Chapter 9
General Aviation Airport Security
This chapter examines potential security threats to general aviation (GA) airports and flight operations. Strategies for protecting GA airports and aircraft are provided and an overview of changes in aviation security that affected GA operations after 9/11. You will learn about challenges to developing and implementing security regulations for GA airports. We also discuss the security strategies used by the Transportation Security Administration (TSA) and various GA airport and aircraft operators.
*
Introduction
Since 9/11, the general aviation community has struggled to help the public understand the nature of GA.
General aviation aircraft have long been used as platforms to smuggle narcotics and weapons, and for human trafficking operations.
In 1993, the FBI indicated that Osama bin Laden assessed the possibility of using an agricultural aircraft to spread a chemical agent on a ground target.
GA provides vital services to the United States and greatly enhances the U.S. economy. GA accounts for some 77% of all flights in the United States. With more than 200,000 aircraft, 650,000 pilots, and 19,000 airports and landing strips, the GA industry provides jobs and opportunities for thousands of people.
*
The Nature of GA Flight Operations
GA 3/4 of all takeoffs/landing in US
$100 billion to US economy
1.3 million jobs
GA provides vital services to the United States and greatly enhances the U.S. economy. Approximately 24% of all GA flights are conducted for business or corporate use nearly two-thirds of all business flights carry passengers in mid-level management positions, sales representatives, and project teams for major corporations.
GA accounts for three-quarters of all takeoffs and landings in the United States, contributes about $100 billion to the U.S economy, and has about 1.3 million jobs.
These estimates do not include multipliers, such as the number of jobs created by the hotel, rental car, restaurant, and tourist industries. The creation of GA security policies is important to protect these interests.
*
Securing General Aviation
5,000 GA airports in US
14,000 private airstrips
Securing general aviation is challenging considering the magnitude and nature of GA operations. There are approximately 450 commercial service airports in the United States and more than 5,000 GA airports. Those 14,000 airports are not regulated by the Federal Aviation Administration (FAA) or the TSA.
*
Practical Aviation Security – Chapter 9
Securing General Aviation
Issues to consider:
What is the threat to GA airports and aircraft?
What is the threat to public or infrastructure from GA aircraft?
What security measures should be required or recommended to prevent both of the aforementioned threats from occurring?
Most GA aircraft are too light to be used as a platform for conventional explosives and heightened vigilance by GA airport and aircraft operators would make it ...
Unmanned Aircraft Systems (UAS) pose an increasing threat to the aviation sector due to the rapid proliferation of the technology into civilian hands. UAS can be weaponized by malicious actors, while non-malicious UAS operators may inadvertently interfere with aviation-related activities. There have been numerous aviation-related incidents involving UAS in recent years.
Mahmoud Alhujayri Professor WesemannAV 4720 03172017.docxsmile790243
Mahmoud Alhujayri
Professor Wesemann
AV 4720
03/17/2017
Article Analysis 3
The article titled Safety Regulation: Crackdown on Fatigue authored and published by Flight Safety Foundation on its website on 7th April 2011 describes one of the flight safety rules established by the U.S. Federal Aviation Administration (FAA) recently. As explained in the article, the FAA established the rule in response to recommendations made by the National Transportation Safety Board (NTSB) after the Aloha airline flight 243 incident. The incident, which occurred on April 28, 1988, involved Boeing 737-200 that was operated and owned by Aloha Airlines Inc. The aircraft was heading to Honolulu from Hilo in Hawaii when it experienced structural failure and explosive decompression. Consequently, the aircraft made an emergency landing on the ground. On board were six crew members and 89 passengers (Flight Safety Foundation, 2011). Although the aircraft was damaged, only one crew member died. Seven passengers and one crew member sustained serious injuries. After investigations, it was noted that accident was caused by the failure by the aircraft's maintenance program to detect fatigue. Eventually, the fatigue led to widespread fatigue damage (WFD). As explained in the article authored by the flight safety foundation, the NTSB made a recommendation to the FAA to ensure that aircraft have effective maintenance programs and to make continuous surveillance of those programs. In response, the FAA made a rule that requiring the establishment of an inspection program for airplanes of transport category (Flight Safety Foundation, 2011). The program was meant to determine the probability of WFD occurring before “limit of validity” (LOV). The article also contains brief information about other aircrafts that have been damaged by WFD and an explanation of how LOV would be determined.
The content of the article is related to the topic of flight safety since it concentrates on the step that was taken by FAA to enhance aviation safety through conducting a thorough inspection of aircrafts to determine whether they are at the risk of getting damaged by WFD before the end of their LOV. Applying the rule would help to reduce accidents that are caused by WFD. Despite the fact that the article is very relevant, it does not cover many things related to flight safety. For instance, the issue of flight safety when landing is very paramount. Another important issue relates likelihood of carrying passengers with communicable diseases, such as avian influenza. Safety from attack by terrorists is still a major issue that affects the aviation industry today. Other important issues that influence flight safety include weather situation awareness, airspace infringement, fuel management and cabin crew fatigue. Questions related to the topics mentioned above ought to be covered. Despite not covering those issues, the article will be very useful. The content of the article will be used as an e ...
Guide to Unmanned Aircraft Systems (UAS)Graeme Cross
Unmanned Aircraft Systems (UAS) usage is expected to dramatically increase over the next five years. After the passing of the FAA Modernization and Reform Act of 2012, the FAA, under the direction of the Secretary of Transportation, gained authorization to begin integration of civil Unmanned Aircraft Systems into the National Air Space (NAS). In conjunction with the US Congress and state and local agencies, the FAA is working to create regulations on recreational and commercial applications that allow more streamlined access of unmanned aircraft to American businesses and institutions*. It is important to keep current with UAS regulations and news by following updates from the FAA, your aviation legal counsel, and your insurance broker.
Unmanned Aircraft Systems (UAS) pose an increasing threat to the aviation sector due to the rapid proliferation of the technology into civilian hands. UAS can be weaponized by malicious actors, while non-malicious UAS operators may inadvertently interfere with aviation-related activities. There have been numerous aviation-related incidents involving UAS in recent years.
Mahmoud Alhujayri Professor WesemannAV 4720 03172017.docxsmile790243
Mahmoud Alhujayri
Professor Wesemann
AV 4720
03/17/2017
Article Analysis 3
The article titled Safety Regulation: Crackdown on Fatigue authored and published by Flight Safety Foundation on its website on 7th April 2011 describes one of the flight safety rules established by the U.S. Federal Aviation Administration (FAA) recently. As explained in the article, the FAA established the rule in response to recommendations made by the National Transportation Safety Board (NTSB) after the Aloha airline flight 243 incident. The incident, which occurred on April 28, 1988, involved Boeing 737-200 that was operated and owned by Aloha Airlines Inc. The aircraft was heading to Honolulu from Hilo in Hawaii when it experienced structural failure and explosive decompression. Consequently, the aircraft made an emergency landing on the ground. On board were six crew members and 89 passengers (Flight Safety Foundation, 2011). Although the aircraft was damaged, only one crew member died. Seven passengers and one crew member sustained serious injuries. After investigations, it was noted that accident was caused by the failure by the aircraft's maintenance program to detect fatigue. Eventually, the fatigue led to widespread fatigue damage (WFD). As explained in the article authored by the flight safety foundation, the NTSB made a recommendation to the FAA to ensure that aircraft have effective maintenance programs and to make continuous surveillance of those programs. In response, the FAA made a rule that requiring the establishment of an inspection program for airplanes of transport category (Flight Safety Foundation, 2011). The program was meant to determine the probability of WFD occurring before “limit of validity” (LOV). The article also contains brief information about other aircrafts that have been damaged by WFD and an explanation of how LOV would be determined.
The content of the article is related to the topic of flight safety since it concentrates on the step that was taken by FAA to enhance aviation safety through conducting a thorough inspection of aircrafts to determine whether they are at the risk of getting damaged by WFD before the end of their LOV. Applying the rule would help to reduce accidents that are caused by WFD. Despite the fact that the article is very relevant, it does not cover many things related to flight safety. For instance, the issue of flight safety when landing is very paramount. Another important issue relates likelihood of carrying passengers with communicable diseases, such as avian influenza. Safety from attack by terrorists is still a major issue that affects the aviation industry today. Other important issues that influence flight safety include weather situation awareness, airspace infringement, fuel management and cabin crew fatigue. Questions related to the topics mentioned above ought to be covered. Despite not covering those issues, the article will be very useful. The content of the article will be used as an e ...
Guide to Unmanned Aircraft Systems (UAS)Graeme Cross
Unmanned Aircraft Systems (UAS) usage is expected to dramatically increase over the next five years. After the passing of the FAA Modernization and Reform Act of 2012, the FAA, under the direction of the Secretary of Transportation, gained authorization to begin integration of civil Unmanned Aircraft Systems into the National Air Space (NAS). In conjunction with the US Congress and state and local agencies, the FAA is working to create regulations on recreational and commercial applications that allow more streamlined access of unmanned aircraft to American businesses and institutions*. It is important to keep current with UAS regulations and news by following updates from the FAA, your aviation legal counsel, and your insurance broker.
Traditionally, an airline needs the approval of the governments of the various countries involved before it can fly in or out of a country, or even fly over another country without landing.
Prior to World War II, this did not present too many difficulties since the range of commercial planes was limited and air transport networks were in their infancy and nationally oriented. In 1944, an International Convention was held in Chicago to establish the framework for all future bilateral and multilateral agreements for the use of international air spaces.
Five freedom rights were designed, but a multilateral agreement went only as far as the first two freedoms (right to overfly and right to make a technical stop). The first five freedoms are regularly exchanged between pairs of countries in Air Service Agreements. The remaining freedoms are becoming more important, however.
Freedoms are not automatically granted to an airline as a right; they are privileges that have to be negotiated and can be the object of political pressures. All other freedoms have to be negotiated by bilateral agreements, such as the 1946 agreement between the United States and the UK, which permitted limited "fifth freedom" rights. The 1944 Convention has been extended since then, and there are currently nine different freedoms
Chapter 4The Role of Government in Aviation SecuritMargaritoWhitt221
Chapter 4
The Role of Government in Aviation Security
*
Introduction
*
ICAO recommends each nation should have a national government organization charged with providing internal national security
US – Department of Homeland Security (DHS)
Practical Aviation Security – Chapter 4
Introduction
Providing internal national security for aviation, customs and immigration, protecting the U.S. president, specific federal facilities, and the U.S. coastline.
Responding to major natural disasters or terrorist attacks is also a security related responsibility of the DHS.
*
DHS oversees Transportation Security Administration (TSA)
*
TSA regulates transportation security
TSA provides direction to airports and aircraft operators on compliance with federal regulations
TSA conducts screening at most U.S. airports
Practical Aviation Security – Chapter 4
Introduction
TSA regulates transportation security in the United States, which includes rail, trucking, shipping, and aviation.
*
Transportation Security Regulations (TSRs)
*
Part 1500:
Aviation Security
Part 1503:
Enforcement Actions
TSR Part 1500 contains general terms and abbreviations associated with transportation
security regulations.
Part 1503 covers enforcement and the process for opening and prosecuting a case against a regulated party.
*
Violations can be of minimum, moderate, or maximum severity
Fines per incident for:
Aircraft operators $2,500 to $25,000
Airports and cargo agents $1,000 to $10,000
Individuals $250 to $7,500
Practical Aviation Security – Chapter 4
Part 1503: Enforcement Actions
TSA regulates transportation security in the United States, which includes rail, trucking, shipping, and aviation.
*
Practical Aviation Security – Chapter 4
Part 1503: Enforcement ActionsIndividualsAirport OperatorsAircraft OperatorsAir CargoEntering sterile areas without being screenedFailure to ensure Airport Security Coordinator (ASC) fulfills dutiesRefusal to carry Federal Air MarshalsFailure to produce a copy of the security programFailure to undergo secondary screening when directedFailure to train ASCsFailure to pay security feesFailure to supply certification to the aircraft operatorImproperly entering SIDAs or AOAsFailure to allow TSA to inspect an airportFailure to prevent unauthorized access to secured area or to aircraftFailure to meet requirements for accepting cargo from an all-cargo carrier with an approved security program at a station(s) where cargo is accepted or processedImproper use of access media.Failure to carry out a security program requirementFailure to comply with requirements for carriage of an accessible weapon by an armed law enforcement officerFailure to transport cargo in locked or closely-monitored vehiclesFailure to notify TSA of changes in the security program
TSA regulates transportation security in the United States, which includes rail, trucking, shipping, and aviation.
*
P ...
Educaterer India is an unique combination of passion driven into a hobby which makes an awesome profession. We carve the lives of enthusiastic candidates to a perfect professional who can impress upon the mindsets of the industry, while following the established traditions, can dare to set new standards to follow. We don't want you to be the part of the crowd, rather we like to make you the reason of the crowd.
Today's Effort For A Better Tomorrow
Educaterer India is an unique combination of passion driven into a hobby which makes an awesome profession. We carve the lives of enthusiastic candidates to a perfect professional who can impress upon the mindsets of the industry, while following the established traditions, can dare to set new standards to follow. We don't want you to be the part of the crowd, rather we like to make you the reason of the crowd.
Today's Effort For A Better Tomorrow
Your supervisor, Sophia, Ballot Online director of information t.docxMargaritoWhitt221
Your supervisor, Sophia, Ballot Online director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate Ballot Online future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.
Question:
Create a high-level proposal for a compliance program for Ballot Online that enables the organization and its employees to conduct itself in a manner that is in compliance with legal and regulatory requirements.
The proposal will be one to two pages in length and should take the form of a high-level outline or flowchart showing the different components and relationships among the components.
Include the following elements that are generally found in an effective program:
● Identification of company employees who have oversight over the program, their roles, and responsibilities
● List of high-level policies and/or procedures that may be required
● List of high-level training and education programs that may be required
● Relationships between components of the program, including (but not limited to):
○ communication channels
○ dependencies
● Identification of enforcement mechanism
● Identification of monitoring and auditing mechanisms
● How will responses to compliance issues be handled, and how will corrective action plans be developed?
● How are risk assessments handled?
Please add references
.
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docxMargaritoWhitt221
Your selected IEP. (Rudy)
Descriptions of appropriate instructional and assessment accommodations for the exceptional student based on their needs as described in the IEP.
You will need to list and describe the appropriate assessment tools and accommodations.
You will also need to describe how the lesson can be modified for other learners with varying reading deficiencies.
Rudy IEP
Current Grade: 2
Present Levels of Educational Performance
• Ruby is in good health with no known physical performance issues, and she socializes well with her peers.
• Ruby performs at grade level in all subjects except reading.
• Ruby can identify all letters of the alphabet and knows the sound of most consonants and short vowels.
• Her sight vocabulary is approximately 65 to 70 words, and she reads on the primer level.
• Ruby can spell most words in a first-grade textbook, but has difficulty with words in the second-grade textbook.
Annual Goals
1. By the end of the school year, Ruby will read at a beginning second-grade level with 90% accuracy in word recognition and 80% accu- racy in word comprehension.
Person Responsible: Resource Teacher
2. By the end of the school year, Ruby will increase her sight word vocabulary to 150 words.
Person Responsible: Resource Teacher
3. By the end of the school year, Ruby will read and spell at least 75% of the second-grade spelling words.
Person Responsible: Second-Grade Teacher
Amount of Participation in General Education
• Ruby will participate in all second-grade classes and activities except for reading.
Special Education and Related Services
• Ruby will receive individualized and/or small-group instruction in reading from the Resource Teacher for 30 minutes each day.
.
Your project sponsor and customer are impressed with your project .docxMargaritoWhitt221
Your project sponsor and customer are impressed with your project schedule, but due to some factors out of their control, you’ve been told to deliver your project early, roughly 15% earlier than anticipated. Using the information from the readings, explain how you would go about assessing the possibility of delivering your project early. How will that affect scope, costs, and schedule?
.
