Standouts in Transportation Fire Detection and Alarm Systems By James Careless

Standouts in Transportation Fire Detection and Alarm Systems

Fire detection and alarm systems are ‘must-haves’ for the global transportation industry, both for fixed and moving assets. Here are some standout products being offered by a number of major vendors, as found by Transportation Security International magazine.

Amerex: Detecting Lithium-Ion Battery Fires Early in Electric Vehicles

Lithium-ion battery fires can be devastating to transportation aircraft, ships, and vehicles. As CNN reported when covering a five-alarm fire in New York City believed to have been caused by a lithium-ion battery within an electric scooter, “‘in all of these fires, these lithium-ion fires, it is not a slow burn; there’s not a small amount of fire, it literally explodes,’ FDNY Commissioner Laura Kavanagh told reporters. ‘It’s a tremendous volume of fire as soon as it happens, and it’s very difficult to extinguish and so it’s particularly dangerous.’”

It is for these reasons that early detection of lithium-ion fires matters. This is where the Amerex SafetyNet EV gas detection system can make a difference. According to the company, the SafetyNet EV is ”the only technology that provides early detection of lithium-ion battery fires in commercial electric vehicle fleets.”

Dafo Vehicle fire suppression systems consist of four integrated elements; Detection, Alarm, Suppression and Control, which work together in a coordinated, fast and efficient way to suppress fires, the company says.
Dafo Vehicle fire suppression systems consist of four integrated elements; Detection, Alarm, Suppression and Control, which work together in a coordinated, fast and efficient way to suppress fires, the company says.

Here’s the problem: The lithium-ion batteries being used to propel today’s electric vehicles draw their electricity from multiple onboard power cells. A fire could occur if one or more of these power cells overheat due to charging issues or external/internal damage — potentially causing a thermal runaway event that results in a fire.

Dafo Vehicle Fire Protection says when designing fire systems for vehicles like busses it is important to understand the life cycle of the vehicle, starting with factory integration. They design their systems to support the bus OEM installation process and work to ensure that service availability for the end-user is supported. Dafo Vehicle Fire Protection image.
Dafo Vehicle Fire Protection says when designing fire systems for vehicles like busses it is important to understand the life cycle of the vehicle, starting with factory integration. They design their systems to support the bus OEM installation process and work to ensure that service availability for the end-user is supported. Dafo Vehicle Fire Protection image.

The solution: With the Amerex SafetyNet EV gas detection system, sensors are strategically placed in and around the vehicle’s battery compartments. These sensors detect off-gasses emitting from battery cells at trace levels, long before they approach the level of a thermal runaway event. When a danger level is detected, the system sounds an alert that gives the driver time to pull over, leave their vehicle, and dial 911 for help.

“As businesses and municipalities began to increase their investment in electric vehicle fleets, we saw the need to develop the technology to protect people and property,” explained Amerex chief executive officer Harrison Bishop. “Our team worked tirelessly to develop a solution to provide this additional measure of lifesaving detection.”

Johnson Controls has released the Zettler T1306 and calls it “the first addressable alarm panel developed for use in small-scale marine vessels.” Using addressable technology allows mariners to clearly pinpoint fire locations speeding up response times. Johnson Controls image.
Johnson Controls has released the Zettler T1306 and calls it “the first addressable alarm panel developed for use in small-scale marine vessels.” Using addressable technology allows mariners to clearly pinpoint fire locations speeding up response times. Johnson Controls image.

Bosch: Protecting Airports and Transit Stations

Bosch produces a range of intelligent fire detection solutions for sectors such as airports and transit stations, hospitals, hotels, and industrial/manufacturing facilities. The company’s Avenar line of automatic fire detectors includes smoke detectors for air ducts and open spaces. They also sell flame detectors that can register fires invisible to the naked eye. These include smokeless liquid and gas fires, and materials and substances that emit carbon in their smoke.

“International airports cover hectares of land and comprise not only facilities for air travel, but also connect with train and bus stations, vehicle hire services, hotels and multiple parking lots,” said the company’s website. “A fire at any one of these major activity points could impact all others with a need for evacuation and inspections. Thus, a highly reliable network of fire and smoke detection and alarm systems with PA facilities is needed for efficient response times in case of emergency.”

To prove its point, Bosch cited a fire detection system installation it executed at Cambodia’s Phnom Penh International Airport. “To keep everyone and the building safe from harm and to prevent any service bottlenecks, effective fire protection planning was essential,” said the Bosch website. “Bosch fitted all constructions on the site with a fire alarm system, and special optical and linear-beam smoke detectors, as well as static and moving surveillance cameras. The Public Address and Voice Alarm Systems alert personnel whenever real signs of fire or smoke are detected.”

Dafo Vehicle Fire Protection: Making Bus Passengers and Drivers Safer

Whether they are conventional diesel models or alternative fueled vehicles, buses are vulnerable to fires in their engine compartments. Unfortunately, the speed with which unchecked fires can spread can quickly destroy entire vehicles, while putting the lives of passengers and drivers at risk.

Reducing this risk by extinguishing bus engine compartment fires is the goal of Dafo Vehicle’s fire suppression system. According to Dafo Vehicle’s website, this system consists of four integrated elements; namely Detection, Alarm, Suppression, and Control. All four work together in a coordinated, efficient manner to suppress fires fast. The system’s control unit has a Real-time Clock and Event Log that records and allows access to historical data, so that any previous incidents can be analyzed and addressed.

“The detection system consists of a linear heat detector wire,” said the Dafo website. “It has a fixed temperature sensor with an alarm signal triggered when the activation temperature of 180 C is reached. This signal punctures the burst disc of the propellant gas cartridge, which releases nitrogen into the agent container. The (non-corrosive and environmentally friendly) Forrex liquid is distributed to the nozzles through the pipe system. At the same time, the alarm system is activated, and an alarm horn in the vehicle and a light signal in the panel will warn the driver. The liquid agent will push away the oxygen, cool down the overheated engine parts, impregnate the burning material, stick to surfaces and effectively prevent re-ignition.”

According to Jonas Bergström, the company’s business manager of bus and coach, ”passenger safety is a top priority for Dafo Vehicle. Creating a fire suppression system that combines superior reliability with a valuable low TCO is a challenge that our engineers have solved in an impressive way.”

Fike: Fighting Thermal Runaway Fires with Fike Blue

We have already seen that thermal runaway fires are a real problem in electrical vehicles, or indeed any system that relies on lithium-ion batteries as a power source. This is why a new fire suppression product from Fike Corporation is such welcome news. Fike Blue “is the first solution tested and proven to put out a lithium battery fire by eliminating the cascading thermal runaway event and the possibility of reignition,” said the company website.

Here’s how Fike Blue — a special fluid within a pressurized canister — works. When a fire/heat anomaly is sensed by a third-party detector or a Fike DTS (Distributed Temperature Sensing) cable, the Fike Blue control panel releases the solution into a piping system in the protected area, with the system only opening a nozzle nearest to the heat source. The Fike Blue solution soaks the affected batteries, smothering the fire while extracting its heat.

“With a boiling point of more than 400 C, the liquid absorbs the intense exothermic heat produced from thermal runaway without breaking down,” said FikeBlue.com. “The temperatures for all cells dramatically decrease over the course of several minutes until the event and chance for re-ignition is over.”

At present, Fike Blue has been configured to protect fixed lithium-ion battery banks in renewable energy storage systems, rather than electrical vehicles. However, given its usefulness in stopping thermal runaway events, one can imagine some version of this system being developed for the EV market as well. In the interim, airports and other transportation facilities that use lithium-ion power storage would be wise to give Fike Blue some consideration. It is apparently a real solution to a problem that dogs the lithium-ion sector.

FireFlex Systems: Detecting and Dousing Class B Fires

Class B fires are the ones that involve flammable gasses and/or liquids linked to propane, natural gas, gasoline, kerosine, petroleum greases, tars, oils, oil-based paints, solvents, lacquers, or alcohols. These are extremely dangerous fires that can’t be doused by water, which simply spreads the flames around. This is why Class B fires in garages and hangars are often extinguished using pre-installed Compressed Air Foam (CAF) systems. Sprayed throughout the affected area, CAF is created by combining air, water and foam concentrate to generate and dispense a homogeneous foam solution that is physically similar to shaving cream.

FireFlex Systems makes Class B fire detection and dousing systems that are well-suited to the transportation industry. In the latter category, FireFlex’s “ICAF compressed air foam system is FM Approved as a local application extinguishing system for class B pool fires, spill fires and cascading fires,” according to the company’s website. According to this company, “ICAF uses four times less water and up to six times less foam concentrate compared to foam-water systems.” This makes it economical to use as well as effective.

When fires do occur, it is vital for firefighting crews and evacuating personnel to be able to see what’s happening on the fire scene. According to FlexFlex, CAF’s “unique physical properties significantly reduce steam production” when compared to conventional water-based extinguishing systems, ensuring better visibility during and after a fire. The reason? The CAF blankets the fuel surface, thus not causing “the visual impairment often associated with high-expansion, total flooding foam systems.”

Honeywell: Providing Self-Testing Smoke Detectors

Smoke detectors are an essential element of any fire detection system. However, these devices can only do their jobs if they are fully functional. Ensuring that they are requires ongoing testing by building operators, which can be a very demanding task if the spaces being protected are large and equipped with numerous smoke detectors.

Fortunately for airport and transit station operators, Honeywell has addressed this problem with a fire alarm system that comes with UL-approved self-testing smoke detectors that can be tested automatically. The NOTIFIER INSPIRE fire alarm system with self-test detectors is an all-in-one fire system designed to deliver reliable protection, efficient monitoring, and easy expansion, in addition to flexible and timely reporting. These detectors report to Honeywell’s Connected Life Safety Services (CLSS) cloud-based platform, to make system monitoring and troubleshooting possible from remote locations.

“Honeywell is integrating intelligence across all aspects of fire and life safety systems,” said Jurgen Van Goethem, Honeywell’s president of Fire Life Safety Systems. “By digitizing the most essential system in the building, we’re creating efficiencies during commissioning and maintenance, we’re further improving system reliability and we’re improving the end-user experience. We’re also working to change building owners’ mindsets to think about fire and life safety systems not just as a necessary system to be able to occupy the building, but as a system with a wealth of data that going forward, we can tap into to ultimately better protect lives. This will help move the industry toward the creation of safer and more compliant buildings.”

Worth noting: NOTIFIER INSPIRE’s modular design makes it easy to add new fire detectors as buildings are expanded. Meanwhile, these units’ self-testing features are so sophisticated, that they introduce small amounts of heat and smoke into their own detection chambers to check their photo and thermal sensors, along with verifying that their smoke entry points are unobstructed.

Johnson Controls: Addressable Fire Detection for Small Watercraft

Fire detection is as important on small boats as it is on large ships. This is why Johnson Controls has released the Zettler T1306, which the company bills as “the first addressable alarm panel … specifically developed for use within small-scale marine vessels.” According to this company, using addressable technology allows mariners to quickly and clearly pinpoint fire locations in their vessel, speeding up response times while allowing muster protocols to be tightened up.

“With the global maritime industry quickly evolving and experiencing a phase-out of conventional fire alarm control units, our customers need an approved fire panel that offers the latest addressable technology with the quality and reliability they expect from Zettler products,” said Paul Grainger, product manager with Johnson Controls Fire Detection Products. “This new panel not only provides addressability and reliability at a competitive price, it also simplifies installation and maintenance and contributes to a low lifecycle cost.”

Capable of supporting audible and visual alarms, the T1306 is equipped with two full-powered loops. These can be split into six shared power loops, which are capable of connecting up to 500 sensing devices in total. The alarm panel can be located within the bridge, or remotely coupled to this command center using an in-bridge repeater to save space. It features an easy-to-understand LCD display, plus robust controls that can withstand harsh marine environments.

The T1306 comes with a 24-hour battery capacity, has built-in fail-safe capabilities and comes with advanced control panel technologies that reduce false alarms. It also offers a top and bottom entry gland plate, communication via Modbus to gateway (SMS/MIS), and a four-panel capacity when installed in a master/client configuration. The T1306 fire alarm panel has an IP32 rating and has attained various global industry approvals such as EN54, MED, ABS, BV, DNV GL, KRS, LRS (IACS) and CCS.

Top: Kidde Technologies, a part of Collins Aerospace, makes a number of fire suppression products aimed at keeping aircraft safe., including this spherical unit.  Kidde Technologies image.
Top: Kidde Technologies, a part of Collins Aerospace, makes a number of fire suppression products aimed at keeping aircraft safe., including this spherical unit. Kidde Technologies image.

Kidde Technologies: Keeping Aircraft Safe

Fire in an aircraft is a terrifying possibility that offers deadly consequences. Passengers and pilots can’t evacuate at 30,000 feet. This is why Kidde Technologies makes a number of fire suppression products aimed at keeping aircraft safe. It starts with a range of fire suppression hardware that employ single and multi-outlet spherical, cylindrical or radial tubular containers to hold liquid extinguishing agents, which are made from durable stainless steel or titanium. This product range also includes solid propellant-based suppression devices and dedicated electronic modules for system monitoring and control. These modules can be configured to be manually controlled by the crew, or activated automatically when fire conditions are detected.

