Documente Academic
Documente Profesional
Documente Cultură
Restricted
AMENDMENTS
AMENDMENTS CORRIGENDA
Date Date Entered Date of Date Entered
No. No.
applicable entered by issue entered by
TABLE OF CONTENT
TABLE OF CONTENT................................................................................................................... 3
INTRODUCTION ........................................................................................................................... 4
CHAPTER 1 DEFINITIONS ...................................................................................................... 6
CHAPTER 2 GENERAL PRINCIPLES ................................................................................... 14
2.1 Operational aspects ......................................................................................................................... 14
CHAPTER 3 COLLECTION AND TRANSMISSION OF INFORMATION ............................... 17
CHAPTER 4 AIR TRAFFIC CONTROL .................................................................................. 20
CHAPTER 5 CONTINGENCY PLANS.................................................................................... 22
5.1 Principles .......................................................................................................................................... 22
5.2 Threat assessment and risk management .................................................................................... 24
5.3 Contingency plan exercises............................................................................................................ 24
5.4 Crisis management team................................................................................................................. 25
5.5 Incident access and control............................................................................................................ 26
5.6 Isolated aircraft parking position ................................................................................................... 27
5.7 Suspect explosive devices.............................................................................................................. 28
5.8 Emergency operations centre......................................................................................................... 28
5.9 Communications .............................................................................................................................. 29
5.10 Press and media............................................................................................................................... 30
5.11 Telephone enquiries and Relatives ................................................................................................ 30
5.12 Response to threats......................................................................................................................... 31
Bomb threats on the ground............................................................................................................... 32
Bomb threat in flight ........................................................................................................................... 33
Searching procedures ........................................................................................................................ 33
In-flight aircraft search procedures..................................................................................................... 34
Evacuation procedures....................................................................................................................... 34
Evacuation of air traffic services ........................................................................................................ 35
CHAPTER 6 REVIEW, ANALYSIS AND REPORTS .............................................................. 37
6.2 Reports .............................................................................................................................................. 37
Timescales for reports........................................................................................................................ 38
APPENDIX-1 COMPILATION AND DISSEMINATION OF INFORMATION CONCERNING AN
AIRCRAFT WHICH IS BEING SUBJECTED TO AN ACT OF UNLAWFUL INTERFERENCE ... 40
APPENDIX-2 THREAT ASSESSMENT METHODOLOGY.......................................................... 46
APPENDIX-3 RISK MANAGEMENT MODEL ............................................................................. 53
APPENDIX-4 ACTION BY THE RECIPIENT OF A BOMB THREAT TELEPHONE CALL.......... 59
APPENDIX-5 BOMB THREAT ASSESSMENT ........................................................................... 63
APPENDIX-6 RESPONSE TO BOMB THREATS AGAINST AIRCRAFT.................................... 67
APPENDIX-7 AIRCRAFT SECURITY SEARCH CHECKLIST .................................................... 71
APPENDIX-8 SUSPECT EXPLOSIVE DEVICES ........................................................................ 77
APPENDIX-9 SEARCH AND EVACUATION GUIDELINES ........................................................ 80
APPENDIX-10 OFFICIAL REPORT ON ACT OF UNLAWFUL INTERFERENCE....................... 87
Volume V - 3
Volume V-4 Security Manual Doc8973/7
INTRODUCTION
This manual has been developed to assist States in promoting safety and security within the field of civil
aviation. The objective of this document is to advise States on the prevention of and, where necessary,
response to acts of unlawful interference, through the application of an aviation security system comprised
of the four main elements:
The security manual, comprised of five volumes addressing the above-mentioned elements,
contains guidance as to how States may comply with the Standards and Recommended Practices of Annex
17 to the Convention on International Civil Aviation, signed at Chicago on 7 December 1944. While the
methods of compliance provided are based on generally recognized practices and procedures common
within the international civil aviation industry, they are not the only means of compliance. Other methods of
meeting the Standards and Recommended Practices contained in Annex 17 Security may be equally
appropriate. Modification to the practices and procedures proposed in the manual may also be necessary in
order to meet the varied legal and administrative structures within individual States.
The material in this volume, entitled Crisis Management and Response to Acts of Unlawful
Interference is intended for the appropriate authority, airport and aircraft operators and any other entity
responsible for crisis management and emergency response. This volume provides guidance with regard to
threat and risk assessment, contingency plans, collection and transmission of information during an act of
unlawful interference, and the subsequent review, analysis and reporting of any act of unlawful interference.
The remaining four volumes of the security manual address the following aspects of an
aviation security system:
Volume I-National Organization and Administration is intended for the appropriate authority
and provides guidance with regard to the development and implementation of a national
legal framework, oversight responsibilities of a State, as it pertains to aviation security. This
volume contains guidance related to legal aspects, international cooperation, and additional
security measure such as in-flight security officers, armed personnel, national aviation
security programme, quality control and procedures for handling sensitive information;
Volume II-Recruitment, Selection and Training is intended for any entity responsible for the
recruitment and training of personnel involved in the implementation of aviation security. It
provides guidance material with regard to the national training policy and the national civil
aviation security training programme, including recruitment, selection, training and
certification of security staff, selection and training of non-security staff and training
development;
Volume IVPreventive Security Measures is intended for all entities responsible for the
implementation of an aviation security system and consists of preventive procedures with
regard to access control, aircraft operator security, general aviation and aerial works,
passengers and cabin baggage, hold baggage, special categories of passengers, cargo,
mail and security procedures for other entities.
In order to keep this manual relevant and accurate, suggestions for improving it in terms of
format, content or presentation are welcome. Any such recommendation or suggestion will be examined
and, if found suitable, will be included in the next edition of this manual. Regular revision will ensure that this
manual remains both pertinent and accurate. Comments concerning this manual should be address to:
Volume V - 5
Volume V-6 Security Manual Doc8973/7
CHAPTER 1 DEFINITIONS
Terms that are defined in the ICAO Vocabulary (Doc 9713, 2nd edition, 2001) and the Annexes are used in
accordance with the meanings and usages given therein. A wide variety of terms are in use throughout the
world to describe facilities, procedures and concepts for airport operations and planning. As far as possible
the terms used in this document are those which have the widest international use.
Doc 9713 Part 1 &2 ICAO Vocabulary 2001 act of unlawful interference A53.
These are acts or attempted acts such as to jeopardize the safety of civil aviation and air transport, i.e.
Accompanied hold baggage. Baggage accepted for carriage in the hold of an aircraft, on which the
passenger who checked it in is onboard.
Aerial work. An aircraft operation in which an aircraft is used for specialized services such as agriculture,
construction, photography, surveying observation and patrol, search and rescue, aerial advertisement, etc.
Aircraft. Any machine that can derive support in the atmosphere from the reactions of the air other than the
reactions of the air against the earths surface.
Aircraft operators documents. Air waybills/consignment notes, passenger tickets and boarding passes,
bank and agent settlement plan documents, excess baggage tickets, miscellaneous charges orders
(M.C.O.), damage and irregularity reports, baggage and cargo labels, timetables, and weight and balance
documents, for use by aircraft operators.
Aircraft maintenance area. All the ground space and facilities provided for aircraft maintenance. It includes
aprons, hangars, buildings and workshops, vehicle parks and roads associated therewith. Such an area is
normally designated as a security restricted area.
Aircraft in flight. An Aircraft from the moment when all its external doors are closed following embarkation
until the moment when such doors are opened for disembarkation.
Aircraft-in-service. A parked aircraft which is under surveillance sufficient to detect unauthorized access.
Aircraft not in service. An aircraft that is either parked for a period of more than 12 hours or is not under
surveillance sufficient to detect unauthorised access.
Aircraft security check. An inspection of the interior of an aircraft to which passengers may have had
access and an inspection of the hold for the purposes of discovering suspicious objects, weapons,
explosives or other dangerous devices.
Aircraft security search. A thorough inspection of the interior and exterior of the aircraft for the purpose of
discovering suspicious objects, weapons or other dangerous devices
Aircraft stand. A designated area on an apron intended to be used for parking an aircraft.
Airport. Any area in a Contracting State which is open for aircraft operations.
Airside. The movement area of an airport, adjacent terrain and buildings or portions thereof, access to
which is controlled.
Appropriate authority for aviation security. The authority designated by a State within its administration
to be responsible for the development, implementation and maintenance of the national civil aviation security
programme.
Apron. A defined area, on a land aerodrome, intended to accommodate aircraft for purposes of loading or
unloading passengers, mail or cargo, fuelling, parking or maintenance.
Apron passenger vehicle. Any vehicle used to convey passengers between aircraft and passenger
buildings.
Background check. A check of a persons identity and previous experience, including where legally
permissible, any criminal history, as part of the assessment of an individuals suitability to implement a
security control and/or for unescorted access to a security restricted area.
Baggage. Personal property of passengers or crew carried on an aircraft by agreement with the operator.
Baggage sorting area. Space in which departure baggage is sorted into flight loads.
Baggage storage area. Space in which checked/hold baggage is stored pending transport to aircraft and
space in which mishandled baggage may be held until forwarded, claimed or otherwise disposed of.
Bomb alert. A status of alert, put in place by competent authorities to activate an intervention plan intended
to counter the possible consequences arising from a communicated threat, anonymous or otherwise, or
arising from the discovery of a suspect device or other suspect item on an aircraft, at an airport or in any civil
aviation facilities.
Bomb threat. A communicated threat, anonymous or otherwise, which suggests, or infers, whether true or
false that the safety of an aircraft in flight or on the ground, or any airport or civil aviation facility or any
person may be in danger from an explosive or other item or device.
Cargo. Any property carried on an aircraft other than mail, stores and accompanied or mishandled baggage.
Cargo area. All the ground space and facilities provided for cargo handlings. It includes aprons, cargo
buildings and warehouses, vehicle parks and roads associated therewith.
Volume V - 7
Volume V-8 Security Manual Doc8973/7
Cargo building. A building through which cargo passes between air and ground transport and in which
processing facilities are located, or in which cargo is stored pending transfer to air or ground transport.
Catering stores. All items, other than catering supplies, associated with passenger in-flight services, for
example newspapers, magazines, headphones, audio and video tapes, pillows and blankets, amenity kits, etc.
Catering supplies. Food, beverages, other dry stores and associated equipment used on board an aircraft.
Certification. A formal evaluation and confirmation by or on behalf of the appropriate authority for aviation
security that a person possesses the necessary competencies to perform assigned functions to an
acceptable level as defined by the appropriate authority.
Check-in. The process of reporting to an aircraft operator for acceptance on a particular flight.
Courier service. An operation whereby shipments tendered by one or more shippers are transported as the
baggage of a courier passenger on board a scheduled aircraft operator service under normal passenger
hold baggage documentation.
Co-mail. Abbreviation of aircraft operator company mail, shipped within its network of stations.
Co-mat. Abbreviation of aircraft operator company materials, shipped within its network of stations.
Commercial air transport operation. An aircraft operation involving the transport of passengers, cargo or
mail for remuneration or hire.
Note: For the purpose of this Manual the aircraft operator term will be used instead of a commercial air
transport operator.
Contingency plan. A proactive plan to include measures and procedures addressing various threat levels,
risk assessments and the associated security measures to be implemented; designed to anticipate and
mitigate events as well as prepare all concerned parties having roles and responsibilities in the event of an
actual act of unlawful interference. A contingency plan sets forth incremental security measures that may be
elevated as the threat increases. It may be a stand alone plan or included as part of the Crisis Management
Plan.
Corporate aviation. The non-commercial operation or use of aircraft by a company for the carriage of
passengers or goods as an aid to the conduct of company business, flown by a professional pilot employed
to fly the aircraft.
Crew member. A person assigned by an operator to duty on an aircraft during a flight duty period.
Crisis management. Contingency measures implemented in response to increased threat levels as well as
implementation of measures and procedures in response to the emergencies to include acts of unlawful
interference.
Dangerous goods. Articles or substances which are capable of posing a risk to health, safety, property or
the environment and which are shown in the list of dangerous goods in the Technical Instructions or which
are classified according to those Instructions.
Deportee. A person who had legally been admitted to a State by its authorities or who had entered a State
illegally, and who at some later time is formally ordered by the competent authorities to leave that State.
Note: The competent authorities may provide an escort for such persons.
Diplomatic pouch (bag). A diplomatic bag is a shipping container having diplomatic immunity from search
or seizure.
Direct transit area. A special area established in an international airport, approved by the public authorities
concerned and under their direct supervision or control, where passengers can stay during transit or transfer
without applying for entry to the State.
Disruptive passenger. A passenger who fails to respect the rules of conduct at an airport or on board an
aircraft or to follow the instructions of the airport staff or crew members and thereby disturbs the good order
and discipline at an airport or on board the aircraft.
Emergency plan. The plan set forth the procedures for coordinating the response of different aerodrome
agencies (or services) and of those agencies in the surrounding community that could be of assistance in
responding to the emergency.
Explosive substance. Solid or liquid substance (or mixture of substances) which is in itself capable by
chemical reaction of emitting gases at such a temperature, pressure and speed as to cause damage in the
surrounding area.
This definition includes pyrotechnic substances, even if they do not emit gases. Those substances that are
in themselves not explosive but may produce an explosive atmosphere of gas, vapour or dust are not
included.
Explosive Detection System (EDS). A system or combination of different technologies which has the ability
to detect, and so to indicate by means of an alarm, explosive material contained in baggage, irrespective of
the material from which the bag is made.
Explosive Device Detection System (EDDS). A system or combination of different technologies which has
the ability to detect, and so to indicate by means of an alarm, an explosive device by detecting one or more
components of such a device contained in baggage, irrespective of the material from which the bag is made.
Facilitation. The efficient management of a necessary control process, with the objective to expedite
clearance of persons or goods and prevent unnecessary operational delays.
General Aviation operation. An aircraft operation other than a aircraft operation or an aerial work
operation.
Human factors principles. Principles which apply to design, certification, training, operations and
maintenance and which seek safe interface between the human and other system components by proper
consideration to human performance.
Human performance. Human capabilities and limitations which have an impact on the safety, security and
efficiency of aeronautical operations.
Inadmissible person. A person who is or will be refused admission to a State by its authorities. Such
persons normally have to be transported back to their State of departure, or to any other State where the
persons are admissible, by the aircraft operator on which they arrived (see appropriate Standards in ICAO
Annex 9, Chapter 5).
In-flight Security Officer. A person who is employed and trained by the government of the State of the
Operator or by the government of another Contracting State to travel on an aircraft with the purpose of
protecting that aircraft and its occupants against acts of unlawful interference. This excludes persons
Volume V - 9
Volume V-10 Security Manual Doc8973/7
employed to provide exclusive personal protection for one or more specific people travelling on the aircraft,
such as personal bodyguards.
Integrated/consolidated cargo. A consignment of multi-packages which has been originated by more than
one person, each of whom has made an agreement for carriage by air with another person other than a
scheduled aircraft operator.
Interline baggage. Baggage of passengers subject to transfer from the aircraft of one operator to the
aircraft of another operator in the course of the passengers journey. (see also online baggage and transfer
baggage)
International airport. Any airport designated by the Contracting State in whose territory it is situated as an
airport of entry and departure for international air traffic, where the formalities incident to customs,
immigration, public health, animal and plant quarantine and similar procedures are carried out.
Known consignor.
For Cargo: The originator of property for transportation by air for his own account and who has established
business with a regulated agent or aircraft operator on the basis of the criteria detailed in this document.
For Mail: The originator of mail for transportation by air for his own account and who has established
business with a regulated postal authority/administration.
Known Supplier of LAGs and/or Known Supplier of STEBs. Entity that ensures implementation of the
security controls and protection from unauthorized interference with supplies of LAGs or supplies of STEBs,
respectively, from their first point of entry on airside until their delivery to passengers. The Known Supplier of
LAGs and/or the Known Supplier of STEBs fully accepts responsibility, by written declaration, for the
implementation and quality control of LAGs and STEBs within the supply chain on the airside.
Landside. That area of an airport and buildings to which both traveling passengers and the non-traveling
public have unrestricted access. (See also Non-restricted area.)
Mail. Dispatches of correspondence and other items tendered by and intended for delivery to postal
services in accordance with the rules of the Universal Postal Union (UPU).
Movement area. That part of an aerodrome to be used for the take-off, landing and taxiing of aircraft,
consisting of the manoeuvring area and the apron(s).
Narcotics control. Measures to control the illicit movement of narcotics and psychotropic substances by air.
Non-restricted area. Areas of an airport to which the public have access or to which access is otherwise
unrestricted.
Off-airport processing facilities. A passenger or cargo transport link terminal at an urban population
centre at which processing facilities are provided.
On-demand Commercial Aviation. Proposed definition being prepared by IBAC, IAOPA and ICAO-ANB
with a view to separate advice to the Panel.
