RISK CONTEXT STATEMENT
|
|
|
- Cory Long
- 9 years ago
- Views:
Transcription
1 RISK CONTEXT STATEMENT The ICAO global Risk Context Statement (RCS) provides a high-level description of the global aviation security risk picture. The statement presents high-level statements to help guide Member States in taking a risk-based approach to maintaining their national civil aviation security programmes.
2
3 INTRODUCTION ICAO RISK CONTEXT STATEMENT ABRIDGED VERSION 1.1 The continuing threat of terrorism is most effectively managed by identifying, understanding and addressing the potential risks both to and from civil aviation in general and its passengers and specific goods (baggage, cargo and mail) transported. Therefore, the ICAO global aviation security Risk Context Statement (RCS) has been developed, and aims to: provide a description of the global risk picture; assist States in their efforts to protect air transportation and prevent its use for unlawful acts; present high-level statements for an improved approach in creating and maintaining State national civil aviation security programmes; and assist ICAO in improving Standards and Recommended Practices (SARPs) and guidance material. 1.2 The RCS reinforces the importance of a risk-based approach, provides a risk assessment process map, and explains a methodology developed by the ICAO Aviation Security (AVSEC) Panel Working Group on Threat and Risk (WGTR). The RCS emphasises the importance of States reporting and sharing information if they and ICAO are to apply the risk assessment process effectively. Finally, based on risk assessments already carried out using the suggested methodology, the RCS provides a relative ranking of these risks. A table of the main terrorist risks to aviation is presented in Section The WGTR, which regularly provides risk analysis and risk advice to the AVSEC Panel, maintains the RCS and intends to update the statement as needed to reflect recent events and its own updated risk assessments. 1.4 Although most updates to the RCS will first be considered by the AVSEC Panel, the WGTR provides urgent advice directly to the ICAO Secretariat for dissemination to Member States in times of immediate global threat. For example, in response to the attempted attacks through the cargo system in October 2010, the WGTR reviewed its cargo risk assessment and provided suggested mitigation measures to the Secretariat through the WGTR Chairman. 1.5 The RCS is aimed primarily at aviation security decision makers among the Secretariat and in Member States. 1.6 Role of ICAO in maintaining global aviation security baseline When aviation security arose as a serious issue in the late 1960s, the Chicago Convention system of Annexes was adapted to provide an international framework for addressing acts of unlawful interference. In the years since, ICAO has become the world leader in developing aviation security policies and measures at the international level, and the enhancement of aviation security worldwide remains a strategic objective of the Organization Provisions for international aviation security were first incorporated into the Chicago Convention in 1974 (Annex 17 Security), and since then have been improved and updated 12 times. ICAO has also provided States with guidance material to assist with the implementation of the
4 - 2 - security measures contained in Annex 17, among which the primary document is the Aviation Security Manual (Doc 8973 Restricted). Aviation security is also addressed in other Annexes Standard of Annex 17 requires each State to keep under constant review the level of threat to civil aviation within its territory, and establish and implement policies and procedures to adjust relevant elements of its national civil aviation security programme, based on a security risk assessment carried out by relevant national authorities In addressing the evolving threat to civil aviation, ICAO relies on the advice of experts who sit on the AVSEC Panel. Established in the late 1980s, the Panel currently consists of 27 members nominated by States, as well as five observers from industry. Together with the Secretariat, the Panel actively develops ICAO security policy and responses to emerging threats, as well as strategies aimed at preventing future acts of unlawful interference. ICAO also draws on advice from the WGTR, which provides timely advice on evolving threats and incidents. 1.7 Importance of threat and risk assessment approach The Declaration on Aviation Security adopted by the 37th Session of the ICAO Assembly calls on all Member States to share best practices and information on a range of key aviation security matters, including threat-based risk assessments. The Assembly also directed the Council to instruct the AVSEC Panel to identify and develop a risk assessment methodology for aviation security and to include risk-based assessments with any recommendations for the adoption of new or amended aviation security measures A reasonably designed risk-based approach is one by which States identify the criteria to measure potential criminal activities, principally from terrorism. The identification of risks permits States to determine and implement proportionate measures and controls to mitigate against each risk type The RCS aims to fulfil the requests of the Assembly and enables ICAO and Member States to put them into effect. 1.8 Role of States in national and local risk management Assessments of national or even local risks, in conjunction with the overall risk factors, provide important and useful information as to potential terrorist methods and types of attack and targets. While the RCS aims to provide a global high-level view of terrorist risks, it does not attempt to create a detailed view of national or local risks, or to suggest that one State has higher levels of risk associated with it than another State. It is therefore the duty of each State to make its own assessment of the risk applying to its territory and assets, and to establish risk mitigation measures, taking into account the high-level view presented in the global RCS Each Member State should document and periodically review its risk assessment, or when significant new developments arise, in order to maintain an accurate and up-to-date picture of the risk environment.
