Abstract
Stung by a wave of terror attacks in the 1960s and 1970s, commercial aviation introduced a range of hard and soft security measures to mitigate the risk of unlawful interference. Terrorists responded by devising new forms of attack, such as the use of shoulder-launched surface-to-air missiles in the vicinity of poorly-surveilled airport perimeters, and reviving old tactics, such as the kamikaze attack. The terror attacks of September 11th, 2001, spurred further anti-terror measures, including the risk-based vetting of passengers. This chapter reviews the pros and cons of risk-based aviation security. Advantages include the opportunity to use scarce resources to best affect and—for most airline customers—a speedier passage. Disadvantages include greater operational complexity and additional capital and revenue cost. There is also the matter of political sensitivity: a risk-based aviation security system that is perceived to be discriminatory risks losing the support of those it is designed to protect—with unpredictable consequences. Finally, if the assumptions that inform the computerised vetting algorithms are wrong, the innocent may be inconvenienced, and the malevolent waved through. Referencing the Israeli experience, the author concludes that realising the benefits of risk-based aviation security requires planning, intelligent design and the will and ability to deliver a professional vetting service in perpetuity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
National Consortium for the Study of Terrorism and Responses to Terrorism (2016) Country reports on terrorism 2015, national consortium for the study of terrorism and responses to terrorism. University of Maryland, MD
World Health Organisation (2016) World Health Statistics 2016. World Health Organisation, Geneva
Air Transport Action Group (2017) Social and economic benefits of aviation. Available at: http://www.atag.org/our-activities/social-a-economic-benefits-of-aviation.html. Accessed 10 May 2017
European Union Council cited in Meloy JR, Roshdi K, Glaz-Ocik J, Hoffmann J (2015) Investigating the individual terrorist in Europe. J Threat Assess Manag 2(3–4):140–152
Federal Bureau of Investigation (2001) Code of Federal Regulations (28 CFR Section 0.85) relating to terrorism
McLay LA, Lee AJ, Jacobson SH (2010) Risk-based policies for airport security checkpoint screening. Transp Sci 44(3):333–349
Beckner C (2015) Risk-based security and the aviation system: operational objectives and policy challenges, Centre for Cyber and Homeland Security. The George Washington University, Washington DC
Blair D (2016) Israel’s risk-based approach to airport security ‘impossible’ for European airports. Available at: http://www.telegraph.co.uk/news/2016/05/20/. Accessed 11 May 2017
Zakay cited in Blair D (2016) Israel’s risk-based approach to airport security ‘impossible’ for European airports. Available at: http://www.telegraph.co.uk/news/2016/05/20/. Accessed 11 May 2017
Price cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017
Haaretz cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017
Shaham cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017
Airports Authority cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017
Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017
Angelides cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017
Challenger R, Clegg CW, Robinson M (2010) Understanding crowd behaviours, vol 1: practical guidance and lessons identified. The Stationery Office, London
Perrow C (1983) The organizational context of human factors engineering. Adm Sci Q 28(4):521–541
Perrow C (1984) Normal accidents. Basic Books, New York
Vaughan D (1997) The challenger launch decision. Risky technology, culture and deviance at NASA. University of Chicago Press, Chicago
Snook S (2000) Friendly fire: the accidental shootdown of U.S. Black Hawks over Northern Iraq. Princeton University Press, Princeton, NJ
Johnson CW (2005) What are emergent properties and how do they affect the engineering of complex systems? Department of computing science. University of Glasgow, Glasgow
Black J, Koopman P (2009) System safety as an emergent property in composite systems. Carnegie Mellon University, Pittsburgh, PA
Reason JT (2013) A life in error. Ashgate Publishing Ltd., Farnham
Hollnagel E, Leonhardt J (2013) From safety-I to safety-II: a white paper, European organisation for the safety of air navigation, Brussels
Shorrock S, Leonhardt J, Licu T, Peters C (2014) Systems thinking for safety: ten principles. Eurocontrol, Brussels