Passenger area. All the ground space and facilities provided for passenger processing. It includes aprons,
passenger buildings, vehicle parks and roads.
Permits. A permit system consists of cards or other documentation issued to individual persons employed
on airports or who otherwise have need for authorized access to the airport, airside or security restricted
area. Its purpose is to identify the individual and facilitate access. Vehicle permits are issued and used for
similar purposes to allow vehicular access. Permits are sometimes referred to as airport identity cards or
passes.
Person with disabilities (with reduced mobility). Any person whose mobility is reduced due to a physical
incapacity (sensory or locomotor), an intellectual deficiency, age, illness or any other cause of disability
when using transport and whose situation needs special attention and the adaptation to the persons needs
of the services made available to all passengers.
Pilot-in-command. The pilot responsible for the operation and safety of the aircraft during flight time.
Regulated agent. An agent, freight forwarder or any other entity who conducts business with an operator
and provides security controls that are accepted or required by the appropriate authority in respect of cargo,
courier and express parcels or mail.
Restricted articles. Articles which are, in the specific context of aviation security, defined as those articles,
devices or substances which may be used to commit an act of unlawful interference against civil aviation or
which may endanger the safety of the aircraft and its occupants, or installations and the public.
Sabotage. An act or omission, intended to cause malicious or wanton destruction of property, endangering
or resulting in unlawful interference with international civil aviation and its facilities.
Screening. The application of technical or other means which are intended to identify and/or detect
weapons, explosives or other dangerous devices, articles or substances which may be used to commit an
act of unlawful interference.
Note. Certain dangerous articles or substances are classified as dangerous goods by Annex 18 and the
associated Technical Instructions for the Safe Transport of Dangerous Goods by Air (Doc 9284) and must
be transported in accordance with those instructions.
Security. A combination of measures and human and material resources intended to safeguard civil aviation
against acts of unlawful interference.
Security audit. An in-depth compliance examination of all aspects of the implementation of the national civil
aviation security programme.
Security checks for LAGs and STEBs. Visual checks or security controls, performed by security staff, for
signs of interference, in particular tampering with seals, theft and the introduction of potentially dangerous
devices, articles or substances. The checks should be made at the first point of entry on the airside. The
checks should be made on all supplies of LAGs and STEBs to establish that they have been protected, that
there is no evidence or suspicion of tampering, and that the necessary documentation is in order.
Security control. A means by which the introduction of weapons, explosives or other dangerous devices,
articles or substanceswhich may be used to commit an act of unlawful interference can be prevented.
Security exercise. A full-scale security exercise is a simulated act of unlawful interference with the objective
of ensuring the adequacy of the contingency plan to cope with different types of emergencies.
A partial security exercise is a simulated act of unlawful interference with the objective of ensuring the
adequacy of the response to individual participating agencies and components of the contingency plan, such
as the communications system.
Security equipment. Devices of a specialized nature for use, individually or as part of a system, in the
prevention or detection of acts of unlawful interference with civil aviation and its facilities.
Security inspection. An examination of the implementation of relevant national civil aviation security
programme requirements by an airline, airport, or other entity involved in security.
Volume V - 11
Volume V-12 Security Manual Doc8973/7
Security investigation. An inquiry into any act or attempted act of unlawful interference against civil
aviation and/or any alleged or suspected instance of non-compliance with the State' s National Civil Aviation
Security Programme or other legal and/or regulatory requirements pertaining to civil aviation security.
Security programme. Written measures adopted to safeguard international civil aviation against acts of
unlawful interference.
Security restricted area. Those areas of the Airside of an airport which are identified as priority risk areas
where in addition to access control, other security controls are applied. Such areas shall normally include,
inter alia, all commercial aviation passenger departure areas between the screening checkpoint and the
aircraft, the ramp, baggage make-up areas, including those where aircraft are being brought into service and
screened baggage and cargo are present, cargo sheds, mail centres, airside catering and aircraft cleaning
premises.
Security test. A covert or overt trial of an aviation security measure which simulates an attempt to commit
an unlawful act.
Security survey. An evaluation of security needs including the identification of vulnerabilities which could be
exploited to carry out an act of unlawful interference, and the recommendation of corrective actions.
Service panel. Aircraft external access point used for providing aircraft services; such include water,
lavatory, ground electrical outlets and other service compartments that have external clip-down panels.
Sterile area. That area between any passenger inspection or screening control point and aircraft into which
access is strictly controlled. (Also known as Security restricted area.)
Stores (Supplies).
Stores (Supplies) for consumption. Goods, whether or not sold, intended for consumption by the
passengers and the crew on board aircraft, and goods necessary for the operation and maintenance
of aircraft, including fuel and lubricants.
Stores (Supplies) to be taken away. Goods for sale to the passengers and the crew of aircraft with
a view to being landed.
Supplies of LAGs. Liquids, gels and aerosols, in any volume, for sale at airport outlets (excluding food and
beverages for consumption in the airport premises and not intended for carriage into the aircraft passenger
cabin) or on board aircraft during the day(s) of the journey, either in the airside area, or in a security
restricted area.
Supplies of STEBs. Security tamper-evident bags that should only be used for the sale of LAGs by airport
outlets, or on board aircraft.
Terminal. The main building or group of buildings where the processing of commercial passengers and
freight and the boarding of aircraft occurs.
Transit passengers. Passengers departing from an airport on the same flight as that on which they arrived.
Threat Image Projection (TIP). A software programme approved by the appropriate authority which can be
installed on certain X-ray machines. The programme projects virtual images of threat articles (e.g., guns,
knives, improvised explosive device) within the X-ray image of a real bag under examination or complete
virtual images of bags containing threat articles, and provides immediate feedback to the X-ray machine
operators of their ability to detect such images.
Trace Detection Equipment. Technology system or combination of different technologies which has the
ability to detect very small amounts, and so to indicate, by means of an alarm, explosive materials contained
in baggage, or other articles subjected for analysis.
Travel document. A passport or other official document of identity issued by a State or organization, which
may be used by the rightful holder for international travel .
Unaccompanied baggage. Baggage which may or may not be carried on the same aircraft with the person
to whom it belongs.
Unclaimed baggage. Baggage which arrives at an airport and is not picked up or claimed by a passenger.
Unidentified baggage. Baggage at an airport, with or without a baggage tag, which is not picked up by or
identified with a passenger.
Unruly passengers. Persons who commit on board a civil aircraft, from the moment when the aircraft door
is closed prior to take-off to the moment when it is reopened after landing, an act of:
assault, intimidation, menace or wilful recklessness which endangers good order or the safety of
property or persons;
assault, intimidation, menace or interference with a crew member in performance of duties or which
lessens ability to perform duties;
wilful recklessness or damage to an aircraft, its equipment, or attendant structures and equipment
such as to endanger good order and safety of the aircraft or its occupants;
communication of information which is known to be false, thereby endangering the safety of an
aircraft in flight;
disobedience of lawful commands or instructions for safe, orderly or efficient operations.
Vulnerable point. Any facility on or connected with an airport, which, if damaged or destroyed, would
seriously impair the functioning of the airport.
Volume V - 13
Volume V-14 Security Manual Doc8973/7
2.1.1 It must be recognized that despite the best efforts of States, airport administrations and
aircraft operators, acts of unlawful interference, attempts to commit such acts or threats thereof are likely to
occur from time to time. Therefore States should develop crisis management measures and procedures
which should involve identifying crisis' s, planning the appropriate response to the crisis and confronting and
resolving the crisis. As a consequence, flexible contingency and emergency plans for each type of
occurrence as a part of crisis management plan should be prepared for each airport in accordance with
requirements of the NCASP.
2.1.2 Emergency plans are in nature reactive dealing with incidents occurring in the air or on the
ground (mainly safety-related emergencies even if they started as security-related incidents) and are
designed to limit the consequences or the impact of such incidents. Contingency plans are more proactive
including measures and procedures to deal with various threat levels, risk assessments and the associated
security measures to be implemented, and are designed to anticipate events, and prepare all concerned
parties, involved in case of emergencies. In either cases, resources, facilities and personnel must be made
available in support of these plans.
2.1.3 States should ensure that airports remain open and available for use by an aircraft
subjected to an act of unlawful interference. The denial of essential navigation aids or ATS and
communications services, turning off essential lighting, particularly on runways and taxiways, and the
deliberate obstruction of runways can only increase the probability of an accident to such an aircraft. A
combination or any one of these deliberate decisions will seriously endanger the lives of passengers. Lack
of provision of assistance to such an aircraft could result in:
c) fuel shortage;
In addition, the perpetrators may vent their frustrations on the hostages under their control.
2.1.4 Each State is obliged, under the aviation security Conventions, to take adequate measures
for the safety of passengers and crew of an aircraft which is subjected to an act of unlawful interference until
their journey can be continued. This obligation may arise as a consequence of a wide variety of acts,
ranging from the sabotage of an aircraft in transit through the airspace of a State to the termination of an act
of unlawful seizure at an airport. Also included is the length of time which may be required to restore an
aircraft to a serviceable state after its emergency exit equipment has been deployed to allow the evacuation
of passengers.
2.1.5 A single government agency should be assigned primary responsibility and authority to
determine the course of action to be taken when an aircraft subjected to unlawful interference is in the
airspace or at an airport. This agency should coordinate all actions with the civil aviation authority, the airport
administration, the affected operator, the State of Registry/Operator of the affected aircraft, and such other
organizations on or off the airport as may be deemed appropriate.
2.1.6 When different government agencies are assigned responsibility for managing acts of
unlawful interference taking place in flight or on the ground, it will be essential for a clear and precise
procedure to have been established prior to an occurrence, so that there will be no confusion as to when
responsibility passes from one agency to another during an act of unlawful interference.
2.1.7 When an aircraft which has been unlawfully seized is parked at an airport, the competent
authorities of the State in which the airport is situated should not take any action to terminate the unlawful
seizure of the aircraft without taking into account, in particular, any wishes that the pilot-in-command may
have been able to express and, if feasible, those of appropriate officials of the State whose aircraft operator
is operating the aircraft. As the safety of the passengers and crew should be the overriding consideration of
those involved in reaching any decision, full weight must be to all relevant circumstances and to the views of
the operator.
2.1.8 Contingency plans for dealing with an act of unlawful interference involving an aircraft
should take into consideration the following factors:
a) the safest place for an aircraft under an act of unlawful interference is on the ground
(the national contingency plan should therefore be closely coordinated with airport
contingency plans);
b) the paramount objective is the safe release of passengers and crew, which overrides
other considerations such as capture and punishment of the perpetrators and the
protection of property;
c) there is a need to ensure that the perpetrators of acts of unlawful interference will be
confronted with a well-organized and effective response so that damage or injury may
be prevented or minimized;
d) negotiations should always prevail over the use of force until it becomes evident to
decision makers that all other possibilities have been exhausted and the consultative
process has reached a deadlock;
1
e) negotiations with the offenders should be conducted by persons properly trained and
skilled in such matters since this is far more likely to result in the successful termination
of the occurrence with the least loss of life, injury to persons and damage to or loss of
property;
h) the aircraft should, where possible, be parked in an isolated parking position to minimize
the disruption to normal airport operations.
2.1.9 States should develop a standard procedure to relay confidential information concerning an
act of unlawful interference. Measures should ensure that persons, including aircraft operators acting in an
official capacity, do not divulge information likely to jeopardize the safety of international civil aviation to the
press or to others.
1
ICAO has developed Aviation Security Training Packages (ASTPs) for Negotiators (Levels 1 and 2). Check ICAO website
www.icao.int under aviation security.
Volume V - 15
Volume V-16 Security Manual Doc8973/7
a) operators shall establish and maintain a training programme which enables crew
members to act in the most appropriate manner to minimize the consequences of acts
of unlawful interference;
3.1.2 This information must be distributed locally to the appropriate authority for security, air traffic
services units concerned, the appropriate airport administrations, the operator and others concerned, as
soon as practicable.
3.1.3 The rapid, systematic collection and dissemination of information regarding such an aircraft
requires close cooperation between security services and related ATS units in each State through whose
airspace the aircraft will, or may, proceed. In particular, close cooperation is required between the
designated security officer and the relevant ATS unit in whose area the unlawful seizure first becomes
known. The object is to ensure that information is collected and transmitted, in a step-by-step manner as the
flight progresses, to the appropriate security services and air traffic services units in each State which may
become involved, so that timely and appropriate safeguarding action may be taken en route and at the
aircrafts known, likely or possible destination. Further guidance is shown in Appendix 1-Compilation and
dissemination of information concerning an aircraft which is being subjected to an act of unlawful
interference.
3.1.4 The initial notification should be sent to all security services and ATS units within an area of
probability to be determined in each case but avoiding unnecessary alerting on too wide a scale.
Circumstances such as direction of flight, range of aircraft, proximity to the borders of other States or to
other flight information regions, and the need to provide any advance warning should all be considered. This
should be done, if possible, within at least one or two hours. As a minimum, all adjacent States along, or in
the proximity of, the projected flight path should be forewarned. It is desirable that all security services and
ATS units follow the same pattern as the flight progresses.
3.1.5 The State in which an aircraft subjected to an act of unlawful interference has landed shall
pass information regarding the landing to the State of Registry and the State of the Operator of the aircraft,
by the quickest possible means, and not later than one hour after the aircraft has landed.
3.1.6 In every case, the recipient of a message should acknowledge receipt so that the originator
knows the message has been delivered.
3.1.7 As soon as circumstances indicate that special security precautions may be dispensed with,
such information should immediately be transmitted by the appropriate authority for security to the affected
States, airports and operators.
3.1.8 The essential information that should be collected and transmitted progressively to those
concerned should include:
2
other ICAO reference documents should be considered as Doc 4444 Procedures for Air Navigation Services Air Traffic
Management
Volume V - 17
Volume V-18 Security Manual Doc8973/7
c) supplementary flight plan data such as fuel endurance (expressed in hours and
minutes, if possible) and number of crew and passengers on board;
d) the composition of the flight crew and its knowledge and experience of the anticipated
route;
f) the availability on board the aircraft of navigation charts and associated documentation;
and
g) flight time limitations of the flight crew taking into account the number of hours already
flown.
3.1.9 In addition, the following information should be forwarded, to the extent that it can be
obtained:
a) the number, names and nationalities of passengers and, if possible of the offenders;
c) the number, type and any other information on weapons, explosives and incendiary
material, devices or other substances known or believed to be in the possession of the
offenders; and
d) the physical condition of the flight crew and IFSOs if present on board.
3.1.10 The most efficient means of disseminating the information are as follows:
a) ATS units along the flight route collect and transmit to other ATS units concerned, all
information required for ATS and search and rescue (SAR) purposes; and
b) security services in each State along the flight route collect and transmit information to
other security services concerned using the designator YZY to identify and thereby
expedite delivery of messages.
3.1.11 Each State in which an aircraft subjected to an act of unlawful interference has landed is
required to notify by the most expeditious means the State of Registry of the aircraft and the State of the
operator of the landing and similarly transmit by the most expeditious means all other relevant information
to:
a) the State of Registry and the State of the Operator of the aircraft;
d) each State whose citizens are/were known to be on board the aircraft; and
e) the International Civil Aviation Organization (ICAO) and any other relevant
international/regional organizations.
3.1.12 In order that threat information may be disseminated immediately, taking into account confi-
dentiality and local requirements, one of the following means of communication may be used:
a) telephone, electronic mail, telegram or the aeronautical fixed service (AFS) circuits to
report an incident likely to occur within the next 12 hours;
b) telegram, electronic mail or AFS to report an incident likely to occur sometime after the
next 12 hours and within the next 12 days;
c) registered airmail or telegram to report an incident likely to occur more than 12 days
hence; and
3
d) the ICAO Aviation Security Point of Contact (AVSEC PoC) network .
3.1.13 Designators should be used to identify communications intended for the airport security
services as published in the ICAO Designators for Aircraft Operating Agencies, Aeronautical Authorities and
Services (Doc 8585).
3.1.14 When a State has intelligence or other information which indicates that specific aircraft may
be subject to an act of unlawful interference, the aircraft operator concerned and any airports at which the
aircraft might land are to be notified to enable them to respond and implement any additional security
measures considered necessary to counter the threat and any increased risk assessment by the appropriate
authorities.
3
for further information on the ICAO AVSEC PoC network, please contact SGM Section at sgm@icao.int
Volume V - 19
Volume V-20 Security Manual Doc8973/7
4.1.2 Flight information service should be provided in accordance with Annex 11-Air Traffic
Services and the PANS-ATM. Alerting service (Annex 11 and PANS-ATM), search and rescue (Annex 12-
Search and Rescue), and those procedures relating to emergencies and radio communications failure
(PANS-ATM), should be called for and provided as dictated by the circumstances surrounding each
occurrence.
