WP-Initiatives in Aviation Procedure (Rev1 022004)
WP-Initiatives in Aviation Procedure (Rev1 022004)
WP-Initiatives in Aviation Procedure (Rev1 022004)
c Systems Integration.
c Outsourcing.
c Infrastructure.
c Server Technology.
UNISYS c Consulting.
Imagine it Done . .
CONTENTS.
Introduction. 1
Initiatives. 2
Biometrics systems. 2
Baggage screening. 2
Known shipper and cargo screening. 3
Information technology advances. 3
Conclusion. 5
www.unisys.com 1
Biometrics systems.
Baggage screening.
One of the most important aspects of airport security is the way in which
checked baggage is security-screened and handled. The US Aviation
Transportation Security Act of 2001 mandated that all baggage and/or cargo
accepted for carriage on a US commercial passenger aircraft must be 100%
screened by December 2002. ICAOs Aviation Security Panel, which produces
recommended practices and standards for States under Annex 17 of the Chicago
Convention, with its partners IATA and the International Federation of Air Line
Pilots Associations, was instrumental in fast-tracking 17 new security standards
into Annex 17. These entered into force in July 2002. The three most important
of these were the application of Annex 17 to domestic as well as international
flights, a new standard requiring 100% screening of checked bags by 2006, and
aircraft cockpit door hardening, which is coming in a future resolution. It is
also noteworthy that after the Pan American flight 103 bomb explosion over
www.unisys.com 3
driven, the timely provision of significant information could substantially benefit
enforcement agencies and governments worldwide in efforts to improve security
and combat terrorism.
Many countries and agencies share information, although it is constrained at
times by political sensitivities. However, the disparate technologies deployed
across the world can cause delivery problems. There is no universal protocol.
This phenomenon also exists within some government agencies that have
developed their information technology delivery systems over time. Some
information only exists on legacy systems written in antiquated code or may still
be delivered only in hard copy form. Over the past two years, work has been
underway to standardize disparate technology on modern platforms using cost-
effective industry standard security and data protocols.
In 2004, 22 US enforcement agencies will be integrated into the Department of
Homeland Security (DHS). The Information Technology Managed Services
initiative started in 2002 will provide a singular platform for real-time collection,
storage, management and transaction of data delivery connecting virtually
every commercial airport and DHS facility in the United States and will deliver
convergent information in the form of voice, data and video. The system is
supported by redundant infrastructure and delivery strategies with no single
points of failure to ensure integrity of data and delivery.
Many countries already have such strategies and equipment in place,
which surprises many who imagine that although these systems would be
commonplace for a nations strategic defense agencies, they would be too
expensive for local or regional public enforcement agencies. However, those
that have deployed integrated information systems countrywide know that
terrorism respects no geographic or social boundary.
www.unisys.com 5
Charles Chuck Sander