6 Oct The Tenth Edition of the ICAO Aviation Security Manual — Doc (Restricted) has been published in English, with all other ICAO language. Doc – 05 – Security Manual – Seventh Edition – Free download as PDF File AFS ASTPs ATS AVSEC BD CMT EDDS EDS EMT EOC EOD FCP ICAO IED. 30 Sep GMT icao security manual doc pdf – The ICAO. Aviation Security Manual. (Doc – Restricted) assists Member States in implementing.

Author: Tojagore Digami
Country: Montenegro
Language: English (Spanish)
Genre: Medical
Published (Last): 11 February 2013
Pages: 497
PDF File Size: 18.39 Mb
ePub File Size: 19.65 Mb
ISBN: 349-4-67221-227-8
Downloads: 60122
Price: Free* [*Free Regsitration Required]
Uploader: Kihn

Teaching an airport’s users and tenants what to look for with regard to unauthorized 88973 potentially illegal activities is essential to effectively utilizing this resource.

This could include the use of a video or other media for training. Events or circumstances that do not fit the pattern of lawful, normal activity at an airport. Therefore, working together the State and operators can establish common procedures that meet mutual objectives.

Yet, size odc does not constitute an appreciable threat; if there are few based aircraft or annual operations, the threat will likely be small.

Security Issues Scheduled CAT generally operates from major airports that provide a significant security control and screening infrastructure.

Plans, coordinated with local and State law enforcement agencies should be developed for dlc least the following events:.


Of particular security concern are aircraft that can carry large, bulky or heavy loads such as iczo used for fire suppression, construction or sky diving operations. Finally, direct contact with a local law enforcement agency may provide the most responsive and effective means of reporting. Consequently, new faces are quickly noticed.

Turn off more accessible mode. Small, remote airports obviously face different threats and levels of threats than large icai located close to major metropolitan areas.

International Council of Aircraft Owner and Pilot Association

However, these controls normally are not as restrictive as those for scheduled CAT since GA operating areas are not located within designated security restricted areas. Because of this diversity a single security formula is inappropriate for all GA airports.

Once a specific threat associated with a specific event or location has been identified the severity of the threat should be evaluated to determine severity. Such information may include changing threat levels or specific information about personnel or techniques that may increase operational threats.


The second is through a national or wide-area toll-free central telephone reporting number, connecting to a law enforcement or intelligence agency. Further, in order for a small aircraft to have any impact careful loading and fusing of the explosives must be accomplished; these actions take time and expertise.

Most GA aircraft are too small to pose a significant threat due to their inability to carry a sufficiently large quantity of explosives. First is to airport management.

Aviation Security Manual (Doc – Restricted)

See General Aviation Airport Security Procedures Operational control refers to airspace restrictions imposed by the State to prevent operation of aircraft in the vicinity of sensitive areas ddoc activities.

But, any moderate sized airport, located within 50 km of a major metropolitan area may constitute an elevated threat due to the proximity of potential terrorist targets. Size and capability of based or transient aircraft will help determine relative threat, as well. Include jcao emergency phone numbers on the sign. Develop and circulate reporting procedures to all who have a regular presence on the airport. There are three basic ways that persons can report suspect activities.

Much of the attention of security forces is focused on worldwide scheduled commercial air transport CAT services, primarily because of the concentrations of people and aircraft size involved in this type of service. These controls are normally applied sparingly to small areas to protect only the most important ground activities; enforcement of restrictions associated with large or numerous restricted areas is difficult.

Examples of these measures include: This material covers such subjects as airline and cargo security and, of course, crisis management. ICAO assumed a leadership role in developing aviation security policies and measures at the international level, and today the enhancement of global aviation security is a key objective of the Organization.

At the other end of the spectrum a GA airport may have multiple paved runways exceeding meters in ico, hundreds of based aircraft and large complexes of hangars, buildings and business facilities.

Examples of these measures include:. The ability to control access to aircraft parking areas, hangars and handling facilities will normally prevent most unlawful acts associated with aircraft. Access control breach Theft or attempted theft of an aircraft Assault on an airport employee, tenant or transient persons Bomb threat Airport Community Watch Program The vigilance of airport users is one of the most prevalent methods of enhancing security at GA airports.


Classes of security measures include: AW operations deemed to pose a significant threat should be required to establish and maintain a State approved written security program, incorporating the following provisions: GA aircraft based at or operating on airports serving scheduled CAT will be subject to relevant State requirements and the airport operating authority’s security program.

Specific programs are provided below for larger aircraft, on-demand CAT air taxi and aerial work operations. Post signs promoting the program, warning that the airport is watched.

But, the great majority of GA airports are used for aerial work or personal transportation purposes. AW operations deemed to pose a significant threat should be required to establish and maintain a State approved written security program, incorporating the following provisions:.

Please enable scripts and reload this page. The ability to correctly identify a flight crewmember and aircraft should lower potential threats to easily manageable levels. General Aviation Airport Security Procedures The diverse size and configuration of GA airports makes the establishment of a single set of security precautions difficult.

Over the years, its work in the field of aviation security broadened and today is essentially carried out in three inter-related areas: Scheduled CAT generally operates from major airports that provide a significant security control and screening infrastructure. Once the level of risk has been determined mitigating factors can be devised to counter the threat.

By definition these facilities do not serve scheduled commercial air transportation yet may accommodate occasional air taxi operations. Once the risk assessment xoc been completed measures to mitigate those threats can be devised through policy, procedural and physical security precautions.

For instance, the desire of the operator to protect aircraft and flight crew from harm or misuse closely matches the State’s desire to prevent misuse of the aircraft for more sinister purposes. What possible targets are available? Work with local icwo enforcement agencies to develop a program that involves them from its inception. Typically, the user population is familiar with those individuals who have a valid purpose for being on the airport property.