Industry News

A Personal View: Expressed by Philip Baum

On 11th September 2001, 19 hijackers changed the world and the way we view aviation security…but not, seemingly, the way threat is assessed. 15 of them were from Saudi Arabia, two were from the United Arab Emirates, and one each from Egypt and Lebanon. In the other major attacks against American aviation interests, Richard Reid – the shoebomber – was British, and Umar Farouk Abdulmuttalab – the underpants bomber – was Nigerian. According to New America, “Of the twelve lethal jihadist terrorists in the United States since 9/11: three are African-Americans, three are from families that hailed originally from Pakistan, one is from a family that came from the Palestinian Territories, two came from Russia as children, one emigrated from Egypt and conducted his attack a decade after coming to the United States, and one each had families that originally came from Kuwait and Afghanistan”. And yet Donald Trump signs an Executive Order implying that the nationals of Iraq, Syria, Sudan, Iran, Somalia, Libya, and Yemen are our primary concern.

But it is another attack on the soil of a US airport that I wish to focus on. That of 6th January this year when Santiago-Ruiz – a US citizen, born in New Jersey and Iraq War combat veteran – flew into Fort Lauderdale, claimed his suitcase at the baggage carousel, entered the toilets, loaded a Walther PPS 9mm semi-automatic, and then walked back into the arrivals area only to start shooting, randomly killing five people and injuring in excess of 40 others (eight of whom as a result of bullet wounds, the rest from the ensuing chaos). This was, however, not a failure of the aviation security system.

The fact that Santiago-Ruiz had left his temporary residence at the Qupqugiaq Inn in Anchorage, made his way to the airport and boarded a Delta flight to Minneapolis, with onward connection to Fort Lauderdale, with a gun in his bag is almost irrelevant. He could just as easily have been a resident of Florida, made his way to the airport and carried out the same atrocity without even boarding an aircraft.

There are a multitude of reasons why individuals should, with the correct paperwork in place, be able to check guns onto a flight within their hold baggage: to participate in sports events, to hunt, as members of law enforcement, for use as theatrical props and as part of historical collections to name a few. That is a globally accepted practice. In order to do so, bearers of such weaponry need to bring them to the airport at the point of departure and collect them on arrival. We could insist that firearms are always shipped and never brought to the airport terminal, but, as with so many other security protocols, it’s the good people who suffer the resulting inconvenience and the target simply moves to the shipper’s facilities.

Questionable, however, was Santiago-Ruiz’s ability to carry a firearm anywhere, let alone at an airport. After all, yes, the innocent victims of this atrocity happened to be in Terminal 2 at Fort Lauderdale International Airport, but, equally, those who died could have been in a shopping mall, theatre district, visiting a sports event or at a tourist attraction. This January’s attack happened in the public area of the airport – and there will always be a line that delineates the start and end of a security-restricted zone.

Industry News

ARMLET: setting-up an air marshal training centre

In September 2016, delegates from across the Europe gathered in Bucharest to attend the closing conference for the Romanian-led ARMLET project. Lucy Rawlings attended the event to report on the initiative itself and witness first-hand some of capabilities of the air marshals trained as part of this European Union-funded programme.

The ARMLET project first came to life in 2014 with the mission of creating an air marshal training centre and programme, and was dedicated to “increasing the operational capacity for authorities in the field of fighting against in-flight threats”. The main objectives of the project were: to establish a permanent training facility for personnel involved in in-flight security operations; to provide the necessary know-how for European Union Member States interested in implementing an in-flight security programme; and, to become a platform for sharing ‘best practices’ and ‘lessons learned’.

The project has been led by the National Intelligence Academy ‘Mihai Viteazul’ as part of a joint venture with the Gradistea Training Centre and, from the Romanian Intelligence Service, the General Directorate for the Prevention and Countering of Terrorism/Antiterrorist Brigade. It has been co-funded by a 1.6 million Euro grant from the ‘Prevention Of and Fight Against Crime Programme’ of the European Union.

