IBAC Course Teaches Security Fundamentals to Business Aircraft Owners/Operators

IBAC Course Teaches Security Fundamentals to Business Aircraft Owners/Operators

Security has long been a front-of-mind issue for commercial aircraft owners/operators. Security risks are just as real in the business aviation sector. Security threats to business aviation are everywhere, so businesses and individuals who operate in the business aviation community must make sure to have a plan in place that’s active, effective and dynamic. Risks are incredibly varied and can be of a geopolitical, social, cyber, weather or medical-related variety among others, security experts say.

In a bid to address these risks, the International Business Aviation Council (IBAC) hosted an online course this past fall, entitled, “Business Aviation Security Fundamentals” (BASF). It was hosted by Dyami Security Intelligence and IBAC’s International Standard for Business Aircraft Operations (IS-BAO)/International Standard for Business Aircraft Handling (IS-BAH).

According to the BASF course description, “this new live, virtual, two-day course is designed to equip business aviation professionals with the essential tools to safeguard their operations. Learn about aircraft and passenger security, threats from emerging conflict zones, climate activism, and information security. Participants will gain a deeper understanding of effective risk-management strategies, integrating security practices into their organizational framework, and mitigating these potential threats. The course will provide insight into conforming to IS-BAO/IS-BAH standards and its security chapters.”

“Dyami founder and CEO Eric Schouten is the course presenter,” the BASF course description added. “He brings his aviation intelligence and expertise in espionage, terrorist plots, and the MH17 disaster that inspired him to create Dyami, aiming to make security and intelligence services accessible and affordable.”

During the two-day workshop, the business aviation topics covered included security rules and regulations, security awareness and culture, and risk assessment strategies and mitigation. The content was put together by Schouten, IBAC’s IS-BAO director, Andrew Karas, and IBAC’s IS-BAH director, Terry Yeomans.

In a wide-ranging discussion with Transport Security International after the BASF course was held, these three gentlemen explained the motivation for creating it, the security threats faced by business aviation, and the ideas that were shared to address these threats.

Transport Security International: What was the impetus for creating the Business Aviation Security Fundamentals course, and who was it aimed at?

Andrew Karas, IBAC’s IS-BAO director
Andrew Karas, IBAC’s IS-BAO director

Andrew Karas: Here at IBAC, we had thought about it for a couple of years. There’s been a growing need for an awareness of security tailored to business aviation operations.

The course itself was designed to educate people such as flight department personnel, security managers, aviation professionals, and both air operations and ground handling to enhance their understanding of security and best practices as well as touch on some regulatory requirements.

We reached out to Eric and his Dyami team to get some subject matter expertise and bring to the table his experience and the experience of his team, so that they can educate business aircraft operators as well as ground handling organizations on security.

Terry Yeomans, IBAC’s IS-BAH director
Terry Yeomans, IBAC’s IS-BAH director

Terry Yeomans: I think as the reach of safety management systems expands into the ground handling sector, that we need to work out how we’re aligning the practices that we do with our standards and recommended practices between the IS-BAH and IS-BAO systems and how they can interface with security matters. After all, safety and security starts on the ground, and it’s all about trying to get people to talk, to engage, and to understand where those interfaces are and how we can make everyone safer and more secure. So there was a very simple logic behind why we decided to do something.

Transport Security International: Eric, what is your expertise in business aviation security?

Eric Schouten,founder/CEO Dyami
Eric Schouten,
founder/CEO Dyami

Eric Schouten: As a former intelligence liaison from the Dutch Security and Intelligence Service, I have found that the business aviation industry really needs support in knowing how to handle the security threats that are out there. For the people who have to deal with it, who are not doing this on a daily basis or as a full-time job, they need to understand what threats are out there, how to discuss this with the leadership, and also how to deal with it within the budgets that they have in place.

I worked over 13 years at the Dutch Security and Intelligence Service, and most of the time I was the aviation liaison serving the aviation industry with intelligence reporting and awareness. I was dealing with airports, FBOs, and airlines, providing them with the intelligence they needed to have a safe and secure operation on a global level.

I was involved with MH17 crisis management. I shared intelligence on counter-terrorism and counter-espionage situations. And I discovered during my career at the agency that the business aviation industry really needed support in dealing with these threats because airlines usually have large security departments, while the business aviation industry does not. So they also need that same type of intelligence.

Transport Security International: With respect to business aviation security, what are the threats facing the industry today?

Schouten: The most common threat right now is what’s happening in the world. The world is changing rapidly, and geopolitical risks are in place.

So you can’t just run an aircraft operation like you did four to five years ago. Countries are in conflicts. You have to deal with overflight risks, and you also have to understand the destination and what’s happening over there. Civil unrest is rising, which is why you have to understand what’s happening in the country of destination. Is it safe to park your aircraft over there, and how do you deal with espionage risks for your clients?

When you look at security risks from an FBO/airport level, they’re dealing with the rise of activism and it’s not just climate activists. It could also be activists dealing with what’s happening in another side of the country and all of a sudden your operation is affected. It could be that there is a facility at your airport that is providing services or is part of the supply chain of a war abroad and activists find you. So you really have to understand the why and how to counter this.

Transport Security International: So how did you tackle this during the two-day BASF course?

Schouten: Well, the first thing we did was to share stories together. We taught the students to drink coffee together and to share information.

I personally think that’s a very core principle of risk management. You have to be able to share information with others or be able to get help from other organizations, and then you have to identify what are the types of risks. Then you have to feed the risk management assessment with intelligence. You have to feed it by identifying what type of organization you are and what are the threats coming ahead of you.

As it turned out, we had a mix of students. Some of them are aircraft operators and others are FBO type of operations. They have different threat levels. An aircraft operator has to deal with geopolitical risk. What’s happening over there? Meanwhile, the operation on the ground really has to deal with the local risks. So you have different risk appetites. (Note: The Institute of Risk Management defines a risk appetite as “the amount and type of risk that an organization is willing to take in order to meet their strategic objectives.”)

Transport Security International: What relationship does the notion of “risk appetites” have on business aviation security?

Karas: I’ll touch on that, and then I’ll hand it over to Terry if he has any other comments.

My program is the International Standard for Business Aircraft Operations (IS-BAO). Like the IS-BAH program, IS-BAO has a chapter that covers security. That chapter asks organizations to establish and maintain a security program that’s proportional to the threats against the organization. So it asks their personnel and their facilities and their oversight to look at their vulnerabilities and see what requirements they need. Do they have regulatory requirements? Do they have corporate requirements? Do they have individual person requirements? So, our standards provide those questions for operators to answer.

Yeomans: Since the Pan Am incidents (such as the Lockerbie bombing of Pan Am Flight 103), there’s been increased heightened activity about airside activity and airside security. It’s been about trying to get people to think about what their risk appetite is and to start considering what they need to do, not necessarily just to deal with the regulation, but going beyond what the regulation’s looking for.

That being said, the regulation is really aimed at airline security. It’s not designed for business aircraft security. And we do have different risk appetites in terms of the business structure that we have. So it’s good to get people talking to open up and think about, “Well, maybe I’m not alone, maybe I can work this journey with other people that do this in the same way.” And that’s why we’re trying to bring everybody together; ground handling, aircraft operations, security intelligence saying, “Okay, what is out there? What do you think has happened? What have you seen happen in the past? And how can we better educate everybody to think outside the box?”

Transport Security International: So how was the BASF course structured?

Schouten: It was a two-day online virtual course, and what’s important to understand is that we truly made it an interactive course. It wasn’t a PowerPoint slide deck that people see all the time. No, it was all about sharing stories and experiences and deep diving into that with best practices. The best practices are key.

The most important part of the course was to take assumptions away. What organization is doing this? Is that organization doing this for you within the company? Are people doing this or your client assumes that you are taking care of their security risk assessments? Well, in reality, you may not. So you really have to understand that the security culture has to be in place, and also how to work with your board because it’s all about understanding.

Transport Security International: So what did you students learn about business aviation security during the BASF course?

Schouten: Basically what we noticed was a lot of eye-openers taking place.

For instance, the people in charge of business aviation security often get the task because they have backgrounds in the police force or in defense or something like that. And all of a sudden, they’re responsible for the security part of this business aviation operation where there is a challenge and they can’t do this alone. So we saw a lot of students really have an opening up like, “Oh wow, so this is all we need to do, but we need help with this.” And that was very interesting to see.

What I noticed — and Andrew and Terry can correct me or at least add to it — is that business aviation is a fast business. “We have to be somewhere quickly and it’ll be alright.” However, given the world today with the new threats out there, you can’t just operate like you used to.

Yet the assumption that everything will be fine is still there. I really notice it. I was at an aviation conference and you still see this mentality, and that really has to change. We have to change the security culture of assumptions about everything is still okay. We really need to change that.

Karas: To piggyback on what Eric said, from the aircraft operator side the assumptions are that the security situation will be handled at various steps to their destination; that there’s already security measures in place that allow them to have the awareness of overflight risks; the security at their destination, at their hotel or transportation is in place; and that the security situation at the destination is being managed appropriately by the state or the local police authorities. Those are the assumptions that I think many operators have and those assumptions, like Eric probably alluded to, may no longer be valid. I’ll pass it over to Terry because he handles the ground operations side.

Yeomans: Generally all of aviation — particularly in our sector — is very much inward facing: “What’s the security threat to me? What’s the security threat to my company, my workers, my employees?”

What we’re trying to get people to think about is how you can open up those silos; how you can bridge that and work together as a team, rather than that insular inward-looking focus all the time. Because by reaching out and speaking to people saying, “Okay, well what do you see? What do you hear? Can you help me with this?” — that’s going to open up and make everybody much safer in the way we operate.

Transport Security International: So how did the BASF course turn out? And does IBAC plan to offer it again?

Karas: We had seven in this class. We are offering this course as schedules permit, but it’d be offered a few times a year. It’s based on everybody’s availability. We don’t have anything set, but we do plan to offer it in the future.

Schouten: We are very willing to offer this every three months or every two months. And we’re seeing interest in this because a lot of people are struggling with how to deal with the threats out there. Look at the situation right now in the Middle East; it’s really a discussion point at this time. So people are interested in how to deal with emerging conflicts. It’s becoming a topic, so they need guidance and IBAC is providing this now.

Yeomans: Everybody knows there’s a risk, but they believe that it’s covered or somebody else is covering it for them. This course is opening up a pathway to get people to talk about where the gaps are in business aviation security today, and how we can address those gaps.

Chemical Transport Tips

Chemical Transport Tips

Implementing correct chemical transportation guidelines and standards can prevent a potentially volatile situation.

Hazardous chemicals play a part in everyday life. They support virtually every aspect of our lives — to grow food, protect the safety of our water, make life-saving medicines and equipment and produce energy, among countless other uses. And these chemicals, and the facilities where they are manufactured, stored, distributed and used, are essential to today’s economy. It is a top priority that chemicals are handled and transported safely.

Ohio train derailment

Recent tragedies have reminded us, however, that doing this is not without risk. The 2023 train derailment in East Palestine, Ohio — heavily covered in the media — has understandably raised many questions and concerns. A Norfolk Southern freight train was carrying hazardous materials when 38 cars derailed. Several railcars burned for more than two days; hydrogen chloride and phosgene were released into the air.

Safety must be a top priority for the U.S. chemicals manufacturing industry. Storing chemicals is never easy and transporting them can be one of the riskiest procedures carried out, because at no other time is accidental release and exposure more likely.

Chemicals that contain carcinogens and toxins and/or are unstable, caustic, water-reactive, flammable or explosive are considered hazardous. Any chemical that does not cause harm to one’s health is referred to as non-hazardous.
Chemicals that contain carcinogens and toxins and/or are unstable, caustic, water-reactive, flammable or explosive are considered hazardous. Any chemical that does not cause harm to one’s health is referred to as non-hazardous.

Hazardous and Non-Hazardous Chemicals

Examples of hazardous materials in the chemical industry include flammable liquids (e.g., gasoline, ethanol), corrosive substances (e.g., sulfuric acid, hydrochloric acid), toxic gases (e.g., chlorine, ammonia) and radioactive materials (e.g., uranium, plutonium). The difference between hazardous chemicals and non-hazardous chemicals is generally based on the harm the chemicals can cause if humans, animals or the environment are exposed to them. Chemicals that contain carcinogens and toxins and/or are unstable, caustic, water-reactive, flammable or explosive are considered hazardous. Any chemical that does not cause harm to one’s health is referred to as non-hazardous.

