National Academies Press: OpenBook

Airport-to-Airport Mutual Aid Programs (2012)

Chapter: Appendix J - Security Access Procedures

« Previous: Appendix I - Checklist for Airports Volunteering Aid (per Time Phase)
Page 174
Suggested Citation:"Appendix J - Security Access Procedures." National Academies of Sciences, Engineering, and Medicine. 2012. Airport-to-Airport Mutual Aid Programs. Washington, DC: The National Academies Press. doi: 10.17226/22754.
×
Page 174

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

J-1 A p p e n d i x J Security Access Procedures The procedures for allowing access by airport-to-airport mutual aid program aid team members into secure areas of the receiving airport must satisfy all TSA requirements and the airport security program of the receiving airport. In the interviews for this project, the following methods were found: Approach Credentials Basis Time Delay Use national biometric identity information sharing system Not legal at present time Not applicable Full Security Identification Display Area (SIDA) vetting process Standard background check by receiving airport, approval by receiving FSD Normally 4 days Rapid response alternative for vetting written into airport security program Verification documentation from sending airport, approval by receiving FSD, confirmation by sending FSD. 1–4 days Coordinate with TSA for temporary amendment to airport security program to allow other airport’s credential to give access to specified areas. Use copy of badge. Approval of receiving FSD, confirmation by sending FSD. Less than 1 day Accept sending airport credentials Verification documentation from sending airport, approval by receiving FSD, confirmation by sending FSD Less than 1 day Accept telephonic/fax of badge verification from sending airport for 72– 96 hours interim access to give long enough for normal process Verification documentation from sending airport, approval by receiving FSD, confirmation by sending FSD Less than 1 day Honor sending airport badge, add unique local sticker Sending airport’s badge None Escorts and temporary badges Not applicable None Joint local-outside teams (actually special case of escorts) Not applicable None No credentials needed if airport closed and security area not secure Not applicable None

Next: Appendix K - Model Delegation Letter »
Airport-to-Airport Mutual Aid Programs Get This Book
×
 Airport-to-Airport Mutual Aid Programs
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB’s Airport Cooperative Research Program (ACRP) Report 73: Airport-to-Airport Mutual Aid Programs is designed to help guide airports that would like to enter into formal or informal mutual aid agreements with other airports in the event of a community-wide disaster that requires support and assistance beyond its own capabilities.

The report describes the potential benefits that an airport-to-airport mutual aid program (MAP) can provide and outlines the different issues that should be considered when setting up an airport-to-airport MAP.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!