SlideShare a Scribd company logo
1 of 8
Download to read offline
Airport Security: New Technology to Meet Evolving Threats
     Anthony Leather, Research Analyst, Europe – Aerospace, Defence & Security
Introduction

                                                            The decade following the attacks on the World Trade Center in New York has seen the
                                                            global airport market face intense scrutiny. It continues to face evolving threats and difficult
Airport Security: New Technology to Meet Evolving Threats




                                                            challenges, including integrating new technology into airports and maintaining passenger
                                                            satisfaction. The US Transportation Security Administration (TSA) released figures in July
                                                            2011 that showed there had been over 25,000 breaches of security since 2001. While the
                                                            nature of threats has remained similar, the delivery, method and execution have continued
                                                            to evolve. Naturally, terror attacks such as the recent incident at Moscow’s Domodedovo
                                                            Airport in January 2011, in which 35 people died and over 100 people were injured, take
                                                            most of the headlines. They have the potential to, and sometimes do, cause the greatest
                                                            damage; however for airport operators the perception of less sensational threats remains
                                                            equally high.

                                                            Technology provides a key resource to deter and obstruct those with criminal intent. Its
                                                            role and prevalence in airports is only likely to increase. However, the technological growth
                                                            in airports has faced problems and controversy. Integrating existing security systems with
                                                            newer technologies has caused issues in reliability. Advanced screening equipment has
                                                            been branded invasive and contrary to human rights regulations, while the rise in biometric
                                                            controls has also been met with criticism and scepticism from passengers.

                                                            The key challenge that airport operators face is finding a way to provide robust and
                                                            effective security measures that can prevent and identify the full spectrum of threats while
                                                            ensuring passenger satisfaction and legislative compliance. This challenge can be
                                                            segmented into three key end-user requirements:

                                                                 Functionality – The compatibility of newly procured equipment with existing systems
                                                                 is the greatest consideration for the airport operator. It is vital that new equipment
                                                                 can be easily integrated to fit in to and interact with existing systems to prevent any
                                                                 gaps in security. Furthermore, the maturity and specification of the equipment is also
                                                                 a significant factor in the procurement decision. Operators want modern and effective
                                                                 equipment, but maturity and proven reliability remain high priorities.

                                                                 Cost – Airport security is one of few markets that has been relatively unaffected by
                                                                 the global economic crisis and expenditure is likely to increase over the coming
                                                                 decade. However, financial consideration will always influence the selection of
                                                                 equipment. Value for money will continue to be a significant driver in the decision
                                                                 making process. Personnel costs comprise the largest proportion of airport security
                                                                 expenditure; however, in some cases modern technology can perform these roles
                                                                 more efficiently and effectively, creating opportunities to reduce cost.

                                                                 Efficiency – Long queues to get through check-in and passenger screening have
                                                                 been a feature in major airports throughout the world. Airport operators have
                                                                 increased efforts to reduce queue times. However, their primary concern is to ensure
                                                                 that security continues to identify the full spectrum of threats while complying with



                                                               © 2011 Frost & Sullivan
relevant legislation and without impinging on passengers’ rights. High reliability of the
                                                                                    equipment and clear identification of any threat is vital.
Airport Security: New Technology to Meet Evolving Threats




                                                                                  Airport Security Market: Influences on Purchasing Decision for Video Surveillance for
                                                                                                              Airport Operators (Europe), 2010
                                                                 High                      Compatibility with existing
                                                                                              security systems


                                                                                                                             Return on investment (ROI)
                                                             Importance in purchasing




                                                                                               Ease of Installation                                               High reliability

                                                                                               Latest Technology
                                                                     decision




                                                                                                                               Low operating cost

                                                                                             Maturity of technology
                                                                                                                              Low installation cost                Ease of use

                                                                                        High degree of system intelligence                                Excellent maintenance support

                                                                                                                                                          Excellent installation support

                                                             Low                                                               Low purchase price                  Durability
                                                                                                  Functionality                       Cost                          Efficiency
                                                                                                    Factors                          Factors                         Factors



                                                                              Source: Frost & Sullivan ResearchCurrent         Technology in the Airport Security Market

                                                            Perimeter Security

                                                            Perimeter security provides the first line of protection for an airport area. Large perimeters
                                                            that have to be secured and monitored present security challenges, especially at major
                                                            international airports. Technology has shifted focus away from security personnel patrols
                                                            that were both expensive and unable to monitor the entire perimeter.

                                                            Perimeter Intrusion Detection Systems (PIDS) have solved some of these challenges and
                                                            serve three functions:

                                                                           Deter any individual or group from gaining easy access to the airport site.
                                                                           Detect any attempted breech of the perimeter through a range of different sensors,
                                                                           identifying vibration, noise, or fencing breaches.
                                                                           Delay and monitor the assailants long enough to dispatch an appropriate level of
                                                                           response - either a security team or police force.

