SlideShare a Scribd company logo
Chapter Eight: Countermeasures
New technologies and new procedures for
executing effective countermeasures are
diverse. Some are very cost effective and
some are purely for psychological effect.
The utility of a particular measure should
be subject to appropriate risk assessment
criteria.
Remote Controlled Aircraft
The government acknowledged immediately after 9/11 that the government
would indeed consider all kinds of technology, including methods to enable
air traffic controllers to take over control of distressed aircraft and to be able
to land aircraft by remote control. Pilots, accurately pointing out a potential
vulnerability, have expressed concern over potential terrorist ability to gain
access to the controllers on the ground. This idea proposes to create a system
that takes control of the aircraft away from its pilot remotely. The security
measures to keep airplane-based hackers out would also keep the pilot from
regaining control of his aircraft. This opens up an avenue for attack that does
not currently exist. If someone could turn several jets into cruise missiles
simultaneously and remotely, there would be a lot of money in finding a way
to exploit it. The idea of a panic button is more realistic. Remote control
would be a good thing if the pilot took a deliberate action to permanently
(until replacement of components was completed) relinquish control of the
aircraft.
Arming Cargo Pilots
Cargo pilots will now also be permitted to carry
weapons under new legislation that closes a
loophole in the Homeland Security Act. Cargo
airlines generally oppose the idea of their pilots
being armed. Steve Alterman, president of the
Cargo Airline Association, said the 13 all-cargo
airlines that comprise his group do not want
their pilots to be allowed to participate in the
armed pilots program. "We believe that
programs for securing the aircraft and
screening each and every person attempting to
board the aircraft provide the best means of
defense against hijackers," Alterman said
Container Hardening
As early as 1993, Congress asked the FAA to study and
report on different types of technology designed to
protect aircraft against certain explosives. Even prior
to that, the aircraft hardening program had been
started in 1991. The overall purpose of the project
was to create systems, that would protect commercial
aircraft from catastrophic structural damage or critical
system failure due to in-flight explosions. Secondary
objectives are to investigate vulnerability from some
spurious electromagnetic or high-energy signal
interfering with aircraft electronic systems and to
assess the threat presented by manually operated
highly mobile, surface-to-air missiles.
The program is designed to determine and identify:
(1) the minimum amount of explosives that will result
in aircraft loss; (2) the methods and techniques that
can be applied to the current and future fleets of
commercial aircraft to increase the level of
vulnerability to explosive effects; and (3) the threat to
aircraft from electromagnetic (EM), projected energy,
and surface-to-air missiles and practical
countermeasures. One estimate from the Air
Transport Association projects that such containers
would cost airlines $5 billion a year. Additionally, the
containers are only available for wide-body aircraft,
which includes only 25% of the aircraft in service.
Computer Assisted Passenger Prescreening Systems
(CAPPS II)/Secure Flight
in 1998, the Federal Aviation Administration (FAA)
implemented the Computer Assisted Passenger Prescreening
System (CAPPS) to enable air carriers to separate passengers
into two categories: those who require additional security
scrutiny (“selectees”) and those who do not. CAPPS used
information from the passenger’s itinerary to search for certain
behavioral characteristics determined by the FAA (and now by
the Transportation Security Administration) to indicate a higher
security risk. A passenger’s selectee status was transmitted to
the check-in counter, where a code is printed on the boarding
pass of any passenger determined to require additional
screening. At the screening checkpoint, passengers who are
selectees were subject to additional security measures. CAPPS
II was the follow on system.
All of these systems rely on a Passenger Name Record.
When a passenger books a plane ticket, certain
identifying information is collected. This information
is used to check against some data store (i.e., a TSA
No-Fly list, the FBI ten most wanted fugitive list, etc.)
and assign a terrorism "risk score" to that person.
CAPPS II was cancelled by the TSA in the summer of
2004. Shortly thereafter, the TSA announced a
successor program, called Secure Flight that would
work much the same as CAPPS II. TSA hoped to test
Secure Flight in August 2005 using two airlines. In
February of 2006 Secure Flight was cancelled for being
potentially insecure
Shoulder-Fired Missiles
Individual planes could be equipped with defense
mechanisms against missile attacks. Many military