Your initial post should use APA formatted in-text citations whe.docxMargaritoWhitt221
Your initial post should use APA formatted in-text citations when you are paraphrasing or directly quoting information from outside sources (including the textbook). You should also include APA formatting reference(s) at the end of your post. It is suggested that these posts be at least 150 words
.
Your life is somewhere in a databaseContains unread posts.docxMargaritoWhitt221
Your life is somewhere in a database
Contains unread posts
(Clipart from MS Office)
Many TV shows depict law enforcement personnel accessing readily accessible databases that contain all types of records about individuals –records about everything from address to telephone records to finances, insurance, and criminal history. The information you share with your bank, doctor, insurance agent, the TSA, ancestry kit companies, and on social media can make your life an open book. Here are some questions to address as you reflect on this:
1. Are you comfortable with giving away some of your privacy for increased security? Why or why not? How far would you let the government go in examining people's private lives?
2. How much access should we have to certain aspects of others' private lives? For example, should States share criminal databases? But should a database of people paroled or released for crimes be made public? Why or why not?
.
Your original initial post should be between 200-300 words and 2 pee.docxMargaritoWhitt221
Your original initial post should be between 200-300 words and 2 peer responses in the range of 75-125 words each. Posts are too brief for a cover page and double-spacing. Otherwise, your posts, references and citations should be in APA format. The rubrics with Biblical Integration determines your grade. It considers:
Providing a short introduction stating your position and argument
Supporting your argument (intext citing shows this)
When all is done, give a brief conclusion
a reference at the end
In this chapter, Collins begins the process of identifying and further developing from the research those unique factors and variables that differentiated the good and great companies. One of the most significant differences, he asserts, is the quality and nature of leadership in the firm. Collins initially told the research team to downplay the role of top executives in the good-to-great process. It became obvious that there was something different that these leaders did. Collins went on to identify "Level 5 leadership" as a common characteristic of the great companies assessed in the study. By further studying the behaviors and attitudes of so-called Level 5 leaders, Collins found that many of those classified in this group displayed an unusual mix of intense determination and profound humility. Characteristics used to describe these leaders included words like quiet, humble, modest, gracious, and understated. Yet there was also the stoic resolve and an unwavering determination evident. They were low-key executives, rarely appearing in the media, who demonstrated a relentless drive for results. These leaders often had a long-term personal sense of investment in the company and its success, often cultivated through a career-spanning climb up the company’s ranks. The personal ego and individual financial gain were not as important as the long-term benefit of the team and the company. As such, Collins warned of the liability involved in employing a bigger-than-life charismatic leader —personalities often brought in from outside the company or organization by a board seeking a high profile figure. The data suggested that a celebrity CEO brought in to turn around a flailing firm was usually not conducive to fostering the transition from
Good to Great
(Collins, 2001).
Why is this important?
Collins was asked and did not want to use "servant leader" for the Level 5 leader (Lichtenwalner, 2012). The team chose the term, “Level 5 Leadership” over Servant Leadership, in part, for fear readers would misinterpret the concept as “servitude” or “weakness.” In his mind, this position looked like something else. And so a new leadership phrase was born. What is interesting is that many but not all of the leaders profiled had a faith background. Lichtenwalner, (2012) in his research suggests that Servant Leadership is a key aspect of Level 5 Leadership. But perhaps it is not the technique but the heart and faith of the leader that had such a signifi.
More Related Content
Similar to Chapter 9General Aviation Airport SecurityThis
Traditionally, an airline needs the approval of the governments of the various countries involved before it can fly in or out of a country, or even fly over another country without landing.
Prior to World War II, this did not present too many difficulties since the range of commercial planes was limited and air transport networks were in their infancy and nationally oriented. In 1944, an International Convention was held in Chicago to establish the framework for all future bilateral and multilateral agreements for the use of international air spaces.
Five freedom rights were designed, but a multilateral agreement went only as far as the first two freedoms (right to overfly and right to make a technical stop). The first five freedoms are regularly exchanged between pairs of countries in Air Service Agreements. The remaining freedoms are becoming more important, however.
Freedoms are not automatically granted to an airline as a right; they are privileges that have to be negotiated and can be the object of political pressures. All other freedoms have to be negotiated by bilateral agreements, such as the 1946 agreement between the United States and the UK, which permitted limited "fifth freedom" rights. The 1944 Convention has been extended since then, and there are currently nine different freedoms
Chapter 4The Role of Government in Aviation SecuritMargaritoWhitt221
Chapter 4
The Role of Government in Aviation Security
*
Introduction
*
ICAO recommends each nation should have a national government organization charged with providing internal national security
US – Department of Homeland Security (DHS)
Practical Aviation Security – Chapter 4
Introduction
Providing internal national security for aviation, customs and immigration, protecting the U.S. president, specific federal facilities, and the U.S. coastline.
Responding to major natural disasters or terrorist attacks is also a security related responsibility of the DHS.
*
DHS oversees Transportation Security Administration (TSA)
*
TSA regulates transportation security
TSA provides direction to airports and aircraft operators on compliance with federal regulations
TSA conducts screening at most U.S. airports
Practical Aviation Security – Chapter 4
Introduction
TSA regulates transportation security in the United States, which includes rail, trucking, shipping, and aviation.
*
Transportation Security Regulations (TSRs)
*
Part 1500:
Aviation Security
Part 1503:
Enforcement Actions
TSR Part 1500 contains general terms and abbreviations associated with transportation
security regulations.
Part 1503 covers enforcement and the process for opening and prosecuting a case against a regulated party.
*
Violations can be of minimum, moderate, or maximum severity
Fines per incident for:
Aircraft operators $2,500 to $25,000
Airports and cargo agents $1,000 to $10,000
Individuals $250 to $7,500
Practical Aviation Security – Chapter 4
Part 1503: Enforcement Actions
TSA regulates transportation security in the United States, which includes rail, trucking, shipping, and aviation.
*
Practical Aviation Security – Chapter 4
Part 1503: Enforcement ActionsIndividualsAirport OperatorsAircraft OperatorsAir CargoEntering sterile areas without being screenedFailure to ensure Airport Security Coordinator (ASC) fulfills dutiesRefusal to carry Federal Air MarshalsFailure to produce a copy of the security programFailure to undergo secondary screening when directedFailure to train ASCsFailure to pay security feesFailure to supply certification to the aircraft operatorImproperly entering SIDAs or AOAsFailure to allow TSA to inspect an airportFailure to prevent unauthorized access to secured area or to aircraftFailure to meet requirements for accepting cargo from an all-cargo carrier with an approved security program at a station(s) where cargo is accepted or processedImproper use of access media.Failure to carry out a security program requirementFailure to comply with requirements for carriage of an accessible weapon by an armed law enforcement officerFailure to transport cargo in locked or closely-monitored vehiclesFailure to notify TSA of changes in the security program
TSA regulates transportation security in the United States, which includes rail, trucking, shipping, and aviation.
*
P ...
Educaterer India is an unique combination of passion driven into a hobby which makes an awesome profession. We carve the lives of enthusiastic candidates to a perfect professional who can impress upon the mindsets of the industry, while following the established traditions, can dare to set new standards to follow. We don't want you to be the part of the crowd, rather we like to make you the reason of the crowd.
Today's Effort For A Better Tomorrow
Educaterer India is an unique combination of passion driven into a hobby which makes an awesome profession. We carve the lives of enthusiastic candidates to a perfect professional who can impress upon the mindsets of the industry, while following the established traditions, can dare to set new standards to follow. We don't want you to be the part of the crowd, rather we like to make you the reason of the crowd.
Today's Effort For A Better Tomorrow
Your supervisor, Sophia, Ballot Online director of information t.docxMargaritoWhitt221
Your supervisor, Sophia, Ballot Online director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate Ballot Online future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.
Question:
Create a high-level proposal for a compliance program for Ballot Online that enables the organization and its employees to conduct itself in a manner that is in compliance with legal and regulatory requirements.
The proposal will be one to two pages in length and should take the form of a high-level outline or flowchart showing the different components and relationships among the components.
Include the following elements that are generally found in an effective program:
● Identification of company employees who have oversight over the program, their roles, and responsibilities
● List of high-level policies and/or procedures that may be required
● List of high-level training and education programs that may be required
● Relationships between components of the program, including (but not limited to):
○ communication channels
○ dependencies
● Identification of enforcement mechanism
● Identification of monitoring and auditing mechanisms
● How will responses to compliance issues be handled, and how will corrective action plans be developed?
● How are risk assessments handled?
Please add references
.
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docxMargaritoWhitt221
Your selected IEP. (Rudy)
Descriptions of appropriate instructional and assessment accommodations for the exceptional student based on their needs as described in the IEP.
You will need to list and describe the appropriate assessment tools and accommodations.
You will also need to describe how the lesson can be modified for other learners with varying reading deficiencies.
Rudy IEP
Current Grade: 2
Present Levels of Educational Performance
• Ruby is in good health with no known physical performance issues, and she socializes well with her peers.
• Ruby performs at grade level in all subjects except reading.
• Ruby can identify all letters of the alphabet and knows the sound of most consonants and short vowels.
• Her sight vocabulary is approximately 65 to 70 words, and she reads on the primer level.
• Ruby can spell most words in a first-grade textbook, but has difficulty with words in the second-grade textbook.
Annual Goals
1. By the end of the school year, Ruby will read at a beginning second-grade level with 90% accuracy in word recognition and 80% accu- racy in word comprehension.
Person Responsible: Resource Teacher
2. By the end of the school year, Ruby will increase her sight word vocabulary to 150 words.
Person Responsible: Resource Teacher
3. By the end of the school year, Ruby will read and spell at least 75% of the second-grade spelling words.
Person Responsible: Second-Grade Teacher
Amount of Participation in General Education
• Ruby will participate in all second-grade classes and activities except for reading.
Special Education and Related Services
• Ruby will receive individualized and/or small-group instruction in reading from the Resource Teacher for 30 minutes each day.
.
Your project sponsor and customer are impressed with your project .docxMargaritoWhitt221
Your project sponsor and customer are impressed with your project schedule, but due to some factors out of their control, you’ve been told to deliver your project early, roughly 15% earlier than anticipated. Using the information from the readings, explain how you would go about assessing the possibility of delivering your project early. How will that affect scope, costs, and schedule?
.
Your initial post should use APA formatted in-text citations whe.docxMargaritoWhitt221
Your initial post should use APA formatted in-text citations when you are paraphrasing or directly quoting information from outside sources (including the textbook). You should also include APA formatting reference(s) at the end of your post. It is suggested that these posts be at least 150 words
.
Your life is somewhere in a databaseContains unread posts.docxMargaritoWhitt221
Your life is somewhere in a database
Contains unread posts
(Clipart from MS Office)
Many TV shows depict law enforcement personnel accessing readily accessible databases that contain all types of records about individuals –records about everything from address to telephone records to finances, insurance, and criminal history. The information you share with your bank, doctor, insurance agent, the TSA, ancestry kit companies, and on social media can make your life an open book. Here are some questions to address as you reflect on this:
1. Are you comfortable with giving away some of your privacy for increased security? Why or why not? How far would you let the government go in examining people's private lives?
2. How much access should we have to certain aspects of others' private lives? For example, should States share criminal databases? But should a database of people paroled or released for crimes be made public? Why or why not?
.
Your original initial post should be between 200-300 words and 2 pee.docxMargaritoWhitt221
Your original initial post should be between 200-300 words and 2 peer responses in the range of 75-125 words each. Posts are too brief for a cover page and double-spacing. Otherwise, your posts, references and citations should be in APA format. The rubrics with Biblical Integration determines your grade. It considers:
Providing a short introduction stating your position and argument
Supporting your argument (intext citing shows this)
When all is done, give a brief conclusion
a reference at the end
In this chapter, Collins begins the process of identifying and further developing from the research those unique factors and variables that differentiated the good and great companies. One of the most significant differences, he asserts, is the quality and nature of leadership in the firm. Collins initially told the research team to downplay the role of top executives in the good-to-great process. It became obvious that there was something different that these leaders did. Collins went on to identify "Level 5 leadership" as a common characteristic of the great companies assessed in the study. By further studying the behaviors and attitudes of so-called Level 5 leaders, Collins found that many of those classified in this group displayed an unusual mix of intense determination and profound humility. Characteristics used to describe these leaders included words like quiet, humble, modest, gracious, and understated. Yet there was also the stoic resolve and an unwavering determination evident. They were low-key executives, rarely appearing in the media, who demonstrated a relentless drive for results. These leaders often had a long-term personal sense of investment in the company and its success, often cultivated through a career-spanning climb up the company’s ranks. The personal ego and individual financial gain were not as important as the long-term benefit of the team and the company. As such, Collins warned of the liability involved in employing a bigger-than-life charismatic leader —personalities often brought in from outside the company or organization by a board seeking a high profile figure. The data suggested that a celebrity CEO brought in to turn around a flailing firm was usually not conducive to fostering the transition from
Good to Great
(Collins, 2001).
Why is this important?
Collins was asked and did not want to use "servant leader" for the Level 5 leader (Lichtenwalner, 2012). The team chose the term, “Level 5 Leadership” over Servant Leadership, in part, for fear readers would misinterpret the concept as “servitude” or “weakness.” In his mind, this position looked like something else. And so a new leadership phrase was born. What is interesting is that many but not all of the leaders profiled had a faith background. Lichtenwalner, (2012) in his research suggests that Servant Leadership is a key aspect of Level 5 Leadership. But perhaps it is not the technique but the heart and faith of the leader that had such a signifi.
Your assignment is to research and report about an archaeological fi.docxMargaritoWhitt221
Your assignment is to research and report about an archaeological find of the last fifteen years.
When you begin the research phase of your project, you will be happily surprised to find just how many active sites are producing new insights into ancient cultures every single day. Some recent examples include excavations in Scotland, England, Egypt, Jerusalem, Rome, and China. Find one that interests you.
Please message me for full assignment information as I am not able to post it.
.
Your assignment for Physical Science I is to write a paper on.docxMargaritoWhitt221
Your assignment for Physical Science I is to write a paper on:
Clean Energy as well as an alternatives and the Environments: Solar, Geological (Geothermal!), and Wind Energy for the Future. Also, Hydro Power Plants, Dams, and the Water Table and Ecology Issues.
1200 words.
.
Your charge is to develop a program using comparative research, anal.docxMargaritoWhitt221
Your charge is to develop a program using comparative research, analyzing the relationship of workplace behavior and employee motivation. Create a diversity mentoring program (DMP) for an organization of your choosing. You may select a current or former employer, church, hobby team, etc.Within your plan, include the following items listed below:
name of organization;
introduction of DMP;
need of such program;
benefits of the program;
potential challenges (may include potential problems that may incur without such program);
justification of the important aspects of employee behavior and the relationship to employee motivation;
one inclusion of a motivation theory;
details of the equity of social justice and the power to make positive change; and
explanation of the plan to implement the program with recommendations with inclusion of the expected outcomes.
Two pages
.
Young consumers’ insights on brand equity Effects of bra.docxMargaritoWhitt221
Young consumers’ insights on brand equity
Effects of brand loyalty, brand awareness, and brand image
1
CONTENTS
INTRODUCTION
LITERATURE REVIEW
METHODOLOGY
2
- Data set development
- Customer expectation
--Brand recognition
--The quality of the brand is guaranteed
- Advantage of Brand effect
-- Increase market share
--Increase of competitive advantage
Research Background
- Data set development
- Customer expectation
--Brand recognition
--The quality of the brand is guaranteed
- Advantage of Brand effect
-- Increase market share
--Increase of competitive advantage
Research Background
3
Research problem
-Limited research
-Different research perspectives
-The impact factor of brand equity
Research objectives
The purpose of this study is to measure the relationship between brand loyalty, brand awareness and brand image and brand equity of young consumers.
