Security assessment of DXB airport
Lalitya Dhavala | Airport and Airline Security Operations | March 17, 2014
CONTENTS
Chapter 1 : INTRODUCTION .......................................................................................... 2
Chapter 2 : SECURITY ANALYSIS ................................................................................. 4
Security Analysis of Emirates Group as a stand-alone unit:............................................. 5
Security Risk Management:............................................................................................. 6
PHASE 1: INTELLIGENCE .......................................................................................... 7
PHASE 2: AT TERMINAL 3, CHECK-IN PROCEDURES............................................. 8
PHASE 3: BOARDING ............................................................................................... 10
PHASE 4: RAMP AND RUNWAY .............................................................................. 11
Cyber-threats: ............................................................................................................... 12
Comparison with the best we know, the world’s most secure airport, Tel Aviv: .............. 13
Chapter 3 : CONCLUSION ............................................................................................ 15
REFERENCES.............................................................................................................. 16
PAGE 1
LIST OF ABBREVIATIONS
MANPADS
LAG
API/ APIS
MAN Portable Air Defence Systems
Liquids Aerosols Gels
Advance Passenger Information System
FIDS
Flight Information Display Systems
EDS
Explosive Detection Systems
BHS
Baggage Hold Systems
WTMD
Walk Through Metal Detectors
HHMD
Hand Held Metal Detectors
TDS
Trace Detection Systems
SLTD
Stolen and Lost Travel Database
TIP
Threat Image Projection
CTS
Computerised Tomography Scanners
RWY
Runway
LDG
Landing
R.A.
Restricted Area
KPI
Key Performance Indicators
CPDLC
Controller Pilot Data Link
Communications
LIST OF FIGURES
Figure 1: Different threats to a flight operation ................................................................. 4
Figure 2: Emirates Terminal 3, Concourse view .............................................................. 8
Figure 3: Multiple levels clearly providing no focal point to attack .................................... 9
Figure 4: Mapping threats to goals for ICT security ....................................................... 13
Figure 5: Ideal secure environment, highlighting need for coordination between various
parties ........................................................................................................................... 15
PAGE 2
Chapter 1 INTRODUCTION
The Emirates Group is one of the world’s most rapidly expanding travel and tourism
conglomerate and Emirates Airlines, its core business, is the world’s best airline 2013.
Emirates Airlines carried 39,391,000 passengers (16% increase over the last financial
year) and 2 million tonnes of cargo during 2012-13. Generating 3.1% profit in a
depressing economic environment is a feat indeed. Its 1.5 million fans on Facebook
highlight the brand’s popularity on social media.
However, aviation is a high-risk business and any damaging safety or security accident
can have immediate effects on an airline’s financial strength. A recent case in point is of
the Malaysia Airlines Flight MH370, which undermined its share price and ticket sales,
though it has a very good record of safety. Thus, it is important for Emirates Airlines to
continuously dedicate resources and effort towards ensuring security on all its flights.
Surrounded by a region of conflict and instability, characterized by the Arab Spring, the
probability of a terrorist attack or instability in the UAE may appear to be high. However
the stability in the government of the UAE, its economy and continuous investment in
security are deterrents to such activity. The majority of the nationals are patriotic, making
the environment for internal insurgency weak.
This report is an assessment of Dubai International Airport in terms of security. The
report first discusses the importance of DXB to Emirates Airlines and the security of the
Emirates Group as a stand-alone unit. Then, the security technology available in the
airport, the operational procedures in use are evaluated and the potential for
improvement is discussed.
PAGE 3
Chapter 2 : SECURITY ANALYSIS
Figure 1: Different threats to a flight operation
The complex nature of the airport business opens up several ways in which a particular
flight operation can be vulnerable to threats of hostile intent. As seen in Figure 1,
undesirable objects can be carried to the flight through flight crew carry-on bags,
passenger carry-on bags, checked baggage, courier cargo, transfer baggage, cargo,
mail; people intending to cause harm to the aircraft may travel as flight crew or
passengers, may come into the terminal as catering and cleaning personnel or ground
crew. A large scale orchestrated terrorist attack may even use shoulder-fire missiles
such as MANPADS or other surface-to-air missiles or conduct electronic warfare.
