Aviation and Airport Security: Terrorism and Safety Concerns, Second Edition / Edition 2

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $22.30
Usually ships in 1-2 business days
(Save 76%)
Other sellers (Hardcover)
  • All (10) from $22.30   
  • New (4) from $87.35   
  • Used (6) from $22.30   

Overview

The Definitive Handbook on Terrorist Threats to Commercial Airline and Airport Security

Considered the definitive handbook on the terrorist threat to commercial airline and airport security, USAF Lieutenant Colonel Kathleen Sweet’s seminal resource is now updated to include an analysis of modern day risks. She covers the history of aviation security and compares current in-flight security practices with those of other countries.

Covering Transportation Security Administration changes in security, policy, and training regulation since 9/11, this authoritative reference:

  • Discusses a broad range of aviation terrorist incidents
  • Considers aviation security in the present geopolitical climate
  • Addresses cargo and passenger security
  • Determines how security considerations are factored into business processes
  • Details new regulations for the TSA
  • Contains an instructor’s manual with test bank
  • Documents the history of aviation security
  • Includes extensive background information on various terrorist groups

In addition to cargo and passenger security, the text looks at airport and aviation business practices and how security considerations are factored into business processes. The first edition quickly became required reading for air service operators and airport management training programs. This edition is certain to follow suit.

About the Author:

Kathleen M. Sweet, Lt. Col., Ret., USAF, JD, is on the adjunct faculty at the University of Maryland, Department of Emergency Management. Lt. Col. Sweet is also a consultant with International Risk Control Ltd, London, England, and president and CEO of Risk Management Security Group, a transportation security consulting firm.

Read More Show Less

Editorial Reviews

From the Publisher
… a comprehensive handbook that covers the full range of aviation security, from facilities to operations. Anyone involved in this industry will want to have it available.

—Mayer Nudell, CSC (Certified Security Consultant), writing in Security Management, April 2010

Read More Show Less

Product Details

  • ISBN-13: 9781420088168
  • Publisher: CRC Press
  • Publication date: 12/19/2008
  • Edition description: New Edition
  • Edition number: 2
  • Pages: 384
  • Sales rank: 1,041,526
  • Product dimensions: 7.00 (w) x 10.10 (h) x 1.00 (d)

Table of Contents

The Aviation Industry: A national security asset

News

Importance of Air Transportation

Airways

Development of the Aviation Industry

Airlines

Facilities

Airway Routes

Deregulation

Consequences of 11 September to the Industry

Emergency Funding

Protecting Public Air Transportation

Conclusion

References

The Historical Hijacking Threat and Government Response: A Persistent Problem

News

Hijacking

Legal Responses to Expanding Security Measures

International Perspectives

The Trend Begins

Early Federal Aviation Regulations

Airport Security Programs

New Carrier Rules 1972

New Airport Operator Rules 1972

Resistance Fades

How to Implement the New Rules

Public Law 93–366

Dissemination of Threat Warnings

Recommendations of the President’s Commission

Aviation Security Improvement Act of 1990

The Federal Aviation Reauthorization Act of 1996

Civil Aviation Security

Aviation Security Research and Development Division Costs

White House Commission on Aviation Safety and Security — The Department of Transportation Status Report

Aviation and Transportation Security Act — P.L. 107–71

Implementing Recommendations of the 9/11 Commission Act of 2007 (H.R. 110-1, P. L. No: 110-53)

The National Strategy for Aviation Security

The White House, March 26, 2007

Security Guidelines for General Aviation Airports

Transportation Security Administration, May 17, 2004

Conclusion

References

International Solutions and Reactions

News

Crimes Against Humanity

The Tokyo Convention

Hijacking Convention: Convention for the Suppression of Unlawful Seizure of

Aircraft

Montreal Convention

The Convention on the Prevention and Punishment of Crimes Against

Internationally Protected Persons

Bonn Agreement 1978

International Convention Against the Taking of Hostages

Tokyo Summit 1986

Further Efforts

Montreal Protocol of 1988

Diplomatic Conference on Air Law 1991

Convention on the Physical Protection of Nuclear Material 1980

G-7 Summit 1995

Lyon Summit 1996

Ministerial Conference on Terrorism 1996

Convention for the Suppression of Terrorist Bombings 1997

International Convention for the Suppression of the Financing of Terrorism 1999

United Nations

The International Civil Aviation Organization (ICAO)and The European Civil

Aviation Conference

Post July 2005 British Legislation

International Convention for the Suppression of Acts of Nuclear Terrorism

Conclusion

References

Growth and Change: Aircraft As Missiles

News

Early Criminal Hijackings

Terrorist Hijackings Spread

Initial Public Responses

Cockpit Doors

Passenger Photo IDs

Crew Training

Profiling

CAPPS II

Secure Flight

No Fly List

Sky Marshal Program, Federal Air Marshal Program

History of Significant Air Hijackings Since 1972

31 May 1972: Lod Airport

27 June 1976: Entebbe, Uganda

14 June 1985: Trans World Airlines Flight 847

21 December 1988: Pan American Flight 103

11 September 2001

Other hijackings in recent decades

Conclusion

References

Terrorism: The Roots Remain

News

Introduction

Causes of Terrorism

Middle East

Rival Claims

Palestinian Liberation Organization (PLO)