                                                            There are a range of different barriers and fences that are available from industry and can
                                                            form the perimeter boundary of an airport. Chain link fences are the most common for
                                                            economic rather than efficacy reasons. However, there are also a range of sensors that
                                                            have entered the market which alert the central control room when an intrusion is detected.
                                                            Many airports have deployed PIDS which integrate alerts to surveillance cameras that can



                                                                          © 2011 Frost & Sullivan
automatically focus on the sector where the alarm was triggered. False alarms remain the
                                                            key challenge to perimeter security and industry continues to strive to improve sensors to
                                                            keep nuisance alerts to a minimum.
Airport Security: New Technology to Meet Evolving Threats




                                                            One of the most recent and technologically advanced PIDS systems was installed at
                                                            Changi Airport (Singapore) in partnership with ST Electronics. It is the first time that Fibre
                                                            Brag Grating sensors have been used in airport perimeter. The Agil Fence PIDS was
                                                            chosen as it could adapt to its environment and would not be affected by environmental
                                                            electromagnetic and radio frequency interference, consequently improving detection and
                                                            minimising false alarms.

                                                            Surveillance

                                                            Integrated surveillance cameras continue to evolve in airport security. The chart below
                                                            demonstrates the current usage, awareness, and adoption by airport operators in Europe.
                                                            It shows that there is still room for growth and expansion in the airport surveillance market.
                                                                                  Current Usage, Awarenes, and, Adoption Plans by Types of Video Surveillance
                                                                            Airport Security Market: Current Usage, Awareness and Adoption Plans by
                                                                                                          Technologies
                                                                                      Types of Video Base: Total Sample, N=40
                                                                                                      Surveillance Technology (Europe), 2011
                                                              Aware and Currently Using                Aware and Likely to Adopt within a Year     Aware, but No Plans to Adopt within a Year
                                                              Heard About, but Little Understanding    Never Heard of

                                                                Video surveillance monitors                                      83%                                          5%        10%    3%

                                                              Network / IP video surveillance
                                                                                                                           75%                                             18%            5% 3%
                                                                         cameras
                                                                   Analog video surveillance
                                                                                                                           75%                                       10%           8%         8%
                                                                           cameras

                                                                DVR (digital video recorder)                             68%                                8%          13%             10%    3%


                                                                  Video analytics software                         55%                             15%           13%               13%         5%

                                                                   Open video management
                                                                                                               50%                               18%           13%               15%           5%
                                                                          software
                                                              Proprietary video management
                                                                                                             43%                          20%              15%                 20%             3%
                                                                         software

                                                                    Encoders / video servers            35%                               35%                     15%               13%        3%


                                                              NVR (network video recorder)             33%                              35%                      18%                13%        3%



                                                                                                                                                   Source: Frost & Sullivan research


                                                            Integrated systems now commonly use Video Content Analysis (VCA) and real-time
                                                            analytics, which analyses data as it is recording. As the above chart shows this is an area
                                                            of video surveillance that will continue to grow. The software recognises any break of the
                                                            pre-programmed or ‘traditional rules’, highlights suspicious activity, and triggers an alarm
                                                            that will appear on the screen in the control room. Personnel in the control room have the
                                                            opportunity to view the situation in real time as well as instant access to recorded footage
                                                            of the incident. A potential scenario could be if somebody should leave their baggage
                                                            unattended, the smart cameras can highlight the package and alert the control room. The
                                                            controller will be able to see recorded footage of the event to determine the person
                                                            responsible as well as dispatch the appropriate security response.



                                                                © 2011 Frost & Sullivan
Such video analytics are deployed globally in many airports. Schipol Airport in Amsterdam
                                                            uses such an IP-based system to monitor accidental or malicious intrusion in their runway
                                                            or hangar areas. Indigo Vision installed over 3700 cameras in an IP surveillance system in
Airport Security: New Technology to Meet Evolving Threats




                                                            Terminal 3 at Delhi airport. The analytics in the system includes ‘virtual tripwires’ for
                                                            secured areas and ‘abandoned object’ highlighting for suspected packages to help
                                                            improve response to such incidents.

                                                            ‘Terrorist’ Cameras

                                                            Terrorist cameras are cameras reportedly capable of picking out suspected terrorists. They
                                                            work on the principle of behaviour screening, in which a passenger’s body language is
                                                            assessed and alerts triggered by specific peculiarities. The analysis covers mannerisms,
                                                            facial expressions and even excessive levels of perspiration. Central to the technology is
                                                            an extensive database containing thousands of human actions. The camera is able to
                                                            decipher ‘normal’ human actions from ‘irregular’ action that may be an indicator of hostile
                                                            intent.

                                                            3D Face Recognition Technology

                                                            3D facial recognition technology has the potential to be widely adopted within the market. It
                                                            allows for integration of biometric facial recognition technology with IP-enabled CCTV to
                                                            accurately identify terrorists and criminals known to the intelligence services. The
                                                            technology tackles some of the previous challenges associated with integrated facial
                                                            recognition and surveillance.

                                                            Screening

                                                            Over the last decade Advanced Imaging Technology (AIT) has significantly improved the
                                                            identification of concealed metallic and organic contraband materials attempting to pass
                                                            through checkpoints. However the new screening techniques have raised privacy
                                                            concerns. Some groups and passengers have even suggested that detailed images seen
                                                            by security personnel constitute a breach of human rights. In response, much of the
                                                            screening equipment has now been developed to produce a generic or image-free
                                                            solution. The image only highlights areas of the body that are concealing contraband
                                                            material, as opposed to giving the operator an exact outline of the passenger.