ARMLET was awarded the funding as the programme and training centre are seen to be vital in helping to support key aviation security goals within the EU’s security development plans and aid them in securing their nations’ borders.

Radoslaw Olszewski, the Policy Officer for the Counter Terrorism Unit at the European Commission, spoke on behalf of the EU at the ARMLET Closing Conference and stated that the EU would like to help strengthen other nations in this field and encourage them to utilise the facilities in Romania. He emphasised the importance of sharing knowledge and information and that the risk of not doing so could be much greater than simply fearing the information could fall into the wrong hands.

Dr. Niculae Iancu, rector of the National Intelligence Academy and ARMLET project manager, asserted ARMLET’s mission statement: ‘Train with the best to be ready for the worst’. This sets the true undertone for the project’s collaborative expertise and promotion of a new approach to aircraft security through intelligence led operations. The project’s name, ARMLET, stands for the values it represents: A – ambition, “We encourage you to overcome your limits”; R – resilience, “We train you to withstand adversity’”; M – motivation, “We stimulate and support your professional commitment”; L – legality, “We cultivate respect for the law”; E – excellence, “We embody the highest level of excellence”; and T – training, “We will help you become a truly skilled professional”.

The first Romanian air marshal unit was established in 1970 and operated exclusively on Tarom (Romania’s flag carrier) flights. Today, Romania is one of only eight EU member states that run such a programme, including the Czech Republic, Austria, France, Poland, the Netherlands, Switzerland and the UK (although the UK’s in-flight officers are only deployed in a state of emergency). The ARMLET project is at the forefront in developing an even more refined and specialist air marshal training programme suited to the demands of aviation security and the threats it faces in the modern day. Air marshal programmes, in part due to the deterrent effect, can only be truly beneficial to the global industry if they are internationally widespread and, at ARMLET, they are trying to promote the spread of such programmes across Europe by developing a programme capable of being implemented across all EU member states.

Industry News

A European Revolution in Regulation: distinguishing between passengers and non-passengers

Aircrew in general, and pilots in particular, have long promoted the concept of alleviated checkpoints on account of their responsibilities on board aircraft and their overall contribution to aviation security. In addition, the advancement of ETD (Explosive Trace Detection) equipment has allowed regulations to evolve, to distinguish between passengers and non-passengers, and to recognise the crucial role of airline staff in the aviation security picture. Charles de Couëssin examines the regulations and compares them with the measures currently in place.

One of the major challenges facing the air transport sector is finding a balance between its level of security and its ability to ensure the rapid processing of traffic, which is expected to double over the next 15 years. In particular, ‘non–passengers’ (e.g. airport staff, crew, pilots) constitute a specific category of people within airports that should be controlled differently. This is for two conflicting reasons:

1. They have the potential to pose a high risk due to their proximity to aircraft operations, maintenance and access to restricted zones;
2. They might contribute to the solution rather than to the problem, as reported by the European Cockpit Association, due to their close participation in the aviation business as well as their skills in detecting abnormal situations within terminals and aircraft themselves.

Since the events of 9/11, Regulation 2320/2002, ‘Establishing Common Rules in the Field of Civil Aviation Security’ constituted the basis of airport security controls. This framework was regularly amended until the recent 2015 version was published. In its early stage, the legislator did not make any difference between ‘passengers’ and the various categories of staff, be it a senior pilot of the flag carrier or a cleaning employee at the airport. The guiding principle of the regulation relied on the principle that the zones through which persons and/or baggage move before boarding should be considered as critical parts of a security-restricted area.

Based on the legislation, the notion of ‘restricted areas’ applies to zones where only screened passengers and baggage have access as well as where aircraft are parked before boarding or goods are loaded. These zones are separated from landside activities, and airside/landside boundaries need to be established between the two zones to ensure their physical separation.

The concept of ‘access control’ defines the procedure by which all persons are screened before being allowed to proceed into restricted areas. Moreover, they are required to ‘have a legitimate reason to be there’, which means carrying proof of authorisation such as a boarding card (passengers) or an identification card (staff). These must be checked before being granted access to security-restricted areas in order to reasonably ensure that the document (e.g. boarding card) is valid and corresponds to the holder (staff or crew).

