SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
IP UtiliNET Airport Solution Brief




                                                                       6825 Shiloh Rd E, STE-B-7
                                                                            Alpharetta, GA 30005
                                                                                    404.513.3283
                                                                            www.IPUtiliNET.com

                                                                  A US Veteran Owned Business




                                                                    Secure Concourse




                                                    By David Quinn, Managing Director

        You are not an airport employee, you do not work for the airport, and you are not a
        foodservice vendor or other vendor equipped with a badge that provides identity to the
        TSA. You may be Henry Kissinger, who like you or any other American Citizen is a
        suspect until proven otherwise. You are ever vigilant, a veteran, a law enforcement
        official, sworn to protect, yet to the TSA you might as well be holding a loaded rifle.
        Plainly put, what the average citizen endures in the name of security is simply an
        inexcusable lapse in identity management.


  5/23/2012                                                                 ©2010 IP UtiliNET LLC
Contents
                                                 There are individuals in the world that will
Introduction                             3
                                                 violate life, liberty, and the pursuit of the
The AS-IS Process                        3       next precious breath …for an ideal.
Suspects, Until Otherwise Proven         4
Concourses – Real and Present Threats 5
Risk Assessment - High                   7
Define the Problem, Act to Resolve It    7
Getting Started                         10
Continuous Improvement                  11
About the Author                        12




                                                 Airport and Security officers are forced into
                                                 action reactively while terrorists are
                                                 proactive, always planning, always trying
                                                 new and innovative ways to kill and maim
                                                 innocent civilian targets – this is proven by
                                                 planes used as missiles, planes with cargo
                                                 bombs (Pan-Am), liquid explosives, shoe
                                                 and underwear bombs, toner cartridge
                                                 bombs and a host of other past and future
                                                 attempts, each one seeking holes in the
                                                 system, each one creating maximum press
                                                 exposure. The US Government reacts
                                                 defensively and implements policies to
                                                 counter these threats. This is a result of;

                                                     A. Management of Public Perception
                                                     B. Defensive Posture & Tools
                                                     C. Standards based Defensive Approach
                                                     D. Lack of Information Continuity
                                                     E. Lack of Passenger Presence
                                                        Awareness
                                                     F. No Process Optimization




    5/23/2012                                2   ©2012 All Rights Reserved, IP UtiliNET LLC
Introduction

     This brief provides a solution that leads to increased security and higher levels of
     systemic benefit for the Traveling Public, the TSA, and Airport Operators. This
     discussion is an American discussion about security that is acceptable to the traveling
     public versus an overly expensive and vast police action that uses strong-arm tactics to
     intimidate the average person. IP UtiliNET seeks to support Department of Homeland
     Security, TSA, and US Government in all efforts to protect the nations critical airports
     infrastructure and offers a path that reduces the current defensive posture. This briefing
     document is intended for public consumption as it contemplates just one of many
     potential scenarios that can occur at any one of the thousands of global airports.. This
     document points to a potential scenario or combination of events that if applied could
     disrupt passenger travel for days or months and undermine the trust and confidence of the
     flying public, it is not intended to be a threat or anything close to that. There is no ability
     to plan for terrorist innovation, there is only heightened traveler awareness, counter-
     offensive reaction to these events, and further removal of personal liberties for the
     purpose of assurance. This paper offers a solution that, by design is intended to converge
     current disparate parts and lack of identity capability into an intelligent framework. The
     Airport Entry Management System (AEMS) improves airport security while delivering
     increased operational efficiency at reduced cost. TSA will improve intelligence and be
     more prepared to react quickly in the event of the type of attack described in this
     document, and other attacks at any one of the 3300 NPIAS “watchlist” or foreign
     airports.


     The AS-IS Process

     TSA has interjected a classic defensive perimeter at a significant number of US and
     foreign airports. The perimeter takes a typical 3 tier approach and consists of; Tier 1 in
     which a live TSA agent obtains a mobile or paper boarding pass from an individual
                                                                        traveler and compares it
                                                                        to another form of
                                                                        identification. With Tier
                                                                        1 approval, the
                                                                        passenger is then
                                                                        allowed to proceed to
                                                                        Tier 2 where baggage
                                                                        and certain personal
     items are separated and human and baggage are scanned. If an anomaly occurs at the
     scanner, the person or bag is detained and further searches and questioning occurs – Tier
     3. Employees and Contractors are “known” entities and current requirements allow for
     badge and pin-code entry at the airport. This process separates the landside and terminal
     from the airside concourse and creates a defensive barrier to the unknown landside
     environments.


11/22/2010                                          3                        ©2010 IP UtiliNET LLC
Suspects, Until Otherwise Proven

Airport Security is a tough business. Threats can come from any direction and there is no
way to guarantee absolute safety for the traveling public. Measures to counter proven
threats must be taken, but to what end? Bombers that exit on a layover, trained pilots
flying airplanes into buildings, liquid bombs in shampoo bottles, underwear bombers,
shoe bombers, PETN in toner cartridges … what next? A skullcap bomber, a prosthetic
bomber, liquid explosives in a colostomy bag, can bombs in the food service trolley, ….
there is no end to the possibilities. With physical security, especially the type that is
implemented today, all passengers and law enforcement travelers are subjected to
increasing levels of scrutiny. All passengers and even law enforcement personnel that
transport prisoners are assumed to be guilty and treated as suspects until otherwise
proven. Airport, Airline, and Vendor services personnel are “known”. As employees they
are deemed to be “not guilty” at least until one of them becomes part of an attack on
airport infrastructure.

The airports security methods that are employed today are defensive in nature to include
the scanners that remove clothing. When something is detected or a passenger opts out it
leads to a more intrusive physical “pat-down” which the public is now objecting to.
Because there is a lack of presence awareness and a lack of concern for wait times as a
result of the security processes, the flying public is subjected to a “search and seizure”
approach that
discriminates from
treatments afforded to
TSA and other members
of airport, airline, and
contractor staff. US
Citizens and travelers
entering US Airport
systems en masse are
profiled as suspects until TSA owned airport security approves concourse access.

For those with intent to harm, the opportunity to do so at any one of the top 30 airports is
only a paper ticket or a commuter flight away – where security is not as intensive. At
some point, those with intent will realize this gap, make an attempt, and cause a
reactionary expenditure that dwarfs the existing equipment and manpower expense. The
dilemma is that security at primary, secondary, and reliever airports must continue to
increase because the “bad” people in our world are continuing to test and attack the
system externally as well as internally. They will and are targeting employees and
encouraging their supporters to gain employment in the airport systems. They are
seeking a trusted relationship that will lead to further attacks. When that happens, will the
answer be to shut down the entire system?