                                                            Backscatter X-ray Machines

                                                            Backscatter X-ray machines have been declared a highly innovative and effective means
                                                            of finding out whether a passenger has concealed weapons or explosives at the screening
                                                            stage. In spite of the security benefits, the technology has gained more publicity due to
                                                            privacy concerns. Advancements have been made to display a generic image that is not
                                                            intrusive to the individual. However a study released in the ‘Journal of Transportation
                                                            Security’ argued that Backscatter X-ray machines may not be as effective as first



                                                               © 2011 Frost & Sullivan
suggested. Leon Kaufman and Joseph Carlson, two professors from the University of
                                                            California, San Francisco argue that it would be possible for terrorists to place materials on
                                                            the body in such a position that it would be very challenging for the machine and operator
                                                            to pick it up.
Airport Security: New Technology to Meet Evolving Threats




                                                            Millimetre Wave Portals

                                                            A more popular screening solution for airports is Millimetre Wave (MMV) Portals. The
                                                            technology uses safe radio waves to detect prohibited objects or materials under a
                                                            passenger’s clothes. At inception these machines too faced privacy issues. The EU
                                                            Parliament warned the technology ‘violated the fundamental human rights of citizens’; the
                                                            US Congress also took a similar view. However manufacturers have managed to combat
                                                            this in a similar way, by producing a generic image of the body. This solution has now
                                                            provided an effective alternative to traditional metal detectors, although the cost of the
                                                            equipment remains high. Implementation of MMV Portals is growing. L-3 Communications
                                                            Security and Detection Systems have installed more than 240 of their ProVision screening
                                                            systems in 40 airports in the US with more ordered from the TSA. Prevalence of these
                                                            portals is likely to increase.

                                                            Passive Millimetre Wave Imaging

                                                            For many years Passive Millimetre Wave Imaging has been heralded as the great hope for
                                                            airport security. In theory the passive system can screen a number of people
                                                            simultaneously from a distance of up to ten meters. The passenger would simply have to
                                                            walk into view of a millimetre wave camera which would instantly identify whether they had
                                                            any concealed weapons or explosives, without producing an intrusive image. However the
                                                            technology has faced technical difficulties and has yet to be perfected. Brijot Imaging
                                                            Systems have an operational system and are seen as the market leader in this regard.
                                                            Other companies are also investing time and money in the technology as many believe
                                                            this could be the solution to airport security in the next five to ten years.

                                                            Advanced Threat Detection X-Ray Machines

                                                            As with passenger screening, X-ray machines have developed over the last decade. Much
                                                            clearer images of contents and screening machines that can view baggage in dual and
                                                            multi-view perspectives are now available. These have become more effective at
                                                            identifying potentially harmful objects or materials within bags. Smiths Detection, a global
                                                            leader in the screening market has produced the HiSCAN 6040aTiX. This system quickly
                                                            provides comprehensive analysis of the contents of baggage-including detection of liquids
                                                            and explosives-to ensure efficient passenger movement.

                                                            Explosive Trace Detection Systems

                                                            While X-ray machines have become more advanced and effective, Explosive Trace
                                                            Detection continues to be carried out manually. These systems can also be deployed to



                                                               © 2011 Frost & Sullivan
trace narcotic substances and help tackle international drug trafficking. Currently the
                                                            process is both time and manpower-intensive. Inspection guidelines in the UK instruct that
                                                            the trace collection be focussed on specific areas of the bag rather than its full content,
                                                            consequently increasing queuing times. Only one in three items passing through the X-ray
Airport Security: New Technology to Meet Evolving Threats




                                                            is selected at random for this inspection.

                                                            In 2006 liquid explosives came to prominence in the market after a plot to detonate such a
                                                            device on transatlantic flights was exposed by UK intelligence services. Since then the
                                                            market has striven to find a solution to accurately and efficiently screen liquids carried
                                                            through to the boarding lounge.

                                                            Nuctech has recently released the LS1516BA Liquid Inspection System, complying with
                                                            the EU Liquid Explosive Detection Systems (LEDS) Standard 1 Type C. The scanner
                                                            comprehensively analyses any container and can identify disguised separation and any
                                                            potentially harmful liquid. However, the new scanner still requires the liquid container to be
                                                            removed from the baggage and placed separately into a machine. While the scanner is
                                                            effective, the process is time-consuming and will not help the flow of passengers through
                                                            checkpoints. Furthermore, competitors are expecting to release LEDS Standard D
                                                            scanners over the next few years; these will be able to screen liquids even when left in the
                                                            baggage. Once these enter the market, equipment such as the LS1516BA will be rendered
                                                            obsolete.




                                                                                     The Technology Gap and New Threats

                                                            Reports on all the different technologies and security measures in airports create an
                                                            uncomfortable environment for those attempting to deceive authorities. However, all the
                                                            readily available information also means that individuals or organisations with criminal
                                                            intent know exactly what to expect. This helps terrorist groups to develop new ways to
                                                            achieve their objectives. The chart below maps the conventional stages of threat and
                                                            screening in UK airports.