Middle: This lavatory photo-electric smoke detector offers innovative detection technology and reduces the threat of false alarms. The company says it requires no change to aircraft cabin/lavatory structure or wiring. The Model 3000 is designed as a drop-in replacement for JAMCO PU90-400 series ionization smoke detectors. Kidde image.
Middle: This lavatory photo-electric smoke detector offers innovative detection technology and reduces the threat of false alarms. The company says it requires no change to aircraft cabin/lavatory structure or wiring. The Model 3000 is designed as a drop-in replacement for JAMCO PU90-400 series ionization smoke detectors. Kidde image.

Fires in aircraft lavatory washrooms, caused by people smoking and then throwing still-lit cigarettes into waste bins, are a serious threat to aircraft in flight. This is why Kidde makes a Lavatory Waste Bin Extinguisher to address this danger. Available for Boeing and Bombardier aircraft, these units use proven, existing hardware to fight waste bin fires as soon as they exceed a temperature of 170 F (77 C). When this threshold is crossed, the Lavatory Waste Bin Extinguisher releases inert nitrogen under pressure through its discharge nozzles, over a period of three and five seconds.

Bottom: Kidde offers a non-Halon fire extinguisher for waste bins in aircraft lavatories. Their G800100 and G825100 series are drop-in replacements for the Halon A800100 and A825100 units in many legacy aircraft fleets. Kidde image.
Bottom: Kidde offers a non-Halon fire extinguisher for waste bins in aircraft lavatories. Their G800100 and G825100 series are drop-in replacements for the Halon A800100 and A825100 units in many legacy aircraft fleets. Kidde image.

Kidde also makes advanced photo-electric smoke detectors for aircraft cabins and lavatories, which can be installed without any changes to aircraft cabin/lavatory structures or existing wiring. According to the company, these smoke detectors are compliant with environmental legislation, use dual-wavelength technology to minimize false alarms due to “nuisance aerosols” and provide improved fire detection capabilities even at high altitudes.

Strengthening Cargo Security Across the Supply Chain

Strengthening Cargo Security Across the Supply Chain

Cargo security keeps goods safe. On freighters, docks, trucks, railcars, warehouses, and ports, cargo shipments are vulnerable to theft during several stages of the transit process. If a container isn’t properly and securely sealed, it can be opened many times during transit with its contents stolen and easily sold on the black market.

Stolen cargo can cost suppliers thousands to upwards of millions of dollars. An estimated $223 million in cargo was stolen during 2022, according to a new analysis by Verisk’s CargoNet. CargoNet recorded 1,778 supply chain risk events in the U.S. and Canada in 2022, a 15% increase from 2021. The average value of cargo stolen in an event was $214,104, CargoNet said.

The consequences of not sufficiently protecting cargo can be devastating, ranging from financial loss and damaged reputation to long-term, intricate legal disputes. And, today’s thieves are now highly tech-savvy and constantly developing modern ways and strategies to steal cargo from shippers. Because of this, more advanced container security measures have been developed helping to reduce burglaries and resulting theft claims.

High security bolt seals, like this one by J. J. Keller, help protect cargo against tampering and theft. J. J. Keller image.
High security bolt seals, like this one by J. J. Keller, help protect cargo against tampering and theft.
J. J. Keller image.

Best Practices

Josh Lovan, industry business advisor at J. J. Keller & Associates, Inc., Fort Smith, Arkansas, explains that ensuring cargo security during transit is crucial and cites the following best practices to make this happen:

Use High-Quality Seals: Invest in security seals made of durable materials like metal or heavy-duty plastic. Avoid using seals that can be easily tampered with or broken.

Proper Application: Apply seals correctly, ensuring they are securely fastened to prevent tampering or unauthorized access.

Unique Identification: Use seals with unique serial numbers or barcodes for easy tracking and identification. This helps in verifying the integrity of the cargo.

Regular Inspections: Conduct routine inspections of seals and locks throughout the transit process to detect any signs of tampering or damage.

Multiple Layers of Security: Utilize multiple layers of security, such as container locks in addition to seals, to provide added protection against theft or unauthorized access.

Security Protocols: Implement strict security protocols and procedures for handling, loading, and unloading cargo to minimize the risk of tampering or theft.

Monitoring and Tracking: Employ GPS tracking systems or other monitoring technologies to track the location and status of cargo in real-time, providing visibility throughout transit.

Training and Awareness: Train personnel involved in handling cargo on security protocols and the importance of maintaining the integrity of seals and locks.

truck seal

Seals, like the ones shown here made by J. J. Keller, are simple, cost effective ways to secure containers.J. J. Keller images.
Seals, like the ones shown here made by J. J. Keller, are simple, cost effective ways to secure containers.
J. J. Keller images.

Seals and Locks

Security seals and container locks are requisite to keep cargo secure in transit. Not all seals and locks are created equally. Each type of seal or lock offers different levels of security and suitability for specific applications.

Different industries employ a variety of security seals tailored to their specific needs and cargo requirements. For instance, the transportation industry relies on heavy-duty seals like bolt seals or cable seals to secure shipping containers and trailers, safeguarding valuable goods during transportation. Industries dealing with retail and consumer goods prioritize tamper-evident seals with unique identification features to maintain the integrity of products as they move from manufacturers to retailers.

“Pharmaceutical and healthcare companies often opt for advanced seals equipped with RFID technology, enabling real-time tracking and monitoring of sensitive pharmaceutical products to comply with stringent regulatory requirements and maintain product integrity,” Lovan says. “The food and beverage industry may utilize seals designed to withstand environmental factors and provide clear evidence of tampering, ensuring food safety and compliance with regulatory standards.”

The Equipment Lock Company produces this heavy duty cargo door lock built to secure semi-trailers and sea containers by locking the innermost vertical locking bars together. The Equipment Lock Company image.
The Equipment Lock Company produces this heavy duty cargo door lock built to secure semi-trailers and sea containers by locking the innermost vertical locking bars together. The Equipment Lock Company image.

It’s essential to assess your cargo security requirements and choose the appropriate seals and locks accordingly. Overall, Lovan believes the choice of security seals varies across industries based on factors such as cargo value, sensitivity, transportation mode, and regulatory compliance needs, with each industry selecting seals that best meet their unique security requirements. He cites the following types of security seals and container locks available for cargo security.

Bolt Seals: These are high-security seals that require bolt cutters to remove, making them difficult to tamper with.

Cable Seals: Made of steel cables, these seals are flexible and suitable for securing irregularly shaped items. They offer high tensile strength and are resistant to tampering.

Bar Seals: These seals feature a metal bar that is inserted into a locking mechanism, providing a secure closure for containers and trailers.

Plastic Seals: These seals are commonly used for securing shipping containers, trucks and trailers. They are lightweight, cost-effective, and offer tamper-evident features.

RFID Seals: These seals are equipped with radio frequency identification (RFID) technology, allowing for electronic tracking and monitoring of cargo in real-time.

Kingpin Locks: These locks are installed on the kingpin of a trailer, preventing unauthorized access to the container when it is attached to a truck.

Wheel Locks: These locks are placed on the wheels of trailers or containers to prevent them from being moved or accessed without authorization.

Below are criteria for determining the best seal for your application:

• Determine if an indicative or barrier seal is required.

• If using a barrier seal, determine what strength level is needed.

• Make sure that the seal type that you choose fits the device.

• Choose a seal that has the appropriate level of strength and security.

• Measure seal cost vs. security risks.

• Use a manageable locking system considering the tools and resources you have at your disposal.

• Consider the durability of the seal in relation to its environment.

• Below are criteria for handling and use of cargo seals:

• Know the locking procedure, design and features of this seal.

• Give seals only to authorized persons.

• Document all seals taken from storage.

• Apply seals securely according to instructions for this model. Note any problems or unusual visible damage like bent hasps, worn holes, unusual conditions or cosmetic damage to seals in applying.

• Destroy seals completely after use. Do not simply toss them out or leave parts or cut seals intact; or under conditions where they may be collected by others. Ideally it is good practice to return them to a central facility for destruction by an authorized and trained inspector.

PassTime’s GPS solutions utilize technologies to help connect, monitor and protect a wide range of mobile assets. PassTime image.
PassTime’s GPS solutions utilize technologies to help connect, monitor and protect a wide range of mobile assets. PassTime image.

Reliable Line of Defense

While these locks and seals are a reliable line of defense, criminals can compromise security seals and container locks through various methods such as brute force, and tools like bolt cutters to break seals or manipulate locks. They also employ tampering techniques, like duplicating seals or picking locks, to gain unauthorized access to cargo.

C-TPAT stands for Customs-Trade Partnership Against Terrorism. Founded shortly after the terrorist attacks of September 11, 2001, C-TPAT is a voluntary, collaborative effort between U.S. Customs and Border Protection (CPB) and commercial shippers to develop comprehensive cargo security programs for imports into the U.S. To further prevent theft, C-TPAT seals are security seals affixed to cargo containers by C-TPAT certified entities, signifying compliance with rigorous security standards. These seals serve as an indicator of a secure supply chain, facilitating expedited customs clearance and reducing the risk of cargo tampering or terrorism-related threats. C-TPAT seals may feature unique identification numbers or barcodes, allowing for easy tracking and verification of cargo integrity.

GPS Tracking

With numerous companies and transportation methods involved throughout the transportation chain, pinpointing when and where a cargo security issue occurred can be daunting. Implementing a GPS tracking solution on cargo shipments provides suppliers with the ability to track their cargo throughout the entire journey, adding invaluable insight and security.

“With so many transportation methods and entities involved, cargo can be lost or delayed along the way,” says Jeff Karg, director of marketing and communications, PassTime, Littleton, Colo. GPS tracking devices for cargo shipments give the supplier their own tracking solution and are not reliant on the varying and sometimes non-exist tracking solutions from their transportation providers.”

Solutions like PassTime’s battery-powered Encore, are completely self-powered, can last up to five years without recharging, and at the size of a deck of cards, can quickly and easily be placed on just about any cargo shipment.

“Utilizing battery-powered GPS tracking solutions on the cargo itself means suppliers know if their cargo is still in transit, or more importantly, if it isn’t,” Karg says. “Locks and seals are an important aspect of cargo security. However, if the cargo container itself is lost those safeguards may have limited impact. Adding an additional layer of security, like a GPS tracking solution, can provide unparalleled visibility, control and protection to locate and recover missing cargo.”

Container Stacks

Smart Containers

Smart containers are equipped with sensors that can detect intrusions like unauthorized door openings as well as anomalies such as a sudden change in container pressure or temperature (like when a hole is cut into the side wall of a container) that could indicate a breach.

Smart containers also have other integrated sensors such as GPS as well as additional internal sensors to measure the condition of the cargo inside. Data from the container’s sensors are either logged on a data module within the container, or it’s broadcast to a central monitoring platform via handheld readers, fixed scanners, or GSM/cellular connections.

Another, probably more viable option to (expensive) smart containers is the use of portable smart sensor kits that can be fixed to/within any standard container or truck trailer. These “smart kits” can turn any shipping container, truck trailer, or rail car into a “smart container,” giving logistics operations greater supply chain visibility for high-value cargo like pharmaceuticals, volatile chemicals, frozen food and other cold chain products.

The Human Element

Most theft crimes are not investigated because of manpower issues, so it is imperative that carriers take the necessary measures to prevent theft. Provide security training to all personnel, because everyone should be involved with protecting customer freight and company assets. Lovan says drivers can proactively deter theft by adopting the following prevention measures:

• Check the cargo seal and padlock during pre-trip and after being away from the unit.

• Never leave the tractor running when unattended.

• Always lock the doors and roll up windows when away from tractor.

• Always park in well-lit areas where other motorists are present.

Fleets can deter theft by implementing the following security polices during closed hours:

• Ensure trailers are docked, butted, and blocked at the terminal.

• Utilize kingpin locks for trailers that contain high value freight.

• Ensure that alarm systems are functional by conducting weekly tests.

• Utilize GPS technology to geofence equipment on the yard.

While no cargo being transported is completely immune to the risk of theft, the right technology will help to mitigate these problems to a great extent and help to ensure safe transportation of cargo. Anticipate and use security developments to your advantage, stay one step ahead and keep your cargo secure.

Building Resilience Against Critical Events

Building Resilience Against Critical Events

Critical events can affect any transport operator. Accidents, problems with infrastructure including vandalism, fires — such as those seen recently on electric buses in London — extreme weather events and cyberattacks have an immediate and often highly disruptive impact. While many incidents are resolved quickly, the knock-on effect on the reputation of the operator can be long-lasting, inconveniencing employees and passengers, and, in extreme cases, even threatening their lives.

It is therefore essential for transport organizations to build in resilience measures. This is, in part, the ability to anticipate the types of emergencies that might arise and adopt practices that minimize the impact of these crisis events on their operations. This type of approach ensures the safety of their employees and passengers and assists in resuming normal services quickly.

The success of operational resilience relies on several factors, the first of which is corporate culture. An organization’s resilience reflects the resiliency of its people, so public transport operators must invest in training programs, mentoring, and delivering resources that are inclusive for employees, and promote their well-being. Employees who are engaged and listened to will be better able to manage emergencies and equipped to confidently put practices in place to minimize disruption. Adopting an approach of employee collaboration through which teams and individuals are recognized for their successes and able to learn from their mistakes helps to cultivate collaboration and enables better teamwork in a crisis.