aircraft and some commercial planes such as El Al, the
Israeli airline, have the capacity to use flares and
advanced technology to divert incoming missiles.
Although current options for such defense are
inordinately expensive given the level of the threat,
submitting a request for such technology to the open
market could yield less costly and more accessible
defense options. The technology for such a defense
already exists and effective diversion mechanisms for
commercial planes need not be as robust as those for
military aircraft (possibly costing as little as $200 per
plane). A priority for such defense efforts should be
high-threat, high-density airports.
Advanced technology to divert
incoming missiles
After 9/11, the U.S. Department of Transportation chartered an
industry team to make recommendations to improve aircraft
security. One of those recommendations was to reinforce cockpit
doors in order to deny access from intruders. Modifications have
been completed on the door of all U.S. airliners and the doors on
international carriers that serve the U.S. The Rapid Response
Team has concluded that:
Some appropriate flight deck barrier device must be approved
and installed in the entire U.S. fleet and future design of flight
deck doors must meet newly determined requirements.
Procedural changes must be made at all airlines regarding
identification and access of all personnel to the flight deck.
Airline industry, unions, and FAA should redesign security
training with possible implementation of defensive capabilities
to address newly identified threats, incorporate changes into the
annual curriculum, and provide security training to all crew
members.
Each airline, in cooperation with the FAA or other government
entities, must develop a delivery system to provide government
security advisories to crew members in a timely manner.
A task force should determine the necessary modifications to
assure continuous transmission of a transponder signal.
All airlines, pilots, and the FAA should jointly identify procedures
in pilot training that could be adapted in an attempted hijacking.
Anti-sniper Measures
Wiretapping
It is simply important to remember that:
It is very easy for a terrorist to access transportation facility phone wires
Even an amateur can easily bug or tap a phone line
An eavesdropper does not have to get close to the target to tap the line
Managers have a serious false sense of security about the phone and
related wiring
Telephone lines are extremely vulnerable to eavesdropping
It's very difficult to find a bug or wiretap on a phone line
Detection requires an expert knowledge of telephones and electronics
Communication is critical to all modes of transportation and some serious
thought needs to be addressed towards the terrorists potential ability to tap
into this huge source of information from unprotected systems.
Global Positioning Threats
The U.S. Department of Transportation has for years
been investigating hackers intent on knocking out or
distorting positioning data from the Global Positioning
System. The Volpe National Transportation Center
made an intensive study into the threats to systems
that receive GPS signals from the Defense
Department’s 28-satellite constellation. The first
portion of the study was completed in July 1999. They
documented the threats from interference to GPS
systems for railroad, maritime, aviation, and
intelligent transportation system users. The second
part of the study concentrated on how to protect the
systems.
Ballistics
There is no such thing as bullet proof. A
ballistic or bullet resistant material is
designed to resist penetration from
specific types, calibers, and velocities of
ballistic threats. Variations of personal
protection clothing can be purchased
which suit the needs of law enforcement,
the military, explosion disposal teams,
and heads of security, as well as
vulnerable transportation officials
The Federal Air Marshal Program currently has its training
facility and airline security research facility located at the
Williams J. Hughes Airport and now falls under the purview of
the new Transportation Security Administration (TSA: 49 CFR
Chapter XII Part 1544.223). Using a wall full of computer
generated maps, the TSA tracks the flight path of each flight
with an air marshal on board and supporting documents
indicate the travel schedule of each marshal. They currently
employ 45,000 people and are financed with a $4 billion
supplemental spending bill from Congress. The agents receive
special training and regularly travel on U.S. air carriers on high-
risk routes. Additionally, as federal agents, they are permitted
to make arrests without a warrant when certain felony offenses
against the United States can be reasonably shown to have
been or are being committed. The Federal Air Marshal Program
is administered by the Transportation Security Administration
(TSA).
Federal Air
Marshals
Describe the advantages and disadvantages
of installing anti-terrorist technology on
transportation assets.

