong International Airport, Kuala Lumpur International Airport and Singapore’s Changi Airport. My take is that terror groups have easier options to explore within an airport context than to penetrate through highly visible defences. Passenger terminals offer an extremely attractive target and like subways, it is almost impossible to check very person without bringing the system to a standstill. perimeter security. Airports are inviting high-value target-rich environments. If attacked they would give terrorists extensive media coverage, considerable political leverage and, depending on the strategy, potentially massive loss of life. There would also be significant financial and business continuity implications. Unquestionably, an attack on an airport would achieve the purpose of terrorism – to terrorise. Mitigation of the risk posed by a vehicle attack on an aircraft while on the ground at an airport should be a priority. It is the logical next form of terrorist attack our air transportation networks will face. Although the primary onus lies with aircraft operators, airport owners have an obligation to ensure their airports are safe and secure. Effective mitigation strategies will focus on defeating the terrorist attacker at or before he penetrates the airside perimeter, rather than on constructing potentially nugatory perimeter security systems. Attack vehicles must be prevented from penetrating the perimeter, for once inside their effect would be catastrophic. A vehicle attack would be highly effective for a terrorist and, with the perimeter defences currently found on most airports, it is easy to achieve. Regrettably, unless aircraft operators and airport owners are more proactive at risk mitigation, a vehicle attack on an aircraft at an airport is now just a matter of time. intersecJanuary2008 18 i UNDER SIEGE The 2007 Glasgow Airport attack was thwarted by effective perimeter security but the threat remains ©GettyImages Matthew Walton-Knight CEng PMP works for MMM Group in Vancouver, Canada. He previously served in the British Army’s Corps of Royal Engineers and worked for Arup Security Consulting. If you have any questions or comments about this article, please email us: comment@intersec.co.uk