Airport and Aviation Security

Book description

Beginning with a historical backdrop describing the dawn of the age of global terrorism in the 1960s and continuing up until the present time, this volume demonstrates the broad social and political context underlying the aviation security system that was in place on September 11th and the system that has evolved in response to the 9/11 attacks. Examining ongoing threats and vulnerabilities, the book describes how they have come to shape U.S. policy and strategy. Topics discussed include legislation, intelligence gathering, best practices for risk management, in-flight security measures, and passenger, baggage, and employee screening methods.

Table of contents

  1. Front cover (1/2)
  2. Front cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Preface (1/2)
  6. Preface (2/2)
  7. Acknowledgments
  8. Author
  9. Author’s Disclaimer
  10. Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (1/8)
  11. Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (2/8)
  12. Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (3/8)
  13. Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (4/8)
  14. Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (5/8)
  15. Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (6/8)
  16. Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (7/8)
  17. Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (8/8)
  18. Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (1/6)
  19. Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (2/6)
  20. Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (3/6)
  21. Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (4/6)
  22. Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (5/6)
  23. Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (6/6)
  24. Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (1/6)
  25. Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (2/6)
  26. Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (3/6)
  27. Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (4/6)
  28. Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (5/6)
  29. Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (6/6)
  30. Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (1/7)
  31. Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (2/7)
  32. Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (3/7)
  33. Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (4/7)
  34. Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (5/7)
  35. Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (6/7)
  36. Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (7/7)
  37. Chapter 5. Evaluating and Managing Security Risks (1/6)
  38. Chapter 5. Evaluating and Managing Security Risks (2/6)
  39. Chapter 5. Evaluating and Managing Security Risks (3/6)
  40. Chapter 5. Evaluating and Managing Security Risks (4/6)
  41. Chapter 5. Evaluating and Managing Security Risks (5/6)
  42. Chapter 5. Evaluating and Managing Security Risks (6/6)
  43. Chapter 6. Exploiting Intelligence and Counterterrorism Information (1/7)
  44. Chapter 6. Exploiting Intelligence and Counterterrorism Information (2/7)
  45. Chapter 6. Exploiting Intelligence and Counterterrorism Information (3/7)
  46. Chapter 6. Exploiting Intelligence and Counterterrorism Information (4/7)
  47. Chapter 6. Exploiting Intelligence and Counterterrorism Information (5/7)
  48. Chapter 6. Exploiting Intelligence and Counterterrorism Information (6/7)
  49. Chapter 6. Exploiting Intelligence and Counterterrorism Information (7/7)
  50. Chapter 7. Passenger and Baggage Screening (1/9)
  51. Chapter 7. Passenger and Baggage Screening (2/9)
  52. Chapter 7. Passenger and Baggage Screening (3/9)
  53. Chapter 7. Passenger and Baggage Screening (4/9)
  54. Chapter 7. Passenger and Baggage Screening (5/9)
  55. Chapter 7. Passenger and Baggage Screening (6/9)
  56. Chapter 7. Passenger and Baggage Screening (7/9)
  57. Chapter 7. Passenger and Baggage Screening (8/9)
  58. Chapter 7. Passenger and Baggage Screening (9/9)
  59. Chapter 8. Airline In-Flight Security Measures (1/8)
  60. Chapter 8. Airline In-Flight Security Measures (2/8)
  61. Chapter 8. Airline In-Flight Security Measures (3/8)
  62. Chapter 8. Airline In-Flight Security Measures (4/8)
  63. Chapter 8. Airline In-Flight Security Measures (5/8)
  64. Chapter 8. Airline In-Flight Security Measures (6/8)
  65. Chapter 8. Airline In-Flight Security Measures (7/8)
  66. Chapter 8. Airline In-Flight Security Measures (8/8)
  67. Chapter 9. Commercial Airport Access Controls and Perimeter Security (1/7)
  68. Chapter 9. Commercial Airport Access Controls and Perimeter Security (2/7)
  69. Chapter 9. Commercial Airport Access Controls and Perimeter Security (3/7)
  70. Chapter 9. Commercial Airport Access Controls and Perimeter Security (4/7)
  71. Chapter 9. Commercial Airport Access Controls and Perimeter Security (5/7)
  72. Chapter 9. Commercial Airport Access Controls and Perimeter Security (6/7)
  73. Chapter 9. Commercial Airport Access Controls and Perimeter Security (7/7)
  74. Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (1/6)
  75. Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (2/6)
  76. Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (3/6)
  77. Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (4/6)
  78. Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (5/6)
  79. Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (6/6)
  80. Chapter 11. Air Cargo Security (1/6)
  81. Chapter 11. Air Cargo Security (2/6)
  82. Chapter 11. Air Cargo Security (3/6)
  83. Chapter 11. Air Cargo Security (4/6)
  84. Chapter 11. Air Cargo Security (5/6)
  85. Chapter 11. Air Cargo Security (6/6)
  86. Chapter 12. Security for GA Operations and Airports (1/8)
  87. Chapter 12. Security for GA Operations and Airports (2/8)
  88. Chapter 12. Security for GA Operations and Airports (3/8)
  89. Chapter 12. Security for GA Operations and Airports (4/8)
  90. Chapter 12. Security for GA Operations and Airports (5/8)
  91. Chapter 12. Security for GA Operations and Airports (6/8)
  92. Chapter 12. Security for GA Operations and Airports (7/8)
  93. Chapter 12. Security for GA Operations and Airports (8/8)
  94. Index (1/4)
  95. Index (2/4)
  96. Index (3/4)
  97. Index (4/4)
  98. Back cover

Product information

  • Title: Airport and Aviation Security
  • Author(s): Bartholomew Elias
  • Release date: September 2009
  • Publisher(s): CRC Press
  • ISBN: 9781420070309