Steinhardt B (2001) ACLU says ‘traveller’s IDs’ for airline passengers will create dangerously false sense of security. Available at: https://www.aclu.org/news/aclu-says-travelers-ids-airline-passengers-will-create-dangerously-false-sense-security. Accessed 11 May 2017
Taylor FW (1911) Principles of scientific management. Available at: https://www.marxists.org/reference/subject/economics/taylor/principles/ch01.htm. Accessed 13 May 2017
Bennett SA (2015) The benefits of a systems-thinking approach to accident investigation. In: Applications of systems thinking and soft operations research in managing complexity. Springer, pp 203–226
Hollnagel E (2009) The ETTO principle: efficiency-thoroughness trade-off. Why things that go right sometimes go wrong. Ashgate Publishing Ltd., Aldershot
British Broadcasting Corporation (2004) Whistleblower: Manchester Airport. [television broadcast] BBC Channel 1, 7 September 2004, 21:00
Bennett SA (2009) Aviation security: at risk from practical drift? In: Protecting airline passengers in the age of terrorism. Praeger Security International, pp 33–62
Bennett SA (2015) Aviation safety and security: the importance of teamwork, leadership, creative thinking and active learning. Libri Publishing Ltd., Faringdon
Cornwell A (2017) Emirates changes pilot, crew rosters on US flights after Trump order. Available at: http://www.reuters.com/article/us-usa-trump-immigration-emirates-idUSKBN15D0JM. Accessed 17 May 2017
Baublies cited in Cornwell A (2017) Emirates changes pilot, crew rosters on US flights after Trump order. Available at: http://www.reuters.com/article/us-usa-trump-immigration-emirates-idUSKBN15D0JM. Accessed 17 May 2017
Strickland cited in Cornwell A (2017) Emirates changes pilot, crew rosters on US flights after Trump order. Available at: http://www.reuters.com/article/us-usa-trump-immigration-emirates-idUSKBN15D0JM. Accessed 17 May 2017
VOA News (2017) International reaction to Trump’s refugee ban begins. Available at: http://www.voanews.com. Accessed 17 May 2017
Almasy S, Simon D (2017) A timeline of President Trump’s travel bans. Available at http://www.cnn.com. Accessed 17 May 2017
Trump cited in Almasy S, Simon D (2017) A timeline of President Trump’s travel bans. Available at http://www.cnn.com. Accessed 17 May 2017
Trump cited in Johnson J (2015) Trump calls for ‘total and complete shutdown of Muslims entering the United States’. Available at: http://washingtonpost.com. Accessed 18 May 2017
Rittell cited in Lee AJ (2016) Resilience by design. Springer, Cham
Tamasi G, Demichela M (2011) Risk assessment techniques for civil aviation security. Reliab Eng Syst Saf 96:892–899
Zalman A (2017) 1968 PFLP hijacking of El Al Flight. Available at: https://www.thoughtco.com/1968pflp hijacking of el al flight 3209270. Accessed 20 May 2017
Ginsburg M (2014) How to thwart a gunman at 29,000 feet, by the only pilot who ever did. Available at: http://www.timesofisrael.com/how to defeat airplane terrorists from the only pilot who ever foiled a skyjacking. Accessed 20 May 2017
Armstrong M (1996) A handbook of personnel management practice, 6th edn. Kogan Page, London
Payne R (2002) Organisations as psychological environments. In: Psychology at work, 5th edn. Penguin, pp 375–398
Weir DTH (1996) Risk and disaster: the role of communications breakdown in plane crashes and business failure. In: Debates in risk management. UCL Press, pp. 114–126
Callon M, Latour B (1981) Unscrewing the big Leviathan: how actors macro-structure reality and how sociologist help them to do so. In: Advances in social theory and methodology: towards an integration of micro and macro-sociology. Routledge, pp 277–303
Callon M, Law J (1997) After the individual in society: lessons on collectivity from science, technology and society. Can J Sociol 22(2):165–182
Office of the Inspector General (2007) Office of the inspector general report on CIA accountability with respect to the 9/11 attacks, office of the inspector general, Langley VA
Freedman D (2010) What Really Led to 9/11. Available at: https://www.forbes.com/2010/09/08/september-11-al-qaeda-government-opinions-columnists-daniel-freedman.html. Accessed 23 May 2017
National Commission on Terrorist Attacks Upon the United States (2004) The 9/11 commission report, national commission on terrorist attacks upon the United States, Washington DC
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Bennett, S. (2018). Risk-Based Aviation Security—Designing-Out Terror?. In: Masys, A. (eds) Security by Design. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-78021-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-78021-4_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78020-7
Online ISBN: 978-3-319-78021-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)