Module III: Part 5
Access Control
"_________________________" is essentially a lock on a door and a key to the lock.
TSA has the discretion to change an individual airport categorization (as it relates to security measures) based upon what factors?
(a) the threat conditions at that location, (b) the scope of operation (e.g., airport size and extent of operations), (c) the type of operations (e.g., co-location of military operations, cargo operations, mail, etc.), or (d) geopolitical circumstances.
What types of theft occur at airports?
1. Cars in parking lots 2. checked baggage by employees and screening personnel 3. theft of passenger bags or personal belongings left unattended
Immediately upon direct or inferred receipt of a threat of any of the incidents, airport operators must:
1. Evaluate the threat according to the ASP; 2. Initiate appropriate actions, as specified in the AEP and the appropriate sections of the ASP; and 3. Immediately notify TSA of acts or suspected acts of unlawful interference to civil aviation operations, including specific bomb threats to aircraft and airport facilities.
All personal identification media used in the Sterile or Secured Area must:
1. Have a full-face image, the full name of the individual, the employer, and an identification number of the individual to whom the identification was issued; 2. Indicate through badge color schemes the scope of the individual's access and movement privileges; and 3. Be of sufficient size and appearance as to be readily observable for challenge purposes.
Law enforcement officers must meet the following qualifications while on duty:
1. Have arrest authority with or without a warrant while on duty at the airport for crimes committed in the presence of the individual, and for felonies the individual has reason to believe that the suspect committed; 2. Are identifiable by appropriate indicator of authority (uniforms, badges); 3. Are armed with a firearm and authorized to use it; 4. Have completed a training program that meets the requirements for law enforcement officers prescribed by either the state or local jurisdiction in which the airport is located; 5. Must be trained in the use of firearms, detention, search, arrest, and any other subject TSA deems necessary; and 6. Must be trained in their responsibilities under the Airport Security Program, which includes the requirement to support and enforce the provisions of the ASP; 7. Should be trained in the courteous and efficient treatment of persons subject to inspection.
What is a PACS required to do?
1. Monitor access to the Secured and Sterile Areas, annunciate any security violations, and record and automatically log all attempts to enter Secured and Sterile Areas; 2. Verify that the holder of the airport approved access/ID media is entitled to pass through the portal and, either unlocks it to allow passage, or denies passage (if access is unauthorized) and provides a local audible alarm of this denial; 3. For AOA access areas, the airport operator must explain how the access control measures will deter, detect, or allow the airport to respond to an unlawful breach attempt.
What are examples of concession needs?
1. News 2. Postal services 3. Specialty shops, apparel shops, jewelry and watches, leather goods, and personal care products (including high end electronics stores, luggage, and travel accessories), sports apparel, toy stores, and candy shops 4. Gift stores (often offering local souvenirs), vending machines, and other retail operations 5. Public telephone space, power (recharge) stations, and Internet connections 6. Information services 7. Barber and shoeshine operations 8. Bookstores 9. Fitness facilities for airport staff 10. Florist shops 11. Nursery and daycare facilities for airport staff 12. Public toilets 13. Medical aid facilities 14. Auto rental services 15. Food and beverage operations (including quick serve and sit down restaurants, bars, cafés, or coffee shops) 16. Public transportation centers 17. Chapels 18. USO/travelers aid 19. Entertainment 20. Advertising displays such as video screens, product placement, and static advertising 21. Business centers with printers, charging ports, and Wi-Fi access
What are the five essential customer service touch points airport executives have to positively influence the passenger experience?
1. Physical 2. Human 3. Procedural 4. Subliminal 5. Communicative
What other types of crimes occur in restrooms at airports?
1. Prostitution 2. Drug Dealing
The primary functions of the GSC are:
1. Resolve conflicts between gate agents and passengers; 2. Intervene in situations with disruptive passengers; 3. Act as the primary point of contact for bomb threats and hijackings until relieved by higher authority; and 4. Oversee cargo and baggage acceptance procedures.
What are some of the duties of the ASC?
1. Serve as the airport's primary and immediate contact for communications with the TSA and be available to the TSA on a 24-hour basis; 2. Review all security functions to ensure the procedures and processes are effective and in compliance with Part 1542; 3. Immediately correct conditions that do not comply with Part 1542 and immediately apply Security Directives (SDs) issued by the TSA; 4. Review and control the results of Criminal History Record Checks and Security Threat Assessments; 5. Process applications from individuals applying for unescorted access to the Security Areas; and 6. Serve as the liaison between air carrier station managers and foreign air carrier operators to share information regarding security issues.
What are the functions of the FSD?