In order to prevent unauthorised access to security restricted areas, access points must be controlled either by an electronic system (presenting a ‘logical obstruction’) or by authorised persons (a ‘physical obstruction’). Credentialing is the key process by which an employee is visually (or better, electronically) authenticated and granted unescorted access to secure and sterile areas. Credentialing involves several major sub-processes:

– Determining the holder’s identity through scrutiny of official identity documents;
– Ensuring a regulatory clearance process to determine if the applicant is qualified for airport activities and related access to secure areas;
– Conducting airport-specific security training of security procedures.

Industry News

Security, Just Like Safety, Is Everyone’s Responsibility: an indispensable lesson in security awareness

A soft target is an ideal target for a would-be terrorist. It has been said that the bad guys only have to get it right once while those responsible for preventing a terrorist attack have to get it right all of the time. Sometimes, assessing how effective, or ineffective, your internal security programme is requires someone to play the role of bad guy in a covert simulated terrorist attack. What follows is an account of an event in which Ivan Luciani, plus a resourceful and determined accomplice, had to play such a role. The results and benefits of these exercises, when carried out on an ongoing basis, can have a significant impact in raising and maintaining staff security awareness.

It took a major terrorist attack on the other side of the planet to make it painfully obvious that aviation security, as we knew it, would have to change – quickly and drastically. Until that shocking day our aviation security programme’s primary focus was, among other things, preventing or dealing with a hijacking or the discovery of an explosive device onboard an aircraft. The threat posed by terrorists changed when they found a new way to wreak havoc in a manner previously unseen: using airplanes as weapons of mass destruction.

As we tried to figure out how the daring and unprecedented 9/11 attacks could have been carried out, questions about the effectiveness, or shortcomings, of our own security programme emerged. At the time I was Chief Pilot of a two-business jet aircraft, fifteen-member, Air Operator’s Certificate (AOC) holder based out of the Macao International Airport. Being the Chief Pilot of a relatively small AOC operation I wore several hats. This included overseeing the drafting and implementation of aviation security policies, processes and procedures. In that capacity I relied primarily on regulatory requirements as well as the industry’s best practices. As I sat in my office the day after the attacks reviewing our Flight Operations Manual’s aviation security chapter it became evident that our procedures were reactive in nature. Emphasis was placed on how the aircrew should respond to a hijacking event during flight or while still on the ground, as well as on actions the aircrew should take in the event that an explosive device was discovered onboard the aircraft.

None of our procedures would have prevented a would-be terrorist from using one of our business jets as a weapon of mass destruction, albeit a significantly smaller one compared to a large airline passenger jet. It was obvious that our understanding and application of security measures would have to be revamped – promptly – in order to cope with the new threat. It was then that, in conjunction with my most senior captain, we came up with a plan to assess how soft a target our company was at the time. The objective was to test our staff’s security awareness via a CEO-approved, four-week long, three-prong covert operation.

The Test: Our Covert Operation
First, and in coordination with airport security personnel, we targeted our aircraft by placing two unsealed, suspicious looking packages on board. We had a window of several days during which time the aircraft were not scheduled to fly and would remain inside the hangar. One of the packages was hidden in plain sight in the first aircraft’s baggage compartment. The other one was placed in the immediate vicinity of the second aircraft. Inside these boxes were items that resembled what we thought looked like crude bombs. We even wrote ‘bomb’ on the packages.

Second, over the course of several days we placed a total of five phone calls to various staff members (dispatchers, administrative personnel, and aircrews). The caller spoke with foreign accents not common to Macao, and persuasively requested information of a confidential nature. This information ranged from a request for someone’s personal phone number or address to specific details (date, airport, passengers) of an upcoming trip.