More Related Content

What's hot

Accessible Air Travel
Accessible Air TravelAccessible Air Travel
Accessible Air Travel
guest4bb5b3
 
Chpt 5 commercial airport avsec
Chpt 5 commercial airport avsecChpt 5 commercial airport avsec
Chpt 5 commercial airport avsec
carlinclarke
 
Border security
Border securityBorder security
Border securityWebmaster
 
Drone Lobby Presentation
Drone Lobby PresentationDrone Lobby Presentation
Drone Lobby Presentationlhfang
 
General Aviation Security
General Aviation SecurityGeneral Aviation Security
General Aviation Security
ERAUWebinars
 
Farnborough International Airshow 2018 case study
Farnborough International Airshow 2018 case studyFarnborough International Airshow 2018 case study
Farnborough International Airshow 2018 case study
❈Derek Robinson
 
SANKEY THESIS 28MAY2014
SANKEY THESIS 28MAY2014SANKEY THESIS 28MAY2014
SANKEY THESIS 28MAY2014James Sankey
 
Air law 2012
Air law 2012   Air law 2012
Air law 2012
Nouran Ziad
 
New airport passenger screening technologies tate
New airport passenger screening technologies tateNew airport passenger screening technologies tate
New airport passenger screening technologies tateLeishman Associates
 
Civil Aviation Conventions
Civil Aviation ConventionsCivil Aviation Conventions
Civil Aviation ConventionsJio Gayon
 
Carolina Rius Alarco - liabilities and automation in aviation - rpas
Carolina Rius Alarco - liabilities and automation in aviation - rpasCarolina Rius Alarco - liabilities and automation in aviation - rpas
Carolina Rius Alarco - liabilities and automation in aviation - rpas
ALIAS Network
 
Drones and The Practice of Real Estate
Drones and The Practice of Real EstateDrones and The Practice of Real Estate
Drones and The Practice of Real Estate
Jillayne Schlicke
 
AirportSecurityPlan
AirportSecurityPlanAirportSecurityPlan
AirportSecurityPlan
AiDY
 
Air regulation lecture notes
Air regulation lecture notesAir regulation lecture notes
Air regulation lecture notes
nambirajan33
 
Safety & Security Airports comparison
Safety & Security Airports comparisonSafety & Security Airports comparison
Safety & Security Airports comparison
Amidee Azizan Stringfellow
 
Chicago convention
Chicago conventionChicago convention
Chicago convention
sasa0220
 

What's hot (20)

Accessible Air Travel
Accessible Air TravelAccessible Air Travel
Accessible Air Travel
 
Chpt 5 commercial airport avsec
Chpt 5 commercial airport avsecChpt 5 commercial airport avsec
Chpt 5 commercial airport avsec
 
Airline security new
Airline security newAirline security new
Airline security new
 
Border security
Border securityBorder security
Border security
 
Drone Lobby Presentation
Drone Lobby PresentationDrone Lobby Presentation
Drone Lobby Presentation
 
General Aviation Security
General Aviation SecurityGeneral Aviation Security
General Aviation Security
 
Farnborough International Airshow 2018 case study
Farnborough International Airshow 2018 case studyFarnborough International Airshow 2018 case study
Farnborough International Airshow 2018 case study
 
SANKEY THESIS 28MAY2014
SANKEY THESIS 28MAY2014SANKEY THESIS 28MAY2014
SANKEY THESIS 28MAY2014
 
Air law 2012
Air law 2012   Air law 2012
Air law 2012
 
New airport passenger screening technologies tate
New airport passenger screening technologies tateNew airport passenger screening technologies tate
New airport passenger screening technologies tate
 
AB 239 Final Presentation
AB 239 Final PresentationAB 239 Final Presentation
AB 239 Final Presentation
 
Working paper icao
Working paper icaoWorking paper icao
Working paper icao
 
Civil Aviation Conventions
Civil Aviation ConventionsCivil Aviation Conventions
Civil Aviation Conventions
 