                                                               © 2011 Frost & Sullivan
Source: Frost & Sullivan Analysis


                                                            One of the latest methods that terrorist groups are reportedly attempting is to surgically
                                                            implant improvised explosive devices in attackers’ bodies. Reports of such incidents are
Airport Security: New Technology to Meet Evolving Threats




                                                            limited in number, however in August 2009 Assistant Interior Minister of Saudi Arabia,
                                                            Prince Muhammad bin Nyef al-Saud (responsible for counterterrorism) was the target of an
                                                            assassination attempt by Al Qaeda in the Arabian Peninsula (AQAP). Reports suggested
                                                            the assailant had detonated explosives planted within his body. The implanted device had
                                                            evaded security checks, including a full screening.

                                                            Current technologies deployed in airports would also have been unlikely to have picked
                                                            this up. Having eluded the technological security checks, the last line of detection that
                                                            could have identified the threat is security personnel. Although not successful on this
                                                            occasion, the personnel and human factor remains vital to the security of an airport and
                                                            still performs functions that technology cannot carry out. Identifying suspicious behaviour
                                                            and analysing signs that technology is unable to detect continues to be an important
                                                            security measure. As such, money will continue to be invested in human factors, and
                                                            specifically the training of personnel to bolster the security at airports.

                                                            Another way to approach this problem and to decrease queue times at security
                                                            checkpoints is to increase pre-screening. At the beginning of October 2011 the TSA began
                                                            ‘PreCheck’, a pilot programme that thoroughly pre-screens passengers’ details in four US
                                                            airports, enabling authorities to make an intelligence-based risk assessment. Frequent
                                                            flyers who volunteer to provide more information may then be directed to an expedited
                                                            security process at the airport. The pilot project has been implemented after public concern
                                                            over queue times and the invasive nature of screening methods, including pat-downs.
                                                            Despite all the advances in technology, this signifies that the best way to secure the airport
                                                            is to identify threats before they reach it. Of course, this will not always be possible and the
                                                            pre-screening programme only identifies a very small percentage of passengers; however,
                                                            current security systems can help bridge the gap.

                                                            Airports remain a target because of the prestige and level of devastation or impact that an
                                                            attack can achieve. Technology and security systems have always striven to stay one step
                                                            ahead of the potential threats. They have now reached a position which challenges those
                                                            with criminal intent to be one step ahead. While security can never be 100% effective,
                                                            further investment, innovation, and advancement in airport security technology will
                                                            continue to make it very hard for such groups and individuals to carry out attacks.



                                                              About Frost & Sullivan

                                                              Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth
                                                              and achieve best-in-class positions in growth, innovation and leadership. The
                                                              company's Growth Partnership Service provides the CEO and the CEO's Growth Team
                                                              with disciplined research and best-practice models to drive the generation, evaluation,
                                                              and implementation of powerful growth strategies. Frost & Sullivan leverages 50 years
                                                              of experience in partnering with Global 1000 companies, emerging businesses and the
                                                              investment community from more than 40 offices on six continents. To join our Growth
                                                                © 2011 Frost & Sullivan
                                                              Partnership, please visit http://www.frost.com.

More Related Content

What's hot

Tata Advanced Systems Limited- Cyber Security Practice Services
Tata Advanced Systems Limited- Cyber Security Practice ServicesTata Advanced Systems Limited- Cyber Security Practice Services
Tata Advanced Systems Limited- Cyber Security Practice ServicesTata Advanced Systems Limited
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
Online Airway Reservation System
Online Airway Reservation SystemOnline Airway Reservation System
Online Airway Reservation SystemHari Wiz
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONjuhi kumari
 
PriveComms PriveIN mesh digital operation field overview 2020
PriveComms PriveIN mesh digital operation field overview 2020PriveComms PriveIN mesh digital operation field overview 2020
PriveComms PriveIN mesh digital operation field overview 2020Arimo Koivisto
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
Air line reservation system software engeniring
Air line reservation system software engeniringAir line reservation system software engeniring
Air line reservation system software engeniringAsfand Sheraz Khan Niazi
 
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019Dell Technologies
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
Data Center Project Management: Key Components of a Successful System
Data Center Project Management:  Key Components of a Successful SystemData Center Project Management:  Key Components of a Successful System
Data Center Project Management: Key Components of a Successful Systemdpsir
 
Real Time Operating Systems
Real Time Operating SystemsReal Time Operating Systems
Real Time Operating SystemsPawandeep Kaur
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services HayderThary
 
Railway Reservation System - Requirement Engineering
Railway Reservation System - Requirement EngineeringRailway Reservation System - Requirement Engineering
Railway Reservation System - Requirement EngineeringDanish Javed
 

What's hot (20)

Tata Advanced Systems Limited- Cyber Security Practice Services
Tata Advanced Systems Limited- Cyber Security Practice ServicesTata Advanced Systems Limited- Cyber Security Practice Services
Tata Advanced Systems Limited- Cyber Security Practice Services
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Online Airway Reservation System
Online Airway Reservation SystemOnline Airway Reservation System
Online Airway Reservation System
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
 
PriveComms PriveIN mesh digital operation field overview 2020
PriveComms PriveIN mesh digital operation field overview 2020PriveComms PriveIN mesh digital operation field overview 2020
PriveComms PriveIN mesh digital operation field overview 2020
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Air line reservation system software engeniring
Air line reservation system software engeniringAir line reservation system software engeniring
Air line reservation system software engeniring
 