Continuously Assess Potential Risk

Proactive risk management coupled with agreed contingency plans that are regularly assessed and updated is essential. A list of the appropriate experts, technicians and helpers should be drawn up and these will be the first port of call when a critical event occurs. If companies fail to communicate in a timely manner during a crisis, they will lose control of the incident and the agreed response plan. Aligning actions to the right people ensures clarity of message, averts rumors, such as on social media, and keeps employees and passengers updated with accurate and timely information.

A comprehensive communications plan for use during a critical incident should be devised by transport operators. This outlines processes and those with responsibility for communication, who talks to whom and when, and what information they share. In addition to internal contacts, there may be external groups, such as passengers, partners of employees, or the public, that will require communications and updates. As public transport companies operate critical infrastructure, there may also be an obligation to report to the authorities.

Planning saves time and effort in an emergency. Messaging templates, for example, can be created in advance to help employees communicate efficiently and accurately. These will need to contain specific information to suit a variety of audiences and situations, but key messages must be consistent and not contradictory so everyone involved can be kept on the same page. Transport operators should plan for multimodal communication. The more channels they use, the more likely they are to reach all audiences. Ideally, messages should be sent through the most used channels today such as SMS texts, push messages, email, and voice messages and on both personal and work landlines and mobile phones. Practicing the procedures that have been agreed upon will allow transport operators to ensure they work efficiently without the pressure of a crisis. Any problems can be identified and addressed.

Building Resilience with Technology

Organizational resilience can be enhanced immeasurably by technology. Transport operators will benefit from an integrated critical event management (CEM) software solution that connects business continuity, disaster recovery, and risk management tools. This allows them to assess risk, seamlessly disseminate information across teams, and avoid disruptions that get in the way of responding quickly to a critical event. At the core of a CEM platform is a data hub that collates all the information relevant to an emergency and manages all the necessary processes.

Information that informs a CEM platform ranges from IoT device data monitoring traffic infrastructure and vehicles through to employee location data. It also includes police channels on social media, traffic information, or severe weather warnings. The platform brings this data together and visualizes it so transport companies can be quickly alerted to likely crises, assess the impact on their own systems, and initiate responses. From this, teams with responsibility for communicating critical events can coordinate activities, teams, and resources within a single application.

Emergency processes can be quickly implemented and controlled in a CEM solution in the form of rules, guidelines, and templates and it will automate those processes using a workflow system. This reduces the time that might be lost to manual activities. The CEM platform should support two-way communication allowing people to respond, which is helpful in terms of knowing who is safe, where people still need help, and whether the level of response needs to be escalated.

Transport operators face many risks but with intelligence, strategic planning and a robust crisis communication plan in place, they will be able to maintain operational resilience and protect both employees and passengers in the event of a crisis.

Tracy Reinhold is chief security officer at Everbridge. He is responsible for advancing Everbridge’s enterprise-level security strategy, as well as working closely with customers and partners to optimize their organizational approach to managing and responding to critical events.

The Francis Scott Key Bridge Collapse
Lead Editorial

The Francis Scott Key Bridge Collapse

On March 26, 2024, at about 1:27 in the morning, a cargo vessel, the 984.3-foot-long Singapore-flagged Dali, reportedly lost power while transiting out of Baltimore Harbor. It struck a support column on the Francis Scott Key Bridge in Baltimore, Maryland. The result was that a portion of the enormous bridge collapsed, and the vessel was damaged. The vessel remains in the vicinity of the bridge pier. Eight construction workers were repairing potholes on the bridge at the time of the incident. They were knocked into the Patapsco River below. Two were rescued, four bodies were eventually recovered and two more remain missing and are presumed dead.

Access to the Port of Baltimore remains limited since the collapse, and a delicate, complex salvage effort is underway in the river. Since the collapse, the FBI and NTSB have both launched separate investigations. The chair of the National Transportation Safety Board says the agency is focusing on the ship’s electrical system in its investigation into the crash.

“The FBI is investigating what led up to the Key Bridge collapse in a separate investigation, according to reporting by the Washington Post. The FBI said two weeks after the incident that it had agents on the Dali, which was still at the accident site. “[The] FBI is present aboard the cargo ship Dali conducting court-authorized law enforcement activity,” the agency said. “There is no other public information available, and we will have no further comment.”

An unclassified memo issued by the Cybersecurity and Infrastructure Security Agency (CISA), said the ship reportedly lost propulsion at the time of the crash. The NTSB identified Hyundai as the manufacturer of the ship’s power and brake system. The agency expects the preliminary report on the collapse to be released by the first week of May.

A month after the accident, more than 1,300 tons of steel have been salvaged and four smaller shipping channels were open but those still only allow a fraction of the pre-collapse activity to get in and out of the Port of Baltimore. “We are still a long way from getting the size and commercial back to where it was before the collapse,” said Maryland Governor Wes Moore a few weeks after the incident.

“Today was an important milestone in the process of beginning to pull the wreckage out, beginning to open channels. We know we still have work to do,” the governor said when the first channel was opened. Moore said untangling the mangled mess of debris remains dangerous.

“We’re talking about a situation where a portion of the bridge beneath the water has been described by Unified Command as ‘chaotic wreckage,'” Moore said. “Every time someone goes into the water, they are taking a risk. Every time we move a piece of the structure, the situation could become even more dangerous. We have to move fast but we cannot be careless.”

A group called the Unified Command, comprised of the U.S. Coast Guard, U.S. Army Corps of Engineers, Maryland Department of the Environment, Maryland Transportation Authority, Maryland State Police, the Singapore company that managed the striking ship and others, is working at the site to coordinate the disaster response.

A lawsuit filed by the city of Baltimore maintains “there were no high winds, visual obstructions or any reason to believe disaster was about to occur” when the ship crashed into the bridge. The lawsuit alleges alarms showing an inconsistent power supply on the Dali sounded off before leaving the port, but it continued on its voyage anyway, the documents state, despite its unseaworthy conditions. The city also accuses the crew of being incompetent and inattentive to its duties, adding allegations of failing to maintain or use several pieces of equipment, including the ship’s engine and propulsion system.

The Coast Guard was able to download the voyage data recorder which has been sent to the National Transportation Safety Board to be analyzed.

As we await the results of the investigations, it is not too soon to consider the security risks and implications of the incident.

First up is the structural integrity of bridges. Regular inspection, maintenance and structural integrity assessment of bridges is a must. Security of bridges extends beyond the cyberthreats which is a current focus. Infrastructure must be top of mind and old bridges should be beefed up to prevent an occurrence from destroying another bridge.

The incident emphasized the need for well-planned emergency response protocols. Effective coordination among emergency responders, law enforcement and other relevant agencies is essential for addressing such emergencies quickly and minimizing their impact.

Next, enhancing public awareness about safety measures during emergencies should be reviewed. Evacuation procedures and alternative routes should be clearly defined.

Conducting thorough risk assessments and implementing appropriate mitigation measures can help prevent accidents and minimize their consequences. This ties in with potential vulnerabilities in infrastructure and implementing measures to address them as mentioned earlier.

Leveraging technology for real-time monitoring of infrastructure can help detect potential issues before they escalate into problems. Implementing advanced monitoring systems, such as sensors and surveillance cameras, is one way to enable proactive intervention.

Communication and information sharing among the relevant stakeholders, including government agencies, emergency responders and the public, are vital for managing crises effectively. Timely dissemination of accurate information can help prevent panic and facilitate coordinated response efforts.

And finally, continual improvement is imperative. Reviewing and updating security protocols and procedures based on lessons learned from past incidents is essential. This ensures that security measures remain effective and adaptable to evolving threats and challenges.

Israel/Gaza War: The Implications for Aviation Security

Israel/Gaza War: The Implications for Aviation Security

Philip Baum considers the impact of the ongoing conflict in Israel and Gaza on the aviation industry and identifies potential challenges for those responsible for ensuring security at airports and in the skies.

More than two months have passed since the horrific terrorist attacks perpetrated by Hamas fighters against Israel on October 7, 2023, and, save for a week’s pause in hostilities, on a daily basis ever since, we have borne witness to the subsequent exacerbation of the humanitarian tragedy which has befallen the residents of the Gaza Strip as a result of Israel’s mission to free the 240 hostages seized that fateful day and, simultaneously, attempt to destroy Hamas completely.

It was an intentionally long opening sentence to this article, but it is one which has probably already riled some readers who struggle to brand Hamas a terrorist organization or, on the flip side, have little empathy for the Palestinians killed or forever scarred by the brutality of war. There may be even a few (precious few, I hope) conspiracy theorists out there, as there were post-9/11, who even question whether the October 7 attacks even happened.

This map of the Israel-Palestine shows the Gaza strip on the Mediterranean Sea and the West Bank area by Jordan. The aviation industry and other transportation modes face a number of distinct challenges since the October 7 Hamas attacks on Israel and the subsequent Israeli response.
This map of the Israel-Palestine shows the Gaza strip on the Mediterranean Sea and the West Bank area by Jordan. The aviation industry and other transportation modes face a number of distinct challenges since the October 7 Hamas attacks on Israel and the subsequent Israeli response.

And therein lies one of the challenges facing the aviation community — amongst many other global industries — as we bring together people with divergent viewpoints on a highly emotive conflict. Like LinkedIn — pre-October attempting to remain a professional networking site yet now rife with hate speech on all sides — we have to consider what the Israel/Gaza (or Israel/Palestine) war means for the passengers we fly, the routes we operate, the staff we employ and the cargo we transport. This is a conflict that can, and already has, impact the good order and discipline on board aircraft … and worse.

The aviation industry, alike other transportation modes, faces a number of distinct challenges. At the disruptive, yet legal, incident end of the scale, we are witnessing airport-based protests — by both pro-Palestinian and pro-Israeli groups — who are concerned about the way in which the industry directly or indirectly facilitates the movement of weapons. Airports have, after all, increasingly become the stages for political expression regarding topics as diverse as the climate crisis, human trafficking, asylum-related issues, labor pay and governmental corruption. In the middle of the scale, we have aggressive behaviour taking place in our terminals or within aircraft cabins where those with different perspectives are clashing with each other and where we are witnessing blatant Islamophobia and antisemitism. Further along our continuum, there are specific acts of violence, as occurred in Dagestan (more later), where people and facilities are targeted by mobs; such actions have the potential to cause serious injury or even death. Finally, we cannot ignore the potential for the anger, senses of injustice, hopelessness and frustration experienced by many (I have to reiterate, on all sides) to lead to the very worst kind of acts of unlawful interference with civil aviation we traditionally exert our energies on preventing.

Addressing the topic, it’s nigh on impossible to avoid being political, so let me tackle the elephant in the room head-on — my own viewpoint. I’m not going to take you on a potted history of the conflict; you can find that elsewhere and, if we’re honest, most people will, as with the news channels they elect to view, read the history as related by those they empathize with the most. In an era of soundbite communication fueled by the anonymity afforded us by social media platforms, opinions are aplenty and the truth is hard to find. The reality is that we face a challenge of two peoples with legitimate concerns about their security and, indeed, very existence. Even if you don’t believe that one side’s claims are legitimate, the people on the ground are a reality. Israel does exist as an independent state and the Palestinians should, likewise, have a homeland. Bottom line, I still passionately believe in the two-state solution, even if that may incur the wrath of those towards the right of the Israeli, or even western, political spectrum, or the condemnation of those who cannot bring themselves to acknowledge Israel’s right to continued existence at all.

Responsibility and Rhetoric

All of us operating within the industry need to ensure that we are on the side of good order and discipline regardless as to our own viewpoints. It’s a challenge. The media certainly haven’t got it right and are blatantly causing upset to people on both sides with the imagery they show and the rhetoric they use. Sometimes we might not even appreciate the sense of injustice words or focus can cause. For example, those supporting the Israeli narrative condemn the BBC for failing to brand Hamas a terrorist organization — even though the British government regards it as such — and are frustrated that all coverage of the humanitarian disaster in Gaza on Al Jazeera is captioned “Gaza Genocide”; the words “terrorist” and “genocide” are politically charged, rarely devoid of bias and are clearly debatable. Both sides seize the opportunity to inject the word “Nazi” into their description of their opponents, exactly as is the case in the war between Russia and Ukraine. Those empathizing more with the Palestinian side express disgust with the extent of the media’s coverage of the trauma the Israeli families of the 240 hostages are going through, and consider their pain completely disproportionate to that endured by an entire displaced population wondering whether they will live to see the next day as the Israeli bombardment continues. We need to be sensitive to the perspectives of those we serve and we need to police the operation to ensure that our customers and service providers do likewise. The advantages are twofold — the prevention of conflict on board aircraft and the potential identification of insiders working amongst us who may be expressing sentiments which should be sounding the alarm bells.

Shown here is a child’s bedroom covered in blood at the Kfar Aza Kibbutz, after the October 7 Hamas attacks.Uploaded image from footage taken by the first responders unit, Kfar Aza, Israel with UploadWizard.
Shown here is a child’s bedroom covered in blood at the Kfar Aza Kibbutz, after the October 7 Hamas attacks.Uploaded image from footage taken by the first responders unit, Kfar Aza, Israel with UploadWizard.

