Encyclopedia of Security and Emergency Management

Living Edition
| Editors: Lauren R. Shapiro, Marie-Helen Maras

Airport Security: Procedures in Secured Areas for TSA and Private Security

  • Heather A. PanterEmail author
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-69891-5_2-1

Definition

This entry explores security procedures in secured areas of airports and how governmental and private sectors intersect. Procedures in airport security have to address threats in public/nonpublic areas, in perimeter airfield locations, and within terminals. Often the private sector, with governmental oversight, screens passengers, employees, baggage, and cargo in both secured and non-secured areas of the airport. Therefore, this entry will examine how both governmental and private security sectors regulate SIDA badge areas, credentialing systems, airport access control, airfield patrol functions, and perimeter security in secure areas of airports.

Introduction

Pre 9/11, private industry fulfilled a more substantial role in commercial transport security as airlines and airports relied solely upon private security contracts. Two months after 9/11, Congress enacted the Aviation and Transportation Security Act (ATSA), Public Law 107-71. This created the Transportation Security...

Keywords

Airport security TSA Security screening 
This is a preview of subscription content, log in to check access.

References

  1. Enders, W., Sandler, T., & Cauley, J. (1990). Assessing the impact of terrorist-thwarting policies: An intervention time series approach. Defence and Peace Economics, 2(1), 1–18.CrossRefGoogle Scholar
  2. Ergün, N., Açıkel, B. Y., & Turhan, U. (2017). The appropriateness of today’s airport security measures in safeguarding airline passengers. Security Journal, 30(1), 89–105.CrossRefGoogle Scholar
  3. Gabbidon, S. L., Higgins, G. E., & Nelson, M. (2012). Public support for racial profiling in airports: Results from a statewide poll. Criminal Justice Policy Review, 23(2), 254–269.CrossRefGoogle Scholar
  4. Grover, J. (2016). Aviation security: Airport perimeter and access control security would benefit from risk assessment and strategy updates. Washington, DC: United States Government Accountability Office. Accessed 22 Oct 2018.Google Scholar
  5. International Civil Aviation Organization. (2018). Aviation security manual [Doc. 8973]. Montreal: ICAO.Google Scholar
  6. Lum, C., Kennedy, L. W., & Sherley, A. (2006). Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology, 2(4), 489–516.CrossRefGoogle Scholar
  7. McLay, L. A., Jacobson, S. H., & Nikolaev, A. G. (2009). A sequential stochastic passenger-screening problem for aviation security. IIE Transactions, 41(6), 575–591.CrossRefGoogle Scholar
  8. Olivier, J. (2014). Airport perimeter security: Finding the right fit for your airport. Airport Magazine, 26(4), 10–12.Google Scholar
  9. Panter, H. (2013). Backscatter imaging and counterterrorism: An analysis of legal and privacy issues. NSU International Journal of Criminal Justice, VIII, 8–14.Google Scholar
  10. Price, J. (2018). The role of the private sector for air transport security. In J. Szyliowicz & L. Zamparini (Eds.), Air transport security: Issues, challenges and national policies (pp. 63–84). Cheltenham: Edward Elgar.CrossRefGoogle Scholar
  11. Price, J., & Forrest, J. (2016). Practical aviation security: Predicting and preventing future threats. Oxford: Butterworth-Heinemann.Google Scholar
  12. Rabkin, N. J., Berrick, C. A., & Keisling, C. (2004). Aviation security: Further steps needed to strengthen the security of commercial airport perimeters and access control. Report to congressional requesters. GAO-04-728. Washington, DC: United States General Accounting Office. Available at http://www.gao.gov/new.items/d04728.pdf. Last accessed September 2018.
  13. Salter, M. B. (2007). SeMS and sensibility: Security management systems and the management of risk in the Canadian Air Transport Security Authority. Journal of Air Transport Management, 13(6), 389–398.CrossRefGoogle Scholar
  14. Shanks, N. E., & Bradley, A. L. (2005). Handbook of checked baggage screening: Advanced airport security operation. New York: Wiley.Google Scholar
  15. Transportation Security Administration (TSA). (2006). Recommended security guidelines for airport planning, design and construction. Washington, DC: US Department of Justice.Google Scholar
  16. US Congress. (2001). Aviation and Transportation Security Act (ATSA) Public Law 107-71. 107th congress, 1st session.Google Scholar
  17. Wetter, O. E. (2013). Imaging in airport security: Past, present, future, and the link to forensic and clinical radiology. Journal of Forensic Radiology and Imaging, 1(4), 152–160.CrossRefGoogle Scholar

Further Reading

  1. Benny, D. (2013). General aviation security aircraft, hangars, fixed-base operations, flight schools, and airports. Boca Raton: CRC Press.Google Scholar
  2. Price, J., & Forrest, J. (2016). Practical aviation security: Predicting and preventing future threats. Oxford: Butterworth-Heinemann.Google Scholar
  3. Rabkin, N. J., Berrick, C. A., & Keisling, C. (2004). Aviation security: Further steps needed to strengthen the security of commercial airport perimeters and access control. Report to congressional requesters. GAO-04-728. Washington, DC: United States General Accounting Office. Available at http://www.gao.gov/new.items/d04728.pdf. Last accessed September 2018.
  4. Szyliowicz, J., & Zamparini, L. (2018). Air transport security: Issues, challenges and national policies. Cheltenham: Edward Elgar.CrossRefGoogle Scholar
  5. United States, Government Accountability Office. (2004). Aviation security: Preliminary observations on TSA’s progress to allow airports to use private passenger and baggage screening services: Report to the Chairman, subcommittee on aviation, committee on transportation and infrastructure, house of representatives. U.S. Government Accountability Office.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Centre for Advanced Policing StudiesLiverpool John Moores UniversityLiverpoolUK