5 THE NATURE OF THE THREAT 2.1 For many years, there has been a significant risk to the security of international aviation from terrorists who, for a variety of motives, have sought to carry out acts of unlawful interference against aircraft, or to use aircraft for terrorist purposes. In selecting a target for attack, terrorists are currently likely to consider the following objectives: inflicting mass casualties; causing economic disruption; making a symbolic statement that will generate spectacular media imagery; and generating public anxiety. 2.2 All of these are capable of being achieved through attacks on aviation, which explains the particular focus by terrorists on aviation targets, and heightens the need for the effective mitigation of such threats. This combination of issues may lead to a variety of forms of attack on the aviation system. 2.3 Terrorists have shown themselves to be innovative, and may seek out a wider range of methodologies and targets, influenced by the availability and vulnerability of such targets, and the opportunity for success in the terms set out above. The most significant types of possible attack are shown in Table 1 in Section Global threat All national aviation systems are linked to global aviation networks. Decision makers must therefore take into account how the threat to civil aviation is developing globally. This does not mean that threat levels are identical around the world; there are, of course, regional, national and even local variations. However, it does mean that many threats have the potential to very quickly jump national borders and change regions The December 2009 underwear bomber incident and the October 2010 cargo/printer cartridge incident both illustrate how threats can be introduced into the global aviation system halfway around the world and make their way to any State linked to the network. Often, a threat will take the most convenient path through the system; whether that path is convenient because of location, because of its connections to other areas of the system, or because of known weaknesses in that part of the system. Therefore, it is necessary for all States and aviation organizations to pay close attention to threats to aviation, and to be aware of the vulnerabilities and impacts associated with such threats. 2.5 Global consequences Given the global character of the terrorist threat to the aviation system (and the global nature of the aviation system more generally), it follows that terrorist attacks upon the aviation system have global consequences. Public anxiety and economic disruption caused by a terrorist attack key terrorist objectives will manifest themselves well beyond the borders of States that are the locations of terrorist attacks. Even substantially unsuccessful terrorist attacks have the demonstrated ability to achieve terrorist objectives, because the fear and uncertainty that they generate is often no less than that arising from a successful attack. Further, the global span of the media and the internet specifically exploited by terrorist groups gives terrorists the ability to reach audiences worldwide via news reporting or their own propaganda, virtually instantaneously The 11 September 2001 attacks clearly illustrate the global consequences of terrorist attacks on the aviation system. The attacks themselves were geographically confined to the United States,
6 - 4 - but one of the immediate consequences was a historically unprecedented disruption to aviation operations across the globe, arising from the fear that more such attacks would follow elsewhere. The longer-term consequence of the fear and anxiety generated by the attacks was a financial downturn in the aviation industry across the globe. Ultimately, this led to worldwide economic losses measured in trillions of dollars, and the financial collapse of numerous aviation-related businesses The global consequences of terrorist attacks on the aviation system mean that an attack upon the aviation interests of even one State is effectively an attack upon the aviation interests of all States. This further reinforces the need for all States and aviation organizations to pay close attention to threats to aviation, even if they do not consider themselves to be directly threatened by terrorist attack. 3. UNDERSTANDING THE THREAT THROUGH INFORMATION SHARING 3.1 According to Standard of Annex 17, each Member State is obliged to exchange information and report to ICAO all pertinent information concerning the security aspects of an act of unlawful interference. This section is designed to assist States in determining the issues to be reported. 3.2 Types of information In conducting a risk assessment, it is necessary to assemble information about the threat. Such information may come from a variety of sources, including the following: actual incidents, including successful or unsuccessful attacks on aviation, which provide information on proven terrorist methodologies; closed sources, primarily counter-terrorist intelligence, which may be gathered by intelligence, law enforcement and other agencies of States; and open sources, which may include publicly available information on unusual or suspicious occurrences and the availability of items that could be used for terrorist purposes, and any other information that may contribute to the threat picture. 3.3 Bilateral, multilateral and global information sharing Lines of communication, both formal and informal, between the aviation security officials of States assist in the rapid exchange of information, including any increase in the threat level. Exchanges of information on techniques used to try to breach security, experience with security equipment, and operational practices, are also extremely advantageous. States are reminded that Section 2.4 of Annex 17 places obligations on them to cooperate in such exchanges of information States should develop procedures for the analysis and dissemination of threat information, and to ensure that appropriate actions are taken by aircraft and airport operators to counter an identified threat. Information should be disseminated to individuals on the need-to-know principle, in order for them to effectively carry out their duties States with limited resources for dealing with imminent threats should consider negotiating legal and procedural assistance with adjacent States that are better equipped to collect and disseminate threat information Details of important developments, such as new or unusual methods of operation and techniques used by perpetrators, should be promptly disseminated to other States and ICAO. While public knowledge of such matters is undesirable, all airports that may experience similar occurrences should be