Aaker (1991) Model theory was incorporated into the relevant research system
Identify the relationship between brand equity and brand loyalty, brand awareness and brand image
The research scope of brand effect has been expanded
Provide guidance for enterprises to design effective strategies
Significant of study
Contribution
Scope of study
Master students are the main research objects, and the research scope is to investigate Chinese master students.
THEORETICAL FRAMEWORK
The conclusion of this paper is based on the principle of Aaker (1991) model.
It can be said that customers' attitude towards brands has an important impact on brand assets (Choi, Parsa, Sigala, & Putrevu, 2009).
Thwaites et al. (2012) found that when consumers' perception of brand cognition is positive, their purchase intention of brand will also be positive.
LITERATURE REVIEW
Brand loyalty
The study found that the creative consumption behavior of customers has a positive effect on the cultivation of brand loyalty, and the brand equity associated with high brand loyalty of consumers is higher than that of other brands (Atilgan, Aksoy, & Akinci, 2005).
Brand awareness
According to the research, when customers‘ brand awareness is enhanced and they have a certain understanding of brand awareness, the brand equity will also be further enhanced,It can be said that there is a significant influence relationship between brand awareness and brand equity (Pouromid & Iranzadeh, 2012).
LITERATURE REVIEW
Brand image
Most consumers will choose products with good brand image and feel that such products are of relatively high quality (Rubio, Oubina, & Villasenor, 2014).
Relevant studies, such as Faircloth et al. (2001), Rubio et al. (2014), and Vahie and Paswan (2006), have confirmed the positive influence of brand image on brand equity.
Brand equity is the added value of a product or a service, which mainly reflects the customer's evaluation and use of the brand, and also reflects the competitive advantage, price advantage and profitability brought by the brand to the enterp.
You will examine a scenario that includes an inter-group conflict. I.docxMargaritoWhitt221
You will examine a scenario that includes an inter-group conflict. In this scenario, you are recognized as an authority in cross-cultural psychology and asked to serve as a consultant to help resolve the conflict. You will be asked to write up your recommendations in a 5–6page paper not including your title and reference page.
Reference
Darley, J.M. & Latané, B. (1968). Bystander interview in emergencies: Diffusion of responsibility. Journal of Personality and Social Psychology, 8(4), 377-383.
To Prepare:
Review the following:
Scenario: Culture, Psychology, and Community
Imagine an international organization has approached you to help resolve an inter-group conflict. You are an authority in cross-cultural psychology and have been asked to serve as a consultant based on a recent violent conflict involving a refugee community in your town and a local community organization. In the days, weeks, and months leading up to the violent conflict, there were incidents of discrimination and debates regarding the different views and practices people held about work, family, schools, and religious practice. Among the controversies has been the role of women’s participation in political, educational, and community groups.
(6 pages excluding title page and reference page)
:
Part 1: Developing an Understanding
(2 pages)
Based on the scenario, explain how you can help integrate the two diverse communities so that there is increased understanding and appreciation of each group by the other group. (
Note
: Make sure to include in your explanation the different views and practices of cultural groups as well as the role of women.)
Based on your knowledge of culture and psychology, provide three possible suggestions/solutions that will help the community as a whole. In your suggestions make sure to include an explanation regarding group think and individualism vs. collectivism.
Part 2: Socio-Emotional, Cognitive, and Behavioral Aspects
(2 pages)
Based on your explanations in Part 1, how do your suggestions/solutions impact the socio-emotional, cognitive, and behavior aspects of the scenario and why?
Part 3: Gender, Cultural Values and Dimensions, and Group Dynamics
(2 pages)
Explain the impact of gender, cultural values and dimensions, and group dynamics in the scenario.
Further explain any implications that may arise from when working between and within groups.
Support your Assignment by citing all resources in APA
Learning Resources
Required Readings
Ahmed, R., & Gielen, U. (2017). Women in Egypt. In C. M. Brown, U. P. Gielen, J. L. Gibbons, & J. Kuriansky (Eds.), Women's evolving lives: Global and psychosocial perspectives (pp. 91–116). New York, NY: Springer.
Credit Line: Women's Evolving Lives: Global and Psychosocial Perspectives, by Brown, C.; Gielen, U.; Gibbons, J.; Kuriansky, J. (eds). Copyright 2017 by Springer International Publishing. Reprinted by permission of Springer International Publishing via the Copyright Clearance .
You will perform a history of a head, ear, or eye problem that y.docxMargaritoWhitt221
You will perform a history of a head, ear, or eye problem that your instructor has provided you or one that you have experienced and perform an assessment including head, ears, and eyes. You will document your findings, identify actual or potential risks, and submit this in a Word document to the drop box provided.
HEENT Assignment
Module 5 Head, Eyes, Ears-1.docx
Submit your completed assignment by following the directions linked below. Please check the
Course Calendar
for specific due dates.
Save your assignment as a Microsoft Word document. (Mac users, please remember to append the ".docx" extension to the filename.)
.
You need to enable JavaScript to run this app. .docxMargaritoWhitt221
You need to enable JavaScript to run this app.
Back to Library
Search across book
Reader Preferences
Close
Power Feature
CoachMe practice questions are enabled for this book! Learn more & manage settings in your Reader Preferences!
Highlights, Notes, Bookmarks, and Flashcards
More Options
Table of Contents
Go to First Page
Management
Richard L. Daft
More book options
Cover Pagecover
Title Pagei
HEOA-1HEOA-1
Copyright Pageii
Dedication Pageiii
About the Authorv
Brief Contentsvii
Contentsvix
Prefacexv
Chapter 1: Leading Edge Management2
Chapter 2: The Evolution of Management Thinking38
Chapter 3: The Environment and Corporate Culture74
Chapter 4: Managing in a Global Environment110
Chapter 5: Managing Ethics and Social Responsibility144
Chapter 6: Managing Start-Ups and New Ventures180
Chapter 7: Planning and Goal Setting216
Chapter 8: Strategy Formulation and Execution248
Chapter 9: Managerial Decision Making284
Chapter 10: Designing Organization Structure324
Chapter 11: Managing Innovation and Change370
Chapter 12: Managing Human Talent406
Chapter 13: Managing Diversity and Inclusion446
Chapter 14: Understanding Individual Behavior484
Chapter 15: Leadership528
Chapter 16: Motivating Employees570
Chapter 17: Managing Communication608
Chapter 18: Leading Teams648
Chapter 19: Managing Quality and Performance688
Appendix: Operations Management and E-Commerce721
Name Index741
Company Index756
Subject Index761
Open/Close Margin
Bookmark page
Chapter 8: Strategy Formulation and Execution | Page 248
Previous
Go to Page
Go to Page
/ 770
Next
Quality tools, methods paper
In the assigned textbook (chapter 15 p. 269), the authors present a table describing how the used the model for improvement, PDSA, and lean six sigma as a tool to develop their organization’s plan for improvement.
Studying the situation in your organization, present a suggested improvement plan (present a table similar to the one in p.269 + two pages explanation) utilizing one or more of the models discussed in the class (see chapter 2).
Grading rubric:
1. Quality of the table: at last, one of the quality models/tools should be applied correctly
2. Adequate explanation is given to support and explain the table
3. General organization of the assignment. Correct grammar and spelling are used
Note:
Suggested improvement plan is:
Decreased number of urinary catheter infections.
.
You will act as a critic for some of the main subjects covered i.docxMargaritoWhitt221
You will act as a critic for some of the main subjects covered in the humanities. You will conduct a series of short, evaluative critiques of film, philosophy, literature, music, and myth. You will respond to five different prompts, and each response should include an analysis of the topics using terminology unique to that subject area and should include an evaluation as to why the topic stands the test of time. The five prompts are as follows:
1:
Choose a film and offer an analysis of why it is an important film, and discuss it in terms of film as art. Your response should be more than a summary of the film.
2:
Imagine you had known Plato and Aristotle and you had a conversation about how we
fall in love
. Provide an overview of how Plato would explain falling in love, and then provide an overview of how Aristotle might explain falling in love.
3:
Compare and contrast the two poems below:
LOVE’S INCONSISTENCY
I find no peace, and all my war is done;
I fear and hope, I burn and freeze likewise
I fly above the wind, yet cannot rise;
And nought I have, yet all the world I seize on;
That looseth, nor locketh, holdeth me in prison, And holds me not, yet can I ’scape no wise;
Nor lets me live, nor die, at my devise,
And yet of death it giveth none occasion.
Without eyes I see, and without tongue I plain;
I wish to perish, yet I ask for health;
I love another, and yet I hate myself;
I feed in sorrow, and laugh in all my pain;
Lo, thus displeaseth me both death and life,
And my delight is causer of my grief.
Petrarch
After great pain a formal feeling comes—
The nerves sit ceremonious like tombs;
The stiff Heart questions—was it He that bore?
And yesterday—or centuries before?
The feet mechanical go round
A wooden way
Of ground or air or ought
Regardless grown,
A quartz contentment like a stone.
This is the hour of lead
Remembered if outlived
As freezing persons recollect
The snow—
First chill, then stupor, then
The letting go
Emily Dickinson
4:
Compare and contrast these two pieces of music: see files attached below
Beethoven’s Violin Romance No. 2
Scott Joplin’s Maple Leaf Rag
5:
Explain in classical terms why a modern character is a hero. Choose from either Luke Skywalker, Indiana Jones, Bilbo Baggins, Harry Potter, Katniss Everdeen, or Ender Wiggins.
.
You will research and prepare a presentation about image. Your rese.docxMargaritoWhitt221
You will research and prepare a presentation about image. Your research / presentation should provide the following information / answers:
What is raster image? List two (2) common types of raster image.
What is a vector image? List two (2) common types of vector image.
Create a table listing pros and cons comparing raster vs. vector images. You should present at list three (3) pros and three (3) cons for each type of image.
Show one (1) good and (1) bad example of raster image. Explain why it is a good and bad example.
Show two (2) examples of vector images.
What is the difference between ppi and dpi?
Which are the common resolution used for: website, plotter, banner and social media. Why do we use different resolution for each type of media?
How you identify the real size of an image using resolution and pixels?
.
You will be asked to respond to five different scenarios. Answer eac.docxMargaritoWhitt221
You will be asked to respond to five different scenarios. Answer each scenario (about 1 page per scenario). You will need to:
Decide what action the responding officer should take and provide an explanation/justification for your response.
In your explanation, explain the role that discretion played in your decision. Choose at least five factors from the list below to include in your explanation.
When considering your response for each scenario, remember that because of the nature of law enforcement work, police officers have always maintained a certain amount of discretion. Due to the amount of interaction that officers have with members of the public, this discretion must be fair, equal, impartial, and legal. As such, the use of discretion by officers is both a foundation of police work and a component of community policing.
Note
: You may make any and all assumptions necessary to answer these scenarios as long as they do not conflict with the details provided.
FACTORS (CHOOSE AT LEAST 5 FOR EACH SCENARIO):
Environmental factors
Nature of the community.
Socio-demographic characteristics.
Level and type of crime in the community.
Police/Community relations.
Organizational factors
Department Rules and Regulations.
Policies and Procedures.
Department bureaucracy.
Officer experience.
Dimensions of policing: philosophical; strategic; tactical; organizational.
Situational factors
Seriousness of crime.
Weapon involvement.
Victim – Desire to prosecute.
Group/gang crime.
Suspect’s demeanor.
Age/gender/race of involved parties.
Suspect’s criminal record.
Ethics
Moral values.
Cultural/Societal norms.
Accountability.
Friends/Family/Coworkers.
Experience/Upbringing.
Legal
Laws.
Past practice.
Evidence.
Victim signatures.
Landmark Supreme Court cases.
Scenario 1:
Officer Merced responds to a call of a Theft in Progress. Upon arrival, he finds that an 18-year-old female has stolen baby formula and diapers by exiting the store without paying. He speaks with her and finds that she has a newborn baby, does not have any source of income, and needed the formula and diapers for the baby. As such, theft is still a crime. What should Officer Merced do?
Do you arrest the woman or not? What factors influenced your decision?
Provide an explanation/justification for your chosen response including the role that discretion played in your decision.
Be sure to consider at least five of the provided factors in your explanation.
Use evidence and details from the scenario as well as supporting information and examples from the text in your response.
Scenario 2:
Dane is in an electronics store where he and a couple of friends are searching for a potential gift to give to a friend. They are happy to find a video game that is on sale but decide to continue looking around the store. They decide to go grab a bite to eat before making a final decision on what to get for their friend. As they are walking .
You might find that using analysis tools to analyze internal .docxMargaritoWhitt221
You might find that using analysis tools to analyze internal
and external environments is an effective way of analyzing the
chosen capstone organization. If you need to learn more
about these types of analysis tools, check out the resources
below.
Internal Analysis Tools
• tutor2u. (2016). PESTLE (PEST) analysis
explained [Video]. YouTube. https://www.youtube.com/
watch?v=sP2sDw5waEU
• SmartDraw. (n.d.). SWOT analysis. https://
www.smartdraw.com/swot-analysis/
• SWOT Framework.
External Analysis Tools
• Applying VRIO and PESTLE.
• PESTLE Analysis. (n.d.). What is PESTLE analysis? A
tool for business analysis. http://pestleanalysis.com/what-
is-pestle-analysis/
• Study.com. (n.d.). What is PESTLE analysis? Definition
and examples. https://study.com/academy/lesson/what-
is-pestle-analysis-definition-examples.html
• Management & Finance1 TU Delft. (2016). The five
competitive forces that shape strategy [Video]. YouTube.
https://www.youtube.com/watch?v=mYF2_FBCvXw
Use these resources as you see appropriate:
• Research Guide – MBA
https://www.youtube.com/watch?v=sP2sDw5waEU
https://www.youtube.com/watch?v=sP2sDw5waEU
https://www.youtube.com/watch?v=sP2sDw5waEU
https://www.smartdraw.com/swot-analysis/
http://media.capella.edu/CourseMedia/MBA5006/GuidedPath/SWOTFramework/wrapper.asp
http://media.capella.edu/CourseMedia/MBA5006/GuidedPath/ApplyVRIOandPESTLE/wrapper.asp
http://pestleanalysis.com/what-is-pestle-analysis/
http://pestleanalysis.com/what-is-pestle-analysis/
https://study.com/academy/lesson/what-is-pestle-analysis-definition-examples.html
https://study.com/academy/lesson/what-is-pestle-analysis-definition-examples.html
https://www.youtube.com/watch?v=mYF2_FBCvXw
https://www.youtube.com/watch?v=mYF2_FBCvXw
https://www.youtube.com/watch?v=mYF2_FBCvXw
https://capellauniversity.libguides.com/MBA
• This research guide was custom created to help
MBA learners. If you are feeling a bit lost on where
to start, this would be a good starting point.
• James, N. (2007). Writing at work: How to write clearly,
effectively and professionally. Crows Nest, Australia:
Allen & Unwin.
• Use this as a general writing handbook. For
example, there are chapters on tone, grammar,
punctuation, style, et cetera.
https://capella.skillport.com/skillportfe/custom/login/saml/login.action?courseaction=launch&assetid=_ss_book:25059
https://capella.skillport.com/skillportfe/custom/login/saml/login.action?courseaction=launch&assetid=_ss_book:25059
1
MBA Capstone Project Description
MBA Capstone Project Description
Throughout your MBA program, you have worked to develop as a business professional and
prepare to meet future challenges as a business leader. Your program culminates in the
capstone project, which forms the primary focus of MBA-FPX5910, the final course you will take
in the program. The capstone project is intended to provide you the opportunity to demonstrate
your MBA program outcomes by:
• Planning and executing .
You will conduct a professional interview with a staff nurse and a s.docxMargaritoWhitt221
You will conduct a professional interview with a staff nurse and a staff nurse leader to discover their intra/inter-professional communications styles. It will be important to incorporate learning objectives regarding therapeutic communication styles including their method of caring, assertive, and responsible communication in your discussion/analysis of the interview.
.