4.1.3 States should plan for the possibility of an unlawful act of interference occurring to an
aircraft while it is within the jurisdiction of their air traffic control facilities. A notification system should be
developed which would utilize radar transponder coded transmission, voice communication, visual signals
and other suitable methods. Specific air traffic control instructions should be published. Where transponder
coded transmission is not available, the use of the term channel 7500 immediately after the aircraft call
sign in transmissions to air traffic control can be a useful contingency. Other alternatives, involving other
words not common to air traffic service normal terminology, are similarly useful.
b) immediately notify their supervisor upon receiving information that indicates the unlawful
seizure of an aircraft. The supervisor should immediately notify the following:
the appropriate authority for security and the civil aviation authority (if the two are
not one and the same);
the appropriate airport administration;
the appropriate search and rescue agency, as required;
the owner/operator of the aircraft;
other government organizations;
adjacent air traffic service units; and
c) comply with the following when controlling an aircraft that has been unlawfully seized:
4.1.5 In cases of emergency it may be necessary, in the interests of safety, for an aircraft to enter
an airport traffic circuit and effect a landing without proper authorization. Controllers should render all
assistance possible.
4.1.6 Upon receiving notification of the threat of an act of unlawful interference to an aircraft at the
airport, the controller should immediately notify the appropriate authority, the aircraft operator and the airport
operator, and:
a) if the aircraft is on the ground, deny clearance for its take-off until appropriate measures
have been taken to establish that the threat is false and continuance of the flight may be
authorized, or until the aircraft and contents have been searched and declared by a
competent authority to be no longer under threat. After denying clearance the control
tower should clear affected taxiways and runways and direct the aircraft to taxi or be
towed to the isolated parking position. At the same time, the rescue, fire fighting and
security services should be alerted in accordance with the airport emergency plan; and
b) if the aircraft is airborne, clear the aircraft to land in accordance with established
emergency procedures at the request of the pilot-in-command. In these circumstances,
the decision on the action to be taken should be that of the pilot-in-command. If the
decision made is to continue the flight, then, for the duration of that flight, the aircraft
should be treated as suspect and appropriate separation arranged with contiguous air
traffic services units to ensure that other aircraft are not endangered.
Volume V - 21
Volume V-22 Security Manual Doc8973/7
5.1.1 Security instructions, emergency instructions and contingency plans as parts of crisis
management plan should be developed at the national level and for each airport. The national contingency
plan should focus mainly on incidents involving aircraft in the air, as airport contingency plans should focus
more on incidents occurring on the ground. These instructions should, at the very least, deal with:
a) the measures for re-screening of passengers, baggage, cargo, mail and stores following
a threat;
f) contingency plans, which should contain procedures for the disposal of such items.
5.1.2 Airport contingency plans for aviation security incidents should be compiled in much the
same manner as airport emergency plans are prepared to deal with emergencies of a non-security nature
occurring at airports. The national contingency plan should also follow the same format but focusing more on
incidents or emergencies in the air. More information on the preparation of airport emergency plans is
contained in the Airport Services Manual (Doc 9137), Part 7-Airport Emergency Planning.
5.1.3 To achieve their purpose, the airport and national contingency plans should be set out in an
easily understood manual (inclusion if possible in aerodrome emergency manuals should be considered for
airport contingency plans and inclusion in the national security programme for the national contingency plan)
and should contain the following elements:
a) policies in force;
b) options possible;
c) measures to be implemented;
d) resources available;
e) responsibilities; and
5.1.4 The national contingency plan should be developed in cooperation with all national
agencies/authorities which take part in the resolution of major incidents/emergencies in the State, and its
airspace, considering the abilities, resources and potential of each individual national airport and regions. At
the airport level, each contingency plan should be a coordinated programme between national
authorities/agencies, individual airports and the surrounding community. This is desirable as the planning
and procedures needed to handle major security emergency situations on the airport are similar to other
types of emergencies that can strike a community, particularly in the response of the authority responsible
for police functions and medical aid agencies. The airport contingency plan should spell out the coordinated
response or participation of all existing agencies, both on and off airport, which could be of assistance in
responding to such emergencies, and should designate specific duties to be undertaken by each responding
agency. Examples of such agencies are:
a) government authorities;
c) airport administration;
e) aircraft operator;
g) military;
h) medical services;
j) hospitals.
5.1.5 Each airport/community has individual needs and distinct peculiarities because of political,
jurisdictional and agency differences. However, the basic needs and concepts of security emergency
planning remain the same and common major problem areas which need to be addressed are command,
control and communication.
5.1.6 The elaboration of a contingency plan at one airport is a major project and should respect
the following principles :
a) development of the project, planification, definition of the objectives and the team;
b) identification of the potential risks taking into consideration the strengths and
weaknesses of the airport, States policy as well as the local, national and regional
environment;
5.1.7 Prior to the preparation of a contingency plan, it is essential that a thorough assessment be
conducted to obtain information about the layout and installations at the airport. Any such survey should
include the vulnerable points, the extent of available supporting services within and outside the airport,
facilities for evacuating personnel and diverting aircraft from normal terminals and the availability of
accommodation for the use of police, as well as floodlighting, communications and access points throughout
the airport. The reconnaissance should identify and make a special study of the most advantageous points
at which unlawfully seized aircraft might be positioned.
5.1.8 Up-to-date maps of the airport, plans and photographs of the airport and its environs and
the main types of aircraft in use by the major aircraft operators as well as a scale model of the airport are
invaluable aids to planning and training. If possible, advanced preparation and training of the forces which
might be engaged in the response should be organized for thorough familiarization of the local facilities.
Volume V - 23
Volume V-24 Security Manual Doc8973/7
5.2.1 In order to ensure the effective application of preventive security measures, the level of
threat must be continually reviewed taking into account the domestic, regional and international situations.
5.2.2 Contingency planning to promote coordinated and timely counteraction to the level of threat
is important. To ensure such a counteraction in the event of a serious incident of unlawful interference
involving a national-level government response, national contingency plans should include details on policy,
responsibilities and lines of command and communication from the highest level to the on-site command
and control authority.
5.2.3 Security measures and procedures should be flexible and commensurate with the threat
assessment which may fluctuate given various changing factors. As a consequence, the national civil
aviation security programme must detail the mechanisms for a valid threat assessment process, as well as a
risk management scheme, which must be followed by timely and effective implementation.
5.2.4 Valid threat assessment and analysis can be best achieved by instituting a systematic and
continual process of intelligence collection and evaluation. This will require coordination at the national level
among all responsible entities as well as close cooperation with the regional/international intelligence
community. Guidance material is shown in Appendix-2 - Threat assessment methodology.
5.2.5 Whenever a specific threat exists, selected and predetermined preventive security
measures should be applied depending upon the nature of the threat. The appropriate authority for aviation
security, usually through the civil aviation security policy and regulatory section, needs to analyse the
vulnerabilities of the aviation system in relation to the threat assessment and initiate appropriate adjustments
to the national civil aviation security programme as well as the set of additional security measures to be
implemented for each elevated threat level. Guidance material is shown in Appendix-3 Risk management
model.
5.2.6 Because terrorism is a trans-national problem, an act of unlawful interference can originate
in one State but impact more than one State. Each Contracting State must be prepared for such an
eventuality and have procedures in place to share pertinent threat information with other Contracting States,
at least to the extent practicable taking into account the protection of sources and methods of collection.
Procedures should be designed to disseminate threat information in a timely manner and with the proper
4
controls. Use of the ICAO AVSEC PoC network is highly recommended.
5.2.7 When applying security considerations in airport design, it will be necessary to conduct an
airport threat and risk assessment. It is strongly recommended that these threat and risk assessments be
taken together with national appropriate authorities so that the design of the airport will be flexible enough to
adapt to future security requirements. The sooner proper resources are allocated to threat and risk
assessment of the airport, the better additional requirements will be smoothly implemented without major,
and costly, restructuring. Knowing, even at the design stage, the strengths and weaknesses of an airport as
regards potential terrorist attacks is essential decision-making information.
5.3.1 Contingency plans should be practised and exercised on a regular basis to identify
weaknesses and modifications necessary for the safe conclusion of an actual emergency situation.
Particular emphasis should be placed upon ensuring the operational reliability and compatibility of all
communication equipment which is designated for use during an incident.
4
for further information on the ICAO AVSEC PoC, please contact SGM Section at sgm@icao.int
5.3.2 In addition to major full scale exercises on the overall contingency plans to be conducted at
least every two year, smaller scale exercises in addition to tests, inspections, evaluations and audits of the
different portions of the contingency plans should be organized regularly and at least yearly, as mentioned in
the National Civil Aviation Security Quality Control Programme.
5.3.3 In each case, the result of the exercises, tests, audits and other investigation should be
communicated to the security and airport authorities who should, after due consultations with the concerned
agencies, including the appropriate authorities, aircraft operators, and any other concerned and/or affected
stakeholders re-evaluate security measures and procedures and take such action necessary to remedy
weaknesses. If any changes are contemplated in procedures for screening of passengers, baggage, cargo,
mail and stores, the matter should be discussed by the airport security committee and the appropriate
authorities. Sufficient notice should be given to the concerned agencies to enable them to incorporate the
changes in their procedures.
5.4.1 The national civil aviation security programme must set out, in clear and concise language,
the offices and organizations responsible for the management of each type of occurrence. At the same time,
the contingency plans required by the national civil aviation security programme must provide for flexibility
so that there will be an effective response to unforeseen eventualities which may arise during an
occurrence.
5.4.2 Depending on the importance of the crisis, two crisis teams should be activated, one at the
airport level Emergency Operation Centre (EOC), the Crisis Management Team (CMT) and one at the
national level EOC, the National Coordination and Control Centre (NCCC). The NCCC is composed of high
level Government officials and represents the executive command. The CMT is located at the airport and
represents the operational command of the incident. The CMT receives support from administrative,
logistical and operational groups. The members of the CMT should be selected based upon their
5
competencies, experience and knowledge of different types of crises.
5.4.3 Where the incident involves the taking of hostages, the contingency plan will need to take
into account the need for hostage negotiation and possibly armed intervention to terminate the incident.
Hostage negotiation is a full time job for trained personnel and comprehensive specialized training should be
6
offered to negotiators . The contingency plan will need to specify who will provide negotiation personnel and
lines of command. The provision of other resources such as interpreters, accommodation, communication
facilities and the specific requirements of any armed intervention unit deployed for an incident need to be
included in the plan.
5.4.4 It is essential that the Chief of the CMT has been nominated by the highest authorities of the
State. There should be a clear understanding of who is in charge when a crisis is signalled. The Chief of the
CMT should be experienced, properly trained in crisis management. His title, name and responsibilities
should be clearly indicated in the contingency plan.
5.4.5 As a general rule, the appropriate authority for security will be assigned overall responsibility
for the management of crises. Other government organizations, especially the civil aviation authority, the
authority responsible for police functions and military authorities, the foreign ministry and airport admin-
istrations will be assigned responsibilities in support of the appropriate authority for security. Provisions
should also be made for the involvement and participation of the affected aircraft operator and a senior flight
crew member familiar with the type of aircraft involved when deemed appropriate.
5.4.6 Because of its unique coordinating duties and responsibilities, the civil aviation Security
Policy and Regulatory Section, may be the most suitable organization to which responsibility for the
5 Note: ICAO has developed an ASTP on the Management of aviation security crisis (ASTP/CRISMAN) which details the role,
structure and organisation of CMT.
6 ICAO ASTPs for negotiators (levels 1 and 2) as a basis, in addition to more specialized training offered by full time specialists on
negotiation
Volume V - 25
Volume V-26 Security Manual Doc8973/7
establishment, maintenance and operational readiness of the national EOC should be assigned. This may
not be applicable in all cases, particularly where responsibility for major incident response is with a national
authority responsible for police functions.
5.4.7 The airport security officer will likewise be the most suitable official to whom responsibility
for the establishment, maintenance and operational readiness of the airport EOC should be assigned.
5.4.8 In addition to those listed in Part 7 of the Airport Services Manual, resources and expertise
required to deal effectively with an act of unlawful interference involving an aircraft will include some or all of
the following areas:
d) hostage negotiation;
e) psychiatry/psychology;
f) communications;
5.5.1 A controlled area should be established covering the main incident area. Within the
controlled area, an outer and an inner cordon should be established surrounding the actual incident with a
forward control point (FCP) to control all access to the inner cordon. The cordons are normally protected by
armed personnel. The purpose of the outer cordon is to protect the incident site and prevent access to the
site by the public, press or non-essential airport/aircraft operator staff. The purpose of the inner cordon is to
isolate the incident and prevent access by anyone not directly involved in the resolution of the crisis. Access
to the inner cordon is permitted only with the agreement of the FCP commander. In the case of an act of
7
unlawful seizure it is important that the FCP be mobile. An example incident site is illustrated in Figure V-1.
5.5.2 Plans must include traffic control around the airport and within the landside areas of the
airport to allow rapid access and exit of emergency vehicles and any other persons or agencies needed at
the airport that may be needed to resolve the incident. A rendezvous point and staging area should be
nominated outside the inner cordon for all agencies arriving at the incident site. Emergency services such as
fire and ambulance crews should be on stand-by at the rendezvous point outside the outer cordon to be in a
position to quickly intervene should there be an explosion or fire.
7
Note: ICAO has developed an ASTP on the Management of aviation security crisis (ASTP/CRISMAN) which details the functions
and coordination at the incident site.
National
command
control
INCIDENT centre
Inner cordon
FCP
5.6.2 Airport emergency procedures should designate one or more points to which affected
aircraft might be directed. However, plans must be flexible enough not to rely on such an aircraft being able
to park at a designated point and must allow for the aircraft to change its position. The following should be
taken into account in selecting designated points:
a) the availability of covered approaches to facilitate action by the security forces; for
example, adjacent buildings, natural features such as undulations in the terrain and the
presence of trees;
b) the need for police and other units to have quick and easy access to the scene to deal
with the situation;
c) the possible danger to other aircraft or people in the vicinity, and hazards such as fuel
tanks;
d) the need for isolation from the press and public; and
Volume V - 27
Volume V-28 Security Manual Doc8973/7
e) the continuance, as far as possible, of normal air traffic in and out of the airport during
the incident.
5.6.3 Care should be taken to ensure that there is no services such as gas pipelines, refuelling
hydrant pipes, other fuel lines or electric power cables beneath the aircraft parking area surface. If possible,
a second isolated parking may be designated in case the primary isolated parking position is unavailable or
in case of multiple crises.
5.7.2 The airport security officer should survey the airport and predetermine the routes to the
disposal area from all likely locations at which suspect explosive devices or substances may be discovered
on the airport in order to determine the safest routes over which they should be transported. In conducting
this survey, consideration should be given to the best routes which avoid other parked aircraft, buildings,
public areas, fuel and electric power installations, natural gas pipelines, communication and navigation aids.
There should always be more that one route from any location on the airport to the isolated disposal area.
5.7.3 When the explosive disposal technician is moving such a device or substance, care should
be taken to eliminate the possibility of electronic signals from airport installations triggering the activating
mechanism. The use of mobile and hand-held transmitting equipment within 30 m (or 10 m for low-powered
transmitters) of the suspect device should be avoided.
5.7.4 In order to minimize the effect of an explosion, the provision of a blast containment area
should be considered. Explosive disposal experts should be consulted, and any facilities that they require
should be provided. Along with the provision of a shelter to permit explosive disposal experts to work
efficiently, the construction of the blast containment area should allow for a vehicle carrying the device to
drive inside for unloading.
5.7.5 Some explosive devices are actuated by simple pressure-sensitive mechanisms that
operate when a pre-set altitude is reached. To check suspect baggage, cargo or mail that may contain such
a device, a chamber which simulates changing atmospheric conditions is helpful in this respect. At the same
time, all other flight conditions likely to be encountered, including sonic and electronic signals generated by
aircraft engines and equipment, should be simulated.
5.8.1 The contingency plan for dealing with an incident of unlawful interference at the national and
the airport level, when implemented, will need to be controlled from a central location. This will best be done
from a command or emergency operations centre (EOC). Information on the planning, establishment and
operation of airport emergency operations centres can be found here below and is published in the Airport
Services Manual (Doc 9137), Part 7 Airport Emergency Planning. That material covers all types of major
emergencies likely to occur on or near an airport and will be useful should the need for an EOC at the
national level be decided upon. The operational readiness of each EOC must be tested periodically.
5.8.2 It is necessary that the airport EOC be provided with a flexible and effective communications
capability which will permit direct communications with the affected aircraft as well as with ATS and all
security services units whose assistance is likely to be required at the airport.
