Skip to main content

2017 | OriginalPaper | Buchkapitel

6. Aviation Security Technologies

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter will start with an overview of types of aviation security measures as well as their locations – airport, aircraft and beyond. This will allow us to pinpoint the selected security measures more precisely and to provide a broader picture of aviation security measures in general.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Salter (2008) p. 246.
 
2
St. John. The Politics of Aviation Security In: Aviation terrorism and security (1999) p. 46.
 
3
Salter (2008) p. 246.
 
4
Schneier (2008) p. 69.
 
5
Amicelli (2012a) p. 3.
 
6
Chapter 4.
 
7
Chapter 5.
 
8
May include diplomats, persons exempted from screening, persons in custody and under administrative control, airline crew, airport staff and other non-passenger, monitoring performance of security equipment, carriage of weapons, travel of armed personnel, etc.
 
9
E.g. Annex 17; Annex to Regulation (EC) No 300/2008.
 
10
Salter (2008) p. 256.
 
11
E.g. the US TSA’s “20 Layers of Security”. http://​www.​tsa.​gov/​about-tsa/​layers-security (date accessed: 27 Feb 2013).
 
13
See more in Barry and Mazel. Airport Perimeter Security: Where we’ve been, Where we are, and Where we’re going (2008) p. 990.
 
14
A wireless barrier beams which provide a warning of intrusion.
 
15
Regulation (EC) No 300/2008 Article 3. Cf. Annex 17: Airside – “the movement area of an airport, adjacent terrain and buildings or portions thereof, access to which is controlled”, page 1–1.
 
16
Annex to Commission Regulation (EC) No 272/2009 of 2 April 2009 supplementing the common basic standards on civil aviation security laid down in the Annex to Regulation (EC) No 300/2008 of the European Parliament and of the Council, as amended by Commission Regulation (EU) No 1141/2011 of 10 November 2011 amending Regulation (EC) No 272/2009 supplementing the common basic standards on civil aviation security as regards the use of security scanners at EU airports.
 
17
Art. 10 of Order of the Ministry of Transport of 25 July 2007 N 104 On approval of rules for pre- and post-flight inspections.
 
18
§3 of Annex to Regulation (EC) No 300/2008.
 
19
E.g. Federal Air Marshal Service, including Law Enforcement Officers on some flights in the USA.
 
20
E.g. Germanwings flight 9525 of 24 March 2015. Baum (2015a).
 
21
Schneier (2008) p. 69.
 
22
Neeman (2013) p. 13.
 
23
Ibid.
 
24
Ibid.
 
25
Tirosh and Birnhack (2013) p. 1274.
 
26
For example, Post-gazette.​com in March 2002 informed that new X-ray scanners were tested in the government technical center in New Jersey and were tested on volunteers at several airports.
 
27
Federal press, 16 Sep 2011. http://​fedpress.​ru/​federal/​econom/​train/​id_​250058.​html (date accessed: 3 February 2012).
 
28
Backscatter (low X-ray) technology is based on the X-ray Compton scattering effect. It detects the radiation reflected from the object to form a two-dimensional image, revealing details of the surface of the body and a high resolution image of any external objects. Passengers must stand between two large boxes and raise their arms above their head.
 
29
UK Department for Transport Guidance. Security scanners implementation information (2015b).
 
30
Daily Mail Reporter. Airport body scanners are ‘just as likely to kill you as terrorist bombs’. 19 November 2010. http://​www.​dailymail.​co.​uk/​travel/​article-1331185/​Airport-body-scanners-just-likely-kill-terrorist-bombs.​html
 
31
Grabell. U.S. Government Glossed Over Cancer Concerns As It Rolled Out Airport X-Ray, ProPublica, 1 November 2011. http://​www.​propublica.​org/​article/​u.​s.​-government-glossed-over-cancer-concerns-as-it-rolled-out-airport-x-ray
 
32
Mick. Despite Allegations of Fraud, TSA Lets Scanner Maker Keep Nearly $300M, Dailytech, 18 January 2013. http://​www.​dailytech.​com/​Despite+Allegati​ons+of+Fraud+TSA​+Lets+Scanner+Ma​ker+Keep+Nearly+​300M/​article29691.​htm
 
33
Neeman (2015) p. 26.
 
34
Huey. When Politics Meets the Hard Realities: Cold Fact, Speculation and Surrealism at the Checkpoint, 19 September 2012, http://​www.​noquarterusa.​net/​blog/​72258/​when-politics-meets-the-hard-realities-cold-fact-speculation-and-surrealism-at-the-checkpoint/​
 
35
TSA. Advanced Imaging Technology. http://​www.​tsa.​gov/​traveler-information/​advanced-imaging-technology (date accessed: 31 Jan 2015).
 
36
The UK Secretary of State. Direction to certain aerodrome managers under the Aviation Security Act 1982 relating to security scanners 2015. https://​www.​gov.​uk/​government/​uploads/​system/​uploads/​attachment_​data/​file/​397617/​Consolidated_​Scanners_​Direction_​Redacted.​pdf
 
37
There are several “lists of airports with body scanners” available on the web, but none of them can be considered as full and up to date, as the situation changes constantly. An example of such lists can be found at http://​www.​flyertalk.​com/​forum/​practical-travel-safety-issues/​1138014-complete-list-airports-whole-body-imaging-advanced-imaging-technology-scanner.​html
 
38
Interview with Avinor representative, 22 Oct 2015.
 
39
Mironenko. Body scanners versus privacy and data protection. In: Computer Law & Security Review. Vol. 27 (2011).
 
40
National Coordinator for Counterterrorism (Netherlands). Frequently Asked Questions Security Scan. How long has this technology existed? https://​english.​nctv.​nl/​themes_​en/​themes-a-z/​Security_​and_​civil_​aviation/​Security_​Scan/​faq-14.​aspx
 
41
Passive millimetre makes an image from natural radiation from the body, with a rough body image and a clearer image of external objects.
 
42
Health issues will be discussed below.
 
43
Neeman (2015) p. 24.
 
44
ECAC. Security Scanners. Update 18.09.2015. https://​www.​ecac-ceac.​org/​cep
 
45
Response to the author from Moscow Domodedovo airport dated 7 Feb 2012, confirmed again on 12 Mar 2015.
 
46
UK Department for Transport (2015a).
 
47
TSA. Advanced Imaging Technology. How it works. http://​www.​tsa.​gov/​ait-how-it-works (date accessed: 31 Jan 2015).
 
49
E.g. the storage of images may have importance for analysis of various data protection principles such as purpose limitation and minimality.
 
50
This classification is used in ECAC’s Security Scanners. Update 18 Sep 2015. https://​www.​ecac-ceac.​org/​cep
 
51
Data on actual sensitivity is graded confidential and is unavailable to the public. Interview with Avinor representative, 22 Oct 2015.
 
52
Summary of 1st Body Scanner Task Force meeting, 12 December 2008. Annex IV to European Commission. Impact Assessment on the possible use of security scanners at EU airports of 23 March 2011.
 
53
Barden. Airport body scanners… all your questions answered. 20 May 2015. http://​www.​aph.​com/​community/​holidays/​airport-body-scanners-all-your-questions-answered/​
 
54
Conversations of the author with employees of Adani and Avinor in the period 2010–2015.
 
55
Department of Homeland Security (2015) p 2.
 
56
UK Department for Transport (2015a).
 
57
Tirosh and Birnhack (2013) p. 1274.
 
58
Summary of 1st Body Scanner Task Force meeting, 12 December 2008. Annex IV to European Commission. Impact Assessment on the possible use of security scanners at EU airports of 23 March 2011.
 
59
Interview with L-3 representatives in September 2010.
 
60
Written correspondence with Borlas representative in January 2012.
 
61
UK Department for Transport (2013)
 
62
Reznichenko. Inspection equipment – weapons of anti-terror (2006) http://​www.​cnews.​ru/​reviews/​free/​transport2006/​articles/​antiterror/​
 
63
European Commission (2011), §136.
 
64
Department of Homeland Security (2011).
 
65
Procurement specification for whole body imager devices for checkpoint operations, U.S. Department of Homeland Security, TSA. Final, Version 1.02, 23 Sep 2008.
 
66
EPIC, Suspension of Body Scanner Program, http://​epic.​org/​privacy/​body_​scanners/​episc_​v_​dhs_​suspension_​of_​body.​html (Aug. 22, 2014) (date accessed: 2 Feb 2015).
 
68
Elias (2012) p. 9.
 
70
European Commission (2011), §135.
 
72
For more about corruption at the check points, see Jones. Checkpoint security: gateways, airports and the architecture of security In: Technologies of Insecurity (2008) p. 97.
 
74
For more details, see Koffler. The latest Al-Qaeda threat: Body bomb. In: Aviation Security International. Vol. 17 (2011); Bunker. Body cavity bombs: Fantasy or reality? In: Aviation Security International. Vol. 20 (2014).
 
75
McNeal. Security Scanners in Comparative Perspective. In: Health Matrix. Vol. 22 (2012) p. 475.
 
76
Stinchfield. TSA Source: Armed Agent Slips Past DFW Body Scanner, NBC, 18 February 2011, http://​www.​nbcdfw.​com/​news/​local/​TSA-Agent-Slips-Through-DFW-Body-Scanner-With-a-Gun-116497568.​html
 
77
Summary of the 2nd Task Force Meeting on Security Scanners, 14 September 2010. Annex IV to European Commission. Impact Assessment on the possible use of security scanners at EU airports of 23 March 2011.
 
78
Association of Independent Aviation Security Professionals. Vulnerability of Automated Millimeter Wave Imaging Technology: An Unintended Consequence of “One Size Fits All” Checkpoint Screening (2011).
 