You have chosen the topic of Computer Forensics for your researc.docxMargaritoWhitt221
You have chosen the topic of Computer Forensics for your research project. Submit your research project what you have worked on Computer Forensics.
Include the following on your research:
· Abstract
· Introduction
· Computer Forensics
· Conclusion
Note: 500 words with intext citations and 4 references must needed.
.
1.Describe some of the landmark Supreme Court decisions that h.docxMargaritoWhitt221
1.
Describe some of the landmark Supreme Court decisions that have influenced present-day juvenile justice procedures.
2.
How are children processed by the juvenile justice system from arrest to reentry into society?
3.
Discuss the key issues of the preadjudicatory stage of juvenile justice including detention, intake, diversion, pretrial release, plea bargaining and waiver.
Textbook for the class
Siegel, Welsh, and Senna.
(2014).
Juvenile Delinquency: Theory, Practice, and Law
(12). Cengage Learning. [ISBN-978-1-285-45840-3]
Format:
should be thoroughly researched and reported. References and sources should be listed in MLA or APA format. The average length paper is two to three pages. You may interview individuals currently employed or retired from the criminal justice system and use them as a reference. All writing assignments must be original work for this course. Do not submit a paper used in another course. Do not cut and paste paragraphs of information into your paper. All source material should be paraphrased in your own words. Short quotations are allowed.
this paper wil be scanned through turntin
.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. Chapter 9
General Aviation Airport Security
This chapter examines potential security threats to general
aviation (GA) airports and flight operations. Strategies for
protecting GA airports and aircraft are provided and an
overview of changes in aviation security that affected GA
operations after 9/11. You will learn about challenges to
developing and implementing security regulations for GA
airports. We also discuss the security strategies used by the
Transportation Security Administration (TSA) and various GA
airport and aircraft operators.
*
Introduction
Since 9/11, the general aviation community has struggled to
help the public understand the nature of GA.
General aviation aircraft have long been used as platforms to
smuggle narcotics and weapons, and for human trafficking
operations.
In 1993, the FBI indicated that Osama bin Laden assessed the
possibility of using an agricultural aircraft to spread a chemical
agent on a ground target.
2. GA provides vital services to the United States and greatly
enhances the U.S. economy. GA accounts for some 77% of all
flights in the United States. With more than 200,000 aircraft,
650,000 pilots, and 19,000 airports and landing strips, the GA
industry provides jobs and opportunities for thousands of
people.
*
The Nature of GA Flight Operations
GA 3/4 of all takeoffs/landing in US
$100 billion to US economy
1.3 million jobs
GA provides vital services to the United States and greatly
enhances the U.S. economy. Approximately 24% of all GA
flights are conducted for business or corporate use nearly two-
thirds of all business flights carry passengers in mid-level
management positions, sales representatives, and project teams
for major corporations.
GA accounts for three-quarters of all takeoffs and landings in
the United States, contributes about $100 billion to the U.S
economy, and has about 1.3 million jobs.
These estimates do not include multipliers, such as the number
of jobs created by the hotel, rental car, restaurant, and tourist
industries. The creation of GA security policies is important to
3. protect these interests.
*
Securing General Aviation
5,000 GA airports in US
14,000 private airstrips
Securing general aviation is challenging considering the
magnitude and nature of GA operations. There are
approximately 450 commercial service airports in the United
States and more than 5,000 GA airports. Those 14,000 airports
are not regulated by the Federal Aviation Administration (FAA)
or the TSA.
*
Practical Aviation Security – Chapter 9
Securing General Aviation
Issues to consider:
What is the threat to GA airports and aircraft?
What is the threat to public or infrastructure from GA aircraft?
What security measures should be required or recommended to
prevent both of the aforementioned threats from occurring?
4. Most GA aircraft are too light to be used as a platform for
conventional explosives and heightened vigilance by GA airport
and aircraft operators would make it difficult for someone to
load the necessary quantity of explosives without detection.
The potential exists for light aircraft to be used as a delivery
platform for chemical, biological, radiological, and nuclear
(CBRN) forms of weapons.
Agricultural aircraft used for spraying crops with pesticides and
fertilizers pose a unique threat as a platform for a bio- logical
or chemical attack because they are specifically designed for
aerial dispersal and could be exploited by terrorists for this
specific purpose.
The threat of a radiological or nuclear release by a light GA
aircraft is tempered some- what by the fact that other means of
attack (e.g., a suitcase, a car, etc.) are just as effective as
aircraft in delivering such a device to a target site.
There are three primary issues to consider when addressing
security of GA airports and aircraft. First, what is the threat to
GA airports and aircraft; second, what is the threat to the public
or infrastructure from GA aircraft; and third, what security
measures should be required or recommended to prevent both of
the aforementioned threats from occurring?
The biggest challenge in preventing attacks either on or with
GA aircraft is that GA operations are vastly different than flight
operations at a commercial-service airport.
*
5. Practical Aviation Security – Chapter 9
Securing General Aviation
GA aircraft operations are regulated under Title 49 CFR Part
1550
Large Aircraft Security Program (LASP)
Although commercial service airports operate under
Transportation Security Regulation Part 1542, GA airports do
not have a counterpart regulation.
GA aircraft operations are regulated under Title 49 CFR Part
1550 for those aircraft operators conducting charter operations
with aircraft in excess of 12,500 pounds MGTW (maximum
gross takeoff weight) or aircraft operators whose passengers
deplane into a sterile area.
There are also GA operations at commercial service airports.
Where GA operations occur on regulated commercial service
airports, the tenants are required to adhere to both Part 1542
and the Airport Security Program.
In 2008, the TSA began working on the Large Aircraft Security
Program (LASP), which will likely place regulations on GA
aircraft operations conducted under Title 14 CFR Part 91 that
are similar to the 12-5 Security Program.2 It has yet to be
determined whether these programs will have security related
effects on GA airport operators.
When the private charter rule was implemented, some general
aviation airports saw their large aircraft operations shift to
nearby commercial service airports where screening equipment
and personnel were located.
This migration reduced fuel revenue at those GA airports,
6. normally a major source of airport revenue.
*
How 9-11 Changed GA
The Aviation and Transportation Security Act of 2001 and
several other security measures aimed at restricting GA
operations were implemented after 9-11.
These include regulations covering:
Security regulations on public and private charter flights,
Airspace restrictions,
New rules for flight training operations (Title 49 CFR Part
1552).
*
Photo I.D. required to fly
New pilot certificate
A significant change to aviation (general and commercial)
affecting pilots was the change to the long-standing pilot
certificate.
All pilots are required to have both the pilot certificate and a
7. government-issued photo ID with them when flying.
The FAA issued redesigned pilot certificates, which are difficult
to forge.
When a pilot applies for a medical certificate or any new flight
rating or certificate, the TSA checks the applicant against the
no-fly and selectee lists, and possibly other terrorists watch
lists.
*
Airspace
After 9-11, the U.S. government felt the quickest way to protect
essential facilities and places where large numbers of people
gathered was to restrict the airspace around those venues.
In addition to the regular airspace classifications, several areas
are restricted in the interest of national security. The 9-11
attacks significantly expanded these restrictions.
Airspace restrictions primarily fall under the following five
categories:
The air defense identification zone (ADIZ) extends from the
surface to 18,000 feet. A contiguous ADIZ surrounds the entire
United States; for an aircraft to enter, either an IFR flight plan
or a Defense VFR flight plan is required. ADIZs are established
over other areas such as military bases and centers of
government (Washington, D.C.). VFR traffic entering an ADIZ
must have permission from an air traffic control center.
A flight restriction zone (FRZ) extends in a circle around the
8. Washington Monument. Entry is authorized only to those who
have received a waiver from the TSA.
Prohibited airspace is continuously off limits. P-56, the
prohibited area above the White House, extends from the ground
to 18,000 feet. P-40 is the designation for the prohibited
airspace above Camp David.
Restricted Airspace is more flexible than Prohibited airspace.
Restricted airspace can be entered with permission of air traffic
control. There is a large area of Restricted airspace surrounding
Camp David, which becomes prohibited airspace when the
president of the United States is staying there.
Temporary flight restrictions (TFRs) are areas temporarily
designated as restricted or prohibited airspace. These are
frequently established for special activities such as sporting
events or when the president flies into a city outside of
Washington, D.C. There are TFRs over Disneyland in California
and Walt Disney World in Florida, U.S. power plants, for
various air shows, and other activities.
*
Practical Aviation Security – Chapter 10
How 9-11 Changed GA
Other special use airspace also exists and must be observed by
GA pilots. Areas of special use airspace, which may be
generally accessed by VFR traffic are:
National security areas,
Military operations areas (MOAs)
Military training routes (MTRs)
9. Operations in the Washington, D.C., ADIZ (and other areas of
restricted airspace) fall under Special Federal Aviation
Regulations (SFARs).
The establishment of TFRs and the expanded ADIZ over
Washington, D.C., resulted in numerous violations as general
aviation pilots on VFR flights wandered into restricted or
prohibited airspace.
The Aircraft Owners and Pilots Association (AOPA) (and other
general aviation groups) has been a strong opponent of
unnecessary TFRs, although the organization remains a strong
supporter of sound GA security measures.
There are numerous occasions where the AOPA has opposed the
government’s initial security proposals but supported other
sound alternatives.
*
Practical Aviation Security – Chapter 10
How 9-11 Changed GA
Temporary Flight Restrictions
Airspace restrictions are one strategy that the government uses
to protect facilities and congested populations during special
events. The issuance of temporary flight restrictions has become
a confusing issue for the GA community and has resulted in
thousands of unintentional violations. The FAA has a website
where pilots can find information on TFRs, but it is still
difficult for pilots to keep up with new and changing TFRs.
As of December 2006, there were 6,658 TFR violations since 9-
11. More than 1,600 were within TFRs over locations where the
10. president of the United States was traveling, more than 3,000
were related to Washington, D.C., security breaches, and 2,600
were related to pilots inadvertently flying into the Washington,
D.C., ADIZ.
In many cases, the aircraft in violation had to be intercepted by
a U.S. military or Customs and Border Protection aircraft..
Part of the reason there are so many airspace violations has
been mentioned—making sense of the actual TFR itself. The
other problem contributing to airspace violations is that for
many years pilots knew the areas to avoid; they were clearly
marked on aeronautical charts and temporary flight restrictions
were rare.
Pilots must now diligently read each applicable NOTAM and
check additional information online to ensure that he or she has
all of the information essential for the flight, including TFRs,
which are temporal in nature.
The FAA recently started a Washington, D.C., ADIZ training
course in an attempt to reduce the number of violations
*
Practical Aviation Security – Chapter 10
How 9-11 Changed GA
*
11. ReinforcementSecuring general aviation is challenging
considering the magnitude and nature of GA operations
General aviation aircraft account for more passengers and hours
flown than commercial service aircraft
The Aviation and Transportation Security Act of 2001 and
several other security measures aimed at restricting GA
operations were implemented after 9-11
All pilots are required to have both the pilot certificate and a
government-issued photo ID with them when flying
After 9-11, the U.S. government felt the quickest way to protect
essential facilities and places where large numbers of people
gathered was to restrict the airspace around those venues
General Aviation Airport Security Program
Since 9-11, the TSA and the U.S. Congress have focused on
creating security regulations for commercial service airports
and the airline industry. These regulations have had minimal
impact on GA operations.
With a lack of security regulations covering GA airport
operations, GA airport sponsors routinely question why security
measures and related funding should be of concern.
*
12. Practical Aviation Security – Chapter 9
General Aviation Airport Security Program
DHS identified security threats related to general aviation
community:
Using GA aircraft as a weapon of mass destruction
Using GA aircraft to transport dangerous individuals
Using GA aircraft to transport dangerous materials
The Department of Homeland Security has identified three
security threats related to the general aviation community:
using a GA aircraft as a weapon of mass destruction
using GA to transport dangerous individuals into the country
using GA to transport dangerous materials into the country
There is some evidence to support these concerns as the GA
industry was heavily used throughout the 1970s, 1980s, and
1990s to smuggle drugs into the United States.
Additionally, it was within the GA flight training industry
where the 9-11 hijackers trained.
GA airports house fuel trucks and fire trucks, either of which
can be stolen and used for other purposes, such as a bomb or to
gain or force access into a secure area. GA airports may also be
targets for domestic terrorism, acts of violence from radical
environmental or wildlife activists groups, criminal activities,
or even workplace violence.
Certain structures on airports may be considered high-value
13. targets, particularly air traffic control facilities and airway
navigation equipment.
The destruction of a small air traffic control tower at a remote
GA airport could be a significant achievement for a domestic
terrorist organization determined to make a statement about the
impact of aviation on the environment or to inflict harm to a
society and its government.
*
Practical Aviation Security – Chapter 9
General Aviation Airport Security Program
Airport managers routinely find themselves involved in:
Community noise issues
Wildlife management
Development projects
Wetland protection
Management of storm water runoff
Airport managers routinely find themselves involved in:
Community noise issues
Wildlife management
Development projects
Wetland protection
14. Management of storm water runoff
These issues are often interrelated with other environmental
concerns such as deicing chemicals or pesticides.
These and many other issues are environmentally important,
making airports and associated facilities potential targets for
ecoterrorist groups, vandalism, and civil disturbances.
*
Economic benefit
There is an economic benefit to securing the GA airport.
A secure airport can attract corporate operators who are looking
to protect their multimillion-dollar investment in aircraft
transportation.
Without proper security measures, corporate operators often
will land at a GA airport to drop off or pick up passengers, then
ferry the aircraft to another nearby airport that does have
adequate security (e.g., perimeter fencing, security patrols, and
airfield access control measures). In these cases, the unsecured
GA airport often loses the fuel sales and service fees.
Airfield security measures usually have an added safety benefit
by restricting access to those who have business on the airport.
Access control measures have been successfully used to reduce
runway incursions for several years, and fencing helps keep
wildlife and inadvertent access by the public from coming onto
the airfield.
15. There are few in the GA airport community who want to
administer new TSA regulations! With every new GA security
incident, lawmakers again examine GA as a potential concern
for national security.
*
Practical Aviation Security – Chapter 9
General Aviation Airport Security Program
RVA’s GA Airport Security Program Contents
Protected as confidential information
Distribution of security plan
ASC contact info
General airport information
Definitions and terms
Description of AMA
Description of the airport security procedures
Copy of the airport emergency plan grid map
Identification of airport personnel
Law enforcement support
Airport security committee
Security training programs for airport tenants
Local TSA and FBI contact information
Information technology security procedures
Robinson Aviation, Inc. (RVA), a Virginia-based company that
conducted GA security assessments throughout Virginia and
other states, developed an airport security program format for
GA.
16. RVA’s GA Airport Security Program Contents
Notification that the document is protected as confidential
information.
Distribution of the security plan and record of amendments.
Airport security coordinator contact information and security
responsibilities.
General airport information. Description of the airport,
organizational structure, airport activities and characteristics,
emergency contact telephone numbers, airport administration,
and airport address.
Definitions and terms.
Description of the aircraft movement area (AMA). Some GA
operators may elect to use the AMA in lieu of using the Part
1542 terminology of air operations area, secured area, and so on
to delineate the location that must be protected (i.e., the
airfield).
Description of the airport security procedures, including the
designation of areas if so desired, access control procedures,
airport security processes, and perimeter barriers/fencing.
A copy of the airport emergency plan grid map. Normally, this
map is used by off-and on-airport fire response personnel to
locate crash sites. It is also helpful for law enforcement officers
(LEOs)when they need to respond to a particular part of the
airfield and should be supplied to those local LEOs who
normally patrol or respond to the airport.
Identification of airport personnel. This section describes the
personnel identification and vehicle identification system. At
17. airports with formalized badging, this section describes the
background checks that individuals are required to undergo to
receive a badge, and any security training they must complete,
along with recurrent certification procedures. Although many
GA airports do not have a formalized badging process (some
do), other forms of ID can be used to properly identify who is
on the airfield. Some examples are government-issued photo
IDs and an FAA-issued pilot certificates, law enforcement or
emergency worker identification, FAA or TSA inspector
credentials, military identification, or a driver’s license.