5/23/2012                               4    ©2012 All Rights Reserved, IP UtiliNET LLC
Concourses – Real and Present Threats

The following simple scenario is but one of the many potential risks that airports face
today. It is submitted as an observation only and is intended to establish dialogue that can
lead to systemic improvements in data continuity, improved intelligence, and security.

It is no secret that paper boarding passes can be captured, modified, and reprinted. With
enough time and effort, any paper boarding pass can be modified to match the date of
entry while maintaining or modifying the identity of the person carrying the boarding
pass. In the scenario below, the paper boarding passes are modified and used to gain
entry to the landside environment, and are complemented by mobile and paper boarding
passes that link to actual flights.

As terrorists learn more about airport operations, and gain access to the airside
environment through employees there will come a time when a large airport will be
attacked. It will come from the inside and it will happen using multiple resources.

The scenario unfolds simply. Boarding passes are obtained and copies are sent to a
forger or each of the attackers are provided
instructions to make modifications to a paper
boarding pass. Modifications can include
name, date and other information on the paper
boarding pass. The terror organization has
placed 2-3 employees at airline, airport, or
contracted service positions. They do not
know each other and 1 will be selected for this
mission. Boarding passes, strike date, and time are coordinated via hardcopy (not e-mail).
Planning occurs months in advance.

Once dates are set, two orders are placed:
http://buyaes.com/catalog/product_info.php?products_id=2162 rechargeable spray can
and http://www.lurelogik.com/gear.html timer for spray can.

Atlanta has 6 concourses and 3 security entry points, therefore, if Atlanta is the target 6
recruits that do not know each other and 1 employee are what will be needed. This is a
primary and a backup strategy with a timeline that supports fill-ins if needed. 3 of the 6
will enter the concourse through the TSA perimeter. The other 3 will arrive at the airport
on redeye flights.

3 forged paper boarding passes are for the landside attackers and each of the other 3 will
purchase redeye flights a month or so in advance.




5/23/2012                               5    ©2012 All Rights Reserved, IP UtiliNET LLC
The spray cans are obtained and filled with a liquid organophosphate such as Sarin. Once
filled, the cans are charged. The airport employee, who has been known to bring a
shoulder bag to work daily takes receipt of the cans early in the morning of the attack.
Placed into the bag, the employee goes through the normal routine and accesses the
airside environment via the standard employee process.

    Once inside the fenced, secure, airside environment, the employee enters the
    concourse through any number of available doors. The 3 landside entrants have
    passed through security and the other 3 have landed and had breakfast. Beginning at
    0900, the six meet the airport employee in pairs every 15 minutes – A, C, and E
        concourses. The meetings occur in the bathrooms that are south of the concourse
        entry point. Exchanges are made at the baby changing stations where it is normal
        to see people with open bags. All are recognized by a Bluetooth headset with a
        custom mark worn on the right ear.

         The pairs break off and at 10AM set their cans to operate from bathroom stalls
         beginning at 1015. Timers are set to release 1-3 second blasts every minute. The
         cans and timers are wiped down to remove fingerprints. The doors to the stalls
         are locked by each terrorist who crawls out from under the door.

         The terrorists exit the airport using the normal exit process. The airport employee
         has a hectic day as people begin to get sick in all airport terminals. It takes 45
         minutes from the originating time to begin a full airport evacuation. The airport
         is shut down as panicked people evacuate the airport from all available exits.

         The attackers exited the airport as the first blasts begin and same day, three of
         the group drive in one direction, the other three in another direction, or flights
         that leave at 10:15 are in place for three or four of the attackers. These attackers
         are headed to the next airport where the process will be repeated at another
         airport, later in the week, later in the month, or in time for second shift.

         The papers would later report that a coordinated attack occurred at airport/s in
which several people were severely affected. This was due to a lack of disaster planning
for concourse environments and a lack of data continuity that led to a breech in
intelligence, ineffective and unproven local evacuation methods and controls, and lack of
coordinated agency responses. Airport services would be disrupted for weeks if not
months.

This is a scary scenario and is not intended to be a threat. It is an observation that is based
on several years of working in and around airports. While an attack from within is the
most difficult to thwart, the security problem can be reduced with good information
management.



5/23/2012                                6    ©2012 All Rights Reserved, IP UtiliNET LLC
Risk Assessment - High
Airline, Airport, and Service Contractor employee with a RAMP badge and pin can enter
the concourse using only an employee id. Airline, Airport, and Contractor employees
entering from off-site parking or through entry gates can gain access to the concourse,
fuel depots, aircraft and other airport elements – typically without passing through the
scanning process. Several of the employees carry shoulder bags, lunch boxes, etc. on a
daily basis and these items do not normally go through scanners of any type. Airline
equipment such as trucks and buses routinely leave the fenced airside area of the airport
thereby providing ample opportunities for the introduction of any types of harmful
technologies. All packages that enter the airfield and concourse environment should be
scanned or inspected prior to entry. Airside employees and contractors that enter the
concourse with personal baggage should be required to submit to a secondary search
prior to entry. The secondary search should be conducted in full view of a surveillance
system.

Define the Problem, Act to Resolve It

TSA has implemented a set of physical controls that supplant the ability to identify the
individual passengers as they are passing through the security perimeters. Passengers, to
include law enforcement transporting prisoners, are unknowns to TSA and this occurs as
a direct result of a lack of integrated process and airline/airport business systems. This
leads to inadequate and ineffective intelligence. The model below illustrates the security
processes in alignment with the business processes. It illustrates the intelligence gaps
that create the need to implement increased physical security measures. Until these gaps
are resolved and data continuity contributes to intelligence efforts, the physical security
measures and related manpower expenses will only increase.




5/23/2012                               7    ©2012 All Rights Reserved, IP UtiliNET LLC
Securing the concourse requires alignment between business process and the underlying
systems architecture.

                          IP UtiliNET offers the Airport Entry Management System or
                          AEMS. There are three subset elements;

                             1. Passenger Identity Management System (PIMS)
                             2. Aviation Worker Identity System (AWIS)
                             3. Accompanied Transport Identity System (ATIS)

AEMS is intended to scale beyond the existing 3 tier perimeter and is designed to
incorporate domestic positive passenger bag match. Each one of the subset elements has
different connectivity, integration, security, and registration requirements. The
application and underlying systems are common and the software can use certain
deployed video cameras. Extending the first perimeter to entry doors, kiosks, and
ticketing counters - even public transportation – is a matter of gaining agreement with the
airport authority to extend the capabilities of the Operational Services Network.