5.8.3 Annex 14 - Aerodromes stipulates, in the form of a Standard, that aerodrome emergency
plans shall be developed which provide for the coordination of actions taken in an emergency occurring at
aerodromes. A fixed emergency operations centre (EOC) providing a forum for that coordination is a
Recommended Practice in that Annex.
5.8.4 Experience has shown that a well-operated and equipped EOC is indispensable in the
management of a response to an act of unlawful interference. The EOC acts as a focal point for the control
and coordination of all responding agencies and, as such, the procedures for its use and staffing should be
clearly designated in the contingency plans.
5.8.5 The EOC should be located in an area off airport property that is easily accessible. The
EOC has to be permanently accessible and it must be possible to reach the EOC in the shortest time
possible. The EOC environment should be spacious and open to make it possible for the group to operate in
a stressful environment without interfering with each others work.
5.8.6 The EOC should have at least the following equipment and characteristics:
a) enough desk space, chairs and office supplies to accommodate all members of the
EMT;
c) all modes of telecommunication: radio, television, enough phone lines, cellular phones;
d) be stocked with up-to-date maps of the airport, plans and photographs of the airport and
environs and the main types of aircraft used by the major aircraft operators as well as a
scale model of the airport;
g) operational display boards, airport maps, site plans, floor plans, infrastructure plans
(water, sewer, electric, gas);
i) nearby area reserved for media, families and next of kin; and
j) easy access.
5.9 COMMUNICATIONS
5.9.1 Communications, unless already in position, are likely to be a major problem. Contingency
arrangements for advising telephone authorities must be made in advance. Links will be required between
the forward control point and personnel deployed within the inner cordon. Links are also required with the
EOC. Radio is probably the only system that gives the required degree of flexibility, but it must be
remembered that radio transmissions may be overheard by the perpetrators, the press and others unless
encryption or secure transmission methods are used.
5.9.2 The early establishment of secure land lines from the forward control point to the EOC, to
the negotiators and to the control tower is highly desirable. At the EOC, good internal communications are
required and there should be secure communication links to the government control centre, police
headquarters, emergency services, airport authorities, the control tower and the aircraft operator concerned.
Volume V - 29
Volume V-30 Security Manual Doc8973/7
5.9.3 Maximum use should be made of hard-wired telephones but, where cellular or mobile
telephones are required to be used during an emergency as an alternative to radio or landline communications,
they will require special configuration. The cellular or mobile phone service provider should be requested to
arrange for immobilization of all non-essential cellular or mobile telephones within the area of the incident.
5.10.1 The pressure of media interest at a major security incident will be considerable. It is
important that the media are dealt with fairly but firmly to ensure that they do not publish information which
might prempt action planned or being taken by the security forces. Control of information about the situation
is paramount as, in the past, police and aircraft radio communications have been intercepted and
rebroadcast as news items over the public networks. Camera teams have also been known to infiltrate the
incident area and film operations. This can dangerously heighten the tension among the perpetrators while
premature disclosure of information regarding operations can frustrate tactical plans.
5.10.2 However, it is also advisable to ensure that the media are treated with consideration and are
given information and assistance as is possible without compromising the safety of the passengers involved
and the police and security personnel dealing with the situation. If the media are denied all information they
will become frustrated and be unlikely to co-operate with police requests. They will instead pursue
information by all means and, intentionally or not, reduce the possibility of a peaceful solution. An initial
agreement with the media is required to have regular press briefings in a dedicated press room (for example
every hour or second hour) so that only official and safe information will be communicated by the media
officer selected by the police and the CMT. In addition, press releases should be approved by the Chief of
CMT before being disseminated.
5.10.3 The appropriate authority for security and other entities involved in the management of acts
of unlawful interference should exercise restraint in providing information that may be disseminated to and
by news media in respect of acts of unlawful interference, during or after the occurrence. In particular
publicity should be minimized about the actual methods and planning used by the offenders and the security
measures applied by States to prevent acts of unlawful interference.
5.11.1 There should be separate facilities, other than at the EOC, to deal with the public who will be
8
making enquiries concerning persons involved in the incident. A Telephone and Information Centre (TIC)
will need to be set up, which need not be necessarily at the incident site, with a dedicated telephone
number, and trained staff, to cope with the high volume of calls from public, relatives and friends of persons
involved. Incoming overseas calls in different languages should be expected. As relatives and friends might
provide useful information for the resolution of the crisis (name, age, nationality, physionomy, health
condition, etc.), it is essential to develop a predetermined and systematic collection system (special detailed
forms collecting details on passengers and on the persons calling) so that proper intelligence analysis could
be made by the CMT (and not the TIC which should concentrate on the collection of information and first-
level analysis such as the real list of persons involved). All information provided by the TIC to the public,
relatives and friends should be closely coordinated with the CMT and the media officer.
5.11.2 In addition to the high volume of calls arriving at the airport of the incident, some relatives
and friends might be present at the airports of departure, of destination, or of the incident in case the
incident is taking place at another location. The relatives and friends present at the airport of the incident
9
should be isolated from the rest of the public in a Rest and Debriefing Centre (RDC). The RDC should be
separated from the TIC, and the EOC, and ideally isolated from the public area of the airport. The main
functions of the RDC are to assist relatives and friends during a very difficult period, remove the pressure of
dealing with stressful persons from the entities directly involved in the resolution of the incident and also to
collect additional information on the persons involved or victims of the crisis. The forms used by RDC should
8
More information on TIC in Volume III Airport Design
9
More information on RDC in Volume III Airport Design
follow the same format as the TIC ones, but clearly indicate that the source of information is physically
present at the RDC. All RDC forms should be forwarded to TIC before being sent to CMT. Further interviews
of relatives and friends at RDC might be decided by CMT for confirmation and intelligence purposes.
5.11.3 It is recommended to exercise TIC and RDC functioning on a very regular basis, at least
once a year, to maintain high expertise of its staff, as well as speed and adequacy of processing. In the case
of injuries or casualties, the information collected by TIC and RDC on the relatives and friends is of
paramount importance for police.
5.12.1 It is very important that the airport contingency plan should clearly reflect, in accordance
with the national aviation security programme, responsibility for the evaluation of all potential bomb or other
violent threats, whether they affect aircraft on the ground or in flight, or buildings on the airport. Bomb
assessors must be appointed and appropriately trained in order that they can assess the threat and give
guidance to what security measures are considered appropriate to counter the threat received.
5.12.2 Each bomb threat received by telephone, written message or other means of
communication alleging that an unlawful act will occur at an airport or in the air must be considered serious.
Each threat should be thoroughly investigated and reported immediately to safeguard the public. Appropriate
individuals should be familiar with a specific reporting format, an example of which is shown in Appendix-4 -
Action by the recipient of a bomb threat telephone call.
5.12.3 While some States, due to the existing local situation, may call for a more stringent
evaluation of threats, experience has shown that the following technique in assessing threats is reliable in
most circumstances.
5.12.4 A systematic procedure to assess bomb threats is necessary to ensure, as far as possible,
that whenever there exists an actual bomb or other device the assessment leads to positive action and,
where the warning is a hoax, the assessment results in the minimum disruption to operations.
5.12.5 Such a procedure has been devised by several States using a technique called Positive
Target Identification (PTI). The methodology was designed to lead a bomb assessor to a logical conclusion.
Positive Target Identification will assist in classifying the threat as:
a) specific;
b) non-specific; or
c) hoax.
5.12.6 The process of PTI is to use the specificity of the information contained in the threat to
determine the credence to be applied to it. The more information given by the caller (most threats are made
anonymously over the telephone), the more likely the threat should be taken seriously. Further guidance on
Positive Target Identification and its use can be found in Appendix-5-Bomb threat assessment.
5.12.7 Annex 6-Operation of Aircraft requires that operators establish and maintain training
programmes which enable crew members to act in the most appropriate manner to minimize the
consequences of acts of unlawful interference.
5.12.8 After assessing the situation, the pilot-in-command should communicate the circumstances
concerning the threat to an air traffic services unit. However, serious consideration should be given to the
consequences which may occur as a result of any action being taken by air traffic services, or other
authorities of a State, that is contrary to the requests of the pilot-in-command.
Volume V - 31
Volume V-32 Security Manual Doc8973/7
5.12.9 The Tokyo Convention specifies the powers of the pilot-in-command while in flight and
authorizes specific action to be taken by that officer in the event of an unlawful act. In addition, the pilot-in-
command shall have command over all crew members including any security guards. If the pilot-in-
command is unable to do so, another qualified member of the crew should assume command, in
accordance with the sequence provided for in the operators manual. All crew members under direction of
the commander shall assist that officer in every way.
5.12.10 Full account should be taken of the possibility that a person committing an unlawful act on
board an aircraft in flight may be in an unstable state of mind or extremely volatile or nervous. Crew
members should therefore:
a) refrain from unnecessary conversation or actions which may irritate the individual;
b) exercise due care to ensure that the passengers do not become excited or, in an
attempt to overcome the individual, resort to action which may jeopardize safety. One
practicable measure to restrain passengers would be to instruct them to fasten their
seat belts; and
5.12.11 Of prime importance to the safe conduct of the flight is the security of the flight crew
compartment. Once the unlawful seizure has commenced, an attempt should be made to dissuade the
offenders from entering the flight crew compartment.
5.12.12 In many cases, the destination of an aircraft subject to an act of unlawful interference will be
in a region for which the flight crew does not possess the necessary flight documentation and manuals. It is
therefore desirable that the flight crew be supplied with a condensed set of valid emergency navigation
material for possible diversionary landing locations that are not on the scheduled route. This technical/
navigational emergency kit will assist the crew to land an aircraft safely at an airport with which they are not
familiar but which lies within the range of the aircraft. Additional guidelines on crew actions in the case of an
act of unlawful interference can be found in "Manual on the Implementation of the Security Provisions of
Annex 6 - Doc. 9811 Restricted.
5.12.13 When a bomb threat is associated with an aircraft that is still on the ground, and once the
warning has been assessed, aircraft operators in consultation with airport authorities and other responsible
law enforcement entities should:
a) disembark all passengers and crew with all cabin baggage by steps or jetties. Escape
slides should only be used in extreme emergencies;
b) move the aircraft to a remote location such as the isolated parking position;
c) isolate and re-screen all passengers and their cabin baggage and hold them in a
separate area until the crew members, hold baggage, cargo and catering supplies have
been inspected/screened, searched and declared safe;
d) unload all hold baggage and require passengers to identify their baggage, which should
then be screened or searched before it is re-loaded;
e) unload all cargo which should then be screened or searched before it is re-loaded;
5.12.14 In case of bomb threat the aircraft should be searched only by designated and appropriately
trained staff supporting responsible for such searches law enforcement authorities.
5.12.15 In the event of a bomb threat in flight, responsibility for the decisions taken rests with the
pilot-in-command. In dealing with a bomb threat directed against an aircraft in flight, it may be necessary for
some or all of the following actions to be taken:
5.12.16 Further guidance on actions to be taken in the event of a bomb threat in flight can be found
in Appendix-6 - Response to bomb threats against aircraft.
Searching procedures
5.12.17 Specific supplementary procedures and measures should be provided by airport authorities
or the aircraft operator, depending on whether the bomb alert or the discovery of a suspect explosive device
concerns an aircraft in flight or on the ground or a building or area of the air terminal or airport. A search plan
and checklist should be available on each aircraft. The checklist should be developed by the aircraft
operator' s engineering department. Different checklists should exist for each different type of aircraft and
cabin configuration.
5.12.18 The searching of a building or aircraft for a suspect explosive device identified by a bomb
threat should follow the basic guidelines:
a) searches will be most effective if carried out by staff familiar with the building or aircraft
concerned;
b) searches must be carried out in a systematic manner and areas cleared should be
marked distinctly;
Volume V - 33
Volume V-34 Security Manual Doc8973/7
c) strict access control to the building or aircraft being searched must be imposed and
maintained during the period of the search;
d) search teams should be briefed not to touch or interfere with any unusual object which
they might discover but to immediately alert the person responsible for the search party;
and
e) suspect explosive devices found by the search should be marked distinctly and the
immediate area cordoned off.
5.12.20 The large number of aircraft in service throughout the world makes it impossible to provide
in this manual recommended aircraft inspection procedures that will be adequate in all cases. Aircraft
operators should develop an aircraft search procedure checklist for each type of aircraft in service and
include this checklist as part of the flight crew security kit. (Refer to Appendix-7 - Aircraft security search
checklist for assistance in this process.) A training programme should be established and maintained for
all flight and cabin crew members.
5.12.21 To avoid duplication of effort, the search of an aircraft should be conducted systematically
by staff familiar with the particular aircraft who are provided with a checklist and assigned to specific areas of
the aircraft. Attention should be given to those areas to which passengers have had access, such as main
cabins, galley areas and toilets but searches should also include the flight deck, or any lower cabin
compartment accessible in flight.
5.12.22 In general, a search should be conducted with extreme caution, using flashlights and
mirrors when searching in confined to dark areas. Areas to be searched should include all quick-latch or
easy access doors. Equipment areas should be searched carefully as there is the possibility that a bomb
may be hidden in, behind or under equipment. It may not be necessary to search some areas if a door,
compartment or piece of equipment is properly sealed or secured and there is no evidence of tampering.
5.12.23 It is difficult to give guidance to search teams about the appearance of suspect explosive
devices as they can be disguised in many ways. Search teams should be briefed to look for unidentified
objects or anything:
5.12.24 In view of the possibility that explosive devices and weapons may be concealed within
aircraft equipment or components, searches of aircraft considered at higher risk should be conducted by
trained and competent security personnel assisted where necessary by aircraft crew or aircraft engineering
support personnel.
5.12.25 Further action should be taken in accordance with Appendix-8-Suspect explosive devices
and Appendix-9-Search and evacuation guidelines.
Evacuation procedures
5.12.26 If the airport or building management, in consultation with the airport security officer,
decides on evacuation, the airport security officer should direct which floor(s) or area(s) are to be cleared. In
single or two-floor buildings, evacuation can be executed with relative ease; however, in a building of more
than three floors, evacuation should usually be limited to the immediate area where the suspicious article or
substance is found, or the area that is specifically identified in the threat and the equivalent space on the
floors immediately above and below.
5.12.27 The decision to evacuate buildings to which the public is normally permitted access should
be made by the building management, preferably after consultation with the airport security officer and/or the
policing authority. Operators should establish similar procedures for their own buildings. The following
factors should be taken into account:
a) the number and frequency of false threats and the effect evacuation of buildings has on
the frequency of such threats;
c) the problems and hazards created by evacuation of public areas (where the general
public is permitted access).
5.12.29 Air traffic services administrations should develop specific procedures to cover the possible
need for evacuation of air traffic services (ATS) units in the event of a bomb threat. Such procedures would
basically be the same as those to be applied in cases of inactivation of ATS units due to fire, natural
disasters or complete breakdown of essential communication facilities.
The procedures should take account of the location and staffing of the ATS units, the amount and type of
traffic handled, any alternative means available for ensuring continued provision of air traffic services and
the available communication facilities.
a) the authority for and the means and methods of issuing orders for evacuation;
b) the unit or units to which the responsibility for temporary provision of air traffic services
should be transferred;
c) the means and methods of notifying the unit(s) mentioned in b) and of transferring
essential flight data to such units;
d) the means and methods of notifying aircraft in flight of the situation and of the
procedures to be applied by them;
f) the means and methods of notifying aircraft on the ground and operators of the
situation; and
5.12.31 It is recognized that in many cases, e.g. where large area control centres or approach
control offices are affected, considerations of the safety of passengers, crew members and aircraft will
militate against the complete closing down of the ATS unit. In such cases, it is important that the procedures
provide for a reduction of the ATS staff.
Volume V - 35
Volume V-36 Security Manual Doc8973/7
5.12.32 Search procedures for buildings described in Appendix-9-Search and evacuation guidelines
should be adapted and applied to buildings in which ATS units are located, as required.
6.1.2 The results of this review and analysis should be made available to all participants, along
with the recommendations of the national civil aviation security policy and regulatory section for general
improvement and for the correction of any deficiencies identified. Any action a State deems necessary to
correct a deficiency is to be notified to ICAO at the earliest opportunity.
6.1.3 Following review and analysis, the appropriate authority for security should conduct, or
arrange for an overall critique of the occurrence which should be attended by all airport and operators
security officers, members of security committees and others who may have an official interest. The purpose
of this critique is to share the experience with those who were not directly involved so that they will benefit
from it and be better prepared to respond to future occurrences in which they may be involved.
6.2 REPORTS
6.2.1 The reporting of acts of unlawful interference is important, and States concerned with an act
of unlawful interference must provide ICAO with all pertinent information concerning the security aspects of
the occurrence as soon as practicable after the act is resolved. States should, whenever appropriate, furnish
copies of reports prepared for ICAO to other States which may have an interest.