Carolina Rius Alarco - liabilities and automation in aviation - rpas
Carolina Rius Alarco - liabilities and automation in aviation - rpasCarolina Rius Alarco - liabilities and automation in aviation - rpas
Carolina Rius Alarco - liabilities and automation in aviation - rpas
 
Drones and The Practice of Real Estate
Drones and The Practice of Real EstateDrones and The Practice of Real Estate
Drones and The Practice of Real Estate
 
AirportSecurityPlan
AirportSecurityPlanAirportSecurityPlan
AirportSecurityPlan
 
NLC Drone Report
NLC Drone ReportNLC Drone Report
NLC Drone Report
 
Air regulation lecture notes
Air regulation lecture notesAir regulation lecture notes
Air regulation lecture notes
 
Safety & Security Airports comparison
Safety & Security Airports comparisonSafety & Security Airports comparison
Safety & Security Airports comparison
 
Chicago convention
Chicago conventionChicago convention
Chicago convention
 

Similar to 403 8

Aviation Oversight Essays
Aviation Oversight EssaysAviation Oversight Essays
Aviation Oversight Essays
Camella Taylor
 
275Terrorism, Airport Security, and the Private Sector.docx
275Terrorism, Airport Security, and the Private Sector.docx275Terrorism, Airport Security, and the Private Sector.docx
275Terrorism, Airport Security, and the Private Sector.docx
vickeryr87
 
The Federal Aviation Administration Should Not Shut Down...
The Federal Aviation Administration Should Not Shut Down...The Federal Aviation Administration Should Not Shut Down...
The Federal Aviation Administration Should Not Shut Down...
Cindy Wooten
 
UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019
ChadCogan
 
Chapter 10Air CargoThis chapter examines issu
 Chapter 10Air CargoThis chapter examines issu Chapter 10Air CargoThis chapter examines issu
Chapter 10Air CargoThis chapter examines issu
MargaritoWhitt221
 
Foqa good one
Foqa good oneFoqa good one
Foqa good one
hegdehegde
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_video
OWASP Delhi
 
Chapter 9General Aviation Airport SecurityThis
 Chapter 9General Aviation Airport SecurityThis  Chapter 9General Aviation Airport SecurityThis
Chapter 9General Aviation Airport SecurityThis
MargaritoWhitt221
 
Mahmoud Alhujayri Professor WesemannAV 4720 03172017.docx
Mahmoud Alhujayri Professor WesemannAV 4720 03172017.docxMahmoud Alhujayri Professor WesemannAV 4720 03172017.docx
Mahmoud Alhujayri Professor WesemannAV 4720 03172017.docx
smile790243
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam
MerrileeDelvalle969
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised finalbekahpars
 
A monte carlo simulation for evaluating airborne collision risk in intersecti...
A monte carlo simulation for evaluating airborne collision risk in intersecti...A monte carlo simulation for evaluating airborne collision risk in intersecti...
A monte carlo simulation for evaluating airborne collision risk in intersecti...
MEHenry
 
Security Aspects in Aviation Sector
Security Aspects in Aviation SectorSecurity Aspects in Aviation Sector
Security Aspects in Aviation Sector
Sanjeev Sinha PMI-PBA®, CSM®
 
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docxMohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
gilpinleeanna
 
The Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
The Need for C-UAS: Protecting Critical Infrastructure from Drone IntrusionsThe Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
The Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
NovoQuad
 
Lancaster_SFTY330_Paper_Final
Lancaster_SFTY330_Paper_FinalLancaster_SFTY330_Paper_Final
Lancaster_SFTY330_Paper_FinalAaron Lancaster
 
Chapter 4The Role of Government in Aviation Securit
 Chapter 4The Role of Government in Aviation Securit Chapter 4The Role of Government in Aviation Securit
Chapter 4The Role of Government in Aviation Securit
MargaritoWhitt221
 
6 john walker
6 john walker6 john walker
6 john walker
MaMLoOo7
 

Similar to 403 8 (20)

Aviation Oversight Essays
Aviation Oversight EssaysAviation Oversight Essays
Aviation Oversight Essays
 
275Terrorism, Airport Security, and the Private Sector.docx
275Terrorism, Airport Security, and the Private Sector.docx275Terrorism, Airport Security, and the Private Sector.docx
275Terrorism, Airport Security, and the Private Sector.docx
 
The Federal Aviation Administration Should Not Shut Down...
The Federal Aviation Administration Should Not Shut Down...The Federal Aviation Administration Should Not Shut Down...
The Federal Aviation Administration Should Not Shut Down...
 
UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019
 
Chapter 10Air CargoThis chapter examines issu
 Chapter 10Air CargoThis chapter examines issu Chapter 10Air CargoThis chapter examines issu
Chapter 10Air CargoThis chapter examines issu
 
Foqa good one
Foqa good oneFoqa good one
Foqa good one
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_video
 
Chapter 9General Aviation Airport SecurityThis
 Chapter 9General Aviation Airport SecurityThis  Chapter 9General Aviation Airport SecurityThis
Chapter 9General Aviation Airport SecurityThis
 
Mahmoud Alhujayri Professor WesemannAV 4720 03172017.docx
Mahmoud Alhujayri Professor WesemannAV 4720 03172017.docxMahmoud Alhujayri Professor WesemannAV 4720 03172017.docx
Mahmoud Alhujayri Professor WesemannAV 4720 03172017.docx
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam
 
Intersec January 2008
Intersec January 2008Intersec January 2008
Intersec January 2008
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised final
 
A monte carlo simulation for evaluating airborne collision risk in intersecti...
A monte carlo simulation for evaluating airborne collision risk in intersecti...A monte carlo simulation for evaluating airborne collision risk in intersecti...
A monte carlo simulation for evaluating airborne collision risk in intersecti...
 
Security Aspects in Aviation Sector
Security Aspects in Aviation SectorSecurity Aspects in Aviation Sector
Security Aspects in Aviation Sector
 
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docxMohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
Mohammad AlghamdiUtah State UniversityENGL-2010Safety in Avi.docx
 
The Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
The Need for C-UAS: Protecting Critical Infrastructure from Drone IntrusionsThe Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
The Need for C-UAS: Protecting Critical Infrastructure from Drone Intrusions
 
Aviation-Drones AJG
Aviation-Drones AJGAviation-Drones AJG
Aviation-Drones AJG
 
Lancaster_SFTY330_Paper_Final
Lancaster_SFTY330_Paper_FinalLancaster_SFTY330_Paper_Final
Lancaster_SFTY330_Paper_Final
 
Chapter 4The Role of Government in Aviation Securit
 Chapter 4The Role of Government in Aviation Securit Chapter 4The Role of Government in Aviation Securit
Chapter 4The Role of Government in Aviation Securit
 
6 john walker
6 john walker6 john walker
6 john walker
 

More from Doing What I Do

Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
Doing What I Do
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
Doing What I Do
 
403 10
403 10403 10
403 14
403 14403 14
403 12
403 12403 12
403 11
403 11403 11
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
Doing What I Do
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
Doing What I Do
 
Chapter 10 oversight and accountability 1
Chapter 10  oversight and accountability 1Chapter 10  oversight and accountability 1
Chapter 10 oversight and accountability 1
Doing What I Do
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
Doing What I Do
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
Doing What I Do
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
Doing What I Do
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
Doing What I Do
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
Doing What I Do
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligence
Doing What I Do
 

More from Doing What I Do (20)

Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
403 10
403 10403 10
403 10
 
403 14
403 14403 14
403 14
 
403 12
403 12403 12
403 12
 
403 2
403 2403 2
403 2
 
403 11
403 11403 11
403 11
 
403 9
403 9403 9
403 9
 
403 4
403 4403 4
403 4
 
403 1
403 1403 1
403 1
 
Tsa's positive 1
Tsa's positive 1Tsa's positive 1
Tsa's positive 1
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
Chapter 10 oversight and accountability 1
Chapter 10  oversight and accountability 1Chapter 10  oversight and accountability 1
Chapter 10 oversight and accountability 1
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligence
 