For entry points, IP UtiliNET offers a smart electronic device that is
packaged for single entry points, multiple entry points, tabletop,
tablestand, and pedestal. This “platforming” approach reduces
management cost and deployment headaches while allowing for multiple
use cases. The software that drives the camera and facial biometric
decode is the same whether it is used in this fixed form factor, a mobile
form factor, or deployed and operating in passive mode as a component
of the surveillance system.

The Passenger Identity Management system is the recommended starting point. With this
technology, pedestals can be deployed in place of the first perimeter TSA agent.
Passengers who desire to be treated in a similar manner to airport employees could enroll
in the system prior to entering the security line. At the first perimeter, the passenger
would scan their electronic or paper boarding pass and could enter a pin that is unique to
them. The boarding pass validation would coincide with a facial biometric scan in which
the customer name is matched to the ticket and pin and the face is validated. If the system
could not find the individual, it would prompt for a secondary form of identification such
as a license or passport. If the passport or license data match the paper or electronic
boarding pass and the person is not enrolled, they would be involuntarily enrolled in the
security management system for the next 12 hours. The system ties back to the airline
reservation system ( identified ), and to the Baggage Reconciliation System (identified)
which provides the positive passenger bag match.




5/23/2012                              8     ©2012 All Rights Reserved, IP UtiliNET LLC
Various discussions as they relate to multi-modal biometrics have been undertaken over
the years with the most recent being iris scans. Of the three modalities; fingerprint, facial,
and iris, iris is now getting the most press.

Fingerprint is typically rejected by the traveling public as they are associated with
criminal work and a question exists as to who and how the database is managed. What is
needed is fingerprint as a validating factor – deployed at Tier 3 – when a persons identity
is questionable. Using mobile or fixed devices, after establishing probable cause, the
fingerprint could be scanned and sent to the AFIS system in the state, the terrorist watch
list, the 16 databases that make up NCIC and Interpol. IP UtiliNET Engineered Access
Control Systems are based on a platform approach and includes fixed and mobile
technologies.

IRIS can be associated with health. Take the example of a former CIA employee,
Angelique, that could not pass the IRIS scanners on the way into work one day. At the
entry point, the scanners did not allow her to pass because something health-wise had
changed and it was reflected in the backs of her eyeballs. The IRIS scanners could not
identify the reason for the change, only that a change had occurred. Later that day, she
discovered that she was pregnant. The last thing anyone or any business will want is non-
specified health related information being passed to insurance companies for risk based
adjustments.

Everyone has a face and facial biometrics is the only technology that is effective at entry
choke points, airplane gates, and as a passive system operating unobtrusively behind
existing surveillance systems. Facial biometrics that are 2D or 3D have proven to be all
but useless as they attempt to use computational capabilities to replicate the way that the
eye and the “fusiform” part of the brain work. Computers “think” in numbers which is
not the way the human brain processes images.

                                                            What is needed, and what is
                                                            available and proven with
                                                            existing installations at the VA
                                                            and other state/local customers
                                                            for many years is Fusitronic
                                                            Facial Biometrics.

                                                            Fusitronic facial biometric
systems that are coupled with integrated airline passenger management offer increased
levels of passenger intelligence, process automation and airport security. Offered as an
Airport Entry Management System (AEMS) it will provide TSA with improved
operational intelligence, less invasive security, reduced cost of operations, and better
response capabilities.



5/23/2012                                9    ©2012 All Rights Reserved, IP UtiliNET LLC
A properly integrated facial biometric system will unify ticketing with identity
management and assist TSA and local law enforcement with criminal identification. It
will also unify employee access while offering the capability to constantly cross check
current law enforcement status. When a passenger ticket can not be matched to a facial
identity the suspect identity can be confirmed using tertiary tools such as license,
passport, fingerprint, and direct questioning.

The facial biometric software is passive and capable of complementing existing
surveillance systems. Using this function the database is constantly updated with last
known location for individuals. When law enforcement is seeking an individual, the
system goes into trakker mode where it originates from the last known location and
intelligently searches from that location outwardly to the furthest points on the network.
Once trakker locates, it alerts and hands off to the surveillance system for recording
purposes. It is critical to note that this is not a surveillance toolset, it is a Presence
Awareness toolset. Presence Awareness is concerned about the “who” not the “what” that
is currently occurring in front of a camera system.


Getting Started

IP UtiliNET has the available technology and relevant experience with company owned
credentialing and facial biometric systems. The company has created a framework and
recommended integration capability for business processes that affect and unify the
information services for passengers, law enforcement, and aviation workers. The
company has significant experience in airport passenger management and baggage
systems. The solution and recommended approach include a capability to integrate a
domestic positive passenger bag match solution that will add benefit to the industry and
                                                           the traveling public. A service
                                                             bureau approach is required
                                                             and IP UtiliNET is in a
                                                             position to undergo security
                                                             clearance approval, led by
                                                             the founder, a US NAVY
                                                             Submarine Service Veteran.
                                                             Additionally, the company
                                                             has a relationship with a
                                                             break/fix services provider
                                                             that supports airports in 130
                                                             countries today. In order to
                                                             move forward, funding will
                                                             be required.




5/23/2012                              10      ©2012 All Rights Reserved, IP UtiliNET LLC
Continuous Improvement

                  IP UtiliNET offers LANvisn™ connectivity solutions for airport
                  environments. It is based on industry recognized standards and delivers
the industries first, truly non-fragmented network architecture. This unifies the security
and surveillance environment. HUBvisn, based on the AXS1800 platform is a 25 terabit
platform with entirely passive distribution capabilities over a 20 KM radius (12.4 Miles).
A single chassis supports more than 7,000 active end point devices and can scale in a
non-fragmented, grid fashion to 50 chassis using a single control and management
platform. It is the optimal solution for Command and Control Centers and for airport
security environments. It is more secure and cost effective than existing structured
cabling systems. With this technology, all manner of connected security elements –
throughout the airport campus - become possible – at reduced up front and long-term
costs reductions that increase as the number of end-point connections increase.

The network is a transport method for data that is collected at the edge and managed at
the core. The biometric software operates on the device, on distributed appliances, or on a
centralized appliance. The application that manages the core is an intelligent, multi-tenant
software framework that connects to other systems via it’s intelligent connectors. It is
specific to the task at hand, airport security, and can be configured to support client
specific edge functionality and supports zoning. As a client specific technology, TSA can
use it to improve relationships with passengers and airports that are served, and airports
can use it to implement loyalty programs that do not yet exist. From a TSA perspective,
the first perimeter can be pushed to the entry doors and ticketing stations. If TSA
chooses, the system can be pushed to public vehicles that frequent the airport. This
functionality will allow the TSA and first responder team to incorporate inbound
intelligent traffic management and outbound coordination of evacuation resources on an
as needed basis. It is scalable, inherently configurable, and capable of migrating physical
security to environmental intelligence and well coordinated first responder capability.