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Data Center Project Management: Key Components of a Successful System
Data Center Project Management:  Key Components of a Successful SystemData Center Project Management:  Key Components of a Successful System
Data Center Project Management: Key Components of a Successful System
 
Real Time Operating Systems
Real Time Operating SystemsReal Time Operating Systems
Real Time Operating Systems
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
Rbac
RbacRbac
Rbac
 
Railway Reservation System - Requirement Engineering
Railway Reservation System - Requirement EngineeringRailway Reservation System - Requirement Engineering
Railway Reservation System - Requirement Engineering
 

Viewers also liked

Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airportCheapticketsSG
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONPaul Mears Phd.
 
AIRPORT SECURITY BIOMETRICS
AIRPORT SECURITY BIOMETRICSAIRPORT SECURITY BIOMETRICS
AIRPORT SECURITY BIOMETRICSSanchi Gupta
 
Ethnic airport security essay
Ethnic airport security essay Ethnic airport security essay
Ethnic airport security essay kaidora
 
General Aviation Security
General Aviation SecurityGeneral Aviation Security
General Aviation SecurityERAUWebinars
 

Viewers also liked (6)

Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATION
 
AIRPORT SECURITY BIOMETRICS
AIRPORT SECURITY BIOMETRICSAIRPORT SECURITY BIOMETRICS
AIRPORT SECURITY BIOMETRICS
 
Ethnic airport security essay
Ethnic airport security essay Ethnic airport security essay
Ethnic airport security essay
 
Safety & Security Airports
Safety & Security AirportsSafety & Security Airports
Safety & Security Airports
 
General Aviation Security
General Aviation SecurityGeneral Aviation Security
General Aviation Security
 

Similar to New Technologies for Airport Security

Networked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewNetworked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewGeeks and Com'
 
Networked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewNetworked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewEricsson France
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIfEngel
 
Drone Threats in Building and Infrastructure Projects
Drone Threats in Building and Infrastructure ProjectsDrone Threats in Building and Infrastructure Projects
Drone Threats in Building and Infrastructure ProjectsNovoQuad
 
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityProtecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityEnergy Network marcus evans
 
Ar Ts Profile
Ar Ts ProfileAr Ts Profile
Ar Ts ProfileRafiSela
 
In Quest of Benchmarking Security Risks to Cyber-Physical Systems
In Quest of Benchmarking Security Risks to Cyber-Physical SystemsIn Quest of Benchmarking Security Risks to Cyber-Physical Systems
In Quest of Benchmarking Security Risks to Cyber-Physical SystemsDETER-Project
 
A Look at the Emerging Security Threats to the Aviation Industry
A Look at the Emerging Security Threats to the Aviation IndustryA Look at the Emerging Security Threats to the Aviation Industry
A Look at the Emerging Security Threats to the Aviation IndustryDominic_White
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoOWASP Delhi
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Erik Ginalick
 
0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_revMona Al-achkar
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised finalbekahpars
 
STUDY ON TECHNICAL FOCUSES AND SAMPLING COVERAGE STRATEGY OF AIRBORNE SOFTWAR...
STUDY ON TECHNICAL FOCUSES AND SAMPLING COVERAGE STRATEGY OF AIRBORNE SOFTWAR...STUDY ON TECHNICAL FOCUSES AND SAMPLING COVERAGE STRATEGY OF AIRBORNE SOFTWAR...
STUDY ON TECHNICAL FOCUSES AND SAMPLING COVERAGE STRATEGY OF AIRBORNE SOFTWAR...ijseajournal
 
IDGA’s Aviation Security Summit
IDGA’s Aviation Security SummitIDGA’s Aviation Security Summit
IDGA’s Aviation Security Summitcassie111
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trendswardell henley
 

Similar to New Technologies for Airport Security (20)

Networked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewNetworked security has arrived - Ericsson Review
Networked security has arrived - Ericsson Review
 
Networked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewNetworked security has arrived - Ericsson Review
Networked security has arrived - Ericsson Review
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Drone Threats in Building and Infrastructure Projects
Drone Threats in Building and Infrastructure ProjectsDrone Threats in Building and Infrastructure Projects
Drone Threats in Building and Infrastructure Projects
 
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityProtecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
 
Ar Ts Profile
Ar Ts ProfileAr Ts Profile
Ar Ts Profile
 
In Quest of Benchmarking Security Risks to Cyber-Physical Systems
In Quest of Benchmarking Security Risks to Cyber-Physical SystemsIn Quest of Benchmarking Security Risks to Cyber-Physical Systems
In Quest of Benchmarking Security Risks to Cyber-Physical Systems
 
A Look at the Emerging Security Threats to the Aviation Industry
A Look at the Emerging Security Threats to the Aviation IndustryA Look at the Emerging Security Threats to the Aviation Industry
A Look at the Emerging Security Threats to the Aviation Industry
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_video
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev
 
Airline security new
Airline security newAirline security new
Airline security new
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised final
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
vjvja.pptx
vjvja.pptxvjvja.pptx
vjvja.pptx
 
STUDY ON TECHNICAL FOCUSES AND SAMPLING COVERAGE STRATEGY OF AIRBORNE SOFTWAR...
STUDY ON TECHNICAL FOCUSES AND SAMPLING COVERAGE STRATEGY OF AIRBORNE SOFTWAR...STUDY ON TECHNICAL FOCUSES AND SAMPLING COVERAGE STRATEGY OF AIRBORNE SOFTWAR...
STUDY ON TECHNICAL FOCUSES AND SAMPLING COVERAGE STRATEGY OF AIRBORNE SOFTWAR...
 