There are two prevalent approaches to aviation security, attacker-centric and assetcentric. The attacker-centric approach was widely used in the industry till recently and
focused on preventing ‘bad’ things and ‘bad’ people from reaching the aircraft. It is
largely reactive with the ‘shoe-bomber’ incident requiring passengers to take off shoes
through security checks and ‘liquid-explosion’ imposing restrictions on LAGs in cabin
baggage. It patches a known vulnerability in the system. The asset-centric approach
focuses on protecting the important assets to the organization and focuses on
discouraging an attack on those assets. This provides protection from a wider range of
attacks, including the ‘unknown unknowns’. This is achieved through two specific ways:
PAGE 4
1. Reducing the attractiveness of the target to an attacker
2. Increasing the risk of being caught before successful attack to an attacker
The asset-centric approach is clearly necessary in the current scenario as attackers
become more innovative in their approach and as seen by the attempted bombing using
shoes, liquids and underwear, these ‘unknown unknowns’ bring the element of surprise
in the industry.
Security Analysis of Emirates Group as a stand-alone unit:
EK follows a ‘hub and spoke’ business model with DXB being the central node through
which it serves more than 140 destinations. The hub and spoke model is unfavourable to
security as the hub represents the single node of failure. A major security event at
Terminal 3 has the potential to collapse the entire EK network. However, the
management of security is easier with this model. A centralised system for security and
operations is advantageous because it is easier and resource saving to spend on one
hub rather than many important nodes.
Terminal 3 presently caters to EK and Qantas operations. All codeshare flights are
however operated from Terminal 1. Emirates doesn’t need to provide security services to
those flights. However it needs to ensure that the codeshare partner meets or exceeds
the security standards of EK. This is because, a security event on a codeshare flight still
affects the reputation of EK airlines. The affected passenger may have bought the ticket
under Emirates Airlines. One may consider shifting all code-sharing operations to
Terminal 3 as well. However, this increases the attractiveness of Terminal 3 as a target,
not only due to increased operations, but also higher concentration of people at that
area. Considering that all terminals of Dubai Airports deploy the same level of security, it
is wiser to let it be, providing convenience to passengers and airport authorities alike.
Emirates Group has a dedicated Transguard Security Services under its wing for
providing services internally. Transguard is fully compliant with ISO standards and even
has an in-house training program for security studies in collaboration with leading
universities. Transguard offers services for secure transport of valuable goods through
customs, through land and air, and personal security services to VIPs and diplomatic
cargo. This protects the brand of Emirates Airlines as a premium airline which can cater
to all the needs of business travellers and international diplomats. This in-house
capability provides for increasing the risk of exposure to an attacker, who has to deal
with both airport and Transguard security, if he plans to attack a VIP or an important
consignment. The collaboration with external universities and agencies provides for the
‘devil’s advocate’ view in the evaluation of their services.
Transguard also supports Dubai Airports in implementation of API in the airport, by
providing document verification services and investigates all cases of document theft,
fraud. This is advantageous as compared to Dubai Airports doing it independently,
because the airline will have more information about a person who has booked a ticket
PAGE 5
with falsified documents internally. Thus, if a security breach occurs, airport authorities
may have information about the concerned party faster. Also, knowledge that falsified
travel documents can be easily traced back deters this activity by potential attackers.
Security Risk Management:
An organization defines its risk appetite by identifying its critical assets and defining their
relative importance. The risk management process then seeks to address vulnerabilities
according to the following repetitive cycle:
Risk identification
Risk assessment
Risk response
Risk monitoring
The passengers flying by Emirates and its fleet are the most critical assets to Emirates
Airlines. Other critical assets to be protected are its employees, IT equipment,
passenger details, customer reservation credit card details, flight plans, crew contracts,
employee centres, support lists and business plans. The unavailability of services,
destruction of multi-million dollar aircrafts, disclosure and damage to the public image of
the airline are the possible consequences that Emirates wishes to avoid.
Different phases of security operations, for which the airport is responsible, are identified
below. The security risk assessment of the airport shall be described according to the
below phases:
•
Intelligence
•
Airport terminal, check-in procedures
•
Boarding
•
Ramp and runways
PAGE 6
PHASE 1: INTELLIGENCE
1 Security Phase
Intelligence
2 Generic hazard
Insufficient information available
Specific Hazard(s)
Inefficient sharing of information between different parties, false information regarding a specific threat
Worst credible Scenario
Surprise attack against the airport, or a surprise attempt to hijack or otherwise harm the aircraft.
