Verified Document

Briefing On Security Board Briefing On Security Research Paper

¶ … Briefing on Security Board Briefing on Security

Terrorism in Commercial Organizations

Terrorism in Airlines

Current Threats to Aviation

Insider Threats

Automation Adds Efficiency

Improving Total Operations

Increased Threats from Advanced Explosives

Threat against Airline Services and Airports

Necessary Steps to Improve Aviation Security

Terrorism is the systematic use of terror. It does not have a legal binding or definition in criminal law. Commonly, it is referred to creation of fear through violence (Townshend, 2002). Terrorism is usually defined and assumed as a group phenomenon (Hofmann, 2012). Terrorism has spread across the globe with its many forms and indicators. The emotional and diplomatic use of the word terrorism has resulted in a difficulty to provide an appropriate definition of terroorism (Raman, 2008). Researches have figured out more than hundred definitions of the word. The notion of terrorism is arguable due to two main reasons. Firstly, it is often used by government and other ruling bodies to delegitimize political or other rivals, secondly, to possibly legitimize the use of equipped force against enemies. A steadfast and unique characteristic of terrorism is the undifferentiating use of strength counter to noncombatants for the aim of attainment of publicity for a group, root, or individual. The representation of terrorism can influence human fear to help attain these goals. The problem of terrorism needs to be handled on many fronts. It is a global threat and needs global collaboration between powers of the world to monitor and eliminate this devastating phenomenon. It is found globally in one form or the other. The growth in means of transport, communication and production of automatic weapons, have given terrorism new scopes, seriousness and enormity (Sloan, 2003). With the increased globalization, economic incorporation and collaboration of the nations, the terrorism has become limitless and can be elated and transferred to any part of the world effortlessly. It is usually in the form of violence, killings, murders, fear and depression among the masses. It has left a bad impact on all fields of life. Commercial as well as domestic units are under the threat in their daily chores. Thus drastic measures are needed to avoid the damages of any violent activity (Townshend, 2002).With this increased terrorism, drastic security measures are necessary to avoid any damage and threat. Security measures refer to measures taken as a precaution against theft, espionage, terrorism or sabotage ( Friedman & Mitchell, 2009). In this era where terrorism has increased drastically across the globe, implementing additional security measures to prevent damage has become integral in commercial organizations.

Terrorism in Commercial Organizations

With the tremendous growth in terrorism, commercial sector of economy has become more viable victim. There are numerous incentives of targeting these organizations.

Sometimes terrorist attack an organization with the purpose to get higlighted and noticed. Attacking such organizations will bulid up pressure on the government. For instance, attacking a multinational company in any third world company can leave an impact on government as well as economy. Additionally, such activities are highlighted in international media as well. Thus it helps in getting the mission and hidden motives of terrorists accomplished ( Dyson, 2012).

In some situations, terroirst activities are carried out in government lead companies. The motive behind is to weaken the government. This weakening of the government not only effects the position of ruler but also leaves a negative impact of the country across the globe.

Terrorist activties are usually prevalent in organizations which tend to leave a strong impact. Secondly, many organizations are difficult to guard as their setup is huge and spreaded across a broad range of city or countries. Now another important question is that why private organizations need to focus more on their security. The very simple reason behind this idea is that government organizations are usually confined as compared to private organizations. Additionally, private firms have to make available and finance their own defense. They have to employ commercial security firms and have to fix exclusive equipment which will give rise to their costs of production. Thus implying a reliable and dependable security setup in commercial organizations is necessary.

Terrorism in Airlines

Terrorism in airlines can serve multiple purpose:

The issue will get highlighted in international media

Pressure of the nation increases as they are the victims in this case

Economy of the target country will be effected

Government's reputation is immensely effected negatively

With the evolved technology and increased globalization, every filed of life is besieged by the terror and fear of terrorism, thus drastic measures are necessary to cope with the situation. Hijacking, a common form of terrorism is prevalent across the globe from decades and the incident of 9/11...

Dissimilar to the usual hijackings of land vehicles or ships, skyjacking is not commonly committed for stealing or theft (Parr, 2009). Most aircraft hijackers aim to use the passengers as prisoners, both for financial ransom or for some political concession. Reasons differ from demanding the release of certain prisoners to emphasizing the protests of a particular community. But the basic motive is to terrorize the regulating body and people in general. Ever since the September 11 attacks, airports have perhaps been the chief seriously safeguarded sites when it comes to preventing terrorist attacks. With this growth in terrorism, severe measures are necessary in order to avoid the hazards of terrorist activities ( Simon, 2001).
Current Threats to Aviation

Terrorism boosted after 9/11 incident. Despite of all the efforts made to provide tight security to the entire aviation system across the globe, the number of conspiracies to attack aviation has greatly increased. Several security measures have been adopted. Thus, notwithstanding government determinations to improve aviation security, numerous critical planned threats continue. So in order to avoid any risk and damage, the airlines need to implement extra security measures.