Lastly, we placed four suspicious looking envelopes, addressed to several key managers, including our CEO, inside the company’s mailbox. The listed sender of these envelopes were individuals from various countries known for having ties to terrorism. Inside the envelopes we placed a fair amount of talcum powder – giving it added weight and volume – and a piece of paper that said, “This envelope could have contained anthrax. Please see the CEO or the Chief Pilot.”

Industry News

Behind Bars… Now Behind You:carrying criminals and other deviants

Two years ago Mark Vorzimmer, the Head of Security at Virgin America, received a LinkedIn affiliation request from two young Western Michigan University students, Gabriel Langley and Alexander Szalay, interested in going into the field of aviation law. Gabe and Alex were already pursuing a curriculum in aviation operations and management, and were specifically inquiring about areas falling into a cross-section of the two subjects – legal concerns related aviation operations and management.

Coincidentally, after a number of recent disruptive passenger events aboard Virgin America – one involving the lewd and lascivious behaviour of one individual causing a diversion and a real operational headache – the idea of a commercially and legally acceptable manner of preventing these types of passengers from ‘exposing’ themselves to other aircraft operator’s passengers seemed to offer an interesting challenge. This article is a collaboration of Vorzimmer, Langley and Szalay, after a series of discussions over the ensuing months proposing how this might be practically and legally accomplished.

The International Air Transport Association (IATA) reports that “[S]ome 10,854 unruly passenger incidents were reported to IATA by airlines worldwide last year. This equates to one incident every 1,205 flights, an increase from the 9,316 incidents reported in 2014 (or one incident for every 1,282 flights)”. To be clear, these figures include only those incidents reported…and within that population, only those reported to IATA by their member carriers.

But why should an airline carry individuals who have been convicted of, or conspired to commit, violent or deviant acts against or in relation to aviation? Chances are most airlines don’t even deny transport to those who have committed violent acts on their own aircraft, let alone against or aboard another operators’ aircraft. Worse, a significant number of airlines do not even deny return transport to the very same individuals who commit violent acts on their outbound flights. Why? Perceived legal liability? The lack of an internal system to recognise and prevent such returning passengers?

What about the liability associated with injuries to, and sexual assaults against, your passengers and aircrew should these violent and deviant individuals act out on your flights? What about the safety of your unaccompanied minors? Would you really want a registered sex offender seated next to your eleven-year-old daughter? And what about the operationally disruptive, costly, and potentially dangerous diversions often occasioned by these types of people?

The following are some things aircraft operators should consider in taking steps to protect their passengers, aircrew, and aircraft from violent, deviant criminals.

Contract of Carriage
Firstly, what does your Contract of Carriage (CoC) say about your airline’s right to deny transport to those who have engaged in violent, objectionable, or other criminal behaviour, and to whom does it speak? Does your CoC language speak only to those who have engaged in such acts in the past (on your airline), or does it speak prospectively to all those who have simply entered into a ‘contract’ to fly on your planes by virtue of their having purchased an airline ticket prior to flying? All CoCs should do both, and for extra measure they should speak to those who have been convicted of committing certain crimes against aviation more broadly.

Internal Watchlisting
No policy or process to refuse transportation to anyone would be effective without the ability to recognise when such individuals attempt to make reservations on your airline. Since 9/11, airlines have been required to collect Personally Identifying Data (PID) from passengers, such as dates of birth, and most airlines have systems in place to not only recognise when certain individuals attempt to make reservations, but to even prevent completion of the booking process, forcing such parties to make actual (as opposed to virtual) contact in order to complete the booking. Other airlines permit such individuals to complete the reservations booking process, but then subsequently send alerts to pre-identified internal personnel tasked with responding to such bookings. Some simply accept bookings, but prevent check-in as a means of forcing such individuals into a face-to-face interaction with ticketing personnel who then alert internal security. In the main, the differences between these systems are driven by the technology an airline has in place.