79
Neeman (2013) p. 14.
 
80
Summary of 1st Body Scanner Task Force meeting, 12 December 2008. Annex IV to European Commission. Impact Assessment on the possible use of security scanners at EU airports of 23 March 2011.
 
81
Grynpas. Advanced Imaging technology: privacy and health concerns. In: Aviation Security International. Vol. 18 (2012) p. 39.
 
82
Richardson. TSA plan to replace humans with software at airport scanners generates criticism, Secuirty Director News, August 2011 (2011b), http://​www.​securitydirector​news.​com/​?​p=​article&​id=​sd201107R4VP0J; Huey “Live Free or Die”: The Unintended Consequences of “One Size Fits All” Aviation Security Screening, 5 March 2011 (2011a), http://​www.​noquarterusa.​net/​blog/​57130/​“live-free-or-die”-the-unintended-consequences-of-“one-size-fits-all”-aviation-security-screening/​
 
83
Cochrane (2012) p. 41.
 
84
Huey (2011a) and Association of Independent Aviation Security Professionals (2011).
 
85
Association of Independent Aviation Security Professionals (2011).
 
86
Ibid.
 
87
The analysis considered threat probability, risk reduction, losses, and security costs. Stewart and Mueller. Cost-benefit analysis of advanced imaging technology full body scanners for airline passenger security screening. In: Journal of homeland security and emergency management. Vol. 8 (2011) p. 15.
 
88
Commission Implementing Regulation (EU) No 1147/2011 of 11 November 2011 amending Regulation (EU) No 185/2010 implementing the common basic standards on civil aviation security as regards the use of security scanners at EU airports.
 
89
Tirosh and Birnhack (2013) p. 1283.
 
90
Eze Now Showing at MMIA: Nude Images of Passengers. (2010).
 
91
Zetter. Female Passengers Say They Were Targeted for TSA Body Scanners. Wired, 4 February 2012, http://​www.​wired.​com/​2012/​02/​female-body-scans/​.
 
92
Established by the European Parliament and European Council. Regulation (EC) 45/2001 of 18 Dec 2000 on the protection of individuals with regard to the processing of personal data by the institutions and bodies of the Community and on the free movement of such data. EDPS is an independent supervisory authority that regulates the processing of data.
 
93
EDPS letter to Commission Vice-president Sim Kallas of 1 July 2010.
 
94
EDPS comments on the draft proposals for a Commission Regulation amending Regulation (EC) No 272/2009 and for a Commission implementing Regulation amending Regulation (EC) No 185/2010 on common basic standards on civil aviation security as regards the use of security scanners at EU airports.
 
96
Tirosh and Birnhack (2013) p. 1283.
 
97
FRA. The use of body scanners: 10 questions and answers (2010b).
 
98
Tirosh and Birnhack (2013) p. 1289.
 
99
Ibid. p. 1267.
 
100
See McFeeley v. the UK, No. 8317/78, 15 May 1980.
 
101
Finn et al. (2013) p. 12.
 
102
Tirosh and Birnhack (2013) p. 1268.
 
103
Ibid.
 
104
Ibid. p. 1299.
 
105
Australian Department of Infrustructure and Transport. The use of body scanners for aviation security screening in Australia: Privacy Impact Assessment, 2012. Page 24.
 
106
Queally. Transgender Woman Says TSA Detained, Humiliated Her Over Body ‘Anomaly.’ Los Angeles Times, 22 Sept 2015, http://​www.​latimes.​com/​nation/​nationnow/​la-na-nn-tsa-transgender-20150921-story.​html
 
107
Mountfield. Advice in the matter of the human rights and equality implications of the introduction of full body scanners at airports. In: Matrix Chambers. Vol. 8 (2010). p. 6 and European Commission (2011), §§133–134.
 
108
Tirosh and Birnhack (2013) p. 1300.
 
109
Taylor. Bending Broken Rules: The Fourth Amendment Implications of Full-Body Scanners in Preflight Screening. In: Richmond Journal of Law and Technology. Vol. 17 (2010) p. 15.
 
110
Elias (2012) p. 8 citing International Commission on Non-Ionizing Radiation Protection, ICNIRP Statement—Health Issues Associated With Millimeter Wave Whole Body Imaging Technology, Health Physics, 102(1), pp. 81–82, January 2012.
 
111
UK Department for Transport (2015a) and L3, SafeView Fact Sheet. http://​www.​sds.​l-3com.​com/​advancedimaging/​safeview.​htm
 
113
Ibid.
 
114
Neeman (2015) p. 25.
 
115
Ibid. p. 26.
 
116
Ibid.
 
117
Aviaport Digest. 15 Russian airports will accommodate scanners to curb drug trafficking. 13 November 2014, http://​www.​aviaport.​ru/​digest/​2014/​11/​13/​314589.​html
 
119
Koffler (2011) p. 46.
 
120
Neeman. Effectively screening people: Pat down searchers, wands, archways and portals. In: Aviation Security International. Vol. 19 (2013) p. 15.
 
122
Neeman (2015) p. 26.
 
123
Baum. Searching bodies: the civil liberties dilemma. In: Aviation Security International. Vol. 21 (2015c) p. 1.
 
124
Neeman (2015) p. 24.
 
125
Neeman (2013) p. 15.
 
126
Wagenaar. Zooming in on ‘heterotopia’: CCTV-operator practices at Schiphol Airport. In: Information Polity. Vol. 17 (2012). p. 9.
 
127
The SecurityLion. New Surveillance Code of Practice “will not slow UK CCTV market growth”. 21 August 2013, https://​thesecuritylion.​wordpress.​com/​2013/​08/​21/​new-surveillance-code-of-practice-will-not-slow-uk-cctv-market-growth/​
 
129
Courtney. The great Olympics zoom boom [CCTV services]. In: Engineering & Technology. Vol. 7 (2012). p. 60.
 
130
NRK. Overvåkingen av Oslo øker, men kriminaliteten går ikke ned. 12 November 2011, http://​www.​nrk.​no/​ostlandssendinge​n/​_​-overvakning-gir-ikke-resultater-1.​7869062
 
131
RiaNovosti. 70% of crimes in Moscow are disclosed using CCTV systems. 24 March 2015, http://​ria.​ru/​moscow/​20150324/​1054179260.​html
 
132
Houlis (2010).
 
134
Medwecki. CCTV: ensuring effective surveillance at airports. In: Aviation Security International. Vol. 19 (2013) p. 34.
 
135
E.g. EPIC. EPIC Framework for Protecting Privacy & Civil Liberties If CCTV Systems Are Contemplated (2008) and ACLU. What’s Wrong With Public Video Surveillance? 2002, https://​www.​aclu.​org/​technology-and-liberty/​whats-wrong-public-video-surveillance
 
136
Gilbert (2007) p. 34.
 
137
Puzanov. Video camera in the law? In: EZH-Jurist. Vol. 8 (2012). p. 10.
 
138
RiaNovosti (2015).
 
139
Privacy International (2011) p. 822.
 
140
Welsh and Farringtom. Crime prevention effects of closed circuit television: a systematic review. Home Office Research Study 252, August 2002, http://​www.​popcenter.​org/​Responses/​video_​surveillance/​PDFs/​Welsh%26Farrington_​2002.​pdf; Armitage. To CCTV or not to CCTV. In: A review of current research into the effectiveness of CCTV systems in reducing crime. Londen: Nacro (2002).; EPIC (2008); Larsen. Setting the watch: privacy and the ethics of CCTV surveillance, Hart Publishing (2011).
 
141
See any web-site of any CCTV provider.
 
142
Article 29 Data Protection Working Party (2004).
 
143
See e.g. ACLU (2002), Larsen (2011), Ratcliffe Video surveillance of public places (2006) p. 21.
 
144
Agustina. The impact of CCTV on fundamental rights and crime prevention strategies: The case of the Catalan Control Commission of Video surveillance Devices. In: Computer Law & Security Review. Vol. 27 (2011). p. 169.
 
145
Elliott. Smile! The TSA is taping you — and here’s what you need to know about it. 21 October 2009, http://​elliott.​org/​blog/​smile-the-tsa-is-taping-you-and-heres-what-you-need-to-know-about-it/​
 
146
Richardson. Minneapolis airport to spend $20m on new surveillance system, Secuirty Director News, May 2012, http://​www.​securitydirector​news.​com/​public-sector/​minneapolis-airport-spend-20m-new-surveillance-system
 
147
Blank. Surveillance Cameras Set To Keep Watch In Airliners. New York Times, 6 April 2002, http://​www.​nytimes.​com/​2002/​04/​06/​business/​surveillance-cameras-set-to-keep-watch-in-airliners.​html
 
149
Carli (2008) p. 4.
 
150
Closed system allows watching retrospectively, while open system refers to images on the camera as viewed in real time.
 
151
See Price (2013) p. 213 and Medwecki (2013) p. 35.
 
152
Cardiff Airport. CCTV Code of Practice (2013).
 
153
Transportation Security Administration (2011) p. 120.
 
154
Houlis (2010).
 
156
Home Office (2013).
 
158
Price (2013) p. 214.
 
159
Batt. The use of video surveillance in today’s airports. In: Aviation Security International. Vol. 19 (2013) pp. 18–19.
 