The Hazard Communication Standard (HCS) of the U.S. Occupational Health and Safety Administration (OSHA), has definitions of physical and health hazards as:

• Physical hazard. There is scientifically valid evidence that the chemical is a combustible liquid, a compressed gas, explosive, flammable, an organic peroxide, an oxidizer, pyrophoric, unstable (reactive) or water-reactive.

• Health hazard. There is statistically significant evidence that acute or chronic health effects may occur in people exposed to the chemical. This includes many chemical types, including carcinogens, irritants, corrosives and agents that damage the lungs, skin, eyes or mucous membranes. There are nine different classes of hazardous materials that are further broken down into divisions based on the type of hazard present.

• Chemicals in Transit. Chemical transportation modes include road and railway, each offering unique advantages like flexibility and cost-effectiveness, but also posing specific risks and limitations. These modes move chemicals while adhering to strict regulations and standards. Federal and state laws carefully control the safe and secure transport of chemicals across all modes of transportation, including highway, rail, aviation, maritime and pipeline to reduce the risk of spills or accidents.

The Environmental Protection Agency (EPA) enforces the Hazardous Materials Transportation Act (HMTA) to control how potentially dangerous chemicals are moved across the United States. The HMTA includes detailed provisions for procedures, labeling, packaging requirements, employee training and operational rules involved in chemical transport. Violations of the HTMA are federal offenses and can carry serious criminal penalties including jail time and fines up to $75,000.

When shipping chemicals, whether through standard or expedited freight services, there are many factors to be considered. Individuals transporting chemicals must be familiar with the material’s hazards and know what to do in the event of a release or spill. At the forefront of chemical transport is having all parties clearly understanding the chemical being shipped.

All transportation partners should be aware of the chemical’s characteristics. Accurate shipping documentation can help do this. A bill of lading (BOL) is a key document that outlines the type, quantity and handling instructions for the chemicals being transported, along with how they are being shipped and the path it will take. A BOL includes all necessary documentation, labels, emergency contact information, hazard communication information and safety data sheets (SDS). A SDS is a good source of information; it allows better understanding of additional product specifics.

Chemicals

Chemical Product Specifics and Characteristics

• Temperature. Chemicals are highly temperature-sensitive, so transport companies must plan for this. Some chemicals may require refrigeration, for example. Other chemicals must not fall below a certain temperature. Also, be sure to consider how the weather may factor in.

• Density. The weight per gallon will help us determine the number of trucks required to handle a shipment pH and viscosity. A chemical’s pH level can dictate what types of tanks or trailers it can be safely transported in (e.g., low pH items will require rubber-lined tanks which are harder to come by than stainless steel and aluminum). A chemical’s viscosity dictates whether the product can be pumped or if an air compressor can be used.

• Packaging. One of the primary safety considerations in chemical transportation is correct packaging. When choosing the right type of packaging, consider all the properties and hazards of each substance. Packaging must prevent leaks, spills and potential reactions between different substances. It also ensures that the material remains intact during transit. Also, accurate and visible labeling is crucial for identifying the hazardous material and alerting personnel and emergency responders to potential risks. Labels must include hazard warnings, identification numbers and other essential information. Will the shipping company require special protection while transporting the chemicals? Determine whether the chemicals require hazmat or non-hazmat shipping. When choosing the right liquid bulk tanks, make sure the containers are classified based on their contents. For example, some chemicals might not work well with plastic; they may need stainless steel or carbon steel. Were there incompatible chemicals in the tank or trailer prior to a new shipment? Incompatible chemicals must be kept separated during transport. Secure the packaging for chemical transport. When in movement, packaged chemicals should not be able to come loose or even minimally jostle. Should this occur, damage to the shipping container and/or the substance inside is possible.

• Acids and bases. Segregate mixed classes of substances, like acids and bases, during the transport process. This will eliminate issues or even a potential catastrophe if an accident occurs and the containers are damaged and chemicals react with each other.

• Destination and origin. When shipping chemicals, the location of origin and destination likely have specific regulations that must be followed. A shipping company should know standards compliance.

• Time frame. Just as some chemicals are temperature-sensitive, others are time-sensitive. Communicate this accurately and take advantage of expedited shipping to ensure safe transportation. Be aware of supply chain interruptions. Should severe weather impact hazmat trucking, it can cause delays in arrival or even cause time-sensitive chemicals to be disposed of. Some interruptions cannot be avoided, but those that can be predicted (like severe weather) should be part of the chemical transportation strategy.

• Quantity. Whether an entire shipment is hazardous or if just one barrel will impact how the shipping company approaches the shipment. The dry and liquid content will also determine shipping storage, so give an accurate measurement.

Immediate response protocols and coordination with local authorities are vital to contain and mitigate the impact of accidents and spills. NTSB image.
Immediate response protocols and coordination with local authorities are vital to contain and mitigate the impact of accidents and spills. NTSB image.

Accidents Will Happen

Despite stringent safety measures, accidents and spills can still occur during chemical transport. Immediate response protocols and coordination with local authorities are vital to contain and mitigate the impact of such incidents. Companies should regularly review and update their emergency response plans to ensure effectiveness.

A spill kit should be available suitable for cleaning up the materials that are being transported. In general, this would consist of personal protective equipment (e.g. gloves, eye protection), absorbent materials and plastic bags to contain clean-up debris. If refrigerant is used during the transport, then the operator should have a pair of cryogenic gloves available in the vehicle.

Drivers involved in hazmat transportation must obtain a hazmat endorsement on their commercial driver’s license (CDL). This endorsement demonstrates their understanding of hazmat regulations and safety protocols. Employers should also provide specialized training to drivers to enhance their awareness of potential hazards and the proper handling of hazardous materials.

When shipping chemicals, the regulations in the region where the freight is being sent must be considered. This will ensure complete compliance. Once the necessary information is provided, a shipping company can take care of the rest. One way to ensure safe chemical transport is via chemical logistics management. This encompasses the planning, implementation and control of the flow of chemical products. It requires a wholly integrated approach to transportation, storage, handling and distribution, ensuring that chemicals reach their destination safely and efficiently.

The chemical industry can contribute to continuous improvement in hazmat transportation safety by investing in research and development for safer transport technologies and materials. Through rigorous training, adherence to best practices and the use of advanced technology, chemical freight service providers can maintain high safety standards and operational efficiency. This includes real-time tracking of shipments, risk assessments and continuous improvement processes. Companies can also share best practices, learn from past incidents and collaborate with regulatory bodies to shape effective and up-to-date regulations. Embracing a proactive safety culture and prioritizing environmental sustainability are additional ways the industry can drive advancements in chemical transportation safety.

Unruly Passengers: The Growing Challenge for Airline Security Part one: Understanding the Problem

Unruly Passengers: The Growing Challenge for Airline Security Part one: Understanding the Problem

An “unruly passenger” is defined as an individual whose behavior on a flight disrupts the normal operation of the aircraft or compromises the safety and well-being of passengers and crew. This behavior can manifest in various ways, including physical violence, verbal threats, refusal to comply with safety protocols, tampering with aircraft systems, or harassment of crew and fellow passengers. Unruly behavior is not limited to overt aggression; it also encompasses less obvious actions such as repeated refusal to wear a seatbelt or use of prohibited devices that interfere with flight operations.

According to global statistics, unruly passenger incidents have been steadily increasing. The International Air Transport Association (IATA) reported over 10,000 cases annually in recent years, with some incidents escalating to severe threats or physical altercations. This trend has been exacerbated by the post-pandemic travel surge, where heightened anxiety, altered social norms, and pent-up frustrations contribute to a volatile environment. Airlines have also observed spikes in incidents on longer-haul flights and during peak travel seasons.

In two separate recent incidents, passengers managed to bypass TSA security protocols and board an aircraft without presenting any form of identification or a boarding pass. These alarming breaches were only discovered due to the passengers’ unusual behavior, which drew the attention of flight attendants. While neither passenger exhibited disruptive conduct or carried prohibited items — having passed through TSA metal detectors — the incidents have prompted serious reviews by both TSA and the airline involved.

argument at checkout

Investigations revealed security footage highlighting how easily the individuals circumvented standard procedures, underscoring vulnerabilities in the current system. This repeated lapse has raised concerns about the adequacy of existing safeguards and highlighted the critical need for enhanced vigilance at every checkpoint. The incidents serve as a stark reminder that even non-disruptive passengers can pose significant security risks if fundamental processes are not consistently enforced.

Root Causes

Understanding the root causes of unruly passenger behavior is essential to addressing the problem effectively.

1. Psychological and Behavioral Triggers:

• Stress: The stress associated with travel — from security checks to navigating crowded terminals — can lead to heightened irritability. Fear of flying is another significant stressor that can trigger panic or aggressive outbursts.

• Substance Use: Excessive consumption of alcohol, often available in airport lounges and on flights, is a leading contributor. Some passengers may also use recreational drugs before boarding, further impairing judgment.

• Mental Health Issues: Unmanaged or undiagnosed mental health conditions, such as anxiety disorders, bipolar disorder, or schizophrenia, can exacerbate the risk of disruptive behavior.

2. External Factors:

• Flight Delays and Overcrowded Airports: Prolonged delays, cancellations, and overcrowding create frustration and fatigue, leading to shorter tempers and reduced tolerance.

• Perceived Customer Service Issues: Passengers who feel disrespected, ignored, or mishandled by airline staff may become combative. Issues like lost luggage, seating disputes, or miscommunication often act as flashpoints.

• Cultural Differences and Misunderstandings: Variations in cultural norms and language barriers can lead to misinterpretations and conflicts, particularly on international flights.

Impact on Airlines

Unruly passenger incidents have far-reaching consequences for airlines, affecting safety, operations, and reputation.

1. Safety Concerns:

• Physical altercations or threats can directly jeopardize the safety of passengers and crew. In extreme cases, such incidents can escalate to attempts to breach cockpit security or interfere with flight controls.

• Even minor disruptions require the crew’s attention, potentially detracting from critical operational duties, especially during takeoff, landing, or in-flight emergencies.

2. Operational Disruptions:

• Flights may need to divert to the nearest airport to remove disruptive passengers, leading to substantial operational costs. Diversions typically include additional fuel, airport fees, and the logistical challenges of rebooking passengers.

• These incidents often result in cascading delays, disrupting schedules for connecting flights, crew availability, and airport operations.

3. Brand Reputation and Legal Implications:

• Airlines risk damaging their reputation when incidents involving unruly passengers gain media attention. Public perception of inadequate safety measures or poor handling of incidents can lead to loss of customer trust.

• Legal consequences, including lawsuits from passengers or crew injured during incidents, can be costly. Airlines may also face regulatory scrutiny if found negligent in managing such situations.

Regulatory Environment

Addressing unruly passengers requires a robust regulatory framework supported by international collaboration.

1. International Guidelines:

• The International Civil Aviation Organization (ICAO) has developed comprehensive guidance on managing disruptive passengers, emphasizing the need for consistent global enforcement. The Montreal Protocol of 2014, an amendment to the Tokyo Convention, expanded jurisdictional authority to address unruly passenger behavior more effectively.

• Regional regulatory bodies, such as the Federal Aviation Administration (FAA) in the United States and the European Union Aviation Safety Agency (EASA), enforce specific measures, including mandatory reporting of incidents and penalties for airlines failing to manage such situations adequately.

2. Penalties and Enforcement:

• Penalties for unruly passengers include substantial fines, imprisonment, and bans from future flights. In some jurisdictions, passengers are held financially responsible for costs incurred due to diversions or damages.

• Despite these measures, enforcement challenges persist. Jurisdictional complexities arise when incidents occur in international airspace or on foreign carriers, making prosecution and extradition difficult.

• Preventative Measures at Check-In

• Airlines can take proactive steps during the check-in process to reduce the likelihood of encountering unruly passengers.

1. Behavioral Observation and Profiling:

• Train check-in agents to identify signs of stress, intoxication, or erratic behavior in passengers.

• Use discreet behavioral screening protocols to flag high-risk individuals for further assessment.

2. Enhanced Communication:

• Provide clear and polite communication during the check-in process to alleviate passenger frustrations. Explain policies and procedures to preempt confusion or disputes.

• Offer assistance to passengers who appear anxious or overwhelmed, such as families traveling with young children or individuals with visible disabilities.

3. Strict Alcohol Policies:

• Partner with airport vendors to limit the sale of alcohol to visibly intoxicated individuals.

• Monitor passengers for signs of inebriation during check-in and issue warnings or deny boarding if necessary.

4. Conflict De-escalation Training:

• Equip check-in staff with conflict resolution and de-escalation techniques to handle difficult passengers calmly and effectively.

• Maintain a visible presence of security personnel near check-in counters as a deterrent and for immediate intervention if required.