 IP UtiliNET launched “IP UtiliSAFE” in January 2011. This
unique offering is available uniquely with a LANvisn™ network.
UtiliSAFE grants the ability of licensed first responders to
immediately access selected elements such as video cameras via a
private, dedicated, licensed path. An “IP UtiliSAFE” airport
campus network is a significant strategic benefit to first responders.
It includes any number of optional triggers - an analytic system,
shot detectors, a concourse or desktop 911 call … If any of these
triggers occur, the licensed path is automatically opened and immediate priority access to
video resources, controlled doorways, etc, is granted – even when the power is out. This
feature is embedded in the daily operating system for the security network.




5/23/2012                               11      ©2012 All Rights Reserved, IP UtiliNET LLC
About the Author

Mr. Quinn is the founder of IP UtiliNET and is a US NAVY Veteran. He has coupled his
military systems training, to include battle planning and systemics with advanced degrees
in business and computer technology /robotics. In industry, he has consistently applied
his education and work experience to technology integration and business process
automation. He has spent most of the last six years assisting Delta Airlines in its efforts to
gain better control of the baggage management check-in, baggage handling and tracking,
and baggage security processes at airports. His work and support for Delta Airlines, as
reported publicly by its CEO in 2009, Richard Anderson, contributed to a 28%
performance improvement in year/year results. Mr. Quinn acted as a Sales Consultant for
Delta Airlines and participated in time studies, business process engineering, and
business process improvement specific to passenger process management, and baggage
management systems. Mr. Quinn and the Delta team were instrumental in driving
“incremental improvements” throughout the baggage management process and his vision
helped to shape a longer term strategy that will lead to automation. These innovations led
to improved passenger baggage services, induction efficiency, ramp efficiency, and
increased levels of security at baggage carousels. Mr. Quinn helped the Delta team
initiate the mobile barcode project with TSA. For a number of years at Motorola, Mr.
Quinn was responsible for the Air and Sea Ports Vertical Markets business. He is the
author of the Motorola solution brief entitled “21st Century Transportation Hubs
(see; www.motorola.com/ports). Mr. Quinn left Motorola in April 2010 and acquired the
facial biometrics technology and key resources that have led to the recent launch of the
most advanced and accurate facial biometrics solution available. Mr. Quinn continues to
serve the airports business while working to grow his Veteran-owned small business
enterprise.



For More Information, please contact:

David Quinn
dquinn@iputilinet.com
404.513.3283




5/23/2012                                12      ©2012 All Rights Reserved, IP UtiliNET LLC

Más contenido relacionado

Similar a Airport Entry Management Systems and Security

Annotated bib revised final
Annotated bib revised finalAnnotated bib revised final
Annotated bib revised finalbekahpars
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised finalbekahpars
 
Annotated bib
Annotated bibAnnotated bib
Annotated bibbekahpars
 
Annotated bib
Annotated bibAnnotated bib
Annotated bibbekahpars
 
JUST CULTURE IN AVIATION SAFETY MANAGEMENT (ASM)
JUST CULTURE IN AVIATION SAFETY MANAGEMENT (ASM)JUST CULTURE IN AVIATION SAFETY MANAGEMENT (ASM)
JUST CULTURE IN AVIATION SAFETY MANAGEMENT (ASM)DigitalPower
 
Writing Portfolio
Writing PortfolioWriting Portfolio
Writing Portfoliomaria khan
 
The Security Administration ( Tsa )
The Security Administration ( Tsa )The Security Administration ( Tsa )
The Security Administration ( Tsa )Kelley Hunter
 
Airport Security Essay
Airport Security EssayAirport Security Essay
Airport Security EssayBuy Essay .
 
TSA Airport Security
TSA Airport SecurityTSA Airport Security
TSA Airport SecurityJill Bell
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s NamMerrileeDelvalle969
 
Highlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive EstablishmentsHighlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive EstablishmentsNovoQuad
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyNovoQuad
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
 

Similar a Airport Entry Management Systems and Security (19)

403 8
403 8403 8
403 8
 
Annotated bib revised final
Annotated bib revised finalAnnotated bib revised final
Annotated bib revised final
 
Eng 101 research paper revised final
Eng 101 research paper revised finalEng 101 research paper revised final
Eng 101 research paper revised final
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Annotated bib
Annotated bibAnnotated bib
Annotated bib
 
Annotated bib
Annotated bibAnnotated bib
Annotated bib
 
JUST CULTURE IN AVIATION SAFETY MANAGEMENT (ASM)
JUST CULTURE IN AVIATION SAFETY MANAGEMENT (ASM)JUST CULTURE IN AVIATION SAFETY MANAGEMENT (ASM)
JUST CULTURE IN AVIATION SAFETY MANAGEMENT (ASM)
 
Writing Portfolio
Writing PortfolioWriting Portfolio
Writing Portfolio
 
The Security Administration ( Tsa )
The Security Administration ( Tsa )The Security Administration ( Tsa )
The Security Administration ( Tsa )
 
Malaysia airlines flight MH17 impact on travel management
Malaysia airlines flight MH17 impact on travel managementMalaysia airlines flight MH17 impact on travel management
Malaysia airlines flight MH17 impact on travel management
 
Airport Security Essay
Airport Security EssayAirport Security Essay
Airport Security Essay
 
Airport Security Essay
Airport Security EssayAirport Security Essay
Airport Security Essay
 
TSA Airport Security
TSA Airport SecurityTSA Airport Security
TSA Airport Security
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam
 
Highlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive EstablishmentsHighlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive Establishments
 
Ethics IV.pptx
Ethics IV.pptxEthics IV.pptx
Ethics IV.pptx
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public Safety
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 

Más de Mestizo Enterprises

Victory AG Sustainable and Healthy Foods
Victory AG Sustainable and Healthy FoodsVictory AG Sustainable and Healthy Foods
Victory AG Sustainable and Healthy FoodsMestizo Enterprises
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 
AGEOS Automated Infrastructure Consulting and Services Solution
AGEOS Automated Infrastructure Consulting and Services SolutionAGEOS Automated Infrastructure Consulting and Services Solution
AGEOS Automated Infrastructure Consulting and Services SolutionMestizo Enterprises
 