160
Medwecki (2013) p. 36.
 
161
Dallmeier. Dallmeier CCTV / IP video surveillance solutions for airports. http://​www.​dallmeier.​com/​en/​solutions/​markets/​airport/​airport.​html
 
162
Vasilyev. Modern airport: integrated system of video surveillance. In: Security Systems. Vol. 6 (2010).
 
163
PACT The Privacy & Security – Research Paper Series: 2012 49.
 
164
Transportation Security Administration (2011) p. 126.
 
165
Dallmeier. Dallmeier CCTV / IP video surveillance solutions for airports.
 
166
Transportation Security Administration (2011) p. 128.
 
167
Gagvani. Introduction to video analytics. EETimes, 22 August 2008, http://​www.​eetimes.​com/​document.​asp?​doc_​id=​1273834
 
168
Regazzoni [et al.] Video analytics for surveillance: Theory and practice [from the guest editors]. In: Signal Processing Magazine, IEEE. Vol. 27 (2010) p. 16.
 
169
Batt (2013) pp. 18–19.
 
170
Meads (2015) p. 18.
 
171
Millward. Airports to get ‘virtual tripwire’ CCTV. The Telegraph, 12 April 2008, http://​www.​telegraph.​co.​uk/​news/​uknews/​1556555/​Airports-to-get-virtual-tripwire-CCTV.​html-
 
172
Houlis (2010).
 
173
Interview with Avinor representative, 22 Oct 2015.
 
174
Houlis (2010).
 
175
Department of Homeland Security (2012b).
 
176
Donald and Corkill. Exploiting CCTV systems: Enhancing surveillance, situational awareness and intelligence acquisition. In: Aviation Security International. Vol. 18 (2012) p. 14.
 
177
Ratcliffe (2006) p. 35.
 
178
Armitage (2002).
 
179
Ampersecurity. Video surveillance in airport. http://​www.​ampersecurity.​ru/​novosti-industrii/​videonablyudenie​-v-aeroportu (date accessed: 24 Dec 2014).
 
180
Information Commissioner’s Office (2014).
 
181
Medwecki (2013) p. 34.
 
182
Ibid. p. 35.
 
183
Medwecki (2013) p. 34.
 
184
Batt (2013) pp. 18–19.
 
185
Houlis (2010).
 
186
The Glasgow International Airport attack occurred on 30 June 2007.
 
187
Millward (2008).
 
188
Batt (2013) pp. 18–19.
 
189
Wan. Video analytics: from access control to behaviour detection and beyond. In: Aviation Security International. Vol. 17 (2011). p. 37.
 
190
Karl. Integrated CCTV: more than a surveillance tool. In: Aviation Security International. Vol. 15 (2009). p. 35.
 
191
Houlis (2010).
 
192
Medwecki (2013) p. 36.
 
193
Regazzoni et al. (2010) p. 16.
 
194
Gagvani (2008).
 
195
Meads (2015) p. 21.
 
196
Home Office (2013).
 
197
Article 29 Data Protection Working Party (2004).
 
198
Ibid.
 
199
Cardiff Airport (2013).
 
200
Gilbert (2007) p. 33.
 
201
Gagvani (2008).
 
202
Batt (2013) pp. 18–19.
 
203
Crystal. FAQ: UK Citizens and CCTV Privacy Rights. Civil Rights Movement, 7 October 2015, http://​www.​civilrightsmovem​ent.​co.​uk/​faq-uk-citizens-cctv-privacy-rights.​html
 
204
Finn et al. (2013) p. 16.
 
205
ACLU (2002).
 
206
EPIC (2008).
 
207
Cardiff Airport (2013).
 
208
Peck v. the United Kingdom, No. 44647/98, 28 Jan 2003, § 59.
 
209
Finn and Wright. Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications. In: Computer Law & Security Review. Vol. 28 (2012b) p. 192.
 
210
Vermeulen and Bellanova (2013) p. 304.
 
211
Home Office (2013).
 
212
Fingerprints were used by Chinese merchants to settle business transactions; fingerprints and footprints were used by parents to differentiate children. Liu. Bio-privacy: legal challenges for privacy regulations of biometric identification and authentication (2010) p. 3.
 
213
Ibid. p. 3.
 
214
Ibid. p. 1.
 
215
Article 29 Data Protection Working Party (2012b).
 
216
GDPR Art.4(14).
 
217
Liu (2010) p. 45.
 
218
Article 29 Data Protection Working Party (2012b).
 
219
Ibid.
 
220
Liu (2010) p. 50.
 
221
Meads (2015) p. 19.
 
222
Travel documents include identification documents such as passports and supporting documents such as visas.
 
223
ICAO, Doc 9303, Machine Readable Travel Document, Seventh Edition, 2015.
 
224
See, e.g. Commission Decision of 28 June 2006 laying down the technical specifications on the standards for security features and biometrics in passports and travel documents issued by Member States.
 
225
See more details in Finn. The identity challenge: verifying travel document integrity, quashing breeder document fraud. In: Aviation Security International. Vol. 21 (2015).
 
226
This use is beyond the scope of this book, which, as noted in Chap. 1, is focusing on measures relating to passengers.
 
227
Airports Council International (2005).
 
228
COPRA (2013).
 
229
SITA. The Airport IT Trends Survey 2016.
 
230
SITA. The Airline IT Trends Survey 2016.
 
231
COPRA (2013).
 
232
SITA. The Airport IT Trends Survey 2016.
 
233
Martin. Alaska Airlines to consider using fingerprints to screen passengers. Los Angeles Times, 24 October 2014, http://​www.​latimes.​com/​business/​la-fi-alaska-airlines-fingerprint-scanners-20141024-story.​html
 
235
Bradley (2015).
 
237
Baum. Malaysian Airlines Flight MH370: A “deliberate act” but how, by whom, and why? In: Aviation Security International. Vol. 20 (2014) p. 21.
 
238
Ibid.
 
239
Naudin (2014) p. 44.
 
240
Finn. Enhanced documentation control: An aviation security perspective. In: Aviation Security International. Vol. 18 (2012) p. 38.
 
241
COPRA (2013).
 
242
Medwecki (2013) p. 36.
 
243
Pocs. Legally compatible design of future biometric systems for crime prevention. In: Innovation: The European Journal of Social Science Research. Vol. 26 (2013). p. 36.
 
244
Article 29 Data Protection Working Party (2012b).
 
245
Ibid.
 
246
Article 29 Data Protection Working Party (2012b).
 
247
COPRA (2013).
 
248
Bradley (2015).
 
249
Vasilyev (2010).
 
250
Woollacott. Life after privacy: the next generation of public surveillance technology is already here. NewStatesman, 7 July 2014, http://​www.​newstatesman.​com/​politics/​2014/​07/​life-after-privacy-introducing-next-generation-public-surveillance-technology
 
251
Badii et al. (2012) p. 367.
 
252
Meads (2015) p. 20.
 
253
Badii et al. (2012) p. 368.
 
254
Liu (2010) p. 50.
 
255
Watson. Facial recognition – the death knell of anonymity? BBC, 26 August 2014, http://​www.​bbc.​com/​news/​uk-england-28307929
 
256
Gold. Border control biometrics and surveillance. In: Biometric Technology Today. Vol. 2012 (2012).
 
257
Gilbert (2007) p. 23.
 
258
Watson (2014).
 
259
Article 29 Data Protection Working Party (2012b).
 
260
Porter. Surveillance technologies in society. Speech of October 2014, published on 18 November 2014, https://​www.​gov.​uk/​government/​speeches/​iriss-respect-and-surveille-event
 
261
Badii et al. (2012) p. 367.
 
263
Article 29 Data Protection Working Party (2012b).
 
264
Bradley (2015).
 
265
Meads (2015) p. 20.
 
266
Watson (2014).
 
267
Porter (2014).
 
268
Ibid. Another question is under what legal basis Interpol has the authority to collect private data on individuals without their consent given its status as a non-governmental organization.
 
271
Tung. From fingerprints to facial scans: Why the French want biometrics on all EU travelers. ZDNet. 13 October 2015. http://​www.​zdnet.​com/​article/​from-fingerprints-to-facial-scans-why-the-french-want-biometrics-on-all-eu-travellers/​
 
272
Porter (2014) and EPIC, Biometric Identifiers. http://​epic.​org/​privacy/​biometrics/​
 
273
Watson (2014).
 
274
Hopkins and Morris. ‘Innocent people’ on police photos database. BBC. 3 February 2015. http://​www.​bbc.​com/​news/​uk-31105678
 
275
Medwecki (2013) p. 36.
 
276
Article 29 Data Protection Working Party (2012b).
 
277
Pocs (2013) p. 37.
 
278
Badii et al. (2012) p. 369.
 
279
Zoufal (2008) p. 93.
 
280
Ohm. Broken promises of privacy: Responding to the surprising failure of anonymization. In: UCLA Law Review. Vol. 57 (2010). p. 1704.
 
281
Vermeulen and Bellanova (2013) p. 303, Badii et al. (2012) p. 367, for more details, see Ohm (2010).
 
282
For more details, see Ohm (2010).
 
283
Badii et al. (2012) p. 370.
 
284
OECD Privacy Framework 2013.
 
285
Article 29 Data Protection Working Party (2012b).
 
286
Airports Council International (2005).
 
287
Commissioner for the use and retention of biometric material. Annual Report 2014 (2014).
 
289
Ibid.
 
290
Quinlan (2015) p. 36.
 
291
Clarke (1993) p. 405.
 
292
Poullet (2009) p. 214.
 
293
E.g. the UK Border Force conducted manual analysis of PNR data. See Vine. ‘Exporting the border’? An inspection of e-Borders. March 2013. http://​icinspector.​independent.​gov.​uk/​wp-content/​uploads/​2013/​10/​An-Inspection-of-eborders.​pdf, p. 17.
 
294
Article 29 Data Protection Working Party Advice paper on essential elements of a definition and a provision on profiling within the EU General Data Protection Regulation (2013) §1. It is based on definition of Art. 1(e) of Council of Europe Recommendation CM/Rec(2010)13 of the Committee of Ministers to member states on the protection of individuals with regard to automatic processing of personal data in the context of profiling of 23 November 2010.
 