7 - 5 - informed as soon as possible. Such action will facilitate the early development and implementation of effective countermeasures and procedures Urgent communications may be facilitated through the use of the ICAO Aviation Security Point of Contact (PoC) Network, established for the communication of imminent threats to civil air transport operations. Pursuant to Assembly Resolution A37-17: Consolidated statement on continuing ICAO policies related to the safeguarding of international civil aviation against acts of unlawful interference, States that have not done so are urged to participate in the ICAO PoC Network If a State has specific information about a possible occurrence involving an aircraft operator or airport, it should immediately and concurrently inform the State(s) where the occurrence may take place, directly through the ICAO PoC Network or through the local diplomatic mission. Further, if a State is unable to communicate urgent information to another State, it should immediately request the assistance of a third State or ICAO As soon as circumstances indicate that special security precautions may be dispensed with, such information should immediately be transmitted by the appropriate authority to the affected State(s). Finally, as soon as possible after a security incident, a review and analysis of all that transpired should be conducted by the appropriate authority. The results of the review and analysis should be made available to all participants, along with the recommendations of the appropriate authority for general improvement and for the correction of any deficiencies identified. ICAO should be notified, at the earliest opportunity, of any action undertaken by a State to correct a deficiency States concerned with an act of unlawful interference should provide ICAO with all pertinent information concerning the security aspects of the occurrence as soon as practicable after the act is resolved. States should, whenever appropriate, furnish copies of reports prepared for ICAO to other States that may have an interest. The categories of incidents that should be reported include: unlawful seizure of an aircraft; attempted unlawful seizure of an aircraft; unlawful act against the safety of civil aviation, including acts of sabotage and malicious damage, and the placing of bombs and other explosive devices or substances in airports, aircraft, baggage, cargo or mail; attempted unlawful act against the safety of civil aviation; and any other act of unlawful interference, including armed attacks at airports, acts directed toward off-airport personnel, facilities or vehicles, and acts that have the potential to develop into a threat to international civil aviation States are asked to consider ways in which they can improve their existing systems of sharing information. For example, some States have established a system of occasional issuance of information bulletins on matters that may be relevant to threats and risks to aviation, which are circulated at an unclassified or official-use-only level through the ICAO Secure Portal. Others have taken the approach of reviewing their own classified information and, if deemed useful to the wider aviation security community, reissuing the information at a lower level of classification to enable its wider dissemination.
8 TERRORISM AND CRIMINALITY 4.1 The possibility of a connection between criminality and terrorism should be noted. Criminal activity in the aviation and transportation arenas, when recognized, may point out vulnerabilities in security practices and expose weaknesses in security posture. Where weaknesses are exploited for criminal purposes, they may also be exploited for terrorist purposes. 4.2 Criminals and terrorists use all modes of transportation, including commercial aviation, to travel across nations and internationally across borders, to carry out their missions. Criminal activity may provide funding and/or financing for terrorist groups and activities. As States continue to seize terrorist assets worldwide, extremist groups resort to criminal activities to fund their operations of violence and terror. 4.3 Criminal activity may also be used by terrorists in attempts to test specific security measures and learn how to overcome them. The following criminal activity can sometimes be linked to terrorist activity or the funding of terrorist groups and activity: surveillance (of security systems, processes or habitual activity in any setting), which may be covert or overt; smuggling of humans, drugs, cash and/or contraband; and drug trafficking. 4.4 Identifying criminal activity in the aviation security environment may lead to identifying terrorist activities or evidence of support to terrorist missions. Any unusual or increased incidents of criminal activity in transportation sectors should be noted, and where practicable, shared amongst relevant State agencies and jurisdictions, such as law enforcement, and between States. 5. INSIDER VULNERABILITIES 5.1 In development of the RCS, the insider vulnerability has not been considered as a separate category. Instead, threat types have been considered with an insider element included within each category. It is suggested that States adopt a similar approach in developing their own security risk assessments. For instance, in considering a threat category such as a person-borne improvised explosive device (IED) used to attack aircraft, those conducting an assessment should consider, separately, both a passenger-borne IED used to attack aircraft and a person-borne IED introduced by crew and/or employees and used to attack aircraft. It is easy to see how the risk from a particular threat may differ when one considers an insider, such as an aircraft operator staff member or a passenger, as the means of introducing a threat. For example, the: vulnerability associated with insiders might be considered greater if they have access to the last layer of security in a way that a passenger does not; likelihood associated with insiders might be less if they have already been subject to vetting and selection procedures and/or screening; and consequence of a threat associated with insiders might be greater if an insider has access deeper within the system. For instance, an insider could perpetrate a more credible and thus more disruptive hoax. 5.2 In summary, the methodology involves considering each role within the system and whether it offers a particular tactical advantage in relation to each threat type or whether it poses the same issues as passengers. In applying this methodology, it is possible to consider insider vulnerabilities as part of an integrated risk assessment.