Vehicle identification requirements are also described in this
section, along with the requirements to obtain appropriate
vehicle identification.
Law enforcement support. This section includes any
memorandum’s of understanding or letters of agreement that
exist between the airport and any law enforcement agency, plus
descriptions of the roles and responsibilities of feder al, state,
and local law enforcement agencies with respect to the airport.
This section includes communication protocols with law
enforcement, records of LEO activity on airport property, and
any training programs for LEOs for airport security response
procedures.
Airport security committee. This section describes the makeup,
mission, and meeting schedule of the airport security
committee. The committee should include the airport operator,
local law enforcement and any contracted airport security
personnel, representatives from the airport tenants including
fixed-base operator management, corporate operators, small
aircraft operators, flight schools, aircraft maintenance operators
and similar personnel, aircraft rescue and fire-fighting
personnel, and local community representatives. To keep the
size of the committee manageable, airport tenants with similar
business structures may wish to appoint a designee to represent
their interests collectively. For example, at airports where there
18. are dozens of based corporate flight operators and perhaps
hundreds of small aircraft operators, they will usually form
their own associations on the airport. These associations should
be represented on the security committee.
Security training programs for airport tenants.
Local TSA and FBI contact information for individuals who can
work with the airport operator on security-related issues.
Information technology security procedures to ensure computer
security is maintained, including management and operational
controls.
Most GA airports have an airport emergency plan (AEP) that
describes procedures to be used in the event of a number of
emergencies, including aircraft crashes, power outages,
hazardous material incidents, and bomb threats. When an airport
security program is developed for a GA airport, the security
sections, hijacking, bomb threat, improvised explosive device
detection and mitigation, and so on should be extracted from the
AEP and placed in the security plan. This will prevent the
inadvertent release of security-sensitive information to the
general public as the AEP is usually a public document and
susceptible to open records requests.
Should GA airports be regulated, it is likely that the regulations
will contain elements of, if not completely mirror, Part 1542
Partial Security Programs. In developing an airport security
program for a GA airport, the operator should take this into
consideration.
*
GA Airport Security Best Practices
19. *
Practical Aviation Security – Chapter 9
GA Airport Security Best Practices
Logistical Concerns
Size and nature
Staffing
Airport funding
Creating security procedures at GA airports requires operators
to consider numerous logistical concerns.
GA airport operations vary widely in size and nature.
Some may be single dirt strips with a couple of flight training
aircraft conducting three or four operations a month.
Others may be large, busy corporate GA airports with numerous
runways located near large cities, accommodating 20,000
operations or more a month and mostly with large business jet
aircraft.
Many smaller GA airport operators believe they pose very little
security risk, whereas larger GA airports provide access to
aircraft carrying tens of thousands of gallons of fuel, making
20. them potential weapons.
Staffing at GA airports also varies.
At some small facilities the airport manager may not be a full -
time employee.
Medium-sized GA airports usually have staff ranging from 2 to
10 personnel.
Large GA airports can employ a staff of 20 or more.
Airport funding is also problematic for GA airports. Funding
may be available from the Department of Homeland Security
(DHS) through the State Homeland Security Grant Program.
The State Homeland Security Grant Program provides funding
to states to purchase equipment to protect critical infrastructure.
This includes funding safety measures applied to GA airports.
Preventing aircraft theft is primarily the aircraft owner’s
responsibility.
*
State of GA Security
In 2007, Airport Cooperative Research Program
(ACRP)/Transportation Research Board (TRB) completed a
study of GA safety and security practices
In 2007, the Airport Cooperative Research Program
(ACRP)/Transportation Research Board (TRB) completed a
study of GA safety and security practices. The report discovered
several interesting perspectives related to GA security:
21. Federal regulation of general aviation airports is very limited
and often left to the states, more than half of which have
licensing and inspection requirements for GA airports. These
requirements are most often related to safety and follow the Part
139 guidelines, but they are not necessarily related to security.
GA airports frequently enter into agreements with local
emergency responders and other federal and state law
enforcement agencies to assist with security.
Although both the FAA and the TSA have promulgated
legislation to address general aviation airports, few actual
regulations have been generated.
The majority of GA airports (80%) that responded to the TRB’s
survey reported that they do have a security plan in place.
However, many do not have an active airport security
committee.
With respect to perimeter fencing, most of the airports were
greater than 40% fenced, and fencing was reported to be one of
the primary upgrades to security. The report also noted that
most fencing was in place before 9-11 and was intended to deter
wildlife from the airfield.
Most airports participate in the Airport Watch Program of the
Aircraft Owners and Pilots Association (AOPA) (discussed later
in the chapter), and one airport, Centennial Airport in Denver,
Colorado, takes it a step further and offers a reward program for
providing information that leads to an arrest or investigation.
Several states, including Virginia and Colorado, had taken
additional measures related to GA airport security. Virginia now
has a voluntary security certification program and airports may
receive education as well as technical and resources assistance
22. to secure their facilities.
Colorado’s Office of Preparedness and Security developed the
Terrorism Protective Measures Resource Guide, and one airport
operator called in the National Guard’s Full Spectrum
Integrated Vulnerability Assessment team to assess the airports’
vulnerabilities. Several industry organizations including the
National Business Aviation Association and Airport’s Council
International developed security guidance for their members.
*
Attempts to Secure General Aviation
In 2003, the TSA commissioned an aviation security advisory
committee comprised of numerous industries such as the
American Association of Airport Executives, the National
Business Aviation Association, and the National Air Transport
Association.
The committee developed a comprehensive list of
recommendations, which were forwarded to the TSA for
consideration resulting in Information Publication (IP) A-001
Security Guidelines for General Aviation Airports.
*
Practical Aviation Security – Chapter 9
Attempts to Secure General Aviation
IP A001 focused on security enhancements in six areas
23. Personnel
Aircraft
Airport/Facilities
Surveillance
Security plans and communications
Specialty operations
The IP A001 focused on security enhancements in six areas.
Among the recommendations are the following:
Personnel
The pilot in command should verify the identities of his or her
passengers.
Restrict access to aircraft by student pilots.
Fixed-base operators should implement sign-in/sign-out
procedures for transient pilots.
Aircraft
Aircraft should be secured using existing mechanisms such as
door locks, keyed ignitions, aircraft stored in hangars, and the
use of propeller or throttle locks or security tape.
Airports/facilities
Implement reasonable vehicle access controls to facilities and
ramps, including signage, fencing, gates, or other positive
control techniques.
Install outdoor lighting covering aircraft parking and hangar
areas, fuel farm and fuel truck parking areas, and airport access
points. Fuel trucks and fire trucks should require higher levels
of protection.
Secure hangar doors when unattended.
Post signs warning against trespassing and unauthorized use of
aircraft, and post phone numbers to airport operations and the
24. nearest law enforcement agency
Surveillance
Implement an airport community watch program such as the
AOPA Airport Watch.
Familiarize local law enforcement officers with the airport
facilities. This should include advising law enforcement of who
is authorized to be on the property, how to drive on the airfield
without endangering aircraft, and the normal operations for that
airfield.
Security procedures and communications
Create a security plan for the airport including an emergency
locator map (often used by the fire department to quickly find
facilities on airport), and create procedures for handling bomb
threats and suspected stolen or hijacked aircraft.
Develop a threat communication system including 24-hour
phone numbers for the airport director, local police or sheriff’s
department, fire department, FBI, TSA, and other organizations.
Specialty operations (such as agricultural flights)
This section addresses agricultural aircraft operations and the
importance of aircraft owners to control access to their aircraft
and chemicals.
The TSA also included an airport self-assessment that airport
operators could use to determine security measures they should
be implementing. The TSA has attempted to put the assessment
tool into a computer program, but that effort has not been
successful because of the variety of operational characteristics
in GA airports.
*
State Actions
In 2002, several states attempted to pass laws placing severe
restrictions on GA aircraft operators but met strong opposition
25. by FAA
Several states have started to adopt their own general aviation
airport regulations. Many of these programs have been in
response to specific aviation security incidents.
Historically, it has been illegal for states to impose regulations
on federally funded airports. Although this has occurred in
some states, such as California, the FAA is very careful that
state restrictions or regulations on airports do not interfere with
the national air traffic control system or intrastate commerce.
*
AOPA Airport Watch
Enlists 550,000 GA pilots to watch for and report suspicious
activities
One of the more popular GA security programs is the
AOPA/TSA partnership Airport Watch Program. This program
enlists the support of 550,000 GA pilots to watch for and report
suspicious activities that might have security implications.
*
ReinforcementCreating security procedures at GA airports
requires operators to consider numerous logistical concerns
In 2007, Airport Cooperative Research Program
26. (ACRP)/Transportation Research Board (TRB) completed a
study of GA safety and security practices
In 2003, TSA commissioned an aviation security advisory
committee comprised of numerous industries
Information Publication (IP) A-001 Security Guidelines for
General Aviation Airports focused on security enhancements in
six areas
Several states have started to adopt their own general aviation
airport regulations
One of the more popular GA security programs is AOPA/TSA
partnership Airport Watch Program
Fixed-Base Operator Security
“Truck stop” for GA aircraft
Fixed-base operators (FBOs) serve as the “truck stops” for GA
aircraft. FBOs provide fueling, aircraft handling, and hangar
storage services. Many FBOs also provide aircraft charter
services. FBOs and business aircraft operators share the
responsibility and work together to secure the business aviation
industry.
*
Signature Aviation Flight Support was one of the first FBOs to
develop its own security procedures
FBOs are predominantly represented by the National Air
27. Transport Association. Signature Aviation Flight Support was
one of the first FBOs to develop its own security procedures,
which include the following recommendations:
Flight crews must provide photo identification to gain access to
the Signature ramp.
Flight crews must identify all passengers before they are
allowed access to Signature’s ramp and escort passengers to and
from their aircraft.
FBO personnel must maintain line-of-sight surveillance of
passengers on the ramp who are not escorted by the pilot.
Passengers are asked to walk directly, and as a group, to their
aircraft and not delay entering their aircraft.
Transient flight crews are issued special codes upon their
arrival to guarantee that the same flight crews return to their
respective aircraft.
The use of personal cars or limousines on Signature’s ramp is
not permitted.
*
Secure Fixed-Base Operator (FBO) Program
TSA’s Secure Fixed Base Operator Program –
A proof of concept, public-private sector partnership program
will allow FBOs to check passenger and crew identification
against manifest or eAPIS10 filings for positive identification
of passengers and crew onboard general aviation aircraft.
28. eAPIS checks are becoming an increasing part of GA security as
DHS focuses more on deterring or catching individuals with ill -
intent coming into the United States.
*
Helicopter Security
*
Practical Aviation Security – Chapter 9
Helicopter Security
Fly at slow speeds, through congested city areas
Helicopter security should include suspicious awareness
training
Tourist platforms, oil rig transport, medical and law
enforcement, power line maintenance
Helicopters are able to fly at slow speeds, through congested
city areas making them excellent platforms to fly in armed
personnel to conduct a terrorist active shooter inside a stadium,
airport or any open air assembly, bypassing any ground
29. defenses.
Helicopters have mostly been used for prison escapes, and as
observation platforms for follow up criminal activity.
As with other forms of aviation, security measures should not
eliminate the inherent benefit and use of the form of
transportation or use. Helicopters are profitably operated as
tourist platforms and for all sorts of other uses such as oil rig
transport, medical and law enforcement, power line
maintenance, and so on. Good helicopter security should include
suspicious awareness training for helicopter pilots and
helicopter operations personnel.
Security programs should be part of any helicopter operation
with procedures for pilots under duress (code words, panic
alarms), being hijacked or feeling that there is a threat on their
helicopter.
In certain cases, commercial helicopter operations feed directly
into aircraft flight operations, so any charter or scheduled
helicopter flight that transfers baggage and passengers into a
commercial airliner under a security program should ensure that
all personnel and items have undergone the appropriate
screening.
*
Training for GA Airport Security and Law Enforcement
Personnel
Training for operators without security background, newcomers,
aviation businesses, pilots and aircraft owners, and law
enforcement and emergency workers
30. GA security-related training programs include topics such as the
following:
How to recognize GA aircraft and facilities that could be used
for illegal purposes
How to apply crime prevention through environmental design
concepts to GA airports
Establishing an Airport Watch Program
Establishing an aircraft key control system
Antitheft devices for GA aircraft
Security signage and marking plans
How to orient local law enforcement officers to the airport
environment and aircraft operations
Creation of an airport security committee
Creation of an emergency notification system
National Incident Management System fundamentals
How to create a business continuity plan
Developing instruction detection, integrated security, and
closed-circuit television systems
Troubleshooting airport security plans
Most GA airport operators do not have aviation security
experience or only may have commercial airport security
experience. Therefore, training in GA security should be
required for anyone without a GA security background.
*
Alien Flight Student Program
Title 49 CFR Part 1552
31. Title 49 CFR Part 1552 addresses the security of flight schools
and awareness training for flight school employees.
Considering that the 9-11 hijackers were trained at U.S. flight
schools, it made sense to begin applying security regulations for
flight schools. Shortly after 9-11, the FAA sent security
guidance to all flight schools.
*
Practical Aviation Security – Chapter 9
Alien Flight Student Program
Alien Flight Student Program
(Flight Training Candidate Checks Program)
Candidates wishing to receive flight instruction on an aircraft
that is 12,500 pounds or less, must prove US citizenship
Originally known as the Alien Flight Training Rule (now known
as the Flight Training Candidate Checks Program), this section
requires every flight student to prove his or her U.S. citizenship
before beginning flight training in an aircraft weighing 12,500
pounds or less.
Foreign flight students are required to complete a criminal
history record check(CHRC) and submit their finger-prints to
the TSA.
32. The regulation not only applies to the thousands of flight
schools across the United States but also to every individual
certified flight instructor, every airline flight-training academy
that uses flight simulators, and any aviation college or
university conducting flight training.
Section 1552.3 applies specifically to instruction given in an
aircraft with a maximum gross takeoff weight of more than
12,500 pounds. The regulation requires flight schools to notify
the TSA that a candidate has requested such flight training.
For candidates wishing to receive flight instruction on an
aircraft that is 12,500 pounds or less, the flight school or flight
instructor must verify the student's U.S. citizenship; if the
candidate is not a U.S. citizen, the flight school or flight
instructor must require the individual to register with the TSA
before beginning flight training.
*
Practical Aviation Security – Chapter 9
Flight School Security Awareness Training
Flight School Security Awareness Training
Good security of flight school aircraft or any aircraft on a GA
airport should include:
Locking aircraft
Using throttle, prop, and tie-down locks
33. Securing hangar doors
Not leaving ignition keys in the aircraft, even momentarily
Reporting suspicious activity to the authorities immediately
Vigilance on the part of the flight instructor over his or her new
students until trust has been established
The TSA has also created a flight school awareness training
program. Title 49 CFR Parts 1552.21 and 1552.23 are specific
to flight schools operating under Title 49 U.S.C. Subtitle VII.
Part 1552.23 requires that each flight school employee must
complete the TSA’s Flight School Security Awareness Training
Program.13 Flight schools must maintain records of the security
awareness training completed by their personnel.
The training includes:
Situational scenarios,
Suspicious behavior of personnel,
Signs that an aircraft has been altered for illegal uses
Other information useful for identifying flight candidates who
may be pursuing illegal activities.
Flight schools may elect to use their own training program,
which must include everything in the TSA’s online training.
Shortly after 9-11, the FAA issued guidance for flight school
security. The TSA followed up with its own handout in 2006.
*
Practical Aviation Security – Chapter 9
34. Maryland-3
Maryland-3
College Park
Washington Executive/Hyde Field
Potomac Airfield
Title 49 CFR Part 1562 addresses three GA airports located
close to the center of Washington, D.C. These are:
College Park Airport
Washington Executive/Hyde Field
Potomac Airfield
They are presently the only GA airports with specific security
regulations.