295
Poullet (2009) p. 214.
 
297
A good example of such “failure” is 22 July 2011 in Norway.
 
298
Interpol. Media release. Global aviation security requires the industry to step in where governments fail, Interpol Chief tells IATA meeting. 7 June 2011. http://​www.​interpol.​int/​News-and-media/​News/​2011/​PR048
 
299
Forest. The Modern Terrorist Threat to Aviation Security. In: Perspectives on Terrorism. Vol. 1 (2007) p. 12.
 
300
Pub. L. 104–264, title III, §307, Oct. 9, 1996, 110 Stat. 3253.
 
302
Department of Homeland Security. Privacy Impact Assessment for Analytical Framework for Intelligence (AFI) (2012a) p 1.
 
303
Ibid. p 27.
 
304
EPIC Alert, Volume 22.15, 14 Aug 2015. EPIC Pursues Lawsuit over Secret Government Profiling Program.
 
305
Leese. The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union. In: Security Dialogue. Vol. 45 (2014) p. 494.
 
306
Yehoshua. Terrorist profiling: analysing our adversaries personalities. In: Aviation Security International. Vol. 17 (2011) p. 23.
 
307
Solove. Data mining and the security-liberty debate. In: The University of Chicago Law Review (2008a) p. 345.
 
308
Ravich. Is Airline Passenger Profiling Necessary. In: U. Miami L. Rev. Vol. 62 (2007) p. 56.
 
309
Solove (2008a) p. 353.
 
310
Fuster [et al.] Profiling in the European Union: A high-risk practice. In: INEX Policy Brief. Vol. 10 (2010) p. 2 citing Taipale. The privacy implications of government data mining programs. In: Testimony before the US Senate Committee on the Judiciary. Vol. 10 (2007) p. 6 and Lyon Surveillance as social sorting: Privacy, risk, and digital discrimination (2003b) p. 20.
 
311
Raffel (2007) p. 2.
 
312
Schneier (2008) p. 7.
 
313
See Chap. 2.
 
314
Clarke (1993) p. 403.
 
316
Donald and Corkill (2012) pp. 12, 15.
 
317
Quinlan (2015) p. 36.
 
318
E.g. Order of the Ministry of Transport of 25 July 2007 N 104 On approval of rules for pre- and post-flight inspections, Art.51.
 
319
Karber (2001) p. 802.
 
321
Guttman. Israel’s Airport Security, Object of Envy, Is Hard to Emulate Here. Forward. 6 January 2010. http://​forward.​com/​news/​122781/​israel-s-airport-security-object-of-envy-is-hard/​
 
322
Palmer (2011).
 
323
Ibid.
 
324
Order of the Ministry of Transport of 25.07.2007 N 104 On approval of rules for pre- and post flight inspections. Art. 51.
 
325
Rettner. New Airplane Passenger Screening Method Outshines Old. Live Science. 6 November 2014. http://​www.​livescience.​com/​48661-airport-screening-conversation.​html
 
326
For more details, see Ormerod. Finding a Needle in a Haystack: Toward a Psychologically Informed Method for Aviation Security Screening (2014). In: Journal of Experimental Psychology: General, Vol. 144, No. 1 (2015) pp. 76 – 84.
 
327
Crystal (2015).
 
328
Bunker (2014) p. 20.
 
329
Quinlan (2015) p. 36.
 
330
Ibid.
 
331
Perry. The Screening of Passengers by Observation Techniques Programme: analysing the issues. In: Aviation Security International. Vol. 17 (2011). p. 13.
 
332
Richardson. Congressional report: TSA suffers from “bureaucratic morass and mismanagement”. Secuirty Director News, 22 November 2011 (2011a), http://​www.​securitydirector​news.​com/​public-sector/​congressional-report-tsa-suffers-bureaucratic-morass-and-mismanagement
 
333
GAO TSA’s Managed Inclusion Process Expands Passenger Expedited Screening, But TSA Has Not Tested Its Security Effectiveness (2015b).
 
334
Donald and Corkill (2012) pp. 12, 15.
 
335
Woollacott (2014).
 
336
Badii et al. (2012) p. 367.
 
337
Transportation Security Administration (2011) p. 124.
 
338
Vermeulen and Bellanova (2013) p. 299.
 
339
Daily news. In-flight surveillance could foil terrorists in the sky. New Scientist. 29 May 2008. https://​www.​newscientist.​com/​article/​dn14013-in-flight-surveillance-could-foil-terrorists-in-the-sky/​
 
340
Vermeulen and Bellanova (2013) p. 299.
 
341
Article 29 Data Protection Working Party (2004).
 
342
Daily news (2008).
 
343
Vermeulen and Bellanova (2013) p. 299.
 
344
Griffiths. Stress response: a physiological analysis. In: Aviation Security International. Vol. 17 (2011) p. 40.
 
345
Vlahos. Surveillance society: New high-tech cameras are watching you. In: Popular Mechanics (2008).
 
346
Vermeulen and Bellanova (2013) p. 300.
 
347
Griffiths (2011) p. 40.
 
348
Surveillance system for aircraft interior. http://​www.​google.​com/​patents/​US6864805
 
352
Blank (2002).
 
354
Daily news (2008).
 
356
Ibid.
 
357
Borogan and Soldatov. Magic of persecution. Bolshoy Gorod. 24 November 2011. http://​bg.​ru/​society/​magiya_​presledovaniya-9636/​
 
358
ICAO PNR Guidelines (2010) §2.1.1.
 
359
Airlines International, Airline Data – Know Your Passengers. 1 December 2010. http://​airlines.​iata.​org/​analysis/​airline-data-know-your-passengers
 
361
See Lyon (2003a) pp. 13–20.
 
362
See more details: Ravich. Airline passenger profiling systems after 9/11: Personal privacy versus National Security. In: Journal of the Transportation Research Forum, Vol. 44, No. 2 (2010) p. 131 citing Rhee. Rational and Constitutional Approaches to Airline Safety in the Face of Terrorist Threats. In: DePaul L. Rev. Vol. 49 (2000).
 
363
Ravich (2010) p. 131.
 
364
European Commission. Roadmap. Legislative proposal and Communication on the transfer of passenger data to third countries. 10/2013.
 
365
See: Ntouvas. Air Passenger Data Transfer to the USA: the Decision of the ECJ and latest developments. In: International Journal of Law and Information Technology. Vol. 16 (2008).
 
366
Council of the European Union, Information by the Commission on the PNR legislation adopted by Mexico and the Republic of Argentina requesting the transfer of PNR data from the EU, note of 5 March 2015.
 
367
In 2013, a total of €50 million, made available by the Commission, was distributed among 14 EU countries which presented projects for developing their national PNR schemes. European Parliamentary Research Service The proposed EU passenger name records (PNR) directive. Revived in the new security context (2015).
 
368
See Nielsen and Rettman. Russia blames EU for airline data fiasco. EUobserver, 11 June 2013, http://​euobserver.​com/​justice/​120450
 
369
For more details, see Enerstvedt (2014).
 
370
On 14 July 2015, negotiations for an EU-Mexico PNR data transfer deal were formally launched (the Council gave a mandate to the Commission on 23 June 2015). http://​www.​europarl.​europa.​eu/​news/​en/​news-room/​content/​20150123BKG12902​/​html/​EU-Passenger-Name-Record-(PNR)-proposal-an-overview.
 
371
Directive (EU) 2016/681 of the European Parliament and of the Council of 27 April 2016 on the use of passenger name record (PNR) data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime.
 
372
Article 2.
 
373
Statewatch. EU-PNR: European Parliament has “egg on its face”. 4 April 2016. http://​statewatch.​org/​news/​2016/​apr/​eu-pnr-ep-egg.​htm
 
375
Currently, foreign air carries do not have access to the Russian domestic aviation market.
 
376
Confirmed during telephone conversation with the Operator’s employee 20 Nov 2015.
 
377
ICAO, 37th Assembly (2010) Resolutions.
 
378
Under the UN Charter, the Security Council has primary responsibility for the maintenance of international peace and security. Its five permanent members are the USA, the UK, Russia, France and China. http://​www.​un.​org/​en/​sc/​
 
379
United Nations Security Council. Statement by the President of the Security Council. http://​www.​un.​org/​en/​sc/​ctc/​docs/​2014/​PRST_​EN.​pdf, 2014.
 
380
European Parliamentary Research Service (2015).
 
381
Association of European Airlines. Ensuring secure aviation while minimising the hassle for passengers, 2014, http://​www.​aea.​be/​component/​attachments/​attachments.​html?​id=​93&​task=​view, IATA and AEA. Joint letter to the European Parliament, Sept 2014, https://​netzpolitik.​org/​wp-upload/​2014-09_​AEA_​IATA_​Joint_​letter_​on_​EU_​PNR.​pdf
 
383
Wolff (2012) p. 4.
 
384
Vine (2013).
 
385
BBC. MEPs back deal to give air passenger data to US. 12 April 2012. http://​www.​bbc.​co.​uk/​news/​world-europe-17764365
 
386
Vine (2013).
 
387
DHS. Preventing Terrorism and Enhancing Security. http://​www.​dhs.​gov/​preventing-terrorism-and-enhancing-security. FRA. Opinion of the European Union Agency for Fundamental Rights on the Proposal for a Directive on the use of Passenger Name Record (PNR) data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime (COM(2011) 32 final) (2011b).
 
388
Omar. Risk Based Airport Security Approach. In: International Journal of Computer Science: Theory, Technology and Applications (IJCS). Vol. 3 (2014). p. 21.
 
