ICAO SECURITY MANUAL DOC 8973 PDF

Doc – 05 – Security Manual – Seventh Edition – Free download as PDF File . pdf), Text File Check the ICAO website under aviation security. ICAO SECURITY MANUAL DOC The following PDF talk about the subject of ICAO SECURITY MANUAL DOC , coupled with the. and booksellers, please go to the ICAO website at .. The Aviation Security Manual (Doc — Restricted) provides detailed.

Author: Mut Yotilar
Country: Bolivia
Language: English (Spanish)
Genre: Technology
Published (Last): 12 September 2010
Pages: 56
PDF File Size: 20.97 Mb
ePub File Size: 7.3 Mb
ISBN: 658-3-39944-646-1
Downloads: 32730
Price: Free* [*Free Regsitration Required]
Uploader: Kazahn

Additionally, specialty aircraft such as those used for agricultural application and insect control are of concern because of their potential for dispensing harmful aerosols. AW operations deemed to pose a significant threat should be required to establish and maintain a State approved written security program, incorporating the following provisions: Yet, existing controls imposed at these airports to deter theft and vandalism are normally adequate to prevent misuse of the aircraft.

Aviation Security Manual (Doc – Restricted)

Additional measures that are specific to each airport should be added as appropriate, including: Events or circumstances that do not fit the pattern of lawful, normal activity at an airport. Threat assessment should consider the following factors: Scheduled CAT generally operates from major airports that provide a significant security control and screening infrastructure.

Operational control refers to airspace restrictions imposed sevurity the State to prevent operation of aircraft in the vicinity of sensitive areas or activities. Persons who present apparently valid credentials but who do not display a corresponding level of aviation knowledge.

Because the local knowledge of the above factors is probably incomplete, assistance in conducting an airport threat assessment should be provided by State and local intelligence and law enforcement agencies. Turn on more accessible mode.

Doc 8973 Security Manual

Aerial work operations are defined by ICAO as operations used for specialized services such as agriculture, construction, photography, surveying, observation and patrol, search and rescue, aerial development, etc.

  DUELLISTS COMPANION PDF

See Airport Community Watch Program Local controls are normally associated with access to airports and icxo operating areas. Further, in order for a small aircraft to have any impact careful loading and fusing of the explosives must be accomplished; these actions take time and expertise.

Classes of security measures include: Consequently, new faces are quickly noticed. Size and capability of based or transient aircraft will help determine relative threat, as well. This should include encouraging airport and line staff securiry ‘query’ unknowns on ramps, near aircraft, etc.

Doc Security Manual –

The overarching goal is to enhance global security by implementing uniform security measures around the world, a goal that cannot be achieved without an unswerving commitment by all concerned. By definition these facilities do not serve scheduled commercial air transportation dpc may accommodate occasional air taxi operations.

Response to a suspected or actual security breach should be a part of all airport security programs.

Temporary flight restrictions associated with specific activities or events are normally considered more effective than permanent or large area prohibitions. Yet, many more aircraft and flight crew members participate in general aviation and aerial work. A watch program should include elements similar to those listed below. Elements of these analyses may include: Local controls are normally associated with access to airports and airport operating areas.

In addition, ICAO provides support for regional security initiatives with the aim of strengthening aviation security globally. The findings of these studies indicate that due to the numerous and successively dependent steps required to kcao various unauthorized activities, the resulting probabilities were quite low. Teaching an airport’s users and tenants what to look for with regard to unauthorized and potentially illegal activities is essential to effectively utilizing this resource.

  F2480 MANUAL PDF

Airport managers can either utilize an existing airport watch program or establish their own airport specific plan. Encourage proactive participation in aircraft and facility security and heightened awareness measures. This is done through perimeter security controls. Access control breach Theft or attempted theft of an aircraft Assault on an airport employee, tenant or transient persons Bomb threat Airport Community Watch Program The vigilance of airport users is one of the most prevalent methods of enhancing security at GA airports.

The risk assessment ocao consider the following questions: Policy work is focused primarily on maintaining the currency of Annex 17 and related guidance material such as Doca significant challenge considering the evolving nature of the threat. The diverse size and configuration of GA airports makes the establishment of a single set of security precautions difficult. These controls are normally applied sparingly to small areas to protect only the most important ground activities; enforcement of restrictions associated with large or numerous restricted areas is difficult.

manjal Where assessments indicate higher risk levels devices to immobilize the aircraft may be warranted. The first step in devising a security program for a GA airport is to determine the type and size of threats facing the facility. Plans, coordinated with local and State law enforcement agencies should be developed for at least the following events: Any pilot who makes threats or statements inconsistent with normal uses of aircraft. The ability to control access to aircraft parking msnual, hangars and handling facilities will normally prevent most unlawful acts associated with aircraft.

These recommendations are not all-inclusive. Provide training to all involved for recognizing suspicious activity and appropriate response tactics.