This page contains a Flash digital edition of a book.
IATA Responds to Abdulmutallab Incident
In the aftermath of the Christmas Day bomb attempt, the International Air that is built on global harmonisation, effective information exchange, industry/
Transport Association (IATA) reiterated that the security of passengers and government cooperation, risk assessment and efficient technology. This is how
employees is a top priority for the aviation industry. IATA urged the United we made flying the safest way to travel. We must take the same approach with
States Department of Homeland Security (DHS) and its Transportation security,” said Bisignani.
Security Administration (TSA) to partner with industry to identify the most Numbers illustrate the scale of the challenge. In the 12 months to September
effective and efficient ways to address the evolving security challenge in light 2009, air transport connected 2.2 billion passengers safely and securely. This
of the foiled terrorist plot to down a Detroit-bound aircraft. includes 820 million international travellers of which 140 million were international
In a letter to Homeland Security Secretary Napolitano, IATA’s Director travellers on US routes. Another component is the US domestic market which
General and CEO Giovanni Bisignani appreciated the swift reaction of DHS to accounts for 620 million travellers. “We live on an interconnected planet. Effective
maintain the confidence of the flying public and airline employees. security cannot be achieved with a silo-approach,” said Bisignani.
Bisignani noted the need for short-term temporary and extra-ordinary security As governments, with industry, review security in the days and weeks
measures until the immediate threat has abated. But he cautioned Secretary ahead, Bisignani urged a long-term re-think of the security model. “Instead of
Napolitano that long-term solutions must include improved technology and looking for bad things - nail clippers and rogue bottles of shampoo - security
effective risk assessment techniques. “The air transport system cannot systems need to focus on finding bad people. Adding new hardware to an old
support 100% pat-down searches over the long term.” IATA is recommending system will not deliver the results we need. It is time for governments to invest
a smaller percentage of intensive pat downs accompanied by technologies or in a process built around a check point of the future that combines the best of
proportionate screening procedures as a means to achieve near-term security screening technology with the best of intelligence gathering. Such a system
requirements with reduced delays. would give screeners access to important passenger data to make effective
While security is a government responsibility, it is a shared priority with risk assessments. The data is being collected. The technology exists. Industry
industry. Bisignani urged DHS to allow the current short-term measures to is supportive. Now ICAO and governments must work together to make such
be urgently followed-up by a comprehensive DHS/industry review of security a process a reality with global harmonization and data-sharing,” said Bisignani.
systems to address existing and evolving security threats. Each year airlines and their passengers invest US$5.9 billion in
The failed Detroit terror plot emphasised two key realities: the global nature security measures.
of the threat and the need for effective cooperation and information sharing
among and within intelligence organisations. “Effective security needs a system
CEM Releases New Portable Fingerprint Reader
CEM Systems, a Tyco International company, has released its new CEM S3020f Portable Fingerprint Reader. The S3020f
reader can be used in conjunction with the CEM AC2000 system range and offers a new level of roaming security to the
industry. With a large internal database and supporting multiple card technologies, the S3020f hand-held reader
offers fully integrated biometric verification as well as card validation to be carried out remotely.
The S3020f reader captures fingerprint templates on the central CEM AC2000 access control enrolment
station. Fingerprints are read and encoded as numerical values on the AC2000 database, meaning that
physical fingerprints cannot be stored or copied. All data is subsequently saved to the AC2000 server
and uniquely distributed to the S3020f reader for local storage in its internal database. Verification
is then carried out by comparing this number against the S3020f reader internal database.
With a large internal database the S3020f reader holds up to 100,000 card/fingerprint records and
can store up to 8,000 transactions offline.
The S3020f features a reader ‘Occupancy Mode’ that allows a head count of individuals in a
defined area. This prevents card sharing and provides the ability to do spot checks on a set group
of people in a particular zone. For example, patrolling checks can be performed on workers coming
into construction sites on buses to ensure that all passengers have authorised access.
Safe Passage Awarded Contract to Develop Training for the Rapiscan Secure 1000
Safe Passage International, Inc. has announced an award from Rapiscan Systems to design, develop, and deliver training for the Secure 1000
Body Scanner. The training will support the United States Transportation Security Administration’s (TSA) deployment of the Secure 1000 systems
to U.S. airports in 2010. The training will be delivered using a blended approach with operator training conducted in a classroom setting and image
interpretation taught using a computer-based simulator.
“We are very happy to receive this award,” said Michael Rooksby, Chief Operating Officer, Safe Passage International. “We have been working
closely with Rapiscan and TSA over the last year to ensure the Secure 1000 received TSA certification and the resulting deployment. We are excited
to continue supporting both Rapiscan and TSA as they test, certify, and deploy new and emerging technologies to make our airports safe.”
58 Register now for FREE instant access to ASI online by visiting www.asi-mag.com February 2010 Aviationsecurityinternational
Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70