9 RISK ASSESSMENT METHODOLOGY AND PROCESS MAP Diagram 1. Process map
10 The purpose of the risk assessment methodology and process map is to assist States in performing a risk assessment of possible and/or potential concerns, and to ensure that careful thought is given to the evaluation of risks. The methodology comprises three primary processes: identification of the inherent or theoretical problem; residual risk assessment; and recommendations. 6.2 Risk assessment is a process that evaluates the risks by: Threat Identification identifying the threat scenario, consisting of a defined target (e.g. airport terminal or aircraft), as well as the means and method of possible attack (e.g. attack by passenger using an improvised explosive device, or attack by an insider using weapon, etc.); Likelihood considering the probability of the threat occurring; Consequence assessing the nature and scale of likely impacts associated with a successful attack, including consideration of human, economic, political and reputational factors (based on a reasonable worst-case scenario); Vulnerabilities evaluating the effectiveness and vulnerabilities of current security measures (i.e. security strengths and weaknesses of SARPs) in mitigating the potential threat scenario identified; and therefore Residual risk assessing the remaining risk of that type of attack being successfully carried out against that target, to enable a judgement to be made as to whether that is acceptable in risk management terms. 6.3 It is important that an evaluation using the suggested map carefully identify the possible or potential scenarios, considering each form of threat as thoroughly as possible. Threats might be directed at specific airports, terminals or aviation infrastructure, such as aviation fuel farms, air traffic control facilities or navigational equipment, as well as aircraft, including different forms of aviation, such as general aviation, passenger aircraft, and all-cargo aircraft. The means and methods by which a threat could be carried out should also be evaluated, including how a weapon or explosive device could be constructed or concealed, and the means by which these threat forms might be conveyed, whether personor vehicle-borne, in order to perpetuate an act of unlawful interference, and who, for example staff, might perpetrate or facilitate such an act. 6.4 In the evaluation of the vulnerability of a particular aviation operation and the likelihood of such an attack, the ease with which such an attack could be made, and how attractive the target might be to potential terrorists, should be considered. In general, targets that could generate significant media attention are considered attractive targets and raise the likelihood of such a threat. 6.5 Also the higher the consequences, and the more catastrophic the possible impact of an attack, the higher the threat. States could consider using this risk assessment methodology as a model for their own risk assessments. States may wish to consider the vulnerabilities of their own regime and that the risk might not be adequately mitigated by the baseline set forth in Annex It should be noted that one of the principles used in the assessments has been the consideration of a reasonable worst-case scenario, and resulting risk assessments were evaluated in view of the current SARPs in Annex 17. For risks not sufficiently mitigated, the WGTR proposes amendments and updates to Annex 17 and the Aviation Security Manual. 6.7 For States wishing to apply this methodology to their risk assessments, the resulting residual risks that are uncovered should be reviewed to evaluate whether they are acceptable or not and, where not, possible additional security measures evaluated to see whether they would be effective, practicable and sustainable.
11 THREAT ANALYSIS THREAT TYPE Likelihood Consequence Vulnerabilities RISK AIRBORNE THREATS (conventional hijack) Medium Medium Low LOW AIRBORNE THREATS (aircraft used as weapon) Medium-Low High Medium-Low MEDIUM-LOW PERSON-BORNE CONVENTIONAL IMPROVISED EXPLOSIVE DEVICE (IED) (traditional IED with metallic components) Medium High Medium MEDIUM PERSON-BORNE NON-CONVENTIONAL IED (low or no metal content and/or novel concealment) High High Medium-High MEDIUM- HIGH OTHER WEAPON (firearms, knives or blunt instruments used to attack passengers or crew but not to commandeer aircraft) Low Medium-Low Low LOW MAN-PORTABLE AIR DEFENSE SYSTEMS (MANPADS) (in combat or proliferation zone) Medium-High High High MEDIUM- HIGH MANPADS (not in combat or proliferation zone) Low High High MEDIUM-LOW VEHICLE-BORNE IED Medium-High Medium Medium-High MEDIUM CARGO IED High High Medium-High MEDIUM- HIGH LANDSIDE IED (detonated outside security restricted areas) High Medium-Low Medium-High MEDIUM Table 1. Threat type risk levels
12 The table above is a compilation of the threat scenario categories that the WGTR has assessed or begun to assess in terms of global risk. A single threat scenario category often reflects several scenarios or sub-scenarios, the details of which can be found in the risk matrices. Likelihood, consequence and vulnerability have been scored on a five-point scale from HIGH to LOW. The general meanings of the scores, in each case, are contained in much more detailed form, along with the risk matrices and an explanation of the rationale of each score, in the longer version of the RCS, available on the ICAO Secure Portal. 7.2 It is important to keep in mind that these risk results reflect the global picture and not a regional or national picture. For example, the threat level has been assessed at the level it exists in most of the world (with the exception of the MANPADS threat, which varies sharply from place to place and so has been assessed at two different levels), and the vulnerability level is assessed as the residual vulnerability existing should a State have implemented all security measures currently required in Annex RECOMMENDATIONS FOR FURTHER ACTION 8.1 In the process of conducting its risk assessments and providing updates to the RCS, the WGTR will develop recommendations for further action, whether immediate risk mitigation measures as discussed above or longer-term measures that may be incorporated into Annex 17 or ICAO documents. Further information on the RCS and the applied methodology can be obtained from the Threat and Risk Working Group via the ICAO Secretariat ([email protected] or [email protected]). 8.2 Long term creation and maintenance of risk assessments In the longer term, in support of regular updates to the RCS as a living document, the WGTR will continue to develop and update its risk assessments on evolving and unaddressed aviation security threats. The WGTR acknowledges that a risk assessment is a snapshot in time that must be revisited on a regular basis, because any element of the analysis can change and, in particular, as successful or foiled terrorist attacks occur States should take into account the RCS as part of their risk-based national civil aviation security programmes. END