5. Pre-flight Notifications and Warnings:

• Send passengers reminders of the airline’s behavior policies and consequences for violations before they arrive at the airport.

• Display visible signage at check-in counters about the legal repercussions of unruly behavior.

By addressing potential triggers and identifying problematic behaviors early in the travel process, airlines can reduce the incidence of disruptive events, enhancing safety and improving the overall travel experience for all passengers.

Join us for Part Two: Training as a First Line of Defense. “Equipping the Frontline: the Role of Training in De-escalating Unruly Passenger Incidents” in the next issue of TSI magazine.

About the Author

With more than 25 years of experience, Frederick Reitz specializes in developing and implementing advanced security strategies to enhance air travel safety and operational efficiency. He holds a B.S. in Aviation Management and a master’s in Aeronautical Science from Embry-Riddle Aeronautical University and is currently pursuing a Ph.D. in Conflict Analysis and Resolution at Nova Southeastern University, with a focus on unruly passengers and conflict within the aviation industry. Reitz is currently director of security at Magnifica Air.

Part one: Understanding the Problem

The Critical Role of Maritime Security in Global Supply Chains

The Critical Role of Maritime Security in Global Supply Chains

After a hiatus of several years where piracy and other state-backed threats across swathes of the global commons and national littorals had appeared to be on the wane, events over the last fifteen months have brought the requirement for coordinated maritime security back into sharp focus. Although Houthi efforts to disrupt shipping in the Red Sea and Gulf of Aden are probably the most well-known, viewing this group’s actions as the marker for the myriad other threats facing global supply chains in the maritime environment risks both over simplifying “threats,” and potentially over-engineering mitigation methodologies appropriate elsewhere.

Hard-earned lessons around the generic and specific nature of maritime security will inevitably have been forgotten as corporate institutional memory fades, and budgets are refocused elsewhere. Any renewed emphasis on maritime security must also be considered alongside the growth in dynamic new threats not even considered only short years ago. Simply put, this is now a far more complex environment than previously.

Understanding: The Key Enabler?

Regardless of where, how and when activity across global supply chains takes place, ensuring access to an understanding of threats and risks, including some that haven’t even been considered, is certainly the most critical enabling activity across all global logistics. This is particularly critical within the maritime environment to ensure a more profitable bottomline. The depth of knowledge and expertise required is often, but not always, best delivered via a trusted outsourced partner who has the subject matter expertise and international connections to deliver nuanced maritime security, specific intelligence assessment and appropriate security mitigations.

On-going conflicts in the Middle East and Russia’s attack on Ukraine have both been significant catalysts in the development of capabilities that can now be turned against global supply chains. State actors are now increasingly using proxies and others who can do their bidding in an unattributable manner, but often with covert state-backed support in the form of cyber effects, intelligence, surveillance and reconnaissance (ISR), including access to satellite technology, electronic eavesdropping and artificial intelligence, and logistics. All this can turn what may have previously been thought of as “simple” pirates or opportunist criminals operating around port facilities into potentially very significant threats. The capabilities to mount attacks are further magnified at a local level through the use of novel, but increasingly effective technologies, with commercial drones being the most noteworthy and potentially significant, both to conduct surveillance and also to mount attacks, without appropriate security measures to defeat them.

Because of this, the maritime security industry needs to be increasingly focused across the logistics chain that begins elsewhere, i.e., at the factory floor or a distribution warehouse, which becomes the industry’s responsibility on its journey and remains under observation and care until it has left the port. Simply focusing on the situation whilst at sea is no longer sufficient to counter the threats and risks that are faced by deeply interconnected global supply chains; some part of which will inevitably be a target of various actors and adversaries.

The Maritime Security: What Next?

This short article needn’t explain the well-established relationships and organizations between the industry and its clients, nor list all those groups who enable this. But the maritime security industry is probably better integrated into the needs of its client base than many others, all honed over years of prescient threats from the mid-1990s until the late 20-teens. At its zenith, the “Best Management Practices to Deter Piracy and Enhance Maritime Security” (BMP Series) has become the globally recognized guide designed to help vessels owners and Masters mitigate the risk of piracy and other maritime security threats. Each iteration of BMP reflects lessons learned from real-world incidents, evolving threats, and advances in maritime security practices. The BMP are very good but are in danger of not keeping up with rapidly evolving threats, particularly where geopolitics and state-based threats need to be considered. This means experts within the industry are more necessary than ever to translate a pragmatic interpretation of the threat as it actually exists, via their access to a refined and effective intelligence picture to then ensure the delivery of an entirely effective end-to-end security plan.

The days of armed and unarmed guards no longer providing close protection security on vessels transiting across the world’s oceans are still probably years away. But these individuals will increasingly be the forward sensor for a sophisticated intelligence and security ecosystem, able to harness technology to ensure their vessel is as safe as it can be from multiple threats; and can share insights with and from other vessels, including with allied naval flotillas in the highest risk areas. Informing dynamic routing advice to boardrooms and the Master of each vessel and acting as the anchor to global trade in an increasingly complicated and dangerous world.

About the Author

Cliff Thoburn MBE is head of intelligence at RMI Global Solutions, security and intelligence specialists that monitor and assess global risks using a bespoke risk management methodology. Thoburn has more than three decades of expertise gained in the U.K.’s government intelligence environment. With extensive experience delivering security and resilience solutions for critical national infrastructure, including the U.K.’s energy sector, he provides insight into threat mitigation. His particular interest is in the emerging risks posed by unmanned aerial and surface technologies, which are reshaping security challenges, and how to mitigate threats for RMI’s clients.

Carry On
Lead Editorial

Carry On

There is so much going on this year and it is only January! The United States has a new president and he is busy firing and installing a new administration. The head of the Transportation Security Administration and the leader of the Coast Guard are among the first to be fired. David Pekoske, administrator of the TSA, was fired on the first day of his second presidency, even though Trump had appointed Pekoske in his first administration.

Pekoske oversaw a November notice of proposed rulemaking that would require a slew of pipeline, freight railroad and passenger railroad owners and operators to establish cybersecurity risk management programs that aim to help the surface transportation landscape respond to digital incidents.

It followed earlier rounds of TSA cybersecurity rules under Pekoske, born out of the 2021 Colonial Pipeline hack that motivated the former Biden administration to invigorate the U.S. cyber posture.

The Coast Guard commandant, Admiral Linda L. Fagan, was also fired before her term was up on the newly sworn in president’s first day in office. Admiral Fagan was the first female uniformed leader of a branch of the armed forces and was generally lauded by her predecessors and other leaders in the Coast Guard. It was reported that Fagan learned she had been fired while waiting to take a photo with Trump at the Commander in Chief Ball on Inauguration Day.

Vice Commandant Adm. Kevin Lunday will take over as acting commandant, according to a Coast Guard internal message. Lunday confirmed he took over as acting commandant in a message to the service. “Our duty to our nation and the American people we serve remains unchanged, and the Coast Guard remains Semper Paratus.”

Will these rash firings weaken our security status or will their replacements come in strong? Stay tuned.

On an unrelated and slightly less serious note, I wanted to mention a movie I saw recently on Netflix called Carry-On. While the movie is full of plot holes and inaccuracies, I mention it because the dedicated people who work as airport screeners are not often the subject of Hollywood movies. But, this is exactly the case in this movie. The hero, and he is a hero, is played by Taron Egerton and he is spurred to be a better man when he finds out his girlfriend is pregnant. But he picked a bad day to start.

security officer

Egerton’s Ethan Kopek is a TSA screener and his partner Nora, played by Sofia Carson, is a bit higher up the food chain at LAX and she encourages him to reapply for the police academy, a dream he had given up on. A criminal-for-hire, played by actor Jason Bateman, needs something smuggled through airport security and due to Ethan’s striving to do better, he ends up behind the scanner on the line the evildoer has targeted.

Ethan becomes the new mark and finds himself in possession of an earpiece. Bateman’s character, referred to as the Mysterious Traveler, tells him that he must let one bag through in exchange for Nora’s life. A classic dilemma. A game of cat-and-mouse ensues, in which Ethan tries to disrupt this scheme. The bag, a suitcase filled with a lethal and incurable nerve agent, is intended to make it on board a flight on which a member of Congress is traveling to JFK. She is the target, and they intend to kill her for political reasons.

Now, I don’t want to overhype this movie. As I mentioned, it’s full of plot holes and inaccuracies — it reminded me of a made-for-TV movie from the ’80s. It was a bit cartoonish in parts. But one thing they got right in the movie has stuck with me since watching it and I wanted to share it with you. This movie portrays the men and women who undertake the daily grind of the frontline screening of passengers as competent, serious and sincere in their desire to protect the traveling public.

Every once in a while, it’s good to remind ourselves of our mission and why we do what we do. For the many people working in airport security, that mission is “to protect the nation’s transportation systems to ensure freedom of movement for people and commerce.”

TSA mentions integrity, respect and commitment as core values and hard work, professionalism and integrity as expectations in the workforce.

Surprisingly, this movie does a pretty good job of showing those values. You can check it out, as mentioned, on Netflix.

Conflict in the Middle East: The Implications for Transportation Security

Conflict in the Middle East: The Implications for Transportation Security

In the same way that it is not the job of a marriage guidance counsellor or psychotherapist to be openly judgmental of their client, for a security service provider to succeed, they need to avoid the blame game. Historical, or even biblical, claims to land are not their issue, nor are the rights and wrongs of political arguments. Whether or not they agree with the strategy of the Israeli government in response to the barbaric attacks of October 7, whatever they think of the integrity of the United Nations and regardless as to who or what they classify as a terrorist or terrorist organization, it is incumbent upon those responsible for aviation security to recognize the likely impact of the conflict. Our aim is to save the lives, and well-being, of those passengers and crew on board our aircraft and over whom we fly. Let’s consider the challenges in achieving this goal.

Like the assassination of JFK, the death of Princess Diana and, of course, the September 11 attacks — subject to one’s age — we all know where we were when the news of the terrorist attacks of October 7 filtered through. When it did, those in the world of security consultancy did not need to listen to any political pundits, academic or otherwise, to know that a line had been crossed and that the impact was going to be far-reaching and devastating. Innocent lives, and many of them, were going to be lost. Israel’s Prime Minister Benjamin Netanyahu might have actually voiced the words, “The Bible says that there is a time for peace and a time for war. This is a time for war,” but most — adore him or loathe him — knew that this was the new reality for the region. Diplomacy, whilst hopefully not extinguished, was clearly on the back burner.

It is impossible to tackle this topic without being deemed to have demonstrated some degree of political bias; few articles have managed to navigate the turbulent waters of opining without doing so. For those of you interested in the conflict, and listening to the viewpoints of both sides, I do recommend “Hurt People Hurt People, October 7 and its Aftermath” (produced by Beetz Brothers and ZDF in association with Zygote Films) — a feature-length documentary, viewable online, which explores the repercussions of the Hamas attacks and the ongoing cycle of violence in the Middle East as a whole. Of course, both sides will claim that “they didn’t mention X,” or “how could they not show Y,” but it does, in 90 minutes, attempt to demonstrate that both sides of the Israeli/Palestinian conflict are hurting and both have reason to do so. “Hurt People Hurt People” is not, as so often is alleged, simply a platitude used as an excuse for aggressive behavior; rather, it attempts to delve into the psyche of the average Israeli and the average Palestinian and help understand their respective mindsets and, equally importantly, those of their leaders.

As the conflict rages on, innocent civilians are dying in droves as Israel bombs Hamas, Hezbollah and even Houthi targets ensconced in the midst of population centers.
As the conflict rages on, innocent civilians are dying in droves as Israel bombs Hamas, Hezbollah and even Houthi targets ensconced in the midst of population centers.

“From the River to the Sea” placard-waving demonstrators, Hamas and Hezbollah apologists or, on the flip side, advocates for Israel’s annexation of the West Bank (and/or reoccupation of the Gaza Strip) and champions of a “greater Israel” are not seeking to empathize with the plight of the other side. They believe in their mantra, listen solely to media outlets reflecting their stance, spread hatred (leading to Islamophobia or antisemitism) through social media and remain convinced that they occupy the moral high ground. There is no concession, nor opportunity for respectful debate.

An image from the documentary “Hurt People Hurt People, October 7 and its Aftermath” shows bullet holes in a vehicle on October 7, 2023.
An image from the documentary “Hurt People Hurt People, October 7 and its Aftermath” shows bullet holes in a vehicle on October 7, 2023.