Recently uploaded

The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
Mohammed325561
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
uptheratios
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
ahcitycouncil
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
Counting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptxCounting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptx
Revenue Department Kerala State
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
Canadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key SlidesCanadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key Slides
Andrew Griffith
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 

Recently uploaded (20)

The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
Counting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptxCounting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptx
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
Canadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key SlidesCanadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key Slides
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 

403 8

  • 2. New technologies and new procedures for executing effective countermeasures are diverse. Some are very cost effective and some are purely for psychological effect. The utility of a particular measure should be subject to appropriate risk assessment criteria.
  • 4. The government acknowledged immediately after 9/11 that the government would indeed consider all kinds of technology, including methods to enable air traffic controllers to take over control of distressed aircraft and to be able to land aircraft by remote control. Pilots, accurately pointing out a potential vulnerability, have expressed concern over potential terrorist ability to gain access to the controllers on the ground. This idea proposes to create a system that takes control of the aircraft away from its pilot remotely. The security measures to keep airplane-based hackers out would also keep the pilot from regaining control of his aircraft. This opens up an avenue for attack that does not currently exist. If someone could turn several jets into cruise missiles simultaneously and remotely, there would be a lot of money in finding a way to exploit it. The idea of a panic button is more realistic. Remote control would be a good thing if the pilot took a deliberate action to permanently (until replacement of components was completed) relinquish control of the aircraft.
  • 6. Cargo pilots will now also be permitted to carry weapons under new legislation that closes a loophole in the Homeland Security Act. Cargo airlines generally oppose the idea of their pilots being armed. Steve Alterman, president of the Cargo Airline Association, said the 13 all-cargo airlines that comprise his group do not want their pilots to be allowed to participate in the armed pilots program. "We believe that programs for securing the aircraft and screening each and every person attempting to board the aircraft provide the best means of defense against hijackers," Alterman said
  • 8. As early as 1993, Congress asked the FAA to study and report on different types of technology designed to protect aircraft against certain explosives. Even prior to that, the aircraft hardening program had been started in 1991. The overall purpose of the project was to create systems, that would protect commercial aircraft from catastrophic structural damage or critical system failure due to in-flight explosions. Secondary objectives are to investigate vulnerability from some spurious electromagnetic or high-energy signal interfering with aircraft electronic systems and to assess the threat presented by manually operated highly mobile, surface-to-air missiles.
  • 9. The program is designed to determine and identify: (1) the minimum amount of explosives that will result in aircraft loss; (2) the methods and techniques that can be applied to the current and future fleets of commercial aircraft to increase the level of vulnerability to explosive effects; and (3) the threat to aircraft from electromagnetic (EM), projected energy, and surface-to-air missiles and practical countermeasures. One estimate from the Air Transport Association projects that such containers would cost airlines $5 billion a year. Additionally, the containers are only available for wide-body aircraft, which includes only 25% of the aircraft in service.
  • 10. Computer Assisted Passenger Prescreening Systems (CAPPS II)/Secure Flight
  • 11. in 1998, the Federal Aviation Administration (FAA) implemented the Computer Assisted Passenger Prescreening System (CAPPS) to enable air carriers to separate passengers into two categories: those who require additional security scrutiny (“selectees”) and those who do not. CAPPS used information from the passenger’s itinerary to search for certain behavioral characteristics determined by the FAA (and now by the Transportation Security Administration) to indicate a higher security risk. A passenger’s selectee status was transmitted to the check-in counter, where a code is printed on the boarding pass of any passenger determined to require additional screening. At the screening checkpoint, passengers who are selectees were subject to additional security measures. CAPPS II was the follow on system.
