Chapter 10: Discusses inventory strategies for passenger and property security in airports.
Key Focus: Understanding the security program required for airport operations, specifically for public charter services.
Acronyms and Entities
Acronym to Know: Important to identify what a specific acronym (from the documentary Spy Factory) stands for. There are 17 questions related to this.
Entities Responsible: It’s crucial to know that some entities may not conduct security screenings but are responsible for ensuring they are done by qualified personnel (e.g., TSA).
Detection Technologies
Chapter 3, Slide 16: Focuses on detection technologies such as:
Explosive Detection Systems (EDS)
Explosive Trace Detection (ETD)
Difference to Study: Know the distinction between EDS and ETD and their uses in security settings.
Historical Context of Security
Pre-9/11 Security:
FAA regulations allowed knives on planes before 9/11.
The emphasis was on searching for explosives; methods have evolved dramatically since.
Smuggling Issues
Chapter 7: Discusses how general aviation was often used for smuggling, primarily focused on narcotics, particularly prevalent in the 70s, 80s, and 90s.
Human Trafficking: Mentioned as a secondary concern, but narcotics remained the primary smuggled item due to high profits.
Post-9/11 Changes in Aviation
Impacts on Pilots: Post-9/11, pilots were engaged about their aircraft types—discuss this in Chapter 9.
Threat Matrix: In Chapter 11, understand the areas engineered by manufacturers to address security risks and vulnerabilities.
Economic Impact of 9/11
Financial Loss: Chapter 9 discusses the significant economic impact of 9/11 on the nation, with specific financial statistics provided.
Organizations & Regulation
GA Representation: Understand which organization represents business aircraft in the U.S.; distinguish this from the incorrect guess of flying Aggies.
TSA Concerns
Senate Hearing: Concerns were raised regarding the TSA process integrity, notably about issues such as 'tip-offs.'
System Analysis Tools
Red Ops: Recognized as a tool for security professionals to analyze systems from an adversarial perspective, useful for identifying weaknesses in security design cycles.