Insider Threats

As terrorism has touched every edge of the world so relying on manual security system is not wise. Insider threat can result in great disasters. It can give rise to terrorism greatly. A major problem with this security system is its limitation to check the employees working in protected areas before entering the workspace area. Secondly, supplementary methods, like arbitrary screening is incapable to successfully lessen this risk. This threat is increased in underdeveloped countries with poor infra-structure. In such system, terrorist and criminal databases is not properly organized which leads to ineffectual screening by local authorities (Jain, 2013). This in turn makes the security weak. In such scenario, relying on airport authorities is not a safe option. Thus, implementing additional safety measures by the airline authorities would be advantageous. Relying solely on airport authorities is not a safe option.

Automation Adds Efficiency

Adding automation can improve security tremendously. For instant, properly monitoring the touch points in different departments can improve security. Considering the case of any termination, added automation can assure that the process flows through all the touch points to ensure that all aspects of identity are returned properly so they cannot be used again by any ex-employee for some wrong purpose. Secondly, additional automation can be helpful in properly monitoring all the operations of the system.

Improving Total Operations

Improving security measures in airlines is necessary. The additional cost to implement new and advanced systems is a hinderance but software solutions for airport identity management can be an effective and efficient measure that can be attained at relatively lower cost while acquiring the regulatory needs (Jain, 2013). This advanced software's can perform multiple tasks:

Criminal database can be updated and made easily available

Changes in system can be easily updated using this advanced technology

Previous records can be updated with the new ones so losing data would be impossible

Manual audits can be replaced with advanced computerized system which is cost effective as well as less time consuming

Criminal history records checks can be made easily available and updated which will in turn act as a useful measure in context of security

Increased Threats from Advanced Explosives

Advanced skills to hide spontaneous explosives from security screening tools can be hazardous if used in any terrorist activity. Even with advanced security system implemented by government and high level authorities, explosives detection equipment can still be beaten by several attacks. For example, many devices lack the capability and technology to identify explosives. This shortcoming makes the use of these explosives tempting and appealing to terrorists (Quarles, 2000). This incapability to identify the elements can result in increased risks and dangers. So in order to deal with the evolving threats from explosive devices, security system needs to be progressed greatly. In such uncertain circumstance, relying solely on government bodies and airport authorities could result in extremely severe consequences. Thus a well-structured security system is necessary to avoid risks and dangers.

Threat against Airline Services and Airports

It is usually ignored that apart from aviation structure, other parts beyond aircraft can be attacked as well. It is usually ignored while implementing a security system. In spite of their importance and threat to flight processes, these regulator centers are infrequently severely shielded.

An additional major risk to commercial airlines is the increase in conspiracies and attacks directing airports rather than airplanes. Assaults touching airports have been planned and executed using multiple techniques. All such facts are…

Sources used in this document:
References

Dyson, W.E. (2012). Terrorism: An Investigator's Handbook. New York: Anderson Publishing.

Friedman, D.M., & Mitchell, C. (2009). Security Measures in the Commercial Trucking and Bus Industries. New York: John Wiley and Sons.

Jain, A. (2013, January 1). Addressing The Insider Threat. Retrieved from Security-today: http://security-today.com/Articles/2013/01/01/Addressing-The-Insider-Threat.aspx

Parr, A. (2009). Hijacking Sustainability. New York: MIT Press.
Cite this Document:
Copy Bibliography Citation

Related Documents

Operation of the Homeland Security Council Creates
Words: 1614 Length: 6 Document Type: Essay

Operation of the Homeland Security Council Creates the Homeland Security Council and sets down is functions. This directive creates the Homeland Security Council (HSC) and lists its functions. The purpose of the HSC is to synchronize homeland security-related efforts across executive departments and agencies of all levels all through the country, and to put into practice the Department's policies by way of eleven Policy Coordination Committees. Homeland Security Presidential Directive 3: Homeland

Homeland Security and Preparedness, Response, Activities and
Words: 2666 Length: 8 Document Type: Capstone Project

Homeland Security and Preparedness, Response, Activities and Programs in Disaster Response or Disaster Recovery The focus of this study is the homeland security issue as it relates to the preparedness of the U.S.A. government and citizens in response to the emergencies that may emerge. The research question in this study is one that asks in light of the past disasters experienced by the United States such as the events of September 11,

Sharpest Communications Briefing on Prpr
Words: 1026 Length: 3 Document Type: Research Proposal

These changes are more radical than those due to technology. Technical Factors: Technology continues to evolve at a rapid pace. What was once state-of -- the art, is quickly outdated. With these advancements, comes an increase in efficacy and efficiency for all organizations, in addition to a continued removal of geographical borders for transnational trade. For the fashion industry, technological improvements can be found in every step of the product lifecycle.

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Social Engineering Information Security
Words: 3036 Length: 9 Document Type: Term Paper

Social Engineering and Information Security We are in an age of information explosion and one of the most critical problems facing us is the security and proper management of information. Advanced hardware and software solutions are being constantly developed and refined to patch up any technical loopholes that might allow a hacker attack and prevent consequent breach of information security. While this technical warfare continues, hackers are now pursuing other vectors

Home Security Reforming Immigration Reform Homeland Security
Words: 4103 Length: 10 Document Type: Capstone Project

Home Security Reforming Immigration Reform Homeland Security Reforming Immigration Reform In current years illegal immigration has turned out to be a topic that has brought up some significant political issues in the United States. A lot of the debate on illegal immigration emphases on a feasible route to United States citizenship. It would need to be pointed out that there are so many more persistent subjects which should be spoken about in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now