For years, those of us who have taught aviation security have referred to the actions of the Palestinian groups of the 1960s to 1980s as terrorist attacks. I recall, when interviewing Leila Khaled in Jordan regarding her active participation in two hijackings (TWA, 1969, and El Al, 1970), that her only precondition for our meeting was that any report I wrote would not brand her a terrorist. I let people form their own opinion. Interestingly, that’s the BBC stance today regarding Hamas.

In order to avoid workplace conflict, we need to exercise caution in, and recognize the dangers of, convoluting words and terminology. Muslims are not the same as Arabs, Palestinians are not the same as Hamas, and Israelis are not the same as Jews. Any glance at social media, sadly including professional networks, will demonstrate that we’ve a long way to go. A failure to do so in this context directly feeds Islamophobia and antisemitism which is particularly worrisome for those operating in cosmopolitan environments.

I write as a Londoner. Whilst most British people are rightly upset by the images they see of Gaza on their TV screens, there are those who struggle with the de-Christianizing and de-whitening of their society and worry about the implications of mass immigration from predominantly Muslim nations. That latent racism amongst a small but significant minority was, I believe, one of the reasons why the nation, by the slenderest of majorities, voted for Brexit (exiting the European Union).

In the meantime, the U.K.’s Jewish community is also experiencing hate at unprecedented levels. The Community Security Trust (CST) reported on December 6 that in the 61 days since October 7 they had, “recorded at least 1890 antisemitic incidents across the U.K. This is the highest ever total reported to CST across a sixty-one-day period.” For comparison, “CST recorded 301 antisemitic incidents over the same 61 days in 2022. This means that we have seen an increase in anti-Jewish hate acts of 528% this year compared to the same period last year.” The U.S.A. is no different with the Anti-Defamation League announcing — also on 6 December 6 — that it had recorded a 337% increase in incidents over the same period in 2022. The relevance — our aircraft are a microcosm of society and increases of hate crimes on the ground, whoever they are directed at, can result in an increase in unruly incidents in the air.

Palestinians inspect the damage following an Israeli airstrike on the El-Remal area in Gaza City on October 9, 2023. Image by Palestinian News & Information Agency (Wafa) in contract with APAimages.
Palestinians inspect the damage following an Israeli airstrike on the El-Remal area in Gaza City on October 9, 2023. Image by Palestinian News & Information Agency (Wafa) in contract with APAimages.

In terms of this conflict, there appears to be a readiness to tarnish all with the same brush. By no means do all Muslims support Hamas and nor do all Israelis support Israeli government action; just like not all Americans support either Trump or Biden and not all British people wanted to leave the European Union. Many are aghast at what their governments stand for. Our security briefings need to weed out any inherent generalizations we carelessly may include.

Failure of Leadership

Whilst the Israeli/Palestinian conflict is long-standing and October 7 was clearly not the beginning, the events of that day were a game-changer and there are many lessons to be learned. Let’s start with the fact that it was a security failure of unimaginable magnitude.

I hope that we will eventually learn the details of the intelligence purportedly shared with Israel prior to the attack and why it wasn’t treated with the degree of seriousness it warranted. Israel has long been regarded as having the gold standard of security both operationally and in respect of its processing of intelligence; this image was shattered. The scale of the snafu was one thing, but the simplicity of the attack should also serve as a lesson to us all.

We ensure the security of our airports through the deployment of checkpoints and fences; these offer little protection if they are attacked by large groups of armed individuals. And this was demonstrated at Makhachkala Airport in the Russian republic of Dagestan on October 29 this year.

Sickening scenes of hundreds of pro-Palestinian, antisemitic protestors storming the airport rapidly went viral on social media. Their target was a Red Wings aircraft arriving from Israel — or rather the passengers on board. This was no peaceful protest — the mob, carrying Palestinian flags and shouting “Allahu Akbar” broke through doors in the terminal and stormed onto the tarmac. One has to question whether any airport is staffed and equipped to repel such as action, yet every security manager should be re-examining their contingency plans for managing such an incident. Many will have already rehearsed scenarios to counter the threat posed by environmental groups, such as Extinction Rebellion, aiming to paralyze an airport’s ability to operate.

Protests

The right to peaceful protest may be one we are keen to preserve, although I have long been concerned that permitting such action at airports can distract the security services from their primary responsibility of ensuring that aircraft and their users are able to operate safely and securely.

Pro-Palestinian groups have already carried out a number of protests at European airports.

On November 14, Schiphol Airport in Amsterdam became the target of a group protesting the Dutch government’s role in supplying arms to Israel. They were chanting, “From the river to the sea, Palestine will be free,” which takes us back to the issue of rhetoric.

In our soundbite world, where issues — often laudable ones — become trendy, we must exercise even greater caution. I’ve already stated that I yearn for an indepe≠≠≠ndent Palestinian state, so I do believe in a “free Palestine”. But the Free Palestine movement’s catchphrase “From the river to the sea” does seemingly negate Israel’s right to exist and implies conquering the entire Holy Land. Is an airport really the right place for such aspirations to be uttered?

Meanwhile, in Dublin, activists occupied the European Commission offices in the city to both protest military arms being flown to Israel via Shannon Airport (in the west of Ireland) and against Ursula von der Leyen’s (president of the European Commission) solidarity visit to Israel.

It was a pro-Israeli group of demonstrators who decided to make their voices heard at Miami International Airport on December 3. They were protesting Qatar Airways being able to operate to the USA given the relationship between the Qatari government and Hamas.

Freedom of Dress

Expressions of political affiliation in the air have the potential to be more serious than those on the ground, where law enforcement is available to police an organized event and respond to excesses should they occur.

In the U.S., there were a number of inflight outbursts between Republicans and Democrats both in the aftermath of Donald Trump’s election as President and, in January 2021, pursuant to the Capitol Hill riots. Some of these were instigated by the clothes people wore – the “Make America Great Again” cap being a particular trigger for some, simple badges identifying voting allegiance for others. Likewise in the U.K. during the Brexit campaign.

On November 28 this year an American Airlines flight was operating a domestic route from New York JFK to Phoenix when a flight attendant noticed a passenger wearing a sweatshirt emblazoned with the word “Palestine.” The man was asked to remove the sweatshirt and wear it inside-out in order to minimize the potential for either offense to be caused to other passengers or, for some, paranoia to set in. There was no argument on board, rather an upset individual feeling silenced by the crew, albeit his humiliating experience has since been championed by the American-Arab Anti-Discrimination Committee.

These are very real challenges. After all, if wearing a Palestinian shirt or emblem is unacceptable, then presumably so should wearing an Israeli flag on one’s clothing? But if that is the case, there are a whole list of countries whose flags could anger others on board. Should Russians and Ukrainians be allowed to? And a Kurdish passenger may well be upset by somebody donning clothing with the Turkish flag. One could almost say that no flags or emblems should be tolerated as someone might be upset!

Freedom of dress can be controversial, delicately situated at the intersection between human rights and public morality. But there is little doubt that the xenophobia that exists, even within the security services that serve transportation.
Freedom of dress can be controversial, delicately situated at the intersection between human rights and public morality. But there is little doubt that the xenophobia that exists, even within the security services that serve transportation.

Coincidentally, I was travelling on a train in Bangkok a week ago when I was appalled to see probably the single most offensive T-shirt I have ever witnessed. I can’t write here the actual wording, but it used the most derogatory word in the English language to describe Jesus. I certainly hope that no aircrew would ever permit that shirt to be worn on an aircraft.

Other Conflicts

The plight of the Palestinian people should not be under-estimated, but it is strange how the eyes of the world are fixated on this conflict in particular. For sure, the imagery emanating from Gaza is agonizing to watch and we are simply not seeing anything like that scale of destruction anywhere else. But that doesn’t mean that death tolls elsewhere are not staggering to comprehend.

People are not taking to the streets of capital cities to campaign for the rights of other oppressed groups. I mentioned the Kurds earlier. Despite the thousands killed in their conflict with Turkey and ongoing air strikes (240 Kurdish locations reportedly hit by Turkey in 2022), the streets of European cities remain free from mass protest.

In March this year, the Syrian Network for Human Rights (SNHR) announced that it has documented, “the deaths of 230,224 Syrian civilians, including 15,272 who died due to torture, in addition to the arbitrary arrest/enforced disappearance of 154,817 others, while roughly 14 million citizens have been displaced.” Last year, the Middle East Monitor reported that the Syrian regime of Bashar al-Assad and its allies had been responsible for around 91% of deaths since the start of the conflict. Concern expressed by a few, but no flag waving.

There have been relatively few — and are currently a declining number of — pro-Ukrainian demonstrations condemning Russian military action. Nor for the Rohingyas of Myanmar. According to the United Nations, “860,000 Rohingya refugees are living in settlements across Bangladesh’s Cox’s Bazar district. Most of them, some 740,000, fled from Myanmar during the most recent displacement crisis in 2017. Other countries in the region host some 150,000 Rohingya refugees.” Darfur was topical for a while and, despite an August 2023 United Nations report accusing China of committing abuses that might be considered crimes against humanity against Uyghurs and other Turkic communities in the Xinjiang region, it remains just that — a report.

The Democratic Republic of Congo is host to one of the most significant ongoing catastrophes, yet it receives next to no airplay. The United Nations highlights that, “More than 6.2 million people are displaced within the country and more than one million Congolese have sought asylum, mostly within Africa. At the same time, the DRC hosts more than half a million refugees from neighboring countries.” And since this October, hostilities have increased and the plight of the population has worsened.

Yemen has, according to UN figures, 21.6 million people requiring some form of humanitarian assistance as a result of eight years of conflict in which the Houthis are trying to take control of the entire country. But the world observes in silence. The Houthis, being supporters of Hamas, launched a Qader missile strike on the Israeli port of Eilat on October 31 this year; it was destroyed by Israel’s Arrow missile-defense system. The incident is described by many as the first shoot-down of a ballistic missile outside of Earth’s atmosphere and is, therefore, the first recorded combat ever to take place in space. Most of the threat posed by the Houthis has been directed at maritime interests and, on December 12, they hit — but did not destroy — a Norwegian vessel they claimed was heading towards Israel.

The arguably excessive focus on Israel and Gaza is partially down to the access to social media, and presence of journalists (at great personal risk) in Gaza when compared to the other conflicts listed (except Ukraine). Ships at sea can be targeted but stories of executions, beheadings, and rapes at a music festival, and in the surrounding communities, or the plight of Palestinian women and children dying in their thousands have greater media appeal. But perhaps the West perceives the lack of peace between Israel and the Palestinians as a threat to their own societies … or, perhaps to be more accurate, illustrative of the potential threat to their own societies?

The examples listed, I should stress, are not designed to detract from the humanitarian disaster in Gaza, rather they are directed at a security industry audience who have to react to the unsung conflicts of the globe as well.

Profiling

I have been an ardent supporter and promoter of profiling, but completely reject racial profiling. There is little doubt that the xenophobia that exists within the security services of many states can extrapolate into discriminatory action. No community has experienced this more than those who follow the Muslim faith. For that reason, in training, I try, wherever possible, to use examples of attacks perpetrated by a broad range of adversaries; the attempt is to avoid stereotyping the threat.

Then again, no faith has been a greater victim of Islamist actions than Muslims themselves.

Muslim nations are equally concerned about the actions of groups such as Hamas and so are many religious councils. Indeed, in March this year the Islamic Fatwa Council issued a fatwa decreeing that “Hamas bears responsibility for its own reign of corruption and terror against Palestinian citizens within Gaza” and that it was prohibiting people “to pray for, join, support, finance, or fight on behalf of Hamas — an entity that adheres to the ideology of the Muslim Brotherhood movement”. And, in respect of the Muslim Brotherhood, they define their ideology as being, “The Islamist, violent, terroristic belief system and charter that advocates for the establishment of a global Islamist caliphate by all means necessary.” They even issued a charge sheet that many would have expected to be drafted by the Israeli government rather than an Islamic court.

Again, it all boils down to not tarnishing people with the same brush. The problem is not Islam per se, rather the extremist elements.

And they exist in Israel too. For the past year Israeli society has been divided by the election of a government that, as a result of coalition-building, includes some extremist characters that the majority of Israelis struggle to accept as being suitable to serve in Benjamin Netanyahu’s cabinet. The country has been tearing itself apart as large numbers of civilians have been protesting reforms to the judiciary.

Ben-Gurion Intl. Airport in Tel Aviv, shown here, is considered one of the world’s most secure airports. Sarah Stierch image.
Ben-Gurion Intl. Airport in Tel Aviv, shown here, is considered one of the world’s most secure airports. Sarah Stierch image.

Many believe that the internal divisions within Israeli society were one reason why the October 7 attacks were “successful” — the government had its eyes on internal challenges, including the protection of illegal settlements in the West Bank. These outposts are often “home” to religious vigilantes who believe that they have a biblical claim to the territory in which they reside. The more extremist members of this community are associated with the ‘Price-Tag’ movement whose guerilla attacks on local Arab villages deserve condemnation, yet the more extreme elements of Netanyahu’s government not only support them but openly encourage them to bear arms, officially in order to protect themselves.

