Skip to main content

Risk-Based Aviation Security—Designing-Out Terror?

  • Chapter
  • First Online:
Security by Design
  • 744 Accesses

Abstract

Stung by a wave of terror attacks in the 1960s and 1970s, commercial aviation introduced a range of hard and soft security measures to mitigate the risk of unlawful interference. Terrorists responded by devising new forms of attack, such as the use of shoulder-launched surface-to-air missiles in the vicinity of poorly-surveilled airport perimeters, and reviving old tactics, such as the kamikaze attack. The terror attacks of September 11th, 2001, spurred further anti-terror measures, including the risk-based vetting of passengers. This chapter reviews the pros and cons of risk-based aviation security. Advantages include the opportunity to use scarce resources to best affect and—for most airline customers—a speedier passage. Disadvantages include greater operational complexity and additional capital and revenue cost. There is also the matter of political sensitivity: a risk-based aviation security system that is perceived to be discriminatory risks losing the support of those it is designed to protect—with unpredictable consequences. Finally, if the assumptions that inform the computerised vetting algorithms are wrong, the innocent may be inconvenienced, and the malevolent waved through. Referencing the Israeli experience, the author concludes that realising the benefits of risk-based aviation security requires planning, intelligent design and the will and ability to deliver a professional vetting service in perpetuity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. National Consortium for the Study of Terrorism and Responses to Terrorism (2016) Country reports on terrorism 2015, national consortium for the study of terrorism and responses to terrorism. University of Maryland, MD

    Google Scholar 

  2. World Health Organisation (2016) World Health Statistics 2016. World Health Organisation, Geneva

    Google Scholar 

  3. Air Transport Action Group (2017) Social and economic benefits of aviation. Available at: http://www.atag.org/our-activities/social-a-economic-benefits-of-aviation.html. Accessed 10 May 2017

  4. European Union Council cited in Meloy JR, Roshdi K, Glaz-Ocik J, Hoffmann J (2015) Investigating the individual terrorist in Europe. J Threat Assess Manag 2(3–4):140–152

    Google Scholar 

  5. Federal Bureau of Investigation (2001) Code of Federal Regulations (28 CFR Section 0.85) relating to terrorism

    Google Scholar 

  6. McLay LA, Lee AJ, Jacobson SH (2010) Risk-based policies for airport security checkpoint screening. Transp Sci 44(3):333–349

    Article  Google Scholar 

  7. Beckner C (2015) Risk-based security and the aviation system: operational objectives and policy challenges, Centre for Cyber and Homeland Security. The George Washington University, Washington DC

    Google Scholar 

  8. Blair D (2016) Israel’s risk-based approach to airport security ‘impossible’ for European airports. Available at: http://www.telegraph.co.uk/news/2016/05/20/. Accessed 11 May 2017

  9. Zakay cited in Blair D (2016) Israel’s risk-based approach to airport security ‘impossible’ for European airports. Available at: http://www.telegraph.co.uk/news/2016/05/20/. Accessed 11 May 2017

  10. Price cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017

  11. Haaretz cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017

  12. Shaham cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017

  13. Airports Authority cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017

  14. Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017

  15. Angelides cited in Federman J (2014) Stern security at Ben-Gurion airport questioned. Available at: http://www.timesofisrael.com/. Accessed 11 May 2017

  16. Challenger R, Clegg CW, Robinson M (2010) Understanding crowd behaviours, vol 1: practical guidance and lessons identified. The Stationery Office, London

    Google Scholar 

  17. Perrow C (1983) The organizational context of human factors engineering. Adm Sci Q 28(4):521–541

    Article  Google Scholar 

  18. Perrow C (1984) Normal accidents. Basic Books, New York

    Google Scholar 

  19. Vaughan D (1997) The challenger launch decision. Risky technology, culture and deviance at NASA. University of Chicago Press, Chicago

    Book  Google Scholar 

  20. Snook S (2000) Friendly fire: the accidental shootdown of U.S. Black Hawks over Northern Iraq. Princeton University Press, Princeton, NJ

    Google Scholar 

  21. Johnson CW (2005) What are emergent properties and how do they affect the engineering of complex systems? Department of computing science. University of Glasgow, Glasgow

    Google Scholar 

  22. Black J, Koopman P (2009) System safety as an emergent property in composite systems. Carnegie Mellon University, Pittsburgh, PA

    Book  Google Scholar 

  23. Reason JT (2013) A life in error. Ashgate Publishing Ltd., Farnham

    Google Scholar 

  24. Hollnagel E, Leonhardt J (2013) From safety-I to safety-II: a white paper, European organisation for the safety of air navigation, Brussels

    Google Scholar 

  25. Shorrock S, Leonhardt J, Licu T, Peters C (2014) Systems thinking for safety: ten principles. Eurocontrol, Brussels

    Google Scholar 

  26. Steinhardt B (2001) ACLU says ‘traveller’s IDs’ for airline passengers will create dangerously false sense of security. Available at: https://www.aclu.org/news/aclu-says-travelers-ids-airline-passengers-will-create-dangerously-false-sense-security. Accessed 11 May 2017