1. Service functions, including the screening of passengers, carry-on, and checked baggage30; 2. Regulatory functions, including airport and aircraft operator compliance inspections and approval of Airport Security Programs, oversight of the canine program, and internal investigations; and 3. Administrative functions, including staffing, budget and finance personnel, human resource personnel, engineering, procurement, public relations officers, and stakeholder managers.
What are the eight signs of terrorism?
1. Surveillance - photos, videos and drawings of security areas, personnel or facilities, use of vision enhancing devices, acquiring blueprints; 2. Elicitation - information gathering about operations, capabilities, or people via mail, email, telephone or conversations with staff; 3. Testing security - attempting to enter restricted areas, penetrate physical barriers, triggering alarms; 4. Funding - large transactions involving cash or gift cards, sale of counterfeit or stolen goods; 5. Acquiring supplies - weapons, explosives, badges, uniforms; 6. Impersonation - pretending to be police or security, firefighters, company employees; 7. Rehearsal - multiple alarms or suspicious activity in the same area over a short period of time, mapping routes, gauging response times; 8. Deployment - moving into position, moving equipment, supplies, people
Part 107 allows operations of drones of less than 55 pounds without a COA, provided the operator has a Remote Pilot Airmen Certificate, which requires the passage of an aeronautical knowledge test in addition to the following:
1. The drone is operated using line-of-sight (LOS) or first-person view with an LOS observer; 2. Fly during daylight or in twilight (30 minutes before official sunrise to 30 minutes after official sunset), with appropriate anti-collision lighting; 3. The weather must be a visibility of three miles or greater from the control station; 4. The maximum allowable height is 400 feet above ground level; 5. The maximum speed is 100 mph.
What are the signs an individual is being trafficked through an airport?
1. The traveler is not dressed appropriately for their route of travel; 2. They have a tattoo with a bar code, and/or the word "Daddy." 3. They can't provide details of their departure location, destination, or flight information; 4. Their communication seems scripted, or there are inconsistencies with their story; 5. They can't move freely in an airport or on a plane, or they are being controlled, closely watched or followed; 6. They are afraid to discuss themselves around others, deferring any attempts at conversation to someone who appears to be controlling them; 7. If it is a child, the child may appear to be malnourished and/or shows signs of physical or sexual abuse, such as bruises, scars, or cigarette burns. They may also be dressed in a sexualized manner, or seem to be under the influence of drugs or alcohol
What are the functions of the Transportation Security Inspector (TSIs)?
1. conduct inspections of the Airport Security Program (ASP) and related processes, 2. inspect Aircraft Operator Standard Security Program (AOSSP) and related processes, 3. conduct audits.
What are the functions of Transportation Security Officers (TSOs) ?
1. conduct the screening of passengers and carry-on and checked baggage, 2. conduct the Travel Document Check 3. serve as Behavior Detection Officers (BDOs), who are specially trained to identify suspicious individuals, which can be referred for secondary screening (if they are a passenger), or to law enforcement.
What types of crimes, other than car theft, happen in airport parking garages?
1. physical and sexual assault 2. armed robbery 3. vandalism
Title 49 CFR Part 1550
Aircraft Operator Security under General Operating Rules, specifically any commercial flight operation not covered under Part 1544
What is the AOSSP?
Aircraft Operator Standard Security Program
Title 49 CFR Part 1542
Airport Security
What is the ASP?
Airport Security Program
What is the RAPBack program?
Airports that are enrolled in RAPBack are immediately notified if someone who holds an access/ID has been arrested or prosecuted of a crime, so the airport can immediately revoke their airport access privileges
What is ADASP?
Aviation Direct Access Screening Program
Why does more crime occur in women's restrooms?
Because they remove their rings when applying hand lotion
Title 49 CFR Part 1500
Civil Aviation Security (general definitions and applicability)
Under Title 49 CFR Part 1562, three GA airports must follow certain security restrictions. Commonly called the Maryland-3, they consist of which airports?
College Park Potomac Airfield in Ft. Washington Washington Executive/Hyde Field in Clinton.
Title 49 CFR Part 1552
Commercial Flight Training Security Requirements
Physical Access Control System (PACS)
Commercial service airports commonly use a _________________________________ to control access between the security areas and the public areas of the airport.
What are the three security program for a commercial service airport?
Complete, Supporting, and Partial
Ports of Entry
Customs and Border Protection (CBP) and Immigrations and Customs Enforcement (ICE) personnel provide protection to the ___________________ to the United States at land, maritime, and aviation crossing points.
The size of food and beverage services involves applying use factors. How are these parameters determined?