Industry News

A Personal View expressed by Nico Voorbach

In January 2016 I went from being an active airline pilot to becoming the Civil Air Navigation Services Organisation (CANSO) representative of ICAO for the Air Navigation Service Providers (ANSPs). This led me to consider aspects of aviation security that had not, as a pilot, previously been at the forefront of my concerns. In particular, one of the fastest growing threats facing the industry is that of cybersecurity. As the technology we implement becomes more sophisticated, so too does the threat from people with malicious intent. Using our own systems against us, these people are capable of disrupting airports, airline operations and even aircraft mid-flight. Although this threat is not only against aviation, the aviation industry has to make it a higher priority.

Air Traffic Management (ATM) is changing rapidly. The industry already makes great use of information and communication technology, but continuing innovation and greater cost-efficiencies are required while initiatives like SESAR and NextGen promote the spread of network-based technologies and integrated approaches. The planned introduction of System-Wide Information Management (SWIM) will see even greater exchanges of data, with the various systems becoming more closely integrated. There are clear operational benefits to these developments but also risks in the form of greater security vulnerabilities. Cybersecurity threats range from simple acts of digital vandalism to major cyberattacks. ATM must tackle cybersecurity by assessing the vulnerability of processes, assets and, particularly, IT infrastructure to criminal activities and attacks, whether these involve staff or outside parties. The wide range of potential cyber-threats and the integrated nature of modern ATM demand a holistic approach and the involvement of all ATM stakeholders.

What concerns ANSPs the most is the vulnerability of the IT systems that control the ever-growing traffic around the world. We rely on technology to safely manage flights and keep aircraft separated from each other. Around the world institutions and government agencies are looking into the problem, but a viable global solution is still distant. Upgrades in technologies over the last 20 to 30 years were introduced when cyber-threats were not a major issue, resulting in open and non-encrypted data transfers.

SWIM will be based on Service Oriented Architecture and open and standard mainstream technologies meaning it will be vulnerable to all kind of interferences. Prior to full implementation, we need to ensure it is secure enough to maintain the integrity of the system.

ADS-B (Automatic Dependent Surveillance – Broadcast), is a surveillance technology in which an aircraft determines its position via satellite navigation and periodically broadcasts it, enabling it to be tracked. Information can be received by ATC ground stations as a replacement for secondary radar. It can also be received by other aircraft to provide situational awareness and allow self-separation via TCAS (Traffic Collision Avoidance System). However, ADS-B is also a non-encrypted data link. It has been shown that it is possible to project virtual aircrafts via ‘spoofing’. Although one extra target on a radar screen might not be a problem, multiple false targets might create a safety hazard. How does an air traffic controller react when his radar screen is filled with virtual targets? How do pilots react when their TCAS system reacts to virtual aircraft?

Industry News

Checkpoint Not Chokepoint: achieving true transformation of the aviation ecosystem

Rising passenger expectations and the need for improved security effectiveness in the face of an evolving global threat create urgent demand for checkpoint transformation. This transformation is informed by data, streamlined through process, enabled through technology innovation, and driven by collaboration between airports, government agencies, and industry. Realising truly transformative checkpoint evolution relies on action and change at all points across the aviation ecosystem. Alex Mirkow and P.J. Rivera offer their perspective on a checkpoint transformation approach that can meet both security needs and customer demands through collaborative transformation across the aviation ecosystem.

Imagine a seamless, no-touch security screening process that enables you to quickly move through security, having time to enjoy all of the amenities that modern, global airports have to offer. You arrive at the airport via a car-share service that automatically sent your estimated arrival time to your airline (and shared flight updates with you during transit), and you quickly undergo biometric identity verification (you enrolled at home earlier in the week) after stepping foot into your terminal – no need to scramble for your boarding pass or wait in line to get your documents checked. You then use your smartphone to navigate to the checkpoint that’s not only closest to your gate, but also the one with no line. Then, rather than untie and remove shoes, jackets, and scarves, all while trying to navigate your carry-on luggage to the X-ray machine, you simply walk (at your own pace) through the first open passenger lane, placing your luggage through a parallel screening lane (no lifting required), all with plenty of time to spare. You then navigate to the nearest preferred passenger lounge (via your smartphone, of course!), relax before your flight, order your favourite snack and catch up with your emails, all before your smartphone notifies you that it’s time to board. You proceed to your gate, seamlessly passing through border check (since your information was sent when your biometrics were scanned upon entering into the screening process), and get ready for take-off.