  27. Taylor FW (1911) Principles of scientific management. Available at: https://www.marxists.org/reference/subject/economics/taylor/principles/ch01.htm. Accessed 13 May 2017

  28. Bennett SA (2015) The benefits of a systems-thinking approach to accident investigation. In: Applications of systems thinking and soft operations research in managing complexity. Springer, pp 203–226

    Google Scholar 

  29. Hollnagel E (2009) The ETTO principle: efficiency-thoroughness trade-off. Why things that go right sometimes go wrong. Ashgate Publishing Ltd., Aldershot

    Google Scholar 

  30. British Broadcasting Corporation (2004) Whistleblower: Manchester Airport. [television broadcast] BBC Channel 1, 7 September 2004, 21:00

    Google Scholar 

  31. Bennett SA (2009) Aviation security: at risk from practical drift? In: Protecting airline passengers in the age of terrorism. Praeger Security International, pp 33–62

    Google Scholar 

  32. Bennett SA (2015) Aviation safety and security: the importance of teamwork, leadership, creative thinking and active learning. Libri Publishing Ltd., Faringdon

    Google Scholar 

  33. Cornwell A (2017) Emirates changes pilot, crew rosters on US flights after Trump order. Available at: http://www.reuters.com/article/us-usa-trump-immigration-emirates-idUSKBN15D0JM. Accessed 17 May 2017

  34. Baublies cited in Cornwell A (2017) Emirates changes pilot, crew rosters on US flights after Trump order. Available at: http://www.reuters.com/article/us-usa-trump-immigration-emirates-idUSKBN15D0JM. Accessed 17 May 2017

  35. Strickland cited in Cornwell A (2017) Emirates changes pilot, crew rosters on US flights after Trump order. Available at: http://www.reuters.com/article/us-usa-trump-immigration-emirates-idUSKBN15D0JM. Accessed 17 May 2017

  36. VOA News (2017) International reaction to Trump’s refugee ban begins. Available at: http://www.voanews.com. Accessed 17 May 2017

  37. Almasy S, Simon D (2017) A timeline of President Trump’s travel bans. Available at http://www.cnn.com. Accessed 17 May 2017

  38. Trump cited in Almasy S, Simon D (2017) A timeline of President Trump’s travel bans. Available at http://www.cnn.com. Accessed 17 May 2017

  39. Trump cited in Johnson J (2015) Trump calls for ‘total and complete shutdown of Muslims entering the United States’. Available at: http://washingtonpost.com. Accessed 18 May 2017

  40. Rittell cited in Lee AJ (2016) Resilience by design. Springer, Cham

    Google Scholar 

  41. Tamasi G, Demichela M (2011) Risk assessment techniques for civil aviation security. Reliab Eng Syst Saf 96:892–899

    Article  Google Scholar 

  42. Zalman A (2017) 1968 PFLP hijacking of El Al Flight. Available at: https://www.thoughtco.com/1968pflp hijacking of el al flight 3209270. Accessed 20 May 2017

  43. Ginsburg M (2014) How to thwart a gunman at 29,000 feet, by the only pilot who ever did. Available at: http://www.timesofisrael.com/how to defeat airplane terrorists from the only pilot who ever foiled a skyjacking. Accessed 20 May 2017

  44. Armstrong M (1996) A handbook of personnel management practice, 6th edn. Kogan Page, London

    Google Scholar 

  45. Payne R (2002) Organisations as psychological environments. In: Psychology at work, 5th edn. Penguin, pp 375–398

    Google Scholar 

  46. Weir DTH (1996) Risk and disaster: the role of communications breakdown in plane crashes and business failure. In: Debates in risk management. UCL Press, pp. 114–126

    Google Scholar 

  47. Callon M, Latour B (1981) Unscrewing the big Leviathan: how actors macro-structure reality and how sociologist help them to do so. In: Advances in social theory and methodology: towards an integration of micro and macro-sociology. Routledge, pp 277–303

    Google Scholar 

  48. Callon M, Law J (1997) After the individual in society: lessons on collectivity from science, technology and society. Can J Sociol 22(2):165–182

    Article  Google Scholar 

  49. Office of the Inspector General (2007) Office of the inspector general report on CIA accountability with respect to the 9/11 attacks, office of the inspector general, Langley VA

    Google Scholar 

  50. Freedman D (2010) What Really Led to 9/11. Available at: https://www.forbes.com/2010/09/08/september-11-al-qaeda-government-opinions-columnists-daniel-freedman.html. Accessed 23 May 2017

  51. National Commission on Terrorist Attacks Upon the United States (2004) The 9/11 commission report, national commission on terrorist attacks upon the United States, Washington DC

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Simon Bennett .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bennett, S. (2018). Risk-Based Aviation Security—Designing-Out Terror?. In: Masys, A. (eds) Security by Design. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-78021-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78021-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78020-7

  • Online ISBN: 978-3-319-78021-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics