Documente Academic
Documente Profesional
Documente Cultură
JACQUES DUCHESNEAU
is Senior Advisor, Civil Aviation Security and Aviation Terrorism at Aviation Strategies International. He has served
as Member of Parliament in the Québec National Assembly, President and Chief Executive Officer of the Canadian
Air Transport Security Authority and Montreal’s Police Chief. Dr Duchesneau has been bestowed with the Order of
Canada, the National Order of Québec and France’s National Order of Merit. He holds a PhD in War Studies from
the Royal Military College of Canada.
MAXIME LANGLOIS
is Director, Corporate Services at Aviation Strategies International. He previously worked for INTERPOL, the
Jacques Duchesneau
United Nations and the Department of Foreign Affairs and International Trade of Canada.
Abstract
This paper uses a unique database of aviation terrorist attacks to analyse the phenomenon of
airport attacks. The evolution of aviation terrorism is described with a particular focus on airport
attacks, using empirical and historical data to form a factual baseline for historical analysis and
policy recommendations. The authors make a distinction between acts of unlawful interference, the
all-encompassing term the International Civil Aviation Organization uses, and actual terrorist attacks
against civil aviation. While statistics demonstrate that airport attacks have been perpetrated steadily
since the 1970s, with no major fluctuations in recent years, they also demonstrate that airport attacks
Maxime Langlois
may have the potential to become more lethal than ever before. Analyses and guidance are also
provided on how to better protect airports, suggesting that the hardening of aircraft as targets has
actually transferred considerable security risk to airports. To effectively secure the air transportation
system, a three-pronged approach to aviation security is proposed, transcending airport security and
reaching far beyond aviation in its scope.
Keywords
airport, aviation, security, terrorism
Jacques Duchesneau,
Aviation Strategies International,
440 René-Levesque Blvd West, INTRODUCTION the gradual addition of enhanced security
Suite 1202, Montréal, QC,
Canada H2Z 1V7 Since the dawn of commercial aviation, measures, airports by nature have had
Tel: +1.514.398.0909; terrorists have used the air transportation to remain public areas, at least partly
E-mail: duchesj@mac.com
system to both commit their attacks and accessible to anyone, hence making them
to attack the system as a target in its own preferred targets.
Maxime Langlois,
Aviation Strategies International, right. Airports in particular have stood Airport attacks, along with aircraft
440 René-Levesque Blvd West,
Suite 1202, Montréal, QC, out as relatively ‘soft’ targets for terrorist attacks, belong to a specific aviation ter-
Canada H2Z 1V7
attacks. While aircraft have been hard- rorism modus operandi (MO, ie method
Tel: +1.514.398.0909;
E-mail: max.langlois@icloud.com ened as targets over recent decades with of attack) called ground attacks, which
Table 1 summarises the composition that the 6,184 deaths from aviation ter-
of the database per MO,6 along with rorism have occurred in only 175 attacks
the number of corresponding deaths. (28 per cent) meaning that the other 460
There is a direct and consistent correla- attacks (72 per cent) caused no casualties.
tion between MOs and their respective For its part, Figure 1 illustrates the
number of deaths; the most used MOs evolution of the aviation terrorism MOs
have been the least lethal, and vice versa. for the 1960–2016 period. The 1931–1959
Another important category of the period is purposely excluded, given the
database was motive, precisely created to extremely low prevalence of aviation
distinguish actual terrorist attacks from terrorism before 1960, to concentrate
mere criminal incidents, based on the on patterns of MOs occurring over the
aforementioned def inition of aviation past 57 years. The graphic clearly shows
terrorism. Out of all 2,071 listed acts of that ground attacks and hijackings have
unlawful interference, only 635 could been the MOs of preference for aviation
be definitively categorised as terrorist.7 terrorists. It also shows that the hijack-
Table 2 provides statistics on the MOs ings, sabotage and suicide missions have
used to carry out those 635 terrorist sharply declined to negligible levels since
attacks as well as their consequent fatal- the 9/11 attacks; however, the number
ities. The same pattern applies here: the of ground attacks has not followed the
most widely used MOs have been the same trend and continues to f luctuate on
least lethal, and vice versa. The comparison a pre-2000s pattern.
