Aviation and airport security : terrorism and safety concerns / Kathleen M. Sweet.
Considered the definitive handbook on the terrorist threat to commercial airline and airport security, Colonel Kathleen Sweet's seminal resource is now updated to include an analysis of modern day risks, as well an examination of the plethora of changes made to air security policies, practices,...
Saved in:
Online Access: |
Full Text (via Taylor & Francis) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
Boca Raton :
CRC Press,
©2009.
|
Edition: | 2nd ed. |
Subjects: |
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | b11612018 | ||
003 | CoU | ||
005 | 20220916050200.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 160914s2009 flua ob 001 0 eng d | ||
019 | |a 1260355977 | ||
020 | |a 9781439894736 |q (electronic bk.) | ||
020 | |a 1439894736 |q (electronic bk.) | ||
020 | |z 9781420088168 | ||
020 | |z 1420088165 | ||
035 | |a (OCoLC)tfe958799002 | ||
035 | |a (OCoLC)958799002 |z (OCoLC)1260355977 | ||
037 | |a tfe9780429252303 | ||
040 | |a CRCPR |b eng |e pn |c CRCPR |d OCLCO |d OCLCF |d OCLCO |d OCLCQ |d N$T |d NLE |d OCLCA |d OCLCQ |d UKMGB |d YDX |d OCLCQ |d K6U |d OCLCO |d SFB |d OCLCO | ||
049 | |a GWRE | ||
050 | 4 | |a HE9797.4.S4 |b S937 2009 | |
100 | 1 | |a Sweet, Kathleen M. | |
245 | 1 | 0 | |a Aviation and airport security : |b terrorism and safety concerns / |c Kathleen M. Sweet. |
250 | |a 2nd ed. | ||
260 | |a Boca Raton : |b CRC Press, |c ©2009. | ||
300 | |a 1 online resource (xxiii, 354 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a <P><STRONG>The Aviation Industry: A national security asset</STRONG></P><P>News</P><P>Importance of Air Transportation</P><P>Airways</P><P>Development of the Aviation Industry</P><P>Airlines</P><P>Facilities</P><P>Airway Routes</P><P>Deregulation</P><P>Consequences of 11 September to the Industry</P><P>Emergency Funding</P><P>Protecting Public Air Transportation</P><P>Conclusion</P><P>References</P><P><STRONG>The Historical Hijacking Threat and Government Response: A Persistent Problem</STRONG></P><P>News</P><P>Hijacking</P><P>Legal Responses to Expanding Security Measures</P><P>International Perspectives</P><P>The Trend Begins</P><P>Early Federal Aviation Regulations</P><P>Airport Security Programs</P><P>New Carrier Rules 1972</P><P>New Airport Operator Rules 1972</P><P>Resistance Fades</P><P>How to Implement the New Rules</P><P>Public Law 93-366</P><P>Dissemination of Threat Warnings</P><P>Recommendations of the President's Commission</P><P>Aviation Security Improvement Act of 1990</P><P>The Federal Aviation Reauthorization Act of 1996</P><P>Civil Aviation Security</P><P>Aviation Security Research and Development Division Costs</P><P>White House Commission on Aviation Safety and Security -- The Department of Transportation Status Report</P><P>Aviation and Transportation Security Act -- P.L. 107-71</P><P>Implementing Recommendations of the 9/11 Commission Act of 2007 (H.R. 110-1, P. L. No: 110-53)</P><P>The National Strategy for Aviation Security</P><P>The White House, March 26, 2007</P><P>Security Guidelines for General Aviation Airports</P><P>Transportation Security Administration, May 17, 2004</P><P>Conclusion</P><P>References</P><P><STRONG>International Solutions and Reactions</STRONG></P><P>News</P><P>Crimes Against Humanity</P><P>The Tokyo Convention</P><P>Hijacking Convention: Convention for the Suppression of Unlawful Seizure of</P><P>Aircraft</P><P>Montreal Convention</P><P>The Convention on the Prevention and Punishment of Crimes Against</P><P>Internationally Protected Persons</P><P>Bonn Agreement 1978</P><P>International