Each of the Maryland-3 airports must have an airport security
coordinator who, similar to an airport security coordinator at a
commercial service airport, administers the TSA’s security
requirements. This includes maintaining a copy of the airport
security procedures and a copy of the FAA procedures
applicable to GA operations at the Maryland- 3 airports.
The Security coordinators must:
Provide their names and other identifying information including
fingerprints and social security numbers to the TSA.
Have successfully completed a security threat assessment (STA)
and not have been found guilty (or not guilty by reason of
insanity) of any of the disqualifying offenses as outlined in
Title 49 CFR Part 1542.209.
Must implement a set of security procedures. These include:
Keeping a record of those authorized to use the airport,
Monitoring the security of aircraft during operational and
nonoperational hours,
Alerting aircraft owners/operators and the TSA of unsecured
aircraft,
Implementing and maintaining security awareness procedures at
35. the airport,
Limiting approval for pilots who violate the Washington, D.C.,
Metropolitan Area Flight Restricted Zone and are forced to land
at the airport.
They also contain any additional procedures required by the
TSA to provide for the security of aircraft operations into or out
of the airport.
The TSA has the authority to inspect the airport and related
security program documentation.
Each pilot flying into and out of the Maryland-3 must provide
the TSA with:
Name,
Social security number,
Date of birth,
Current address and phone,
Current airman or student pilot certificate,
Medical certificate,
A government-issued photo ID,
Fingerprints.
Each pilot must:
Provide a list of the make, model, and registration number of
each aircraft that he or she intends to operate at the airport.
Successfully complete a security threat assessment and receive
a briefing acceptable to the TSA and the FAA of the operating
procedures for the airport.
Not have been convicted or found not guilty by reason of
insanity, in any jurisdiction, during the 10 years preceding
application for authorization, of any of the disqualifying
offenses listed in 49 CFR 1542.209.
Not have a record on file with the FAA of a violation of a
prohibited area, a flight restriction, any special security
instructions issued under 14 CFR 99.7, a restricted area
designated, any emergency air traffic rules issued under 14 CFR
91.139, or a temporary flight restriction.
36. If a pilot or airport security coordinator violates any of these or
commits a disqualifying offense, he or she must notify the TSA
within 24 hours of conviction.
Pilots flying into the Maryland-3 must secure their aircraft after
flight, file a flight plan (IFR or VFR), and obtain an air traffic
control clearance and transponder code.
*
ReinforcementFixed-base operators (FBOs) serve as “truck
stops” for GA aircraft
FBOs are predominantly represented by National Air Transport
Association
Good helicopter security should include suspicious awareness
training for helicopter pilots and helicopter operations
personnel.
Training in GA security should be required for anyone without a
GA security background
Title 49 CFR Part 1552 addresses security of flight schools and
awareness training for flight school employees
Candidates wishing to receive flight instruction on an aircraft
that is 12,500 pounds or less, must prove US citizenship
Title 49 CFR Part 1562 addresses three GA airports located
close to center of Washington, D.C
Aircraft Security under General Operating and Flight Rules
Title 49 CFR Part 1550
37. Title 49 CFR Part 1550:
Applies to general aviation aircraft operations,
Provides for the TSA to inspect any aircraft operations into
sterile areas of commercial service airports.
Includes requirements of the Twelve-Five Security Program for
aircraft engaged in scheduled service, charter, or cargo
operations that are more than 12,500 pounds and not under any
other security program.
For aircraft operations where a sterile area is involved, either if
a passenger or crewmember enplanes from or deplanes into one,
if the operation is not already covered under a scheduled
passenger service security program (full or partial) or public or
private charter operations under Title 49 Part 1544 or Part 1546,
screening must be done.
*
Practical Aviation Security – Chapter 10
Twelve-Five Standard Security Program
Aircraft of 12,500 pounds or more not operating into or out of a
sterile area and not covered under a program under Title 49
CFR Part 1544 or 1546 (Domestic or Foreign Air Carrier
Operations) must adhere to the Twelve-Five rule.
Aircraft of 12,500 pounds or more not operating into or out of a
38. sterile area and not covered under a program under Title 49
CFR Part 1544 or 1546 (Domestic or Foreign Air Carrier
Operations) must adhere to the Twelve-Five rule.
Any aircraft operator conducting commercial aircraft operations
(scheduled service, private or public charter or cargo) where the
operator owns or has managing control of the aircraft must
search the plane before departure and screen passengers and
carry-on items.
The TSA must first notify the aircraft operator that such
security measures are necessary through NOTAM, letter, or
other communication. Aircraft operators can apply for waivers
from the TSA for these procedures.
Presently almost 1,000 aircraft operators must adhere to the
Twelve-Five rule.
*
Practical Aviation Security – Chapter 10
Agricultural Aircraft Security
Security recommendations for agricultural operators
Securing aircraft and chemical agents
Enhancing lighting
Parking farm equipment to prevent taxiing
Establish contact with local law enforcement
The FBI indicated that in 1993 Osama bin Laden assessed the
possibility of using an agricultural aircraft as a method to
disperse chemical or biological weapons.
39. After 9-11, the FBI visited the thousands of agricultural pilots
across the United States to assess the potential risk from this
industry. In an effort to prevent the theft of their planes for
potential use in a terrorist attack and to ward off stifling federal
regulations, the National Agricultural Aviation Association
developed several security recommendations and participated on
the TSA advisory committee.
Although the threat from a stolen agricultural aircraft exists, the
aviation agricultural community is small and well known to the
local farmers and chemical distributors.
Security recommendations for agricultural operators include:
Securing aircraft and chemical agents when not in use,
Enhancing the lighting around aircraft and chemical storage
areas,
Parking farm equipment such as loaders and combines in areas
that prevent taxiing of aircraft when not in use,
Establishing contact with local law enforcement agencies.
Immediately reporting stolen aircraft or chemical agents is
fundamental to agricultural aviation security.
*
Corporate Aviation Security
There is no hard and fast definition of a corporate aircraft. A
corporate aircraft could be a Cessna 172 that a business uses to
fly for servicing regional accounts. A corporate aircraft could
also be a Gulfstream V, a large business jet, owned by a large
corporation and that flies to destinations around the world.
Although the security measures discussed in this section are
40. directed primarily at the larger business aircraft, they could also
apply to smaller aircraft operations.
Overall, the business aviation community may not have the
security measures of commercial aviation operations, such as
passenger and baggage screening, but it is a mistake to think
that no security measures are present. A corporate aircraft is a
multi million dollar investment for a business, and businesses
owners want to ensure that investment is protected.
*
Practical Aviation Security – Chapter 10
Corporate Aviation Security
Long before 9-11, corporations already took many preventative
measures to ensure the safety and the security of their aircraft
and passengers
Business dealings throughout the world
Motivated to provide for security of flight operations
Long before 9-11, corporations already took many preventative
measures to ensure the safety and the security of their aircraft
and passengers. It is not uncommon for a business aircraft to fly
into a small airport that is more convenient for their passengers
but lacks the hangar space to store the aircraft, then to shuttle
the aircraft to another larger airport to hangar the aircraft until
it is needed again, hours or days later.
41. Another factor with corporate aircraft security is that
corporations often have business dealings throughout the world.
Corporate aviation security considerations must include
differences in culture, customs laws, currency, immigration, and
the threat to the aircraft and its occupants in various parts of the
world.
Corporations are also motivated to provide for security of their
flight operations as a litigious society has made certain that
were anything to happen to the safety and security of those
carried onboard a corporate plane, the corporation would have
to demonstrate in court that diligent and reasonable security
measures were taken.
Regardless of the size of the company, every corporate aircraft
operator should have a designated security director and a
standard aircraft operations security program administered by
the coordinator.
A few aircraft operators are large enough and have enough
cause to go into Reagan National Airport that they employ their
own armed security officers (ASOs) who are certified law
enforcement officers.
*
Practical Aviation Security – Chapter 10
Corporate Aviation Security
National Business Aviation Association (NBAA) provided list
for minimum security requirements
Ensure home facility perimeter security
42. Require positive access control
Close and lock hangar doors
Confirm the identity and authority
Post emergency numbers
Confirm security of destination facilities
The following bullet list is provided by the National Business
Aviation Association (NBAA) (1995-2008) and should serve as
minimum security requirements at the corporate operator’s
home base:
Ensure home facility perimeter security with effective fencing,
lighting, security patrols, gates and limited access areas
Ensure street-side gates and doors are closed and locked at all
times
Require positive access control for all external gates and doors
Close and lock hangar doors when the area is unattended
Secure all key storage areas (food and liquor, parts and tools,
etc.)
Have an access control management system for keys and passes
Confirm the identity and authority of each passenger, vendor
and visitor prior to allowing access to facilities and aircraft
Escort all visitors on the ramp and in the hangar area
Use a government issued photo ID to verify the identity of any
visitor or vendor
Post emergency numbers prominently around facility
Ensure easy access to phones or "panic buttons" in various
facility locations (break room, hangar bay, etc.)
Confirm security of destination facilities
Be aware of your surroundings and do not be complacent —
challenge strangers
43. *
Operational Security OpSec
Keeping private matters private
Operational Security or OpSec, means keeping private matters
private. Only those with a “need to know” should be provided
with information relating to operational security. OpSec
includes:
The details of any corporate travel,
Security of computer information systems including laptops and
personal digital assistants that may include corporate
proprietary information and the protection of any written
materials that may be kept onboard during the flight.
*
Predeparture security procedures are completed whether aircraft
is at its home base or at a transient location
Predeparture security procedures are completed whether the
aircraft is at its home base or at a transient location.
Predeparture procedures include:
Observing all maintenance on the aircraft during the time it is in
a foreign airport,
44. Observing catering, fueling, and other activities to ensure that
no dangerous or illegal items are placed onboard.
Any stores, such as food, beverages, cleaning materials, etc.,
should be inspected before being brought onboard.
People not associated with the aircraft should be kept away
from it.
Checking the identity of all personnel onboard the flight, and
where appropriate, screening passengers and bags.
Passengers should be either on a list of those authorized to fly
on the corporation’s plane, or be vouched for by a passenger on
the authorization list.
Collecting as much information as possible about the
destination airport(s) and disseminating it to the passengers and
crew via an intelligence briefing.
The briefing is prepared by the security director and should
include the following:
Potential threats including street crime statistics, areas of town
to be avoided, known recent hijackings, kidnappings or
extortion attempts of executives traveling to that region,
situations of general unrest, rioting, and the political and social
climate.
Airport security measures at the destination airport.
Information on fixed base operators including any credentialing
or background check requirements on FBO personnel including
caterers, fuelers, and mechanics.
45. Emergency contact information for the U.S. embassy,
Department of State, local law enforcement agencies, and U.S.
military bases that may be nearby.
Information on ground transportation to and from local hotels,
meeting locations, and so on.
Companies that carry well-known celebrities or political
personalities must also be aware of the presence of unwanted
news media and paparazzi.
*
Intelligence
In-flight security
Flight crew training
Other security practices
When traveling to foreign airports, many corporations elect to
use a groundhandling agent who can assist with customs and
immigrations paperwork and other laws and regulations for
traveling to a specific country. A basic background check
should be done on any company or individual who acts as a
handling agent for the corporation.
Intelligence: Corporations, particularly large corporations,
should generate their own intelligence briefings and reports that
46. are relevant to the operations of the company.
In-flight security: Flight crewmembers should assume the
worst-case scenario if their aircraft is hijacked and take
whatever action is necessary to defend the flight deck from
intrusion and takeover.
With the increase of fractional operators, the pilots may not
know whom they are carrying as much as a corporate flight
crew who is flying the boss’s plane.
Flight crew training: Flight crew personnel should receive self-
defense training and conduct exercises in how to handle a
hijacking attempt.
Other security practices: Other security practices for corporate
operators included the establishment of contingency plans for
unattended items, bomb threats, hijack, and theft attempts.
Corporations should conduct regular security awareness training
for flight crews and passengers and exercises and simulations
for certain aircraft incidents.
*
Practical Aviation Security – Chapter 10
Corporate Aviation Security
National Business Aviation Association Transportation Security
Administration Access Certificate
TSA Access Certificate (TSAAC) Program
Allows operators under Title 14 CFR Part 91 to fly
internationally without having to pass through one of the eight
47. “portal” countries
A major benefit to corporate flying is the ability to access more
than 5,000 U.S. public use GA airports instead of being
restricted to 450 commercial service airports. After 9-11, the
U.S. government put tight restrictions on access to U.S. airports
by GA aircraft coming into the United States from foreign
locations.
The National Business Aviation Association pioneered the TSA
Access Certificate (TSAAC) Program. TSAAC allows operators
under Title 14 CFR Part 91 (private operator/owner) to fly
internationally without having to pass through one of the eight
“portal” countries as outlined in FDC 2/5319.
Presently, the portal countries include:
Canada
Mexico
the Bahamas
England
Scotland
Wales
Northern Ireland
Under the current pilot program, aircraft operators with a
TSAAC certificate may fly out of three airports:
Teterboro, New Jersey
Morristown, New Jersey
White Plains, New York
According to the NBAA website, on August 23, 2006, the FAA
issued NOTAM 6/7435, which allows operators of aircraft under
100,309 maximum take-off weight to fly internationally without
having to pass through a portal country. As a result, operators
meeting the requirements of this NOTAM no longer need to
request waivers or obtain a TSAAC to avoid passing through a
portal country.
48. *
Practical Aviation Security – Chapter 9
DCA Access Standard Security Program (DASSP)
Section 1562.21 applies to:
Aircraft operations into or out of Ronald Reagan Washington
National Airport (DCA)
FBOs located at DCA or gateway airports
Aircraft operator security coordinator and crewmembers,
passengers, and armed security officers on general aviation
aircraft.
Section 1562.21 applies to:
Aircraft operations into or out of Ronald Reagan Washington
National Airport (DCA).
FBOs located at DCA or gateway airports,
The aircraft operator security coordinator and crewmembers,
passengers, and armed security officers on the general aviation
aircraft.
This section does not apply to medical evacuation flights,
commercial service or military flights, or all-cargo operations.
To operate into and out of DCA:
Aircraft operators must designate a security coordinator who
must have passed a CHRC/STA and implement the DCA Access
Standard Security Program.
49. Flight crewmembers are required to pass a CHRC/STA and not
have any airspace restriction violations on record with the FAA.
The aircraft operator must provide passenger manifest
information to the TSA at least 24 hours before a flight and a
security threat assessment will be conducted on each.
The aircraft operator may not carry a passenger into DCA who
has not passed an STA.
For any flight, an aircraft must fly directly from a designated
gateway airport to DCA (no interim stops), and the operator
must ensure that passengers and carry-on bags have been
screened.
Checked baggage and cargo must be screened and be
inaccessible to the passengers throughout the flight.
Aircraft operating out of DCA must be equipped with a cockpit
door and ensure it is closed and locked at all times.
Pilots must notify the National Capital Region Coordination
Center before departure from DCA or a gateway airport into
DCA. TSA has the authority to inspect the aircraft and the
security programs.
*
Practical Aviation Security – Chapter 9
DCA Access Standard Security Program (DASSP)
Each flight must carry a federal air marshal or an armed
security officer (ASO)
ASO program is administrated by federal air marshal service
ASO must be qualified to carry a firearm
Each flight must carry a federal air marshal or an armed
security officer (ASO).
50. The ASO program is administrated by the federal air marshal
service.
Each ASO must be qualified to carry a firearm and complete an
STA and a CHRC.
ASOs include active law enforcement officers employed by a
governmental agency and retired law enforcement officers who
are authorized to carry out the duties of a law enforcement
officer.
Other ASOs must meet the requirements determined by the
federal air marshal service.
Each ASO:
Must complete TSA specific training related to operations into
and out of DCA.