389
Council Directive 2004/82/EC of 29 April 2004 on the obligation of carriers to communicate passenger data.
 
390
European Parliamentary Research Service (2015).
 
391
Ibid.
 
392
Article 29 Data Protection Working Party Opinion 10/2011 on the proposal for a Directive of the European Parliament and of the Council on the use of passenger name record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime (2011), European Data Protection Supervisor. Opinion on the Proposal for a Directive of the European Parliament and of the Council on the use of Passenger Name Record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime (2011b).
 
393
Article 29 Data Protection Working Party Letter on EU PNR to Chairman of the LIBE Committee of the European Parliament (2015).
 
394
European Parliament. Draft recommendation on the draft Council decision on the conclusion of the Agreement between the United States of America and the European Union on the use and transfer of Passenger Name Records (PNR) to the United States Department of Homeland Security, 30 January 2012.
 
395
GAO Secure Flight Development and Testing Under Way, but Risks Should Be Managed as System Is Further Developed (2005); GAO Efforts to Strengthen International Passenger Prescreening are Under Way, but Planning and Implementation Issues Remain (2007).
 
396
FRA (2011b).
 
397
Dempsey and Flint (2004) p. 1471.
 
398
Vine (2013).
 
399
IATA. Passenger Services Conference Resolutions Manual (PSCRM). 01June 2007–31 May 2008 27th Edition.
 
400
See Hasbrouck. What’s in a Passenger Name Record (PNR)? 2009. http://​hasbrouck.​org/​articles/​PNR.​html
 
402
ICAO PNR Guidelines (2010) §2.1.6.
 
404
Ibid.
 
405
United Air Lines, Inc. Contract of Carriage (revised 31 December 2015), https://​www.​united.​com/​web/​format/​pdf/​Contract_​of_​Carriage.​pdf
 
406
§2.1 of Communication from the Commission On the global approach to transfers of Passenger Name Record (PNR) data to third countries. Brussels, 21 September 2010, COM(2010) 492 final.
 
407
Vine (2013).
 
408
Fessard. France jumps EU law and follows UK with mass surveillance of air travelers. 26 December 2013. http://​www.​mediapart.​fr/​en/​journal/​international/​261213/​france-jumps-eu-law-and-follows-uk-mass-surveillance-air-travellers
 
409
British Airways. Government access to British Airways booking records. Answer Id 1621. Updated 15/07/2015. http://​www.​britishairways.​com/​travel/​gsanswer/​public/​no_​no (date accessed: 20 September 2015).
 
410
Amicelli (2012b) p. 274.
 
411
TSA. Secure Flight Program. http://​www.​tsa.​gov/​stakeholders/​secure-flight-program (date accessed: 7 August 2015).
 
412
U.S. Department of Justice, Office of the Inspector General Audit Division. The Federal Bureau of Investigation’s Terrorist Watchlist Nomination Process. http://​www.​usdoj.​gov/​oig/​reports/​FBI/​a0925/​final.​pdf, 2009.
 
413
Ackerman. No-fly list used by FBI to coerce Muslims into informing, lawsuit claims. The Guardian. 23 April 2014. http://​www.​theguardian.​com/​world/​2014/​apr/​23/​no-fly-list-fbi-coerce-muslims/​
 
414
Ibid.
 
415
Ibid.
 
416
Choudhury. Ninth Circuit Gives ACLU’s No Fly List Clients Their Day in Court. ACLU. 30 July 2012. http://​www.​aclu.​org/​blog/​national-security-technology-and-liberty/​ninth-circuit-gives-aclus-no-fly-list-clients-their
 
417
Ackerman (2014).
 
418
Ibid.
 
419
Lyon. Surveillance, security and social sorting emerging research priorities. In: International criminal justice review. Vol. 17 (2007) p. 162.
 
420
Article 29 Data Protection Working Party (2004).
 
421
Art.27 of Directive 2004/38/EC of 29 April 2004.
 
422
European Parliamentary Research Service (2015).
 
423
Couessin. Passenger name records and advanced passenger information: data privacy concerns identified and resolved. In: Aviation Security International. Vol. 21 (2015) p. 39.
 
424
Ibid.
 
425
The Identity Project. Secure flight. http://​papersplease.​org/​secureflight.​html
 
426
Tirosh and Birnhack (2013) p. 1299.
 
427
Schermer. The limits of privacy in automated profiling and data mining. In: Computer Law & Security Review. Vol. 27 (2011). p. 47.
 
428
Amicelle Surveillance and discrimination In: Surveillance, fighting crime and violence (2012) p. 279.
 
429
Ibid. p. 275 citing Lyon (2007) and other authors.
 
430
Leese (2013) p. 487.
 
431
Applicable if not 100% passengers are scanned. For instance, while in Russia all passengers must go through the scans, in the UK scanners are applied only to selected passengers.
 
432
European Committee on Legal Co-operation (2003) and Article 29 Data Protection Working Party (2004).
 
433
E.g. U.S. Department of Justice. Guidance for federal law enforcement agencies regarding the use of race, ethnicity, gender, national origin, religion, sexual orientation, or gender identity. December 2014.
 
434
Quinlan (2015) p. 36.
 
435
Ibid. p. 37.
 
436
Open Society Institute. Ethnic Profiling in the European Union: Pervasive, Ineffective, and Discriminatory (2009). https://​www.​opensocietyfound​ations.​org/​sites/​default/​files/​profiling_​20090526.​pdf, p. 7.
 
437
White. Airport security checks: More offensive to some than to others. The Guardian. 24 May 2011. http://​www.​theguardian.​com/​politics/​blog/​2011/​may/​24/​airport-security-checks-terrorism-act
 
439
Bazian (2014).
 
440
Carli (2008) p. 12.
 
441
Cohen. Intercultural differences: the challenge for the screeners. In: Aviation Security International. Vol. 18 (2012) p. 14.
 
442
Perry. The Screening of Passengers by Observation Techniques Programme: analysing the issues. In: Aviation Security International. Vol. 17 (2011). p. 13 and Wagenaar (2012) p. 10.
 
443
Cohen (2012) p. 14.
 
444
Ibid.
 
445
Schermer (2011) p. 47.
 
446
Palmer (2011).
 
447
Schermer (2011) p. 47.
 
448
Graham. CCTV: The stealthy emergence of a fifth utility? In: Planning Theory &Practice. Vol. 3 (2002). pp. 239–240.
 
449
Vermeulen and Bellanova (2013) p. 305.
 
450
Gilbert (2007) p. 33.
 
451
Vermeulen and Bellanova (2013) p. 306.
 
452
Ibid.
 
453
Ibid. p. 310.
 
454
Ibid. p. 311.
 
455
See Chap. 7.
 
456
FRA (2011b).
 
457
European Data Protection Supervisor (2011b).
 
458
FRA (2011b).
 
459
Schermer (2011) p. 51.
 
460
Ibid. p. 49.
 
461
Naudin (2014) p. 44.
 
462
Leese (2014) p. 494.
 
463
Flynn. Intelligence: a pre-requisite for risk-based security screening. In: Aviation Security International. Vol. 19 (2012). p. 19.
 
464
See Fatokun. Airport security: current practice and perspectives for 2013. In: Journal of Air Transport Studies. Vol. 4 (2013). p. 36 referring to IATA’s Checkpoint of the future: Executive Summary (2013).
 
465
ACLU. Airport security: increased safety need not come at the expense of civil liberties. https://​www.​aclu.​org/​airport-securityincrease​d-safety-need-not-come-expense-civil-liberties
 
466
Gilbert (2007) p. 42.
 
467
Salter (2008) p. 256.
 
468
Preto. Aviation security – priorities of the Commission (2009) p. 2.
 
469
ACI Policy and Recommended Practices Handbook. Seventh edition. November 2009.
 
470
IATA. Remarks of Tony Tyler at the IATA Ops Conference in Vienna, 15 April 2013. http://​www.​iata.​org/​pressroom/​speeches/​Pages/​2013-04-15-01.​aspx
 
471
See, e.g. Recommendations of the 37th ICAO General Assembly (October 2010).
 
472
Brooks (2015) p. 31.
 
473
Couessin (2015) p. 37.
 
474
9/11 Commission. The 9/11 Commission Report (2004) p. 339.
 
475
Price (2013) p. 36.
 
476
Bjørnskau et al. (2007) p. iii.
 
477
Raffel (2007) p. 6.
 
478
Poole (2008) p. 23.
 
479
Forest (2007) p. 12.
 
480
Baum (2015a).
 
481
IATA Recommended Practice (RP) 1701a.
 
482
Baum. Christian Fundamentalism and Justiciar Knights: proof of the foolhardness of ethic profiling. In: Aviation Security International. Vol. 17 (2011) p. 1.
 
484
Jackson [et al.]. Assessing the security benefits of a trusted traveler program in the presence of attempted attacker exploitation and compromise. In: Journal of Transportation Security. Vol. 5 (2012) p. 33.
 
485
Baum. Pilots, flight attendants and Welsh rugby stars: when those we “trust” are out of control. In: Aviation Security International. Vol. 18 (2012a) p. 1.
 
486
Bradley (2015).
 
487
Ibid.
 
489
Global Entry is a U.S. Customs and Border Protection program that allows expedited clearance for pre-approved, low-risk travellers upon arrival in the USA. http://​www.​cbp.​gov/​travel/​trusted-traveler-programs/​global-entry
 
492
Articles 3, 7–8 of Proposal for a Regulation of the European Parliament and of the Council establishing a Registered Traveller Programme, COM(2013) 97 final – 2013/0059 (COD), Brussels, 28 Feb 2013.
 