Those who read my article in this journal a year ago will know that I am a staunch believer in a two-state solution — the state of Israel living harmoniously and securely side-by-side an independent Palestinian state — and whilst that seems a complete pipe dream at the moment, that optimistic vision, or a variation of it, seems to me to be the one solution that offers the potential of a just peace. Around the globe, that aspiration for the so-called “day after” (the conflict) remains the prevalent objective for those not directly scarred by the ravages of war. Fortunately, even in Israel, Gaza and the West Bank, there are those who are actively advocating for it. The Olmert Al-Kidwa peace proposal is just one example of this with former Prime Minister Ehud Olmert and Nasser Al-Kidwa, a former Palestinian minister of foreign affairs, jointly presenting their plan to Pope Francis at the Vatican on October 17 this year. Amazingly, the mainstream media paid little attention.

In the meantime, the conflict rages on. At the time of writing (October 23), innocent civilians are dying in droves as Israel bombs Hamas, Hezbollah and even Houthi targets ensconced in the midst of population centers (so often beneath hospitals and schools), Israeli towns remain uninhabitable as those same groups launch missile attack after missile attack in the hope of penetrating the Iron Dome, and the 100+ remaining Israeli hostages seized on October 7 have yet to return home. Anger and resentment reign and this could well impact civil aviation around the globe.

I wish to focus on six concerns. The threat to aviation from, or due to:

• industry insiders;

• operations in/over conflict zones;

• the intentional hijacking and/or bombing of aircraft/airports;

• inadvertent carriage of explosives on board aircraft;

• disruption due to protests; and,

• unruly passenger incidents as a result of conflict between passengers and/or crew.

Insider Threats

The insider threat is, I believe, the greatest challenge if one looks at aviation from a global perspective. Often ill-informed opinions, formed on the basis of social media postings, are rife with sometimes well-intentioned advocates for one side or the other liking, sharing or re-posting fake news that further inflames public sentiment. Supposedly unbiased media outlets have clearly taken sides and are shaping public opinion with the imagery they are choosing to show, the words and terminology they are opting to use, the experts they have decided to invite to interview and the degree of balance they are electing to exercise. Against this background, with so many very strong opinions being expressed within families in social groups and at places of worship, there are those who feel that the conflict warrants acts of civil disobedience.

Most western states are keen to ensure that the right to protest remains sacrosanct. The holding of vigils, sit-ins (and die-ins), rallies, marches, the organization of petitions, boycotts, and even effecting walkouts or striking are part and parcel of democracy at work — as long as the rallying call is not in support of terrorist organizations. And here’s the rub — that very caveat. If the opinion of the masses is that a certain group is a legitimate political movement rather than a terrorist organization and/or that a state has gone rogue and is itself committing atrocities, the mood music changes. Peaceful protest can transform into criminal action. When religious ideology enters the equation, the consequences can be catastrophic.

There has been widespread condemnation of Israel on the Arab street and in the Muslim world. With there being almost two billion Muslims and more than 50 states with a Muslim-majority population, their cry is significantly more powerful than that of the 15 million Jews and the one state in which they are the majority. Additionally, the size of the Muslim community in non-Muslim states and the understandable number of non-Muslims who are equally horrified by the deaths, maiming, orphaning and suffering being witnessed on their television screens and on social media, has resulted in a sense of fury with the political leadership of, primarily, western states, supporting Israel. As that sense of injustice brews so does the chance that those employed at airlines, airports, freight forwarding companies, catering and cleaning firms, in law enforcement and in airside operations might decide to act against the industry and its interests. We need to remember that it only takes one rogue employee with a warped ideology to cause a disaster.

The scale of utter hatred being demonstrated on social media platforms is terrifying. The number of employees of airlines, airports, regulatory agencies and, yes, even United Nations bodies in my own LinkedIn network using vile language, expressing clearly antisemitic sentiment and openly calling for the destruction of Israel illustrates that my concern over the insider threat is not far-fetched. And yet, despite this I will resolutely defend the use of behavior detection and argue passionately against racial profiling. Why? Because there are enough people who do not fit a stereotype who could be perpetrators of a terrorist atrocity out there and our focussing on one group would not be conducive to good security practice.

Overflight of Conflict Zones

Aircrew and passenger concern about flying in the region is completely understandable. After all, commercial airliners have been destroyed by surface-to-air missiles in combat zones, or in security-challenging locations, either intentionally or in error. These include the loss of Malaysia Airlines flight MH17 over eastern Ukraine in 2014 and the destruction of a Ukraine International Airlines flight departing Tehran in January 2020.

“As that sense of injustice brews so does the chance that those employed at airlines, airports, freight forwarding companies, catering and cleaning firms, in law enforcement and in airside operations might decide to act against the industry and its interests.”

The photographs of flights landing in, and departing from, Beirut and Tel Aviv amidst explosions on the ground or Iron Dome intercepts in the skies is unnerving. When one considers that there were in excess of 28,000 rocket, missile or drone attacks on Israel in the year subsequent to October 7 (9,000 rockets were fired by Hezbollah from southern Lebanon), including the two attack waves from Iran, airline risk managers have certainly been earning their keep in respect of operations to and from both Israel and Lebanon, let alone the overflight concerns in the region as a whole.

The Iron Dome has been a phenomenal success story, far exceeding the expectations of many. Yet it is not infallible, and drones have managed to penetrate Israel’s air defenses. Whilst Hamas, Hezbollah and the Houthis just might do so with intent, neither Israel nor Iran are going to intentionally target civil aviation; that, however, does not mean that an accidental shootdown will not occur.

Exemplifying this, a German media outlet reported that, on October 1, an Air France flight in Iraqi airspace — en route from Paris to Dubai — was dangerously close to being hit by ballistic missiles launched by Iran towards Israel that night.

Hijacking and Bombing

Hijacking might seem passé, but a mindset believing that such tactics will not be used again would be seriously shortsighted. Throughout the 1990s it was argued that terrorist groups had moved on from acts of aerial piracy. And then September 11 happened…

“… an Air France flight in Iraqi airspace – en route from Paris to Dubai – was dangerously close to being hit by ballistic missiles launched by Iran …”

What recent events have demonstrated is that terrorist groups — especially those backed by rogue states — have evolved into highly proficient paramilitary outfits capable of sophisticated operations. The October 7 attacks clearly demonstrated this and the infrastructure unearthed beneath the ground in both Gaza and Lebanon is testament to both the financial investment and commitment to warmongering. I seriously doubt that the United Nations agencies and forces in situ were completely ignorant of what was being created beneath their feet, indicating the degree to which these non-state actors, and their operations, had become “accepted” in an ostrich-like fashion by the international community. That head-in-the-sand attitude was also something Israel’s powers-that-be could be accused of being guilty of in the lead up to October 7 — the indicators were there but there was a failure to act accordingly.

It is this complacency which could come back to bite the aviation industry. We remain committed to the very same technologies and processes that were developed well over a decade ago and in order to identify the same weapons and explosives that were used in the last century. Those who wish to penetrate the aviation system are moving forward at speed. Our opponents are not necessarily have-a-go freedom fighters; they are the types of units that are capable — and have — seized ships by air in the open seas.

Hijacking need not solely be achieved by armed terrorists on board. The potential for cyberattacks and other remote disruption of aircraft operation exists. In February, an El Al Israel Airlines flight was operating from Phuket, Thailand, to Tel Aviv when it received a rogue radio message instructing it to set its route on an alternative heading. It is unclear as to the ultimate goal of the Somaliland-based (some reports claim Somalia-based) transmitters who claimed to be air traffic controllers. One ominous possibility is that they intended to ‘hijack’ the aircraft causing it to fly into the range of a Houthi group in Yemen who could have targeted the aircraft in-flight. Another El Al flight operating to Bangkok the same week received similar notification. In both cases, the crew disregarded the instructions, suspecting external interference, and continued with their intended flight plans.

The magnitude of the level of destruction in Gaza is shocking to all. The loss of innocent lives and scale of those incurring severe and life-changing injuries is bad enough. Yet, together with the challenges of getting essential humanitarian aid into the Strip and provision of shelter for those with no place to escape to, have resulted in numerous calls for a cessation of hostilities by both the international community and those charities operating in the region. Images such as this further fuel the resentment that is brewing and increase the possibility of attacks elsewhere.
The magnitude of the level of destruction in Gaza is shocking to all. The loss of innocent lives and scale of those incurring severe and life-changing injuries is bad enough. Yet, together with the challenges of getting essential humanitarian aid into the Strip and provision of shelter for those with no place to escape to, have resulted in numerous calls for a cessation of hostilities by both the international community and those charities operating in the region. Images such as this further fuel the resentment that is brewing and increase the possibility of attacks elsewhere.

The day after the first anniversary of the October 7 attacks, Ken McCallum, the director general of the U.K.’s MI5, spoke publicly revealing that, “Since March 2017, MI5 and the police have together disrupted 43 late-stage attack plots. Some of those plotters were trying to get hold of firearms and explosives, in the final days of planning mass murder.” Furthermore, McCallum reported that “13% of all those being investigated by MI5 for involvement in U.K. terrorism are under 18. That’s a threefold increase in the last three years.” In other words, children.

“… an El Al Israel Airlines flight was operating from Phuket, Thailand, to Tel Aviv when it received a rogue radio message instructing it to set its route on an alternative heading.”

“Al-Qaeda has,” according to McCallum, “sought to capitalize on conflict in the Middle East, calling for violent action.” And, when it comes to Iran, he highlighted the fact that, “Like the Russian services, Iranian state actors make extensive use of criminals as proxies — from international drug traffickers to low-level crooks.” It is these communities that could knowingly or unwittingly infiltrate weapons or devices onto aircraft.

Inadvertent Carriage of Explosives

On September 17 a highly sophisticated synchronized remote attack on Hezbollah resulted in pagers exploding in the hands of their militants across Lebanon. If, as very few doubt, it was an Israeli operation, it will go down in folklore — alongside the Entebbe rescue — as being one of their “greatest” intelligence-lead operations of all time. Almost 3,000 people were injured, including Iran’s ambassador to Lebanon, and 12 killed, when they received a message supposedly from Hezbollah leadership.

The next day, walkie-talkies started exploding, killing 30 and injuring more than 700.

Regardless as to whether one believes that the tactic was a completely justified way of attacking known terrorists or one argues that the use of such booby-trapped devices was contrary to international law as it posed a danger to civilian populations, the plot was technologically brilliant. However, it should also sound alarm bells; the pagers had been in circulation for around five months, according to a Reuters source in Lebanon, each one “laced with a highly explosive compound known as PETN” which, because it was “integrated into the battery pack made it extremely difficult to detect.” Another security source told Reuters that “up to three grams (0.11 ounces) of explosives had been hidden in the new pagers, apparently months before the blasts.” 3,000 pagers had exploded, yet 5,000 had been bought by Hezbollah. That means that another 2,000 could still be in circulation. Furthermore, whilst Hezbollah combatants are not known for their regular use of air travel, it is highly likely that many of them did fly — possibly many times — in the five months they had pagers in their possession. None, it would seem, were detected by any airport security screening system.

Shown here is a memorial composed of photos of young Israelis killed during the terrorist attack at the NOVA Festival.
Shown here is a memorial composed of photos of young Israelis killed during the terrorist attack at the NOVA Festival.

Of course, three grams of PETN is not enough to bring down an aircraft. Yet if we look at the physical impact of the blasts on those targeted, any such detonation in flight would be more than a slight cause for concern.

Some carriers, including, not surprisingly, Qatar Airways, introduced bans on the carriage of pagers in the aftermath of the attack. The real lessons, however, were that; firstly, remote-controlled improvised explosive devices are very much a reality of the modern world; secondly, that seemingly innocuous devices can operate (for months) normally without impediment and yet still be adapted as an IED; and, thirdly, that our screening systems simply cannot identify all explosives.

Protests

I’ve already mentioned that we wish to preserve the civil right to protest. Yet protests are also a distraction to the security services, especially if they take place at airports.

In September, the Ireland Palestine Solidarity Campaign organized a protest at Shannon Airport. Their website called for people to, “Join us for a National Mobilization at Shannon Airport on Sunday September 8,, between 2 p.m. and 3.30 p.m., to say ‘Stop Arming Israel – No weapons or military flights to Israel through Shannon!” They even encouraged people to “Book your place on the buses from Dublin and Cork” to protest the Irish government’s refusal “to inspect U.S. warplanes that stop at Shannon Airport or otherwise use Irish airspace.”

On April 15, pro-Palestinian activists prevented traffic from accessing Terminal 1 at Chicago’s O’Hare airport. Forty of them were allegedly arrested for the disruption they caused.