3 Analysis of potential Accident Scenario
3.1 Triggering event
3.2 Undesirable Operational State
Insufficient advance information regarding a threat
4
Surprise attack against the airport
4.1 To avoid the UOS
3.3 Accident Outcome
Damage to the reputation of the
airport and airline, injury to
passengers; Catastrophic accident
4.2 To recover before the Accident
Barriers in place
Technological defences : None
Procedural defences: Excellent intelligence network,
clear line of command in an emergency, good cooperation between UAE and neighbouring countries to
facilitate sharing of information
Armed patrol and duty officers in the airport terminal, security checkpoints within the terminal, CCTV monitoring
5 Risk Assessment
The estimated frequency of
The barriers will fail in AVOIDING
the triggering event (per
the UOS...
flight sectors) is:
The barriers will fail in
RECOVERING the situation before
the ACCIDENT...
The accident severity would be...
Major
About every 1000 sectors
Once in 100 000 times
Once in 10M times
1.E-03
1.E-05
1.E-07
6 Result
UOS frequency:
Mean Accident frequency:
1.E-08
1.E-15
1.E-08
6.1 Resulting risk class
Accept
Accept
1.E-02
Table 1: Risk assessment for intelligence phase security operations
Recommendations for improvement: Promote sharing of information internally as well to
ensure coordination between Emirates and Dubai Airports. It is important to ensure that
PAGE 7
the security officer of Emirates Airlines and the government share information about
threats to be well-prepared.
PHASE 2: AT TERMINAL 3, CHECK-IN PROCEDURES
Generic hazard: Unidentified baggage, Undesirable persons checking in for a flight
Specific components of the hazard: Explosive devices contained within baggage, people
with intentions of sabotage or hijacking the flight
Hazard related consequences: The worst credible scenario that can occur at Terminal 3
is an explosion within the terminal building or a potential attacker flying on a particular
leg from DXB
Figure 2: Emirates Terminal 3, Concourse view
Existing defences against this hazard:
Technological defences:
o Car plate number recognition at entry points to airport
o 24/7 CCTV monitoring with excellent picture clarity and zoom-in ability of
up to 16x, 7000 advanced cameras, Video over IP security systems
o FIDS units at multiple locations warning passengers to report any
unidentified baggage lying around
o Total built out area of 528,000 sq.m. for EK, multi-layered building
PAGE 8
Figure 3: Multiple levels clearly providing no focal point to attack
o
o
o
o
o
Premium class lounges covering 29,000 sq.m; 3 conference rooms; 3
business centres
20 A380 gates
Around a total of 200 counters including self-service kiosks, dedicated
premium class counters, dedicated Skywards members counters
Electronic supply chain manifests for secure freight movement into and
out of the terminal 2. Dedicated internet links to transfer confidential air
cargo information and data
Use of API to identify undesirable passengers
The large space and multiple number of counters, conference rooms etc. makes
it virtually impossible for an attacker to attack a specific crowd and decreases the
attractiveness of the target as there are no large congregations of people. The
use of API being the latest industry standard also increases the risk of being
caught to a potential attacker.
Procedural defences: 4000 Patrol airport security officers, both uniformed and
plain-clothed are on duty to observe and deal with unidentified baggage as
quickly as possible. All officers are trained in behavioural detection to identify a
potential assailant. This raises the risk of pre-attack identification to an
unattractive level for an attacker. Airport perimeter patrol officers look out for cars
that are parked at the curb for long periods of time, repeatedly urging them to
leave.
Barriers that can hold an undesirable event from escalating into a major/ catastrophic
event: Armed patrol and duty officers in the airport terminal, bomb detection and k-9
squad on stand-by, security check-points within the terminal, border control.