Worst-Case Scenarios

From an aviation security perspective, the possibility of an aircraft hijacking perpetrated by suicidal terrorists, a marauding firearms attack at an airport, the bombing of an aircraft or the shooting down of an aircraft in flight cannot be ignored. Complacency is not an option, nor is a failure of imagination.

It’s easy to focus all our attention on conflict zones. Unsurprisingly, despite the success of the Iron Dome interception system, most overseas carriers suspended their operations to Israel within days of October 7; many have since resumed operations. According to the Israel Defense Force, by 5 December Hamas had fired 11,000 rockets towards Israel, 3,500 on the first day of the current period of hostilities.

On December 10, video footage emerged of an Arkia Airlines flight landing at Ben Gurion International Airport amid a barrage of missile attacks emanating from Gaza; some of the video was filmed by passengers on board. The airline has, throughout the conflict, continued to operate flights between Tel Aviv and Eilat.

Conclusion

Whatever your opinion is regarding the current conflict, and regardless as to whether you are advocating for a ceasefire, humanitarian pause or continued military action, the threat to aviation remains ever-present. The greatest threat is posed by Islamist groups, just as they have in the past, prepared to sacrifice the lives of the innocent and even themselves for their cause. Whilst we need to remain vigilant to all types of actions that can disrupt our operations, from unruly passengers through to suicidal terrorists, we now need to be extra alert to the insider threat. It is more than likely that there are some industry employees who, in light of the images they are witnessing and spurred on by the rhetoric and fake news of social media, could somehow justify actions that are incompatible with the goals of the aviation security industry — to ensure all passengers, all crews, all airports and all aircraft are safe from action that could have catastrophic results.

Philip Baum is visiting professor of aviation security at Coventry University, the managing director of Green Light Ltd., and the former editor of Aviation Security International. In 2021, he was presented with a Lifetime Achievement and Contribution to Aviation Security award by Emirates Group Security and Edith Cowan University. He is the chair of both Behavioral Analysis 2024 and DISPAX World 2024. He can be contacted at pbaum@avsec.com

Understanding the Security Challenges of Mass Evacuations

Understanding the Security Challenges of Mass Evacuations

The large-scale movement of Palestinians away from Israeli troops advancing into Gaza is just the latest of many mass evacuations to occur in human history. A case in point: According to the United Nations High Commissioner for Refugees (UNHCR), more than 6.2 million people have fled from the conflict in Ukraine (as of July 2023). Millions more have left their homes — sometimes en masse, other times based on individual initiative — due to conflicts in Syria, the Tigray region of Ethiopia, Myanmar, Afghanistan, and Yemen, among others.

In this article, Transport Security International will look at the security issues associated with mass evacuations in particular, drawing on documents from the Norwegian Refugee Council, the UNHCR, and the Australian Government’s Attorney-General’s Department. We will also tap into the real-life experience of Osprey Flight Solutions, which handles aviation risk management. Our goal is to give TSI readers a sense of the security issues associated with managing mass evacuations, given the increasing possibility that some of them may be faced with such a challenge sometime in the future.

What an Evacuation Is, and Why People Do It

According to the Evacuation Planning Handbook published by the Australian Attorney-General’s Department (part of its Australian Disaster Resilience handbook collection), “Evacuation is a risk management strategy that may be used to mitigate the effects of an emergency on a community. It involves the movement of people to a safer location and their return. For an evacuation to be effective it must be appropriately planned and implemented.”

The circumstances in which both individual and mass evacuations occur are central to what makes them so risky from a security standpoint. In both instances, people are only leaving because they see no other way to protect themselves and their families in their homes, due to the conflict, violence and chaos raging around them. It is this trifecta of danger from hostile players that makes these evacuations so dangerous, and security of paramount importance — assuming that it can be enforced at all.

“Evacuations are one of the most delicate operations in a crisis environment,” said the Norwegian Refugee Council (NRC) document, ‘Considerations for Planning Mass Evacuations of Civilians in Conflict Situations’. “While an evacuation can provide an immediate, lifesaving intervention in the face of an imminent threat, evacuations also carry substantial risks and the dilemmas they evoke can be significant. If humanitarians are faced with implementing an evacuation it means all other options have failed. Siege environments (where evacuations are most likely to be needed) are one of the most difficult operating contexts for humanitarian agencies and the process of evacuating can pose dangers for the affected population and humanitarians alike.”

Managing End-to-End Security Risks

For a security official tasked with protecting people in a mass evacuation, the dangers to be dealt with begin when the evacuation is being planned, and only end when the evacuees have arrived safely at a secure destination where they are being housed, fed, and properly protected.

If at all possible — and in war zones such an “if” can be difficult to achieve — the security official needs to identify areas of potential risk and take steps to deal with them before evacuation begins.

For a mass evacuation even to be feasible, there has to be a consensus among all of the parties involved in the conflict — including aid agencies — that such a movement of people can be executed safely and without interference. “If even one organization raises concerns about the rationale for the evacuation, partners should take this seriously and review (even if only quickly) the logic demanding the evacuation,” said the NRC document. “Critically, it is important to identify who is calling for the evacuation: is it the affected persons themselves? Humanitarians? The authority or state? [And] Are there potential alternative motivations driving them?”

This last reservation is worth heeding, because “some stakeholders may call for an evacuation (and even support it directly) in order to be seen to be doing something about a crisis” the NRC document warned. “This desire to be seen to do something can lead actors to call for an evacuation before the evacuees or humanitarians have even decided an evacuation is necessary.”

Internally displaced Syrians including children at a refugee camp near the Turkish border in Atmeh, Syria.
Internally displaced Syrians including children at a refugee camp near the Turkish border in Atmeh, Syria.

Assuming that a mass evacuation has been chosen as the preferred course of action, every step of the process needs to be mapped out to identify security risks. This includes everything from who is allowed to evacuate and how they will be screened to eliminate “bad actors”, to where the evacuees will assemble, how they will be transported (often in some form of vehicular “convoy”), what provisions will be made to feed and protect them en route (including medical support), where their final destination will be, and how they will be taken care of there and for how long.

Key Concerns To Plan For

The business of ensuring security during mass evacuations is an extremely complex and often dicey matter. This TSI article will not pretend to be able to authoritatively identify all of the threats a security official needs to watch out for — but we can highlight some key concerns to plan for.

Now, the task of identifying people to be evacuated and preparing them to leave is best left to professional humanitarian aid agencies. Where the security official needs to step up is in ensuring the safety of transportation to and from the staging sites, plus perimeter and access security. Of key concern is whether or not hostile players may take advantage of such a mass gathering to stage terror attacks designed to inflict maximum casualties — such as the August 26, 2021, suicide bombing near Kabul’s international airport that killed 183 people during the West’s retreat from Afghanistan. There is only so much that anyone can do to prevent/deter such attacks, but all possible security steps should be taken nevertheless.

Once the mass evacuees have been readied for transportation — often on buses and/or trucks — ensuring security along the convoy’s route is a top priority. Again, achieving this goal can be very difficult, particularly if the convoy is moving through territory held by those hostile to the evacuees. “Obtaining reliable guarantees from the parties to the conflict to permit safe evacuation of civilians across the frontlines is a challenge, particularly where the parties to the conflict are using civilians as pawns,” said the UNHCR document, ‘Humanitarian Evacuations’. “Even small-scale attempts to evacuate civilians sometimes require arduous negotiations before the warring parties allow the evacuees to leave.”

Even when mass evacuation negotiations have been successfully concluded, “Humanitarian actors should undertake contingency planning for eventual breaches of agreements on safe access and passage by parties to the conflict,” the UNHCR document advised. “Meticulous forward planning will be critical to minimize potential loss of life and any other risks to the civilian population and humanitarian staff.”

Meanwhile, no matter what ceasefires have been arranged to permit the convoy’s safe passage, security officials should assume that trouble will occur and prepare for it as best they can.

“Regardless of the preparations or negotiations that take place in advance of an evacuation, it is possible that the convoy may come under attack,” warned the NRC document. “There is little concrete advice that can be offered on how to manage such a situation, as it will vary significantly by context and by the nature of the attack. The best thing that can be said is to discuss how an attack will be managed prior to departing on the evacuation … Human rights monitors should ideally be present in all evacuations, but this is particularly true if humanitarians feel that there is a risk of part of the convoy being stopped, diverted or having individuals detained.”

Armed Escorts: Yes or No?

In theory, the risk of a mass evacuation convoy being attacked can be mitigated by it being accompanied by armed escorts. However, unless these escorts have enough firepower and depth to successfully deter/repel attacks along the entire route without provoking hostile players, relying on them may not be a good idea.

“In particularly dangerous environments, humanitarians may feel that there is a need for armed escorts to accompany an evacuation convoy,” the NRC document observed. “The use of armed escorts can carry significant risks however, and at times can actually increase the dangers to the convoy if the escorts are not perceived as neutral. [As such] Humanitarians should make every effort to negotiate safe passage so as to avoid having to use an escort and should only resort to an escort when all other alternatives have been ruled out.”

The Need for a Safe and Secure Refuge

So far, we have touched on the security concerns of assembling and moving people safely in mass evacuations. But these concerns do not disappear once the evacuees arrive at their destination unless that location is truly a safe, secure, and well-equipped refuge.

For this to happen, “An evacuation center should be a safe and secure place for meeting the basic needs of people away from the immediate or potential effects of an emergency,” said the Australian Attorney-General’s document. “While the arrangements across jurisdictions will vary, the primary function should be to address basic human needs and support requirements.”

These needs include essentials such as adequate food, water, shelter and medical care; adequate aid personnel to assist and secure the mass evacuees; and a location that — while accessible to mass evacuees — is at “a safe distance from hostilities, besieged or hostile areas as well as border areas.”

All of these elements should be part of consultations with persons of concern and negotiations with the host government and relevant non-state armed actors, who must remain the guarantors of the physical security of the evacuated populations.

Osprey’s Experience

Osprey Flight Solutions’ mission is to “enable systematic risk management,” said the company’s website. “On their own, data, technology and human analysts cannot deliver objective, consistent and dynamic risk management. But by bringing these essential components together — hundreds of thousands of reliable data sources, an industry-leading analysis team, and a proprietary software package to seamlessly fuse them together — we enable operators, governments and regulatory bodies to truly understand the broad spectrum of risks facing each and every flight and thus the global aviation network.”

In recent years, Osprey has provided risk management services to clients fleeing Afghanistan in 2021 and Sudan in 2023. These included detailed strategic analysis of the aviation situation under the names, “Afghanistan: Analysis of the post-war aviation operating environment” and “Sudan Conflict: Osprey’s analysis of the impacts on aviation.”

Even after the event, both documents make for compelling reading. Take Afghanistan in 2021: “The presence of armed conflict within Afghanistan coupled with heightened levels of crime, social unrest and aviation infrastructure deficits pose logistical constraints to civilian flight operations within the country,” wrote Matthew Borie, Osprey chief intelligence officer. “In addition, the threat of militancy posed to aviation within Afghanistan is highlighted by recent attacks against airports and aircraft inflight. Afghanistan does not meet International Civil Aviation Organization (ICAO) standards for safety, and the security posture at airports in the country varies considerably. Security personnel are unlikely trained to the highest international standards, and staff responsible for safeguarding airport operations likely face severe difficulties in handling significant aviation-related safety or security events.”

Then there’s Sudan in 2023, following the outbreak of armed conflict in April of that year. “Rerouting of civil aviation overflights away from both FIR Khartoum (HSSS) and FIR Juba (HJJJ) is likely to persist in the near team amid the ongoing armed conflict in Sudan between the RSF [paramilitary Rapid Support Forces] and Sudanese Army,” wrote Osprey Aviation security analyst Sean Patrick. “Operators should remain prepared for an ongoing loss of access to Sudanese and South Sudanese airspace for overflights of FIR Khartoum (HSSS) and FIR Juba (HJJJ) until a ceasefire is reached between the Sudanese Army and RSF, or until adequate ANS [air navigation service] provision can be re-established by the authorities in Sudan.”

Reflecting upon these and other volatile situations, Osprey Fight Solutions’ CEO Andrew Nicholson said, “The fact is that any evacuation, whether due to natural disaster or conflict, is extremely difficult and fraught with challenges, logistical and security … The level of confusion, stress, anger, fear and desperation that is felt by those on the ground puts huge pressure on evacuation routes to be less than perfect in their screening. At the end of the day — and having done this operationally, I know the feeling well — those coming in to actually effect the evacuation are desperate to get everyone out. The feeling of doing your bit to protect the citizens of your nation is almost overwhelming. This feeling is extremely difficult to suppress and can, if unchecked, lead to corner-cutting in order to get as many people out as quickly as possible.”

Three Conclusions

TSI’s research into mass evacuations, as explained by experts in this field, has led us to the following three conclusions:

First, due to the difficult circumstances they are typically conducted in, mass evacuations are inherently risky and insecure. As such, every contingency must be examined by security officials with respect to such operations, guided by the assumption that what can go wrong, will go wrong.

Second, security must be considered at every single stage of a mass evacuation. Every element — from identifying and assembling evacuees through transport and eventual arrival at the destination — entails risks due to hostile players.