The Only Proven Quantum Resistant Data Encryption Solution
The Only Proven Quantum Resistant Data Encryption SolutionThe Only Proven Quantum Resistant Data Encryption Solution
The Only Proven Quantum Resistant Data Encryption SolutionMestizo Enterprises
 
IP UtiliNET showcase at Club E V5 2023 update.pdf
IP UtiliNET showcase at Club E V5 2023 update.pdfIP UtiliNET showcase at Club E V5 2023 update.pdf
IP UtiliNET showcase at Club E V5 2023 update.pdfMestizo Enterprises
 
Infrastructure Solutions for Commercial Properties and Developers
Infrastructure Solutions for Commercial Properties and DevelopersInfrastructure Solutions for Commercial Properties and Developers
Infrastructure Solutions for Commercial Properties and DevelopersMestizo Enterprises
 
Healthcare Infrastructure Solutions that Deliver Dramatic Savings
Healthcare Infrastructure Solutions that Deliver Dramatic SavingsHealthcare Infrastructure Solutions that Deliver Dramatic Savings
Healthcare Infrastructure Solutions that Deliver Dramatic SavingsMestizo Enterprises
 
Bell Building Commercial Renovation 5 Months, 5,000 square feet
Bell Building Commercial Renovation 5 Months, 5,000 square feetBell Building Commercial Renovation 5 Months, 5,000 square feet
Bell Building Commercial Renovation 5 Months, 5,000 square feetMestizo Enterprises
 
Park Place Optical LAN Case Study
Park Place Optical LAN Case StudyPark Place Optical LAN Case Study
Park Place Optical LAN Case StudyMestizo Enterprises
 
Case Study Restaurant reduces energy use and doubles revenue
Case Study Restaurant reduces energy use and doubles revenueCase Study Restaurant reduces energy use and doubles revenue
Case Study Restaurant reduces energy use and doubles revenueMestizo Enterprises
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation HubsMestizo Enterprises
 
GPON Basics, Simply More Sustainable
GPON Basics, Simply More SustainableGPON Basics, Simply More Sustainable
GPON Basics, Simply More SustainableMestizo Enterprises
 

Más de Mestizo Enterprises (20)

Victory AG Sustainable and Healthy Foods
Victory AG Sustainable and Healthy FoodsVictory AG Sustainable and Healthy Foods
Victory AG Sustainable and Healthy Foods
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
AGEOS Automated Infrastructure Consulting and Services Solution
AGEOS Automated Infrastructure Consulting and Services SolutionAGEOS Automated Infrastructure Consulting and Services Solution
AGEOS Automated Infrastructure Consulting and Services Solution
 
The Only Proven Quantum Resistant Data Encryption Solution
The Only Proven Quantum Resistant Data Encryption SolutionThe Only Proven Quantum Resistant Data Encryption Solution
The Only Proven Quantum Resistant Data Encryption Solution
 
IP UtiliNET showcase at Club E V5 2023 update.pdf
IP UtiliNET showcase at Club E V5 2023 update.pdfIP UtiliNET showcase at Club E V5 2023 update.pdf
IP UtiliNET showcase at Club E V5 2023 update.pdf
 
Smart village vfb 111621
Smart village vfb 111621Smart village vfb 111621
Smart village vfb 111621
 
Infrastructure Solutions for Commercial Properties and Developers
Infrastructure Solutions for Commercial Properties and DevelopersInfrastructure Solutions for Commercial Properties and Developers
Infrastructure Solutions for Commercial Properties and Developers
 
Healthcare Infrastructure Solutions that Deliver Dramatic Savings
Healthcare Infrastructure Solutions that Deliver Dramatic SavingsHealthcare Infrastructure Solutions that Deliver Dramatic Savings
Healthcare Infrastructure Solutions that Deliver Dramatic Savings
 
What Makes More Cents?
What Makes More Cents? What Makes More Cents?
What Makes More Cents?
 
Custom Canopy Light
Custom Canopy LightCustom Canopy Light
Custom Canopy Light
 
Bell Building Commercial Renovation 5 Months, 5,000 square feet
Bell Building Commercial Renovation 5 Months, 5,000 square feetBell Building Commercial Renovation 5 Months, 5,000 square feet
Bell Building Commercial Renovation 5 Months, 5,000 square feet
 
Park Place Optical LAN Case Study
Park Place Optical LAN Case StudyPark Place Optical LAN Case Study
Park Place Optical LAN Case Study
 
CMOS Data Sheet
CMOS Data SheetCMOS Data Sheet
CMOS Data Sheet
 
Case Study Restaurant reduces energy use and doubles revenue
Case Study Restaurant reduces energy use and doubles revenueCase Study Restaurant reduces energy use and doubles revenue
Case Study Restaurant reduces energy use and doubles revenue
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 
LED Tubes and Smart Fixtures
LED Tubes and Smart FixturesLED Tubes and Smart Fixtures
LED Tubes and Smart Fixtures
 
LED Bulb Replacement
LED Bulb ReplacementLED Bulb Replacement
LED Bulb Replacement
 
LED vs Fluorescent Lamps
LED vs Fluorescent LampsLED vs Fluorescent Lamps
LED vs Fluorescent Lamps
 
GPON Basics, Simply More Sustainable
GPON Basics, Simply More SustainableGPON Basics, Simply More Sustainable
GPON Basics, Simply More Sustainable
 
GPON Primer
GPON PrimerGPON Primer
GPON Primer
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Airport Entry Management Systems and Security