6.2.2 Information provided by States will be analysed by ICAO with a view to facilitating the
Councils consideration of proposals for new or revised Standards, Recommended Practices or procedures
intended to safeguard civil aviation against acts of unlawful interference. It is also used to develop additional
guidance material for inclusion in this manual and other appropriate ICAO documents.
6.2.3 Experience has shown the development of new patterns and trends involving acts of
sabotage, bombings, bomb threats and extortion. It is therefore logical to expect the continued development
of new patterns covering a wider range of unlawful acts.
6.2.4 An effective international and national civil aviation security programmemust provide for the
revision of security measures and procedures from time to time in order to compensate for the development
of new patterns as well as new methods and techniques used in committing acts of unlawful interference.
6.2.5 It is therefore essential that States call for, and provide ICAO with, reports on the non-
political aspects of all types of occurrences. These reports should be fully analysed by the State, appropriate
conclusions drawn and meaningful information and recommendations disseminated so that effective
safeguarding action may be taken. Reports should be submitted promptly and should include details of
deficiencies in States programmes revealed by a review/analysis and critique of the occurrence and/or
plans for improvement of the methods and procedures that failed.
6.2.6 The details of important developments such as new or unusual methods of operation and
techniques used by perpetrators must be promptly disseminated to the appropriate authorities for security of
airports at which similar techniques may be used. While public knowledge of such matters is undesirable, it
is essential that all airports which are liable to experience similar occurrences, particularly those in adjacent
States, be informed as soon as is possible. Such action will facilitate the early development and
implementation of effective countermeasures and procedures.
Volume V - 37
Volume V-38 Security Manual Doc8973/7
6.2.7 Each State shall provide ICAO promptly with reports on each incident of unlawful seizure,
both successful and unsuccessful, as preventive measures are the keystone to the aviation security
programme. A complete final report often involves considerable investigation, and its completion may not be
possible before the lapse of several weeks after the incident occurs. Therefore, in order that ICAO may keep
abreast of changing patterns, the following reports are requested:
6.2.8 The reports have been designed to accommodate any act of unlawful interference as follows:
c) unlawful act against the safety of civil aviation (including acts of sabotage, malicious
damage, bombs and other explosive devices and substances found on airports, aircraft
or in airmail, air cargo, baggage, etc.);
e) any other act of unlawful interference (including armed attacks at airports and other
unlawful acts directed toward off-airport personnel, facilities, vehicles and other acts
which have the potential to develop into a threat to international civil aviation and its
facilities); and
6.2.8 Preliminary reports, in one of the working languages of the Organization, should be
prepared by the appropriate authority and forwarded to appropriate States and to ICAO by airmail within
thirty (30) days of the occurrence. Should immediate remedial action be required, appropriate States and
ICAO should be provided with the pertinent details as soon as the information is known and by the most suit-
able and quickest means available.
6.2.9 If possible, final reports should be sent within sixty (60) days by the appropriate authority of
each State (at least the State in which the occurrence originated and the State in which the occurrence was
terminated) to:
a) the State which instituted the investigation, if it delegated responsibility for the
investigation to another State;
d) any States whose citizens were killed, injured or detained as a consequence of the
occurrence;
e) any State which provided relevant information, significant facilities, experts or other
assistance; and
f) ICAO.
6.2.10 In the interests of safeguarding civil aviation against acts of unlawful interference, the
investigating States should publish their final reports, and further updates if needed, on an occurrence as
soon as possible and provide a copy to ICAO.
6.2.11 The investigating authority should, at any stage of an inquiry into an occurrence,
immediately provide the appropriate authorities for security, including those in other States, with
recommendations on the remedial action which needs to be taken promptly to prevent similar occurrences.
Such action should not be deferred until completion of the final report.
Volume V - 39
Volume V-40 Security Manual Doc8973/7
APPENDIX-1
COMPILATION AND DISSEMINATION OF INFORMATION
CONCERNING AN AIRCRAFT WHICH IS BEING
SUBJECTED TO AN ACT OF UNLAWFUL
INTERFERENCE
OBJECTIVE
1. The purpose is to ensure that all pertinent information concerning an aircraft which is being
subjected to an act of unlawful interference is available to those States likely to be affected by the flight so
that timely and appropriate decisions and action may be taken to safeguard the passengers and crew
members, the aircraft, all other civil aircraft in its vicinity, and others likely to be affected by that aircrafts
operations.
f) number, type, and other details, of weapons, explosive and incendiary devices known or
believed to be in the possession of the offenders or explosive/incendiary devices found
on board the aircraft;
h) composition and competence of the flight crew for the intended flight;
i) number of hours previously flown by the flight crew and flight time limitations; and
j) navigation charts and associated documentation available on board for the intended
route and destination.
3. The sources from which the information may be obtained and the offices or officials who
might require it are tabulated in the attachment A to this appendix.
ASSIGNMENT OF RESPONSIBILITY
4. A number of variable factors will determine whether or not the required information is
available from the operator, Air Traffic Service (ATS) units or the security services. They include:
a) when, where and under what circumstances the unlawful act first became known;
b) what, if any, communication with the flight crew and/or offenders has been possible or
permitted;
c) the route and destination changes which ATS units observe or of which they are
advised;
d) the feasibility of determining: injuries to persons on board; the fuel reserves, stores,
including essential food and water, and airworthiness of the aircraft; status, composition
and competence of crew members; the number of hostages taken on board the aircraft
and the circumstances prevailing at that time;
e) feasibility of determining the number, type, etc., of weapons, explosive and incendiary
material and devices in the possession of the offenders, or explosive/incendiary devices
found on board the aircraft; and
f) the role of the operator, particularly in those cases where the operator:
5. It is not desirable to assign responsibility for compilation and dissemination of all the
information required for security purposes to a non-governmental entity such as the operator who may not
always have a representative available at the airports where the aircraft has landed or is likely to land.
Further, assignment to ATS units of this responsibility for compiling non-ATS information, at a time when
ATS units may be carrying a maximum workload, will be undesirable. It is therefore recommended that
primary responsibility for the compilation and dissemination of the information required for security purposes
be assigned to a designated security service.
6. However, ATS units and the operator should be required to assist, to the extent feasible, in
compilation of the required information. Assignment of responsibility at this level and in the following manner
would be appropriate:
a) the operator: to provide all available pertinent details that are not contained in the flight
plan;
b) ATS units: to provide all ATS information available, assisting, when possible, in
obtaining from the pilot such other information as is required; and
c) the designated security service: to collect, compile and collate all of the required
information, including specialist advice requested by the pilot-in-command, and to
immediately transmit such information by the fastest available means to other security
services likely to be affected and to the pilot-in-command when deemed necessary or
desirable, at the same time informing the appropriate authority for security of the action
taken.
Volume V - 41
Volume V-42 Security Manual Doc8973/7
Note. In some cases, it will be desirable to use the operators communications capability as it may be the
fastest means available.
DISSEMINATION OF INFORMATION
7. The urgent nature of each act of unlawful interference makes it necessary for pertinent
information to be transmitted immediately as it becomes known and by the quickest means available to
permit the timely implementation of plans for safeguarding the affected aircraft and all other aircraft likely to
be affected by its operation. Therefore, the ATS unit which first becomes aware of an aircraft which is being
subjected to an act of unlawful interference should transmit an initial alerting message containing all
available pertinent information to those ATS units which might be affected having regard to the fuel
endurance of the aircraft, the possibility of sudden changes in destination and other relevant factors.
8. As the flight progresses ATS units should transmit updated information required for ATS and
SAR purposes in accordance with Annex 11 and the PANS ATM.
9. As a parallel action, the security services in the States concerned should transmit all the
available pertinent information to the security services at the aircrafts known or suspected destination and to
the security services in the States expected to be overflown.
10. The requirements for ATS units to forward information relating to an aircraft which is being
subjected to an act of unlawful interference are currently covered by provisions contained in Annex 11 and
the PANS ATM.
11. To summarize the series of actions that are envisaged as a requirement to meet the
objective:
a) ATS informs the designated security services and the operator immediately when it is
known, observed or suspected that an aircraft has been subjected to an act of unlawful
interference;
b) if the aircraft is diverted from its original route and its destination is unknown, ATS units,
using the available flight plan details and all other reliable information, attempt to
determine the actual or suspected route(s) and/or destination and notify the designated
security services and the operator accordingly;
c) ATS transmits an alerting message to all ATS units which might be concerned with the
flight giving such details as are available;
d) ATS requests supplementary flight plan data from the ATS unit at the airport of
departure;
e) the operator assists in providing the required information to the designated security
services;
f) the security services collect all the data required and transmit it as specified in
paragraph 9;
h) the security services at the airport of intended or assumed landing initiate the airport
emergency plan for safeguarding injured or ill persons, the passengers and crew
members and the aircraft. If necessary, plans for dealing with a major disaster resulting
from an accident on landing or a subsequent explosion and/or fire on board the aircraft
will also be implemented by the airport security services; and
i) an arrival message, and any subsequent changes thereto, is sent by ATS to the airport
of departure and to all addressees on the alerting message when the aircraft arrives at
its final destination and the act of unlawful interference has been concluded, parallel
action being taken by the security services.
Volume V - 43
Volume V-44 Security Manual Doc8973/7
Attachment A to Appendix 1
TABULATION OF THE INFORMATION REQUIRED, BY WHOM AND THE POSSIBLE
SOURCE
(for an act of unlawful interference affecting more than one State or airport)
deviations from the intended or designated security services if the pilot is not communicating
assumed route with the ground, radar-equipped
operator ATS units may be able to provide
useful information in respect of
deviation from the route
Volume V - 45
Volume V-46 Security Manual Doc8973/7
APPENDIX-2
THREAT ASSESSMENT METHODOLOGY
INTRODUCTION
1. Annex 17 requires that each Contracting State constantly review the level of threat to civil
aviation operations within its territory and adjust relevant elements of its national civil aviation security
programme accordingly. This requirement addresses two concepts-threat assessment and risk
management-which together form the basis of a viable and cost effective security response to those threats
that target civil aviation.
2. One of the most difficult tasks for aviation security professionals is devising an effective
security plan that correlates to the threat against civil aviation. Accurately identifying the threat or threats
must be the first step in the process.
3. A methodology on threat assessment has therefore been developed and is described in this
appendix. There are multiple benefits to using this methodology. It is versatile enough to assess threats to
an aircraft operator, an airport or a State. Secondly, as most organizations have limited human and
technological resources, a valid threat assessment can still be made without receiving significant intelligence
information or employing a lot of specialized personnel because it uses a quantitative analytical approach.
Furthermore, one of the primary benefits to using this methodology is that it offers a reliable procedure to
identify the threat which, in turn, assists security professionals and other decision-makers in optimally
allocating funds, acquiring critical security equipment and deploying manpower. This last aspect is part of
the risk management concept and is addressed in the Appendix 3.
4. It is readily acknowledged that the responsibility for assessing the nature and level of
threats to civil aviation within a State may be delegated to another entity, such as an intelligence service or a
military component, and not to the Civil Aviation Authority. This guidance material is therefore provided
primarily to assist a Contracting State in meeting its requirement under Annex 17 if it has no other usable
threat assessment process for civil aviation. The intention is that the appropriate authority responsible for the
threat assessment considers adapting this model as necessary to fit the States particular circumstances.
ANALYTICAL PROCESS
6. In undertaking the task of assessing the threat to civil aviation, there are several sources of
empirical evidence and statistical data available in the fields of intelligence and aviation security from which
to form an analysis of past trends of acts of unlawful interference involving international civil aviation. In
order to provide decision-makers with a current and credible threat assessment, however, multiple sources
of information should be explored. Because it is often difficult to come across dependable information
regarding threats to aviation, the analyst must optimise the sporadic and vague information that is available.
Analysts of this type of information, whether they be trained intelligence specialists, law enforcement officers
or aviation security professionals, should therefore routinely assess both current intelligence and historical
data in determining the threat and its impact on air operations and the safety of the air travelling public.
7. It is important to note that when making the threat analysis, the analyst must also avoid
being influenced by institutionalised standards such as those attitudes and habits an organization may
perpetuate as established norms which inhibit the thought process. The analyst should try not to be
constrained by traditional methods or processes but should blend traditional thinking with innovative
evaluation techniques.
8. The analyst must first determine the threat and vulnerability criteria before conducting the
assessment by deciding on focal points or centres of gravity. Centres of gravity can be defined as those
factors or criteria that are estimated to have the most weight or value in a given process. Centres of gravity
change according to the system being studied. Examples of systems are a country, an airport, an aircraft
operator, or a group of people.
9. This methodological approach can be adapted to any system mentioned above, as long as
the process is constructed of quantifiable values ascribed to the chosen centres of gravity. In recognizing
that most organizations have limited human and technological resources, a quantitative analytical approach
requires less information to form a conclusion. It also directs the analyst to consider relevant data with
objectivity rather than with subjective speculation.
10. This process utilizes two facets of analysis that together form a credible means of assessing
the threat and determining a security response through application of risk management measures. First, it
must be understood that a deliberate act of unlawful interference against civil aviation must, by definition, be
premeditated and carried out with purpose by the perpetrators. This means that someone has a reason to
conduct an unlawful act and thus proceeds to plan and execute the act. Therefore, before assessing how an
act of unlawful interference may be carried out against a target, the analyst should first consider the reasons
why an unlawful act would be committed against civil aviation and the probability of its being committed.
(This premise eliminates the possibility of using this methodology to analyse a threat for any incident where
air operations are disrupted by an unruly passenger or mentally unstable individual whose actions cannot be
predicted and are spontaneous.)
11. The next step would be to create working tools to assist in the assessment process. The
working tool for this methodology has been named a vulnerability matrix. The two vulnerability matrices
described in this appendix can be combined to form the final analysis for a follow-on risk management
process, or they can be used independent of each other depending on the needs of the analyst. It should be
noted that in order to assess the vulnerabilities of an airport the matrix on aviation security threat categories
must be used, at a minimum.
12. For purposes of this guidance material, Vulnerability Matrix No. 1 profiles a group that has
the potential to perpetrate acts of unlawful interference (see Table A2-1). The second matrix covers aviation
security threat categories which can be adapted to assess the threat directed at a potential target such as an
airport or to evaluate the aviation security posture of an aircraft operator or of a State (see Tables A2-2 and
A2-3).
GROUP PROFILE
13. For the vulnerability matrix on profiling a group, one should subscribe to the assumption that
most human-based systems can be organized into five basic attributes. Therefore, any group can be
defined as having the following components: leadership, system essential, infrastructure, population and a
fighting mechanism. These five attributes will now become the centres of gravity for our evaluation of a
group which has the potential to commit unlawful acts, whether it be called a terrorist group, insurgent
faction or organized crime.
14. The leadership function includes the groups hierarchy, presence of legitimate political
representation and use of charismatic personalities, to name a few examples.
15. The system essential can be described as the will and means of a group to convert
theoretical goals, such as political agendas or religious causes, into practical application through
surveillance operations, acquisition of weapons, developing sources of funding and training of operatives.
Volume V - 47
Volume V-48 Security Manual Doc8973/7
16. Infrastructure combines several elements such as the size and number of group cells or
sub-units, an established communications network and effective use of transportation and supply lines.
17. The population attribute refers to the existence of an extended support network made up of
local sympathizers or others who may provide safe haven, food and money to the group whether in accord
with the groups goals, or possibly out of fear and coercion.
18. The fighting mechanism is the attribute assigned with carrying out the groups actions in
pursuit of achieving their goals. These group members can be referred to as warriors, for example
hijackers, or technicians, such as bomb-makers.
19. Under the five attributes mentioned, functional subcategories can be added according to the
depth of analysis desired by the analyst. Those subcategories could include factors such as the groups
capability to conduct violent action, location and history of known previous activities and level of commitment
to its ideological purpose (i.e. attacks by suicide bombers). Once the point values assigned to each centre of
gravity have been totalled, the bottom line will provide the analyst with a profile of a group and a reliable
estimate on the probability capability of the group to conduct an act of unlawful interference against civil
aviation.
20. The second vulnerability matrix is based on six threat categories. The matrix can be
expanded to include other factors judged to be important to the analyst, but for the purpose of this sample
matrix the number of categories has been limited to those most often affecting the aviation security mission.
21. The categories include the presence of a group which could commit an unlawful act, a
history of attacks against civil aviation, existence of internal strife, conditions of economic crisis, the volume
of flights and the transit of high risk flights. These six areas of focus represent different centres of gravity
from those of the group profile. It can be seen that these centres of gravity are better suited to the threat
assessment of States, aircraft operators or airports.