Finally, although trust is necessary to broker mass evacuations, trust is frequently broken by players who perceive an advantage in deception and deceit. As such, security officials handling mass evacuations must be prepared to cope when this occurs, to keep evacuees as safe as possible when the proverbial hits the fan.

The Insider Threat of Mental Health Problems in Aviation

The Insider Threat of Mental Health Problems in Aviation

The air traffic control recording was chilling: “We’ve got the guy that tried to shut the engines down out of the cockpit…. I think he’s subdued,” radioed the pilot of Horizon Air flight 2059. The Embraer EMB-175 (see graphic 1) diverted to Portland, Oregon, instead of its intended destination of San Francisco. Once on the ground, law enforcement officials confirmed just how close a 44-year-old off-duty Alaska Airlines pilot — Joseph Emerson — came to bringing down a commercial aircraft with 83 souls on board this past October.

Graphic 1 – The Embraer EMB-175, operated by Horizon Airlines and in Alaska Airlines livery. The medium-sized airliner can seat 80 passengers.
Graphic 1 – The Embraer EMB-175, operated by Horizon Airlines and in Alaska Airlines livery. The medium-sized airliner can seat 80 passengers.

Emerson (see graphic 2) was commuting back home and was authorized to ride in the cockpit jump seat like any airline pilot — a common practice in the industry. He made casual conversation with the crew during the flight before suddenly throwing his headset across the cockpit, announcing “I am not OK,” and grabbing the two red T-shaped “fire handles” on the cockpit ceiling (see graphic 3) meant to shut down the engines in an emergency. To fully activate the system, the handle must be first pulled down, which cuts off fuel, electrical power, and hydraulics to the engine. Twisting the handle then releases halon gas inside the engine to smother a fire. One of the pilots quickly grabbed Emerson and reset the handles. The airline reported that residual fuel remained in the lines, and the quick reaction of the crew restored the fuel flow. The crew then subdued Emerson and got him out of the flight deck.

Graphic 2 – Alaska Airlines pilot Joseph Emerson with his wife Sarah Stretch.
Graphic 2 – Alaska Airlines pilot Joseph Emerson with his wife Sarah Stretch.

Just four days before this disturbing event, another pilot — Jonathan J. Dunn — was indicted and charged with interfering with a flight crew over an incident that occurred during a Delta Air Lines flight in August 2022. Dunn, who was the first officer, threatened to shoot the captain after a disagreement over diverting the flight to take care of a passenger with a medical issue. Dunn was authorized by the Transportation Security Administration (TSA) to carry a gun under a program created after the September 2001 terror attacks and designed to safeguard the cockpit from intruders. The Federal indictment stated that Dunn “did use a dangerous weapon in assaulting and intimidating the crewmember.” Dunn has since been fired, and his gun was taken away.

Graphic 3 – The EMB-175 cockpit, as viewed from the jump seat. The two fire handles can be seen at the top of the photo as the two red rectangular handles.
Graphic 3 – The EMB-175 cockpit, as viewed from the jump seat. The two fire handles can be seen at the top of the photo as the two red rectangular handles.

These incidents have renewed the debate about psychological screening of pilots, which initially began in 2015 when First Officer Andreas Lubitz (see graphic 4) locked the captain out of the cockpit of a Germanwings Airbus A320 before intentionally ramming it into the French Alps, killing all 150 people on board (see graphic 5). According to the final report, the copilot started to suffer from severe depression in 2008. In July 2009, and each year thereafter, his medical certificate continued to be renewed. About a month before the crash, a private physician recommended the copilot receive psychiatric hospital treatment due to a possible psychosis, but no aviation authority was informed.

Graphic 4 – Germanwings pilot Andreas Lubitz
Graphic 4 – Germanwings pilot Andreas Lubitz

The State of Play of Pilot Mental Health Assessments

The “insider threat” has always been a significant concern with regard to aviation security. The Federal Aviation Administration’s (FAA) regulations require airline pilots to undergo a medical exam by an Aviation Medical Examiner (AME) every six months. The AMEs are trained to determine the pilot’s mental health and fitness to fly. While this process provides a means to vet airline pilots, it relies largely on trusting pilots to volunteer information about their mental health.

Graphic 5 – The wreckage from Germanwings flight 9525, an Airbus A320 that was intentionally crashed into the French Alps on March 24, 2015.
Graphic 5 – The wreckage from Germanwings flight 9525, an Airbus A320 that was intentionally crashed into the French Alps on March 24, 2015.

Pilots are required to disclose during their medical exam any medications they take and whether they have depression, anxiety, drug, or alcohol dependence. They are also required to report any doctor visits during the previous three years and all medical history on their FAA medical application form. This form includes questions about mental health. Based on the answers on the form and the examination, an AME may ask further questions about mental health conditions or symptoms. The AME can request additional psychological testing, or defer the application to the FAA Office of Aerospace Medicine if he or she is concerned that further evaluation is necessary (see graphic 6).

In addition, commercial airlines often have their own mental health screenings and requirements, and they conduct background checks on prospective pilots. Many airlines – such as Alaska Airlines — have also established pilot peer programs to encourage pilots to talk to other pilots about their problems. Apparently, these efforts are not foolproof in preventing these types of incidents.

Previous Events and a Common Thread

Over the past decade, there have been at least seven airline events in which a flight crewmember was suspected of having intentionally crashed the aircraft, or attempted to do so (see graphic 7). Three of these events occurred in the U.S. or involved a U.S. air carrier. When looking further back three decades, these types of events were less frequent, but equally dramatic. Perhaps the most dramatic occurred in April 1994, when FedEx Flight 705 was hijacked by an off-duty jump seat rider. Facing possible dismissal for lying about his reported flight hours, FedEx pilot Auburn Calloway (see graphic 8) boarded a scheduled cargo flight as a deadheading pilot with a guitar case carrying hammers and a speargun. After a bloody battle with the flight crew, the airplane was able to land safely. Five years later, First Officer Gameel Al-Batouti (see graphic 9) intentionally crashed Egypt Air flight 990, a Boeing 767, into the Atlantic Ocean shortly after takeoff from New York’s John F. Kennedy Airport. All 217 people on board were killed.

Graphic 8– FedEx pilot Auburn Calloway boarded a scheduled cargo flight in 1994 as a deadheading pilot with a guitar case carrying hammers and a speargun. After a bloody battle with the flight crew, the airplane was able to land safely.
Graphic 8– FedEx pilot Auburn Calloway boarded a scheduled cargo flight in 1994 as a deadheading pilot with a guitar case carrying hammers and a speargun. After a bloody battle with the flight crew, the airplane was able to land safely.

Security expert Tom Anthony, a former FAA division manager for Civil Aviation Security who is now the director of the University of Southern California’s Aviation Safety and Security Program (see graphic 10), worked on the EgyptAir 990 case, and studied the FedEx flight 705 event. It was no surprise to him when he heard the testimony of family and friends about Joseph Emerson, the pilot involved in the recent Horizon Air flight 2059. The media reported that Emerson’s neighbors were “shocked” that he was involved in the incident, and that he is “a loving husband and father” to his two young sons. Emerson’s wife Sarah Stretch told reporters that her husband, “…never would’ve knowingly done any of that …That is not the man that I married.” She said she knew her husband was struggling with depression but was shocked over his arrest.

Graphic 6 – The FAA Airman Medical Certification Process
Graphic 6 – The FAA Airman Medical Certification Process

“The number one precondition is severe depression,” Anthony explained. He said that each one of us has three personas: (1) the “social self” that we share with the public, friends, and colleagues; (2) the “personal self” that we share only with our spouse or closest family and friends, and (3) our private “secret self,” which we share with no one. It’s that “secret self” that can be difficult to identify.

Graphic 10 – Security expert Tom Anthony, a former FAA division manager for Civil Aviation Security who is now the director of the University of Southern California’s (USC) Aviation Safety and Security Program. He is shown here examining wreckage at the UAS Aviation Accident Laboratory in Los Angeles.
Graphic 10 – Security expert Tom Anthony, a former FAA division manager for Civil Aviation Security who is now the director of the University of Southern California’s (USC) Aviation Safety and Security Program. He is shown here examining wreckage at the UAS Aviation Accident Laboratory in Los Angeles.

Anthony says that a probable factor in the rise of these events is the lack of social support. “The internet has had a huge impact … it has led to a lot more time in isolation.” In addition, he says “the internet allows people to indulge in their private side … kind of a “mal-private self.”

Graphic 9 – Gameel Al-Batouti was a pilot for EgyptAir. On October 31, 1999, he and 216 passengers and crew on board EgyptAir Flight 990 were killed when it crashed into the Atlantic Ocean after departure from New York’s John F. Kennedy Airport.
Graphic 9 – Gameel Al-Batouti was a pilot for EgyptAir. On October 31, 1999, he and 216 passengers and crew on board EgyptAir Flight 990 were killed when it crashed into the Atlantic Ocean after departure from New York’s John F. Kennedy Airport.

He explained that Callaway from the FedEx, Lubitz with Germanwings, and Al-Batouti all had previous incidents “that were ignored or not captured.” All displayed symptoms of depression such as insomnia, unwillingness to engage in normal conversations, and other common indicators.

“We have to acknowledge that mental conditions can be hazards … just another hazard that needs to be identified and mitigated,” he said. “We need to find better ways to “identify behaviors that point to hazards.”

Anthony also believes that the current shortage of airline pilots is another factor that is exacerbating the problem. Pilots that are being hired do not have as long resume with former companies in which background checks can be performed. Also, there has been a marked decrease in the number of pilots that have military backgrounds. There is “less opportunity to know them,” explained Anthony.

Mitigating the Risk of Suicide by Aircraft

The Germanwings tragedy highlighted the importance of monitoring airline pilot psychological health. As a result, the FAA chartered a Pilot Fitness Aviation Rulemaking Committee in 2015 to assess methods used to evaluate and monitor pilot mental health and to identify possible barriers to reporting concerns. The final report concluded that “the best strategy for minimizing the risks related to pilot mental fitness is to create an environment that encourages and is supportive of pilot voluntary self-disclosure.”

The report also noted, “Early identification of mental fitness issues leads to better results.” The committee offered recommendations including the use of pilot assistance programs and stated that when a culture of mutual trust is created, pilots are less likely to conceal conditions and more likely to seek help for mental health issues. This is similar to the work that the airline industry successfully performed in the 1990s to remove the stigma around alcoholism.

To its credit, the FAA responded to the committee’s recommendation on a number of fronts. During the last several years, the FAA has invested in more resources to eliminate the stigma around mental health in the aviation community so that pilots seek treatment. This includes: increased mental health training for medical examiners; support of industry-wide research and clinical studies on pilot mental health; hiring additional mental health professionals to expand in-house expertise and to decrease wait times for return-to-fly decisions; completed clinical research and amended policy to decrease the frequency of cognitive testing in pilots using antidepressant medications, and; increased outreach to pilot groups to educate them on the resources available

The FAA asserts that it is a misconception that if you report a mental health issue, you will never fly again. In fact, the FAA states that only about 0.1% of applicants for a medical certificate who disclose health issues are ultimately denied a medical, and then only after an exhaustive attempt to “get to yes.”

A New Push for Answers

In response to this issue, the National Transportation Safety Board (NTSB) hosted a “Summit on Pilot Mental Health” this past November. The agency’s chair, Jennifer Homendy, has been a vocal critic about the issue. “There’s a culture right now, which is not surprising to me, that you either lie or you seek help,” said Homendy during the forum. “We can’t have that. That’s not safety.”

Homendy called for some form of an amnesty period from the FAA where pilots who have experienced issues can discuss their situation openly without fear of repercussions. “We are all human,” Homendy said. “Who hasn’t among us faced some sort of crisis in our lives? We expect pilots will be some superheroes and continue on as if nothing’s happened in our lives … Everyone is in need of help at some point.”

The day before the NTSB Summit, the FAA announced that it was appointing another Rulemaking Committee to examine pilot mental health “to provide recommendations on breaking down the barriers that prevent pilots from reporting mental health issues to the agency.” The committee will include medical experts and aviation and labor representatives, and will build on previous work the FAA has done to prioritize pilot mental health. In addition, the FAA will work with the committee to address open recommendations from a July 2023 audit report from the Department of Transportation Office of Inspector General (OIG) regarding pilot mental health challenges.

The DOT OIG report confirmed that the FAA’s ability to mitigate safety risks is limited by pilots’ reluctance to disclose mental health conditions. Primary factors that discourage pilots from reporting are the stigma associated with mental health, potential impact on their careers, and fear of financial hardship.

The DOT OIG report also asserted that it is imperative that the FAA continue to address barriers that may discourage pilots from disclosing and seeking treatment for mental health issues. Also, a continued focus on this issue from the FAA and industry stakeholders could improve mental health outcomes for airline pilots and enhance the FAA’s ability to mitigate safety risks.

The Drone Threat to Airports, and Ways to Counter It: A TSI Roundtable

The Drone Threat to Airports, and Ways to Counter It: A TSI Roundtable

As drones become increasingly popular with the public, their intrusion on airport airspace is becoming an increasingly serious problem. To find out what can and is being done to counter the airport drone threat, Transportation Security International (TSI) sat down with two experts in a virtual roundtable. Jeffrey Starr is chief marketing officer with D-Fend Solutions, a global provider of counter drone solutions for sensitive and challenging environments. Leo McCloskey is vice president of marketing with Echodyne, whose radar equipment can be used to detect and track drones.

