Essay PreviewMore ↓
This term paper is about Al Udeid Air Installation and Security Program. The information that will be covered in the document consists of; Introduction to Al Udeid Military Instillation, Force Protection Conditions and Determining Assets Protection Levels, Al Udeid Installation Security Concept and Regional Threats, Installation Security Forces and the Conclusion. After reading this term paper the reader will have a better understanding about military operating procedures and protecting military assets form terrorist incidents.
Introduction to Al Udeid Military Instillation
Al Udeid Air Base is a Military Installation located in the country of Qatar, and is considered geographically the heart of the Middle East. Al Udeid's mission is to provide Air and ground support for the War on Terrorism, as well as insuring global reach for US and Coalition Forces. Al Udeid is a diverse installation consisting of all branches of the US Military, British, Australian, Korean Forces, and Civilian Elements. Even with vast military diversity this installation is first and foremost an airport and is one of the largest in the region. The runway and surrounding tarmacs are adequate enough to support the largest aircraft both military and civilian. Although, the assortment and numbers are classified this installation has an adage "if it burns jet fuel, kicks ass, or moves troops. It's here!" It is estimated that either a military or commercial aircraft takes off or lands ever three minutes and operations are conducted twenty four hours a day and 365 days a year. Al Udeid's passenger terminal is like any other airport and routinely conducts search and screaming procedures of aircraft, passenger, and cargo.
Force Protection Conditions and Determining Asset Protection Levels
In addition to a normal operating military installation, this installation adheres to all Force Conditions Levels (FPCON'S) as well as integrates the Asset Protection Concept. These installation security programs must be executed with precision and all assets must be protected at all coasts. However, given that statement one must realize that not all assets are held with the same prestige. At deployed locations the Force Protection program is used in conjunction with Asset Protection Level procedures to provide the best protection possible for valued resources. Protection levels can change during periods of increased tension. For Example, FPCON Normal is the lowest protection level but, as unforeseen event increases security forces will amplify the FPCON LEVEL, FPCON DELTA being the highest. Virtually all contingencies cause security forces to increase readiness by implementing on of the four following FPCONS Levels;
How to Cite this Page
"Airport Security." 123HelpMe.com. 23 Sep 2019
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Canada’s Airport Security Marvin Mati Jake Davis PSI 203 0LA October 15, 2015 Word count: 937 Research Proposal on Canada’s Airport Security Throughout the history of aviation, criminals and terrorists have used airports and aircraft to orchestrate various forms of unlawful activities. Examples as such, criminals using general or commercial aviation to smuggle goods and drugs, or terrorists and special interest groups using aviation to garner geopolitical attention. In the mentioned cases, aviation has provided a platform for expedient distribution channels for drug peddlers, criminals, and a public stage for terrorists and special interest groups.... [tags: Security, Terrorism, Airport security]
949 words (2.7 pages)
- On the morning of 22 March 2016, three coordinated nail bombings occurred in Belgium: two at Brussels Airport in Zaventem, and one at Maalbeek metro station in Brussels. In these attacks, 32 victims and three suicide bombers were killed, and over 300 people were injured. Another bomb was found during a search of the airport. Islamic State of Iraq and the Levant (ISIL) claimed responsibility for the attacks. 1. "Another bomb found in Brussels after attacks kill at least 34; Islamic State claims responsibility".... [tags: airport security is utterly useless]
2916 words (8.3 pages)
- Security forces play a vital role in the normal operation of any airport, whether they are screening travelers at the checkpoints or scanning luggage that the travelers bring with them. The importance of these particular tasks helps enhance the safety of all travelers flying to their destinations and the employees working within the airport. With that being said, there is an on-going proposal for the Kansas City International Airport, otherwise known as KCI, which could potentially create drastic changes to its configuration, if it were to get approved.... [tags: Airport security]
1000 words (2.9 pages)
- A major plane crash can change hundreds of lives. If the U.S. government was not monitoring airport security, not checking bags and or passengers, then it would have allowed many dangerous people to board an airplane. The 21st century is on high alert for passenger safety because if a terrorist boards a plane it can truly be a devastating situation. Airport security is important for the safety of passengers. Risks are associated with flying; in order to assure safety, passengers need to receive full body screening.... [tags: plane crash, airport security, tsa]
725 words (2.1 pages)
- Airport security is a big issue today because many people talk down on it when story after story, it is made to protect the people. Kip Hawley acknowledges that airport security has become so bureaucratic and disconnected from the people for which it is meant to protect for over a decade after 9/11 (Hawley). So why isn’t TSA taking the public’s opinions into consideration. TSA hears over thousands of complaints on a daily about their “stupid security checkpoints” or their “lazy employees”. The thing is, if airports were to improve their security staff, then less people would attempt to bring dangerous items onto the plane.... [tags: Security guard, Security, Surveillance]