22. Once the point values are totalled, the analyst has a quantifiable method of predicting the
level of threat for the target being evaluated. If the sum totals are combined with the totals of a group profile,
the result can be directly linked to the application of security countermeasures commensurate to the
assessed threat.
23. It must be emphasized at this point that, as with any analytical method, the benefits of such
a process are only valid if the process is undertaken routinely. Prescribed periodic review of current data is
essential when evaluating any change to the assessed threat. Thus, with proper control and management,
this methodological approach to a threat assessment will continue to provide aviation security professionals
and other decision-makers the means for effective risk management and security response.
FINAL ANALYSIS
24. In completing the matrices explained in Tables A2-1 through A2-3, the analyst should:
b) fill in the columns according to the point values given for both matrices;
d) assign priorities for countermeasures in order of point value with the greater number of
points equalling a higher level of threat and vulnerability.
25. It may be generally assumed that a thorough explanation incorporating the rationale behind
the specified conclusions should accompany any threat assessment. A well-based explanation justifies the
resulting risk management programme that will be devised to counteract the assessed threat or threats to
civil aviation.
Volume V - 49
Volume V-50 Security Manual Doc8973/7
Sample criteria and point values of system attributes for a group profile
(More questions may be added as necessary.)
TOTAL POINTS
Legend:
11 15 TOTAL POINTS = High probability that this group will commit an unlawful act.
6 10 TOTAL POINTS = Medium probability that this group will commit an unlawful act.
0 5 TOTAL POINTS = Low probability that this group will commit an unlawful act.
Volume V - 51
Volume V-52 Security Manual Doc8973/7
Table A2-3. Definitions and point values of aviation security threat categories
for Vulnerability Matrix No. 2
Presence of a Known presence of a group which has the potential to conduct unlawful acts.
group
History of attacks Earlier attacks are recorded. This may include any form of violent action, but special
attention should be paid to any attacks directed against civil aviation, such as a
hijacking, bombing at an airport or aircraft operator ticket office, and other armed
attacks in the vicinity of the airport.
Internal strife Conditions of turmoil such as on-going or impending civil war or other political unrest
exist.
Economic A state of economic crisis exists that is likely to result in severe funding cutbacks
problems which may impact on the ability to sustain aviation security measures.
Number of flights Volume of air traffic. (The higher the number of flights, especially those with
passengers, the greater the risk that an unlawful act will occur.)
Point values 50 + flights per week = 20 - 49 flights per week = 1 - 19 flights per week =
Point value of 3 Point value of 2 Point value of 1
High risk flights Any aircraft operator or flight that could be considered especially vulnerable to an act
of unlawful interference. Examples of high risk aircraft operators or flights include:
having been a target of previous attacks; carrying passengers on one-time or
seasonal recurring flights such as international sports events or religious pilgrimages
where an attack would maximize media reporting; and frequent labour disputes.
APPENDIX-3
RISK MANAGEMENT MODEL
Introduction
1. Annex 17 requires that each Contracting State keep under constant review the level of
threat to civil aviation within its territory, and establish and implement policies and procedures to adjust
relevant elements of its national civil aviation security programme (NCASP) accordingly, based upon a
security risk assessment carried out by the relevant national authorities. This requirement addresses two
concepts threat assessment and risk management which together form the basis of a viable and cost
effective security response to acts of unlawful interference with civil aviation. This appendix focuses on the
risk management model. Guidance material describing a methodology for conducting a threat assessment
may be found in Appendix 2.
Background
3. Standards in Annex 17 consist of a baseline set of preventive security measures that are
expected to be applied equally at airports serving civil aviation in all Contracting States regardless of the
threat environment impacting on civil aviation operations. While these arrangements were established to
ensure minimum uniform standards at airports serving civil aviation, no specific standards exist to address
variable threat conditions. Whenever a State introduces additional security measures to meet a higher threat
level, it may find that implementation is difficult to sustain, especially when the extra measures have not
been tailored to the specific threat. Therefore, once a State has properly assessed the nature and level of
threat within its own territory, it can then apply appropriate enhanced measures at its airport(s) and for
aircraft operators operating to/from its territory. In order to encourage a consistent approach among all
Contracting States, this risk management model, which may be used and adapted as necessary, was
developed to aid Contracting States in their response to increased threat conditions.
4. States can profit from using a risk management approach whereby enhanced measures are
implemented either to prevent an unlawful act from being committed against airports or aircraft operators or,
at a minimum, to mitigate any consequences resulting from an unlawful act. Some of the more obvious
benefits include the optimum allocation of fiscal and personnel assets and the encouragement of public
confidence in the safety of air travel to and from that State.
5. Overall, the methodologies of threat assessment and risk management use three core
security principles: identify, implement and sustain. When making a threat assessment, the first principle is
primarily employed, while the second and third principles play a significant role in the risk management
process.
6. The main purpose of any security countermeasure is prevention. Therefore, after the first
step to identify the threat or threats to civil aviation is completed, the next task is to devise an appropriate
security response commensurate with that threat. This task employs the implement principle.
7. If the assumption is made that potential perpetrators with the intention to interfere with civil
Volume V - 53
Volume V-54 Security Manual Doc8973/7
aviation can defeat a security system if given enough information, time and opportunity, then the logical
objective is how best to deter the perpetrators from carrying out a successful act of unlawful interference. It
is therefore essential that the implementation of suitable preventive security measures be considered.
8. This operational intervention leads to the third principle, sustain, which can be described as
a State having the political will and accompanying capability to maintain appropriate reliable security
practices. Without the commitment to sustain effective aviation security measures, the efficacy of the other
principles is diminished. When taking steps to prevent acts of unlawful interference and other criminal
activity directed against airports and aircraft operators, it is necessary to evaluate the sustainability of
security measures through inspections, audits and surveys, such as provided by a national civil aviation
security quality control programme (NCASQCP).
9. This section provides criteria for three levels of threat conditions which correlate to the three
sets of suggested countermeasures laid out in the risk management matrix described in Table A3-1:
a) Level One Baseline: Indicates low threat conditions where, in the absence of
verifiable intelligence information to indicate that any aircraft operator or airport has
been targeted for attack, there may be the possibility of unlawful interference by
individuals or groups due to causes such as civil unrest, labour disputes and the active
presence of anti-government factions;
c) Level Three High: Intelligence information indicates that one or more aircraft
operators and/or airports are specifically targeted for attack.
a) evaluate the nature and level of threat to an operator or airport in accordance with a
valid threat assessment;
g) appraise the number of flights and passengers and the volume of baggage and cargo
that would be subject to enhanced security procedures.
Table A3-1. Suggested security measures for baseline, intermediate and high threat conditions
10
Background checks to be carried out before pass is issued.
Volume V - 55
Volume V-56 Security Manual Doc8973/7
Volume V - 57
Volume V-58 Security Manual Doc8973/7
2
In this context, unaccompanied hold baggage means hold baggage which has become unintentionally
separated from its passenger.
APPENDIX-4
ACTION BY THE RECIPIENT OF A BOMB THREAT
TELEPHONE CALL
c) air cargo designated for shipment by air; or cargo installations, facilities and buildings.
2. Telephoned bomb threats may be received by airports, aircraft operators and cargo agents
either directly from the people issuing the threats or from intermediaries, for example, the media or press
agencies. In either case, recipients should try to obtain as much information as possible about the threat in
order to facilitate assessment of it and identification of the person issuing it.
3. To facilitate the collection of information, aircraft operators and airports should install tape
recording facilities on appropriate exchanges and/or telephones. Continuous loop equipment, which should
be kept running continuously, is preferable to conventional recording equipment which must be switched on
when a recording is to be made. When a bomb threat has been recorded, the tape should be retained as
evidence.
4. Staff such as telephone switchboard operators and aircraft operator ticket sales people who
are likely to receive bomb threat calls should be briefed on the action they should take before taking up their
duties, and the responses required from them should be incorporated into appropriate staff instructions.
5. They should be provided with checklists to facilitate their reactions. Supervisors should be
similarly aware of the response required and of the need to relay information about bomb threats to trained
bomb threat assessors.
ACTION BY RECIPIENT OF A BOMB THREAT
a) listen carefully and make a note of the actual words used by the caller;
b) either take action to trace the call or alert a colleague in order that they may do so;
c) take such action as may be necessary to tape record the call, where this is not done
automatically;
d) prolong the call to obtain as much information as possible;
Volume V - 59
Volume V-60 Security Manual Doc8973/7
WHERE is the bomb? Asked first so that that an evacuation can be planned
WHEN will it go off? So that a time factor is known for the evacuation
WHAT does it look like? To help in recognition of the device during a search
WHY are you doing this? To build up a better picture of the incident and keep the caller on
the line to assist in tracing the call
Note 1. The questions should be posed as open questions rather than as leading ones. For example,
ask, Where exactly is the bomb? rather than, Is the bomb in the hold of the aircraft?
Note 2. The order in which the questions are asked is important as the caller may hang up before all
the questions can be asked.
f) if possible, test the credibility of the caller by making up a non-existent flight number,
flight time or location and asking the caller whether that is the one to which he or she is
referring; and
g) inform a supervisor who should inform the nominated bomb threat assessor, the police
or security services.
a) ask for, and make written note of, the precise time at which the threat was issued and
the exact words used by the caller; and
b) ask whether the intermediary obtained answers to any of the questions detailed above
and about the origin of the call and the callers identity.
8. The recipient of a written bomb threat should preserve the message and deliver it to the
supervisor with precise information about its discovery. Messages discovered in flight should be referred to
the pilot-in-command immediately.
9. Supervisors should interview the recipient of any call or message in order to complete the
Bomb Threat Report Form shown below and relay it without delay to the nominated bomb threat assessor.
Did the caller appear to be familiar with the aircraft or building when describing the location? YES / NO
WHEN WILL IT EXPLODE?
Time : Day : Date :
Volume V - 61
Volume V-62 Security Manual Doc8973/7
Background noise
Noisy Quiet Trains Aircraft
Mixed (describe)
Accent
Local Not local Colloquial Regional Foreign
Manner
Angry Calm Irrational Rational
Other (describe)
Command of language
Excellent Good Fair Poor
APPENDIX-5
BOMB THREAT ASSESSMENT
2. Along with technique called Positive Target Identification (PTI) described in this volume,
States should ensure that contingency plans provide for:
b) an assessment of the threat and the risk involved by designated and accredited personnel
(bomb threat assessors) employing PTI;
c) coordination of any action taken which should be appropriate to the risk as assessed;
e) follow-up action.
b) airport installations, facilities and buildings, or navigation aids on or in the immediate vicinity
of the airports; and
c) air cargo designated for shipment by air, or cargo installations, facilities and buildings.
5. Telephoned bomb threats may be received by airports, aircraft operators and cargo agents
either directly from the people issuing the threats or from intermediaries, for example, the media or press
agencies. Action to be taken by the recipient of a bomb threat telephone call is outlined in Appendix 4.
6. Bomb threat assessment carries substantial responsibility. Bomb threat assessors should
be appropriately trained and available 24 hours a day. Each aircraft operator and airport should have at least
one assessor on duty or on call within the company at all times. Where a threat is received against an
aircraft on the ground, the targeted aircraft operator and the appropriate airport security services agency
should agree on assessment.
7. Aircraft operators may require pilots-in-command to refer bomb threats received on board
aircraft in flight to operations staff on the ground for assessment, or they may authorize the pilots-in-command to
assess threats themselves. Where pilots-in-command are authorized to assess bomb threats, they should be
provided with guidance from the police or State security services.
Volume V - 63
Volume V-64 Security Manual Doc8973/7
8. It is important that the bomb threat assessor obtain full details of the threat message ideally
in the form of a completed Bomb Threat Report Form (see Appendix 4) from the person who received it and by
the fastest possible means.
9. The bomb threat assessor should assess the threat by working methodically through the form
which is designed to lead the assessor to a logical assessment of the threat as GREEN, AMBER or RED
described below with the actions required.
GREEN A warning, which may not identify a target or a specific Present countermeasures negate
group of targets, or which otherwise lacks credibility. threat. No extra precautions
necessary.
AMBER A warning that can be related to one or more targets but This may involve danger and
where there is doubt about its credibility or about the may require augmentation of
effectiveness of existing countermeasures. countermeasures.
RED A specific warning where the threat is of a nature which Likely to involve a danger to
permits identification of a specific target, or where the caller people, property or commercial
has positively identified himself or the organization involved activities and therefore merits
and is judged credible. countermeasures.
Note. Category RED warnings against aircraft in flight should be notified immediately to the pilot-in-command of
the aircraft and the destination or nominated diversion airport.
10. Although the procedure is largely dependent upon the provision of Yes or No answers to
a series of questions, the assessor must also take account of other factors that may bear upon the credibility
of the threat including, but not limited to, the following:
a) the recent history of warnings and incidents for the airport and the main aircraft
operators;
industrial disputes concerning the aircraft operator of the flight concerned or airport;
similar incidents having been recently reported in the media which may have
prompted a hoax call; and
high-profile persons who may attract a threat at the airport or are passengers on the
flight; and
d) anything particular or unique about the cargo being carried on the flight; and
e) additional security measures that have been taken and the local police or security
authoritys opinion of the warning.
11. Written bomb threats discovered on board aircraft in flight are likely to be spurious, but each
one should be considered on its merits in order to assess the risks involved. Where pilots-in-command are
authorized to assess threats, aircraft operators should provide them with guidance to enable them to assess
the risks and decide upon a course of action. They should consider the following:
b) the precise wording of the threat, to determine whether it suggests there is a credible
reason for the threat having been given. A threat is most likely to be genuine if there is a
reason for it, such as a desire to avoid the casualties that would result from an explosion. It
is likely that a person issuing such a threat will seek to ensure that it gets through and that
there is time to react to it. Where no clear reason for the threat can be deduced, the threat
is less likely to be genuine;
c) whether there is any person on board (e.g. a political figure or other well known person)
who might attract a threat;
d) whether there are passengers on board who might be responsible for a threat (e.g. a
potentially disruptive passenger, deportee or inadmissible, young people or rowdy
passengers);
e) whether the aircraft operators operations centre can be contacted by radio to establish
whether this is an isolated incident or one of a series of similar events affecting the aircraft
operator; and
f) if the pilot-in-command is not satisfied that the incident is a hoax, he or she should seek
information through the aircraft operators operations centre about the current threat to the
aircraft operators interests at the airport of departure, with a view to establishing whether
there are credible motives for attacking the aircraft or disrupting the flight and the quality of
security measures at the airport of departure. Aircraft operators should therefore develop
procedures for making such information available to the pilot-in-command with the least
possible delay.
12. Details of bomb threat incidents should be recorded by aircraft operators and airports and
detailed in a report which should be sent to the States civil aviation and security policy and regulatory
section so that trends may be considered, and to the appropriate police authority in order that the
circumstances may be investigated.
13. When a person initiating a bomb threat is identified, that person should be prosecuted under
the relevant laws of the State; evidence of the cost and concern caused by the incident should be submitted for
consideration by the court, and convictions should be publicized to deter potential offenders.
14. In consultation with the police and other appropriate agencies, each aircraft operator and
airport should develop contingency plans to be implemented when bomb threats issued against it are assessed
Volume V - 65
Volume V-66 Security Manual Doc8973/7
as RED or AMBER to reduce the risks arising from such bomb threats. Actions which should be included in
contingency plans relating to aircraft are outlined in Appendix 6.
APPENDIX-6
RESPONSE TO BOMB THREATS AGAINST AIRCRAFT
1. When a bomb threat is associated with an aircraft that is still on the ground, and once the
warning has been assessed, aircraft operators in consultation with airport authorities should:
a) disembark all passengers and crew with all cabin baggage by steps or jetties. Escape
slides should only be used in extreme emergencies;
b) move the aircraft to a remote location such as the isolated parking position;
c) isolate and re-screen all passengers and their cabin baggage and hold them in a
separate area until the crew members, hold baggage, cargo and catering supplies have
been inspected/screened, searched and declared safe;
d) unload all hold baggage and require passengers to identify their baggage, which should
then be screened or searched before it is re-loaded;
e) unload all cargo which should then be screened or searched before it is re-loaded;
AIRCRAFT IN FLIGHT
2. When a bomb threat is associated with an aircraft in flight, and once the threat has been
assessed as positive, the aircraft operator should contact the pilot-in-command, directly or through the air
traffic services unit, to provide information about the threat and device and about how to respond.
3. On receipt of the information, the pilot-in-command should require a discreet search of the
aircraft by crew members insofar as this is possible in flight and conducted in such a manner as to not cause
passengers to panic.
4. In those cases where the bomb threat assessment indicates that it is unlikely that there is a
bomb on board the aircraft, but where an aircraft operator or a pilot-in-command wishes to be prudent
before committing, for example, to an extended flight across water the aircraft should be diverted to an
airfield at which it can land safely. Once it has landed, consideration should be given to taking the actions
described above for threats against an aircraft on the ground.