TSI: Just how serious is the threat of drones impinging on airport airspace?

Jeffrey Starr: First, the physical safety risk is significant. Studies have shown that common commercial drones with heavy payload capacity can cause severe damage to aircraft, including shattered windshields, penetration and inhalation hazards, and lost optics. Ultimately such collisions could require emergency landings.

Even at slow speeds, such collisions could cause plastic damage and extensive deformation to aircraft skin, as well as additional damage to internal structures. At high speeds, collisions could cause severe deformations of slat curvature, damage to the leading edges, and even possible penetration of drone debris into the fractured area.

The implications and economic impact are enormous, as reflected in grounded flights, missed connections, angry passengers, and lost revenues. Indeed, the after-effects of a drone incident can lead to serious consequences and substantial financial costs. Therefore, rogue drones operated by the criminal, careless or clueless create many challenging situations for airports.

Looking at use cases or scenarios; it’s not only routine airport operations that are affected by drone intrusions, but also special situations such as a special event or VIPs traveling, whereby the airport might have to take special precautions against hostile drones, beyond the normal threat to operations.

Jeffrey Starr D-Fend Solutions
Jeffrey Starr
D-Fend Solutions

Drone threats to airports are not just a routine safety issue. The threat is very dynamic, and airports must prepare for different scenarios depending on its unique traffic flows and day-to-day operational life.

Leo McCloskey Echodyne
Leo McCloskey
Echodyne

Leo McCloskey: Given the heavy use of aircraft to move people about, anything that jeopardizes the safety of the national airspace system (NAS) is unwelcome. Luckily we’ve had few actual collisions but we are just a bit of bad luck away from a serious incident.

It’s not just the threat from unwanted or intruding drones, though. It’s also about how drones are integrated into the NAS. Without knowing what good drone behavior looks like, determining bad intent is practically impossible. This state of alertness without actual information about drones causes anxiety, which only elevates the risk to the NAS..

TSI: What examples of such incidents can you tell us about?

Jeffrey Starr: Drone sightings and incidents around airports have increased significantly in recent years. Since the beginning of 2023 alone, there have been serious drone incidents at many airports including Edinburgh, Madrid, Palm Beach, Warsaw, Pittsburgh, Frankfurt, and famously, multiple incidents in Dublin, just to point to a few.

At Edinburgh, flight departures were disrupted and delayed due to an unauthorized drone near the runway. A drone also caused delays at Madrid-Barajas Airport when it was spotted by an incoming flight from Paris.

In Palm Beach, a pilot reported a drone right off the side of an aircraft. Flights have also been suspended at least six times since January at Dublin Airport, causing the diversion of flights to other airports.

In Warsaw, an airplane pilot reported seeing a 3-meter-long UAV flying within 30 meters of an LOT Embraer aircraft as it was landing at Chopin Airport.

Operations at Pittsburgh International Airport were suspended for approximately 30 minutes due to reports of an unauthorized drone sighting on the northern section of the airfield.

A drone sighting at Frankfurt Airport caused flight cancellations and delays, including a 40-minute complete shutdown and 20 canceled flights.

These are just some selected recent representative examples of many that have occurred this year alone.

TSI: Why is this happening with drones? What are the range of motives for people flying drones into protected airspace?

Leo McCloskey: There are roughly three types of drone operators.
What we’d want to be the largest type is the licensed and well-behaved drone operator that follows regulatory guidelines for things like RemoteID.

The second type are those that fly with abandon, without really thinking about rules and regulations. Whether a daredevil or simply confused, drone flight outside the norm is always a risk. Not because of malicious intent, just because of risk and probabilities over time.

The final type of drone operator is the bad actor using the drone with intent, whether delivering contraband to prisons or small explosives to jet fueling areas. We need to protect about types two and three and focus our worry and concern on type three..

Jeffrey Starr: As drones proliferate with increased popularity, greater ease of use, and cheaper prices, the likelihood of incidents near airports rises and the risk they pose to airports grows increasingly higher.

There are diverse types of threats. A careless user causing a collision is the most discussed. But more malicious kinds of threats could include an actual attack by a bad actor, or surveillance or espionage, where malicious actors may attempt to observe an airport for potential future violations.

TSI: What options exist for detecting and intercepting drones?

Leo McCloskey: Detecting is different from tracking, which is very different from identifying and then intercepting.

There are many options to accomplish the task. The minimum requirement is at least two sensors that combine to provide detection through identification, typically radar and optical. The most important component of any system, though, is the command-and-control software layer that harnesses the best of all sensors to deliver comprehensive situational awareness.

Jeffrey Starr: There are multiple technologies that can be deployed to help, but what we must consider with airports is that they are an extremely different sensitive environment compared with the surroundings where traditional legacy counter-drone technologies emerged from, namely the military battlefield.

To understand this problem better, it’s important to examine the multiple functions of detection, identification and mitigation.

The risks associated with a drone at airports have caused many airports to start evaluating options for effective and specialized counter-drone technologies that are suitable for the unique and sensitive environments of an airport. However, reaching the desired levels of airspace safety in the context of increasing rogue drone activity has proven to be particularly challenging, since legacy military technology countermeasures have serious issues in a civilian airport environment.

Counter-drone technologies originating from the military realm have performed well in the environment for which they were originally designed. However, when they enter the sensitive airspace of a civilian airport, many glaring shortcomings become apparent.

For drone detection, radar has played a role for a long time, but in an airport environment radar may generate false positives from not always being able to clearly distinguish between a drone and other flying objects such as birds.

Optical camera-based systems for identification require a clear line of sight, which can be difficult in urban environments or hilly terrain. Acoustic methods are challenged by noisy airport environments and increasingly quiet drones.

Traditional radio frequency (RF) based methods such as directional finders may not be able to locate and track the drone to the highest degree of precision.

More importantly, the challenges are even more steep when considering mitigation, especially when again looking at countermeasures that came from the military sector.

Jamming could be prohibitively problematic to a sensitive airport environment, given the possibility for disruption to communications and operations. It’s also temporary by nature, and the rogue drone pilot could regain control when jamming ceases.

Any type of kinetic/physical mitigation method involving shooting some sort of projectile at the drone, carries with it the serious risk of collateral damage, either from the projectile itself or the downed drone and resulting debris.

TSI: What role does your company’s product play in countering the drone threat, and who is using them today?

Leo McCloskey: Radar is the foundation sensor for nearly every counter-unmanned aircraft system (C-UAS), and we make a very high performing radar at commercial prices without military export controls (ITAR). Our radars are used by dozens of C-UAS systems, DOD/MODs, and policing agencies.

Jeffrey Starr: We are pioneers in a new-generation category of C-UAS, namely RF Cyber. RF (radio frequency) cyber technology can help combat the dangers posed by the growing number of rogue drones flying close to or over airports.

All the challenges associated with legacy C-UAS technologies are the reason why we advocate for an approach based on what we call “cyber detection and takeover mitigation,” where the technology can detect communications between the pilot’s remote control and the drone and ultimately, if desired and necessary, and if allowed and performed by authorized personnel, to take over the rogue drone.

With this approach, not only can such technology perform detection in ways that traditional technologies cannot, but, more importantly, major advantages can come into play during mitigation, especially versus the legacy technologies of jamming and kinetic.

Jamming disrupts the communication between the remote control and the drone but brings challenges because it can also disrupt communications of nearby technologies, and its temporary nature is limiting. Kinetic means of shooting down the drone are obviously not optimal in an airport environment because of the huge potential for collateral damages.

RF Cyber takeover represents a safer and more optimal technology because it allows for continuity, potentially preventing a potential incident from becoming an actual incident while allowing airport operations to continue.

TSI: What are the hurdles confronting airports and their suppliers in the use of counter drone technology?

Jeffrey Starr: The technology challenge is to constantly develop and enhance with innovations that can stay ahead of drone technology and develop and update countermeasures as new drone technologies advance, in a never-ending game which combines cat and mouse with leapfrog.

Market and user education is also critical as brand-new UAS and C-UAS technologies emerge since operators come from using traditional technologies. While there is an education process, the good news is that innovative technology such as D-Fend’s EnforceAir is quite easy to operate for qualified security professionals, who become fluent in it quite quickly.

Another challenge is dealing with the unique parameters of each individual airport. C-UAS implementations must conform to each local environment, as there may be legal and regulatory issues in terms of which security agencies can do detection and mitigation. Solutions must adapt to each environment, according to their local requirements and regulations.

Leo McCloskey: The primary obstacle is that interfering with any aircraft operation is illegal. A drone is an aircraft and, therefore, any mitigation activity is illegal. The legal and regulatory framework for detecting bad actors in the airspace is unprecedented territory for regulatory agencies. It will take time.

TSI: What new, more aggressive options are being developed to counter drone intrusions, and how close are they to becoming reality?

Leo McCloskey: There are novel methods, such as high-powered energy weapons, for interdicting rogue drones. The challenge is less technical and far more legal and regulatory.

Jeffrey Starr: Policymakers, regulators, security agencies, and airport operators around the world have been taking steps to deliver strong messages that operating unauthorized drones near airports is illegal, and could lead to financial penalties, criminal charges, and even imprisonment.

An understanding is emerging that during what may be transitory periods for airports, an ideal solution could encompass both passive detection to raise the airport’s situational awareness, with a migration path to eventually extend to also include full, seamless, simple, and safe mitigation capabilities, as policies and regulations permit.

The new-generation counter-drone technology, RF Cyber, is showing promising results for airports for both detection and mitigation. RF cyber-detection solution is showing agility, providing airport security personnel with the ability to quickly adapt.

Unlike various legacy anti-drone technologies, new generation RF cyber-detection detects and tracks both authorized drones and rogue drone threats, providing situational awareness along with a rich set of capabilities, including accurately tracking drone location, home location, and drone operator location.

The system understands the unique identifiers of each drone. Once a drone is classified as ‘authorized’, it would be labelled as such and be allowed to fly undisturbed in defined areas. The ability to distinguish between authorized and unauthorized drones would ensure continuity for drones performing essential functions at the airport. Airport security staff can choose how to utilize the information to contend with the risk and achieve optimal operational continuity.

When permitted by local regulations and policies, and performed by authorized security agency staff, RF-cyber takeover mitigation capabilities can be activated.

Detecting and, when permitted, mitigating the rogue drone threat quickly and efficiently can help maintain safe airport operations. Such a system could assert control over rogue drones and land them safely in a designated zone, as allowed by regulations and performed by the authorized personnel.

Airports could be empowered to detect threats without excessive burden on human resources, disrupting communications systems, or damaging existing infrastructure.

These cyber counter-drone systems must include stationary configurations specially designed for the unique requirements of airports, with enough long-range coverage for airport deployments to protect the airports’ airspace. The sensors must protect the approaching and takeoff air corridors. The hardware should be designed to withstand any extreme environmental conditions of the airports’ location.

Airport security, safety and continuity would be further facilitated by preventing the drone pilot from regaining control over the hostile or rogue drone, thereby smoothly mitigating the threat. Airport authorities could receive preventative alerts while providing crucial data — such as drone takeoff and pilot remote control locations, so authorities can deal with specific flights and dispatch appropriate personnel.

jet landing with drone

TSI: Finally, is the drone intrusion problem likely to become more serious in the future? If yes, then should airport authorities plan to become more proactive in addressing it? Will they need their own counter-drone force to knock these drones down?

Leo McCloskey: As soon as a tragic accident involving a drone occurs, this will become a very serious issue. Let’s recall what happened after September 11, 2001, — the entire airline industry was grounded for days in one of the largest markets in the world. What do you think will happen if a drone causes a tragic incident?

Jeffrey Starr: Certainly, as airport traffic and capacity grow alongside a proliferation of drones, the problem will grow more severe and dangerous. This combination increases the potential for risk and the potential demand for this kind of technology to be able to take over in those situations.

Having said that, new-generation technology such as RF Cyber is not anti-drone, on the contrary. These enable the new drone economy, so it’s especially important that more sophisticated technologies emerge, which for example can distinguish and identify between a friendly authorized drone and a hostile unauthorized one.

It’s becoming increasingly clear that sensitive airport environments will benefit from advanced and innovative defenses against rogue drones that are also themselves focused on safety and control. Technology should also conform and evolve with current regulations and be future-ready as regulations rapidly evolve to confront the recognized threat.

Airports rely on uninterrupted operations. A new generation of RF cyber detection and mitigation technology could help assure that airport operations continue to run as usual. Continuity prevails as flights, communications, security, and everyday life in the protected airport area proceed smoothly.

Raising Security Training Standards to Improve Preparedness in an Evolving Security Landscape

Raising Security Training Standards to Improve Preparedness in an Evolving Security Landscape

Preparedness facilitates greater alertness of threats to security through continuous assessment of evolving risk, robust and repetitive training and routine practice, as well as clear escalation and response procedures, and ongoing quality assurance.

As new, and often unpredictable terrorist tactics emerge, it is imperative that the security industry evolves with the changing security landscape where high-volume public spaces and transport networks have become a prime target for terrorist attacks designed to achieve maximum notoriety. Industry should support working collaboratively towards setting standards for the effective application of security measures and processes in large public spaces and transport infrastructure, underpinned by rigorous and certified training standards, practices and outcomes.