Dividing the average daily transactions by the average daily enplanements.
Title 49 CFR Part 1544
Domestic Aircraft Operator Security, primarily scheduled service operations conducted under Title 14 CFR Part 121; air charter and air taxi operations covered under Title 14 CFR Part 135; and full-cargo operations covered under Title 14 CFR Part 125.
point of denial access points,
Doors that access Security Areas are known as _____________________________ or controlled access points
Airport Liaison Agent (ALA)
Each FBI office that has an airport within its jurisdiction has an assigned agent to handle aviation security issues. This Special Agent is known as ___________________________.
What is considered the "back door" from a security perspective by TSA / Airport Security Program?
Employee security and access to the airfield and other security areas, through control points.
What is a FAM?
Federal Air Marshall
Besides the TSA, there are other agencies that have significant roles in protecting aviation including:
Federal Bureau of Investigation (FBI) Customs and Border Protection (CBP) Federal Protection Service (FPS).
What is the FSD?
Federal Security Director
What are FIDS?
Flight Information Display Systems
FBI
For any security related incident at the airport, the ______________ is the designated lead agency (over TSA).
Title 49 CFR Part 1546
Foreign Aircraft Operator Security
Public and non-public
From a security perspective, commercial service airports can be divided into ________________ and ________________________ areas, and various levels of security areas.
77
General Aviation accounts for some __________ percent of all flights in the United States.
Letter of Investigation (LOI)
If a TSI believes there is a violation under an ASP or AOSSP, or even by an individual (such as a passenger caught with a weapon at the checkpoint), the TSI can issue a _________________________ , which may result in a fine to the airport, aircraft, cargo operator, or the individual.
49
In 2002, federal aviation security regulations moved from Title 14 to Title ___________ of the Code of Federal Regulations.
Airport Police
In many cases it will be awhile before this agencies personnel and resources can get to the airport, for a security related incident. Therefore, the _________________ are usually the agency in-charge, unless otherwise noted in the Airport Security Program.
Title 49 CFR Part 1548
Indirect Aircraft Operator Security
What is ICAO?
International Civil Aviation Organization
Title 49 CFR Part 1503
Investigation and Enforcement (addresses the TSA method of investigating enforcement violations of the Airport Executive, aircraft operator, or cargo Security Programs, or individuals who violate aviation security regulations).
Certified Protection Professional (CPP).
Many security officer supervisors and managers are accredited through the American Society of Industrial Security and their primary accreditation program, the ______________________________.
What is MUFIDs?
Multi-User Flight Information Display Systems
ECS: Subliminal
Overall atmosphere and "feel" of the airport.
Transportation Security Administration (TSA)
Passed on November 19, 2001, ATSA _____________________________created the and effectively transferred authority for all civil aviation security functions from the FAA.
VIPR (Visible Intermodal Protection and Response)
Playbook also goes by the name __________________________, when carried out in other areas besides an airport.
Title 49 CFR Part 1520
Protection of Sensitive Security Information
What is RAPBack?
Record of Arrest and Prosecution
ECS: Communication
Relate to Airport websites, brochures, and signage.
Where does much of the theft at an airport occur?
Restrooms
Title 49 CFR Part 1540:
Security Responsibilities of Individuals
What is considered the "front door" from a security perspective by TSA?
Staffing the checkpoint
model aircraft
The FAA now classifies drones weighing 55 pounds or less and used by a hobbyist as "________________________."
400,000
The FAA's Unmanned Aircraft Systems Integration Office predicts between _______________________ and 2.3 million licensed Part 107 operators by 2020.
ALA
The FBI's ____________________must be notified whenever there is an act or potential act of unlawful interference with aviation, including air rage incidents on board an aircraft, discovery of an improvised explosive device at the airport or on board an aircraft, bomb threats, and potential hijacking (or actual hijacking) situations
ASP
The _________________ describes how that specific airport will comply with the federal regulations (i.e. 1542) and applicable Security Directives (SD)
Airport Tenant Security Program (ATSP)
The __________________________ is similar to an ----, but it applies to non-Regulated Parties (i.e. air carriers) such as airport tenants besides air carriers (i.e. Fixed Base Operators, corporate operators, and Specialized Aviation Service Operators).
Precheck
The actual Trusted Traveler program is now known as _________________, or risk-based screening.
Security officers
The individuals are frequently used at airports to provide perimeter security, staff vehicle entry gates, and patrol the airfield to enforce the Airport Security Program to respond to computer alarms from the access control system.