1303 words (3.7 pages)
- After the devastating terrorist attacks on September 11, 2001, the United States has increased its efforts in protecting its airports. At that time, “the security scanners already in place in most airports included baggage x-rays, metal detectors, and chemical residue detectors, which help security staff search out illegal items that a passenger might have” (DiLascio). These security scanners unfortunately failed in their job. Since then, the Transportation Security Administration has been keeping American airports safe using the latest technology.... [tags: Law Enforcement]
1787 words (5.1 pages)
- Abstract This term paper is about Al Udeid Air Installation and Security Program. The information that will be covered in the document consists of; Introduction to Al Udeid Military Instillation, Force Protection Conditions and Determining Assets Protection Levels, Al Udeid Installation Security Concept and Regional Threats, Installation Security Forces and the Conclusion. After reading this term paper the reader will have a better understanding about military operating procedures and protecting military assets form terrorist incidents.... [tags: Terrorism Security Protection]
1727 words (4.9 pages)
- Airport Security On September 11, 2001, twenty Arab men boarded four different airplanes with the intent of attacking our country. They boarded the planes with the intent of causing tremendous damage to New York City and Washington, D.C. Two planes crashed into each tower of the World Trade Center, one plane crashed into the Pentagon, and the last plane crashed into a Pennsylvanian field. These twenty men cut short over 3000 lives. The innocent people that died had no need to have their lives taken in the way that they were.... [tags: Safety Airlines Terrorism Papers]
2614 words (7.5 pages)
- PROBLEMS IN AIRPORT SECURITY The crash of TWA Flight 800 combined with increased terrorism in airports had led to more rigid security measures. Anyone who has flown recently has discovered that at most airports when you want to get your boarding pass, you must show a picture identification. This same procedure is followed when checking your baggage outside the terminal building. Considering the bombing of the World Towers, the Federal Building in Oklahoma City, and the bomb found in Atlanta Americans need to take security for all public places more seriously.... [tags: essays research papers fc]
1687 words (4.8 pages)
- New Airport Security Equipment and Techniques Flight by humans is an unnatural occurrence that our species has mastered, or at least somewhat mastered. Within the aviation industry there are inherent risks that come with operating and or flying aboard an aircraft. The predominant risk that we are talking about unfortunately is death. Because of these risks the Federal Government and their agencies must take steps to minimize this from happening. The government agency delegated to do this is the Federal Aviation Administration (FAA).... [tags: essays research papers]
820 words (2.3 pages)
FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable. However, agencies will inform personnel that there is a possible threat and standard security procedure review is conducted.
FPCON BRAVO describes a situation with somewhat predictable terrorist threat. Security measures taken by agency personnel may affect the activities of local law enforcement and the general public.
FPCON CHARLIE describes a situation when an instance occurs or when intelligence reports that there is terrorist activity imminent. Increased security by agencies are likely to cause problems for civilian law enforcement and the public, as people looking for access to agency facilities may be denied.
FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred. When applied for long periods of time, FPCON DELTA can cause hardships for civilian police and the public, as heightened agency security can impede their everyday duties. FPCON DELTA usually occurs only in the areas that are most vulnerable to or have been attacked.
Each base must use the FPCON actions designed to cope with events anticipated at that installation. For instance, a State Side or (CONUS) installation would not normally be required to develop an Asset Protection appendix for hostile air or major ground attack. However an over-seas or (OCONOS) base where the threat posed in a Host Nation is greater, that base must evaluate and implement Asset Protection Levels. Determining Asset protection levels provide the basis for programming security manpower and equipment. All military assets are designated with one of the four assigned protection levels. For example, certain systems, such as nuclear weapons and presidential support aircraft is always Protection Level 1(PL1) at the direction of authorities above the Air Force, conversely, the less important the resource the lower designation. Protection levels can change during periods of increased tension. For Example, as systems reach a heightened state of readiness like non-alert aircraft being placed on alert, their relative political and military importance increases and they may assume a higher protection level.
Protection Level 1 Resources
Assign PL1 to military installation resources for which the loss, theft, destruction, misuse of compromise would result in grate harm to the strategic capability of the United States. PL1 resources consist of Nuclear Weapons, Weapon Delivery Systems, Communications, Arial Space Aircraft, or systems that insure the ability to successfully execute contingency plans. This level of security must result in the greatest possible deterrence against hostile acts. Failing deterrence, security measures will provide maximum means to achieve detection, interception, and defeat of a hostile force before it is able to seize, damage, or destroy resources.