Convention Against the Taking of Hostages</P><P>Tokyo Summit 1986</P><P>Further Efforts</P><P>Montreal Protocol of 1988</P><P>Diplomatic Conference on Air Law 1991</P><P>Convention on the Physical Protection of Nuclear Material 1980</P><P>G-7 Summit 1995</P><P>Lyon Summit 1996</P><P>Ministerial Conference on Terrorism 1996</P><P>Convention for the Suppression of Terrorist Bombings 1997</P><P>International Convention for the Suppression of the Financing of Terrorism 1999</P><P>United Nations</P><P>The International Civil Aviation Organization (ICAO)and The European Civil</P><P>Aviation Conference</P><P>Post July 2005 British Legislation</P><P>International Convention for the Suppression of Acts of Nuclear Terrorism</P><P>Conclusion</P><P>References</P><P><STRONG>Growth and Change: Aircraft As Missiles</STRONG></P><P>News</P><P>Early Criminal Hijackings</P><P>Terrorist Hijackings Spread</P><P>Initial Public Responses</P><P>Cockpit Doors</P><P>Passenger Photo IDs</P><P>Crew Training</P><P>Profiling</P><P>CAPPS II</P><P>Secure Flight</P><P>No Fly List</P><P>Sky Marshal Program, Federal Air Marshal Program</P><P>History of Significant Air Hijackings Since 1972</P><P>31 May 1972: Lod Airport</P><P>27 June 1976: Entebbe, Uganda</P><P>14 June 1985: Trans World Airlines Flight 847</P><P>21 December 1988: Pan American Flight 103</P><P>11 September 2001</P><P>Other hijackings in recent decades</P><P>Conclusion</P><P>References</P><P><STRONG>Terrorism: The Roots Remain</STRONG></P><P>News</P><P>Introduction</P><P>Causes of Terrorism</P><P>Middle East</P><P>Rival Claims</P><P>Palestinian Liberation Organization (PLO)</P><P>Abu Nidal</P><P>Hamas</P><P>Iranian Support of Terrorism</P><P>Hezbollah</P><P>Afghanistan: Usama Bin Laden</P><P>Europe</P><P>Germany</P><P>Italy</P><P>Spain</P><P>Northern Ireland</P><P>Japan</P><P>Aum Shinrikyo</P><P>Latin America</P><P>Tupac Amaru (MRTA)</P><P>Shining Path (Sendero Luminoso)</P><P>Russia</P><P>U.S. Domestic Terrorism</P><P>The Order</P><P>Nuclear Terrorism</P><P>A Dirty Bomb</P><P>Attack on Nuclear Power Plants</P><P>Diversion of Nuclear Material or Weapons</P><P>Biological and Chemical Warfare</P><P>Conclusion</P><P>References</P><P><STRONG>International Major Counter Terrorism Units, Law Enforcement, and Intelligence Agencies -- The best defense</STRONG></P><P>News</P><P>Introduction</P><P>CounterTerrorist Units</P><P>Austrian Special CountertTerrorist Intervention Unit</P><P>Canadian Armed Forces Joint Task Force 2</P><P>Great Britain: SAS</P><P>Germany: GSG-9</P><P>Israel: Sarayat Mat'Kal</P><P>Civil Guard</P><P>Border Guard Force</P><P>Ireland: Army Ranger Wing</P><P>France: Groupment d'intervention de la Gendarmerie Nationale (GIGN)</P><P>Spain: Grupo Especial de Operaciones (GEO)</P><P>United States: Special Forces Teams</P><P>Operation Ice Eagle</P><P>Local Law Enforcement</P><P>Training</P><P>The U.S. Customs Service</P><P>Customs and Border Protection Bureau</P><P>Drug Enforcement Agency</P><P>Federal Bureau of Investigation</P><P>The US Marshals</P><P>Department of Homeland Security</P><P>Transportation Security Administration</P><P>The Immigration and Naturalization Service, U.S. Citizen and Immigration Service</P><P>The Border Fence and The Real ID Card Program</P><P>9-11 Commission</P><P>Director of National Intelligence</P><P>The Intelligence Community</P><P>Terrorist Screening Center (TSC)</P><P>United States Postal Inspection Service</P><P>Interpol</P><P>Conclusion</P><P>References</P><P><STRONG>Screening -- the last line of defense</STRONG></P><P>News</P><P>Introduction</P><P>Sterile Concourse</P><P>Sterile Boarding Areas</P><P>Departure-Gate