ECS: Human
The interactions passengers have with airport, airline, and tenant staff
ECS: Physical
The layout and design of the airport itself, its ease of use, design of the restrooms.
access/ID badge
The most comprehensive versions of access control include a combination of encoded access/ID media badges, PINs, and biometrics; however, from a regulatory perspective, only one level is necessary—the __________________________.
ECS: Procedural
The processes encountered by the passenger, including the screening checkpoint, ticketing and baggage handling, lost and found services, or other airport services.
What is the most common airport crime?
Theft
Exclusive Area Agreements (EAA)
These apply to Regulated Parties, i.e. those entities operating under Title 49 CFR Part 1544 or Part 1546.
Ground Security Coordinators (GSCs)
These are airline employees assigned to manage security functions for each passenger and cargo flight. They are trained to handle a variety of issues pertaining to the security of the airline operations.
Public UAVs
These are essentially aircraft operated by the U.S. government or another entity authorized to operate on the governments' behalf.
Civil UAV's
These may be used to perform commercial or other operations that are considered non-hobby or non-recreational in low-risk, controlled environments
Airport Operations
These personnel are frequently charged with duties and responsibilities to maintain the Airport Operating Certificate under Title 14 CFR, Part 139. These responsibilities include the protection of the public and, to the extent there is crossover in the regulations, supporting the Airport Security Program.
Supporting and Partial
These programs are for Category IV airports. These programs typically do not include defined security areas (thus, are not limited to any badging or CHRC requirements).
For security areas, TSA recognizes four types: Sterile Area
This begins at the screening checkpoint and extends to the doors leading outside to the airfield. Sterile Area access is controlled by three entities: the TSA, the airport operator (through the employee credentialing process), and the aircraft operator through the operation of the screening checkpoint if TSA is not present.
The UAV
This device may both be piloted and programmed to perform autonomous missions
Aircraft Operator Security Coordinator (AOSC)
This individual acts as the primary point of contact for the TSA in all security issues and compliance with the AOSSP and is the recipient of the distribution of Security Directives and Information Circulars to those aircraft operator employees with security responsibilities.
Airport Security Coordinator
This individual is the primary contact for the federal government for security issues at the airport. This is also one of the few positions in the airport industry that is required by regulation.
Playbook
This is based on using random antiterrorism measures, such as random checks of personnel operating in the cargo areas of an airport or other locations, and putting on a display of force with Federal Air Marshals, Transportation Security Officers, and canine personnel.
For security areas, TSA recognizes four types: Air Operations Area (AOA)
This is established wherever aircraft operate, including the ramp areas, taxiways, and runways. This area must be visually identified (most often by using signs on the perimeter fence) and access to this area must be controlled through a lock and key method, or some other TSA-approved method.
For security areas, TSA recognizes four types: Security Identification Display Area
This is part of a Secured Area and can also be attached to an AOA. It if is standalone, in and of itself, does not have access control requirements unless its combined with an AOA or Secured Area, in which case it incorporate the access control requirements of a Secured Area or an AOA.
In-Flight Security Coordinator (IFSC)
This is the airline or aircraft operator's pilot-in-command of the aircraft and has the final authority related to the safety and security of the flight operation.
What is an RPV?
This is when an operator at a remote site actually pilots this device.
For security areas, TSA recognizes four types: Secured Area / SIDA
This must be established around the scheduled passenger air carrier operation where passengers load and unload, and baggage sorting and screening areas. These areas have the highest levels of access control requiring a system that can validate access, distinguish the individual's access authority, and either deny or authorize an employee's access immediately.
Self Ticketing
This process consists of touch screen monitors at ticket counters, or kiosks, set up in the terminal, which allow a passenger to complete the functions that a ticket agent would normally perform.
Drone
This term describes something that flies in a dull, monotonous, and indifferent manner
True
True or False: Operations in Class B, C, D, and E airspace need ATC approval.
True
True or False: Operations in Class G airspace are allowed without air traffic control permission.
Drones
UAV's are also called
What is the difference between a UAV and UAS?
UAV: describes the actual vehicle that flies, whereas the term UAS describes all of the components that are required to operate the UAV, such as a ground control station, payload, a datalink, and the vehicle itself
What is a UAS
Unmanned Aerial System
What is a UAV
Unmanned Aerial Vehicle
High Intensity Runway Lights
What is HIRL?
Low Intensity Runway Lights
What is LIRL?
Medium Intensity Runway Light
What is MIRL?
Visual Approach Slope Indicator
What is VASI?
System
What makes it a "___________________" is the policy of who is authorized to have keys for the lock and a list of those individuals.
Internal and External Customers
When taking in the customer service experience, who should Airport Executives consider?