Has the authority to use force, including deadly force.
May not drink alcohol or use intoxicating or hallucinatory drugs
during the flight and within eight hours before the flight.
Must identify themselves to the flight crew before flight.
Each FBO operating out of or into DCA (i.e., a gateway airport)
must implement an FBO security program, which includes
designating a security coordinator, provisions to support the
screening of persons and property, and the aircraft search for
aircraft heading into or out of DCA.
*
ReinforcementAircraft of 12,500 pounds or more not operating
into or out of a sterile area and not covered under a program
under Title 49 CFR Part 1544 or 1546 must adhere to the
Twelve-Five rule
The National Agricultural Aviation Association developed
several security recommendations and participated on the TSA
advisory committee
Long before 9-11, corporations already took many preventative
measures to ensure the safety and the security of their aircraft
51. and passengers
Operational Security or OpSec, means keeping private matters
private
Predeparture security procedures are completed whether the
aircraft is at its home base or at a transient location
TSAAC allows operators under Title 14 CFR Part 91 (private
operator/owner) to fly internationally without having to pass
through one of the eight “portal” countries
Conclusion
This chapter analyzed various strategies for protecting general
aviation airports. Strategies for securing GA airport
environments used by government and stakeholders to GA were
presented. A key challenge to developing legislation, policies
and processes for securing GA airports is that stakeholders have
different perceptions regarding the nature of GA. GA operations
can vary greatly in the types of aircraft used and purposes for
GA flight operations.
Congress and the TSA have focused GA security efforts on GA
aircraft operators rather than GA airport operations.
In 2008, the TSA began working on the Large Aircraft Security
Program, which may result in security regulations for GA
aircraft private operations conducted under Title 14 CFR Part
91.
52. Frustrated with what was perceived as a lack of effort in GA
security, Congress included in the 9-11 Act language requiring
the TSA to assess the threat and vulnerabilities of GA airports
by August of 2008.
The TSA and the FAA are challenged to allocate significant
levels of funding for general aviation security enhancements
because of security demands of commercial aviation and other
modes of transportation. The TSA does offer a Secure Fixed
Base Operator Program allowing FBOs to check passenger and
crew identification against manifest or eAPIS filings for
positive identification of passengers and crew onboard GA
aircraft.
Without regulatory guidance, the creation of airport security
programs for GA airports will continue to be challenging.
Although policies and legislation are debated regarding GA
security issues, most GA airport operators will continue to use
commercial service airport security programs as models for
enhancing security at GA airports.
*
This chapter examines potential security threats to general
aviation (GA) airports and flight operations. Strategies for
protecting GA airports and aircraft are provided and an
overview of changes in aviation security that affected GA
operations after 9/11. You will learn about challenges to
developing and implementing security regulations for GA
airports. We also discuss the security strategies used by the
Transportation Security Administration (TSA) and various GA
airport and aircraft operators.
*
Since 9/11, the general aviation community has struggled to
help the public understand the nature of GA.
General aviation aircraft have long been used as platforms to
53. smuggle narcotics and weapons, and for human trafficking
operations.
In 1993, the FBI indicated that Osama bin Laden assessed the
possibility of using an agricultural aircraft to spread a chemical
agent on a ground target.
GA provides vital services to the United States and greatly
enhances the U.S. economy. GA accounts for some 77% of all
flights in the United States. With more than 200,000 aircraft,
650,000 pilots, and 19,000 airports and landing strips, the GA
industry provides jobs and opportunities for thousands of
people.
*
GA provides vital services to the United States and greatl y
enhances the U.S. economy. Approximately 24% of all GA
flights are conducted for business or corporate use nearly two-
thirds of all business flights carry passengers in mid-level
management positions, sales representatives, and project teams
for major corporations.
GA accounts for three-quarters of all takeoffs and landings in
the United States, contributes about $100 billion to the U.S
economy, and has about 1.3 million jobs.
These estimates do not include multipliers, such as the number
of jobs created by the hotel, rental car, restaurant, and tourist
industries. The creation of GA security policies is important to
protect these interests.
*
Securing general aviation is challenging considering the
magnitude and nature of GA operations. There are
approximately 450 commercial service airports in the United
States and more than 5,000 GA airports. Those 14,000 airports
are not regulated by the Federal Aviation Administration (FAA)
or the TSA.
54. *
Most GA aircraft are too light to be used as a platform for
conventional explosives and heightened vigilance by GA airport
and aircraft operators would make it difficult for someone to
load the necessary quantity of explosives without detection.
The potential exists for light aircraft to be used as a delivery
platform for chemical, biological, radiological, and nuclear
(CBRN) forms of weapons.
Agricultural aircraft used for spraying crops with pesticides and
fertilizers pose a unique threat as a platform for a bio- logical
or chemical attack because they are specifically designed for
aerial dispersal and could be exploited by terrorists for this
specific purpose.
The threat of a radiological or nuclear release by a light GA
aircraft is tempered some- what by the fact that other means of
attack (e.g., a suitcase, a car, etc.) are just as effective as
aircraft in delivering such a device to a target site.
There are three primary issues to consider when addressing
security of GA airports and aircraft. First, what is the threat to
GA airports and aircraft; second, what is the threat to the public
or infrastructure from GA aircraft; and third, what security
measures should be required or recommended to prevent both of
the aforementioned threats from occurring?
The biggest challenge in preventing attacks either on or with
GA aircraft is that GA operations are vastly different than flight
operations at a commercial-service airport.
*
Although commercial service airports operate under
Transportation Security Regulation Part 1542, GA airports do
not have a counterpart regulation.
55. GA aircraft operations are regulated under Title 49 CFR Part
1550 for those aircraft operators conducting charter operations
with aircraft in excess of 12,500 pounds MGTW (maximum
gross takeoff weight) or aircraft operators whose passengers
deplane into a sterile area.
There are also GA operations at commercial service airports.
Where GA operations occur on regulated commercial service
airports, the tenants are required to adhere to both Part 1542
and the Airport Security Program.
In 2008, the TSA began working on the Large Aircraft Security
Program (LASP), which will likely place regulations on GA
aircraft operations conducted under Title 14 CFR Part 91 that
are similar to the 12-5 Security Program.2 It has yet to be
determined whether these programs will have security related
effects on GA airport operators.
When the private charter rule was implemented, some general
aviation airports saw their large aircraft operations shift to
nearby commercial service airports where screening equipment
and personnel were located.
This migration reduced fuel revenue at those GA airports,
normally a major source of airport revenue.
*
The Aviation and Transportation Security Act of 2001 and
several other security measures aimed at restricting GA
operations were implemented after 9-11.
These include regulations covering:
Security regulations on public and private charter flights,
Airspace restrictions,
New rules for flight training operations (Title 49 CFR Part
1552).
56. *
A significant change to aviation (general and commercial)
affecting pilots was the change to the long-standing pilot
certificate.
All pilots are required to have both the pilot certificate and a
government-issued photo ID with them when flying.
The FAA issued redesigned pilot certificates, which are difficult
to forge.
When a pilot applies for a medical certificate or any new flight
rating or certificate, the TSA checks the applicant against the
no-fly and selectee lists, and possibly other terrorists watch
lists.
*
After 9-11, the U.S. government felt the quickest way to protect
essential facilities and places where large numbers of people
gathered was to restrict the airspace around those venues.
In addition to the regular airspace classifications, several areas
are restricted in the interest of national security. The 9-11
attacks significantly expanded these restrictions.
Airspace restrictions primarily fall under the following five
categories:
The air defense identification zone (ADIZ) extends from the
surface to 18,000 feet. A contiguous ADIZ surrounds the entire
United States; for an aircraft to enter, either an IFR flight plan
or a Defense VFR flight plan is required. ADIZs are established
over other areas such as military bases and centers of
government (Washington, D.C.). VFR traffic entering an ADIZ
must have permission from an air traffic control center.
A flight restriction zone (FRZ) extends in a circle around the
Washington Monument. Entry is authorized only to those who
have received a waiver from the TSA.
57. Prohibited airspace is continuously off limits. P-56, the
prohibited area above the White House, extends from the ground
to 18,000 feet. P-40 is the designation for the prohibited
airspace above Camp David.
Restricted Airspace is more flexible than Prohibited airspace.
Restricted airspace can be entered with permission of air traffic
control. There is a large area of Restricted airspace surrounding
Camp David, which becomes prohibited airspace when the
president of the United States is staying there.
Temporary flight restrictions (TFRs) are areas temporarily
designated as restricted or prohibited airspace. These are
frequently established for special activities such as sporting
events or when the president flies into a city outside of
Washington, D.C. There are TFRs over Disneyland in California
and Walt Disney World in Florida, U.S. power plants, for
various air shows, and other activities.
*
Other special use airspace also exists and must be observed by
GA pilots. Areas of special use airspace, which may be
generally accessed by VFR traffic are:
National security areas,
Military operations areas (MOAs)
Military training routes (MTRs)
Operations in the Washington, D.C., ADIZ (and other areas of
restricted airspace) fall under Special Federal Aviation
Regulations (SFARs).
The establishment of TFRs and the expanded ADIZ over
Washington, D.C., resulted in numerous violations as general
aviation pilots on VFR flights wandered into restricted or
prohibited airspace.
The Aircraft Owners and Pilots Association (AOPA) (and other
general aviation groups) has been a strong opponent of
58. unnecessary TFRs, although the organization remains a strong
supporter of sound GA security measures.
There are numerous occasions where the AOPA has opposed the
government’s initial security proposals but supported other
sound alternatives.
*
Airspace restrictions are one strategy that the government uses
to protect facilities and congested populations during special
events. The issuance of temporary flight restrictions has become
a confusing issue for the GA community and has resulted in
thousands of unintentional violations. The FAA has a website
where pilots can find information on TFRs, but it is still
difficult for pilots to keep up with new and changing TFRs.
As of December 2006, there were 6,658 TFR violations since 9-
11. More than 1,600 were within TFRs over locations where the
president of the United States was traveling, more than 3,000
were related to Washington, D.C., security breaches, and 2,600
were related to pilots inadvertently flying into the Washington,
D.C., ADIZ.
In many cases, the aircraft in violation had to be intercepted by
a U.S. military or Customs and Border Protection aircraft..
Part of the reason there are so many airspace violations has
been mentioned—making sense of the actual TFR itself. The
other problem contributing to airspace violations is that for
many years pilots knew the areas to avoid; they were clearly
marked on aeronautical charts and temporary flight restrictions
were rare.
Pilots must now diligently read each applicable NOTAM and
check additional information online to ensure that he or she has
all of the information essential for the flight, including TFRs,
which are temporal in nature.
59. The FAA recently started a Washington, D.C., ADIZ training
course in an attempt to reduce the number of violations
*
*
Since 9-11, the TSA and the U.S. Congress have focused on
creating security regulations for commercial service airports
and the airline industry. These regulations have had minimal
impact on GA operations.
With a lack of security regulations covering GA airport
operations, GA airport sponsors routinely question why security
measures and related funding should be of concern.
*
The Department of Homeland Security has identified three
security threats related to the general aviation community:
using a GA aircraft as a weapon of mass destruction
using GA to transport dangerous individuals into the country
using GA to transport dangerous materials into the country
There is some evidence to support these concerns as the GA
industry was heavily used throughout the 1970s, 1980s, and
1990s to smuggle drugs into the United States.
Additionally, it was within the GA flight training industry
where the 9-11 hijackers trained.
GA airports house fuel trucks and fire trucks, either of which
can be stolen and used for other purposes, such as a bomb or to
gain or force access into a secure area. GA airports may also be
targets for domestic terrorism, acts of violence from radical
environmental or wildlife activists groups, criminal activities,
or even workplace violence.
Certain structures on airports may be considered high-value
60. targets, particularly air traffic control facilities and airway
navigation equipment.
The destruction of a small air traffic control tow er at a remote
GA airport could be a significant achievement for a domestic
terrorist organization determined to make a statement about the
impact of aviation on the environment or to inflict harm to a
society and its government.
*
Airport managers routinely find themselves involved in:
Community noise issues
Wildlife management
Development projects
Wetland protection
Management of storm water runoff
These issues are often interrelated with other environmental
concerns such as deicing chemicals or pesticides.
These and many other issues are environmentally important,
making airports and associated facilities potential targets for
ecoterrorist groups, vandalism, and civil disturbances.
*
There is an economic benefit to securing the GA airport.
A secure airport can attract corporate operators who are looking
to protect their multimillion-dollar investment in aircraft
transportation.
Without proper security measures, corporate operators often
will land at a GA airport to drop off or pick up passengers , then
ferry the aircraft to another nearby airport that does have
61. adequate security (e.g., perimeter fencing, security patrols, and
airfield access control measures). In these cases, the unsecured
GA airport often loses the fuel sales and service fees.
Airfield security measures usually have an added safety benefit
by restricting access to those who have business on the airport.
Access control measures have been successfully used to reduce
runway incursions for several years, and fencing helps keep
wildlife and inadvertent access by the public from coming onto
the airfield.
There are few in the GA airport community who want to
administer new TSA regulations! With every new GA security
incident, lawmakers again examine GA as a potential concern
for national security.
*
Robinson Aviation, Inc. (RVA), a Virginia-based company that
conducted GA security assessments throughout Virginia and
other states, developed an airport security program format for
GA.
RVA’s GA Airport Security Program Contents
Notification that the document is protected as confidential
information.
Distribution of the security plan and record of amendments.
Airport security coordinator contact information and security
responsibilities.
General airport information. Description of the airport,
organizational structure, airport activities and characteristics,
emergency contact telephone numbers, airport administration,
and airport address.
62. Definitions and terms.
Description of the aircraft movement area (AMA). Some GA
operators may elect to use the AMA in lieu of using the Part
1542 terminology of air operations area, secured area, and so on
to delineate the location that must be protected (i.e., the
airfield).
Description of the airport security procedures, including the
designation of areas if so desired, access control procedures,
airport security processes, and perimeter barriers/fencing.
A copy of the airport emergency plan grid map. Normally, this
map is used by off-and on-airport fire response personnel to
locate crash sites. It is also helpful for law enforcement officers
(LEOs)when they need to respond to a particular part of the
airfield and should be supplied to those local LEOs who
normally patrol or respond to the airport.
Identification of airport personnel. This section describes the
personnel identification and vehicle identification system. At
airports with formalized badging, this section describes the
background checks that individuals are required to undergo to
receive a badge, and any security training they must complete,
along with recurrent certification procedures. Although many
GA airports do not have a formalized badging process (some
do), other forms of ID can be used to properly identify who is
on the airfield. Some examples are government-issued photo
IDs and an FAA-issued pilot certificates, law enforcement or
emergency worker identification, FAA or TSA inspector
credentials, military identification, or a driver’s license.
Vehicle identification requirements are also described in this
section, along with the requirements to obtain appropriate
vehicle identification.
63. Law enforcement support. This section includes any
memorandum’s of understanding or letters of agreement that
exist between the airport and any law enforcement agency, plus
descriptions of the roles and responsibilities of federal, state,
and local law enforcement agencies with respect to the airport.
This section includes communication protocols with law
enforcement, records of LEO activity on airport property, and
any training programs for LEOs for airport security response
procedures.
Airport security committee. This section describes the makeup,
mission, and meeting schedule of the airport security
committee. The committee should include the airport operator,
local law enforcement and any contracted airport security
personnel, representatives from the airport tenants including
fixed-base operator management, corporate operators, small
aircraft operators, flight schools, aircraft maintenance operators
and similar personnel, aircraft rescue and fire-fighting
personnel, and local community representatives. To keep the
size of the committee manageable, airport tenants with similar
business structures may wish to appoint a designee to represent
their interests collectively. For example, at airports where there
are dozens of based corporate flight operators and perhaps
hundreds of small aircraft operators, they will usually form
their own associations on the airport. These associations should
be represented on the security committee.
Security training programs for airport tenants.
