Airport Security

  • Length: 1727 words (4.9 double-spaced pages)
  • Rating: Excellent
Open Document

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document


This term paper is about Al Udeid Air Installation and Security Program. The information that will be covered in the document consists of; Introduction to Al Udeid Military Instillation, Force Protection Conditions and Determining Assets Protection Levels, Al Udeid Installation Security Concept and Regional Threats, Installation Security Forces and the Conclusion. After reading this term paper the reader will have a better understanding about military operating procedures and protecting military assets form terrorist incidents.

Introduction to Al Udeid Military Instillation

Al Udeid Air Base is a Military Installation located in the country of Qatar, and is considered geographically the heart of the Middle East. Al Udeid's mission is to provide Air and ground support for the War on Terrorism, as well as insuring global reach for US and Coalition Forces. Al Udeid is a diverse installation consisting of all branches of the US Military, British, Australian, Korean Forces, and Civilian Elements. Even with vast military diversity this installation is first and foremost an airport and is one of the largest in the region. The runway and surrounding tarmacs are adequate enough to support the largest aircraft both military and civilian. Although, the assortment and numbers are classified this installation has an adage "if it burns jet fuel, kicks ass, or moves troops. It's here!" It is estimated that either a military or commercial aircraft takes off or lands ever three minutes and operations are conducted twenty four hours a day and 365 days a year. Al Udeid's passenger terminal is like any other airport and routinely conducts search and screaming procedures of aircraft, passenger, and cargo.

Force Protection Conditions and Determining Asset Protection Levels

In addition to a normal operating military installation, this installation adheres to all Force Conditions Levels (FPCON'S) as well as integrates the Asset Protection Concept. These installation security programs must be executed with precision and all assets must be protected at all coasts. However, given that statement one must realize that not all assets are held with the same prestige. At deployed locations the Force Protection program is used in conjunction with Asset Protection Level procedures to provide the best protection possible for valued resources. Protection levels can change during periods of increased tension. For Example, FPCON Normal is the lowest protection level but, as unforeseen event increases security forces will amplify the FPCON LEVEL, FPCON DELTA being the highest. Virtually all contingencies cause security forces to increase readiness by implementing on of the four following FPCONS Levels;