These are just two of a myriad of airport-based incidents around the globe, each one providing a challenge to the local law enforcement community. Arguably more problematic are the individual protests industry employees are conducting by wearing emblems or flags associated with the conflict. Aircrew often wear flags to depict the languages they speak, but their wearing of the Palestinian flag has been a cause for debate on social media — some applauding them for standing up for what they believe in, others condemning them for displaying political bias whilst in a work environment.

Qantas passengers on a flight from Melbourne to Hobart on December 20 last year were shocked to find that crewmembers had affixed the Palestinian flag to their lapels. Photographs appeared on social media and the airline was forced to remind its crew of its uniform policy. In a January 4 statement, Qantas stated, “We understand there are strong and opposing views on the current conflict, but there is no room for these to be expressed by our employees in the workplace. Our priority is creating a safe and respectful environment for our customers and all our people. Unauthorized badges can’t be worn by employees and we’ve reminded all employees of the policy, along with the seriousness of this particular matter.”

On July 5 this year, a Delta flight attendant was photographed wearing a Palestinian pin on a flight from Boston to West Palm Beach, and in May a Delta gate agent was wearing one at Ronald Regan airport.

The issue is not the Palestinian flag alone — Israeli, Ukrainian, and any other flag not indicative of the language spoken by the crewmember in question is inappropriate in a professional work environment.

Unruly Passengers

With Islamophobia and antisemitism on the rise and so much anger related to the conflict being openly expressed, it’s hardly surprising that, regardless of what pins crewmembers might wear, there will be plenty of opportunities for animosity between different passenger types. It’s prevalent on public transport systems on the ground too.

On October 21, a passenger was photographed on the Paris Metro at Saint-François-Xavier station wearing a shirt emblazoned with the words ‘Anti Juif’ (Anti Jew). Imagine this had been worn on an aircraft and the potential fallout.

As tweeted by @carolinemarcus on X (formerly known as Twitter), Qantas counseled several cabin crewmembers who wore Palestinian flag badges on a flight, breaching the airline’s uniform policy.
As tweeted by @carolinemarcus on X (formerly known as Twitter), Qantas counseled several cabin crewmembers who wore Palestinian flag badges on a flight, breaching the airline’s uniform policy.

In July it was reported that a passenger was told that he would be removed from a Delta flight from São Paulo to Chicago if he did not take off his pro-ceasefire T-shirt which had “Not in Our Name” on the front side and “Jews Say Ceasefire Now” on the back. Whilst advocating for peace, the political nature of the slogan clearly caused the crew anxiety.

Another tweet on X from @stopantisemites said, “Your customers on a Boston to West Palm Beach flight yesterday were perplexed to see your flight attendant adorning a flag of Palestine pin.”
Another tweet on X from @stopantisemites said, “Your customers on a Boston to West Palm Beach flight yesterday were perplexed to see your flight attendant adorning a flag of Palestine pin.”

In December, an argument took place in Melbourne, Australia, between Jewish and Muslim passengers boarding a Jetstar flight to Sydney. The latter is alleged to have shouted, “Stop killing our babies,” and the former responded, “From Hamas.”

A passenger was photographed on the Paris Metro at Saint-François-Xavier station wearing a shirt emblazoned with the words Anti Juif (Anti Jew). The photograph taken on 10/21 around 5:15-30 p.m. in the Paris metro line 13, Saint-François Xavier station, direction Saint-Denis, according to @s_sebbane’s tweet.
A passenger was photographed on the Paris Metro at Saint-François-Xavier station wearing a shirt emblazoned with the words Anti Juif (Anti Jew). The photograph taken on 10/21 around 5:15-30 p.m. in the Paris metro line 13, Saint-François Xavier station, direction Saint-Denis, according to @s_sebbane’s tweet.

These are the now increasingly frequent challenges aircrew are dealing with many miles from the conflict itself. They may seem petty in comparison to the desperation of those living in the Middle East itself, yet airlines are having to adapt their training programs to enable crew to best manage political divide … be it Israel/Palestine, Trump/Harris, Russia/Ukraine or any other combination.

A year on from October 7 and the region is in a very precarious position. Indeed, so is the world as a whole. The last year has demonstrated innovation in the art of war on all sides, so we need to evolve too and enhance our ability to deliver proactive security. And, if that were not a big enough challenge in itself, we also need to do so whilst exercising political neutrality.

Philip Baum is Visiting Professor of Aviation Security, Coventry University; Managing Director, Green Light Ltd; Chair, DISPAX World 2024 (November 20-21, 2024, Bangkok);, and, Chair, Behavioral Analysis 2025 (June 24-26, 2025, Minneapolis, USA). He is also the former editor of Aviation Security International. He can be contacted at pbaum@avsec.com.

Explosives Detection Still Crucial for Transportation

Explosives Detection Still Crucial for Transportation

By Mark Robins

Identifying and detecting the presence of explosive materials or substances using explosive detection systems is not only necessary, they are key pillars of ensuring public safety.

Those who have worked in aviation will likely remember Umar Farouk Abdulmutallab popularly referred to as the “underwear bomber” or “Christmas bomber,” a Nigerian terrorist who attempted to detonate plastic explosives hidden in his underwear. And what about Richard Reid — known as the “shoe bomber” — who tried to detonate his shoes which were filled with explosive material on a flight from Paris to Miami in 2001.

The illicit use of explosives has become an all-too-real event in the modern world. According to Global Terrorism Index (GTI), in 2023, there were approximately 3,350 explosive-related attacks in the world. High-profile terrorist attacks in public transportation-related venues, such as airports, train stations, ports and border control points have highlighted these areas’ vulnerability to explosive attacks.

Explosive detection systems play a crucial role in ensuring public safety by preventing these attacks. An explosive detection technology is a device or system designed to identify and detect the presence of explosive materials or substances, whether they be military, conventional or homemade, thereby avoiding catastrophic and damaging events. According to Selbyville, Del.-based Global Market Insights, the explosive detectors market size was valued at USD 8.95 billion in 2023 and is anticipated to register a CAGR of over 12% between 2024 and 2032.

John Johnson, 908 Devices
John Johnson,
908 Devices

“A vigilant guardian,” that is how John Johnson, senior director of strategic marketing and business development at 908 Devices, Boston, describes explosive detection’s role in meticulously screening passengers, luggage and cargo for potential threats. “Its presence serves a dual purpose: not only does it identify dangers, but it also acts as a powerful deterrent, discouraging attempts to smuggle explosives onto transportation systems. The technology’s ability to provide rapid threat identification is crucial, enabling swift responses that minimize disruptions and maintain the smooth flow of travel. Ultimately, these capabilities coalesce to significantly enhance the overall safety of both travelers and transportation personnel.”

airport security

Explosives and Transportation Security

Explosive detection technology is vital for transportation security; identifying explosive threats before they reach their transportation targets. “Transportation lies at the heart of the everyday life of people across the world,” says Logan Cunningham, sales and service, US Testing Equipment, Vancouver, Wash. “The importance of transportation networks makes them a prime target and at risk of harm that could cause loss of life, economic impact and destabilization that can come with losing the feeling of security in an integral part of everyday life.”

Logan Cunningham, US Testing Equipment
Logan Cunningham,
US Testing Equipment

Cunningham believes it’s the integral nature of transportation to everyday life that causes some of the biggest hurdles to securing these targets from potential explosives threats. He explains, “Modern transportation, regardless of purpose or specific industry, is typically a high-volume and tightly coordinated effort. This brings the requirements for fast, consistent and reliable detection that is economical and easily deployable. Unlike, for instance, military or correctional screening of goods or people, where security typically has the utmost priority and other factors (such as time or efficiency) can be deprioritized, transportation networks are often built on their efficiency (both time and economic) and an explosive detection solution should be able to be reasonably integrated.”

Nicholas E. Ortyl, Leidos
Nicholas E. Ortyl, Leidos

Nicholas E. Ortyl, chief engineer, security enterprise solutions at Leidos, Reston, Va., cites the following key important factors of explosive detection in transportation security:

• Threat Mitigation: Detects explosives at high-risk hubs like airports to prevent attacks.

• Safety: Safeguards travelers and staff by neutralizing threats before they cause harm.

• Regulatory Compliance: Helps meet security standards from government agencies like the TSA and ECAC.

• Operational Continuity: Minimizes false alarms and delays, while enabling high throughput screening environments.

Ortyl cites the following unique aspects for it:

• Varied Environments: Adaptable for different settings (e.g., aircraft, buses, cargo).

• High Throughput: Each system can complete hundreds of screenings per hour, quickly and accurately.

• Layered Approach: Combines multiple systems and human oversight for comprehensive threat detection.

• Broader Integration: Works with biometrics, surveillance and other systems to enhance security.

• Operational Flexibility: Must be portable, fast, and reliable with minimal disruptions.

Robert Stokes, Agilent Technologies
Robert Stokes,
Agilent Technologies

Robert Stokes PhD, director detection and security, Molecular Spectroscopy at Agilent Technologies, Santa Clara, Calif., agrees that transportation settings are among the most demanding environments for threat and explosive detection equipment and technology. “Systems must deliver exceptional detection capability and maintain low false-alarm rates within extremely short processing times. Additionally, detection technologies need to consistently perform over millions of cycles. It is also crucial that any screening technology is user-friendly and produces clear, unambiguous results for security operators to minimize disruptions to screening operations and the flow of commerce.”

The unique environment of transportation systems has shaped explosive detection technology in distinctive ways. “High-throughput screening capabilities are essential to manage the immense volume of passengers and cargo that flow through transportation hubs daily,” Johnson says. “These systems must maintain a delicate balance, delivering accurate results while minimizing false alarms to prevent unnecessary delays that could ripple through the entire transportation network. The technology must also be versatile, capable of detecting a wide spectrum of threat materials, as transportation infrastructure remains a prime target for various types of attacks. Moreover, the portability of modern detection systems allows for flexible deployment across different areas of transportation hubs and even on moving vehicles, creating a dynamic and adaptive security presence.”

The Insight200M is a liquid explosive detection system (LEDs) providing enhanced capability for alarm resolution to detect and identify threats. Agilent Technologies image.
The Insight200M is a liquid explosive detection system (LEDs) providing enhanced capability for alarm resolution to detect and identify threats. Agilent Technologies image.

Detecting Homemade Explosives

Detecting homemade explosives (HMEs) poses significant challenges in transportation security due to their unique characteristics and the non-standard nature of the devices. Unlike military-grade explosives with distinct chemical signatures, HMEs often have varied and unpredictable chemical compositions, making them more difficult to identify.

908 Devices’ MX908 leverages high-pressure mass spectrometry (HPMS) for explosives detection. 908 Devices image.
908 Devices’ MX908 leverages high-pressure mass spectrometry (HPMS) for explosives detection. 908 Devices image.

Andy Foland, chief technology officer, security enterprise solutions at Leidos explains, “HMEs can be unstable, varying in sensitivity to heat, shock or friction, which increases the risk during handling for obtaining signature data. This also poses challenges for safely neutralizing threats when detected. Detection systems designed with more consistent formulation in mind can result in high false-alarm rates, or a need to augment signatures or capabilities with new detection modalities.”

“These improvised threats are frequently crafted from common household items, further complicating the detection process as they can be easily mistaken for benign materials,” Johnson says. “The lack of a consistent chemical signature adds another layer of complexity to their detection. Homemade explosives tend to be much more sensitive than military explosives, making them prone to igniting from slight changes in pressure or exposure to an energy source. For this reason, certain technologies that utilize lasers can be dangerous to use when explosives are potentially present.”

Improvised threats are frequently crafted from common household items complicating the detection process as they can be easily mistaken for benign materials, according to Andy Foland, CTO at Leidos. Leidos image.
Improvised threats are frequently crafted from common household items complicating the detection process as they can be easily mistaken for benign materials, according to Andy Foland, CTO at Leidos. Leidos image.

Cunningham explains that HMEs utilize a range of explosive materials, delivery methods and quantities that can be difficult to detect based on packaging or location if the right technology is not being used to address the threat. “This is also where additional features such as software additions can aid in potential threat identification to aid operators’ inspection.”

CT scan image detecting possible IED. Leidos Image.
CT scan image detecting possible IED. Leidos Image.

Mitigating HMEs requires flexible and advanced detection systems that can account for a wide range of materials, formulations and concealment methods used in their construction. 908 Devices’ MX908 addresses these challenges and is equipped with sophisticated algorithms and broad detection capabilities, and is particularly adept at identifying these diverse threats in transportation settings.

908 Devices’ MX908 leverages high-pressure mass spectrometry (HPMS) for explosives detection. 908 Devices image.
908 Devices’ MX908 leverages high-pressure mass spectrometry (HPMS) for explosives detection. 908 Devices image.