Airport Operations
Which airport personnel are often the first to respond security incidents or to identify a security problem?
Joint Terrorism Task Force
_________________________ consist of FBI personnel and state and local police and intelligence personnel who are focused on preventing terrorist acts and identifying and arresting terrorists.
Partial
_________________________- programs are the same as ------- programs, except for contingency plans, which these airports are not required to have.
Airport Liaison Agent (ALA),
__________________________ is responsible for disseminating relevant threat information to Airport Executives and aircraft operators and to law enforcement personnel.
FPS personnel
_______________________________ are charged with protecting federal facilities like courthouses and federal buildings.
Supporting
___________________programs require adherence to the sections relating to ASC, law enforcement requirements, record keeping, contingency plans, SSI, and incident management.
What are the requirements of operating a model aircraft?
a. Fly below 400 feet and remain clear of surrounding obstacles; b. Keep the aircraft within visual line of sight at all times; c. Remain well clear of and do not interfere with manned aircraft operations; d. Do not fly within 5 miles of an airport unless you contact the airport and control tower before flying; e. Do not fly near people or stadiums; f. Do not fly an aircraft that weighs more than 55 lbs.; g. Do not be careless or reckless with an unmanned aircraft; one could be fined for endangering people or other aircraft.
TSA still uses the pre-9/11 classifications of airports: Cat III
airports are either small or non-hub airports.
TSA still uses the pre-9/11 classifications of airports: Cat I
airports are normally medium-hub in size.
TSA still uses the pre-9/11 classifications of airports: Cat II
airports are normally small-hub sizes.
TSA still uses the pre-9/11 classifications of airports: Cat IV
airports are often seasonally-operated commercial service airports
TSA still uses the pre-9/11 classifications of airports: Cat X
airports are the largest, busiest airports in the U.S.
Trusted Agents
are usually members of the airport's badging (e.g. credentialing) offices who are directly responsible for the collection and processing of Personally Identifiable Information (such as a driver's license) and Sensitive Personally Identifiable Information (such as an Alien Registration Number or Social Security Number), and the collection and processing of fingerprints from airport identification badge applicants.
What do customers expect?
clean facilities, short queue lines at the ticket and screening checkpoints, clear wayfinding, friendly and respectful professional staff, ease of access through the terminal, and comfortable gate waiting areas
Internal Customers
customers are employees or business departments who receive services from other employees or business departments of the same organization.
Newer threats to aviation include?:
cyber-attacks, laser attacks, use of an unmanned aerial vehicle as an improvised explosive device, or as an obstruction to aircraft flight, and chemical, biological, radiological attacks using either aviation or occurring on airplanes and airports
Other crimes that take place within airports include:
drug smuggling, human trafficking, and crimes against persons such as assault, sexual assault, and robbery.
What is the function of the TSA Canine Bomb Detection?
exists to detect and deter the introduction of explosive devices into the transportation system.
External Customers
include passengers arriving or departing from the airport, visitors such as "meters-and-greeters," airport employees who buy goods, food, and beverages from the airport, and those that do business with the airport
Who can Temporary access/ID media be issued to?
individuals working on short-term contracts at the airport, or individuals who have left their primary access/ID media at home and need access to work that particular day.
What is the function of the Transportation Security Expert—Explosive (TSSE)?
provide guidance to the assigned Federal Security Director and screening personnel on issues involving explosives, improvised explosive devices (IEDs), and Chemical, Biological, Radiological, and Nuclear (CBRN) threats.
Complete
security programs are required for most Category X through Category III airports (as defined by enplanements and subject to TSA discretion).
What are some of the responsibility of the ASC?
the airport access control system, airport perimeter security, the credentialing and personnel identification system, management of air carrier and tenant security programs.
What should be included in the ASP?
the duties and responsibilities that are to be performed in order to comply with the federal regulations, and which entity on the airport will carry out those functions, under both normal and emergency circumstances. Lines of succession should be delineated and any necessary Letters of Agreement or Memorandums of Understanding should also be included
The success of a concessionaire depends on what factors?
the passenger volume, the quality and variety of the concessions, the amount of international traffic, terminal configuration, and customer dwell time
What is a new type of crime occurring at airports?
theft of information from individuals who use public Wi-Fi networks
How does crime also commonly occur at restaurants?
when patrons leave their wallets open and visible while paying for meals.
Historically, the primary threats to aviation are?
• Airline bombing • Airline hijacking • Airport assault (active shooter, vehicle born improvised explosive device, suicide bomber or "leave-behind" bomber) • Surface-to-air missile attacks