Screening</P><P>Screening Checkpoint Augmentation</P><P>Law Enforcement Officers at the Gate</P><P>Flexible Law Enforcement Response Program</P><P>Airport Categories</P><P>Public and Private Security Interface</P><P>Criminal Case Law Examples</P><P>United States versus James Edward Ware, U. S. District Court, Western</P><P>District of Oklahoma, August 1970</P><P>United States versus Feldman, U.S. District Court, Eastern District of New</P><P>York, 1 May 1969</P><P>United States versus Benrus Eugene Brown, United States District Court,</P><P>Western District of Texas, October 1969</P><P>Lawrence Havelock versus the U.S. Court of Appeals, Tenth Circuit June 1970</P><P>United States versus Reid 2003 (Shoe Bomber)</P><P>United States versus John Walker Lindh</P><P>Case Law Summary</P><P>Initial Screening</P><P>Screening Procedures</P><P>Screening Baggage</P><P>Threat Assessment</P><P>3-1-1 Rule</P><P>Screening Computers and Laptops</P><P>Discovered Contraband</P><P>Battery Restriction</P><P>Screening Passengers</P><P>Cast Scope</P><P>Rating Hand Held Metal Detectors</P><P>Body Search</P><P>Screening Airport and Airline Employees</P><P>Screening Diplomats</P><P>Registered Traveler Program</P><P>No Fly List</P><P>Federal Behavior Detection Officers</P><P>Theft</P><P>Potential TSA Ethics Issues</P><P>Public Relations</P><P>Airborne Aircraft Security</P><P>Federal Flight Deck Officers</P><P>Training Initial training will be conducted in a one-week session that will typically require volunteers to arrive mid-afternoon on a Sunday and remain through conclusion of training the following Saturday afternoon</P><P>Conclusion</P><P>References</P><P><STRONG>Private Security Personne. | |
520 | |a Considered the definitive handbook on the terrorist threat to commercial airline and airport security, Colonel Kathleen Sweet's seminal resource is now updated to include an analysis of modern day risks, as well an examination of the plethora of changes made to air security policies, practices, and regulations since 9/11. She covers the history of aviation security and compares current in-flight security practices with those of other countries. In addition to cargo and passenger security, the text looks at airport and aviation business practices and how security considerations are factored into business processes. New regulations for the Transportation Security Administration are also detailed. | ||
650 | 0 | |a Airports |x Security measures. | |
650 | 0 | |a Hijacking of aircraft |x Prevention. | |
650 | 0 | |a Terrorism |x Prevention. | |
650 | 0 | |a Aeronautics, Commercial |x Security measures. | |
650 | 7 | |a Aeronautics, Commercial |x Security measures. |2 fast |0 (OCoLC)fst00798526. | |
650 | 7 | |a Airports |x Security measures. |2 fast |0 (OCoLC)fst00803831. | |
650 | 7 | |a Hijacking of aircraft |x Prevention. |2 fast |0 (OCoLC)fst00956752. | |
650 | 7 | |a Terrorism |x Prevention. |2 fast |0 (OCoLC)fst01148123. | |
776 | 0 | 8 | |i Print version: |z 9781420088168 |z 1420088165. |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=https://www.taylorfrancis.com/books/9780429252303 |z Full Text (via Taylor & Francis) |
907 | |a .b116120186 |b 02-21-23 |c 01-22-21 | ||
998 | |a web |b - - |c f |d b |e - |f eng |g flu |h 0 |i 1 | ||
915 | |a M | ||
956 | |a Taylor & Francis Ebooks | ||
956 | |b Taylor & Francis All eBooks | ||
956 | |a Taylor & Francis eBooks | ||
999 | f | f | |i 9aa923f6-d376-5a42-adc8-0044d6c584ed |s 7aeacb29-c9d6-5793-a052-7b17fb07216e |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e HE9797.4.S4 S937 2009 |h Library of Congress classification |i web |n 1 |