True checkpoint transformation that enables this type of seamless, customised passenger screening experience requires attention to all facets of the aviation ecosystem – each and every piece of the aviation passenger journey. It cannot be achieved alone by simply focusing on one part of this journey; rather, checkpoint transformation is achieved through close collaboration between ecosystem stakeholders, including airports, airlines, and government and private sector innovators, and the integration of data, technology, and process components.

Airports embarking on a checkpoint transformation journey should balance their focus across the aviation ecosystem and carefully consider the evolving requirements of the passenger journey and checkpoint screening experience:
– Technology innovation that enables a seamless screening experience
– Improved resource allocation that focuses attention on the highest risk passengers
– Process optimisation that maximises screening efficiency and passenger satisfaction
– Data integration that informs and enables all points of the passenger journey

Achieving this type of transformation depends on coordination and partnership with a wide array of aviation stakeholders to enable a seamless screening process. It relies on thoughtful collection of data that allows greater understanding of who is travelling, and when.

It leverages innovations in technology, including the use of biometrics and facial recognition, behavioural detection technologies and methodologies, and advanced screening capabilities such as computed tomography (CT), millimetre wave, and variable screening algorithms. And, it is promoted by thoughtful design that creates agility, flexibility, and seamless flow throughout the airport.

Industry News

The Battle Against Credit Card Fraud: cooperation between airlines and law enforcement is key to success

The use of online payments in trade has grown immensely in the last couple of years. We are now at a point where online transactions represent the majority of all airline ticket purchases, resulting in a large amount of personal and financial information, particularly card data, being stored on the internet. Cybercriminals break into databases, download credit card information and then sell this information on the dark web, a collection of websites that are publicly visible but hide the server or IP details that run them. Fraudsters then use this stolen card data to buy airline tickets, causing huge damages for travel service providers. Shalini Levens proffers a solution.

According to surveys done by Cybersource, the annual damage for all airlines combined is 1.4 billion dollars. It is also estimated that between 1% and 2% of all booking attempts on an airline website are fraudulent. Therefore, it is fair to say that the airline industry has faced an unexpected battering from card fraudsters and has had to reorganise rapidly to face this unforeseen threat.

In retrospect, there have been certain key developments that, collectively, have led to a turnaround in the industry and a reduction in opportunities for the potential fraudster. Airlines are now in greater control of their payment operations, which has resulted in a considerable reduction in credit card fraud. The most important development has been the ability of fraud analysts to exchange information through meetings and secure online forums. This information includes structured personal data such as names and e-mails that need to be validated against a database, as well as guidelines and best practices that are shared informally.

Some of the meetings and online forums are for members only, while others are open to verified fraud analysts and professionals from any accredited organisation. A well-known open forum in the industry is FraudChasers, which facilitates a platform for fraud analysts to chat, share information and to have one place to post information about upcoming meetings. For an individual who may be the only fraud-fighter in their organisation these forums are like a life-support machine.

Additionally, on a strategic level, the travel sector has created an industry-wide body where executives can meet and coordinate actions, both regionally and globally. There is a regular programme of working groups that takes place at venues across Europe, Asia-Pacific, North America and beyond. Key to the success of both personal and corporate collaboration is that people from different organisations continue to meet regularly face-to-face. Connections of trust, once formed, can last a long time online, but occasional meetings in person reinforce and develop that trust.

The next step in industry-wide collaboration is sharing data. When the working group is small, this can be done via e-mail, but once groups start to grow, automation is essential. The need arose for groups to establish steering committees to choose a neutral technology supplier who develops the various online forums and databases. One of the requirements was that the data-sharing technology itself had to be cloud-based and highly secure. Hence, it has to enable businesses to submit and share suspected fraud data legally, while always retaining ownership of the data. Through this, a merchant can remain completely in control of its data, even after it has shared it.

