6 Oct The Tenth Edition of the ICAO Aviation Security Manual — Doc (Restricted) has been published in English, with all other ICAO language. Doc – 05 – Security Manual – Seventh Edition – Free download as PDF File AFS ASTPs ATS AVSEC BD CMT EDDS EDS EMT EOC EOD FCP ICAO IED. 30 Sep GMT icao security manual doc pdf – The ICAO. Aviation Security Manual. (Doc â€“ Restricted) assists Member States in implementing.
|Genre:||Health and Food|
|Published (Last):||6 November 2008|
|PDF File Size:||6.80 Mb|
|ePub File Size:||10.66 Mb|
|Price:||Free* [*Free Regsitration Required]|
Of particular security concern are aircraft that can carry large, bulky or heavy loads such as those used for fire lcao, construction or sky diving operations. Aircraft with unusual or unauthorized modifications. Additionally, specialty aircraft such as those used for agricultural application and insect control are of concern because of their potential for dispensing harmful aerosols.
Access control breach Theft or attempted theft of an aircraft Assault on an airport employee, tenant or transient persons Bomb threat Airport Community Watch Program The vigilance of airport users is one of the most prevalent methods of 89733 security at GA airports.
Aviation Security Manual (Doc – Restricted)
Yet, many more aircraft and flight crew members participate in general aviation and aerial work. Aerial work operations are defined by ICAO as operations used for specialized services such as agriculture, construction, photography, surveying, observation and patrol, search and rescue, aerial development, etc. Most GA aircraft are too small to pose a significant threat due to their inability to carry a sufficiently large quantity of explosives. When aviation security did arise as a serious issue in the late s, there was a need to adopt an international framework for addressing acts of unlawful interference.
What possible targets are available? But, any moderate sized airport, located within 50 km of a major metropolitan area may constitute an elevated threat due to the proximity of potential terrorist targets. Similarly, aerial work may only be generally defined as operations used for specialized services such as agriculture, construction, photography, surveying, observation 9873 patrol, search and rescue, aerial development, etc.
Further, in order for a small aircraft to have any impact careful loading and fusing of the explosives must be accomplished; these actions take time and expertise.
Local controls are normally associated with access to airports and airport operating areas. Without this activity essential transportation functions would be eliminated and the opportunities associated with them would be lost to the economies they potentially serve. A watch program should include elements icso to those listed below.
Security fences, locked hangars and operating area access controls serve as credible deterrents. GA airports may be as small as a meter grass runway and have no based aircraft, hangars, buildings or other infrastructure. It is essential that every airport employee, tenant, and user is familiar with reporting unusual or suspicious circumstances on airport property. Over the years, its work in the field of aviation security broadened and today is essentially carried out in three inter-related areas: Persons who present apparently valid credentials but who do not display a corresponding level of aviation knowledge.
Any pilot who makes threats or statements inconsistent with normal uses of aircraft. Encourage proactive participation in aircraft and facility security and heightened awareness measures. Persons wishing to rent aircraft without presenting proper credentials or identification.
This should include encouraging airport and line staff to ‘query’ unknowns on ramps, near aircraft, etc.
IAOPA Input for ICAO Security Manual (DOC 8973)
Elements of these analyses may include: Hold periodic meetings with the airport community. Policy work is focused primarily on maintaining the currency of Annex 17 and related guidance material such as Doca significant challenge considering the evolving nature of the threat.
Security and Facilitation News. Small remote airports pose a significantly lower threat than do larger more capable ones.
Yet, existing controls imposed at these airports to deter theft and vandalism are normally adequate to prevent misuse of the aircraft. Skip to main content.
Facility and aircraft security measures and procedures Background checks for certain types of employees Security training and knowledge requirements dov employees Compliance with security directives and information circulars Designation of a security coordinator Contingency and response plans Note: More significantly, the level of activity and geographic dispersion of these activities make effective enforcement by State forces very difficult.
The ability to control access to aircraft parking areas, hangars and handling facilities ixao normally prevent most unlawful acts associated with aircraft. This could include the use of a video or other media for training.
Consequently, new faces are quickly noticed. AW operations deemed to pose a significant threat should be required to establish and maintain a State approved written security program, incorporating the following provisions: Closely ddoc with security processes, facilitation matters are addressed by the Facilitation FAL Programmewhich is managed by the Facilitation Section.
With respect to security training, ICAO develops icak material on a range of topics for use by civil aviation administrations and a network of regional aviation security training centres. The ability for all personnel to react positively and rapidly may make the difference between a major security event and a minor administrative issue. GA operations icaoo non-commercial service airports will normally have fewer security controls applied due to the lower threat levels associated with those activities.
See Airport Community Watch Program Local controls are normally associated with access to airports and airport operating areas. Typically, the user population is familiar with those individuals who have a valid purpose for being on the airport property.
Threat and Risk Assessment The first step in devising a security program for a GA airport is to determine the type and size of threats facing the facility. The risk assessment should consider the following questions: These controls are normally applied sparingly to small areas to protect only the most important ground activities; enforcement of restrictions associated with large or numerous restricted areas is difficult.
Yet, size alone does not constitute an appreciable threat; if there are few based aircraft or annual operations, the threat will likely be small. For instance, the desire of the operator to protect aircraft and flight crew from harm or misuse closely matches the State’s desire to prevent misuse of the aircraft for more sinister purposes.