of Tables 1 and 2 reveals that whereas a
minority of acts of unlawful interference
have been terrorist attacks (31 per cent), AIRPORT ATTACKS
a large majority of total deaths are attrib- Perpetrators have used the full range of
utable to terrorist attacks (72 per cent). possibilities to attack airports, from mass
Furthermore, it is important to mention killings using grenades and automatic
25
20
15
Attacks
10
0
1960
1962
1964
1966
1968
1970
1972
1974
1976
1978
1980
1982
1984
1986
1988
1990
1992
1994
1996
1998
2000
2002
2004
2006
2008
2010
2012
2014
2016
Ground Attacks Hijacking Sabotage Suicide Mission
Figure 1 Evolution of aviation terrorism MOs
it at Lod Airport near Tel Aviv. Refusing On 30th May, 1972, the PFLP delegated
to be blackmailed once again, the Israeli a three-member JRA cell to retaliate for
government mandated elite commandos the Israelis’ surprise move of three weeks
to storm the airplane and release the pas- before and carry out the first full-scale
sengers. The operation was successful: two airport attack in history. The JRA oper-
hijackers were killed and the other two atives f lew on Air France to Lod Airport.
captured. One passenger died and five While about 250 passengers were waiting
others were injured, but the government at immigration, the terrorists pulled out
of Israel made the point that it would automatic weapons and hand grenades
not be blackmailed through aviation ter- from their carry-on luggage and fired at
rorism anymore. This was a watershed the crowd. Their attack killed 28 people
moment for nascent aviation terrorism, the and injured about 70 others.12 The Lod
very first time a government launched a Airport attack shares several character-
security operation to abort an act of istics with tens of other airport attacks,
unlawful interference while accepting including the fact that people waiting in
the risk of collateral damage. It was also a line to be ‘processed’ allowed terrorists
watershed moment for airport attacks; the to maximise the carnage of their attacks.
PFLP, which had mostly refrained from Figure 2 illustrates the evolution of
killing civilians in its past operations, did terrorist airport attacks and their related
not anticipate the Israeli government’s deaths from 1970 to 2016. Except for
surprise move. 1983 (11) and 1992 (16), the number of
As a Marxist group, the PLFP maintained terrorist airport attacks has consistently
relations with several foreign revolutionary f luctuated between 0 and 10 per year.
groups such as the Japanese Red Army As for the number of deaths, it has oscil-
( JRA) and the Irish Republican Army.11 lated based on the number and success of
airport attacks. Peaks are noticeable in 1972 levels. The provisions of Annex 17 and
(corresponding to the Lod Airport attack), its amendments can be categorised in
between 1984 and 1986, between 2000 five different groups: (1) general principles,
and 2003, and between 2014 and 2016. organisation and administration; (2) airport
The 1984–1986 peak is in part attrib- operations; (3) aircraft operations; (4) air-
utable13 to a coordinated airport attack craft in the air; and (5) international
by Abu Nidal Organization (ANO) on cooperation.
27th December, 1985. First, four armed The most visible and tangible aviation
men attacked the El Al and Trans World security measures are deployed at airports.
Airlines check-in counters at the Rome ICAO’s Annex 17 lists the roles and respon-
Airport, firing guns and throwing grenades sibilities of airport operators regarding
at a long queue of passengers. The ter- screening operations, prevention activities
rorists managed to kill 16 and wounded and activities in a rapid response to attacks.
99 before the police killed three of them. Airport operators are responsible for the
Moments later, three terrorists stormed coordination of agencies involved in
the Vienna Airport and threw grenades aviation security. The senior airport
at passengers queuing up at the El Al security personnel also lead the Airport
counter, killing three and injuring 40. Security Programme (ASP), the airport
As St. John points out, these attacks were security committee and prevention
excellent demonstrations of the vulnerability campaigns. It is also responsible for the
of airport terminals.14 The 2001–2003 peak development and implementation of
is for its part largely explained by airport emergency plans. ICAO member states
attacks carried out in Sri Lanka by the must have authorised officials deployed
Liberation Tigers of Tamil Eelam. The at international airports to assist and deal
graph also shows that 2016 was the most with suspected or actual situations of
lethal year for terrorist airport attacks unlawful interference with civil aviation.16
so far, with 60 deaths, entirely attributable Annex 17 also requires that airport
to attacks conducted at Brussels Airport on administrations ensure additional security
22nd March (15 deaths) and at Atatürk measures for specific f lights upon request
Airport in Istanbul on 28th June (45 deaths). from other states.17 Airport design and the
infrastructure plan of the airport are also
key components in the efficiency of
PROTECTING AIRPORTS security systems.
The framework In reality, this translates into the ASP
Introduced in 1974, Annex 1715 to the seeking to achieve the following core
International Civil Aviation Organization’s security tasks: (1) the pre-board screening
(ICAO) Chicago Convention was intended (PBS) of travellers and their carry-on
to establish an evolutionary framework baggage; (2) the hold-baggage screening
for a multilayered aviation security system (HBS); (3) the screening of employees
that would form a defensive structure to and crew, also known as non-passenger
deter, prevent and respond to various screening (NPS); (4) the control of access
threats. Such a multilayered approach to the restricted areas through the guide-
also improved the chances of intercepting lines of the airport perimeter security
a threat at the different stages of an ongoing programme, which is complemented by
attack. For example, a threat undetected the airport perimeter intrusion detection
at level 1 should be detected in succeeding system (PIDS); and (5) the supply chain
and screening systems for cargo and mail. the air on the ground inevitably increases
Trained officers, whose qualifications are the vulnerability of airports and makes
regularly tested, perform all these activities. them attractive aviation targets. The use
The boundary between a restricted area of early warning systems giving security
and a non-restricted area (landside area) teams sufficient time to activate check-
of an aerodrome is divided by a primary points on airport access roads, shut down
security line. The landside area is where terminals and block entrance areas to
both travelling passengers and the non- stop attackers are but just a few ideas to
travelling public have unrestricted access enhance security at airports. The addition
(eg public areas, parking lots and roads). of bulletproof windows to protect people
The objective of any security system inside the terminal and delay entry to
is to delay or deter the forceful entry of terrorists, designated high-protection areas
intruders into a protected area to allow where passengers and employees could take
time for reinforcement units to come to refuge rapidly during an active shooter
the rescue. In the specific case of airports, situation are also concepts deserving of
the Annex 17 multilayered system aims to exploration.
locate and address weapons or dangerous
devices at the airport, precisely before
they represent any risks to aircraft and ‘Cat and mouse’
their passengers. This hardening of the The terrorism–security conundrum has
aircraft targets creates considerable security evolved into a game of ‘cat and mouse’.
and procedural stress to the airport itself, This applies, but is not unique to, the air
hence the complexity of core security transport system. On the one hand, states
tasks. As security measures hardened the and security experts have continually
protection of passengers and aircraft, reacted to acts of terrorism, coming up
airport terminals and facilities became with new countermeasures, tactics, tools
attractive soft targets for terrorists. Indeed, and processes to stay at least one step
airport attacks are highly valued by ter- ahead of evolving threats. On the other
rorists because, for the most part, they hand, terrorists have continuously sought
need less preparation and sophistication new and innovative ways to get around
than airborne attacks, can cause huge those new security measures while enabling
casualties and damage, and offer greater them to proudly re-invent themselves with
escape options. The statistics presented determination.