IDGA’s Aviation Security Summit
IDGA’s Aviation Security SummitIDGA’s Aviation Security Summit
IDGA’s Aviation Security Summit
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 

New Technologies for Airport Security

  • 1. Airport Security: New Technology to Meet Evolving Threats Anthony Leather, Research Analyst, Europe – Aerospace, Defence & Security
  • 2. Introduction The decade following the attacks on the World Trade Center in New York has seen the global airport market face intense scrutiny. It continues to face evolving threats and difficult Airport Security: New Technology to Meet Evolving Threats challenges, including integrating new technology into airports and maintaining passenger satisfaction. The US Transportation Security Administration (TSA) released figures in July 2011 that showed there had been over 25,000 breaches of security since 2001. While the nature of threats has remained similar, the delivery, method and execution have continued to evolve. Naturally, terror attacks such as the recent incident at Moscow’s Domodedovo Airport in January 2011, in which 35 people died and over 100 people were injured, take most of the headlines. They have the potential to, and sometimes do, cause the greatest damage; however for airport operators the perception of less sensational threats remains equally high. Technology provides a key resource to deter and obstruct those with criminal intent. Its role and prevalence in airports is only likely to increase. However, the technological growth in airports has faced problems and controversy. Integrating existing security systems with newer technologies has caused issues in reliability. Advanced screening equipment has been branded invasive and contrary to human rights regulations, while the rise in biometric controls has also been met with criticism and scepticism from passengers. The key challenge that airport operators face is finding a way to provide robust and effective security measures that can prevent and identify the full spectrum of threats while ensuring passenger satisfaction and legislative compliance. This challenge can be segmented into three key end-user requirements: Functionality – The compatibility of newly procured equipment with existing systems is the greatest consideration for the airport operator. It is vital that new equipment can be easily integrated to fit in to and interact with existing systems to prevent any gaps in security. Furthermore, the maturity and specification of the equipment is also a significant factor in the procurement decision. Operators want modern and effective equipment, but maturity and proven reliability remain high priorities. Cost – Airport security is one of few markets that has been relatively unaffected by the global economic crisis and expenditure is likely to increase over the coming decade. However, financial consideration will always influence the selection of equipment. Value for money will continue to be a significant driver in the decision making process. Personnel costs comprise the largest proportion of airport security expenditure; however, in some cases modern technology can perform these roles more efficiently and effectively, creating opportunities to reduce cost. Efficiency – Long queues to get through check-in and passenger screening have been a feature in major airports throughout the world. Airport operators have increased efforts to reduce queue times. However, their primary concern is to ensure that security continues to identify the full spectrum of threats while complying with © 2011 Frost & Sullivan
  • 3. relevant legislation and without impinging on passengers’ rights. High reliability of the equipment and clear identification of any threat is vital. Airport Security: New Technology to Meet Evolving Threats Airport Security Market: Influences on Purchasing Decision for Video Surveillance for Airport Operators (Europe), 2010 High Compatibility with existing security systems Return on investment (ROI) Importance in purchasing Ease of Installation High reliability Latest Technology decision Low operating cost Maturity of technology Low installation cost Ease of use High degree of system intelligence Excellent maintenance support Excellent installation support Low Low purchase price Durability Functionality Cost Efficiency Factors Factors Factors Source: Frost & Sullivan ResearchCurrent Technology in the Airport Security Market Perimeter Security Perimeter security provides the first line of protection for an airport area. Large perimeters that have to be secured and monitored present security challenges, especially at major international airports. Technology has shifted focus away from security personnel patrols that were both expensive and unable to monitor the entire perimeter. Perimeter Intrusion Detection Systems (PIDS) have solved some of these challenges and serve three functions:  Deter any individual or group from gaining easy access to the airport site.  Detect any attempted breech of the perimeter through a range of different sensors, identifying vibration, noise, or fencing breaches.  Delay and monitor the assailants long enough to dispatch an appropriate level of response - either a security team or police force. There are a range of different barriers and fences that are available from industry and can form the perimeter boundary of an airport. Chain link fences are the most common for economic rather than efficacy reasons. However, there are also a range of sensors that have entered the market which alert the central control room when an intrusion is detected. Many airports have deployed PIDS which integrate alerts to surveillance cameras that can © 2011 Frost & Sullivan