Because of HMEs’ difficult-to-detect common household chemicals, London, England’s Smiths Detection has calibrated its advanced trace-detection technologies to detect a wide range of chemicals, addressing the variability in HME compositions. “This flexibility is vital in identifying these explosives, which often lack consistent ingredients but pose serious threats to transportation security.”

HEIDM Program

Recent HME attacks have further bolstered the need for a strong explosive characterization program, and have served to re-emphasize the benefits of United States Department of Homeland Security’s Homemade Explosives Identification, Detection and Mitigation (HEIDM) Program.

As HME threats are often made of common commercial items, it is a challenge to distinguish true HME threats from the many innocent gels and liquids in personal baggage or cargo. The HEIDM Program is a crosscutting portfolio, meaning the information collected in this program feeds into TSA to benefit several science and technology programs, and has focus areas on:

• Explosive detection characterization.

• Threat assessments and prioritization.

• Tests, tools and methodologies relating to explosives research and risk mitigation.

• The HEIDM Program ensures the explosives community has a clear understanding of homemade and emerging explosive threats to:

• Improve detection technology.

• Develop detection requirements.

• Inhibit the unlawful use and manufacture of HMEs.

• Provide a solid foundation for solutions to counter the threat, such as pre-planning tools for responders and event planners.

Detection Innovations

Technology advances for detecting explosives in both ever-evolving and emerging threats have countered their use and resulting impacts. Innovations have made detection more accurate, efficient and less intrusive, ensuring both security and smooth transportation operations. Cunningham says this has occurred not only in the increased library of detectable substances but also the concentrations (trace particulates) and the ability to discriminate or differentiate between non-target substances and suspected explosive materials.

Portable systems like the IONSCAN 600 provide flexibility for deployment in a variety of transportation settings. Smiths Detection image.
Portable systems like the IONSCAN 600 provide flexibility for deployment in a variety of transportation settings. Smiths Detection image.

Foland says explosive detection has evolved from basic X-ray and metal detectors to advanced systems utilizing AI/ML, radiofrequency (RF) waves, and Ion Mobility Spectrometry (IMS). “Early methods focused on detecting metallic threats, but the use of X-ray, RF, wideband FR complex impedance, Raman spectroscopy, capillary zone electrophoresis and IMS has enabled the identification of non-metallic explosive materials. Modern innovations, such as millimeter-wave imaging, 3D Computed Tomography (CT) scanners, and standoff detection allow for non-invasive, high-accuracy screening of passengers and baggage. AI-driven systems improve detection speed and accuracy, and reduce false alarms, while integrating them with broader security measures can enhance overall situational awareness.”

Rapiscan Systems offers the Itemiser 5X which uses optimized detection libraries and advanced software algorithms to detect explosive traces. Rapiscan image.
Rapiscan Systems offers the Itemiser 5X which uses optimized detection libraries and advanced software algorithms to detect explosive traces. Rapiscan image.

“Explosive detection technology has evolved significantly, integrating artificial intelligence into systems like (Smith Detections’) HI-SCAN 6040 CTiX, which automates threat recognition and reduces human error,” says Joachim Petry, business development manager, X-ray diffraction at Smiths Detection. “[We] also offer computed tomography and 3D-imaging solutions for more detailed and reliable screening of luggage and cargo, allowing threats to be identified with minimal manual intervention. Portable systems like the IONSCAN 600 provide flexibility for deployment in a variety of transportation settings. These systems are also non-invasive, relying on trace detection technologies like IMS without the need for physical sampling, enhancing both security and passenger experience. [Our] iCMORE technology integrates AI and deep learning algorithms into our X-ray detection systems. This enables faster decision-making and more accurate threat identification, significantly reducing false alarms and enhancing operational efficiency in busy transport environments.”

Integrating machine learning approaches that enable algorithms to quickly adapt to changes in the threat landscape and the flow of commerce has been very beneficial. Stokes say, “These advancements include enhanced detection capabilities, allowing modern systems to identify a wider range of explosive materials with greater accuracy, and reduced false alarms, as machine learning helps distinguish between actual threats and benign items. Additionally, faster processing times enable rapid screening without compromising security, while improved user interfaces provide clear and unambiguous results for security operators. Furthermore, newer systems are designed to perform consistently over millions of cycles, ensuring long-term reliability in demanding environments. It is critical that any explosive detection technology is robust enough for demanding screening operations and can be safely and effectively utilized by security personnel who may not be hazmat or laboratory trained.”

CBT Courses Ensure Competence Capability in Airport Screeners

CBT Courses Ensure Competence & Capability in Airport Screeners

The people who conduct airport security screenings are the world’s frontline defense against terrorists, smugglers, and other criminals. This is why training them properly is so important — because the quality of their training will determine the quality of their work.

Computer-based training (CBT) is an effective combination of quality, convenience, and cost for training airport security screeners. Three key providers of CBT security training are CASRA, e-Lectio, and Renful Premier Technologies.

Dr. Diana Hardmeier,CASRA
Dr. Diana Hardmeier,
CASRA

Founded in 2008, CASRA stands for the Center for Adaptive Security Research and Applications. Its roots go back to the Visual Cognition Research Group at the University of Zurich, which was created 25 years ago. “CASRA’s vision is to enable people and technology for a safe and secure world,” said Dr. Diana Hardmeier, CASRA director. “By combining applied research and translating the research findings into software products, we develop a computer-based training and testing solution that continuously reflects current threats and thus trains screeners in a way that is both motivating and efficient.”

Dr. Nimrod Matan,e-Lectio
Dr. Nimrod Matan,
e-Lectio

As part of the ICTS Europe group, e-Lectio provides online training solutions to the security sector worldwide. Their CBT programs are delivered to students worldwide using e-Lectio’s Eagle7 Learning Management System. “By using advanced eLearning technologies, our company offers high-quality, regulation-compliant, online training to the aviation and maritime security sectors,” said Dr. Nimrod Matan, e-Lectio’s commercial director.

Agnes Vaspori, Renful
Agnes Vaspori,
Renful

Renful Premier Technologies (Renful) has been offering security training solutions to the market for over 30 years. “Our computer-based training systems are the result of decades of research and development, guided by aviation security professionals, and developed in collaboration with a highly skilled team, incorporating valuable customer feedback,” said Agnes Vaspori, Renful’s head of product development. “Renful’s success is demonstrated by our ability to serve a wide range of security domains; including airports, civil aviation authorities, customs and border agencies, and police forces.”

Renful’s training serves a wide range of security domains including airports, civil aviation authorities, customs and border agencies and police forces. Renful image.
Renful’s training serves a wide range of security domains including airports, civil aviation authorities, customs and border agencies and police forces. Renful image.

What They Have to Offer

X-Ray Tutor 4 (XRT4) is the name of CASRA’s screening education program. XRT4 is a comprehensive, computer-based pre-employment selection, training and testing solution for training people in the use of 3D, dual-view and single-view X-ray screening across various fields. This software allows operators to select, train, and test screening security professionals in areas such as cabin baggage screening, hold baggage screening, cargo, mail, staff, air supply, maritime, as well as high-energy and baggage screening at customs.

“XRT4 features customizable user interfaces that mimic different X-ray machines, creating a realistic training and testing environment,” Dr. Hardmeier said. “All common image enhancement functions are integrated to replicate the viewing conditions security officers encounter at checkpoints. The platform’s adaptive learning system presents images tailored to each user’s knowledge and skills, ensuring they are optimally challenged and motivated throughout their training.”

Current users of CASRA’s XRT4 training program include the Canadian Air Transport Security Authority (CATSA), Securitas Aviation, Swedavia, and Zurich Airport. Overall, XRT4 is used in over 50 countries and at more than 900 airports globally.

At e-Lectio, “We offer Eagle7 online training solutions for all requirements that apply to screeners in the aviation sector,” said Dr. Matan. These include:

• The Eagle7 X-ray training simulator with over 50,000 genuine cabin baggage, hold baggage, cargo and mail, and airport supplies images; and a 3D training simulator with over 4,000 genuine cabin baggage, hold baggage, cargo, and mail images. “The simulators are suitable for initial training, recurrent training, and certification,” he told TSI.

• Comprehensive package of e-learning courses covering all required training in line with EU regulations and beyond.

• An advanced learning management system (LMS) with performance analysis and reporting modules. It is designed to provide screeners with a clear detailed picture of their achievements, and to provide supervisors and trainers with a detailed analysis of performance levels on individual and group level, to ensure compliance.

• A pre-recruitment assessment tool for X-ray screeners’ positions, including seven different psychometric tests capturing the skills and capacities required for screeners.

Renful says it uses animation and multimedia to create highly engaging content that keeps learners motivated and enhances retention. Renful image.
Renful says it uses animation and multimedia to create highly engaging content that keeps learners motivated
and enhances retention. Renful image.

As for e-Lectio’s online training courses; they are used by major international airports, national authorities, and security companies. They include airports in Copenhagen, Milan Malpensa, Seattle and Vienna, plus aviation authorities such as AESA (Spain), DJI (Netherlands), the Malta Aviation Security Department, and the Moldovan Civil Aviation Authority.

“Renful offers a diverse range of computer-based training systems tailored for the security market,” Vaspori said. “These systems are designed to enhance the skills and knowledge of security personnel across various sectors.

Some of Renful’s key offerings include:

• The Simfox Simulator for X-ray and CT Image Recognition Training: This is a system that trains security operators in identifying prohibited items within 2D X-ray and 3D CT images, improving their threat recognition ability, detection accuracy, and speed. Simfox is used in over 80 countries by more than 200,000 security screeners.

• E-learning Modules: These are interactive online courses provided on Renful’s Learning Management System, covering a wide range of security topics.

• Competency and Assessment Tools: These are pre-employment testing and performance assessment platforms to evaluate the skills and performance of personnel while carrying out different security functions. The assessments are performed at the recruitment stage and after deployment to ensure officers meet the required security standard.

In order to keep its online students engaged, their “in-house development team uses animation and multimedia to create highly engaging content that keeps learners motivated and enhances retention,” said Vaspori. “This approach, combined with regular updates and customizable training, ensures our courses are both relevant and effective.” Renful’s client list includes London Heathrow and Seoul Incheon Airports, the Australian Department of Home Affairs, the U.S. Department of State, the Civil Aviation Authorities of Romania and Greece, Certis Aviation Security, G4S, I-SEC, Prosegur, Securitas, and SegurIberica.

Staying on Top of Change

Mindful that airport security threats are constant, the three CBT companies interviewed for this article do their best to keep their content current and up to date.

A case in point: “CASRA’s libraries are regularly updated based on a systematic threat assessment (STA), which takes new and emerging threats into account,” Dr. Hardmeier said. “The STA is a key component of a long-term CASRA research project that is funded by the Swiss Federal Office of Civil Aviation. It systematically scans various public and non-public internet channels, the deep web, social media platforms, radical propaganda, and third-party reports for relevant security information. Once identified, new threat objects are continuously integrated into both training and e-learning, where theoretical knowledge about these objects is also imparted.”

Since XRT4’s training algorithm is adaptive and tailored to each individual screener, new and/or poorly recognized threats are presented more frequently to students to support quicker internalization,” she noted. “This not only shortens learning times but also ensures that screeners are better prepared to recognize and respond to emerging threats.” To further improve screener responses on the job, XRT4’s training library includes a wide range of high-quality X-ray images of several hundred prohibited items in various rotations and configurations, as well as thousands of different containers. All image libraries are fully compliant with EU regulations.

The e-Lectio Eagle7 training simulators also rely on a regularly updated image library. It is populated with genuine images captured on real-life X-ray and CT machines using actual scanned luggage with authentic threat items. “The image library covers a huge array of threat items, following the EU regulation definitions of prohibited articles,” said Dr. Matan. “Our team of experts continuously extends the image library adding hundreds of new images yearly.”

The training workflow used by e-Lectio covers the operation of X-ray machines used for screening, plus the entire range of skills needed to perform this job successfully. These skills include:

• Classifying the image as a threat, no threat, or possible threat that cannot be resolved by X-ray analysis.

• Indicating the type of threat item detected.

• Marking the location of the threat on the image.

• Switching between various views of the image (simulating a dual view machine) and various angles of the luggage (simulating the rotation of the luggage on the belt) to improve analysis and decision-making.

• Comparing cargo images to the airway bill and determining whether they match.

• Clearing EDS (energy-dispersive X-ray spectroscopy) warnings, when applicable.

• For 3D images, using slicing as well as full control over a 3D image of the luggage such as rotation and zoom in/out.