Leading the way is aviation security, reinforced by a mandated syllabus and quality assurance framework that is overseen by the Civil Aviation Authority (CAA), with performance and quality-based metrics. The robustness of aviation security training processes enables better preparedness across a broad range of threats and vulnerabilities with a capability that is standardized and reliable in its delivery of threat mitigations which are repeatedly assessed to be assured of their effectiveness.

Aviation security trainers are certified by City & Guilds or are required to have a Certification Instructor Number (CIN) validated by the CAA, but this level of certification is not yet pan-sector wide. Outside of aviation security training, quality assurance is not framed in legislation and in many cases by any form of directive. Without a requirement for academic or vocational qualification, many organizations employ trainers without certification of theoretical study and practical experience of an accredited syllabus. Alarmingly, some security trainers are wooed by available courses that allow them to breeze through within a short timeframe, leaving them ill-equipped to provide effective protection.

The public should have the assurance that security personnel have been trained to the highest standard to deliver the outcomes of accredited knowledge transfer confidently and effectively. Furthermore, after initial training, periodicity of assessment and refresh are crucial to maintain readiness for action and the required level of protection.

Behavior Detection Awareness

Industry has a duty to analyze training needs more effectively to enable more robust delivery and better preparedness.

Behavior detection awareness skills play a significant role in achieving preparedness of security personnel in high footfall spaces and infrastructure. The ability to detect unusual behavior, such as individuals working later or starting earlier than normal, someone carrying a bulging rucksack or someone who looks nervous, jumpy in a public area, is crucial to prevention activity.

All personnel who encounter people, are located close to vehicles, or sit behind a CCTV camera, should undergo behavior detection awareness training (as a minimum) to help mitigate risk. The training hones observation skills to identify potential hostile reconnaissance, preparatory assessments, dry runs or approaches to an attack, and sharpens an individual’s instincts to share suspicions with their superiors. Behavior detection awareness training can be provided at low cost and implemented at pace, yielding high impact results to reduce risk and to better protect the public.

A higher level of behavior detection training can be provided for security staff to become behaviour detection officers with the necessary tools and skills to respond swiftly. By shifting the security sector mindset to be pre-emptive and prepared, threats can be identified and intercepted to prevent activity escalating to catastrophic effect.

Working with Technology

As technology advances, increasingly sophisticated security equipment is being deployed in airports but across critical national infrastructure and spaces that attract high volumes of people security equipment is largely limited to expensive CCTV systems.

No matter how advanced the CCTV system is, the user must be fully trained in the use and aims of equipment and its capabilities. CCTV cameras can act as a deterrent, and images can be used as evidence post-event, but it is unfeasible for the user to have eyes on ten CCTV screens all at once, to notice suspicious behavior that is caught on just the one camera, and then act to intercept.

An advanced CCTV camera system can be programmed to spot irregularities to the pattern of life, such as a large crowd of people moving at one mile per hour on the concourse of a city train station. If a camera spots a static item or someone running, the camera will bring these to the user’s attention, but it cannot make the decision to respond or act. Therefore, users need to have the knowledge, skills and behavior to respond to whatever has triggered the technology, because if it is left unmanaged, the consequences could be lethal.

Without investing in knowledge transfer and response skills through proper training, a high-tech system can provide a false sense of security. In a trained environment, the user behind the camera will report the trigger to a behavior detection officer, who is trained to escalate an interceptive response.

To better protect people in large public spaces, pan-sector, the security industry needs to take control of the standard of training input to control the standard of output. The more inadequate the training, the more serious the consequences and therefore it is critical that training input does not merely skim the surface and tick a box.

Quality Assurance

Quality assurance of security through covert and overt testing aims to obtain a clear picture of security effectiveness and to quickly identify any failing mitigation.

Embedded within an organization’s established systems and processes, covert testing serves to identify gaps in measures and procedures, and to provide recommendations for improved preparedness.

Paul Mason

If businesses and organizations are paying millions of pounds for security equipment, resources and complex operations, they must be confident of the return on investment and that the security provision will mitigate the risks it is designed to identify.

Deployed in the aviation industry, Security Management Systems (SeMS) provide airports with the means to identify and address security threats, gaps and weaknesses in a consistent and proactive way, such that people can be confident that security practices are effective and quality assured.

In 2021, the UK Civil Aviation Authority (CAA) published a whitepaper outlining the importance of incorporating SeMs into the daily operations and culture of an airport. With mandatory SeMs on the horizon, airports should be looking at holistic, digital SeMs that can provide an error-free and clear picture of all security activities, from tasks, audits, training, employee background and more, to improve risk management and quality assurance.

To add another layer of quality assurance, Redline Assured Security is pioneering a synthetic testing service to enable frequent assessment of airport security screeners in high numbers. Qualitative testing of entire cohorts of screeners in a simulated environment means training programs on emerging threats can be rolled out at speed. Whilst effective for smaller operations, covert testing allows for a comparatively reduced number of screeners to be trained on-site at once, providing only a sample insight into screener performance and their confidence in identifying and acting upon threats.

airport security

Working Collaboratively

It should be without question that security trainers or training organizations can be relied upon to deliver effective programs that are aligned with outcomes to prevent or mitigate risk and threats. Sub-standard training results in less than acceptable detection, deterrence and response procedures, which can result in criminal activity escalating into the lethal space.

As an industry, we have a duty to enforce better management of quality assurance frameworks across the entire security eco-system so that the buyer is assured of continuous improvement of meaningful inputs, aligned to analyzed objectives, to ensure the right outcomes first time.

About Paul Mason

Paul Mason is managing director for Redline Assured Security, part of Air Partner Group, a Wheels Up company. With over 25 years of aviation experience, Paul was at the helm of Redline from inception in 2006 to acquisition by Air Partner in 2019, guiding Redline from a concept through to the internationally acclaimed security training, consultancy, and quality assurance company that it is today. The division offers an unmatched range of products and services spanning all aspects of safety and security, training, consultancy, quality assurance and innovative software products to cater for the needs of tomorrow’s threats and risks as well as big data handling, live data analytics and real-time threat and risk management.

www.airpartnergroup.com

www.trustredline.co.uk

The Airline Industry Needs Better Cybersecurity — Here’s Why

The Airline Industry Needs Better Cybersecurity — Here’s Why

In the modern era of technology, convenience and efficiency have become paramount, especially when it comes to travel arrangements. With the ease of online booking, sharing airline booking numbers and last names has become common practice, but what may seem like an innocuous act unfortunately can actually lead to a severe security vulnerability that still needs addressing.

Avani Desai

Airline booking numbers, often referred to as Passenger Name Records (PNR), are unique identifiers assigned to each flight reservation. These alphanumeric codes, along with the traveler’s last name, are routinely shared through various means, such as email invitations, shared calendars, and messages with friends or colleagues.

Most people are unaware of the potential risks associated with sharing this sensitive information, but in this blog, we’ll explore this unsettling security issue surrounding airline booking numbers and the lack of authentication that allows unauthorized individuals to make changes to your flights — something that could lead to potential disruptions of your life and even financial losses.

How Airline Booking Numbers Can Be a Gateway To Unauthorized Flight Modifications

These consequences are not hypothetical — I’ve personally witnessed them within my own family.

It was a beautiful summer day in Seattle when I found myself visiting my sister’s cozy home for a much-awaited family reunion. Though we were all excited to spend time together, as I stepped into her living room, my sister greeted me with a slightly troubled expression on her face.

“You won’t believe what I just did,” she exclaimed, looking a bit flustered. When I asked what had happened, she began to narrate the incident with a sigh.

Earlier that day, she’d decided to make a minor modification to her upcoming flight with British Airways, and like many others, she turned to the internet for the airline’s contact details. She landed on what she thought was British Airways’ official website and quickly found a toll-free 800 number — without pausing to double-check the website’s authenticity, she dialed it and was greeted by a pleasant voice claiming to be a representative from British Airways.

Oblivious to the potential danger that lurked ahead, she proceeded with her intention to modify. The “representative” asked for her booking number, her last name, and then the shocking request for her credit card information.

“That’s when I started feeling something was off,” she confessed. “I mean, why would they need my credit card details to make a simple flight change?”

Listening to her story, I immediately sensed the gravity of the situation. It was evident that she had stumbled upon an imposter posing as British Airways’ customer service, though she’d been lucky — having realized that she might be caught in a potential scam, she wisely hung up the phone before any further damage could be done.

However, the story didn’t end there. The scammer on the other end, displeased with her decision to terminate the call, took spiteful action. Without a second thought, they maliciously canceled her non-refundable ticket to Europe, leaving her distressed and baffled. She promptly contacted British Airways’ official customer service, and to her surprise, they informed her that the cancellation had been done online, and she had initiated it herself.

“That’s impossible,” she argued. “I didn’t cancel it!”

As no one else in her household had access to her personal information, it became clear that someone else had manipulated her booking and caused the cancellation. As we delved deeper into the situation, it dawned on us that her personal information must have been compromised during that seemingly innocent phone call to the fake customer service number — the imposter had cleverly gathered the necessary details to access her account on the official website and make the sinister alteration.

The Potential Consequences of Security Flaws in the Airline Industry

My sister’s unfortunate experience not only served as a cautionary tale but also got me thinking about the larger security issue that travelers face due to the lack of proper authentication methods employed by airlines.

While my sister was lucky to escape worse consequences, that lack of robust authentication in the airline industry allowed someone with malicious intentions to easily exploit what they did manage to gather from her, leading to unauthorized access and unauthorized changes to her flight.

It’s a significant security flaw that, by obtaining your booking number and last name, malicious actors can gain the power to manipulate your travel plans without your knowledge or consent — what’s worse is that this also opens the door to a range of other unsettling possibilities:

• Flight Changes: Unscrupulous individuals can modify your flight details, altering the date, time, or destination without your knowledge — imagine arriving at the airport only to find out your flight has been rescheduled, causing undue stress and inconvenience.

• Flight Cancellations: In a worse scenario, hackers can cancel your flight altogether. This could lead to missed events, important meetings, or once-in-a-lifetime opportunities.

• Identity Theft: Airline booking numbers, when combined with personal information, can be exploited to commit identity theft, leading to more severe consequences beyond flight modifications.

• Financial Loss: Unauthorized modifications can result in extra fees, penalties, or the loss of non-refundable tickets, leaving travelers with a financial burden they did not anticipate.

How to Improve Cybersecurity in the Airline Industry

To protect their customers’ sensitive information and provide peace of mind to travelers, the airline industry must acknowledge and address this glaring security issue — here are some baseline (yet essential) steps that airlines and booking platforms should implement to get started:

• Two-Factor Authentication: Implementing two-factor authentication (2FA) would add an additional layer of security, requiring users to verify their identity through a second method such as a one-time code sent to their mobile device.

• Encryption and Tokenization: Robust encryption and tokenization techniques can help safeguard sensitive data like booking numbers and personal details from unauthorized access.

• User Education: Airlines should boost awareness among travelers regarding the potential risks associated with sharing booking numbers and last names — and thereby promote responsible sharing practices.

• Regular Security Audits: Conducting routine security audits and vulnerability assessments will help identify and rectify potential weaknesses in the booking systems.

Security Standards Suitable for the Airline Industry

Regarding the final point about audits, there are a few standards that can help airlines and booking services shore up this security flaw, as well as other vulnerabilities that may be lurking in industry cyber defenses:

NIST Cybersecurity Framework (CSF): A set of guidelines and best practices designed to measure and track maturity as an organization grows and its threat landscape evolves; implementing and being assessed against the NIST CSF can improve your critical infrastructure so that you can better manage and reduce cybersecurity risk.

PCI DSS: Whereas the NIST CSF takes a broader scope of your cybersecurity, PCI DSS concerns itself particularly with the controls you have in place to protect payment card data and its environment from unauthorized access or use, of which multi-factor authentication and encryption are requirements.

The airline industry is not unique in facing cyber threats, and these standards — and the third-party assessments that independently validate the efforts they require would be worth the investment as threats continue to grow more sophisticated across all sectors.

Moving Toward More Secure Air Travel

The ease with which airline booking numbers and last names are shared presents a serious security concern that must not be overlooked. As passengers, we must be vigilant and mindful of where and with whom we share our booking details, but airlines must also prioritize the implementation of robust security mechanisms to safeguard their customers and preserve the integrity of the travel experience.

Through the implementation of adequate authentication measures validated thoroughly by regular security audits, travelers will become less vulnerable to unauthorized flight modifications, cancellations, and potential identity theft, just as the airlines themselves will become less likely to suffer the negative consequences associated with customer dissatisfaction.

By raising awareness and taking necessary precautions, we can collectively ensure safer and more secure travels in the digital age.

About the Author

Avani Desai is a chief executive officer at Schellman, the largest niche cybersecurity assessment firm in the world that focuses on technology assessments. Ms. Desai is an accomplished executive with domestic and international experience in information security, operations, P&L, oversight, and marketing involving both start-up and growth organizations. She is a sought-after speaker as a voice on topics such as security, privacy, information security, future technology trends, and the expansion of young women involved in technology.