Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.
OCR for page 41
Airport Operations 41 pleting the vulnerability assessment to identify which security enhancements will be required. In addition, their participation may contribute to the acceptance and implementation of the program in a timely manner. The TSA's Security Guidelines for General Aviation Airports lists the essential components for developing a security program. These components include personnel, airport facilities, surveil- lance, security procedures, communications, and specialty operations. The circumstances of each airport will determine which security enhancements will be included in the program and how they will be implemented and enforced. Once developed, the written airport security program should be shared with others on a need- to-know basis only. The TSA considers the plan to be sensitive security information, and the air- port owner aids security by safeguarding such site-specific information. Local Training and Airport Familiarization An airport security plan is only as effective as it is current and rehearsed. Airports regulated under TSR Part 1542 are required to provide a review of the plan every 12 months, including every agency with a responsibility in the airport security program. Today, most response agencies have annual training requirements and it makes good sense to include the airport in those, thereby com- bining efforts to save time and costs. This also provides a great opportunity for multiple agencies to practice coordination and learn of each other's resources and capabilities. The ability to dissem- inate information about illegal and suspicious activities is imperative. Exercising contingency plans and maintaining current contact information and procedures ensures efficient response in times of need. Local law enforcement agencies should understand their responsibilities in the airport security program. They need to be as familiar with the airport's operating procedures and the airport prop- erty as they are with local procedures for their city streets and facilities. Commonly, local agencies do not spend the time to familiarize themselves with the airport's surroundings and airfield access procedures. Fences, locked gates, locked doors, and security regulations may pose obstacles for responding agencies unfamiliar with the airport. Airport operators must also consider informing agencies of airport issues such as construction, procedural changes, and seasonal operations that could affect their response. In addition, security training should be provided to tenants, contractors, and anyone else who has authorized access. This should include airport familiarization, security procedures, and reporting procedures. Special consideration should be given to responsibility for individual awareness. A comment provided during the security portion of the survey raises an excellent issue--complacency. The comment stated, "Another problem that people like myself who man- age a small county airport face is the fact that we have always lived in a safe and secure environ- ment and this causes us to doubt what we may actually be seeing and just write it off when the situation requires urgent action." The survey also indicated a strong need to include provisions in the security program to deter theft and vandalism. Security Technology Security technology utilized to enhance airport security comprises various components. Items such as access control and closed circuit television (CCTV) systems are becoming more popular and financially reasonable compared to past years. Access systems for doors and gates leading to secured areas range from the simple--lock and keys, remote-controlled gates, and proximity cards--to the complex--computer-based access