Skip to main content

Currently Skimming:

1 Introduction
Pages 11-18

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 11...
... The system is vulnerable owing to its mission to provide service to people with a minimum of intrusion on privacy and with minimal disruption of access. The detection and mitigation of attacks on air transportation are made more difficult by the transient nature of the passengers' movement through airports and the fact that it is common for passengers to be carrying several bags, making it relatively easy to conceal threat mater 11
From page 12...
... Identify potential applications for technology in transportation security with a focus on likely threats derived from threat analyses that drive security system requirements. Review security system developments structured to meet the changing threat environment.
From page 13...
... Independently, each report addresses a particular technology focus and identifies additional research needs. By mutual agreement between the committee and the sponsor, the broad focus on "transportation security" in the statement of task was narrowed to the "threat of attacks on the air transportation system." While the defensive measures and technologies discussed here may not have application to all transportation modes (e.g., containerized ships, bridges, highway tunnels, subways, and others)
From page 14...
... Integrating the data collected in a manner that allows a better picture of potential threats could substantially strengthen airport security. FIGURE 1-1 Generic airport diagram showing various airport spaces and some likely sites for attacks.
From page 15...
... Although it is making progress in its checked-baggage screening operations, it continues to face operational and funding challenges in screening all checked and carry-on baggage using EDSs, as mandated by the ATSA.3 SHORTCOMINGS OF EXISTING SYSTEMS The United States has 438 airports that service commercial aviation and has deployed more than 1,100 bulk EDSs and 6,000 explosive trace detection systems manufactured by a number of different companies. The overarching requirements to deploy these systems universally and rapidly have understandably led to little coordination and interface compatibility among the different systems and the system manufacturers.
From page 16...
... to reduce staffing requirements by automating information processes. The current approach to most threat detection consists of multiple stand-alone detection systems, some with unacceptably high rates of false alarms and slow throughput.
From page 17...
... This report focuses on exactly this area -- how the TSA and airport security personnel can better utilize existing security systems (humans and machines contributing to the security information flow) through the fusion of data -- and it provides the foundation for the more effective use of existing and future security systems that will enable significant improvements in the transportation security environment.
From page 18...
... 18 FUSION OF SECURITY SYSTEM DATA The committee expects that this report will have an audience beyond those in the TSA, including those in academia, equipment manufacturers, airport security personnel, and policy makers. The report is thus intended to be accessible to a variety of readers.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.