493
See also IATA’s project SmartS which is being developed in cooperation with governments.
 
494
Leese (2013) p. 486.
 
495
Jackson et al. (2012) p. 33.
 
496
Wolff (2012) p. 4.
 
497
GAO (2015b).
 
498
Ibid.
 
499
Wolff. A passenger screening checkpoint of the 21st century. Conference Transport Security Expo, London, September 2010.
 
500
Aviation Security against Terrorist Threats – Conclusions of the conference of 31 October 2012, Nicosia, Cyprus. http://​www.​statewatch.​org/​news/​2013/​jan/​eu-council-nicosia-aviation-security-16252-12.​pdf
 
501
Soghoian. Insecure flight: Broken boarding passes and ineffective terrorist watch lists In: Protecting Airline Passengers in the Age of Terrorism (2009) p. 15.
 
502
Holbrook. Airport Security: Privacy vs. Safety. In: Risk Management. Vol. 57 (2010).
 
503
Noble. Passenger screening: empowering the industry to plug government security gaps. In: Aviation Security International. Vol. 20 (2014) p. 25.
 
504
Raffel (2007) p. 6.
 
505
Ibid. p. 2.
 
507
Annex 17, §4.2.6.
 
508
Abeyratne (2010) p. 20.
 
510
European Civil Aviation Conference. ECAC Aviation Security Handbook (restricted), 2014.
 
512
COPRA (2013).
 
513
Wright et al. (2010) p. 346.
 
514
Finn (2012) p. 40.
 
515
Wright et al. (2010) p. 346.
 
516
Jezierska-Switala. Big City Trials: from laboratory explosives detection to the field applications (a STANDEX programme). Body Search 2015 Conference Program, http://​network.​icom.​museum/​fileadmin/​user_​upload/​minisites/​icms/​pdfs/​Body_​Search_​SPEAKER_​PROGRAMME.​pdf
 