in the previous sections tend to demon- While security authorities must address
strate that using airports as ‘filters’ to attacks that have already occurred and
better protect aviation may have indeed make sure they cannot be repeated, they
contributed to a decrease in the number must put more efforts in the anticipation
of terrorist attacks against aircraft. But of the next terrorist innovation and act to
one may not be surprised that airports, secure vulnerabilities before terrorists
as ‘filters’, have not witnessed the same launch a new attack. Unfortunately, this
declining trend in attacks. is very difficult to accomplish, for two
Simply put, the principle that security reasons. First, such attacks are what Taleb
in the air begins with security on the calls ‘Black Swans events’18 in the sense
ground has proven to work; what is less that they are rare, that they have a high
clear is how the regulatory framework impact and that people analysing them often
has adapted to the principle that securing use retrospective predictability ( judging
technology and effective operations, but and warning, prevention and deterrence,
also on the establishment of a culture of and crisis management and resilience to
security that is ingrained in the public maximise their efforts.
and civil aviation authorities. This con- The desire and potential of terrorists
sideration must be factored into future to attack civil aviation, combined with the
aviation security policies. vulnerabilities of the air transport system
and the ability of terrorist groups to easily
cross borders, represents a continued threat.
CONCLUSION Although progress has been made in disrupt-
The current aviation security framework ing aviation terrorism, the basic features of
was ingeniously designed with multiple civil aviation always make it an attractive
layers, with the main objective of better high profile target for terrorists, meaning
protecting aircraft against acts of unlawful that it is very unlikely they will give
interference. Statistics on aviation terror- up their focus on civil aviation in the
ism tend to demonstrate that this system foreseeable future.
has over time, and especially since the
early 2000s, led to a significant decrease References and Notes
in the number of attacks against aircraft, (1) For more information about this definition
such as hijackings and sabotage. Never- and the various attempts to define aviation
theless, such a decline has not been seen terrorism, see Duchesneau, J. (2015) ‘Aviation
with the incidence of airport attacks; their terrorism: Thwarting high-impact low-
probability attacks’, PhD thesis, Royal
number have continuously f luctuated Military College of Canada, Kingston.
between 1 and 10 a year since the early 1970s, (2) Acharya, D. (2016) ‘Why Islamic State
with no significant and steady decrease target airports: A global stage and variety of
nationalities’, First Post, 4th July 4, available
whatsoever since the early 2000s. Figure 2
at: http://www.firstpost.com/world/foreign-
showed that 2016 was in fact the most passengers-a-global-stage-why-islamic-state-
lethal year for terrorist airport attacks on targets-airports-2871798.html (accessed 15th
record. Although the number of deaths July, 2017).
(3) Azani, E., Atiyas Lvovsky, L. and Haberfield,
from airport attacks since 2011 is still not D. (2016) ‘Trends in aviation terrorism’,
unprecedented (similar ‘waves’ have been Herzliya, IS, International Institute for
seen before), the trend will set a new Counter-Terrorism, August, available at:
precedent if it continues for a few years. http://www.ict.org.il/Article/1757/trends-in-
the-aviation-terrorism-threat (accessed
The fact of the matter is that aviation 11th August, 2016).
security creates considerable security stress (4) Duchesneau, ref. 1 above.
to airports. Protecting the air begins on (5) Seven databases/lists of aviation terrorist
the ground, most particularly at airports, attacks were consulted as potential sources to
quantify aviation terrorism. None of them
making the latter prime targets, either were considered complete or adequate, their
deliberately or by default. Security common weakness being a lack of rigour at
checkpoints in particular have become distinguishing purely criminal incidents from
actual terrorist attacks based on the motives of
chokepoints offering potential prime crowd
perpetrators. All terrorists are also criminals
targets to terrorists. While technologies by default, at least from a rule-of-law
may offer solutions coping with such f laws, perspective, but not all criminals are terrorists.
protecting airports cannot be rethought This lack of reliable statistics on aviation
terrorism led the author to consolidate all
properly without adopting a systemic entries of the seven consulted databases/
approach reaching far beyond the aviation lists. Some 7000 acts of unlawful interference
system. Authorities must use intelligence against civil aviation were compiled into a