Verified Document

Passenger Through-Put Time the Average Essay

An example of the effectiveness of using this protocol can be seen at the El Al cargo terminal in Bangkok, Thailand during 2003. What happened was El Al security identified, an unauthorized man taking pictures of the cargo area. Once arrested by security personnel, it was determined that he was planning on launching surface to air missiles, against the airline. ("Thwarted Attack Against El Al Flight" 2003) What this shows, is that when you have specific designated areas, you can be able to identify those people who are at the cargo terminal, to cause damage / disruptions. This is because the designated areas, will force everyone who works there and is conducting business, to go through a particular set of structures / procedures. Anyone who is not following these policies would raise security concerns. At which point, the odds increase dramatically that this person will be stopped and questioned. A second way to increase the effectiveness of air cargo security is: to use technology to monitor for explosive materials, in goods that are being shipped. In this particular area, the airlines would use technology to look for various substances that are used in explosive devices. Where, technology can identify the distinct characteristics of the substances,...

A good example of this can be seen in Hong Kong, where employees are using hand held technology to identify for any kind of possible banned substances and instantly see the manifests surrounding a particular piece of cargo. This is significant, because the use of this technology, allows personnel to see what is suppose to be in a particular container. At which point, they can compare the contents with manifest. When you combine these two elements together, personnel are more able to effectively monitor for various contraband. In the case of Hong Kong, the use of such technology, has allowed them to increase the total pieces of cargo that are handled, while maintaining high security procedures. (Li, 2006)
Bibliography

Recommended Security Guidelines for Airport Planning. (2006). TSA

Thwarted Attack Against El Al Flight. (2003). Retrieved July, 9, 2010 from All Business website: http://www.allbusiness.com/middle-east/israel/644547-1.html

Li, J. (2006). Cargo Security at the World's Busiest Airport. Retrieved July 9, 2010 from All Business website: http://www.asiansecurity.org/articles/2008/jun/03/cargo-security-worlds-busiest-airport/

Sources used in this document:
Bibliography

Recommended Security Guidelines for Airport Planning. (2006). TSA

Thwarted Attack Against El Al Flight. (2003). Retrieved July, 9, 2010 from All Business website: http://www.allbusiness.com/middle-east/israel/644547-1.html

Li, J. (2006). Cargo Security at the World's Busiest Airport. Retrieved July 9, 2010 from All Business website: http://www.asiansecurity.org/articles/2008/jun/03/cargo-security-worlds-busiest-airport/
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now