THE UNIVERSAL SECURITY AUDIT PROGRAMME (USAP)
THE UNIVERSAL SECURITY AUDIT PROGRAMME (USAP) 1 Objectives USAP objective The objective of the USAP is to promote global aviation security through auditing Contracting States, on a regular basis, to determine
REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES
REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES Definitions 1. In these requirements: C-NLOPB means the Canada-Newfoundland and Labrador Offshore Petroleum Board; Chief Safety Officer means
National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004
COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the
PLANNIN WORKING PAPER. International. Theme 1: WORK. (Presented by SUMMARY. in this paper. feasibility of. system in the future.
International Civil Aviation Organization HLSC/15-WP/3 21/11/14 WORKING PAPER SECOND HIGH-LEV VEL SAFETY CONFERENCE 2015 (HLSC 2015) PLANNIN G FOR GLOBAL AVIATION SAFETY IMPROVEMENT Montréal, 2 to 5 February
Emerging Threats from Cyber Security in Aviation Challenges and Mitigations
Emerging Threats from Cyber Security in Aviation Challenges and Mitigations ABSTRACT Security threats to civil aviation operations have become more sophisticated and challenging to deal with. One that
London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments
London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012
Department-wide Systems & Capital Investment Programs
Department-wide Systems & Capital Investment Programs Mission Statement The Department-wide Systems and Capital Investments Programs (DSCIP) is authorized to be used by or on behalf of the Treasury Department
CONTEST: The United Kingdom s Strategy for Countering Terrorism
CONTEST: The United Kingdom s Strategy for Countering Terrorism July 2011 Introduction 3 1.01. This is the third published version of the United Kingdom s counter-terrorism strategy, CONTEST. This new
Development of An Analysis Tool For Performing Civil Aviation Security Risk Assessment
Development of An Analysis Tool For Performing Civil Aviation Security Risk Assessment Allan R. Hunt AKELA, Inc. 5276 Hollister Avenue, Suite 263 Santa Barbara, CA 93111 Karl F. Kellerman FAA Office of
IMO CONSIDERATION AND ADOPTION OF THE INTERNATIONAL SHIP AND PORT FACILITY SECURITY (ISPS) CODE
INTERNATIONAL MARITIME ORGANIZATION E IMO CONFERENCE OF CONTRACTING GOVERNMENTS TO THE INTERNATIONAL CONVENTION FOR THE SAFETY OF LIFE AT SEA, 1974 Agenda items 7 and 8 SOLAS/CONF.5/34 17 December 2002
Aerodrome Advisory Circular
Aerodrome Advisory Circular AC(AD) NO-13 Integration of International Aviation Security (AVSEC) Measures into Designs and Constructions of New Facilities and alterations to Existing Facilities. CIVIL AVIATION
Integration of QMS, SMS,
Integration of QMS, SMS, WMO/QM Task Team, 4th Meeting 20.-22. January 2015 / Gerold Fletzer DIESER TEXT DIENT DER NAVIGATION Since last meeting the world has changed: 2015 we are facing ISO 9001:2015
WORKPLACE VIOLENCE POLICY
WORKPLACE VIOLENCE POLICY SUNY Canton is committed to providing a safe work environment for all employees that is free from intimidation, threats, and violent acts. The college will respond promptly to
International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE
A38-WP/11 17/05/13 International Civil Aviation Organization WORKING PAPER ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE Agenda Item 16: Facilitation and Machine Readable Travel Documents PROPOSAL FOR AN ICAO
JAMAICA CIVIL AVIATION AUTHORITY JOB SPECIFICATION & DESCRIPTION
JAMAICA CIVIL AVIATION AUTHORITY JOB SPECIFICATION & DESCRIPTION JOB SPECIFICATION JOB TITLE: DIVISION: Deputy Director General - Regulatory Affairs Regulatory Affairs DEPARTMENT: UNIT/LOCATION: Head Office
FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS
IAEA NUCLEAR SECURITY SERIES NO. FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS Revision 17.04 Page 1 of 20 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME]
2374-19. Joint ICTP-IAEA School of Nuclear Energy Management. 5-23 November 2012. Nuclear Security Fundamentals Module 9 topic 2
2374-19 Joint ICTP-IAEA School of Nuclear Energy Management 5-23 November 2012 Nuclear Security Fundamentals Module 9 topic 2 EVANS Rhonda, IAEA Department of Nuclear Safety and Security Office of Nuclear
Safety Management Systems (SMS) guidance for organisations
Safety and Airspace Regulation Group Safety Management Systems (SMS) guidance for organisations CAP 795 Published by the Civil Aviation Authority, 2014 Civil Aviation Authority, CAA House, 45-59 Kingsway,
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
Security at airports. ACI Policy and Recommended Practices Handbook Seventh Edition November 2009 Section 7 Page 1
7 Security at airports (cf. ICAO Annex 17 - Security, 8 th Edition (2006), and ICAO Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, Doc. 8973/6, 2002) **This section
Training Courses Catalog 2015
Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction
Guidelines on SPECIAL BRANCH WORK in the United Kingdom
Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence
Surveillance and Security Systems
Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems
United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework.