Local TSA and FBI contact information for individuals who can
work with the airport operator on security-related issues.
Information technology security procedures to ensure computer
security is maintained, including management and operational
controls.
64. Most GA airports have an airport emergency plan (AEP) that
describes procedures to be used in the event of a number of
emergencies, including aircraft crashes, power outages,
hazardous material incidents, and bomb threats. When an airport
security program is developed for a GA airport, the security
sections, hijacking, bomb threat, improvised explosive device
detection and mitigation, and so on should be extracted from the
AEP and placed in the security plan. This will prevent the
inadvertent release of security-sensitive information to the
general public as the AEP is usually a public document and
susceptible to open records requests.
Should GA airports be regulated, it is likely that the regulations
will contain elements of, if not completely mirror, Part 1542
Partial Security Programs. In developing an airport security
program for a GA airport, the operator should take this into
consideration.
*
*
Creating security procedures at GA airports requires operators
to consider numerous logistical concerns.
GA airport operations vary widely in size and nature.
Some may be single dirt strips with a couple of flight training
aircraft conducting three or four operations a month.
Others may be large, busy corporate GA airports with numerous
runways located near large cities, accommodating 20,000
operations or more a month and mostly with large business jet
aircraft.
Many smaller GA airport operators believe they pose very little
security risk, whereas larger GA airports provide access to
aircraft carrying tens of thousands of gallons of fuel, making
them potential weapons.
65. Staffing at GA airports also varies.
At some small facilities the airport manager may not be a full -
time employee.
Medium-sized GA airports usually have staff ranging from 2 to
10 personnel.
Large GA airports can employ a staff of 20 or more.
Airport funding is also problematic for GA airports. Funding
may be available from the Department of Homeland Security
(DHS) through the State Homeland Security Grant Program.
The State Homeland Security Grant Program provides funding
to states to purchase equipment to protect critical infrastructure.
This includes funding safety measures applied to GA airports.
Preventing aircraft theft is primarily the aircraft owner ’s
responsibility.
*
In 2007, the Airport Cooperative Research Program
(ACRP)/Transportation Research Board (TRB) completed a
study of GA safety and security practices. The report discovered
several interesting perspectives related to GA security:
Federal regulation of general aviation airports is very limited
and often left to the states, more than half of which have
licensing and inspection requirements for GA airports. These
requirements are most often related to safety and follow the Part
139 guidelines, but they are not necessarily related to security.
GA airports frequently enter into agreements with local
emergency responders and other federal and state law
enforcement agencies to assist with security.
Although both the FAA and the TSA have promulgated
66. legislation to address general aviation airports, few actual
regulations have been generated.
The majority of GA airports (80%) that responded to the TRB’s
survey reported that they do have a security plan in place.
However, many do not have an active airport security
committee.
With respect to perimeter fencing, most of the airports were
greater than 40% fenced, and fencing was reported to be one of
the primary upgrades to security. The report also noted that
most fencing was in place before 9-11 and was intended to deter
wildlife from the airfield.
Most airports participate in the Airport Watch Program of the
Aircraft Owners and Pilots Association (AOPA) (discussed later
in the chapter), and one airport, Centennial Airport in Denver,
Colorado, takes it a step further and offers a reward program for
providing information that leads to an arrest or investigation.
Several states, including Virginia and Colorado, had taken
additional measures related to GA airport security. Virginia now
has a voluntary security certification program and airports may
receive education as well as technical and resources assistance
to secure their facilities.
Colorado’s Office of Preparedness and Security developed the
Terrorism Protective Measures Resource Guide, and one airport
operator called in the National Guard’s Full Spectrum
Integrated Vulnerability Assessment team to assess the airports’
vulnerabilities. Several industry organizations including the
National Business Aviation Association and Airport’s Council
International developed security guidance for their members.
*
In 2003, the TSA commissioned an aviation security advisory
committee comprised of numerous industries such as the
67. American Association of Airport Executives, the National
Business Aviation Association, and the National Air Transport
Association.
The committee developed a comprehensive list of
recommendations, which were forwarded to the TSA for
consideration resulting in Information Publication (IP) A-001
Security Guidelines for General Aviation Airports.
*
The IP A001 focused on security enhancements in six areas.
Among the recommendations are the following:
Personnel
The pilot in command should verify the identities of his or her
passengers.
Restrict access to aircraft by student pilots.
Fixed-base operators should implement sign-in/sign-out
procedures for transient pilots.
Aircraft
Aircraft should be secured using existing mechanisms such as
door locks, keyed ignitions, aircraft stored in hangars, and the
use of propeller or throttle locks or security tape.
Airports/facilities
Implement reasonable vehicle access controls to facilities and
ramps, including signage, fencing, gates, or other positive
control techniques.
Install outdoor lighting covering aircraft parking and hangar
areas, fuel farm and fuel truck parking areas, and airport access
points. Fuel trucks and fire trucks should require higher levels
of protection.
Secure hangar doors when unattended.
Post signs warning against trespassing and unauthorized use of
aircraft, and post phone numbers to airport operations and the
nearest law enforcement agency
Surveillance
Implement an airport community watch program such as the
AOPA Airport Watch.
68. Familiarize local law enforcement officers with the airport
facilities. This should include advising law enforcement of who
is authorized to be on the property, how to drive on the airfield
without endangering aircraft, and the normal operations for that
airfield.
Security procedures and communications
Create a security plan for the airport including an emergency
locator map (often used by the fire department to quickly find
facilities on airport), and create procedures for handling bomb
threats and suspected stolen or hijacked aircraft.
Develop a threat communication system including 24-hour
phone numbers for the airport director, local police or sheriff’s
department, fire department, FBI, TSA, and other organizations.
Specialty operations (such as agricultural flights)
This section addresses agricultural aircraft operations and the
importance of aircraft owners to control access to their aircraft
and chemicals.
The TSA also included an airport self-assessment that airport
operators could use to determine security measures they should
be implementing. The TSA has attempted to put the assessment
tool into a computer program, but that effort has not been
successful because of the variety of operational characteristics
in GA airports.
*
Several states have started to adopt their own general aviation
airport regulations. Many of these programs have been in
response to specific aviation security incidents.
Historically, it has been illegal for states to impose regulations
on federally funded airports. Although this has occurred in
some states, such as California, the FAA is very careful that
state restrictions or regulations on airports do not interfere with
the national air traffic control system or intrastate commerce.
*
69. One of the more popular GA security programs is the
AOPA/TSA partnership Airport Watch Program. This program
enlists the support of 550,000 GA pilots to watch for and report
suspicious activities that might have security implications.
*
Fixed-base operators (FBOs) serve as the “truck stops” for GA
aircraft. FBOs provide fueling, aircraft handling, and hangar
storage services. Many FBOs also provide aircraft charter
services. FBOs and business aircraft operators share the
responsibility and work together to secure the business aviation
industry.
*
FBOs are predominantly represented by the National Air
Transport Association. Signature Aviation Flight Support was
one of the first FBOs to develop its own security procedures,
which include the following recommendations:
Flight crews must provide photo identification to gain access to
the Signature ramp.
Flight crews must identify all passengers before they are
allowed access to Signature’s ramp and escort passengers to and
from their aircraft.
FBO personnel must maintain line-of-sight surveillance of
passengers on the ramp who are not escorted by the pilot.
Passengers are asked to walk directly, and as a group, to their
aircraft and not delay entering their aircraft.
Transient flight crews are issued special codes upon their
arrival to guarantee that the same flight crews return to their
respective aircraft.
The use of personal cars or limousines on Signature’s ramp is
not permitted.
70. *
TSA’s Secure Fixed Base Operator Program –
A proof of concept, public-private sector partnership program
will allow FBOs to check passenger and crew identification
against manifest or eAPIS10 filings for positive identification
of passengers and crew onboard general aviation aircraft.
eAPIS checks are becoming an increasing part of GA security as
DHS focuses more on deterring or catching individuals with ill -
intent coming into the United States.
*
*
Helicopters are able to fly at slow speeds, through congested
city areas making them excellent platforms to fly in armed
personnel to conduct a terrorist active shooter inside a stadium,
airport or any open air assembly, bypassing any ground
defenses.
Helicopters have mostly been used for prison escapes, and as
observation platforms for follow up criminal activity.
As with other forms of aviation, security measures should not
eliminate the inherent benefit and use of the form of
transportation or use. Helicopters are profitably operated as
tourist platforms and for all sorts of other uses such as oil rig
transport, medical and law enforcement, power line
maintenance, and so on. Good helicopter security should include
suspicious awareness training for helicopter pilots and
helicopter operations personnel.
Security programs should be part of any helicopter operation
with procedures for pilots under duress (code words, panic
alarms), being hijacked or feeling that there is a threat on their
helicopter.
71. In certain cases, commercial helicopter operations feed directly
into aircraft flight operations, so any charter or scheduled
helicopter flight that transfers baggage and passengers into a
commercial airliner under a security program should ensure that
all personnel and items have undergone the appropriate
screening.
*
GA security-related training programs include topics such as the
following:
How to recognize GA aircraft and facilities that could be used
for illegal purposes
How to apply crime prevention through environmental design
concepts to GA airports
Establishing an Airport Watch Program
Establishing an aircraft key control system
Antitheft devices for GA aircraft
Security signage and marking plans
How to orient local law enforcement officers to the airport
environment and aircraft operations
Creation of an airport security committee
Creation of an emergency notification system
National Incident Management System fundamentals
How to create a business continuity plan
Developing instruction detection, integrated security, and
closed-circuit television systems
Troubleshooting airport security plans
Most GA airport operators do not have aviation security
experience or only may have commercial airport security
experience. Therefore, training in GA security should be
required for anyone without a GA security background.
*
Title 49 CFR Part 1552 addresses the security of flight schools
and awareness training for flight school employees.
Considering that the 9-11 hijackers were trained at U.S. flight
schools, it made sense to begin applying security regulations for
72. flight schools. Shortly after 9-11, the FAA sent security
guidance to all flight schools.
*
Originally known as the Alien Flight Training Rule (now known
as the Flight Training Candidate Checks Program), this section
requires every flight student to prove his or her U.S. citizenship
before beginning flight training in an aircraft weighing 12,500
pounds or less.
Foreign flight students are required to complete a criminal
history record check(CHRC) and submit their finger-prints to
the TSA.
The regulation not only applies to the thousands of flight
schools across the United States but also to every individual
certified flight instructor, every airline flight-training academy
that uses flight simulators, and any aviation college or
university conducting flight training.
Section 1552.3 applies specifically to instruction given in an
aircraft with a maximum gross takeoff weight of more than
12,500 pounds. The regulation requires flight schools to notify
the TSA that a candidate has requested such flight training.
For candidates wishing to receive flight instruction on an
aircraft that is 12,500 pounds or less, the flight school or flight
instructor must verify the student's U.S. citizenship; if the
candidate is not a U.S. citizen, the flight school or flight
instructor must require the individual to register with the TSA
before beginning flight training.
*
Good security of flight school aircraft or any aircraft on a GA
airport should include:
Locking aircraft
Using throttle, prop, and tie-down locks
73. Securing hangar doors
Not leaving ignition keys in the aircraft, even momentarily
Reporting suspicious activity to the authorities immediately
Vigilance on the part of the flight instructor over his or her new
students until trust has been established
The TSA has also created a flight school awareness training
program. Title 49 CFR Parts 1552.21 and 1552.23 are specific
to flight schools operating under Title 49 U.S.C. Subtitle VII.
Part 1552.23 requires that each flight school employee must
complete the TSA’s Flight School Security Awareness Training
Program.13 Flight schools must maintain records of the security
awareness training completed by their personnel.
The training includes:
Situational scenarios,
Suspicious behavior of personnel,
Signs that an aircraft has been altered for illegal uses
Other information useful for identifying flight candidates who
may be pursuing illegal activities.
Flight schools may elect to use their own training program,
which must include everything in the TSA’s online training.
Shortly after 9-11, the FAA issued guidance for flight school
security. The TSA followed up with its own handout in 2006.
*
Title 49 CFR Part 1562 addresses three GA airports located
close to the center of Washington, D.C. These are:
College Park Airport
Washington Executive/Hyde Field
Potomac Airfield
74. They are presently the only GA airports with specific security
regulations.
Each of the Maryland-3 airports must have an airport security
coordinator who, similar to an airport security coordinator at a
commercial service airport, administers the TSA’s security
requirements. This includes maintaining a copy of the airport
security procedures and a copy of the FAA procedures
applicable to GA operations at the Maryland- 3 airports.
The Security coordinators must:
Provide their names and other identifying information including
fingerprints and social security numbers to the TSA.
Have successfully completed a security threat assessment (STA)
and not have been found guilty (or not guilty by reason of
insanity) of any of the disqualifying offenses as outlined in
Title 49 CFR Part 1542.209.
Must implement a set of security procedures. These include:
Keeping a record of those authorized to use the airport,
Monitoring the security of aircraft during operational and
nonoperational hours,
Alerting aircraft owners/operators and the TSA of unsecured
aircraft,
Implementing and maintaining security awareness procedures at
the airport,
Limiting approval for pilots who violate the Washington, D.C.,
Metropolitan Area Flight Restricted Zone and are forced to land
at the airport.
They also contain any additional procedures required by the
TSA to provide for the security of aircraft operations into or out
of the airport.
The TSA has the authority to inspect the airport and related
security program documentation.
Each pilot flying into and out of the Maryland-3 must provide
the TSA with:
75. Name,
Social security number,
Date of birth,
Current address and phone,
Current airman or student pilot certificate,
Medical certificate,
A government-issued photo ID,
Fingerprints.
Each pilot must:
Provide a list of the make, model, and registration number of
each aircraft that he or she intends to operate at the airport.
Successfully complete a security threat assessment and receive
a briefing acceptable to the TSA and the FAA of the operating
procedures for the airport.
Not have been convicted or found not guilty by reason of
insanity, in any jurisdiction, during the 10 years preceding
application for authorization, of any of the disqualifying
offenses listed in 49 CFR 1542.209.
Not have a record on file with the FAA of a violation of a
prohibited area, a flight restriction, any special security
instructions issued under 14 CFR 99.7, a restricted area
designated, any emergency air traffic rules issued under 14 CFR
91.139, or a temporary flight restriction.
If a pilot or airport security coordinator violates any of these or
commits a disqualifying offense, he or she must notify the TSA
within 24 hours of conviction.
Pilots flying into the Maryland-3 must secure their aircraft after
flight, file a flight plan (IFR or VFR), and obtain an air traffic
control clearance and transponder code.
*
Title 49 CFR Part 1550:
Applies to general aviation aircraft operations,
76. Provides for the TSA to inspect any aircraft operations into
sterile areas of commercial service airports.
Includes requirements of the Twelve-Five Security Program for
aircraft engaged in scheduled service, charter, or cargo
operations that are more than 12,500 pounds and not under any
other security program.
For aircraft operations where a sterile area is involved, either if
a passenger or crewmember enplanes from or deplanes into one,
if the operation is not already covered under a scheduled
passenger service security program (full or partial) or public or
private charter operations under Title 49 Part 1544 or Part 1546,
screening must be done.
*
Aircraft of 12,500 pounds or more not operating into or out of a
sterile area and not covered under a program under Title 49
CFR Part 1544 or 1546 (Domestic or Foreign Air Carrier
Operations) must adhere to the Twelve-Five rule.
Any aircraft operator conducting commercial aircraft operations
(scheduled service, private or public charter or cargo) where the
operator owns or has managing control of the aircraft must
search the plane before departure and screen passengers and
carry-on items.
The TSA must first notify the aircraft operator that such
security measures are necessary through NOTAM, letter, or
other communication. Aircraft operators can apply for waivers
from the TSA for these procedures.
Presently almost 1,000 aircraft operators must adhere to the
Twelve-Five rule.
*
The FBI indicated that in 1993 Osama bin Laden assessed the
possibility of using an agricultural aircraft as a method to