A Layered Approached to Airport Security

A Layered Approached to Airport Security

A Layered Approached to Airport SecurityFor all passengers, airport security is that part of the journey where they - and the contents of their pockets - are checked through x-rays. In reality, of course, airport security is much more extensive and complex, especially as the number of people traveling continues to rise.

Airports face unique challenges, as they must ensure the safety and security of the public and their employees without impacting travel times, especially during busy travel seasons and periods of volatile weather. Add to this the continued awareness of global events and the growing trend of publicly accessible shopping areas, and we understand why airport security is so vital. In order to mitigate incidents before they result in unnecessary delays, costly shutdowns, or threaten public safety, these environments require physical security systems that are capable of detecting events and reducing response times.

There are multiple layers to airport security. Most passengers wouldn’t know that security is engaged as soon as they turn onto the roads that service the airport. Using a video surveillance system to monitor vehicular traffic, airport security is able to significantly improve public safety and operational efficiency by detecting vehicles traveling in lanes restricted for public transportation, blocking emergency lanes, or stopped in restricted areas. Combining video surveillance with video analytics makes it possible to measures traffic activity and obtain data and information vital for avoiding congestion, improving traffic flow during peak hours and maintaining clear access paths at all times.

A Layered Approached to Airport Security 

Parking

Airport parking, ranging from departure drop-off lanes and passenger pick-up to short, term, long term, and rental parking, requires careful planning and the right technology. Otherwise, it can become a frustrating experience that requires extra time and energy to navigate.

To help keep track of all the vehicles coming and going at all hours of the day, airports use access control systems (ACS) to manage access to approved parking areas and automatic license plate recognition (ALPR) systems to manage their pay-by-plate parking service. In fact, using fixed ALPR cameras at public parking lots and garages allows for unmanned, 24/7 parking with automatic citation issuance by other LEP technologies.

When integrated with video surveillance, these same technologies also have a role to play in improving car park efficiency and passengers’ experiences. Some airports use data from the video management software (VMS) and ALPR to indicate the location of empty spots, assist car owners in locating their parked cars, prevent illegal parking, improve traffic flow by allowing automatic entry to authorized vehicles and ensure the smooth flow of traffic at peak hours.

The Terminal

Airport terminals require large numbers of personnel to run smoothly.  From ticket agents to custodial staff, everyone has a job to do and an area in which to do it. It is important to provide personnel with the right access to perform their tasks and to ensure that all areas are appropriately monitored and protected.

Access control and video surveillance are key for promoting public security and safety inside airport terminals. By keeping records of personnel movement throughout the terminal and making it easy to manage access rights, an ACS allows airport security to effectively monitor and control access to hundreds of doors.A Layered Approached to Airport Security

When unified with video surveillance, an ACS can also display cardholder pictures and credentials directly within video tiles, thereby allowing security to quickly verify cardholder information from one central application. And, to further secure highly-sensitive areas in the terminal, an airport can integrate biometrics, including retina scan and fingerprint readers, as part of its ACS.

With cameras spread throughout the terminal, passengers and restricted areas can be continuously monitored, allowing security to detect unattended objects, resolve instances of theft, detect loitering and motion in sensitive zones and track the movements of suspicious people in the terminal using pan-tilt-zoom (PTZ) cameras. Video surveillance can also be used by other groups at the airport to streamline operations throughout the terminal. For instance, customs and security groups can dispatch more agents when above average passenger congestion is detected and baggage handling can adjust carousel designations when planes are delayed.

Working with an advanced video management system (VMS), video analytics software can also process the data contained in real-time video streams to improve queue and crowd management by determining the number of people in a line, queues for ticketing, the flow of passengers exiting a certain area and the number of opened positions. This data can then be used to determine average waiting times at important locations and help managers make appropriate decisions about staffing and resource allocation.

The Perimeter

Although passengers generally access the airport’s perimeter only while on an aircraft, expanding security measures outside the terminal to the tarmac, aircraft taxi-ways, and the extended airport property is also important when it comes to ensuring public safety.

To secure its perimeter, airports use intrusion and perimeter protection technologies including microwave, fence detection and buried cable detection sensors, as well as trip-wire analytics, and strategically placed long-range, high-resolution cameras. With this unified approach, intrusion and perimeter detection devices trigger cameras to automatically pan-tilt-zoom into the target area for visual identification. A Layered Approached to Airport SecurityVideo surveillance is then sent directly to the security monitoring center, or even as a mobile alert to the security director's smart phone, for immediate verification and response.

By deploying perimeter detection and long-range, high-resolution cameras, together with location-mapping tools, airports can minimize the risk of breaches going undetected and reduce response time when they do. Managing these devices and alarms directly from an integrated mapping system also helps operators quickly pinpoint other nearby cameras to get a broader view of the situation and confirmed location.

A Unified, IP-based, Security Solution

Due to the number of layers involved, ensuring the safety and security of the public at airports requires using multiple technologies and systems, from IP-based video cameras, advanced VMS, and video analytics to ACS, biometric locks, and perimeter intrusion technology. For airports, an IP-based platform is the most efficient and extensible way to deploy these systems, and the resulting integration and unification of these technologies ensures better collaboration for faster response times in the event of threats to public safety and security.

By standardizing security operations including monitoring, reporting and alarm management, into a single platform, a unified, IP-based, security solution can make operators more productive and reduce operational costs. Working with a unified, IP platform, like Genetec Security Center, an airport can manage its fixed and on-board systems under one platform and have a complete picture of all aspects of operations without having to switch between different applications.

About the Author

David Lenot is the EMEA director of transportation at Genetec, Inc, overseeing and supporting all transit customers, consultants and industry forums across EMEA to facilitate planning and implementation of state-of-the-art unified security systems.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3