  • 12. All of these systems rely on a Passenger Name Record. When a passenger books a plane ticket, certain identifying information is collected. This information is used to check against some data store (i.e., a TSA No-Fly list, the FBI ten most wanted fugitive list, etc.) and assign a terrorism "risk score" to that person. CAPPS II was cancelled by the TSA in the summer of 2004. Shortly thereafter, the TSA announced a successor program, called Secure Flight that would work much the same as CAPPS II. TSA hoped to test Secure Flight in August 2005 using two airlines. In February of 2006 Secure Flight was cancelled for being potentially insecure
  • 14.
  • 15.
  • 16.
  • 17. Individual planes could be equipped with defense mechanisms against missile attacks. Many military aircraft and some commercial planes such as El Al, the Israeli airline, have the capacity to use flares and advanced technology to divert incoming missiles. Although current options for such defense are inordinately expensive given the level of the threat, submitting a request for such technology to the open market could yield less costly and more accessible defense options. The technology for such a defense already exists and effective diversion mechanisms for commercial planes need not be as robust as those for military aircraft (possibly costing as little as $200 per plane). A priority for such defense efforts should be high-threat, high-density airports.
  • 18. Advanced technology to divert incoming missiles
  • 19. After 9/11, the U.S. Department of Transportation chartered an industry team to make recommendations to improve aircraft security. One of those recommendations was to reinforce cockpit doors in order to deny access from intruders. Modifications have been completed on the door of all U.S. airliners and the doors on international carriers that serve the U.S. The Rapid Response Team has concluded that: Some appropriate flight deck barrier device must be approved and installed in the entire U.S. fleet and future design of flight deck doors must meet newly determined requirements. Procedural changes must be made at all airlines regarding identification and access of all personnel to the flight deck.
  • 20. Airline industry, unions, and FAA should redesign security training with possible implementation of defensive capabilities to address newly identified threats, incorporate changes into the annual curriculum, and provide security training to all crew members. Each airline, in cooperation with the FAA or other government entities, must develop a delivery system to provide government security advisories to crew members in a timely manner. A task force should determine the necessary modifications to assure continuous transmission of a transponder signal. All airlines, pilots, and the FAA should jointly identify procedures in pilot training that could be adapted in an attempted hijacking.
  • 21.
  • 23.
  • 25. It is simply important to remember that: It is very easy for a terrorist to access transportation facility phone wires Even an amateur can easily bug or tap a phone line An eavesdropper does not have to get close to the target to tap the line Managers have a serious false sense of security about the phone and related wiring Telephone lines are extremely vulnerable to eavesdropping It's very difficult to find a bug or wiretap on a phone line Detection requires an expert knowledge of telephones and electronics Communication is critical to all modes of transportation and some serious thought needs to be addressed towards the terrorists potential ability to tap into this huge source of information from unprotected systems.
  • 27. The U.S. Department of Transportation has for years been investigating hackers intent on knocking out or distorting positioning data from the Global Positioning System. The Volpe National Transportation Center made an intensive study into the threats to systems that receive GPS signals from the Defense Department’s 28-satellite constellation. The first portion of the study was completed in July 1999. They documented the threats from interference to GPS systems for railroad, maritime, aviation, and intelligent transportation system users. The second part of the study concentrated on how to protect the systems.
  • 29. There is no such thing as bullet proof. A ballistic or bullet resistant material is designed to resist penetration from specific types, calibers, and velocities of ballistic threats. Variations of personal protection clothing can be purchased which suit the needs of law enforcement, the military, explosion disposal teams, and heads of security, as well as vulnerable transportation officials
  • 30.
  • 31.
  • 32. The Federal Air Marshal Program currently has its training facility and airline security research facility located at the Williams J. Hughes Airport and now falls under the purview of the new Transportation Security Administration (TSA: 49 CFR Chapter XII Part 1544.223). Using a wall full of computer generated maps, the TSA tracks the flight path of each flight with an air marshal on board and supporting documents indicate the travel schedule of each marshal. They currently employ 45,000 people and are financed with a $4 billion supplemental spending bill from Congress. The agents receive special training and regularly travel on U.S. air carriers on high- risk routes. Additionally, as federal agents, they are permitted to make arrests without a warrant when certain felony offenses against the United States can be reasonably shown to have been or are being committed. The Federal Air Marshal Program is administered by the Transportation Security Administration (TSA).
  • 34. Describe the advantages and disadvantages of installing anti-terrorist technology on transportation assets.