TOP
0
0
即日起~6/30,暑期閱讀書展,好書7折起
Aviation and Airport Security, Terrorism and Safety Concerns
90折

Aviation and Airport Security, Terrorism and Safety Concerns

商品資訊

定價
:NT$ 11700 元
優惠價
9010530
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
相關商品
商品簡介
目次

商品簡介

The Definitive Handbook on Terrorist Threats to Commercial Airline and Airport Security
Considered the definitive handbook on the terrorist threat to commercial airline and airport security, USAF Lieutenant Colonel Kathleen Sweet’s seminal resource is now updated to include an analysis of modern day risks. She covers the history of aviation security and compares current in-flight security practices with those of other countries.

Covering Transportation Security Administration changes in security, policy, and training regulation since 9/11, this authoritative reference:



Discusses a broad range of aviation terrorist incidents


Considers aviation security in the present geopolitical climate


Addresses cargo and passenger security


Determines how security considerations are factored into business processes


Details new regulations for the TSA


Contains an instructor’s manual with test bank


Documents the history of aviation security


Includes extensive background information on various terrorist groups


In addition to cargo and passenger security, the text looks at airport and aviation business practices and how security considerations are factored into business processes. The first edition quickly became required reading for air service operators and airport management training programs. This edition is certain to follow suit.

About the Author:
Kathleen M. Sweet, Lt. Col., Ret., USAF, JD, is on the adjunct faculty at the University of Maryland, Department of Emergency Management. Lt. Col. Sweet is also a consultant with International Risk Control Ltd, London, England, and president and CEO of Risk Management Security Group, a transportation security consulting firm.