517
Neeman (2013) p. 15.
 
518
Flynn. A personal view. In: Aviation Security International. Vol. 17 (2011) p. 48.
 
519
Couessin (2015) p. 37.
 
520
Woodward (2002) p. 6.
 
521
Couessin (2015) p. 39.
 
522
Laviv. Big Data: aiding aviation and border security. In: Aviation Security International. Vol. 20 (2014). p. 11.
 
523
Couessin (2015) p. 39.
 
524
These points will be discussed in more detail in Chap. 7.
 
525
Richardson (2011a).
 
Literatur
Zurück zum Zitat ICAO, Doc 9944, Guidelines on Passenger Name Record (PNR) data of 2010 (ICAO PNR Guidelines 2010). ICAO, Doc 9944, Guidelines on Passenger Name Record (PNR) data of 2010 (ICAO PNR Guidelines 2010).
Zurück zum Zitat Order of the Ministry of Transport of 25 July 2007 N 104 On approval of rules for pre- and post-flight inspections. Order of the Ministry of Transport of 25 July 2007 N 104 On approval of rules for pre- and post-flight inspections.
Zurück zum Zitat Abeyratne, Ruwantissa. Aviation Security Law. Berlin: Heidelberg, 2010.CrossRef Abeyratne, Ruwantissa. Aviation Security Law. Berlin: Heidelberg, 2010.CrossRef
Zurück zum Zitat Amicelli, Anthony. “Report on Theoretical Frameworks and Previous Empirical Research. Deliverable D1.1 of the EU FP7 project “PACT” (2012a). Amicelli, Anthony. “Report on Theoretical Frameworks and Previous Empirical Research. Deliverable D1.1 of the EU FP7 project “PACT” (2012a).
Zurück zum Zitat Amicelli, Anthony. “Surveillance and freedom of movement.” In Surveillance, fighting crime and violence. Deliverable D1.1 of the EU FP7 project “IRISS” (2012b): 269–74. Amicelli, Anthony. “Surveillance and freedom of movement.” In Surveillance, fighting crime and violence. Deliverable D1.1 of the EU FP7 project “IRISS” (2012b): 269–74.
Zurück zum Zitat Armitage, Rachel. “To CCTV or not to CCTV.” In: A review of current research into the effectiveness of CCTV systems in reducing crime. London: Nacro, 2002. Armitage, Rachel. “To CCTV or not to CCTV.” In: A review of current research into the effectiveness of CCTV systems in reducing crime. London: Nacro, 2002.
Zurück zum Zitat Badii, Atta et al. “Visual context identification for privacy-respecting video analytics”. Multimedia Signal Processing (MMSP), 2012 IEEE 14th International Workshop on. IEEE, 2012. Badii, Atta et al. “Visual context identification for privacy-respecting video analytics”. Multimedia Signal Processing (MMSP), 2012 IEEE 14th International Workshop on. IEEE, 2012.
Zurück zum Zitat Batt, Steve. “The use of video surveillance in today’s airports”. Aviation Security International 19 (2013). Batt, Steve. “The use of video surveillance in today’s airports”. Aviation Security International 19 (2013).
Zurück zum Zitat Baum, Philip. “Germanwings 9525: the challenge of suicidal pilots behind intrusion-proof cockpit doors”. ASI Special Report on Germanwings Flight 9525 (2015a) Baum, Philip. “Germanwings 9525: the challenge of suicidal pilots behind intrusion-proof cockpit doors”. ASI Special Report on Germanwings Flight 9525 (2015a)
Zurück zum Zitat Baum, Philip. “Searching bodies: the civil liberties dilemma”. Aviation Security International 21 (2015c). Baum, Philip. “Searching bodies: the civil liberties dilemma”. Aviation Security International 21 (2015c).
Zurück zum Zitat Bjørnskau, Torkel et al. “Transport Security and the Protection of Privacy.” TØI report 914/2007 (2007). Bjørnskau, Torkel et al.Transport Security and the Protection of Privacy.” TØI report 914/2007 (2007).
Zurück zum Zitat Brooks, Nina. “A new approach for a new breed of threat?” Aviation Security International 21 (2015). Brooks, Nina. “A new approach for a new breed of threat?” Aviation Security International 21 (2015).
Zurück zum Zitat Bunker, Robert. “Body cavity bombs: Fantasy or reality?” Aviation Security International 20 (2014). Bunker, Robert. “Body cavity bombs: Fantasy or reality?” Aviation Security International 20 (2014).
Zurück zum Zitat Carli, Vivien. Assessing CCTV as an Effective Safety and Mangement Tool for Crime-solving, Prevention and Reduction. International Centre for the Prevention of Crime, 2008. Carli, Vivien. Assessing CCTV as an Effective Safety and Mangement Tool for Crime-solving, Prevention and Reduction. International Centre for the Prevention of Crime, 2008.
Zurück zum Zitat Clarke, Roger. “Profiling: A hidden challenge to the regulation of data surveillance”. JL & Inf. Sci. 4 (1993): 403. Clarke, Roger. “Profiling: A hidden challenge to the regulation of data surveillance”. JL & Inf. Sci. 4 (1993): 403.
Zurück zum Zitat Cochrane, Bruce. “Dispersal: A means of infiltrating bomb onto aircraft”. Aviation Security International 18 (2012a). Cochrane, Bruce. “Dispersal: A means of infiltrating bomb onto aircraft”. Aviation Security International 18 (2012a).
Zurück zum Zitat Cohen, Tim. “Intercultural differences: the challenge for the screeners”. Aviation Security International 18 (2012b). Cohen, Tim. “Intercultural differences: the challenge for the screeners”. Aviation Security International 18 (2012b).
Zurück zum Zitat Couessin, Charles de. “Passenger name records and advanced passenger information: data privacy concerns identified and resolved”. Aviation Security International 21 (2015). Couessin, Charles de. “Passenger name records and advanced passenger information: data privacy concerns identified and resolved”. Aviation Security International 21 (2015).
Zurück zum Zitat Dempsey, James X. and Lara M. Flint. “Commercial data and national security.” Geo. Wash. L. Rev 72 (2004): 1459–1502. Dempsey, James X. and Lara M. Flint. “Commercial data and national security.” Geo. Wash. L. Rev 72 (2004): 1459–1502.
Zurück zum Zitat Donald, Craig and Jeff Corkill. “Exploiting CCTV systems: Enhancing surveillance, situational awareness and intelligence acquisition”. Aviation Security International 18 (2012). Donald, Craig and Jeff Corkill. “Exploiting CCTV systems: Enhancing surveillance, situational awareness and intelligence acquisition”. Aviation Security International 18 (2012).
Zurück zum Zitat Elias, Bart. “Airport Body Scanners: The Role of Advanced Imaging Technology in Airline Passenger Screening”. Congressional Research Service, Library of Congress, 2012. Elias, Bart. “Airport Body Scanners: The Role of Advanced Imaging Technology in Airline Passenger Screening”. Congressional Research Service, Library of Congress, 2012.
Zurück zum Zitat Enerstvedt, Olga. “Russian PNR system: Data protection issues and global prospects”. Computer Law & Security Review 30 (2014): 25–40.CrossRef Enerstvedt, Olga. “Russian PNR system: Data protection issues and global prospects”. Computer Law & Security Review 30 (2014): 25–40.CrossRef
Zurück zum Zitat Finn, Matthew. “Enhanced documentation control: An aviation security perspective”. Aviation Security International 18 (2012a). Finn, Matthew. “Enhanced documentation control: An aviation security perspective”. Aviation Security International 18 (2012a).
Zurück zum Zitat Finn, Rachel and David Wright. “Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications”. Computer Law & Security Review 28 (2012b): 184–94.CrossRef Finn, Rachel and David Wright. “Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications”. Computer Law & Security Review 28 (2012b): 184–94.CrossRef
Zurück zum Zitat Finn, Rachel et al.”Seven types of privacy”. In: European data protection: coming of age. Springer Netherlands, 2013: 3–32. Finn, Rachel et al.”Seven types of privacy”. In: European data protection: coming of age. Springer Netherlands, 2013: 3–32.
Zurück zum Zitat Forest, James. “The Modern Terrorist Threat to Aviation Security”. Perspectives on Terrorism 1 (2007): 10–13 Forest, James. “The Modern Terrorist Threat to Aviation Security”. Perspectives on Terrorism 1 (2007): 10–13
Zurück zum Zitat Gilbert, Nigel. “Dilemmas of privacy and surveillance: challenges of technological change”. Criminal Justice Matters. Vol. 68, Issue 1 (2007): 41–42.CrossRef Gilbert, Nigel. “Dilemmas of privacy and surveillance: challenges of technological change”. Criminal Justice Matters. Vol. 68, Issue 1 (2007): 41–42.CrossRef
Zurück zum Zitat Griffiths, Siriol. “Stress response: a physiological analysis”. Aviation Security International 17 (2011). Griffiths, Siriol. “Stress response: a physiological analysis”. Aviation Security International 17 (2011).
Zurück zum Zitat Jackson, Brian A., Edward W. Chan, and Tom LaTourrette. “Assessing the security benefits of a trusted traveler program in the presence of attempted attacker exploitation and compromise”. Journal of Transportation Security 5.1 (2012): 1–34.CrossRef Jackson, Brian A., Edward W. Chan, and Tom LaTourrette. “Assessing the security benefits of a trusted traveler program in the presence of attempted attacker exploitation and compromise”. Journal of Transportation Security 5.1 (2012): 1–34.CrossRef
Zurück zum Zitat Karber, Phillip A. “Re-constructing global aviation in an era of the civil aircraft as a weapon of destruction”. Harv. JL & Pub. Pol’y 25 (2001): 781. Karber, Phillip A. “Re-constructing global aviation in an era of the civil aircraft as a weapon of destruction”. Harv. JL & Pub. Pol’y 25 (2001): 781.
Zurück zum Zitat Koffler, Bruce. “The latest Al-Qaeda threat: Body bomb”. Aviation Security International 17 (2011). Koffler, Bruce. “The latest Al-Qaeda threat: Body bomb”. Aviation Security International 17 (2011).
Zurück zum Zitat Larsen, Beatrice von Silva-Tarouca. Setting the watch: Privacy and the ethics of CCTV surveillance. Bloomsbury Publishing, 2011. Larsen, Beatrice von Silva-Tarouca. Setting the watch: Privacy and the ethics of CCTV surveillance. Bloomsbury Publishing, 2011.
Zurück zum Zitat Leese, Matthias. “Blurring the dimensions of privacy? Law enforcement and trusted traveler programs”. Computer Law & Security Review 29 (2013): 480–90.CrossRef Leese, Matthias. “Blurring the dimensions of privacy? Law enforcement and trusted traveler programs”. Computer Law & Security Review 29 (2013): 480–90.CrossRef
Zurück zum Zitat Leese, Matthias. “The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union”. Security Dialogue 45 (2014): 494–511.CrossRef Leese, Matthias. “The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union”. Security Dialogue 45 (2014): 494–511.CrossRef
Zurück zum Zitat Liu, Yue. Bio-privacy: legal challenges for privacy regulations of biometric identification and authentication. Oslo: Series of dissertations submitted to the Faculty of Law, University of Oslo, 2010. Liu, Yue. Bio-privacy: legal challenges for privacy regulations of biometric identification and authentication. Oslo: Series of dissertations submitted to the Faculty of Law, University of Oslo, 2010.
Zurück zum Zitat Lyon, David. Surveillance after September 11. Cambridge, 2003a. Lyon, David. Surveillance after September 11. Cambridge, 2003a.
Zurück zum Zitat Lyon, David. “Surveillance, security and social sorting emerging research priorities”. International criminal justice review 17 (2007): 161–70.CrossRef Lyon, David. “Surveillance, security and social sorting emerging research priorities”. International criminal justice review 17 (2007): 161–70.CrossRef
Zurück zum Zitat Meads, Colin. “CCTV Data: is it fit for purpose?” Aviation Security International 21 (2015). Meads, Colin. “CCTV Data: is it fit for purpose?” Aviation Security International 21 (2015).
Zurück zum Zitat Medwecki, Mark. “CCTV: ensuring effective surveillance at airports”. Aviation Security International 19 (2013). Medwecki, Mark. “CCTV: ensuring effective surveillance at airports”. Aviation Security International 19 (2013).
Zurück zum Zitat Naudin, Christophe. “A personal view”. Aviation Security International 20 (2014). Naudin, Christophe. “A personal view”. Aviation Security International 20 (2014).
Zurück zum Zitat Neeman, Amir. “Effectively screening people: Pat down searchers, wands, archways and portals”. Aviation Security International 19 (2013). Neeman, Amir. “Effectively screening people: Pat down searchers, wands, archways and portals”. Aviation Security International 19 (2013).
Zurück zum Zitat Neeman, Amir. “Radiation in passenger screening: busting the myths”. Aviation Security International 21 (2015). Neeman, Amir. “Radiation in passenger screening: busting the myths”. Aviation Security International 21 (2015).
Zurück zum Zitat Ohm, Paul. “Broken promises of privacy: Responding to the surprising failure of anonymization”. UCLA Law Review 57 (2010): 1701. Ohm, Paul. “Broken promises of privacy: Responding to the surprising failure of anonymization”. UCLA Law Review 57 (2010): 1701.
Zurück zum Zitat Pocs, Matthias. “Legally compatible design of future biometric systems for crime prevention”. Innovation: The European Journal of Social Science Research 26 (2013): 36–56. Pocs, Matthias. “Legally compatible design of future biometric systems for crime prevention”. Innovation: The European Journal of Social Science Research 26 (2013): 36–56.