PAGE 9
Resulting risk level: ‘To Secure’ for the risk of unidentified baggage, Acceptable for the
hazard of undesirable people; Mean accident frequency1: 1x10-9
Recommendations for improvement: Though there are patrol officers on duty, the
resource allocation should be such that there is continuous monitoring of sensitive areas
such as washrooms; an attacker may take advantage by planting an explosive in a
deliberately forgotten purse at the ladies’. Even lower-level support staff like janitors and
cleaners must be given awareness courses in airport security. Also, the entry point to
Dubai International is relatively insecure, being in the centre of the city making it a
potential target for ‘parking-lot’ attacks. This calls for ensuring that no arms are
prevalently used in the city by the government.
PHASE 3: BOARDING
Generic hazard: Undesirable people or objects on-board the flight
Specific components of the hazard: Potential hijackers/ terrorists on-board, Explosives
on-board, Sabotage of aircraft
Hazard related consequences: The worst credible scenarios that can occur are
explosion of the aircraft, injury to passengers, hijacking.
Existing defences against this hazard:
Technological defences:
o Dual x-ray and screening systems for the inspection of freight pallets and
cargo prior to arrival to the terminal 2, for cargo operations
Fully automated 6 MeV linac generator x-ray systems2, integrated with a
five-layered approach EDS for BHS
o Multiple security check-points equipped with WTMD, HHMD, TDS, X-ray
screening for hand baggage, Liquid Explosives Detection Systems
o Smart E-GATE in full implementation now for border control
Procedural defences:
o Border control connected to Interpol databases to identify criminals or
other dangerous people, with UAE searching SLTD more than 50 million
times, i.e. almost every passenger
o Colour coded immigration counters for residents and non-residents
shortening waiting times at immigration queues, thereby avoiding large
crowds
o
1
Mean accident frequency derived from calculation similar to Table 1
2
In less than 30 seconds, a densely loaded 20-foot container of up to 11 tons can be scanned to
form a three dimensional map of the material inside the container. These systems are powerful
enough to penetrate 14 inches of steel and immediately yield clear high-resolution images for
excellent object discrimination.
PAGE 10
o
o
o
o
o
o
o
Clear line of command in identifying and isolating suspicious pieces of
baggage from the hold area
100% screening of all transfer baggage directly from the hold
Random screening of security staff, use of ‘TIP’ to keep security officers
alert and monitor their performance, regular assessment of screening
officers
Implementation of convenient shifts so that the officers are not fatigued
Behavioural detection officers and undercover policemen at security
check points
CCTV monitoring and regulation of all dangerous materials such as
knives available at the dining outlets after the security check-points
Maintenance and support staff entry and exit strictly controlled by dutytime specific access cards
Barriers that can hold an undesirable event from escalating into a major/ catastrophic
event: Trained cabin crew on-board to identify suspicious passengers and objects before
take-off.
Resulting risk level: Acceptable though the barriers after an undesirable event may fail
often; Mean accident frequency: 1x10-12
Recommendations for improvement: Border control must implement biometric measures
at least to the level of facial recognition, as present systems (other than E-GATE) rely on
comparing the person to a photo ID. The use of plastic cutlery instead of glass and
restricting the use of large knives is recommended. However, its impact on the perceived
luxury of the airport should be taken into account as Emirates Airlines mostly focuses on
premium customers. The Secure Registered Traveller System using automated carry-on
scanning, automatic biological pathogen detection, millimetre-wave full body scanning
and a quadruple resonance carpet that would detect threats in shoes without having to
take them off is being developed by General Electric. The SRT program also works with
smartcard technology along with fingerprint technology to help verify passengers. The
fingerprint scanner also detects for explosive material traces on the person's fingers.
Also newer technology like Analogic’s COBRA CTS system which can allow laptops and
liquids to stay in the baggage should be embraced, in order to expedite security
checking and allow for the rapid growth that EK and DXB are facing.
PHASE 4: RAMP AND RUNWAY
Generic hazard: Obstruction to normal take-off and landing, Aircraft sabotage
Specific components of the hazard: RWY debris and inflammable materials, undesirable
people tampering with the aircraft
Hazard related consequences: The worst credible scenarios that can occur are
hazardous T/O or LDG, rejected T/O or go-arounds, explosion of the aircraft.