Renful’s courses offer a detailed, extensive look at the threats facing screening personnel today. For example, “Simfox CT, a computed tomography X-ray simulator, is tailored to meet the operational needs of those working with Cabin Baggage and Check Baggage CT scanners,” Vaspori said. “Simfox CT is equipped with a library of over 6,000 real CT images for initial familiarizaion, certification and upskilling training modules. It is compatible with multiple CT scanner models such as Leidos ClearScan, Smiths Heimann CtiX, Rapiscan 920CT, Leidos MV3D Hold Baggage EDS, ensuring a seamless transition from training to real-world operations.”

e-Lectio’s Eagle7 X-ray simulator is an online training solution, enabling flexibility and scalability in facilitation training in dozens of different locations, while ensuring compliance and quality through reporting and control by the head office.  e-Lectio images.
e-Lectio’s Eagle7 X-ray simulator is an online training solution, enabling flexibility and scalability in facilitation training in dozens of different locations, while ensuring compliance and quality through reporting and control by the head office. e-Lectio images.

Meanwhile, Renful’s Introduction to Explosives course is designed to equip students with the knowledge and skills needed to understand and manage explosive-related risks. These include the threats posed by improvised explosive devices (IEDs), concealed explosive devices, and other hazards. Participants get to explore detection technologies, historical developments, and advanced training methodologies to enhance their security skills.

x-ray package

Finally, Renful’s Trefox Training Essentials for X-ray course teaches new operators on the fundamentals of X-ray security. “Through engaging audio, text, and video content, learners can grasp essential concepts with ease,” said Vaspori. “Instructors can also leverage ready-made animations and audio content to streamline their teaching process, ensuring effective knowledge transfer.” Trefox can teach conventional X-ray, computed tomography X-ray, and vehicle/ container X-ray techniques.

jet diagram

Certifications Available

To deliver maximum value from their training courses to students and employers, the three CBT companies in this article all provide options for certifying successful completion of their courses.

CASRA’s XRT4 offers students the option of taking certification tests that are based on scientific criteria. These tests are used by various Civil Aviation Authorities worldwide and are fully compliant with EU regulations.

Successful e-Lectio Eagle7 students achieve all types of certifications required by EU regulations, for screening jobs related to cabin baggage, hold baggage, airport supplies, and cargo/mail; both in 2D (single and/or dual view) and EDS CT in 3D. “In fact, several CAAs throughout Europe either directly use or have approved Eagle7 for certifying screeners according to chapter 11 of the EU regulation 2015-1998,” Dr. Matan said.

Renful issues a Certificate of Completion to individuals who successfully complete any of their e-learning courses. In addition, “Simfox is used as the national screener certification platform by regulators in 14 countries and is an approved system in most European countries for recurrent training under EU Regulation 2015/1998),” said Vaspori. “Simfox is trusted for both initial certification and ongoing training, ensuring compliance with aviation security standards.”

Convenient to Take

The logic behind CBT courses is that they are available for students to pursue at their convenience, at whatever time and location(s) work best for them.

All three CBT companies hit the mark on this requirement. CASRA’s XRT4 is a web-based solution that can be accessed via any internet browser without requiring additional plugins. e-Lectio’s Eagle7 is also 100% web based and can be accessed through any web browser on any device. So are Renful’s courses, which can be accessed from anywhere with an internet connection, and viewed on computers, tablets, and smartphones.

As for the price to take these courses? “The cost of CASRA’s training programs varies depending on the specific course and the number of participants,” Dr. Hardmeier said. “We offer customized pricing packages for organizations and large groups. For more detailed pricing information, we recommend contacting CASRA directly.”

“Eagle7 is offered as SaaS (software as a service) with three main pricing models,” said e-Lectio’s Dr. Matan. These are:

• License fee per registered user, with no limit on the number of training hours or number of concurrent users.

• License fee per concurrent user (seat), with no limit on the number of training hours or the number of registered users.

• Fee per training hour (hour bank), with no limit on the number of registered or concurrent users.

Over at Renful, “The license models available include perpetual, annual subscription, and pay-per-use,” Vaspori said. “We work closely with customers to fully understand their needs and offer the most cost-effective solution that delivers the best value for their investment. For detailed pricing information, contact us directly or visit our website.”

Numerous Benefits to CBT

Clearly, the screening training provided by CASRA, e-Lectio, and Renful comes with a price tag attached. So why is it worthwhile for airports (and other transportation facilities) to pay for it?

Well, to put it bluntly, the benefits of CBT for airport security screeners are numerous and tangible.

“Numerous scientific studies have proven that CASRA’s courses significantly improve the competency of security personnel to detect threats more accurately and efficiently, thereby enhancing overall security in aviation environments,” said Dr. Hardmeier. “Employers benefit from having better-trained staff who can reduce security risks, comply with international security standards, and ensure regulatory compliance. The integrated reporting system also allows administrators to easily monitor progress and compliance. Detailed feedback on training sessions ensures continuous improvement and high levels of competency.”

The training by e-Lectio ensures full compliance with EU regulations on airport security screening, Dr. Matan said. The Eagle7 system also gives trainers full control of all training parameters, including:

• Number of images per threat type.

• Number of images per difficulty level.

• Angles of threats included in the tests.

• Type of images included in the test (single/dual view, with/without EDS markings).

• Time limit.

• Scoring method.

• The training workflow to be used (with/without marking threat location, with/without comparing images to airway bill, and so forth).

“Eagle7 is a comprehensive training solution from pre-recruitment, through initial training and recurrent training, up until certification and recertification,” he told TSI. “It supports continuous performance analysis highlighting the strengths and weaknesses of each screener, so that the training program can be personalized to address individual needs, either automatically, or manually, by the trainer.”

Finally, Renful’s students acquire practical, up-to-date skills and knowledge that make them more effective in their roles, enhancing their ability to face real-world security challenges. “This improved competence leads to better job performance, enabling screeners to carry out their duties more efficiently, which ultimately benefits their employers,” said Vaspori. “For employers, having a better-trained workforce means improved compliance with industry regulations and standards, reducing the risk of non-compliance. Additionally, our courses provide a cost-effective way to train staff, minimizing downtime while maximizing return on investment. The flexibility of remote learning allows employees to complete their training at their own pace, ensuring that productivity is maintained while they enhance their skills.”

The Bottom Line

Computer-based training for airport security screeners is an effective way to create a skilled, knowledgeable, and reliable workforce, on a schedule and with training location that work best for everybody. And it’s not just about compliance. Ultimately, it’s about the safety of all concerned, workers and passengers, moving through the facility.

Zero Point Four: New Book Highlights Need for Maritime Strength

Zero Point Four: New Book Highlights Need for Maritime Strength

“ZERO POINT FOUR” is a new book exploring how the U.S. — a maritime nation — finds itself on a precipice. After World War II over half the world’s ocean-going commercial ships flew the U.S. flag. Today, it is less than 0.4%, hence the book’s title “ZERO POINT FOUR.” This work scrutinizes the U.S. maritime industry’s significance to America through five principles: national, economic, energy and food, climate, and workforce security. From shortages in military support vessels to threats against U.S. dollar-denominated trade, and from insufficient numbers of U.S. mariners for food and energy security to the urgent need for climate-resilient maritime operations, the book breaks each issue down to its root causes. The authors don’t just identify problems but present a 57-point action plan to revolutionize the U.S. maritime sector. TSI will be featuring excerpts from the book’s introduction in this and future issues. The book can be purchased on Amazon.

There are 50,000 commercial, ocean-going vessels currently operating around the world, yet only 180 fly the U.S. flag. This represents 0.4% of the global fleet, or about 0.57% of total tonnage. By contrast, in 1950, the organizations based in the United States owned and operated more than 1,000 private and 2,200 government vessels, commanded 50% of the world’s total tonnage and carried 80% of global trade. From half of all, to half a percent. To put this more starkly, the U.S. has the largest economy in the world, and yet around 98% of all U.S. imports and exports are transported on vessels controlled by foreign countries and operated by foreign mariners. This striking imbalance exposes the U.S. economy to undue external influence, introduces complex security risks and diverts billions of dollars away from U.S. businesses and citizens every year.

Where is the U.S. maritime industry today, and where does it need to be? A new book, “ZERO POINT FOUR” takes a look at the role the U.S. maritime industry could play in maintaining a rules-based international order, introducing technologies that could revolutionize the industry and ensuring fair and safe navigable passages around the world. Over the course of the next several issues of TSI, we will run an excerpt of the book’s introduction which outlines the concerns and offers a 57-point action plan to address their concerns. Here is the first excerpt.

From the New Book ‘Zero Point Four’

The United States is a maritime nation. It has always been highly dependent on a well-functioning international shipping system. Shipping is essential to every aspect of U.S. life, in particular, national security, economic security, energy and food security, climate security and workforce security. A dollar invested in the U.S. maritime sector should yield over five times this amount back in return in terms of greater security across each of these five domains.

However, the U.S. maritime sector finds itself at its weakest point than at any point in U.S. history. From a peak of over half the world’s ocean-going vessels being U.S.-flagged after WWII, to less than 0.4% percent today.

This book is not just about identifying vulnerabilities but proposing actionable solutions. The concluding chapter of this book identifies a 57-point action plan to turn around the fortunes of the U.S. maritime sector within a decade. These are solutions that have been vetted by experts and industry leaders and present several “no-regret” proposals for leadership at the highest levels of the country to consider as part of a new and holistic National Maritime and Blue Economy Strategy.

With the world in an increasingly volatile and uncertain state, the U.S. needs a reliable and robust maritime sector unlike any time in recent history. The Covid-19 pandemic, European migrant boat crisis, growing number of extreme weather events, conflicts in Ukraine, Israel, the Red Sea, and rising tensions in Asia represent considerable concerns for stability in the near future with the probability of unexpected Black Swan events rising.

NATIONAL SECURITY

The weak state of the U.S. maritime industry risks national security in five major ways:

Significant shortfall of military support vessels from the commercial fleet: The U.S. requires up to 1,120 commercial vessels in the event of a prolonged international conflict around the world without losing its economic competitiveness or harming domestic energy or food security. This is over six times the number of “militarily useful” vessels that have been identified in the current U.S.-flag commercial fleet (180 vessels). These vessels would be commercially operational in peacetime, and not be a drain on the public purse. Specifically, of these 1,120 vessels, the U.S. military may need access to 1,000 militarily useful commercial container, vehicle transport (RORO) and other support ships in a major conflict but currently only has access to 180. Not all of these 180 vessels are considered militarily useful (i.e., can be used to support military operations). There is also a need to include enough commercial vessels to backfill essential domestic transport needs that would have been redirected to support military forces during times of conflict. In addition, the U.S. would require 100 tankers to meet its refueling needs during a conflict but can only access fewer than ten today. With an increasingly ice-free Arctic, more icebreakers are needed to escort or rescue vessels (e.g., around Alaska). The U.S. needs at least five icebreakers but has fewer than two available today. The U.S. economy and military are dependent on subsea internet cables and infrastructure, but the U.S. has only three cable-laying and repair ships should this infrastructure be attacked. Hence, the U.S. is likely to need access to around 15 other specialty ships (such as cable laying and repair ships, heavy lift ships, and salvage ships). In essence, the U.S. needs to radically scale up its access to U.S.-owned commercial vessels by 6X. This would benefit the U.S. both during peacetime and in the event of a major and sustained conflict around the world. This does not necessarily mean these new vessels should be purchased or managed by the U.S. government. Creative measures and incentives to “re-flag” suitable commercial vessels, sourced from values-aligned partners, may form part of the solution to rapidly solve this shortfall.

Wasteful government support programs creating Zombie Assets: The U.S. has three major maritime logistics support programs that are wasteful and have led to vessels that cannot be used effectively in the event of conflict but which the U.S. military assumes they can rely on. One program includes the Ready Reserve Force (RRF), which has declined from 2,277 vessels at its peak in the 1950s to fewer than 100 today. Recent military exercises revealed that fewer than 40% of these RRF ships could depart port and operate effectively with the military. Most of the RRF vessels are over 45 years old, spend their time idle in storage, are barely operational, and are operated by skeleton crews. Another program, the Maritime Security Program (MSP), costs $300 million a year to provide 60 vessels to the Department of Defense for Emergency Sealift operations, but these vessels do not match military requirements, nor does this program support the expansion of U.S.-built, owned or operated vessels. Yet another program, the Voluntary Intermodal Sealift Agreement (VISA) Program, where commercial vessels support national programs (such as U.S. Defense Department cargo movements and the distribution of food aid) is insufficient to provide the right type and number of vessels. On top of this, none of these programs meaningfully address the serious shortfall of U.S. mariners required to operate commercial vessels that can support the U.S. military during a time of conflict or national emergency, forcing the U.S. to rely heavily on non-U.S. vessels and mariners.