Abu Nidal

Hamas

Iranian Support of Terrorism

Hezbollah

Afghanistan: Usama Bin Laden

Europe

Germany

Italy

Spain

Northern Ireland

Japan

Aum Shinrikyo

Latin America

Tupac Amaru (MRTA)

Shining Path (Sendero Luminoso)

Russia

U.S. Domestic Terrorism

The Order

Nuclear Terrorism

A Dirty Bomb

Attack on Nuclear Power Plants

Diversion of Nuclear Material or Weapons

Biological and Chemical Warfare

Conclusion

References

International Major Counter Terrorism Units, Law Enforcement, and Intelligence Agencies — The best defense

News

Introduction

CounterTerrorist Units

Austrian Special CountertTerrorist Intervention Unit

Canadian Armed Forces Joint Task Force 2

Great Britain: SAS

Germany: GSG-9

Israel: Sarayat Mat’Kal

Civil Guard

Border Guard Force

Ireland: Army Ranger Wing

France: Groupment d’intervention de la Gendarmerie Nationale (GIGN)

Spain: Grupo Especial de Operaciones (GEO)

United States: Special Forces Teams

Operation Ice Eagle

Local Law Enforcement

Training

The U.S. Customs Service

Customs and Border Protection Bureau

Drug Enforcement Agency

Federal Bureau of Investigation

The US Marshals

Department of Homeland Security

Transportation Security Administration

The Immigration and Naturalization Service, U.S. Citizen and Immigration Service

The Border Fence and The Real ID Card Program

9-11 Commission

Director of National Intelligence

The Intelligence Community

Terrorist Screening Center (TSC)

United States Postal Inspection Service

Interpol

Conclusion

References

Screening — the last line of defense

News

Introduction

Sterile Concourse

Sterile Boarding Areas

Departure-Gate Screening

Screening Checkpoint Augmentation

Law Enforcement Officers at the Gate

Flexible Law Enforcement Response Program

Airport Categories

Public and Private Security Interface

Criminal Case Law Examples

United States versus James Edward Ware, U. S. District Court, Western

District of Oklahoma, August 1970

United States versus Feldman, U.S. District Court, Eastern District of New

York, 1 May 1969

United States versus Benrus Eugene Brown, United States District Court,

Western District of Texas, October 1969

Lawrence Havelock versus the U.S. Court of Appeals, Tenth Circuit June 1970

United States versus Reid 2003 (Shoe Bomber)

United States versus John Walker Lindh

Case Law Summary

Initial Screening

Screening Procedures

Screening Baggage

Threat Assessment

3-1-1 Rule

Screening Computers and Laptops

Discovered Contraband

Battery Restriction

Screening Passengers

Cast Scope

Rating Hand Held Metal Detectors

Body Search

Screening Airport and Airline Employees

Screening Diplomats

Registered Traveler Program

No Fly List

Federal Behavior Detection Officers

Theft

Potential TSA Ethics Issues

Public Relations

Airborne Aircraft Security

Federal Flight Deck Officers

Training Initial training will be conducted in a one-week session that will typically require volunteers to arrive mid-afternoon on a Sunday and remain through conclusion of training the following Saturday afternoon

Conclusion

References

Private Security Personnel versus Transportation Administration Security Personnel: Increased supervision?

News

Introduction

Criminal Guards: Foxes Guarding the Chickens

Ergonomic Solutions

Potential Operator Concerns with Specific Screening Technologies

Measuring Operator Performance

Operator Selection

Tougher Than They Thought

The OPT OUT Program

Conclusion

References

Metal Detectors, X-Ray Inspection, Explosive Detection, and Trace Detection Devices: Will the Public Tolerate the Intrusion?