目次

The Aviation Industry: A national security asset
News
Importance of Air Transportation
Airways
Development of the Aviation Industry
Airlines
Facilities
Airway Routes
Deregulation
Consequences of 11 September to the Industry
Emergency Funding
Protecting Public Air Transportation
Conclusion
References
The Historical Hijacking Threat and Government Response: A Persistent Problem
News
Hijacking
Legal Responses to Expanding Security Measures
International Perspectives
The Trend Begins
Early Federal Aviation Regulations
Airport Security Programs
New Carrier Rules 1972
New Airport Operator Rules 1972
Resistance Fades
How to Implement the New Rules
Public Law 93–366
Dissemination of Threat Warnings
Recommendations of the President’s Commission
Aviation Security Improvement Act of 1990
The Federal Aviation Reauthorization Act of 1996
Civil Aviation Security
Aviation Security Research and Development Division Costs
White House Commission on Aviation Safety and Security — The Department of Transportation Status Report
Aviation and Transportation Security Act — P.L. 107–71
Implementing Recommendations of the 9/11 Commission Act of 2007 (H.R. 110-1, P. L. No: 110-53)
The National Strategy for Aviation Security
The White House, March 26, 2007
Security Guidelines for General Aviation Airports
Transportation Security Administration, May 17, 2004
Conclusion
References
International Solutions and Reactions
News
Crimes Against Humanity
The Tokyo Convention
Hijacking Convention: Convention for the Suppression of Unlawful Seizure of
Aircraft
Montreal Convention
The Convention on the Prevention and Punishment of Crimes Against
Internationally Protected Persons
Bonn Agreement 1978
International Convention Against the Taking of Hostages
Tokyo Summit 1986
Further Efforts
Montreal Protocol of 1988
Diplomatic Conference on Air Law 1991
Convention on the Physical Protection of Nuclear Material 1980
G-7 Summit 1995
Lyon Summit 1996
Ministerial Conference on Terrorism 1996
Convention for the Suppression of Terrorist Bombings 1997
International Convention for the Suppression of the Financing of Terrorism 1999
United Nations
The International Civil Aviation Organization (ICAO)and The European Civil
Aviation Conference
Post July 2005 British Legislation
International Convention for the Suppression of Acts of Nuclear Terrorism
Conclusion
References
Growth and Change: Aircraft As Missiles
News
Early Criminal Hijackings
Terrorist Hijackings Spread
Initial Public Responses
Cockpit Doors
Passenger Photo IDs
Crew Training
Profiling
CAPPS II
Secure Flight
No Fly List
Sky Marshal Program, Federal Air Marshal Program
History of Significant Air Hijackings Since 1972
31 May 1972: Lod Airport
27 June 1976: Entebbe, Uganda
14 June 1985: Trans World Airlines Flight 847
21 December 1988: Pan American Flight 103
11 September 2001
Other hijackings in recent decades
Conclusion
References
Terrorism: The Roots Remain
News
Introduction
Causes of Terrorism
Middle East
Rival Claims
Palestinian Liberation Organization (PLO)
Abu Nidal
Hamas
Iranian Support of Terrorism
Hezbollah
Afghanistan: Usama Bin Laden
Europe
Germany
Italy
Spain
Northern Ireland
Japan
Aum Shinrikyo
Latin America
Tupac Amaru (MRTA)
Shining Path (Sendero Luminoso)
Russia
U.S. Domestic Terrorism
The Order
Nuclear Terrorism
A Dirty Bomb
Attack on Nuclear Power Plants
Diversion of Nuclear Material or Weapons
Biological and Chemical Warfare
Conclusion
References
International Major Counter Terrorism Units, Law Enforcement, and Intelligence Agencies — The best defense
News
Introduction
CounterTerrorist Units
Austrian Special CountertTerrorist Intervention Unit
Canadian Armed Forces Joint Task Force 2
Great Britain: SAS
Germany: GSG-9
Israel: Sarayat Mat’Kal
Civil Guard
Border Guard Force
Ireland: Army Ranger Wing
France: Groupment d’intervention de la Gendarmerie Nationale (GIGN)
Spain: Grupo Especial de Operaciones (GEO)
United States: Special Forces Teams
Operation Ice Eagle
Local Law Enforcement
Training
The U.S. Customs Service
Customs and Border Protection Bureau
Drug Enforcement Agency
Federal Bureau of Investigation
The US Marshals
Department of Homeland Security
Transportation Security Administration
The Immigration and Naturalization Service, U.S. Citizen and Immigration Service
The Border Fence and The Real ID Card Program
9-11 Commission
Director of National Intelligence
The Intelligence Community
Terrorist Screening Center (TSC)
United States Postal Inspection Service
Interpol
Conclusion
References
Screening — the last line of defense
News
Introduction
Sterile Concourse
Sterile Boarding Areas
Departure-Gate Screening
Screening Checkpoint Augmentation
Law Enforcement Officers at the Gate
Flexible Law Enforcement Response Program
Airport Categories
Public and Private Security Interface
Criminal Case Law Examples
United States versus James Edward Ware, U. S. District Court, Western
District of Oklahoma, August 1970
United States versus Feldman, U.S. District Court, Eastern District of New
York, 1 May 1969
United States versus Benrus Eugene Brown, United States District Court,
Western District of Texas, October 1969
Lawrence Havelock versus the U.S. Court of Appeals, Tenth Circuit June 1970
United States versus Reid 2003 (Shoe Bomber)
United States versus John Walker Lindh
Case Law Summary
Initial Screening
Screening Procedures
Screening Baggage
Threat Assessment
3-1-1 Rule
Screening Computers and Laptops
Discovered Contraband
Battery Restriction
Screening Passengers
Cast Scope
Rating Hand Held Metal Detectors
Body Search
Screening Airport and Airline Employees
Screening Diplomats
Registered Traveler Program
No Fly List