Significant foreign ownership of the U.S. maritime sector: For such a strategic sector, the U.S. is highly dependent on non-U.S.-owned and operated vessels, non-U.S. mariners, and non-U.S.-owned port infrastructure (such as terminals and cranes). This represents a major vulnerability to national security during peacetime, and especially during times of conflict. In addition, and as a result, the U.S. military and commercial fleet have reduced their collaboration at a time when other countries are blending commercial and military interoperability. If conflict arises, the U.S. military has assumed that it can simply appropriate commercial vessels from the domestic supply chain for military purposes (for example, vessels servicing Hawaii, Alaska, Puerto Rico, U.S. Virgin Islands, Guam, Mississippi River, and around the Great Lakes). This would cause significant domestic economic harm, and such vessels would need to be rapidly backfilled (e.g., tankers, container vessels, bulk carriers) to sustain productivity and output, which may not be possible if such assets are not easily accessible. We refer to this as the U.S. maritime “Double Counting Conundrum.” The result of significant foreign ownership of the U.S. maritime sector is an anemic commercial maritime industrial base that is unable to drive the next generation of maritime innovation.

Growing vulnerabilities from emerging technologies: New systems being deployed in the digital domain, cybersecurity capabilities, emerging satellite and space technologies, increased critical infrastructure automation (e.g., ship-to-shore container cranes), and the rise of asymmetric warfare (e.g., the rise of unmanned aerial and maritime vehicles) have altered the balance of power. New capabilities are required to defend against modern threats, but such capabilities are being built too slowly. There is also insufficient engagement of the private sector despite some of the leading emerging technologies being pioneered in Silicon Valley and implemented in other adjacent transportation sectors such as automotive, aviation and private space flight.

The rise of China as a maritime power: China has rapidly increased its influence in the international maritime sector. While some policy objectives may be aligned with U.S. interests (e.g., on reducing the impact of climate change), others are not (e.g., human rights and the status of sovereignty over Taiwan). This represents an unstable relationship upon which very high stakes depend and where a weak U.S. maritime industry exposes several major vulnerabilities. China’s rapid rise raises important questions for U.S. national security in eight domains: the relative strength of each country’s naval power, strength of each country’s commercial maritime fleet, operational readiness of each respective country’s commercial mariners; each country’s shipbuilding capabilities; access to shipping containers; influence over international ports, terminals, and waterways; domestic maritime industrial capacity; and use of each nation’s fishing fleets.

Zero Point Forty

About the Authors

The authors of Zero Point Four are six leaders in the maritime field, each with a unique track record navigating global complex challenges. They are Rear Admiral James Watson (USCG, Ret.), Carleen Lyden Walker, Rich Mason, Jonathan Kempe, Nishan Degnarain and Captain Anuj Chopra. Their experience spans pivotal roles such as setting new environmental standards in the U.S. Coast Guard, managing U.S. vessels in warzones, leading global sustainability initiatives and handling shipping’s response to the Covid-19 pandemic. Together, they pooled their expertise to uncover why America went from ruling the seas after WWII, to commanding just 0.4% of the world’s commercial, ocean-going ships today. From this analysis, the authors propose a bold strategic blueprint that can restore U.S. maritime leadership once more. This is the first of a series of excerpts from their collaboration, “ZERO POINT FOUR.”

AI, Cloud Vulnerabilities, GPS Spoofing Highlight Cybersecurity Concerns

AI, Cloud Vulnerabilities, GPS Spoofing Highlight Cybersecurity Concerns

On Sept. 18, 2024, U.S. Sen. Maria Cantrell, chair of the Senate Committee on Commerce, Science and Transportation, stated cyberattacks on the U.S. aviation industry were up 74% since 2020 during a hearing on aviation cybersecurity threats. The attacks are coming from many directions.

Dr. Jeff Hall,NCC Group
Dr. Jeff Hall,
NCC Group

“In the past year, airlines and airports have faced challenges with cloud vulnerabilities and the plethora of shared aviation data,” says Dr. Jeff Hall, principal security consultant and North America aerospace lead for security consultant NCC Group. “With a surge in ransomware attacks targeting airlines and airports, the TSA cybersecurity mandate imposed new requirements for airports and airlines to improve their cybersecurity resiliency. Lastly, Distributed Denial-of-Service (DDoS) attacks targeting airports have become more frequent.”

Philippe Morio,ICAO
Philippe Morio,
ICAO

Legacy systems and outdated technology also remain under attack. “Many aviation systems, especially those in air traffic control and aircraft operations, are based on legacy technologies that are difficult to secure and update, making them prime targets for cyberattacks,” said Philippe Morio, cybersecurity expert for the International Civil Aviation Organization.

And as supply chains and third-party inclusion expand, cyber hackers are using these targets to find weak spots to attack the aviation industry. “The aviation sector heavily relies on a complex supply chain, including third-party software and service providers,” Morio said. “Attacks on these suppliers, like software supply chain breaches, can have significant downstream effects on airlines and airports.”

A Closer Look

When breaking down the various cyberattacks, the number of vulnerabilities is staggering. But knowing where these weak spots are is crucial to defending them.

As more computing systems rely on the cloud for storage, the more vulnerable they become to cyberattacks. “Cloud environments hosting MBDE (model-based design environment) platforms provide flexibility and scalability but expose critical vulnerabilities in storage, identity management, APIs, networking and backup systems,” Hall said.

Shared aviation data involves many departments as well as third-party providers. This includes ATC systems, supply chain data, airport operations data, aircraft systems, aircraft maintenance data, airline data, frequent flyer and loyalty programs, flight and crew scheduling systems, drone communication networks and weather and navigational data (GPS spoofing and jamming).

GPS spoofing and jamming of weather and navigational data is not widespread across the globe — yet. Hot spots include conflict zones such as the Sinai Peninsula as well as non-conflict zones such as China and Myanmar. Large-scale events such as the Olympics also see a spike in GPS spoofing and jamming at the local level.

“GPS satellites are 12,000 miles up in the sky, GPS spoofers are only 10 miles away from the airplane, so the RF signals that you receive from the satellites are a lot weaker than what’s on the ground,” David Woodcock, principal applications engineer with customer and product support at Honeywell Aerospace, told an Oct. 8 webinar. “Jammers and spoofers overpower the GPS receivers on the aircraft. With regard to GPS spoofing on weather radar, ground returns may be interpreted as weather and vice versa. Incorrect GPS altitude can cause excessive bleed-through or incorrect radar horizon. You’re either too close to everything or everything is too far away.”

In addition, cyber hackers are leveraging artificial intelligence in their attacks. “Artificial intelligence is used for offensive and defensive cybersecurity in the aviation industry,” Hall said. “Criminals are using AI for sophisticated attacks involving phishing and social engineering. In 2019, criminals used an AI-generated voice deepfake to impersonate the CEO of a U.K.-based energy firm and tricked a senior executive into transferring $243,000 to a fraudulent account. In 2023, security researchers found that cybercriminals can exploit AI-powered chatbots like ChatGPT to automate phishing and Business Email Compromise (BEC) attacks.”

Simply put, cyber hackers are using every tool at their disposal to attack the aviation industry.

Fighting Back

Just as cyberattacks are taking many forms, thwarting cyberattacks takes a multi-pronged approach as well.

Lawrence Baker,NCC Group
Lawrence Baker,
NCC Group

“The TSA cybersecurity requirements introduced in 2023 focus on network segmentation, access control, continuous monitoring and patching vulnerabilities,” said Lawrence Baker, managing consultant and aerospace technical lead for NCC Group Transport Practice. “Airlines and airports are implementing robust cloud security frameworks and encrypting shared aviation data. Airlines are focusing on solutions to reduce the impact of ransomware attacks, such as backup and disaster recovery measures, system redundancy, and more resilient operational strategies to ensure the continued operation of critical services while under attack. Vulnerability scanning, monitoring and automated defenses are used to protect against DDoS attacks.”

Bringing all of these segments in the aviation industry together in a cohesive manner is required across the industry to tighten cybersecurity. “Collaboration in aviation cybersecurity involves building partnerships across sectors,” Morio said. “Regulatory frameworks, such as ICAO and EASA (European Union Aviation Safety Agency) standards, govern compliance and promote cybersecurity governance within the industry. Information sharing is crucial for exchanging threat intelligence and best practices among stakeholders. Data collaboration enhances situational awareness, while resource sharing pools expertise and tools to strengthen defenses. Together, these elements create a proactive approach to addressing cybersecurity challenges in aviation.”

Members of the aviation industry also are using AI to defend against cyberattacks. “The application of AI for cybersecurity defensive purposes is moving at a rapid pace, as are the commercial offerings using this type of technology,” Baker said. “AI can be used for threat detection and predictive analytics by analyzing traffic in real-time, identifying patterns that may signal a cyberattack, and using machine learning models to learn from previous attacks and detect anomalies.”

Nat Iyengar,Jet Aviation/NBAA
Nat Iyengar,
Jet Aviation/NBAA

Efforts to stop GPS spoofing and jamming are ongoing, but involve different players, which slows the process. Some solutions are as simple as avoiding areas where GPS spoofing and jamming are prevalent. “The routing you use into the Middle Eastern areas is very important,” Nat Iyengar, National Business Aviation Association International Operations Committee chair and captain at Jet Aviation Business Jets (Hong Kong) Ltd., told an Oct. 8 webinar. “Many come across Egypt and clip the corner of Jordan; you’re guaranteed to get spoofed there. The further south you can stay of the Sinai Peninsula, the better.”

Keep in mind, too, that GPS spoofing and jamming can come from the air and the ground. “Everyone is reporting spoofing when they’re airborne, but beware there are certain areas where that signal may be corrupted on the ground,” Iyengar said. “Be disciplined and check your position information to make sure your IRS isn’t initialized with a bad position.”

Original equipment manufacturers are working to combat GPS spoofing and jamming, but it’s a slow process. “For the OEMs, what they are planning for the future, they have quite a long runway to get those,” Steve Thorpe, director of standards and training and senior captain for Merck Sharp & Dohme, told an Oct. 8 webinar. “They have to do all the testing, do the certifications, get it into the OEMs and get it all approved. Whereas the folks doing the spoofing, if they want to change what they’re doing, it’ll take a week and they’re doing something different. So our hands are tied with the response.”

Business jet manufacturers are working to combat cybersecurity concerns, but it is up to the individual operator to be proactive in combating GPS spoofing and jamming according to members of the NBAA International Operations Committee. Gulfstream image.
Business jet manufacturers are working to combat cybersecurity concerns, but it is up to the individual operator to be proactive in combating GPS spoofing and jamming according to members of the NBAA International Operations Committee. Gulfstream image.

As such, it’s up to the individual operator to be proactive in combating GPS spoofing and jamming. “Each operator has to develop their own procedures and understanding of how they’re going to react to terminal area or crew EGPWS warnings,” Iyengar said. “That’s not something an OEM is ever going to come out with guidance and tell you how to do it. That’s something you’re going to have to do yourself.”

When creating that plan, aviation and security personnel need to prioritize specific elements rather than trying to plug all the leaks at once. “They should prioritize network segmentation and access control, continuous monitoring and threat detection, regular patching, and vulnerability management,” Hall said.

This allows them to develop a cyber resilience strategy and establish protocols for damage tolerance and recovery, ensuring that systems can switch to backups or failover to continue functioning during an incident. “Incident response and recovery to restore systems quickly and safely to ensure the continuity of services, training and awareness to reduce human error — which remains one of the weakest links in cybersecurity — and coordination between industry and government agencies like the TSA and CISA are crucial, along with sharing information about new threats and vulnerabilities,” Hall said.

There are still many moving pieces to a cohesive cybersecurity approach as cybersecurity evolves to prevent future attacks. “Cybersecurity is likely to evolve in the near future to prevent attacks through increased integration of AI and machine learning, cyber resilience and redundancy, increased collaboration between government and industry, strengthened cloud security and data protection, incorporated blockchain technology, and using zero trust architectures,” Baker said. “Government regulation and adopting industry standards will improve cybersecurity, but the adoption rate is hard to predict as it depends on lawmakers’ actions. Currently, Europe’s legislation for aviation cybersecurity is further advanced than that of the U.S., for example.”

Maintaining collective awareness and working together to thwart cyberattacks is crucial in the fight against cyberattacks. “Collective efforts will empower us to leverage diverse insights and resources, enhancing our ability to navigate the complexities of today’s security landscape,” Morio said. “Together, we can build a more resilient framework to meet these challenges head-on.”