Landside and Terminal Security System Design Planning

Introduction

Security at the airport is a key factor to consider in all airports. It is important for effective and tight security systems to be put in place. Security can either be construction security or that security enhanced by the management for people to be free and safe while at the airport. It is important for any building or construction at the airport to have a strong foundation, good ventilation, non slippery floor, roofs that not leaking, spacious rooms, among other things.

All airports should ensure people’s safety and everything that belongs to them is observed and taken care of. There are so many people who use the airport; employees, passengers, their friends and families, visitors, etc. This therefore makes it a place that is vulnerable to attacks. Because of its large population with people from all over the world, attackers such as suicide bombers, would easily attack such places. Security in airports includes that of their neighborhood and surrounding buildings (New York City Police Department).

Comparison of two primary considerations, the aviation security viewpoint of both landside and terminal security system design planning.

Aviation security is one of the key points to be considered when constructing an airport. When putting up perimeter walls, one should ensure that they are far from any building. This will help to reduce blasts. When putting up an airport, it is important to consider its location. The proximity of the facility as compared to the area of mass population and sensitive sites can affect the security posture. An example of sensitive site could be military sites or nuclear and chemical plants. The distance, from the airport, to such sites will be a determinant on the reaction in case of an event. The greater the distance, the longer the response will be from the time of occurrence of the event (New York City Police Department).

Airport runways determine the aviation security viewpoints. Airports that have long and wide runways will accommodate both small and large planes thus the security conscience is higher. The third aviation security viewpoint would be determined by operations. The number of operations conducted at the airport is a determinant of security approaches. The higher the number of operations conducted in an airport, the tighter the enforcement of security. However, if the airport has a high level of different operations taking place, it could be a target for attacks, for example bombings.

Access points in airports should be well manned. Access points through walls or boundaries should be controlled so as to prevent unauthorized persons from accessing such points. For both cost efficiency and security, access points in airports should be authorized. Gates should be properly constructed and well fitting. All gates should be able to close automatically and they should be well lit. For vehicle access, limiting the size of the opening helps in increasing the security. Gate keepers should have detectives that can detect weapons, drugs, and other illegal goods that could be smuggled in the airport (New York City Police Department)

The terminal security system should be well equipped and have sufficient personnel monitoring the activities taking place. Passengers and visitors should be treated with respect. However, thorough check should be done to them. This however depends with the point at which each terminal has been placed. For example the waving bay terminus will be have a more sensitive search and check as compared to the vehicle terminus. The departure terminus and waiting bay will also have a strict check as compared to the parking lot entrance. This is because attackers and terrorists target sensitive areas such as the departure and waiting area.

Security tries to prevent crimes in the airport such as theft, kidnappings, murders, among other attacks. Security also assures people that the means by which they are travelling with are safe. In most airports, one must pass through several checks before getting into the main holding area. Different check points check different illegal commodities so as to prevent them from being smuggled in the airport. Thus, one the strongest department at the airport is the security department. It should be corruption free. Most security systems in airports are run by several security companies. Some airports perform screening which detects not only illegal possessions but threats too. It is therefore important for anyone who is going to the airport to know the rules of that airport.

Terminal security systems should have strong and effective gadgets. Due to the fact that people hide illegal goods by swallowing, for example drugs, it is important for security officials and airport managers to ensure that they purchase effective detecting machines. Most illegal goods are smuggled in the country through ports such as airports.

Many terminals are very vulnerable to the threat of improvised explosive devices (IEDs) and vehicle-borne improvised explosive devices (VBIEDs). As an aviation security consultant, suggest three means for mitigating the risks.

One of the most targeted areas by terrorists is airports. Due to these attacks, there is a National Aviation Security Policy that governs every terminal. It was set up to try to solve the bombings in airports. A comprehensive National security policy has been set up that comes up with policies and strategies for aviation security. Developing a National strategy for aviation security and addressing threats helps in controlling attacks.

One way of mitigating the risks is having an identification system. Some airports may opt to consider putting up an identification system that helps identify their employees and authorized visitors. There are different kinds of identification systems. One of the systems is a simple laminated identification card. This card contains an individual’s photograph. It is a swipe card that has data in it. For this identification card system, it should have some of the following information on it: a person’s image, their full names, the name of the airport and employer, an identification code that is unique, the privileges of the individual and access points and a clear expiry date. With all this information, it will be easier to identify an unauthorized person (Transport Security Administration).