United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework 28 September 2012 Chair s Summary The United Nations High-Level Meeting on Countering
STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE
AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE Preamble The United States of America and the European Police Office (Europol): considering that it is within their common
Emirates Airline. Cargo Security The EK Experience
Emirates Airline Cargo Security The EK Experience The aim of Aviation Security The aim of aviation security is to safeguard passengers, crew, ground personnel and the general public from acts of unlawful
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
U.S. DoD Physical Security Market
U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request
THE EQUIPMENT THE SOLUTION THE CHALLENGE THE THREAT
THE CHALLENGE The aviation system, essential to the U.S. economy, its quality of life, and national security, is in a sustained period of economic growth. As the system grows, so do the opportunities for
AIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World
AIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World A presentation by Maria Buzdugan (McGill Institute of Air and Space Law, Montreal, Canada) Questions Raised Why is air
Security Management Systems (SEMS) for Air Transport Operators. Executive Summary
Security Management Systems (SEMS) for Air Transport Operators Executive Summary March 2011 Security Management Systems (SeMS) for Air Transport Operators Introduction and Scope Executive Summary In early
Aviation Transportation System Security Plan. Supporting Plan to the National Strategy for Aviation Security
Aviation Transportation System Security Plan Supporting Plan to the National Strategy for Aviation Security March 26, 2007 Aviation Transportation System Security Plan Foreword By issuing National Security
Public Consultation on Member State discretions
4 th EU Anti-Money Laundering Directive and Funds Transfer Regulation Public Consultation on Member State discretions January 2016 Contents The Consultation Process... 1 Key features of Fourth EU Anti-Money
Town of Cobleskill Workplace Violence Policy & Procedures
The employer known as the Town of Cobleskill has a long-standing commitment to promoting a safe and secure work environment that promotes the achievement of its mission of serving the public. All employee
APPENDIX / APÉNDICE. MANUAL ON THREAT ASSESSMENT AND RISK MANAGEMENT METHODOLOGY (Reference Guide for States) PARTICIPATING STATES
AVSEC/FAL/RG/2 WP/09 - NE/09 APPENDIX / APÉNDICE MANUAL ON THREAT ASSESSMENT AND RISK MANAGEMENT METHODOLOGY (Reference Guide for States) PARTICIPATING STATES CHILE COLOMBIA JAMAICA DOMINICAN REPUBLIC
Introduction to PAS 127:2014 Checkpoint security screening of people and their belongings Guide
Introduction to PAS 127:2014 Checkpoint security screening of people and their belongings Guide Introduction PAS 127:2014 is a guide to checkpoint security screening of people and their belongings within
PREAMBLE. THE GOVERNMENT OF THE UNITED STATES OF AMERICA and THE GOVERNMENT OF CANADA (hereinafter "the Parties");
FRAMEWORK AGREEMENT ON INTEGRATED CROSS-BORDER MARITIME LAW ENFORCEMENT OPERATIONS BETWEEN THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF CANADA PREAMBLE THE GOVERNMENT OF THE UNITED
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected]
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected] Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a
Agreement on International Civil Aviation (Sops 11/1949), Annex 19 Safety Management) Modification details
1 (19) Date of issue: 11.2.2015 Enters into force: 11.2.2015 Validity: until further notice Legal basis: Underlying international standards, recommendations and other documents: Agreement on International
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
Campus and Workplace Violence Prevention
Campus and Workplace Violence 1 Prevention SECTION I Policy SUNYIT is committed to providing a safe learning and work environment for the college community. The College will respond promptly to threats,
UK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
Physical security management guidelines
Physical security management guidelines Event security Approved 13 December 2011 Version 1.0 i Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons
Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice
Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice We, the States Members of the United Nations, Having assembled at the Eleventh United Nations Congress
Organización de Aviación Civil Internacional. Международная организация гражданской авиации. Ref.: AN 13/1.1-12/19 10 April 2012