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

How to Cite this Page

MLA Citation:
"Airport Security." 19 Jun 2018
Title Length Color Rating  
Transportation Security Administration: Airport Protection Essay - A major plane crash can change hundreds of lives. If the U.S. government was not monitoring airport security, not checking bags and or passengers, then it would have allowed many dangerous people to board an airplane. The 21st century is on high alert for passenger safety because if a terrorist boards a plane it can truly be a devastating situation. Airport security is important for the safety of passengers. Risks are associated with flying; in order to assure safety, passengers need to receive full body screening....   [tags: plane crash, airport security, tsa] 725 words
(2.1 pages)
Better Essays [preview]
Essay about Airport Security, Invasion of Privacy - In this argumentative essay it shows how airport security is not an invasion of privacy just necessary precautions. In the United States it is very clear that we don’t take terrorism lightly we have had many incidents that have had a very negative impact on the way we run things. Even if it seems that things have become stricter or maybe even seem like these procedures are an invasion of privacy, considering the circumstances it is very reasonable. People talk about airport security as if it always has something to do with body scanners or how it makes people feel....   [tags: Security, Protection, Terrorism, Ailine Company]
:: 6 Works Cited
1123 words
(3.2 pages)
Strong Essays [preview]
The Transportation Security Administration and Airport Security Essays - ... The only time the airport uses this type of x-ray is when a passenger is deemed suspicious or the first x-ray the passenger went through went off. If this happened a passenger would have the choice to get a pat down or get screened by the 2 Backscatter x-ray machine. The traditional x-ray machine the airport uses to check luggage is called the duel energy x-ray machine. This x-ray machine is less revealing and send out a single x-ray beam. This x-ray usually doesn't detect any organic materials such as skin, bananas and peanuts (Layton, 2007)....   [tags: homeland security, terrorist attacks]
:: 11 Works Cited
1579 words
(4.5 pages)
Term Papers [preview]
A Career as an Airport Security Coordinator Essay - In today’s volatile aviation environment the best way for a commercial airport to be secure is to have the responsibility shared between the airport operator, air carriers, tenants and the transportation security administration (TSA). After “9/11” the security scenario in airports has been drastically changed and detailed comprehensive strategy is required to deal with increasing terrorism and hijacking threats. Because of all the terrorist attacks and threat, the protection of our airport’s security has needed to become more of a team effort, whereas both organizations and individuals come together and work as a team....   [tags: aviation, air carriers]
:: 9 Works Cited
1207 words
(3.4 pages)
Strong Essays [preview]
Essay on Aviation Management: Airport Security - Aviation Management Research Paper Airport Security Introduction Airport Security is one of the most important aspects to an airport, especially since 9/11. These days everyone is worried about security; am I going to be safe flying, is something going to happen, so on and so on. There are a lot of aspects that go into the security of an airport. I will be going over the proper procedures to secure a general aviation airport. Security can be broken down into tiny segments so that nothing gets overlooked....   [tags: 9/11, surveillance, bags screen]
:: 1 Works Cited
1106 words
(3.2 pages)
Strong Essays [preview]
Airport Security Essay - After the devastating terrorist attacks on September 11, 2001, the United States has increased its efforts in protecting its airports. At that time, “the security scanners already in place in most airports included baggage x-rays, metal detectors, and chemical residue detectors, which help security staff search out illegal items that a passenger might have” (DiLascio). These security scanners unfortunately failed in their job. Since then, the Transportation Security Administration has been keeping American airports safe using the latest technology....   [tags: Law Enforcement]
:: 1 Works Cited
1787 words
(5.1 pages)
Powerful Essays [preview]
Airport Security Essay - Abstract This term paper is about Al Udeid Air Installation and Security Program. The information that will be covered in the document consists of; Introduction to Al Udeid Military Instillation, Force Protection Conditions and Determining Assets Protection Levels, Al Udeid Installation Security Concept and Regional Threats, Installation Security Forces and the Conclusion. After reading this term paper the reader will have a better understanding about military operating procedures and protecting military assets form terrorist incidents....   [tags: Terrorism Security Protection] 1727 words
(4.9 pages)
Strong Essays [preview]
Airport Security Essay - Airport Security On September 11, 2001, twenty Arab men boarded four different airplanes with the intent of attacking our country. They boarded the planes with the intent of causing tremendous damage to New York City and Washington, D.C. Two planes crashed into each tower of the World Trade Center, one plane crashed into the Pentagon, and the last plane crashed into a Pennsylvanian field. These twenty men cut short over 3000 lives. The innocent people that died had no need to have their lives taken in the way that they were....   [tags: Safety Airlines Terrorism Papers]
:: 8 Works Cited
2614 words
(7.5 pages)
Powerful Essays [preview]
Essay on Airport Security - PROBLEMS IN AIRPORT SECURITY The crash of TWA Flight 800 combined with increased terrorism in airports had led to more rigid security measures. Anyone who has flown recently has discovered that at most airports when you want to get your boarding pass, you must show a picture identification. This same procedure is followed when checking your baggage outside the terminal building. Considering the bombing of the World Towers, the Federal Building in Oklahoma City, and the bomb found in Atlanta Americans need to take security for all public places more seriously....   [tags: essays research papers fc]
:: 4 Works Cited
1687 words
(4.8 pages)
Strong Essays [preview]
Essay on airport security - New Airport Security Equipment and Techniques Flight by humans is an unnatural occurrence that our species has mastered, or at least somewhat mastered. Within the aviation industry there are inherent risks that come with operating and or flying aboard an aircraft. The predominant risk that we are talking about unfortunately is death. Because of these risks the Federal Government and their agencies must take steps to minimize this from happening. The government agency delegated to do this is the Federal Aviation Administration (FAA)....   [tags: essays research papers] 820 words
(2.3 pages)
Better Essays [preview]

• FPCON NORMAL describes a situation of no current terrorist activity. The only security forces needed are enough to stop the everyday criminal, most likely civilian police forces.
• FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable. However, agencies will inform personnel that there is a possible threat and standard security procedure review is conducted.
• FPCON BRAVO describes a situation with somewhat predictable terrorist threat. Security measures taken by agency personnel may affect the activities of local law enforcement and the general public.
• FPCON CHARLIE describes a situation when an instance occurs or when intelligence reports that there is terrorist activity imminent. Increased security by agencies are likely to cause problems for civilian law enforcement and the public, as people looking for access to agency facilities may be denied.
• FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred. When applied for long periods of time, FPCON DELTA can cause hardships for civilian police and the public, as heightened agency security can impede their everyday duties. FPCON DELTA usually occurs only in the areas that are most vulnerable to or have been attacked.

Each base must use the FPCON actions designed to cope with events anticipated at that installation. For instance, a State Side or (CONUS) installation would not normally be required to develop an Asset Protection appendix for hostile air or major ground attack. However an over-seas or (OCONOS) base where the threat posed in a Host Nation is greater, that base must evaluate and implement Asset Protection Levels. Determining Asset protection levels provide the basis for programming security manpower and equipment. All military assets are designated with one of the four assigned protection levels. For example, certain systems, such as nuclear weapons and presidential support aircraft is always Protection Level 1(PL1) at the direction of authorities above the Air Force, conversely, the less important the resource the lower designation. Protection levels can change during periods of increased tension. For Example, as systems reach a heightened state of readiness like non-alert aircraft being placed on alert, their relative political and military importance increases and they may assume a higher protection level.