  • 4. automatically focus on the sector where the alarm was triggered. False alarms remain the key challenge to perimeter security and industry continues to strive to improve sensors to keep nuisance alerts to a minimum. Airport Security: New Technology to Meet Evolving Threats One of the most recent and technologically advanced PIDS systems was installed at Changi Airport (Singapore) in partnership with ST Electronics. It is the first time that Fibre Brag Grating sensors have been used in airport perimeter. The Agil Fence PIDS was chosen as it could adapt to its environment and would not be affected by environmental electromagnetic and radio frequency interference, consequently improving detection and minimising false alarms. Surveillance Integrated surveillance cameras continue to evolve in airport security. The chart below demonstrates the current usage, awareness, and adoption by airport operators in Europe. It shows that there is still room for growth and expansion in the airport surveillance market. Current Usage, Awarenes, and, Adoption Plans by Types of Video Surveillance Airport Security Market: Current Usage, Awareness and Adoption Plans by Technologies Types of Video Base: Total Sample, N=40 Surveillance Technology (Europe), 2011 Aware and Currently Using Aware and Likely to Adopt within a Year Aware, but No Plans to Adopt within a Year Heard About, but Little Understanding Never Heard of Video surveillance monitors 83% 5% 10% 3% Network / IP video surveillance 75% 18% 5% 3% cameras Analog video surveillance 75% 10% 8% 8% cameras DVR (digital video recorder) 68% 8% 13% 10% 3% Video analytics software 55% 15% 13% 13% 5% Open video management 50% 18% 13% 15% 5% software Proprietary video management 43% 20% 15% 20% 3% software Encoders / video servers 35% 35% 15% 13% 3% NVR (network video recorder) 33% 35% 18% 13% 3% Source: Frost & Sullivan research Integrated systems now commonly use Video Content Analysis (VCA) and real-time analytics, which analyses data as it is recording. As the above chart shows this is an area of video surveillance that will continue to grow. The software recognises any break of the pre-programmed or ‘traditional rules’, highlights suspicious activity, and triggers an alarm that will appear on the screen in the control room. Personnel in the control room have the opportunity to view the situation in real time as well as instant access to recorded footage of the incident. A potential scenario could be if somebody should leave their baggage unattended, the smart cameras can highlight the package and alert the control room. The controller will be able to see recorded footage of the event to determine the person responsible as well as dispatch the appropriate security response. © 2011 Frost & Sullivan
  • 5. Such video analytics are deployed globally in many airports. Schipol Airport in Amsterdam uses such an IP-based system to monitor accidental or malicious intrusion in their runway or hangar areas. Indigo Vision installed over 3700 cameras in an IP surveillance system in Airport Security: New Technology to Meet Evolving Threats Terminal 3 at Delhi airport. The analytics in the system includes ‘virtual tripwires’ for secured areas and ‘abandoned object’ highlighting for suspected packages to help improve response to such incidents. ‘Terrorist’ Cameras Terrorist cameras are cameras reportedly capable of picking out suspected terrorists. They work on the principle of behaviour screening, in which a passenger’s body language is assessed and alerts triggered by specific peculiarities. The analysis covers mannerisms, facial expressions and even excessive levels of perspiration. Central to the technology is an extensive database containing thousands of human actions. The camera is able to decipher ‘normal’ human actions from ‘irregular’ action that may be an indicator of hostile intent. 3D Face Recognition Technology 3D facial recognition technology has the potential to be widely adopted within the market. It allows for integration of biometric facial recognition technology with IP-enabled CCTV to accurately identify terrorists and criminals known to the intelligence services. The technology tackles some of the previous challenges associated with integrated facial recognition and surveillance. Screening Over the last decade Advanced Imaging Technology (AIT) has significantly improved the identification of concealed metallic and organic contraband materials attempting to pass through checkpoints. However the new screening techniques have raised privacy concerns. Some groups and passengers have even suggested that detailed images seen by security personnel constitute a breach of human rights. In response, much of the screening equipment has now been developed to produce a generic or image-free solution. The image only highlights areas of the body that are concealing contraband material, as opposed to giving the operator an exact outline of the passenger. Backscatter X-ray Machines Backscatter X-ray machines have been declared a highly innovative and effective means of finding out whether a passenger has concealed weapons or explosives at the screening stage. In spite of the security benefits, the technology has gained more publicity due to privacy concerns. Advancements have been made to display a generic image that is not intrusive to the individual. However a study released in the ‘Journal of Transportation Security’ argued that Backscatter X-ray machines may not be as effective as first © 2011 Frost & Sullivan
  • 6. suggested. Leon Kaufman and Joseph Carlson, two professors from the University of California, San Francisco argue that it would be possible for terrorists to place materials on the body in such a position that it would be very challenging for the machine and operator to pick it up. Airport Security: New Technology to Meet Evolving Threats Millimetre Wave Portals A more popular screening solution for airports is Millimetre Wave (MMV) Portals. The technology uses safe radio waves to detect prohibited objects or materials under a passenger’s clothes. At inception these machines too faced privacy issues. The EU Parliament warned the technology ‘violated the fundamental human rights of citizens’; the US Congress also took a similar view. However manufacturers have managed to combat this in a similar way, by producing a generic image of the body. This solution has now provided an effective alternative to traditional metal detectors, although the cost of the equipment remains high. Implementation of MMV Portals is growing. L-3 Communications Security and Detection Systems have installed more than 240 of their ProVision screening systems in 40 airports in the US with more ordered from the TSA. Prevalence of these portals is likely to increase. Passive Millimetre Wave Imaging For many years Passive Millimetre Wave Imaging has been heralded as the great hope for airport security. In theory the passive system can screen a number of people simultaneously from a distance of up to ten meters. The passenger would simply have to walk into view of a millimetre wave camera which would instantly identify whether they had any concealed weapons or explosives, without producing an intrusive image. However the technology has faced technical difficulties and has yet to be perfected. Brijot Imaging Systems have an operational system