5. When the pilot-in-command has reasonable grounds for believing that there is a bomb on
board the aircraft, consideration should be given to the potential effects of an explosion on board the aircraft
to people on the ground, particularly within densely populated areas. Action as described in the following
guidelines should be taken:
a) an aircraft emergency should be declared to the ATS unit stating the nature of the
emergency, and the aircraft should be diverted to the nearest civil or military airfield at
which it can land safely. The route to the nominated nearest suitable airfield should
Volume V - 67
Volume V-68 Security Manual Doc8973/7
b) if the aircraft is required to make an approach to land over a densely populated area, it
should be permitted to land at that airfield in accordance with current emergency
procedures. Its time in the air should not be prolonged in order to divert to another
airfield;
d) the pilot-in-command may also consider making discreet inquiries to establish whether
any passenger has bomb disposal (BD) or explosive ordnance disposal (EOD)
expertise. Only the initials for these skills should be used in order to reduce the
likelihood of alarming other passengers. Caution should be exercised about the skills
any passengers may say they have and where possible a check on their background
should be initiated through the ATS unit or ground station with which the aircraft is in
communication.
b) passengers should be moved as far away as possible, instructed to fasten their seat
belts and keep their heads below the tops of the seat backs; and
c) portable oxygen, bottles of alcohol and first aid kits should be removed from the vicinity.
Fire extinguishers should be readily available.
7. If an immediate landing can be made, the item should be left in place, covered with
polythene and then packed around with pillows, blankets, coats and other blast absorbent materials. The
item itself must be kept dry (hence the polythene) but surrounding materials should be wet in order to reduce
the risk of fire.
8. If an immediate landing cannot be made, the pilot-in-command should take expert advice
from explosives disposal experts as described above and consider moving the item, especially if its position
poses a real threat to the aircraft. Reference to the aircraft flying manuals should identify the type-specific
least risk bomb location. If this is a door, a stable platform of hard, blast-attenuating materials, such as cabin
baggage, upon which the suspect item can be placed, should be built to the centre of the door.
9. It is unlikely that an explosive device placed on an aircraft will be fitted with an anti-handling
triggering mechanism. Nevertheless, if the device is to be moved, the following actions should be taken:
b) a check should be made to ensure that it is free to move i.e. that there is, for
example, no thread joining it to the aircraft structure which may indicate an anti-handling
triggering mechanism;
c) it should be moved gently and kept in the same attitude in which it was found; and
d) it should be placed, in the same attitude, in the prepared least risk bomb location and
packed around as described above and suitably restrained against movement during
flight or during deceleration or landing.
Note 1. No procedures which involve disconnecting or cutting electrical circuits in the suspect items should
be attempted.
Note 2. As a general rule, a suspect package or article should not be jettisoned from an aircraft in flight,
particularly through a dorso-lateral door, emergency exit or hatch. Tests have shown that such a course of
action will subject the object to severe buffeting by the airflow. This could cause an explosion in close
proximity to the fuselage, or engine(s) of the aircraft, resulting in a loss of control and possible consequential
destruction of the aircraft.
10. If no suspicious item is found and an immediate landing cannot be made, the pilot-in-
command should consider the following:
a) although a bomb threat may have been received and assessed as RED, aircraft should
be flown as normally as possible, striking a balance between the need for a rapid
landing and the risk arising from undue haste;
b) an emergency should be declared and the aircraft should divert to the nearest suitable
airfield. The choice of airfield should take into account landing performance
requirements, approach aids, emergency facilities and the proximity of approach paths
to densely populated areas;
c) the ATS unit should be fully briefed on flight intentions so that the appropriate ground
measures can be initiated at the airfield of intended landing;
d) the cabin crew should be briefed to be prepared for a possible emergency landing and
prepare for the possible use of crew oxygen/smoke masks;
f) all efforts should be taken to minimize aircraft manoeuvres and to try to avoid
turbulence;
g) careful consideration should be given to the choice between flying fast to minimize
airborne time and flying slowly to minimize air loads and damage in the event of
fuselage rupture. In most cases, the turbulent air penetration speed will be a reasonable
compromise;
Volume V - 69
Volume V-70 Security Manual Doc8973/7
11. When an aircraft lands following receipt of a bomb threat that has been assessed RED or
AMBER, provision should be made to disembark passengers and crew with a minimum of delay (with their
cabin baggage when circumstances permit). The necessary emergency services should be provided to
preserve life and prevent injury, and the aircraft should be parked where it will not hazard people or
premises in the event of an explosion. The actions for a bomb threat against an aircraft on the ground
should then be implemented.
APPENDIX-7
AIRCRAFT SECURITY SEARCH CHECKLIST
1. The regular search of aircraft for suspect explosive devices and weapons may be conducted
prior to commencing each flight, based on a risk assessment conducted by the appropriate authority. A
similar search will be required when an aircraft is suspected of being the target of an act of unlawful
interference. The difference between the two types is only in the degree and thoroughness of search
undertaken, and these will be dictated by the total circumstances applicable to each situation.
2. The large number of aircraft in service throughout the world makes it impossible to provide
guidance here for recommended aircraft inspection procedures that will be adequate in all cases. Aircraft
operators should develop an aircraft search procedure checklist for each type of aircraft in service and
include this checklist as part of the flight crew security kit. Use of such a checklist by ground crews will be
particularly helpful at locations where the only persons familiar with the particular type of aircraft or
configuration of aircraft are flight deck and cabin crew members.
3. The designated isolated parking position will likely prove to be the best location on the
airport at which an aircraft subjected to a specific threat can be searched, but contingency plans should
recognize that it may not always be possible to access this position.
4. Aircraft searches should be carried out in good lighting conditions; this may require the use
auxiliary power units or the attachment of ground power lines to the aircraft. It will be necessary to impose
and maintain control of access to the aircraft before starting the search, which should be carried out with the
minimum number of persons on board.
6. Before starting the search, strict control of access must be implemented to the aircraft being
searched. This is necessary to ensure devices are not introduced into the aircraft once it has been cleared.
Control of access must then be maintained until the aircraft doors are closed prior to push back.
7. Searchers should be briefed not to touch suspicious objects but to notify the search
coordinator, mark the location with a prominent object (but not touching the device) and withdraw from the
immediate area to await further instructions. When a suspect device is discovered the possibility of
secondary devices should not be discounted.
8. Hand-held communications are useful for coordination of the search and are often the only
way of ensuring appropriate and speedy lifesaving procedures for search and evacuation. However, once a
suspect device has been located those using hand-held communications should immediately move away
and ensure that they and anyone else in the area move outside the cordon as quickly as possible. Radios
should not be used to transmit within 25 m of a suspect device.
9. All entrance doors, hatches, inlet and exhaust ducts, service and access doors, etc., must
be opened to allow the necessary access to all areas to be inspected. However, a check must be made to
ensure that all doors and covers which were opened for inspection purposes are closed on conclusion of the
search.
Volume V - 71
Volume V-72 Security Manual Doc8973/7
10. It is difficult to give guidance to search teams about the appearance of suspect explosive
devices as they can be disguised in many ways. Search teams should be briefed to look for unidentified
objects or anything:
AIRCRAFT INTERIOR
Forward entrance
Forward compartment
Forward galley
Remove all containers, food boxes and ovens, if not already done
Open and inspect all galley compartments, bar and refrigerator
Inspect containers removed from galley and bar
Oxygen mask stowage (bar)
Galley service door (tape stowage; hinge recess)
Escape chute stowage
Compartments above service doors
Forward toilets
Main cabin
Volume V - 73
Volume V-74 Security Manual Doc8973/7
toilets
Overwing emergency exit release covers
Aft entry door cabin attendants seat
Drinking fountain, cup dispenser, cup disposal compartment and drain valve access at
floor
Portable emergency exit lights remove light and inspect
Remove all containers, food boxes and ovens, if not already done
Open and inspect all galley compartments, bar and refrigerator
Inspect all containers removed from the aircraft
Walls, ceiling and floor
Glass stowage in bulkhead forward of bar
First-aid kit in compartment aft side of aft unit only if unsealed
Compartment above service door
Service door and recess
Escape chute stowages
Cabin attendants seats in aisle No. 2 galley
Oxygen mask compartment in ceiling
Portable emergency exit light, remove light and inspect
Aft toilets
AIRCRAFT EXTERIOR
Fuselage (the areas behind/in the following doors and openings should be checked)
Radom
Ground pneumatic connector panel
Cabin compressor air-inlets
Cabin compressor access panels
Doppler navigation antenna door
Cabin compressor air-outlets
Heat exchanger control access panels
Heat exchanger outlet guide vanes
Radio rack air-outlet
Beacon-holder (beacon removed)
Security locker and contents
Flashlights (check batteries)
Seals of first-aid kits for proper condition
Seals of life raft panels for proper condition
Accessory compartment door
Auxiliary tank fuel sump doors
Cabin pressure safety valves
Aft waste water service panel
Cabin pressure regulator valve
Aft waste system service panels
Access door to stabilizer-mechanism
Tail cone access door
Aft potable water service panel
Aft cargo doors
Forward cargo doors
Forward potable water service panel
Ground air conditioning connector door
External power fuser door
External power receptacle
Accessory compartment
Volume V - 75
Volume V-76 Security Manual Doc8973/7
Cargo compartments
Wings
APPENDIX-8
SUSPECT EXPLOSIVE DEVICES
1. There are four generic steps that should be taken by anyone finding a suspicious item
during a search to ensure the safety of personnel and the minimum disruption to operations. By training staff
to follow these four steps in conjunction with local contingency plans a safe conclusion to the incident with
the minimum loss of life can be achieved in most circumstances. The four steps and the order in which they
should be executed are as follows:
a) CONFIRM
b) CLEAR
c) CORDON
d) CONTROL
CONFIRM
2. Confirm that the item found should actually be reported as a suspect explosive device.
Check for labels or tags giving possible information of the owner. Do not attempt to move the item in order to
gain better access to it since the device may be equipped with an anti-handling device which may cause it to
detonate.
3. Eliminate the possibility that the suspect item is private property left unattended by anyone
in the immediate area, e.g. crew baggage. Do not take too long in carrying out this action since the device
may be on a timer or able to be detonated by remote control.
4. Note its exact location; make brief notes of its appearance and mark its position (if
necessary) with a distinct item to assist police or explosive disposal staff in identifying the item on their
arrival.
5. Assess the validity and likelihood of the suspect item being in that particular location.
a) is the suspect item placed in a position to kill personnel or destroy resources?; and
b) is the target valuable, vital, attractive or under threat from possible attack?
6. Once satisfied that the suspect item could be an explosive device, carry out the next three
steps and take the necessary actions as defined in local contingency plans.
CLEAR
7. Evacuate all persons, including any search teams, from the immediate area of the suspect
device. A minimum initial distance of 100 m should be achieved but the actual circumstances, i.e. the
presence of large areas of glass, the presence of flammable or explosive substances in the vicinity of the
Volume V - 77
Volume V-78 Security Manual Doc8973/7
suspect explosive device, the possibility of building collapse or local contingency plans, may dictate a larger
distance.
8. At the same time ensure that the relevant duty personnel such as the airport security officer
or duty airport officer are notified about the suspect device according to local contingency plans.
CORDON
9. Establish a cordon to prevent anyone gaining access to the area. Size will depend on the
site of the incident, the size of the suspect explosive device and the protection of cordon personnel. A good
baseline is to ensure that cordon personnel are out of line of site of the device.
10. Establish one cordon entry point and ensure that nobody approaches the device unless
authorized by the incident commander. It is not unusual for senior management and other persons to insist
that they view the device to give a second opinion; they should be politely denied access until explosive
disposal experts have arrived and agree it is safe to do so.
11. The police may deploy a further outer cordon on access routes to ensure safe evacuation
and the speedy arrival of emergency services.
CONTROL
12. Inform the relevant personnel according to local contingency plans about the suspect device
if not already carried out. The persons who discovered the device should remain to assist police and
explosive disposal agencies. Establish an incident control point to act as the central control for the incident
until police or specialized staff arrive on the scene and take command. The police should assume control on
their arrival and dictate further actions as necessary.
13. Nominate a rendezvous point outside the cordon for all other agencies that will be arriving at
the incident. Follow further local procedures or instructions for suspicious explosive device incidents.
14. Emergency services such as fire and ambulance crews should stand by at the rendezvous
point outside the cordon to deal with the results an explosion or fire.
15. In the event of an explosion, first aid to injured personnel should be rendered immediately,
followed by established damage control procedures.
16. After the effects of the explosion are under control, the search should be continued in case
there are secondary explosive devices.
DEFINITIONS
17. When dealing with suspect explosive devices incidents, it is important to use common
terminology so as to minimize misunderstandings. The following definitions are used by many explosive
disposal experts and agencies, and it is recommended they should be adopted by Contracting States when
dealing with incidents and reporting incidents to ICAO.
18. Improvised Explosive Device (IED). An explosive device placed or fabricated by terrorists or
criminals. These devices may incorporate military explosives stores (shells, grenades, etc.) but are normally
devised from non-military components.
19. Bomb threat. The manner in which an IED incident starts; this is usually by telephone, but
also covers an alarm raised by the discovery of a device.
20. Bomb alert. The bomb threat has been investigated or assessed, and discredited. No device
was found, any precautionary measures have been relaxed and normal activity resumed.
21. False alarm. A suspect IED was discovered and explosive disposal resources tasked.
Investigation of the item by explosive disposal experts reveals the item to be innocent, i.e. left without evil
intent and containing no explosive device or substance.
22. Hoax. A suspect IED was discovered and explosive disposal resources tasked. Investigation
of the item by explosive disposal experts reveals it to be constructed to resemble a viable IED but containing
no explosive or dangerous substance.
Volume V - 79
Volume V-80 Security Manual Doc8973/7
APPENDIX-9
SEARCH AND EVACUATION GUIDELINES
GENERAL PRINCIPLES
1. For searches to be effective they should be conducted systematically by staff familiar with
the area concerned. The main reason for this is that outside personnel will be unlikely to know the layout of
the aircraft or terminal building and the various places in which a device could be concealed and therefore
will not so easily be able to spot anything that is out of place or unfamiliar. Search plans should be prepared
in advance and staff trained to use them. A search coordinator must assigned to provide control of the
search process and, if necessary, take the decision to evacuate.
2. Searchers should be briefed not to touch suspicious objects but to notify the search
coordinator, mark the location with a prominent object (without touching the device), and withdraw from the
immediate area to await further instructions. When a suspect device is discovered the possibility of
secondary devices should not be discounted.
3. Hand-held communications are useful for coordination of the search and are often the only
way of ensuring appropriate and speedy lifesaving procedures for search and evacuation. However, once a
suspect device has been located those using hand-held communications should immediately move away
and ensure that they and anyone else in the area move outside the cordon as quickly as possible. Radios
should not be used to transmit within 25 m of a suspect device.
4. Before starting the search, strict control of access must be implemented in the area being
searched. This is necessary to ensure devices are not introduced into the area once it has been cleared.
5. Effective and systematic searching takes time. If the warning received indicates a possible
detonation time for the device which will prevent a thorough search being conducted, the best and safest
option is to evacuate all personnel to a safe area and wait for the arrival of specialist explosive disposal
personnel.
INITIATION OF A SEARCH
a) sending a message to the search teams over a public address system. It should be
coded to avoid unnecessary disruption and alarm to the public;
c) using a telephone cascade system: the coordinator rings, for example, three
members, who in turn each ring a further three members and so on until all the teams
have been alerted.
7. It is difficult to give guidance to search teams about the appearance of suspect explosive
devices as they can be disguised in many ways.
9. The large number of aircraft in service throughout the world makes it impossible to provide
in this manual recommended aircraft inspection procedures that will be adequate in all cases.
10. Aircraft operators should develop an aircraft search procedure checklist for each type of
aircraft in service and include this checklist as part of the flight crew security kit. (Refer to Appendix 7 for
assistance in this process.) Use of such a checklist will be particularly helpful at locations where the only
persons familiar with the aircraft are flight deck and cabin crew members.
11. The designated isolated parking position will likely prove to be the best location on the
airport at which an aircraft subjected to a specific threat can be searched but contingency plans should
recognize that it may not always be possible to reach this position.
12. Aircraft searches should be carried out in good lighting conditions; this may require the use
auxiliary power units or the attachment of ground power lines to the aircraft. It will be necessary to impose
and maintain control of access to the aircraft before starting the search which should be carried out with the
minimum number of persons on board.
13. To avoid duplication of effort, the search of an aircraft should be conducted systematically
by staff familiar with the particular aircraft, provided with a checklist, and assigned to specific areas of the
aircraft. Attention should be given to those areas to which passengers have had access, such as main
cabins, galley areas and toilets, but the search should also include the flight deck exterior of the aircraft and
cargo holds.