The need for this capability led to the development of Perseuss, a secure community platform where merchants can legally share information about encountered fraud cases. It allows merchants, such as airlines, to verify their own sales data to identify any suspicious transactions. This data sharing platform including analysis, reporting, scoring and e-mail age verification. The database is enriched and developed with a high degree of participation and input from working fraud analysts so the screens and layouts blend naturally into the operational workflow. This increases efficiency and improves decision-making.

Merchants who provide travel services rely on a vast network of partners to make the payment process proficient. Among these partners are payment service providers, software suppliers, banks, card schemes, industry associations, legal entities, national police forces, as well as international law enforcement agencies. The travel industry had the foresight long ago to involve all of these bodies in the global war against card fraud.

Co-operation between travel companies and law enforcement agencies in the international battle against fraud has been very fruitful during 2016. Through this partnership, a plan is being developed to organise ‘Days of Action’ against credit card fraudsters, which will increase in frequency until they become an everyday norm.

Industry News

Alt-right: outright wrong

by Philip Baum

There is always news, and much of it is depressing. We have been saddened this year with the passing of sporting legends such as Muhammad Ali, Arnold Palmer and Johan Cruyff, as well as musical icons David Bowie, Prince and Leonard Cohen. Political leaders who were the newsmakers of the 20th Century have also made their exit – King Rama IX of Thailand (Bhumibol Adulyadej), Elie Wiesel, and, so much part of aviation security history, both Shimon Peres and Fidel Castro.

It has been a year of new challenges, some of which, such as the outbreak of the Zika virus in January, we, as individuals can do little about. However, 2016 has also been a momentous year from a geopolitical perspective and many are asking whether the lessons learned from World War II have, perhaps, been forgotten? Or, and arguably worse, intentionally disregarded? We seem to have become immune to human suffering and intent on going down a xenophobic, self-protectionist route. So much for multi-culturalism.

The human tragedy in Aleppo that is unfolding as I write makes for graphic television imagery, yet how many of us are actually doing something about it? We, as a society, respond similarly to the plight of the refugees risking their lives to cross the Mediterranean to European shores. Anybody who has visited Yad Vashem in Jerusalem, the Kigali Genocide Memorial in Rwanda, the Tuol Sleng Genocide Museum in Cambodia or Holocaust memorials and exhibits around the globe will have exited them with that feeling of frustration that people knew but did nothing, or even self-disgust that they were personally aware of the plight of people on distant shores, but failed to act. Out of sight, out of mind. And it is against that backdrop that we are seeing a surge in right-wing activism. We don’t really want to see…

Many commentators have recognised the groundswell of angst in Western society, yet few acknowledged its scale until the anti-immigrant rhetoric of UKIP (the United Kingdom Independence Party) managed to win over more than 50% of the British electorate who actually voted and set the country on course for Brexit. The immediate rise in racial, anti-Semitic and homophobic incidents in the aftermath of the decision to ‘Leave’ was sickening.

Less than half a year later, an even greater seismic result emerged in the United States with the election of Donald Trump and Indiana Governor Mike Pence as its 45th president and 58th vice president. As Trump vows to ‘make America great again’, the rest of the free world has looked on in abject horror at the thought of a seemingly misogynistic racist as its de-facto unelected leader. I am sure that there are a few readers who might have voted Republican, and I respect your exercising your democratic right to do so, but I have yet to meet a single European who is anything other than disgusted that Trump – a man who can even make jokes at a political rally about people with physical disabilities – will be entering the White House. “Great again”: in whose eyes? Whilst I admit I am not optimistic, one hopes the reality of his taking on the awesome responsibility of being Commander-in-Chief may make the, as one commentator put it “imperfect candidate with a near-perfect message” temper the rhetoric and build bridges between nations and communities.

Eleven days after the US election, a meeting was held by the alt-right movement in Washington DC, in which its leader, Robert B. Spencer, spoke in a style one could only equate with Hitler at a Nazi rally. He ended with the words, “Hail Trump! Hail our people! Hail victory!”, but it might as well have been ‘Sieg Heil’. I urge you to watch a clip of excerpts of the meeting at www.youtube.com/watch?v=1o6-bi3jlxk posted by The Atlantic. Can we really continue to justify such freedom of speech?