Protection Level 1 Resources
• Assign PL1 to military installation resources for which the loss, theft, destruction, misuse of compromise would result in grate harm to the strategic capability of the United States. PL1 resources consist of Nuclear Weapons, Weapon Delivery Systems, Communications, Arial Space Aircraft, or systems that insure the ability to successfully execute contingency plans. This level of security must result in the greatest possible deterrence against hostile acts. Failing deterrence, security measures will provide maximum means to achieve detection, interception, and defeat of a hostile force before it is able to seize, damage, or destroy resources.

Protection Level 2 Resources
• Assign PL2 to military installation resources for which the loss, theft, destruction, misuse of compromise would result in significant harm to the strategic capability of the United States. PL2 resources consist of Non-Nuclear Weapons, Expensive, few in numbers, or one of a kind systems, vital computer facilities and equipment, and Intelligence-gathering systems critical to military operational capabilities. This level of security must result in significant deterrence against hostile acts. Failing deterrence, this level of security will ensure a significant probability of detecting, intercepting, and defeating a hostile force before it is able to seize damage or destroy resources.

Protection Level 3 Resources
• Assign PL3 to military installation rescores for which the loss, theft, destruction, misuse, or compromise would damage US war-fighting capability. PL3 resources consist of weapons systems not on alert but that can be readied for alert status, non-launch-critical or non-unique space launch systems and equipment and intelligence-gathering systems not critical to military operational capabilities.

Protection Level 4 Resources
• Assign PL4 to military installation rescores which do not meet the definitions of PL1, 2, or 3 resources as discussed in the preceding paragraph, but for which the loss, theft, destruction, misuse, or compromise would adversely affect the operational capability of this military installation. PL4 resources are contained in controlled areas with owner/user being primarily responsible for security. PL4 resources consist of Warehouses storing aircraft or weapons systems spare parts, Fuels, liquid and gaseous oxygen, pharmacies and pharmaceutical supplies.

Al Udeid Installation Security Concept and Regional Threats

The Installation Security Program (ISP) is designed to deter enemy and criminal elements from conducting hostile operations, destruction of military assets, and conducting espionage against US Military and Coalition Forces. The ISP is an integrated process that implements security operations that present hostile persons or groups with unacceptable risks and penalties if they attempt to breach the security system. While it is theoretically impossible to devise an infallible security system, this installations security system is capable of sustaining a large attack both from air and ground. In addition to a typical airport security program this installation is faced with all the same threat however; the threat is compounded by Terries Groups, Political Activist, criminals, and Intelligence Agents. To better understand each inherent threat they are defined below;
• Terrorist Groups are trained individuals in a paramilitary force that commit violent acts for political gain. Such groups use destruction and fear to impose their laws and religious beliefs onto others.

• Political Activist and Demonstrators are usually individuals seeking publicity for their activities which could include penetration of restricted areas, malicious destruction or sabotage to achieve their goal.

• Criminals are usually persons whose goal is profit and use selective lethal or non-lethal violence in the execution of their operation.

• Intelligence Agents are usually military or foreign government personnel involved in surveillance and intelligence gathering missions. Intelligence agents normally avoid violence or any other act that may compromise their identity or mission.

The Installation Security Program is designed not only to combat Terrorist groups but, any threat that may target AL Udeid Air Installation or nearby communities. This could include the preplanned, indiscriminate use of chemical, biological, radiological, nuclear, or high-yield explosive (CBRNE) weapons to create casualties, inflict damage or destruction, create chaos (threatening calls/letters), or otherwise disrupt mission operations. CBRNE could be used directly against the installation or against civil, government, economic, population, or social centers that could impact military operations.

Installation Security Forces

Installation Security Forces consist primarily of US Air Force active duty, Air Reserve, and Air National Guard security forces personnel and when needed, Augmentees. Augmentees are personnel identified and considered by their command as highly responsible and completely reliable for security duty. Security Forces must detect unusual occurrences, delay and deny the entry of unauthorized individuals to resources, initiate an immediate alarm, provide appropriate armed response, discriminate between hostile acts and other occurrences, and initiate proper Force Protection Conditions (FPCON's) and contingency actions when required.
Installation Security Forces have unique security duties that include; Security badge issue, visitor-control, guarding/enforcing flight line entry-control point's (ECP), protecting Air and Space resources, and to combating local threats. Installation Security Force has the authority to publish and enforce regulations for safeguarding personnel, facilities, and property. Security Force personal is required to detain, and identify violator attempting to gain access, breach security or sabotage any military asset. During Day to Day Operations Security forces provide installation security by forming concentric rings or sectors of security at each installation. The more important the protected resource and the closer to it one gets, the smaller the circle and grater the security. On the other hand, the less important the resource and the farther away from it one gets, the larger the circle and the fewer the security forces.


The security of Al Udeid Military Installation rests in the hands of Security Forces, Passenger Terminal workers, and all that are assigned to this deployed location. Without, the help of theses exceptionally trained individuals this Installations Security Program would certainly be a soft target for terrorist activities. Unquestionably, this installation is a pillar in the War on Terror and without its sound security pro

Return to