Verified Document

Briefing On Security Board Briefing On Security Research Paper

¶ … Briefing on Security Board Briefing on Security

Terrorism in Commercial Organizations

Terrorism in Airlines

Current Threats to Aviation

Insider Threats

Automation Adds Efficiency

Improving Total Operations

Increased Threats from Advanced Explosives

Threat against Airline Services and Airports

Necessary Steps to Improve Aviation Security

Terrorism is the systematic use of terror. It does not have a legal binding or definition in criminal law. Commonly, it is referred to creation of fear through violence (Townshend, 2002). Terrorism is usually defined and assumed as a group phenomenon (Hofmann, 2012). Terrorism has spread across the globe with its many forms and indicators. The emotional and diplomatic use of the word terrorism has resulted in a difficulty to provide an appropriate definition of terroorism (Raman, 2008). Researches have figured out more than hundred definitions of the word. The notion of terrorism is arguable due to two main reasons. Firstly, it is often used by government and other ruling bodies to delegitimize political or other rivals, secondly, to possibly legitimize the use of equipped force against enemies. A steadfast and unique characteristic of terrorism is the undifferentiating use of strength counter to noncombatants for the aim of attainment of publicity for a group, root, or individual. The representation of terrorism can influence human fear to help attain these goals. The problem of terrorism needs to be handled on many fronts. It is a global threat and needs global collaboration between powers of the world to monitor and eliminate this devastating phenomenon. It is found globally in one form or the other. The growth in means of transport, communication and production of automatic weapons, have given terrorism new scopes, seriousness and enormity (Sloan, 2003). With the increased globalization, economic incorporation and collaboration of the nations, the terrorism has become limitless and can be elated and transferred to any part of the world effortlessly. It is usually in the form of violence, killings, murders, fear and depression among the masses. It has left a bad impact on all fields of life. Commercial as well as domestic units are under the threat in their daily chores. Thus drastic measures are needed to avoid the damages of any violent activity (Townshend, 2002).With this increased terrorism, drastic security measures are necessary to avoid any damage and threat. Security measures refer to measures taken as a precaution against theft, espionage, terrorism or sabotage ( Friedman & Mitchell, 2009). In this era where terrorism has increased drastically across the globe, implementing additional security measures to prevent damage has become integral in commercial organizations.

Terrorism in Commercial Organizations

With the tremendous growth in terrorism, commercial sector of economy has become more viable victim. There are numerous incentives of targeting these organizations.

Sometimes terrorist attack an organization with the purpose to get higlighted and noticed. Attacking such organizations will bulid up pressure on the government. For instance, attacking a multinational company in any third world company can leave an impact on government as well as economy. Additionally, such activities are highlighted in international media as well. Thus it helps in getting the mission and hidden motives of terrorists accomplished ( Dyson, 2012).

In some situations, terroirst activities are carried out in government lead companies. The motive behind is to weaken the government. This weakening of the government not only effects the position of ruler but also leaves a negative impact of the country across the globe.

Terrorist activties are usually prevalent in organizations which tend to leave a strong impact. Secondly, many organizations are difficult to guard as their setup is huge and spreaded across a broad range of city or countries. Now another important question is that why private organizations need to focus more on their security. The very simple reason behind this idea is that government organizations are usually confined as compared to private organizations. Additionally, private firms have to make available and finance their own defense. They have to employ commercial security firms and have to fix exclusive equipment which will give rise to their costs of production. Thus implying a reliable and dependable security setup in commercial organizations is necessary.

Terrorism in Airlines

Terrorism in airlines can serve multiple purpose:

The issue will get highlighted in international media

Pressure of the nation increases as they are the victims in this case

Economy of the target country will be effected

Government's reputation is immensely effected negatively

With the evolved technology and increased globalization, every filed of life is besieged by the terror and fear of terrorism, thus drastic measures are necessary to cope with the situation. Hijacking, a common form of terrorism is prevalent across the globe from decades and the incident of 9/11...

Parts of this document are hidden

View Full Document
svg-one

Dissimilar to the usual hijackings of land vehicles or ships, skyjacking is not commonly committed for stealing or theft (Parr, 2009). Most aircraft hijackers aim to use the passengers as prisoners, both for financial ransom or for some political concession. Reasons differ from demanding the release of certain prisoners to emphasizing the protests of a particular community. But the basic motive is to terrorize the regulating body and people in general. Ever since the September 11 attacks, airports have perhaps been the chief seriously safeguarded sites when it comes to preventing terrorist attacks. With this growth in terrorism, severe measures are necessary in order to avoid the hazards of terrorist activities ( Simon, 2001).
Current Threats to Aviation

Terrorism boosted after 9/11 incident. Despite of all the efforts made to provide tight security to the entire aviation system across the globe, the number of conspiracies to attack aviation has greatly increased. Several security measures have been adopted. Thus, notwithstanding government determinations to improve aviation security, numerous critical planned threats continue. So in order to avoid any risk and damage, the airlines need to implement extra security measures.

Insider Threats

As terrorism has touched every edge of the world so relying on manual security system is not wise. Insider threat can result in great disasters. It can give rise to terrorism greatly. A major problem with this security system is its limitation to check the employees working in protected areas before entering the workspace area. Secondly, supplementary methods, like arbitrary screening is incapable to successfully lessen this risk. This threat is increased in underdeveloped countries with poor infra-structure. In such system, terrorist and criminal databases is not properly organized which leads to ineffectual screening by local authorities (Jain, 2013). This in turn makes the security weak. In such scenario, relying on airport authorities is not a safe option. Thus, implementing additional safety measures by the airline authorities would be advantageous. Relying solely on airport authorities is not a safe option.