14. If a suspect explosive device is found either within or in the immediate vicinity of an aircraft,
the initial action should be to withdraw all personnel to a safe distance and await the arrival of explosive
disposal experts. Any further decision to move the aircraft away from the device or the device away from the
aircraft should take into account the main priority which is the preservation of life. Moving the aircraft will
involve putting at risk additional personnel, such as the ground engineers, marshalling staff and aircraft tug
drivers, whereas leaving the aircraft in situ and evacuating all personnel to a safe location may result only in
damage to the aircraft and terminals or facilities, should the suspect device explode.
Search plans
15. It is vital to have search plans prepared in advance and staff trained in them. The objective
is to make sure that the whole terminal building is checked as quickly and effectively as possible.
16. Search plans must be readily available at all times. Architects drawings, checked for
accuracy and appropriately adapted, are suitable for this purpose. Sufficient spare copies should be
available for use during search operations. Searchers and the coordinator can then eliminate sections from
the plan as they are declared clear.
Volume V - 81
Volume V-82 Security Manual Doc8973/7
Search sectors
17. The first step in preparing a search plan is to divide the terminal building into sectors. The
building may already be segregated into various zones and therefore it may be convenient to make these
the sectors. Each sector must be of manageable size for the number of searchers nominated to it.
Remember that effective and systematic searching takes time.
18. The sector may be one large room, such as a check-in area, concourse or baggage reclaim
area, or perhaps a number of small aircraft operator operations offices in an office suite. It is most important
that cloakrooms, stairs, corridors and elevators be included in the search plans as well as car parks and
other areas outside the building.
Search teams
19. Search teams should be formed from staff nominated to search those areas with which they
are most familiar. The numbers required will depend upon the size of the search task. Reserves should be
appointed in case of absence. Staff should be trained and rehearsed.
Search priorities
20. Those areas that will be used as evacuation assembly areas, together with those areas
where the greatest number of the public or staff are likely to be vulnerable, should be searched first.
Consider also, as a priority, those public areas to which the perpetrator may have had easy access such as
restrooms, elevators, stairways and hallways. Those areas to which access is normally controlled may be
searched last. Do not overlook car parks, the outside area of the terminal building and the perimeter.
How to search
21. The conduct of searches will depend on local circumstances and local knowledge. The
overriding principle is that they should be conducted in a systematic and thorough manner so that no part is
left unchecked. The searchers need to practise in order to get a feel for the logical progression through their
area (whether it be in a terminal building, baggage reclaim area or administrative or operations office suite)
and the length of time it will take.
22. With this in mind the method outlined in this example is of a room search in a sector. It
should be adapted to reflect the peculiarities of the actual area being searched.
23. A search should begin at the entrance to the room. Each searcher or team should first stand
still and look around the room. They should note the contents of the room and make a quick assessment of
those areas that will need special attention. They should look for any unusual lights (including small light
sources known as light emitting diodes which are often used in the arming circuits of improvised explosive
devices). They should also listen carefully for any unusual noises-particularly ticking or whirring sounds. If
nothing unusual is seen, the search should begin.
24. If anything unusual is seen, the searcher or team should alert the coordinator who will
decide whether to evacuate the building.
25. The search should be conducted methodically, moving in one direction around the area to
be searched. It should be carried out in three sweeps.
26. The first sweep is to work around the edges of the room, taking in the walls from top to
bottom and the floor area immediately beneath the wall. Look inside fireplaces, behind curtains and window
blinds, behind and beside furniture around the edges of the room. The sweep should finish at the doorway
where it began.
27. The second sweep should take in the furniture and the floor. Furniture should not be
removed but drawers should be opened and searched and gaps in and under furniture should be explored. If
the floor covering shows signs of recent disturbance, it should be lifted.
28. The third sweep should cover the ceiling if it is of a kind in which objects might be
concealed. Start at one corner and systematically search the whole surface.
29. After the search has been completed, and if nothing has been found, the coordinator should
be informed immediately so that the sector can be marked clear on the search plans.
30. Searching should continue until the whole area has been cleared. Do not forget that
secondary devices are not unknown.
c) move away from the device to a designated control point, leaving lights on;
f) stay at the control point and draw an accurate plan of the location of the suspicious
package or device for the assistance of the police and explosive disposal experts; and
g) the person finding the object should be immediately available for interview by the police
or security services.
EVACUATION
32. The purpose of evacuation is to move people from an area where they might be at risk to a
place of safety. This may be achieved by:
b) partial evacuation (where large buildings are involved and only a suspect letter bomb or
small device has been found); and
c) full evacuation.
33. In all cases where a bomb threat is received, the coordinator should immediately inform the
airport security officer and police and advise them of what action is being taken.
Volume V - 83
Volume V-84 Security Manual Doc8973/7
34. The decision to evacuate must normally be taken by the coordinator but the police or airport
security officer may be ready to advise on request.
35. In exceptional circumstances, where for example the police or security services have
received specific information, they may themselves order an evacuation, if necessary overruling the decision
of the coordinator.
36. On the other hand, it may be necessary for the police or security services in some
circumstances to insist that the terminal building not be evacuated. They might, for example, have reason to
believe that there may be an explosive device outside the terminal building and evacuation would place
people at greater risk.
37. There are four actions open to the Coordinator. Which one is chosen depends upon the
assessment of the threat which the situation presents. The choices are:
a) to do nothing; or
c) to evacuate all persons except search teams and essential staff, and then carry out a
search and evacuate fully if a suspicious object is discovered; or
Option 1: Do nothing
38. This option may appear attractive if the threat appears to come from an intoxicated person
or a child, but it should not be adopted unless the coordinator is absolutely sure that it is a malicious call or
prank. If there is the slightest doubt, the coordinator must turn to one of the other options.
39. This choice means, of course, that people will be in the terminal building for a longer period
should there be a bomb present. However, if a bomb is found, they can then be evacuated away from
danger. If nothing is found and there are no other significant factors, the coordinator may consider this
option appropriate if assessing the threat level as low.
40. When the threat level is considered to be moderate but there is no reason to believe an
explosion may be imminent, or if the suspect device is small (e.g. a letter bomb) and parts of the terminal
building may be some considerable distance from the device, the coordinator might consider evacuating part
of the terminal building alone or retaining only essential staff and search teams within the terminal building.
41. If a call is received which the coordinator considers to indicate the existence of a high risk,
there will be a case for evacuating as quickly as possible without conducting a search, especially where
there is a possibility of an imminent explosion.
42. When the time of explosion has been disclosed in a threat call, the coordinator must ensure
that any searches are finished and staff cleared at least 20 minutes before the deadline, irrespective of
whether any device has been found or not.
EVACUATION PLANS
43. As in the case of search plans, the Coordinator should have up-to-date drawings of
evacuation routes. This is especially necessary when there are a number of exits from the terminal building.
The purpose is twofold:
a) to evacuate as quickly and efficiently as possible using all available exits. A public
address system can help in directing staff to particular exits. When no other form of
communication is available, the fire alarm can be used providing that it can be sounded
in a way which distinguishes it from a fire warning, that staff have been trained to
recognize the signal, and that the fire alarm is not part of an automatic system
connected to the local fire service. Use of the fire alarm is a poor alternative to a public
address system and should only be employed temporarily pending the installation of
something better; and
b) to provide alternative routes for evacuation so that people can leave the terminal
building without being placed in danger by passing close to the suspect explosive
device. For example, if there are four evacuation routes but one of the routes runs
closer to a suspect explosive device than the others, the coordinator can decide at once
to evacuate using the other routes only.
44. To ensure the safe evacuation of the public, the coordinator should consider using members
of the staff as evacuation marshals to ensure that the public can leave quickly and without panic by the
pre-selected routes. Evacuation marshals need to be selected in advance and trained in their role.
45. The evacuation plan should also show two designated assembly areas in opposite
directions where people should congregate after evacuation. Sometimes fire assembly points can be utilized
for this purpose, as long as they are located at a minimum 400 m from the terminal building. In some
circumstances, assembly areas may need to be up to 1 000 m away from the building. Explosive disposal
experts advice should be sought as to whether this is necessary.
46. Ideally, all employees and members of the public should be asked to take personal
belongings and baggage which is still in their possession with them, since this will help to avoid unnecessary
suspicion over articles of property left behind after evacuation. However, this will be difficult to implement
unless a public address system or other suitable means of communication is readily available and used
properly.
47. Personnel and passengers who have been evacuated may have to remain outside for a
long time before the terminal building is declared safe, so it is best if shelter can be provided under cover. It
may be possible to seek accommodation by arrangement in alternative buildings. This provides the
opportunity to shelter from weather, maintain good communication and cater to individual needs.
48. If possible, car parks should not be designated as assembly areas, especially if they are
adjacent to the evacuated terminal building since they may contain secondary explosive devices hidden
within vehicles.
49. Evacuation assembly areas should be included in the search plans and checked whenever
search procedures are initiated or an immediate evacuation is ordered.
Volume V - 85
Volume V-86 Security Manual Doc8973/7
50. When an evacuation is initiated, doors and windows should, whenever possible, be left
unlocked, especially in the vicinity of a suspect explosive device. Lights should be left on, but plant and
machinery shut down where practicable. Procedures should be established to ensure concessionaire
kitchen facilities are left in a safe condition. It is recommended that utilities such as gas and water (unless
this affects the building fire fighting sprinkler system) not required to facilitate the search of an area in a
building be turned off in order to minimize damage in the event of an explosion.
51. A method must be devised to check that everyone has left the terminal building after the
evacuation and that all personnel, staff and visitors are accounted for. Nobody should be allowed to re-enter
until the terminal building is declared safe.
52. Once an evacuation has been completed, the coordinator will have to decide when the
building can be re-occupied. Of course, where a suspect explosive device has been found, the decision to
re-occupy will require close coordination with the police and security services until the device is declared
safe.
53. It should be remembered that there may be another suspicious object somewhere in the
terminal building undiscovered because the search was terminated and the terminal building evacuated
due to the discovery of the first suspect object. The coordinator should, therefore, have the rest of the
terminal building searched before considering re-occupation. Where the evacuation was carried out before
any search, the coordinator will have to initiate a search before considering the question of re-occupation.
54. Where the time has been given for an explosion, but no explosion occurs, the coordinator
must ensure that at least one hour is allowed to lapse after that time before search procedures are initiated
or recommenced.
STAFF TRAINING
55. Good training is essential so that in the event of a need to search and evacuate, not only
the search teams but also every airport employee will know what to do. Regular search and evacuation drills
will help maintain staff awareness and vigilance. All staff should be made aware of the evacuation assembly
points. Telephonists, information desk staff and any other persons likely to answer a telephone number
available to the public should be instructed how to handle a bomb threat call (refer to the checklist for
telephonists at Appendix-4).
56. Other key staff such as evacuation marshals need to know their role and be regularly
trained. It is important that all staff recognize those who have been specially nominated and obey their
instructions. Procedures must ensure that nominated staff are replaced when they leave or are temporarily
absent, so that there are no lapses of cover.
APPENDIX-10
OFFICIAL REPORT ON ACT OF UNLAWFUL
INTERFERENCE
INFORMATION PROVIDED IN
THIS REPORT IS RESTRICTED
AND WILL ONLY BE DISCLOSED
TO AUTHORIZED PERSONS
A. GENERAL INFORMATION
Volume V - 87
Volume V-88 Security Manual Doc8973/7
1. Flight information
Operator: .............................................................
2. Aircraft
Airport where the sabotage device/substance was (believed) loaded on the aircraft: ......................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
C. THE OCCURRENCE
Explosives: ........................................................................................................................................
Incendiary: .........................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
4. Communications
Written message
Telephone call
..................................................................................................................................................................................
..................................................................................................................................................................................
Flight crew
Cabin crew
Passenger
..................................................................................................................................................................................
..................................................................................................................................................................................
Volume V - 89
Volume V-90 Security Manual Doc8973/7
Yes No
4.3 Were there specific demands made? (if yes, please explain)
.....................................................................................................................................................................................
.....................................................................................................................................................................................
The pilot?
The perpetrator?
.....................................................................................................................................................................................
.....................................................................................................................................................................................
5. Counter measures
Yes No
5.1 Was there any attempt to stop the action of the perpetrator(s)?
5.3 Results:
Successful Unsuccessful
Yes No
.....................................................................................................................................................................................
.......................................................................................................................................................................................
Yes No
5.6 Were crew members familiar with least risk bomb location?
.......................................................................................................................................................................................
.......................................................................................................................................................................................
6.2 Was there sufficient fuel to reach all of the destinations ordered? List below. Yes No
a) ....................................................................................................................................................
b) ....................................................................................................................................................
c) ....................................................................................................................................................
d) ....................................................................................................................................................
e) ....................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
6.3 Did the crew have the necessary charts available for the destinations? List below. Yes No
a) ....................................................................................................................................................
b) ....................................................................................................................................................
c) ....................................................................................................................................................
d) ....................................................................................................................................................
e) ....................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
Volume V - 91
Volume V-92 Security Manual Doc8973/7
6.4 Were any of the passengers allowed to leave the aircraft at any of the airports? List airports in chronological
order:
Airport Yes No
a) ....................................................................................................................................................
b) ....................................................................................................................................................
c) ....................................................................................................................................................
d) ....................................................................................................................................................
e) ....................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
6.5 Was action taken at any of the airports to resolve the occurrence? List below.
Airport Yes No
a) ....................................................................................................................................................
b) ....................................................................................................................................................
c) ....................................................................................................................................................
d) ....................................................................................................................................................
e) ....................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
Airport Yes No
a) ....................................................................................................................................................
b) ....................................................................................................................................................
c) ....................................................................................................................................................
d) ....................................................................................................................................................
e) ....................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
Alias: .............................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
Alias: .............................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
Alias: .............................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
Volume V - 93
Volume V-94 Security Manual Doc8973/7
E. AIRPORT SECURITY
Yes No
1. Is there an airport security programme where the perpetrator(s) boarded the aircraft?
2. Does the security programme provide for protection of the air side
(fences, guards, locked gates, patrols, identification system, etc.)?
3. Are the identification cards issued to ground personnel and auxiliary services reviewed
regularly?
a) Are all passengers and cabin baggage subjected to inspection/screening for all
international flights?
b) Are all passengers and cabin baggage subjected to inspection/screening for all
domestic flights?
d) Are all passengers and their cabin baggage which have been subjected to
inspection/screening re-screened before boarding the aircraft if they mix or have
contact with persons who have not been subjected to inspection/screening?
Walk-through
Hand-held
X-ray unit
Physical inspection
Other
Yes No
7. Was the operation of the metal detection devices and X-ray units recently examined
using test objects?
8. Has training regularly been provided to security personnel who operate metal detectors and
X-ray units?
9. Matching baggage:
b) Does the procedure in a) above include transfer passengers and their inter-line checked
baggage?
10. Did the perpetrator(s) circumvent the security measures in place by use of:
Force
Other
.......................................................................................................................................................................................
.......................................................................................................................................................................................
11. What new measures and procedures have been taken or are contemplated to prevent recurrence of a similar event?
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
Volume V - 95
Volume V-96 Security Manual Doc8973/7
.....................................................................................................................................................................................
2. Airport/aircraft
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
5. Furnish any additional information relevant to circumvention of security procedures during this Occurrence:
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
PART II: INFORMATION CONCERNING THE ACTION TAKEN FOR THE RELEASE OF PASSENGERS AND CREW AND
THE RETURN OF THE AIRCRAFT, IF APPLICABLE
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
2. Action taken to facilitate the continuation of the journey of the passengers and crew as soon as practicable:
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
3. Action taken to return the aircraft and its cargo, without delay, to the persons lawfully entitled to possession:
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
Volume V - 97
Volume V-98 Security Manual Doc8973/7
PART III: INFORMATION CONCERNING THE MEASURES TAKEN IN RELATION TO THE PERPETRATOR(S)
1. Action by the competent authorities to take the perpetrator(s) into custody or other measures taken to ensure
his/her/their presence:
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
2. Action taken to institute extradition proceedings or to submit the case to the competent authorities for the
purpose of prosecution; advise of the results of such proceedings, if available (otherwise provide such
information separately as soon as practicable).
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
.......................................................................................................................................................................................
PART IV: INFORMATION CONCERNING THE ACTION TAKEN TO REMEDY WEAKNESSES SO AS TO PREVENT
PART IV: RECURRENCE OF ACTS OF UNLAWFUL INTERFERENCE AS SPECIFIED IN ANNEX 17, STANDARD 3.4.6.
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
.....................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................................
...................................................................................
Name
...................................................................................
Title
...................................................................................
Department
END
Volume V - 99