Federal Behavior Detection Officers
Theft
Potential TSA Ethics Issues
Public Relations
Airborne Aircraft Security
Federal Flight Deck Officers
Training Initial training will be conducted in a one-week session that will typically require volunteers to arrive mid-afternoon on a Sunday and remain through conclusion of training the following Saturday afternoon
Conclusion
References
Private Security Personnel versus Transportation Administration Security Personnel: Increased supervision?
News
Introduction
Criminal Guards: Foxes Guarding the Chickens
Ergonomic Solutions
Potential Operator Concerns with Specific Screening Technologies
Measuring Operator Performance
Operator Selection
Tougher Than They Thought
The OPT OUT Program
Conclusion
References
Metal Detectors, X-Ray Inspection, Explosive Detection, and Trace Detection Devices: Will the Public Tolerate the Intrusion?
News
Introduction
Metal Detectors
Selecting a Metal Detector
Hand-Held Body Scanners
Testing
Metal Detectors, Computers, and Personal Medical Devices
X-Ray Inspection Units
Passive Millimeter-Wave Imaging
Active Millimeter-Wave Imaging
Selecting an X-ray Unit
Sizers
Film and Laptops
Passenger X-Ray Screening Devices
Portable Digital X-Ray Imaging Systems
Testing X-ray Equipment
Detection Capabilities
Prior X-Ray Explosive Detection Devices
U.S. Standard
New Computer Software
Explosive-Detection Systems
Three-Dimensional Imaging: Explosive Assessment Computed Tomography
Bottled Liquid Scanners
Trace Detection Technology Today
Explosive Detection Devices for Baggage
Enhancing ETD Capability
Thermedics EGIS 3000, EGIS II, EGIS III
Barringer IONSCAN 400B, Centurion, Sentinel II
ION Track ITEMISER 3, Entry Scan
Taggants
Project Hostile Intent
Conclusion
References
Cargo Security: A Loose End
News
Introduction
Cargo Carrier Responsibility
Report to Congress on Air Cargo Security
Arming Cargo Pilots
Suicides
Baggage Tags
Passenger Baggage Reconciliation
Airport Lockers
Container Hardening
Blast Containment versus Blast Management
Airmail Security
Indirect Air Carriers
Known Shipper
Unknown Shipper
GAO Status Report on Cargo Security 2002
Strategic Plan of TSA
Enhanced Measures
Summary of Airforwarder’s Association Objections
The Latest
Vacuum Chambers
Inspection of Hazardous Cargo
International Cargo Standards
TSA Inspection of Airports
Conclusion
References
Security and the Rules of Law — A Slippery Slope
News
Introduction
Fourth Amendment
Administrative Search Exception
Balancing Approach
Less Intrusive Alternatives
Individual Stop and Frisk Searches
Selectee Class Stop and Frisk Search
Consent Exception
Other Exceptions to Fourth Amendment Requirements
Border Searches
Exigent Circumstances
Reasonableness
Probable Cause
The Exclusionary Rule
The Legal Authority of Private Persons to Search
Exceptions to the Exclusionary Rule
Inevitable Discovery
Good Faith Exception
Police Participation
NonViolent Threats?
Airport Administrative Screening Searches at Airports
Passenger’s Right to Terminate a Search
Alternate Viewpoint
The War on Drugs
Passenger Rights
New Law in the Area of Searches
New Technologies and the Law
Conclusion
References
Foreign Airport Security: Comparison of U.S. Law and Foreign Domestic Law — Lessons Learned
News
Introduction
Ground Security
American Assessments
Diversion Airports
Legal Remedies
Legislation after 11 September 2001
AntiTerrorism Legislation in the United Kingdom
Post 2005 London Bombings
Canada’s War with the FLQ
Germany
Italy
Profiling
International Views of Profiling
SAFEE
Bomb Sniffing Dogs
Conclusion
References
Technological Improvements: Some Intrusive, Some Not
News
Introduction
Gore Commission
Homeland Security: Science and Technology Directorate
Anti Missile Defense Systems
Microwave Holographic Imaging
Triggered Spark Gap
BOSS™
Flight VU™
BiosimMER™
Quadrupole Resonance Devices
Intelliscan™ 12000 Metal Detector
Biometric Systems
FACE IT™ Access Controls
Imaging Technologies
Trace-Detection Technologies
Fuel Flammability
Remote-Controlled Aircraft
Improved Closed-Circuit Television Technology
Cockpit Doors
Conclusion
References
Airport Operator Concerns and Other Safety and Security Issues: The Foundations of Security
News
Introduction
Airport Runway Incursions
Passenger Interference
Air Rage and Passenger Involvement
Air Rage and Civil Liability
Civil Remedies
Conventional Weapons
Explosives
Nuclear and Biological Weapons
Embracing Risk Management
Assessing the Threat
Law Enforcement
Federal Resources
Private Intelligence Services
Stratfor Strategic Forecasting, Inc
Jane’s Information Group
Economist Intelligence Unit
Flight Crew Involvement
Conclusion
References
Access Controls, Perimeter Security: Another Foundation
News
Introduction
Access Control
Locks
Access Cards
Electronic Locks
Sensors
Biometric Security Systems
Retinal Scans
Fingerprint Verification Readers
Voiceprint Identification
Hand Geometry
Facial Scan
Signs
Perimeter Fencing and Lighting
Exterior Alarm Sensors
Motion Detectors
Microwave
Charged Coupled Devices
Portal Coaxial Cables
Electric Field
Vibration and Stress Detectors
Closed Circuit Television
Infrared Motion Detectors
Active Infrared
Passive Infrared (PIR)
Glass-Break Detectors
The Control Room
Alarms
No Power, No Security
Media Intrusion
Computer Security
Kiosks
Conclusion
Epilogue
Changes
The More Things Change, The More They Remain the Same. Screeners
Are Screeners
Arming Pilots
The Federal Air Marshal Program
Emerging Technology
Civil Liberties
Summary
References
Selected Bibliography
Index

您曾經瀏覽過的商品

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

優惠價:90 10530
若需訂購本書,請電洽客服 02-25006600[分機130、131]。

暢銷榜

客服中心

收藏

會員專區