Automation Adds Efficiency

Adding automation can improve security tremendously. For instant, properly monitoring the touch points in different departments can improve security. Considering the case of any termination, added automation can assure that the process flows through all the touch points to ensure that all aspects of identity are returned properly so they cannot be used again by any ex-employee for some wrong purpose. Secondly, additional automation can be helpful in properly monitoring all the operations of the system.

Improving Total Operations

Improving security measures in airlines is necessary. The additional cost to implement new and advanced systems is a hinderance but software solutions for airport identity management can be an effective and efficient measure that can be attained at relatively lower cost while acquiring the regulatory needs (Jain, 2013). This advanced software's can perform multiple tasks:

Criminal database can be updated and made easily available

Changes in system can be easily updated using this advanced technology

Previous records can be updated with the new ones so losing data would be impossible

Manual audits can be replaced with advanced computerized system which is cost effective as well as less time consuming

Criminal history records checks can be made easily available and updated which will in turn act as a useful measure in context of security

Increased Threats from Advanced Explosives

Advanced skills to hide spontaneous explosives from security screening tools can be hazardous if used in any terrorist activity. Even with advanced security system implemented by government and high level authorities, explosives detection equipment can still be beaten by several attacks. For example, many devices lack the capability and technology to identify explosives. This shortcoming makes the use of these explosives tempting and appealing to terrorists (Quarles, 2000). This incapability to identify the elements can result in increased risks and dangers. So in order to deal with the evolving threats from explosive devices, security system needs to be progressed greatly. In such uncertain circumstance, relying solely on government bodies and airport authorities could result in extremely severe consequences. Thus a well-structured security system is necessary to avoid risks and dangers.

Threat against Airline Services and Airports

It is usually ignored that apart from aviation structure, other parts beyond aircraft can be attacked as well. It is usually ignored while implementing a security system. In spite of their importance and threat to flight processes, these regulator centers are infrequently severely shielded.

An additional major risk to commercial airlines is the increase in conspiracies and attacks directing airports rather than airplanes. Assaults touching airports have been planned and executed using multiple techniques. All such facts are…

Sources used in this document:
References

Dyson, W.E. (2012). Terrorism: An Investigator's Handbook. New York: Anderson Publishing.

Friedman, D.M., & Mitchell, C. (2009). Security Measures in the Commercial Trucking and Bus Industries. New York: John Wiley and Sons.

Jain, A. (2013, January 1). Addressing The Insider Threat. Retrieved from Security-today: http://security-today.com/Articles/2013/01/01/Addressing-The-Insider-Threat.aspx

Parr, A. (2009). Hijacking Sustainability. New York: MIT Press.
Cite this Document:
Copy Bibliography Citation

Related Documents

Government and Its Role and
Words: 1157 Length: 4 Document Type: Essay

In this case, individuals are entitled to produce goods and services to meet their human need instead of private profit (Wolff, 2012). Prevention for Power and Privileges under Social Contract: While social contract provides power and privileges to all members of the society, ordinary people are usually prevented from executing the power and privilege that they are entitled to through various ways. Some of these ways include the state's legitimacy claims

Government & Policy the Joyan
Words: 1138 Length: 4 Document Type: Creative Writing

Also, a very liberal strategy like the one that Mexico took after the NAFTA agreements is dangerous to a newly independent state. Extreme liberalization worked well for Mexico because a large and confident Mexico felt like it could benefit greatly from increased trade and labor transfer with the United States, without being pushed around in the agreement, and Canada helped to maintain neutrality. The Joyan Islands, on the other

Government Why Did the Framers
Words: 5873 Length: 18 Document Type: Essay

Republicans construed Obama as suggesting government bailouts for new industries, or at the slightest a more lively federal government function in generating or supporting jobs -- concepts abominations to a lot of conservatives. The Obama campaign countered the idea as political spin that does not replicate the president's feeling or meaning, pointing to full circumstances of the quotation as confirmation (Koch, 2011). Discuss the process of how a Bill becomes a

Government Contracting Process the Federal
Words: 2271 Length: 8 Document Type: Thesis

(Vancketta, 1999) The 'Changes' clause enables the Government "to make unilateral changes to the contract during performance, so long as those changes fall within the contract's scope." The Standard 'Changes' clause utilized in fixes price supply contracts allows the CO to make changes in writing to: 1) the drawings, designs, or specifications when the item is being specifically manufactured for the government; 2) the method of shipment or packing; or 3) the place

Government by the People Federalism
Words: 969 Length: 3 Document Type: Essay

Lobbyists may accost legislators to directly influence their vote on a certain issue. Lobbyists fulfill the important role of providing information for legislators' decision-making, educating and forming public opinion, and even contributing to and testifying to certain legislations. Lobbyists are mostly involved in the electoral process through the use of political action committees (Magleby et al.). Creating the Constitution The original framers designed the Constitution for ordinary people who were not

Government Effects the Government in
Words: 317 Length: 1 Document Type: Term Paper

Higher taxes for example relates to less income for basic needs. In terms of political ideology, it is obvious that the particular ideology of the government would affect the rest of the country. In terms of the United States, for example, the Republican government has a certain set of ideals in terms of issues such as abortion, religious ideology, and so on, that they tend to impose upon the population. In

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now