and are seen as the market leader in this regard. Other companies are also investing time and money in the technology as many believe this could be the solution to airport security in the next five to ten years. Advanced Threat Detection X-Ray Machines As with passenger screening, X-ray machines have developed over the last decade. Much clearer images of contents and screening machines that can view baggage in dual and multi-view perspectives are now available. These have become more effective at identifying potentially harmful objects or materials within bags. Smiths Detection, a global leader in the screening market has produced the HiSCAN 6040aTiX. This system quickly provides comprehensive analysis of the contents of baggage-including detection of liquids and explosives-to ensure efficient passenger movement. Explosive Trace Detection Systems While X-ray machines have become more advanced and effective, Explosive Trace Detection continues to be carried out manually. These systems can also be deployed to © 2011 Frost & Sullivan
  • 7. trace narcotic substances and help tackle international drug trafficking. Currently the process is both time and manpower-intensive. Inspection guidelines in the UK instruct that the trace collection be focussed on specific areas of the bag rather than its full content, consequently increasing queuing times. Only one in three items passing through the X-ray Airport Security: New Technology to Meet Evolving Threats is selected at random for this inspection. In 2006 liquid explosives came to prominence in the market after a plot to detonate such a device on transatlantic flights was exposed by UK intelligence services. Since then the market has striven to find a solution to accurately and efficiently screen liquids carried through to the boarding lounge. Nuctech has recently released the LS1516BA Liquid Inspection System, complying with the EU Liquid Explosive Detection Systems (LEDS) Standard 1 Type C. The scanner comprehensively analyses any container and can identify disguised separation and any potentially harmful liquid. However, the new scanner still requires the liquid container to be removed from the baggage and placed separately into a machine. While the scanner is effective, the process is time-consuming and will not help the flow of passengers through checkpoints. Furthermore, competitors are expecting to release LEDS Standard D scanners over the next few years; these will be able to screen liquids even when left in the baggage. Once these enter the market, equipment such as the LS1516BA will be rendered obsolete. The Technology Gap and New Threats Reports on all the different technologies and security measures in airports create an uncomfortable environment for those attempting to deceive authorities. However, all the readily available information also means that individuals or organisations with criminal intent know exactly what to expect. This helps terrorist groups to develop new ways to achieve their objectives. The chart below maps the conventional stages of threat and screening in UK airports. © 2011 Frost & Sullivan
  • 8. Source: Frost & Sullivan Analysis One of the latest methods that terrorist groups are reportedly attempting is to surgically implant improvised explosive devices in attackers’ bodies. Reports of such incidents are Airport Security: New Technology to Meet Evolving Threats limited in number, however in August 2009 Assistant Interior Minister of Saudi Arabia, Prince Muhammad bin Nyef al-Saud (responsible for counterterrorism) was the target of an assassination attempt by Al Qaeda in the Arabian Peninsula (AQAP). Reports suggested the assailant had detonated explosives planted within his body. The implanted device had evaded security checks, including a full screening. Current technologies deployed in airports would also have been unlikely to have picked this up. Having eluded the technological security checks, the last line of detection that could have identified the threat is security personnel. Although not successful on this occasion, the personnel and human factor remains vital to the security of an airport and still performs functions that technology cannot carry out. Identifying suspicious behaviour and analysing signs that technology is unable to detect continues to be an important security measure. As such, money will continue to be invested in human factors, and specifically the training of personnel to bolster the security at airports. Another way to approach this problem and to decrease queue times at security checkpoints is to increase pre-screening. At the beginning of October 2011 the TSA began ‘PreCheck’, a pilot programme that thoroughly pre-screens passengers’ details in four US airports, enabling authorities to make an intelligence-based risk assessment. Frequent flyers who volunteer to provide more information may then be directed to an expedited security process at the airport. The pilot project has been implemented after public concern over queue times and the invasive nature of screening methods, including pat-downs. Despite all the advances in technology, this signifies that the best way to secure the airport is to identify threats before they reach it. Of course, this will not always be possible and the pre-screening programme only identifies a very small percentage of passengers; however, current security systems can help bridge the gap. Airports remain a target because of the prestige and level of devastation or impact that an attack can achieve. Technology and security systems have always striven to stay one step ahead of the potential threats. They have now reached a position which challenges those with criminal intent to be one step ahead. While security can never be 100% effective, further investment, innovation, and advancement in airport security technology will continue to make it very hard for such groups and individuals to carry out attacks. About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth and achieve best-in-class positions in growth, innovation and leadership. The company's Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined research and best-practice models to drive the generation, evaluation, and implementation of powerful growth strategies. Frost & Sullivan leverages 50 years of experience in partnering with Global 1000 companies, emerging businesses and the investment community from more than 40 offices on six continents. To join our Growth © 2011 Frost & Sullivan Partnership, please visit http://www.frost.com.