Protection Level 2 Resources
Assign PL2 to military installation resources for which the loss, theft, destruction, misuse of compromise would result in significant harm to the strategic capability of the United States. PL2 resources consist of Non-Nuclear Weapons, Expensive, few in numbers, or one of a kind systems, vital computer facilities and equipment, and Intelligence-gathering systems critical to military operational capabilities. This level of security must result in significant deterrence against hostile acts. Failing deterrence, this level of security will ensure a significant probability of detecting, intercepting, and defeating a hostile force before it is able to seize damage or destroy resources.
Protection Level 3 Resources
Assign PL3 to military installation rescores for which the loss, theft, destruction, misuse, or compromise would damage US war-fighting capability. PL3 resources consist of weapons systems not on alert but that can be readied for alert status, non-launch-critical or non-unique space launch systems and equipment and intelligence-gathering systems not critical to military operational capabilities.
Protection Level 4 Resources
Assign PL4 to military installation rescores which do not meet the definitions of PL1, 2, or 3 resources as discussed in the preceding paragraph, but for which the loss, theft, destruction, misuse, or compromise would adversely affect the operational capability of this military installation. PL4 resources are contained in controlled areas with owner/user being primarily responsible for security. PL4 resources consist of Warehouses storing aircraft or weapons systems spare parts, Fuels, liquid and gaseous oxygen, pharmacies and pharmaceutical supplies.
Al Udeid Installation Security Concept and Regional Threats
The Installation Security Program (ISP) is designed to deter enemy and criminal elements from conducting hostile operations, destruction of military assets, and conducting espionage against US Military and Coalition Forces. The ISP is an integrated process that implements security operations that present hostile persons or groups with unacceptable risks and penalties if they attempt to breach the security system. While it is theoretically impossible to devise an infallible security system, this installations security system is capable of sustaining a large attack both from air and ground. In addition to a typical airport security program this installation is faced with all the same threat however; the threat is compounded by Terries Groups, Political Activist, criminals, and Intelligence Agents. To better understand each inherent threat they are defined below;
Terrorist Groups are trained individuals in a paramilitary force that commit violent acts for political gain. Such groups use destruction and fear to impose their laws and religious beliefs onto others.
Political Activist and Demonstrators are usually individuals seeking publicity for their activities which could include penetration of restricted areas, malicious destruction or sabotage to achieve their goal.
Criminals are usually persons whose goal is profit and use selective lethal or non-lethal violence in the execution of their operation.
Intelligence Agents are usually military or foreign government personnel involved in surveillance and intelligence gathering missions. Intelligence agents normally avoid violence or any other act that may compromise their identity or mission.
The Installation Security Program is designed not only to combat Terrorist groups but, any threat that may target AL Udeid Air Installation or nearby communities. This could include the preplanned, indiscriminate use of chemical, biological, radiological, nuclear, or high-yield explosive (CBRNE) weapons to create casualties, inflict damage or destruction, create chaos (threatening calls/letters), or otherwise disrupt mission operations. CBRNE could be used directly against the installation or against civil, government, economic, population, or social centers that could impact military operations.
Installation Security Forces
Installation Security Forces consist primarily of US Air Force active duty, Air Reserve, and Air National Guard security forces personnel and when needed, Augmentees. Augmentees are personnel identified and considered by their command as highly responsible and completely reliable for security duty. Security Forces must detect unusual occurrences, delay and deny the entry of unauthorized individuals to resources, initiate an immediate alarm, provide appropriate armed response, discriminate between hostile acts and other occurrences, and initiate proper Force Protection Conditions (FPCON's) and contingency actions when required.
Installation Security Forces have unique security duties that include; Security badge issue, visitor-control, guarding/enforcing flight line entry-control point's (ECP), protecting Air and Space resources, and to combating local threats. Installation Security Force has the authority to publish and enforce regulations for safeguarding personnel, facilities, and property. Security Force personal is required to detain, and identify violator attempting to gain access, breach security or sabotage any military asset. During Day to Day Operations Security forces provide installation security by forming concentric rings or sectors of security at each installation. The more important the protected resource and the closer to it one gets, the smaller the circle and grater the security. On the other hand, the less important the resource and the farther away from it one gets, the larger the circle and the fewer the security forces.
The security of Al Udeid Military Installation rests in the hands of Security Forces, Passenger Terminal workers, and all that are assigned to this deployed location. Without, the help of theses exceptionally trained individuals this Installations Security Program would certainly be a soft target for terrorist activities. Unquestionably, this installation is a pillar in the War on Terror and without its sound security pro