Zurück zum Zitat Poole, Robert W. Toward risk-based aviation security policy. No. 2008-23. OECD/ITF Joint Transport Research Centre Discussion Paper, 2008. Poole, Robert W. Toward risk-based aviation security policy. No. 2008-23. OECD/ITF Joint Transport Research Centre Discussion Paper, 2008.
Zurück zum Zitat Poullet, Yves. “Data protection legislation: What is at stake for our society and democracy?” Computer Law & Security Review 25.3 (2009): 211–226.CrossRef Poullet, Yves. “Data protection legislation: What is at stake for our society and democracy?” Computer Law & Security Review 25.3 (2009): 211–226.CrossRef
Zurück zum Zitat Preto, A. “Aviation security – priorities of the Commission”. Draft speech for 7th Transec Transport Security Conference. Amsterdam, 3 June 2009. Preto, A. “Aviation security – priorities of the Commission”. Draft speech for 7th Transec Transport Security Conference. Amsterdam, 3 June 2009.
Zurück zum Zitat Price, Jeffrey. Practical aviation security: predicting and preventing future threats. Butterworth-Heinemann, 2013. Price, Jeffrey. Practical aviation security: predicting and preventing future threats. Butterworth-Heinemann, 2013.
Zurück zum Zitat Privacy International. European Privacy and Human Rights, 2011. Privacy International. European Privacy and Human Rights, 2011.
Zurück zum Zitat Quinlan, Tara. “Discrimination: the questionable effectiveness of screening based on race, religion, national origin or behaviour”. Aviation Security International 21 (2015). Quinlan, Tara. “Discrimination: the questionable effectiveness of screening based on race, religion, national origin or behaviour”. Aviation Security International 21 (2015).
Zurück zum Zitat Raffel, Robert. “Intelligence and Airports”. FBI Law Enforcement Bulletin 76 (2007): 1. Raffel, Robert. “Intelligence and Airports”. FBI Law Enforcement Bulletin 76 (2007): 1.
Zurück zum Zitat Ratcliffe, Jerry. Video surveillance of public places. Washington, DC: US Department of Justice, Office of Community Oriented Policing Services, 2006. Ratcliffe, Jerry. Video surveillance of public places. Washington, DC: US Department of Justice, Office of Community Oriented Policing Services, 2006.
Zurück zum Zitat Ravich, Timothy. “Airline passenger profiling systems after 9/11: Personal privacy versus National Security”. Journal of the transportation research forum. Vol. 44. No. 2 (2010): 127–41.CrossRef Ravich, Timothy. “Airline passenger profiling systems after 9/11: Personal privacy versus National Security”. Journal of the transportation research forum. Vol. 44. No. 2 (2010): 127–41.CrossRef
Zurück zum Zitat Regazzoni, Carlo et al. “Video analytics for surveillance: Theory and practice [from the guest editors]”. Signal Processing Magazine, IEEE. 27 (2010): 16–17. Regazzoni, Carlo et al. “Video analytics for surveillance: Theory and practice [from the guest editors]”. Signal Processing Magazine, IEEE. 27 (2010): 16–17.
Zurück zum Zitat Salter, Mark B. “Imagining numbers: Risk, quantification, and aviation security”. Security dialogue 39 (2008): 243–266.CrossRef Salter, Mark B. “Imagining numbers: Risk, quantification, and aviation security”. Security dialogue 39 (2008): 243–266.CrossRef
Zurück zum Zitat Schermer, Bart. “The limits of privacy in automated profiling and data mining”. Computer Law & Security Review 27 (2011): 45–52.CrossRef Schermer, Bart. “The limits of privacy in automated profiling and data mining”. Computer Law & Security Review 27 (2011): 45–52.CrossRef
Zurück zum Zitat Schneier, Bruce. Schneier on security. Indianapolis, Indiana, 2008. Schneier, Bruce. Schneier on security. Indianapolis, Indiana, 2008.
Zurück zum Zitat Solove, Daniel. “Data mining and the security-liberty debate”. The University of Chicago Law Review (2008a): 343–62. Solove, Daniel. “Data mining and the security-liberty debate”. The University of Chicago Law Review (2008a): 343–62.
Zurück zum Zitat St. John, Peter. “The Politics of Aviation Security”. In Aviation terrorism and security edited by Paul Wilkinson and Brian Jenkins, 1999. St. John, Peter. “The Politics of Aviation Security”. In Aviation terrorism and security edited by Paul Wilkinson and Brian Jenkins, 1999.
Zurück zum Zitat Tirosh, Yofi and Michael Birnhack. “Naked in Front of the Machine: Does Airport Scanning Violate Privacy?” Ohio State Law Journal 74 (2013): 6. Tirosh, Yofi and Michael Birnhack. “Naked in Front of the Machine: Does Airport Scanning Violate Privacy?” Ohio State Law Journal 74 (2013): 6.
Zurück zum Zitat Vermeulen, Mathias and Rocco Bellanova. “European ‘smart’ surveillance: What’s at stake for data protection, privacy and non-discrimination?” Security and Human Rights 23 (2013): 297–311.CrossRef Vermeulen, Mathias and Rocco Bellanova. “European ‘smart’ surveillance: What’s at stake for data protection, privacy and non-discrimination?” Security and Human Rights 23 (2013): 297–311.CrossRef
Zurück zum Zitat Wagenaar, Pieter and Kees Boersma. “Zooming in on ‘heterotopia’: CCTV-operator practices at Schiphol Airport”. Information Polity 17 (2012): 7–20. Wagenaar, Pieter and Kees Boersma. “Zooming in on ‘heterotopia’: CCTV-operator practices at Schiphol Airport”. Information Polity 17 (2012): 7–20.
Zurück zum Zitat Wolff, Steve. “Are We Ignoring the “Risk” in Risk Based Screening?” Aviation Security International 18 (2012). Wolff, Steve. “Are We Ignoring the “Risk” in Risk Based Screening?” Aviation Security International 18 (2012).
Zurück zum Zitat Woodward, John D. Privacy vs. Security: Electronic Surveillance in the Nation’s Capital. Rand, 2002. Woodward, John D. Privacy vs. Security: Electronic Surveillance in the Nation’s Capital. Rand, 2002.
Zurück zum Zitat Wright, David et al. “Sorting out smart surveillance”. Computer Law & Security Review 26 (2010): 343–54.CrossRef Wright, David et al. “Sorting out smart surveillance”. Computer Law & Security Review 26 (2010): 343–54.CrossRef
Zurück zum Zitat Zoufal, Donald. “Someone to watch over me?” Privacy and governance strategies for CCTV and emerging surveillance technologies. Naval Postgraduate School, Monterey CA, 2008. Zoufal, Donald. “Someone to watch over me?” Privacy and governance strategies for CCTV and emerging surveillance technologies. Naval Postgraduate School, Monterey CA, 2008.
Zurück zum Zitat Airports Council International (2005) The Application of Biometrics at Airports, November 2005. Airports Council International (2005) The Application of Biometrics at Airports, November 2005.
Zurück zum Zitat Article 29 Data Protection Working Party (2004) Opinion 4/2004 on the processing of personal data by means of video surveillance, 11750/02/EN, WP 89, Brussels, 11 Feb 2004 Article 29 Data Protection Working Party (2004) Opinion 4/2004 on the processing of personal data by means of video surveillance, 11750/02/EN, WP 89, Brussels, 11 Feb 2004
Zurück zum Zitat Article 29 Data Protection Working Party (2012b) Opinion 3/2012 on developments in biometric technologies, 00720/12/EN, WP193, Brussels, 27 Apr 2012 Article 29 Data Protection Working Party (2012b) Opinion 3/2012 on developments in biometric technologies, 00720/12/EN, WP193, Brussels, 27 Apr 2012
Zurück zum Zitat Association of Independent Aviation Security Professionals (2011). Vulnerability of Automated Millimeter Wave Imaging Technology: An Unintended Consequence of “One Size Fits All” Checkpoint Screening Association of Independent Aviation Security Professionals (2011). Vulnerability of Automated Millimeter Wave Imaging Technology: An Unintended Consequence of “One Size Fits All” Checkpoint Screening
Zurück zum Zitat COPRA (2013) Comprehensive European Approach to the Protection of Civil Aviation (COPRA). Aviation Security Research Roadmap, 2013. COPRA (2013) Comprehensive European Approach to the Protection of Civil Aviation (COPRA). Aviation Security Research Roadmap, 2013.
Zurück zum Zitat Department of Homeland Security (2011) Privacy Impact Assessment Update for TSA Advanced Imaging Technology, 2011. Department of Homeland Security (2011) Privacy Impact Assessment Update for TSA Advanced Imaging Technology, 2011.
Zurück zum Zitat Department of Homeland Security (2012b) Privacy Impact Assessment for the DHS CCTV Systems, DHS/ALL/PIA-042, 18 July 2012 Department of Homeland Security (2012b) Privacy Impact Assessment for the DHS CCTV Systems, DHS/ALL/PIA-042, 18 July 2012
Zurück zum Zitat Department of Homeland Security (2015) Privacy Impact Assessment Update for TSA Advanced Imaging Technology, 18 December 2015. Department of Homeland Security (2015) Privacy Impact Assessment Update for TSA Advanced Imaging Technology, 18 December 2015.
Zurück zum Zitat European Commission (2011) Impact Assessment on the possible use of security scanners at EU airports, COM(2011) XXX final, Brussels, 23 March 2011, European Commission (2011) Impact Assessment on the possible use of security scanners at EU airports, COM(2011) XXX final, Brussels, 23 March 2011,
Zurück zum Zitat European Committee on Legal Co-operation (2003) European Committee on Legal Co-operation, Council of Europe. Report containing guiding principles for the protection of individuals with regard to the collection and processing of data by means of video surveillance, May 2003. European Committee on Legal Co-operation (2003) European Committee on Legal Co-operation, Council of Europe. Report containing guiding principles for the protection of individuals with regard to the collection and processing of data by means of video surveillance, May 2003.
Zurück zum Zitat European Data Protection Supervisor (2011b) Opinion on the Proposal for a Directive of the European Parliament and of the Council on the use of Passenger Name Record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime. Brussels, 2011. European Data Protection Supervisor (2011b) Opinion on the Proposal for a Directive of the European Parliament and of the Council on the use of Passenger Name Record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime. Brussels, 2011.
Zurück zum Zitat EPIC (2008) EPIC Framework for Protecting Privacy & Civil Liberties If CCTV Systems Are Contemplated, 2008. EPIC (2008) EPIC Framework for Protecting Privacy & Civil Liberties If CCTV Systems Are Contemplated, 2008.
Zurück zum Zitat European Parliamentary Research Service (2015) The proposed EU passenger name records (PNR) directive. Revived in the new security context, 2015 European Parliamentary Research Service (2015) The proposed EU passenger name records (PNR) directive. Revived in the new security context, 2015
Zurück zum Zitat FRA (2010b) The use of body scanners: 10 questions and answers. Vienna, 2010. FRA (2010b) The use of body scanners: 10 questions and answers. Vienna, 2010.
Zurück zum Zitat FRA (2011b) Opinion of the European Union Agency for Fundamental Rights on the Proposal for a Directive on the use of Passenger Name Record (PNR) data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime, COM(2011) 32 final. Vienna, 2011. FRA (2011b) Opinion of the European Union Agency for Fundamental Rights on the Proposal for a Directive on the use of Passenger Name Record (PNR) data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime, COM(2011) 32 final. Vienna, 2011.
Zurück zum Zitat GAO (2015b) TSA’s Managed Inclusion Process Expands Passenger Expedited Screening, But TSA Has Not Tested Its Security Effectiveness, 2015. GAO (2015b) TSA’s Managed Inclusion Process Expands Passenger Expedited Screening, But TSA Has Not Tested Its Security Effectiveness, 2015.
Zurück zum Zitat Home Office (2013) Surveillance Camera Code of Practice, London, June 2013. Home Office (2013) Surveillance Camera Code of Practice, London, June 2013.
Zurück zum Zitat Information Commissioner’s Office (2014) In the picture: A data protection code of practice for surveillance cameras and personal information. 2014. Information Commissioner’s Office (2014) In the picture: A data protection code of practice for surveillance cameras and personal information. 2014.
Zurück zum Zitat Transportation Security Administration (2011) Recommended Security Guidelines for Airport Planning, Design and Construction, 2011. Transportation Security Administration (2011) Recommended Security Guidelines for Airport Planning, Design and Construction, 2011.
Zurück zum Zitat UK Department for Transport (2013) Equality Impact Assessment on the use of security scanners at UK airports, 2013. UK Department for Transport (2013) Equality Impact Assessment on the use of security scanners at UK airports, 2013.
Zurück zum Zitat UK Department for Transport (2015a) Code of Practice for the Acceptable Use of Security Scanners in an Aviation Security Environment, January 2015. UK Department for Transport (2015a) Code of Practice for the Acceptable Use of Security Scanners in an Aviation Security Environment, January 2015.
Zurück zum Zitat UK Department for Transport (2015b) Guidance. Security scanners implementation information. 2015. UK Department for Transport (2015b) Guidance. Security scanners implementation information. 2015.
Metadaten
Titel
Aviation Security Technologies
verfasst von
Olga Mironenko Enerstvedt
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-58139-2_6