International Civil Aviation Organization Organisation de l aviation civile internationale Organización de Aviación Civil Internacional Международная организация гражданской авиации Tel.: +1 (514) 954-6711
Nuclear Security Plan 2014 2017
Atoms for Peace Board of Governors General Conference GOV/2013/42-GC(57)/19 Date: 2 August 2013 For official use only Item 4(b) of the Board s provisional agenda (GOV/2013/37) Item 16 of the Conference's
Client Update Fourth Anti-Money Laundering Directive Comes Into Force
1 Client Update Fourth Anti-Money Laundering Directive Comes Into Force OVERVIEW LONDON Karolos Seeger [email protected] Matthew Howard Getz [email protected] Alex Parker [email protected] Ceri
The Protocol to Eliminate Illicit Trade in Tobacco Products: an overview
The Protocol to Eliminate Illicit Trade in Tobacco Products: an overview Background The Protocol to Eliminate Illicit Trade in Tobacco Products is an international treaty with the objective of eliminating
How To Improve The Safety Of An Airplane
International Civil Aviation Organization NAM/CAR/SAM Civil/Military Cooperation Seminar/Workshop Lima 16 19 August 2011 Circular 330-AN/189 Civil/Military Cooperation in Air Traffic Management Carlos
Validity: until further notice Legal basis: Underlying international standards, recommendations and other documents:
1 (19) Date of issue: 30.1.2014 Enters into force: 30.1.2014 Validity: until further notice Legal basis: Underlying international standards, recommendations and other documents: Agreement on International
Executive Protection Facility Security Convoy Escort
Executive Protection Facility Security Convoy Escort Who we are Trinity Defense Group is a highly professional security, consulting, and training organization. Trinity Defense coordinates a broad range
SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS
)LQDQFLDO$FWLRQ7DVN)RUFH RQ0RQH\/DXQGHULQJ *URXSHGDFWLRQILQDQFLqUH VXUOHEODQFKLPHQWGHFDSLWDX[ '(7(&7,1*$1'35(9(17,1*7+(&5266%25'(5 75$163257$7,212)&$6+%
Seminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006
Seminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006 The views expressed in this paper are those of the author(s) only, and the presence of them, or of links
CUNY New York Workplace Violence Policy and Procedures
CUNY New York Workplace Violence Policy and Procedures The City University of New York has a longstanding commitment to promoting a safe and secure academic and work environment that promotes the achievement
EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on
TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members
64/180. 2 A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and
Salvador Declaration on Comprehensive Strategies for Global Challenges: Crime Prevention and Criminal Justice Systems and Their Development in a Changing World We, the States Members of the United Nations,
Svenska Handelsbanken AB FI Ref. 13-1783 through Chair of Board Service no. 1. Finansinspektionen's decision (to be issued on 19 May 2015 at 08.
18 May 2015 DECISION Svenska Handelsbanken AB FI Ref. 13-1783 through Chair of Board Service no. 1 106 70 STOCKHOLM Remark and administrative fine Finansinspektionen's decision (to be issued on 19 May
E3211. DOT Hazmat Security Awareness. Leader s Guide
E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the
Prof. Pietro del Rosso
THE INTERNATIONAL SHIP AND PORT FACILITY CODE by Prof. Pietro del Rosso ME Lecturer at I.I.S.S. Amerigo Vespucci Molfetta Italy and Mediterranean Training Center Ltd. KEY WORDS: International Ship and
PORT ASSESSMENT. Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS
Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS PORT ASSESSMENT Details Notes 1 Date of assessment/survey 2 Name(s) of person(s) carrying out assessment 3 Relevant skills & expertise
V1.0 - Eurojuris ISO 9001:2008 Certified
Risk Management Manual V1.0 - Eurojuris ISO 9001:2008 Certified Section Page No 1 An Introduction to Risk Management 1-2 2 The Framework of Risk Management 3-6 3 Identification of Risks 7-8 4 Evaluation
Author: Andy Saffery, Deputy Registrar and UCL s Lead Officer for Prevent, Student and Registry Services
The Prevent Duty: Arrangements for ensuring senior management oversight of UCL s duty in having due regard to prevent people being drawn into terrorism. Author: Andy Saffery, Deputy Registrar and UCL s
Resolution adopted by the General Assembly on 8 September 2006. [without reference to a Main Committee (A/60/L.62)]
United Nations A/RES/60/288 General Assembly Distr.: General 20 September 2006 Sixtieth session Agenda items 46 and 120 Resolution adopted by the General Assembly on 8 September 2006 [without reference
V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI
V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
Basel Committee on Banking Supervision. Consolidated KYC Risk Management