The identification system could also include vehicle identification system. Airport personnel and law enhancement officers in the airport are assisted by this system to recognize unauthorized vehicles. Use of stickers, decals, or tags could be used for vehicle identification.

Decals on vehicles should not be removed with ease. This is important so as to prevent them from being transferred from one vehicle to another. Access authorization should be indicated on the security systems so as to identify the appropriate places for access (Department of Homeland Security). This could be through color coding or numbering. It is also important for the issuing authorities to make current stickers and decals different from expired ones. Decals application forms should contain the holder’s information so that in case of an emergency they can be contacted easily.

Use of surveillance is the second way that could be used to mitigate the risk of explosives. Surveillance can also be an ‘airport community watch’ program and surveillance cameras. Those who monitor the airport with the surveillance cameras are familiar with most of the employees and will be quick to note new faces. They will also easily note unfamiliar activities taking place. This device is correctly utilized to notice unauthorized and illegal activities taking place in the airport. An airport watch program should include coordinating the surveillance with the entire airport’s stakeholders, for example pilots, airport’s officials, and other users such as visitors (Transport Security Administration).

It is an added advantage if training was done so as to show how to recognize suspicious activities and how to respond. This training can be conducted to cover general areas in airport security. Surveillance is one of the best methods used to detect illegal activities taking place at the airport or unauthorized persons accessing unauthorized places. They should be placed in places that are not suspicious to the other people, and a place where it can effectively monitor activities taking place at the airport and the surrounding. It is of importance to have several surveillance points incase one breaks down.

The third way of mitigating risks is the use of security procedures and communication. Security procedures may serve better when written. They are mostly used by airport managers and operators. The security initiatives should be formalized into a documented program. This is because the documentation provides managers with a program that ensures employees understand the security issues (Department of Homeland Security).

The airport operator should limit the access of security procedures because they may contain information that is sensitive. Developing a threat communication list is important and recommended in any airport security procedure. All authorized people should get a copy that should contain the contacts of landing facility operator, landing facility manager and those whose responsibility is to facilitate security, and any other authorized person or organization. When there is effective communication on security matters, it will be easier to monitor any unauthorized persons, goods or vehicles coming in the airport and quick response taking place. New security officials, security policies and procedures should also be included in the communication process.

Conclusion

Security enhancement at the airport is assessed by considering the elements that make one airport different from the others. One of the most dangerous and risky place is the airport, yet it is the most effective and important modes of transportation for long distances. The airport is the most targeted area by terrorists, suicide bombers, drug traffickers and other criminals such as robbers. There are many different activities taking place at the airport which attract all kinds of people.

Airports, especially international airports, have people from all over the world. Thus, it is important to tighten security at the airports. It is also important to ensure that the surrounding environment of the airport does not pose any dangers or insecurities. Airport managers and security officials should ensure that all users of the airport are secure. Security men should have adequate knowledge and training on how to deal with emergencies in case they come up. Sometimes having policemen at the airports could help to in enforcing law and order.

Reference List

Department of Homeland Security (2011). Aviation Security Policy. Web.

New York City Police Department (2009). Guidelines on perimeter security: Protective Design for High Risk Buildings (Chap.3). Web.

Transport Security Administration (2004). Security Guidelines for General Aviation Airports (Ver.1). Web.

Cite this paper

Select style

Reference

StudyCorgi. (2022, April 22). Landside and Terminal Security System Design Planning. https://studycorgi.com/landside-and-terminal-security-system-design-planning/

Work Cited

"Landside and Terminal Security System Design Planning." StudyCorgi, 22 Apr. 2022, studycorgi.com/landside-and-terminal-security-system-design-planning/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Landside and Terminal Security System Design Planning'. 22 April.

1. StudyCorgi. "Landside and Terminal Security System Design Planning." April 22, 2022. https://studycorgi.com/landside-and-terminal-security-system-design-planning/.


Bibliography


StudyCorgi. "Landside and Terminal Security System Design Planning." April 22, 2022. https://studycorgi.com/landside-and-terminal-security-system-design-planning/.

References

StudyCorgi. 2022. "Landside and Terminal Security System Design Planning." April 22, 2022. https://studycorgi.com/landside-and-terminal-security-system-design-planning/.

This paper, “Landside and Terminal Security System Design Planning”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.