  • 1. IP UtiliNET Airport Solution Brief 6825 Shiloh Rd E, STE-B-7 Alpharetta, GA 30005 404.513.3283 www.IPUtiliNET.com A US Veteran Owned Business Secure Concourse By David Quinn, Managing Director You are not an airport employee, you do not work for the airport, and you are not a foodservice vendor or other vendor equipped with a badge that provides identity to the TSA. You may be Henry Kissinger, who like you or any other American Citizen is a suspect until proven otherwise. You are ever vigilant, a veteran, a law enforcement official, sworn to protect, yet to the TSA you might as well be holding a loaded rifle. Plainly put, what the average citizen endures in the name of security is simply an inexcusable lapse in identity management. 5/23/2012 ©2010 IP UtiliNET LLC
  • 2. Contents There are individuals in the world that will Introduction 3 violate life, liberty, and the pursuit of the The AS-IS Process 3 next precious breath …for an ideal. Suspects, Until Otherwise Proven 4 Concourses – Real and Present Threats 5 Risk Assessment - High 7 Define the Problem, Act to Resolve It 7 Getting Started 10 Continuous Improvement 11 About the Author 12 Airport and Security officers are forced into action reactively while terrorists are proactive, always planning, always trying new and innovative ways to kill and maim innocent civilian targets – this is proven by planes used as missiles, planes with cargo bombs (Pan-Am), liquid explosives, shoe and underwear bombs, toner cartridge bombs and a host of other past and future attempts, each one seeking holes in the system, each one creating maximum press exposure. The US Government reacts defensively and implements policies to counter these threats. This is a result of; A. Management of Public Perception B. Defensive Posture & Tools C. Standards based Defensive Approach D. Lack of Information Continuity E. Lack of Passenger Presence Awareness F. No Process Optimization 5/23/2012 2 ©2012 All Rights Reserved, IP UtiliNET LLC
  • 3. Introduction This brief provides a solution that leads to increased security and higher levels of systemic benefit for the Traveling Public, the TSA, and Airport Operators. This discussion is an American discussion about security that is acceptable to the traveling public versus an overly expensive and vast police action that uses strong-arm tactics to intimidate the average person. IP UtiliNET seeks to support Department of Homeland Security, TSA, and US Government in all efforts to protect the nations critical airports infrastructure and offers a path that reduces the current defensive posture. This briefing document is intended for public consumption as it contemplates just one of many potential scenarios that can occur at any one of the thousands of global airports.. This document points to a potential scenario or combination of events that if applied could disrupt passenger travel for days or months and undermine the trust and confidence of the flying public, it is not intended to be a threat or anything close to that. There is no ability to plan for terrorist innovation, there is only heightened traveler awareness, counter- offensive reaction to these events, and further removal of personal liberties for the purpose of assurance. This paper offers a solution that, by design is intended to converge current disparate parts and lack of identity capability into an intelligent framework. The Airport Entry Management System (AEMS) improves airport security while delivering increased operational efficiency at reduced cost. TSA will improve intelligence and be more prepared to react quickly in the event of the type of attack described in this document, and other attacks at any one of the 3300 NPIAS “watchlist” or foreign airports. The AS-IS Process TSA has interjected a classic defensive perimeter at a significant number of US and foreign airports. The perimeter takes a typical 3 tier approach and consists of; Tier 1 in which a live TSA agent obtains a mobile or paper boarding pass from an individual traveler and compares it to another form of identification. With Tier 1 approval, the passenger is then allowed to proceed to Tier 2 where baggage and certain personal items are separated and human and baggage are scanned. If an anomaly occurs at the scanner, the person or bag is detained and further searches and questioning occurs – Tier 3. Employees and Contractors are “known” entities and current requirements allow for badge and pin-code entry at the airport. This process separates the landside and terminal from the airside concourse and creates a defensive barrier to the unknown landside environments. 11/22/2010 3 ©2010 IP UtiliNET LLC
  • 4. Suspects, Until Otherwise Proven Airport Security is a tough business. Threats can come from any direction and there is no way to guarantee absolute safety for the traveling public. Measures to counter proven threats must be taken, but to what end? Bombers that exit on a layover, trained pilots flying airplanes into buildings, liquid bombs in shampoo bottles, underwear bombers, shoe bombers, PETN in toner cartridges … what next? A skullcap bomber, a prosthetic bomber, liquid explosives in a colostomy bag, can bombs in the food service trolley, …. there is no end to the possibilities. With physical security, especially the type that is implemented today, all passengers and law enforcement travelers are subjected to increasing levels of scrutiny. All passengers and even law enforcement personnel that transport prisoners are assumed to be guilty and treated as suspects until otherwise proven. Airport, Airline, and Vendor services personnel are “known”. As employees they are deemed to be “not guilty” at least until one of them becomes part of an attack on airport infrastructure. The airports security methods that are employed today are defensive in nature to include the scanners that remove clothing. When something is detected or a passenger opts out it leads to a more intrusive physical “pat-down” which the public is now objecting to. Because there is a lack of presence awareness and a lack of concern for wait times as a result of the security processes, the flying public is subjected to a “search and seizure” approach that discriminates from treatments afforded to TSA and other members of airport, airline, and contractor staff. US Citizens and travelers entering US Airport systems en masse are profiled as suspects until TSA owned airport security approves concourse access. For those with intent to harm, the opportunity to do so at any one of the top 30 airports is only a paper ticket or a commuter flight away – where security is not as intensive. At some point, those with intent will realize this gap, make an attempt, and cause a reactionary expenditure that dwarfs the existing equipment and manpower expense. The dilemma is that security at primary, secondary, and reliever airports must continue to increase because the “bad” people in our world are continuing to test and attack the system externally as well as internally. They will and are targeting employees and encouraging their supporters to gain employment in the airport systems. They are seeking a trusted relationship that will lead to further attacks. When that happens, will the answer be to shut down the entire system? 5/23/2012 4 ©2012 All Rights Reserved, IP UtiliNET LLC
  • 5. Concourses – Real and Present Threats The following simple scenario is but one of the many potential risks that airports face today. It is submitted as an observation only and is intended to establish dialogue that can lead to systemic improvements in data continuity, improved intelligence, and security. It is no secret that paper boarding passes can be captured, modified, and reprinted. With enough time and effort, any paper boarding pass can be modified to match the date of entry while maintaining or modifying the identity of the person carrying the boarding pass. In the scenario below, the paper boarding passes are modified and used to gain entry to the landside environment, and are complemented by mobile and paper boarding passes that link to actual flights. As terrorists learn more about airport operations, and gain access to the airside environment through employees there will come a time when a large airport will be attacked. It will come from the inside and it will happen using multiple resources. The scenario unfolds simply. Boarding passes are obtained and copies are sent to a forger or each of the attackers are provided instructions to make modifications to a paper boarding pass. Modifications can include name, date and other information on the paper boarding pass. The terror organization has placed 2-3 employees at airline, airport, or contracted service positions. They do not know each other and 1 will be selected for this mission. Boarding passes, strike date, and time are coordinated via hardcopy (not e-mail). Planning occurs months in advance. Once dates are set, two orders are placed: http://buyaes.com/catalog/product_info.php?products_id=2162 rechargeable spray can and http://www.lurelogik.com/gear.html timer for spray can. Atlanta has 6 concourses and 3 security entry points, therefore, if Atlanta is the target 6 recruits that do not know each other and 1 employee are what will be needed. This is a primary and a backup strategy with a timeline that supports fill-ins if needed. 3 of the 6 will enter the concourse through the TSA perimeter. The other 3 will arrive at the airport on redeye flights. 3 forged paper boarding passes are for the landside attackers and each of the other 3 will purchase redeye flights a month or so in advance. 5/23/2012 5 ©2012 All Rights Reserved, IP UtiliNET LLC