Basel Committee on Banking Supervision Consolidated KYC Risk Management October 2004 Table of contents Introduction...4 Global process for managing KYC risks...5 Risk management...5 Customer acceptance
v. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
Basic Airport Security Awareness
Basic Airport Security Awareness Mineta San Jose International Airport Training Standards Program Division of Employee Services, Safety & Training Mineta San Jose International Airport Key Points: The
Anti-Money Laundering and Counter- Terrorism Financial Policy
Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION
IN FLIGHT SECURITY INCIDENT MANAGEMENT
1. Introduction IN FLIGHT SECURITY INCIDENT MANAGEMENT The tragic events on 9/11 drastically changed the way in-flight security incidents are managed. That day, the world witnessed an unprecedented dimension
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
Risk Management Handbook
Risk Management Handbook 1999 Introduction Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost. The analytical risk
BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS
ARF WORKSHOP 21-22 JUNE 2005 ULAANBAATAR, MONGOLIA BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS Overall, Brunei Darussalam security assessment remains peaceful and stable. However, the range of
AGREEMENT ON THE APPLICATION OF SANITARY AND PHYTOSANITARY MEASURES
Page 69 AGREEMENT ON THE APPLICATION OF SANITARY AND PHYTOSANITARY MEASURES Members, Reaffirming that no Member should be prevented from adopting or enforcing measures necessary to protect human, animal
Assessment of the Terror Threat to Denmark
19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals
Homeland Security Presidential Directive/HSPD-5 1
For Immediate Release Office of the Press Secretary February 28, 2003 Homeland Security Presidential Directive/HSPD-5 1 Subject: Management of Domestic Incidents Purpose (1) To enhance the ability of the
Rail Carrier Security Criteria
Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers
Contact Reporting Guidelines The Australian Government Contact Reporting Scheme
Contact Reporting Guidelines The Australian Government Contact Reporting Scheme Version 1.0 Approved September 2010 Contents Introduction... 1 The role of ASIO... 1 Australian Government Contact Reporting
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
STATES OF JERSEY DRAFT EU LEGISLATION (CIVIL AVIATION INSURANCE) (JERSEY) REGULATIONS 201-
STATES OF JERSEY r DRAFT EU LEGISLATION (CIVIL AVIATION INSURANCE) (JERSEY) REGULATIONS 201- Lodged au Greffe on 2nd June 2015 by the Minister for External Relations STATES GREFFE 2015 Price code: C P.61
SUMMARY AUDIT REPORT DIRECTORATE OF CIVIL AVIATION OF MOROCCO
ICAO Universal Safety Oversight Audit Programme SUMMARY AUDIT REPORT DIRECTORATE OF CIVIL AVIATION OF MOROCCO (Rabat, 26 October to 3 November 1999) INTERNATIONAL CIVIL AVIATION ORGANIZATION ICAO UNIVERSAL
UFF Position Statement: Fire and Smoke as a Weapon
UFF Position Statement: Fire and Smoke as a Weapon According to the United States Department of Homeland Security, international terrorist groups and violent extremists have shown interest in using fire
Seoul Communiqué 2012 Seoul Nuclear Security Summit
Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
Joint statement on supply-chain security
Joint statement on supply-chain security The United States and the European Union face similar challenges and share a common approach to the security ofthe supply-chain. We have witnessed several incidents,
How To Implement International Terrorism Agreements
STATEMENT OF BRAD WIEGMANN DEPUTY ASSISTANT ATTORNEY GENERAL DEPARTMENT OF JUSTICE BEFORE THE SUBCOMMITTEE ON CRIME, TERRORISM, AND HOMELAND SECURITY COMMITTEE ON THE JUDICIARY UNITED STATES HOUSE OF REPRESENTATIVES
JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK
JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK REMARKS AT THE PARLIAMENTARY INTELLIGENCE SECURITY FORUM JUNE 20, 2016 VIENNA, AUSTRIA Good morning. I would like to thank Congressman
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Department of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
Policy on Prevention of Money Laundering and Terrorist Financing ABH Holding S.A.
Policy on Prevention of Money Laundering and Terrorist Financing ABH Holding S.A. 2013 CONTENT 1. GENERAL PROVISIONS... 3 2. THE SCOPE AND APPLICABILITY... 3 3. THE PURPOSE OF THE POLICY... 3 4. OBJECTIVES...
SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY. " 166c. Geographic combatant commander's authority to transfer excess defense articles
SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY GEOGRAPHIC COMBATANT COMMANDERS. 1 7 8 9 10 11 1 1 1 1 1 17 18 19 0 1 (a) IN GENERAL. Chapter of title 10, United States Code, is amended by inserting