PAGE 11
Existing defences against this hazard:
Technological defences:
o R.A. ID cards
o CCTV at all ramp areas and all entry/ exit points to airside, with ability to
lock gates from the control room
o Fibre optic perimeter intrusion detection systems which can relay
information immediately to all concerned parties
Procedural defences:
o Thorough background checks for all ground staff
o Preliminary security check for all staff entering the airside
o Pre-flight precautions and security search on the aircraft prior to boarding
of the passengers
Barriers that can hold an undesirable event from escalating into a major/ catastrophic
event: Patrol cars along the ramp areas, CCTV monitoring, ground surveillance radar
coverage from ATC TWR
Resulting risk level: Acceptable; Mean accident frequency: 1x10-12
Recommendations for improvement: Implementation of bio-metric systems for R.A.
access should be done.
Cyber-threats:
Airlines have to deal with the airports such that they do not solely focus on their aircrafts
but weaker and more vulnerable links such as ATC towers and communication links.
Cyber security is paramount, probably more than physical security today. Especially with
Emirates using up to 100 e-enabled aircraft such as the A380s in the future, deploying
information security is imperative. The consequences of a cyber-attack from the airport
may be as severe as physical destruction and outage of flight computers. One of the first
reported instances of this occurring was the crash of Spanair flight JK5022 which
crashed on August 20, 2008. It has been reported that a security vulnerability in the
maintenance computers hampered the efforts of the maintenance crew and contributed
to an unsafe aircraft departing.
The three goals of ensuring ICT security in Dubai Airports are:
1. Confidentiality: Ensuring that information access is only available to those who
require it and are authorized to have access
2. Integrity: Safeguarding the accuracy and consistency of information; ensuring
non manipulation (alternation, corruption) of information
3. Availability: Making sure information is available to those who need it and that
they can use the information when appropriate.
Typical threats are masquerading, eavesdropping, authorization violation, loss or
modification of information, denial of communication acts, forgery of information, and
PAGE 12
sabotage. These are all specific threats between ATC and pilot communications and
may prove to be crucial for the management of T/Os and landings at Dubai International.
Figure 4: Mapping threats to goals for ICT security
Though cyber-attacks directly from a passenger in the cabin to the cockpit systems may
be considered to be an airline responsibility, the vulnerability of a hack in the check-in
systems, unsupervised self-check in kiosks, other information systems and ATC
communication links is very crucial to Dubai Airports. Ensuring separation of the public
WiFi and any of the airport systems has to be done. Also important to ensure is the
protection of passenger information stored for the API and the screening images to
relieve the public mind and encourage implementation of this system. The Data Loss
Prevention Scheme initiative by Dubai Airports has to be monitored and updated
regularly.
Comparison with the best we know, the world’s most secure airport, Tel Aviv:
Ben Gurion international airport has the reputation of being the world’s most secure
airport, despite the region being a high potential target for terrorism. This has been
achieved through a series of complex measures taken by the airport authorities. Keeping
in mind that aviation security does not follow a ‘one-size-fits-all’ policy, we compare the
security procedures at DXB(66 million PAX) to Tel Aviv(14.2 million PAX), to identify if
any lessons can be learnt.
1. Preliminary security checkpoint of all vehicles before entering the airport
compound, armed guards spot checking all vehicles entering: DXB does not
have such measures in place as firstly the security threat to the airport is not as
significant as Tel Aviv; it is intrusive to the tourist passengers who are the main
source of business to Dubai. Also ammunition entering and exiting the country is
strictly controlled by the customs authorities and Transguard services .Therefore,
the probability of a common man attacking the airport with personal arms or
MANPADS is quite low. However, as seen in the ‘parking lot’ bombing incidents,
DXB should implement an additional security measure at the parking token
PAGE 13
2.
3.
4.
5.
6.
7.
8.
9.
issuing counter so that the vulnerability posed by an airport in the heart of the city
is lessened.
Armed security agents at the terminal gates in Israel: DXB does not have
uniformed officers at the gates but continuous patrolling of armed plain-clothed
officers makes tourists less wary of their surroundings. Also CCTV monitoring is
efficient around the terminal entry and exits.
Plain-clothed and uniformed officers patrolling at Israel: Also present in DXB.
Detailed Interviewing of all passengers: This is very intrusive to tourists and
business travellers who form the crux of the airport passengers at DXB. As seen
in the risk assessment above, the present security threat doesn’t warrant its
necessity in DXB.