The political landscape in Europe is indicative of a surge in right-wing activism. In Germany, the AfD (Alternative für Deutschland) emerged, only three years ago, on an anti-Euro platform and morphed into an anti-immigrant party; more specifically, anti-Islamic with a proposal for banning the construction of mosques on German soil. Its leader, Frauke Petry, has even spoken of turning guns on people who try to enter Germany illegally. In France, the National Front, led by Marine Le Pen, is now a mainstream political party and many think that her chances in next year’s presidential elections are quite ‘good’. Le Pen has celebrated the success of both the Brexit and Trump election campaigns and is urging French voters to reject the EU and use the ballot box to vote to restrict immigration. General elections in both France and Germany in 2017 will be further barometers of the political winds of change.

Italy is also on course for a referendum of membership of the European Union, whilst in The Netherlands, the Party of Freedom is advocating the closure of Muslim schools and even the recording of the ethnicity of Dutch citizens. In Greece, Golden Dawn has, like the National Front in France, become a major player in the Greek parliament and, despite being branded by many as neo-Nazi and having many of its leaders arrested and charged with criminal activity, they continue to be gaining widespread support, exacerbated by the country’s geographical location putting it on the frontline for handling trans-Mediterranean migrants.

Industry News

Computer-Based Training: state of play

X-ray screening is an inherent part of the security process at airports, let alone in other sensitive areas, such as courts or prisons. In the European aviation sector, security officers operating X-ray machines are mandated to undergo training for six hours every six months. Sandrina Ritzmann and Claudia Lüchinger discuss why training of X-ray image interpretation is extremely important, what role computer-based training (CBT) plays and what characteristics and aspects are important for high-quality CBT.

Depending on the number of passengers or cargo handled, security officers (screeners) deal with X-ray images for several hours a week. So do they still need training? The answer is yes. Research has shown that visual knowledge of threat items and their appearance in X-ray images (so-called knowledge-based factors) is one essential prerequisite for good X-ray detection performance. This knowledge has to be acquired and maintained through regular training as the X-ray image often differs substantially from the regular appearance of an object Thus, training is needed to ensure that security officers know which items are prohibited and what they look like under X-ray examination in order to successfully detect them. A number of scientific studies have shown that computer-based training (CBT) can significantly improve the X-ray image interpretation competency of screeners.

Advantages of Computer-based Training
Given the fact that training is needed, the next question is: what kind of training is optimal to enhance the X-ray image interpretation competency of screeners? The type of training required depends on the skill that needs to be acquired. To specifically target the visual knowledge of prohibited items, CBT has several advantages over face-to-face classroom training, practical training, or training on-the-job (although these forms are certainly useful for other skills). One advantage of CBT lies in its function as a standardised training tool; once a training system has been implemented, it can be used effectively by a large number of people. Furthermore, individual progress is flexible and not dependent upon an instructor or other trainees (as it would be in a class setting) allowing for higher training efficiency. The flexibility of CBT is also important because it facilitates the implementation of distributed practice (whereby, for example, every X-ray screener might receive 20 minutes training every week); general research on human learning and training has shown that regular, distributed practice sessions leads to better results than ‘massed’ practice (several hours of training once every few months). Another important aspect of CBT is its capacity for progress measurement and skill assessment. For instructors in a face-to-face setting, it is very challenging to measure progress or assess skills in an objective and reliable manner, especially when dealing with a large group of people. CBT also provides direct user interaction and feedback, which can easily make it more motivating than instructor-centred training.

Administration features of CBT systems provide various instruments to the administrator to target and monitor users’ performance; the management tools enable setting training goals and the continuous reporting provides an overview of each user’s training behaviour, training hours and results.

However, not every CBT programme is worth implementing just for the sake of it. There are important aspects to consider when the quality of CBT is assessed. Two facets will be highlighted in more detail below.