  • 6. The spray cans are obtained and filled with a liquid organophosphate such as Sarin. Once filled, the cans are charged. The airport employee, who has been known to bring a shoulder bag to work daily takes receipt of the cans early in the morning of the attack. Placed into the bag, the employee goes through the normal routine and accesses the airside environment via the standard employee process. Once inside the fenced, secure, airside environment, the employee enters the concourse through any number of available doors. The 3 landside entrants have passed through security and the other 3 have landed and had breakfast. Beginning at 0900, the six meet the airport employee in pairs every 15 minutes – A, C, and E concourses. The meetings occur in the bathrooms that are south of the concourse entry point. Exchanges are made at the baby changing stations where it is normal to see people with open bags. All are recognized by a Bluetooth headset with a custom mark worn on the right ear. The pairs break off and at 10AM set their cans to operate from bathroom stalls beginning at 1015. Timers are set to release 1-3 second blasts every minute. The cans and timers are wiped down to remove fingerprints. The doors to the stalls are locked by each terrorist who crawls out from under the door. The terrorists exit the airport using the normal exit process. The airport employee has a hectic day as people begin to get sick in all airport terminals. It takes 45 minutes from the originating time to begin a full airport evacuation. The airport is shut down as panicked people evacuate the airport from all available exits. The attackers exited the airport as the first blasts begin and same day, three of the group drive in one direction, the other three in another direction, or flights that leave at 10:15 are in place for three or four of the attackers. These attackers are headed to the next airport where the process will be repeated at another airport, later in the week, later in the month, or in time for second shift. The papers would later report that a coordinated attack occurred at airport/s in which several people were severely affected. This was due to a lack of disaster planning for concourse environments and a lack of data continuity that led to a breech in intelligence, ineffective and unproven local evacuation methods and controls, and lack of coordinated agency responses. Airport services would be disrupted for weeks if not months. This is a scary scenario and is not intended to be a threat. It is an observation that is based on several years of working in and around airports. While an attack from within is the most difficult to thwart, the security problem can be reduced with good information management. 5/23/2012 6 ©2012 All Rights Reserved, IP UtiliNET LLC
  • 7. Risk Assessment - High Airline, Airport, and Service Contractor employee with a RAMP badge and pin can enter the concourse using only an employee id. Airline, Airport, and Contractor employees entering from off-site parking or through entry gates can gain access to the concourse, fuel depots, aircraft and other airport elements – typically without passing through the scanning process. Several of the employees carry shoulder bags, lunch boxes, etc. on a daily basis and these items do not normally go through scanners of any type. Airline equipment such as trucks and buses routinely leave the fenced airside area of the airport thereby providing ample opportunities for the introduction of any types of harmful technologies. All packages that enter the airfield and concourse environment should be scanned or inspected prior to entry. Airside employees and contractors that enter the concourse with personal baggage should be required to submit to a secondary search prior to entry. The secondary search should be conducted in full view of a surveillance system. Define the Problem, Act to Resolve It TSA has implemented a set of physical controls that supplant the ability to identify the individual passengers as they are passing through the security perimeters. Passengers, to include law enforcement transporting prisoners, are unknowns to TSA and this occurs as a direct result of a lack of integrated process and airline/airport business systems. This leads to inadequate and ineffective intelligence. The model below illustrates the security processes in alignment with the business processes. It illustrates the intelligence gaps that create the need to implement increased physical security measures. Until these gaps are resolved and data continuity contributes to intelligence efforts, the physical security measures and related manpower expenses will only increase. 5/23/2012 7 ©2012 All Rights Reserved, IP UtiliNET LLC
  • 8. Securing the concourse requires alignment between business process and the underlying systems architecture. IP UtiliNET offers the Airport Entry Management System or AEMS. There are three subset elements; 1. Passenger Identity Management System (PIMS) 2. Aviation Worker Identity System (AWIS) 3. Accompanied Transport Identity System (ATIS) AEMS is intended to scale beyond the existing 3 tier perimeter and is designed to incorporate domestic positive passenger bag match. Each one of the subset elements has different connectivity, integration, security, and registration requirements. The application and underlying systems are common and the software can use certain deployed video cameras. Extending the first perimeter to entry doors, kiosks, and ticketing counters - even public transportation – is a matter of gaining agreement with the airport authority to extend the capabilities of the Operational Services Network. For entry points, IP UtiliNET offers a smart electronic device that is packaged for single entry points, multiple entry points, tabletop, tablestand, and pedestal. This “platforming” approach reduces management cost and deployment headaches while allowing for multiple use cases. The software that drives the camera and facial biometric decode is the same whether it is used in this fixed form factor, a mobile form factor, or deployed and operating in passive mode as a component of the surveillance system. The Passenger Identity Management system is the recommended starting point. With this technology, pedestals can be deployed in place of the first perimeter TSA agent. Passengers who desire to be treated in a similar manner to airport employees could enroll in the system prior to entering the security line. At the first perimeter, the passenger would scan their electronic or paper boarding pass and could enter a pin that is unique to them. The boarding pass validation would coincide with a facial biometric scan in which the customer name is matched to the ticket and pin and the face is validated. If the system could not find the individual, it would prompt for a secondary form of identification such as a license or passport. If the passport or license data match the paper or electronic boarding pass and the person is not enrolled, they would be involuntarily enrolled in the security management system for the next 12 hours. The system ties back to the airline reservation system ( identified ), and to the Baggage Reconciliation System (identified) which provides the positive passenger bag match. 5/23/2012 8 ©2012 All Rights Reserved, IP UtiliNET LLC