Pre-check in screening of baggage through x-ray machines in Israel: old
technology that is replaced by the 100% screened baggage screening integrated
with the BHS in DXB.
All checked-in baggage put in a pressure chamber to trigger any explosives:
Dubai International airport handles 62 million bags per year and 90,000 bags
daily. Emirates has a policy of maintaining fixed minimum connection time of 75
minutes for transfer flights, which form 75 % of baggage. Mishandled bags per
1000 is the most important KPI for Emirates, which has a figure of below 1.5, far
below the IATA standard of 8.99. This brings out an important factor in the
implementation of BHS. Within this time frame it is difficult to have all the
baggage pressured through an explosion chamber. The procedure of identifying
high-risk baggage through a five-layer system and subjecting only high-risk
baggage to a pressure chamber is more beneficial to the operations of DXB.
Personal security, X RAY for hand luggage, metal detectors, additional pat-down
checking, Hand Held Metal Detectors are all used at DXB as well.
Rechecking of passport and boarding card at the gate is also done at DXB.
Questioning of passengers by passport control for incoming flights also present
at DXB, though it is more selective.
PAGE 14
Chapter 3 : CONCLUSION
Traditionally aviation security has focused on preventing unwanted incidents but the
focus must also be on addressing the security risks through-out the incident lifecycle.
This calls for well-developed emergency response plans that are communicated to all
people involved in the operations.
Dubai Airports has some of the best security features that help to deter terrorist activities
in the present but going in to the future, Dubai Airports should focus on ensuring cybersecurity even as cases of possible ‘cyber-hijacking’ are being discovered. The weak
links in the chain such as ATC towers, CPDLC messages have to be secured to ensure
that they are not tampered with. Cyber threats may not be so high-level, a hack of the
FIDS at the airport, displaying messages that a bomb is set to go off in the airport, may
be enough to create chaos and pandemonium in the terminal, allowing the terminal to be
a potential target for a terrorist.
In the era of increasing inter-connectedness, making aviation a more complex system
than it already is, it becomes mandatory to ensure airport and airline co-operation. While
this is more or less achieved in safety, security seems to be an after-thought. However it
is important to realise that though the methods in safety or security are different, the
harm that comes to an aircraft overlaps very quickly when there is an undesirable event.
Figure 5: Ideal secure environment, highlighting need for coordination between various
parties
PAGE 15
REFERENCES
Airport Business, 2012. Developing the 2020 airport model. [Online]
Available at: http://www.airport-business.com/2012/11/developing-the-2020-airportsecurity-model/
[Accessed 5 March 2014].
dubai Airports, 2012. Process and governance. [Online]
Available at: dubaiairportsreview.com/people/process-governance/
[Accessed 4 March 2014].
Dubai Airports, 2013. Connect. [Online]
Available at: http://www.dubaiairportsconnect.com/uncategorized/easing-the-way-forour-passengers/
[Accessed 27 February 2014].
Dubai Chronicle, 2010. Dnata opens new lounge to provide special assistance to
passengers at Dubai International. [Online]
Available at: http://www.dubaichronicle.com/2010/09/07/dnata-opens-new-lounge-toprovide-special-assistance-to-passengers-at-dubai-international/
[Accessed 16 March 2014].
Elliott, R., n.d. Dubai: Terrorist Target?. [Online]
Available at: http://www.securitymanagement.com/article/dubai-terrorist-target
[Accessed 4 March 2014].
Johanson, M., 2014. Malaysia airlines flight MH370 exposes aviation industry's passport
problem. [Online]
Available at: http://www.ibtimes.com/malaysia-airlines-flight-mh370-disappearanceexposes-aviation-industrys-passport-problem-1560355
[Accessed 10 March 2014].
Michael L.Olive, R. T. S. A., 2005. Commercial aircraft information security-an overview
of ARINC report 811, s.l.: s.n.
Rainer Kolle, G. M. A. T., 2011. Aviation Security Engineering. Norwood: Artech House.
Ron, R., n.d. Man versus Machine. Newsweek, p. 12.
Skytrax, 2013. World Airline Awards. [Online]
Available at: http://www.worldairlineawards.com/Awards_2013/Airline2013.htm
[Accessed 15 March 2014].
PAGE 16