News

Introduction

Metal Detectors

Selecting a Metal Detector

Hand-Held Body Scanners

Testing

Metal Detectors, Computers, and Personal Medical Devices

X-Ray Inspection Units

Passive Millimeter-Wave Imaging

Active Millimeter-Wave Imaging

Selecting an X-ray Unit

Sizers

Film and Laptops

Passenger X-Ray Screening Devices

Portable Digital X-Ray Imaging Systems

Testing X-ray Equipment

Detection Capabilities

Prior X-Ray Explosive Detection Devices

U.S. Standard

New Computer Software

Explosive-Detection Systems

Three-Dimensional Imaging: Explosive Assessment Computed Tomography

Bottled Liquid Scanners

Trace Detection Technology Today

Explosive Detection Devices for Baggage

Enhancing ETD Capability

Thermedics EGIS 3000, EGIS II, EGIS III

Barringer IONSCAN 400B, Centurion, Sentinel II

ION Track ITEMISER 3, Entry Scan

Taggants

Project Hostile Intent

Conclusion

References

Cargo Security: A Loose End

News

Introduction

Cargo Carrier Responsibility

Report to Congress on Air Cargo Security

Arming Cargo Pilots

Suicides

Baggage Tags

Passenger Baggage Reconciliation

Airport Lockers

Container Hardening

Blast Containment versus Blast Management

Airmail Security

Indirect Air Carriers

Known Shipper

Unknown Shipper

GAO Status Report on Cargo Security 2002

Strategic Plan of TSA

Enhanced Measures

Summary of Airforwarder’s Association Objections

The Latest

Vacuum Chambers

Inspection of Hazardous Cargo

International Cargo Standards

TSA Inspection of Airports

Conclusion

References

Security and the Rules of Law — A Slippery Slope

News

Introduction

Fourth Amendment

Administrative Search Exception

Balancing Approach

Less Intrusive Alternatives

Individual Stop and Frisk Searches

Selectee Class Stop and Frisk Search

Consent Exception

Other Exceptions to Fourth Amendment Requirements

Border Searches

Exigent Circumstances

Reasonableness

Probable Cause

The Exclusionary Rule

The Legal Authority of Private Persons to Search

Exceptions to the Exclusionary Rule

Inevitable Discovery

Good Faith Exception

Police Participation

NonViolent Threats?

Airport Administrative Screening Searches at Airports

Passenger’s Right to Terminate a Search

Alternate Viewpoint

The War on Drugs

Passenger Rights

New Law in the Area of Searches

New Technologies and the Law

Conclusion

References

Foreign Airport Security: Comparison of U.S. Law and Foreign Domestic Law — Lessons Learned

News

Introduction

Ground Security

American Assessments

Diversion Airports

Legal Remedies

Legislation after 11 September 2001

AntiTerrorism Legislation in the United Kingdom

Post 2005 London Bombings

Canada’s War with the FLQ

Germany

Italy

Profiling

International Views of Profiling

SAFEE

Bomb Sniffing Dogs

Conclusion

References

Technological Improvements: Some Intrusive, Some Not

News

Introduction

Gore Commission

Homeland Security: Science and Technology Directorate

Anti Missile Defense Systems

Microwave Holographic Imaging

Triggered Spark Gap

BOSS™

Flight VU™

BiosimMER™

Quadrupole Resonance Devices

Intelliscan™ 12000 Metal Detector

Biometric Systems

FACE IT™ Access Controls

Imaging Technologies

Trace-Detection Technologies

Fuel Flammability

Remote-Controlled Aircraft

Improved Closed-Circuit Television Technology

Cockpit Doors

Conclusion

References

Airport Operator Concerns and Other Safety and Security Issues: The Foundations of Security

News

Introduction

Airport Runway Incursions

Passenger Interference

Air Rage and Passenger Involvement

Air Rage and Civil Liability

Civil Remedies

Conventional Weapons

Explosives

Nuclear and Biological Weapons

Embracing Risk Management

Assessing the Threat

Law Enforcement

Federal Resources

Private Intelligence Services

Stratfor Strategic Forecasting, Inc

Jane’s Information Group

Economist Intelligence Unit

Flight Crew Involvement

Conclusion

References

Access Controls, Perimeter Security: Another Foundation

News

Introduction

Access Control

Locks

Access Cards

Electronic Locks

Sensors

Biometric Security Systems

Retinal Scans

Fingerprint Verification Readers

Voiceprint Identification

Hand Geometry

Facial Scan

Signs

Perimeter Fencing and Lighting

Exterior Alarm Sensors

Motion Detectors

Microwave

Charged Coupled Devices

Portal Coaxial Cables

Electric Field

Vibration and Stress Detectors

Closed Circuit Television

Infrared Motion Detectors

Active Infrared

Passive Infrared (PIR)

Glass-Break Detectors

The Control Room

Alarms

No Power, No Security

Media Intrusion

Computer Security

Kiosks

Conclusion

Epilogue

Changes

The More Things Change, The More They Remain the Same. Screeners

Are Screeners

Arming Pilots

The Federal Air Marshal Program

Emerging Technology

Civil Liberties

Summary

References

Selected Bibliography

Index

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 3 Customer Reviews
  • Posted December 27, 2009

    Excellent Comprehensive Book

    This updated version of the book Aviation and Airport Security contains the most contemporary review of the status of aviation security as of the publiishing date of the book. The TSA procedures change on a regular basis as per the security needs of the timeframe. The incident on Delta Airlines on Christmas Day 2009 is a perfect example. I enjoyed the book anf gained some new insights into the difficulties facing the authorities everyday. This edition contains many internet references and permits the student to engage in further research on a plethora of subjects.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 21, 2009

    No text was provided for this review.

  • Anonymous

    Posted June 12, 2009

    No text was provided for this review.

Sort by: Showing all of 3 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)