  • 9. Various discussions as they relate to multi-modal biometrics have been undertaken over the years with the most recent being iris scans. Of the three modalities; fingerprint, facial, and iris, iris is now getting the most press. Fingerprint is typically rejected by the traveling public as they are associated with criminal work and a question exists as to who and how the database is managed. What is needed is fingerprint as a validating factor – deployed at Tier 3 – when a persons identity is questionable. Using mobile or fixed devices, after establishing probable cause, the fingerprint could be scanned and sent to the AFIS system in the state, the terrorist watch list, the 16 databases that make up NCIC and Interpol. IP UtiliNET Engineered Access Control Systems are based on a platform approach and includes fixed and mobile technologies. IRIS can be associated with health. Take the example of a former CIA employee, Angelique, that could not pass the IRIS scanners on the way into work one day. At the entry point, the scanners did not allow her to pass because something health-wise had changed and it was reflected in the backs of her eyeballs. The IRIS scanners could not identify the reason for the change, only that a change had occurred. Later that day, she discovered that she was pregnant. The last thing anyone or any business will want is non- specified health related information being passed to insurance companies for risk based adjustments. Everyone has a face and facial biometrics is the only technology that is effective at entry choke points, airplane gates, and as a passive system operating unobtrusively behind existing surveillance systems. Facial biometrics that are 2D or 3D have proven to be all but useless as they attempt to use computational capabilities to replicate the way that the eye and the “fusiform” part of the brain work. Computers “think” in numbers which is not the way the human brain processes images. What is needed, and what is available and proven with existing installations at the VA and other state/local customers for many years is Fusitronic Facial Biometrics. Fusitronic facial biometric systems that are coupled with integrated airline passenger management offer increased levels of passenger intelligence, process automation and airport security. Offered as an Airport Entry Management System (AEMS) it will provide TSA with improved operational intelligence, less invasive security, reduced cost of operations, and better response capabilities. 5/23/2012 9 ©2012 All Rights Reserved, IP UtiliNET LLC
  • 10. A properly integrated facial biometric system will unify ticketing with identity management and assist TSA and local law enforcement with criminal identification. It will also unify employee access while offering the capability to constantly cross check current law enforcement status. When a passenger ticket can not be matched to a facial identity the suspect identity can be confirmed using tertiary tools such as license, passport, fingerprint, and direct questioning. The facial biometric software is passive and capable of complementing existing surveillance systems. Using this function the database is constantly updated with last known location for individuals. When law enforcement is seeking an individual, the system goes into trakker mode where it originates from the last known location and intelligently searches from that location outwardly to the furthest points on the network. Once trakker locates, it alerts and hands off to the surveillance system for recording purposes. It is critical to note that this is not a surveillance toolset, it is a Presence Awareness toolset. Presence Awareness is concerned about the “who” not the “what” that is currently occurring in front of a camera system. Getting Started IP UtiliNET has the available technology and relevant experience with company owned credentialing and facial biometric systems. The company has created a framework and recommended integration capability for business processes that affect and unify the information services for passengers, law enforcement, and aviation workers. The company has significant experience in airport passenger management and baggage systems. The solution and recommended approach include a capability to integrate a domestic positive passenger bag match solution that will add benefit to the industry and the traveling public. A service bureau approach is required and IP UtiliNET is in a position to undergo security clearance approval, led by the founder, a US NAVY Submarine Service Veteran. Additionally, the company has a relationship with a break/fix services provider that supports airports in 130 countries today. In order to move forward, funding will be required. 5/23/2012 10 ©2012 All Rights Reserved, IP UtiliNET LLC
  • 11. Continuous Improvement IP UtiliNET offers LANvisn™ connectivity solutions for airport environments. It is based on industry recognized standards and delivers the industries first, truly non-fragmented network architecture. This unifies the security and surveillance environment. HUBvisn, based on the AXS1800 platform is a 25 terabit platform with entirely passive distribution capabilities over a 20 KM radius (12.4 Miles). A single chassis supports more than 7,000 active end point devices and can scale in a non-fragmented, grid fashion to 50 chassis using a single control and management platform. It is the optimal solution for Command and Control Centers and for airport security environments. It is more secure and cost effective than existing structured cabling systems. With this technology, all manner of connected security elements – throughout the airport campus - become possible – at reduced up front and long-term costs reductions that increase as the number of end-point connections increase. The network is a transport method for data that is collected at the edge and managed at the core. The biometric software operates on the device, on distributed appliances, or on a centralized appliance. The application that manages the core is an intelligent, multi-tenant software framework that connects to other systems via it’s intelligent connectors. It is specific to the task at hand, airport security, and can be configured to support client specific edge functionality and supports zoning. As a client specific technology, TSA can use it to improve relationships with passengers and airports that are served, and airports can use it to implement loyalty programs that do not yet exist. From a TSA perspective, the first perimeter can be pushed to the entry doors and ticketing stations. If TSA chooses, the system can be pushed to public vehicles that frequent the airport. This functionality will allow the TSA and first responder team to incorporate inbound intelligent traffic management and outbound coordination of evacuation resources on an as needed basis. It is scalable, inherently configurable, and capable of migrating physical security to environmental intelligence and well coordinated first responder capability. IP UtiliNET launched “IP UtiliSAFE” in January 2011. This unique offering is available uniquely with a LANvisn™ network. UtiliSAFE grants the ability of licensed first responders to immediately access selected elements such as video cameras via a private, dedicated, licensed path. An “IP UtiliSAFE” airport campus network is a significant strategic benefit to first responders. It includes any number of optional triggers - an analytic system, shot detectors, a concourse or desktop 911 call … If any of these triggers occur, the licensed path is automatically opened and immediate priority access to video resources, controlled doorways, etc, is granted – even when the power is out. This feature is embedded in the daily operating system for the security network. 5/23/2012 11 ©2012 All Rights Reserved, IP UtiliNET LLC
  • 12. About the Author Mr. Quinn is the founder of IP UtiliNET and is a US NAVY Veteran. He has coupled his military systems training, to include battle planning and systemics with advanced degrees in business and computer technology /robotics. In industry, he has consistently applied his education and work experience to technology integration and business process automation. He has spent most of the last six years assisting Delta Airlines in its efforts to gain better control of the baggage management check-in, baggage handling and tracking, and baggage security processes at airports. His work and support for Delta Airlines, as reported publicly by its CEO in 2009, Richard Anderson, contributed to a 28% performance improvement in year/year results. Mr. Quinn acted as a Sales Consultant for Delta Airlines and participated in time studies, business process engineering, and business process improvement specific to passenger process management, and baggage management systems. Mr. Quinn and the Delta team were instrumental in driving “incremental improvements” throughout the baggage management process and his vision helped to shape a longer term strategy that will lead to automation. These innovations led to improved passenger baggage services, induction efficiency, ramp efficiency, and increased levels of security at baggage carousels. Mr. Quinn helped the Delta team initiate the mobile barcode project with TSA. For a number of years at Motorola, Mr. Quinn was responsible for the Air and Sea Ports Vertical Markets business. He is the author of the Motorola solution brief entitled “21st Century Transportation Hubs (see; www.motorola.com/ports). Mr. Quinn left Motorola in April 2010 and acquired the facial biometrics technology and key resources that have led to the recent launch of the most advanced and accurate facial biometrics solution available. Mr. Quinn continues to serve the airports business while working to grow his Veteran-owned small business enterprise. For More Information, please contact: David Quinn dquinn@iputilinet.com 404.513.3283 5/23/2012 12 ©2012 All Rights Reserved, IP UtiliNET LLC