1 / 42

Policy

Policy. Support. Monitoring. As the global forum for cooperation among its Member States and with the world aviation community, ICAO sets standards and recommended practices to enhance global aviation security and facilitation.

nporter
Download Presentation

Policy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Policy Support Monitoring

  2. As the global forum for cooperation among its Member States and with the world aviation community, ICAO sets standards and recommended practices to enhance global aviation security and facilitation

  3. ICAO has developed the ICAO Comprehensive Aviation Security Strategy (ICASS) for 2011-2016, which identifies 7 strategic areas to focus ICAO’s aviation security efforts.The strategy was endorsed by the 37th Session of the Assembly

  4. Annex 17 − Security Sets out the Standards and Recommended Practices to be implemented by Member States to safeguard international civil aviation against acts of unlawful interference

  5. Aviation Security Manual(Doc 8973 - Restricted) Provides guidance on how to apply Annex 17 Note: Amendment 1 to the Eighth Edition is available in all languages and includes updated guidance on air cargo and mail supply chain security.

  6. AVSECPaedia Introduced in 2011, the AVSECPaedia is a dynamic and collaborative tool that allows States to share their own security information and practices For more information, email us at avsecpaedia@icao.int

  7. Acts of Unlawful Interference Database (AUID) AUID is a secure online database available to all Member States and is designed to provide information on aviation security incidents in an efficient and effective manner

  8. Acts of Unlawful Interference Database (AUID) --Graphical and numerical display of AUI data--

  9. ICAO Point of Contact Network (AVSECNET) Features a built-in messaging system that allows for rapid exchange of critical information among States, while providing controls over who can access such information

  10. Facilitation is the efficient management of control processes, to expedite clearance and to prevent unnecessary delays

  11. Annex 9 − Facilitation Sets out the Standards and Recommended Practices for Member States to maximize the efficiency of their border clearance formalities

  12. Facilitation ManualDoc 9957 Provides guidance on how to implement Annex 9

  13. Manual on Access to Air Transport by Persons with Disabilities − Doc 9984 Provides general guidance on services and features needed to assure persons with disabilities have access to air transportation

  14. Cooperation among Member States is essential to successful development of modern technology and processes, more effective information sharing and assistance efforts

  15. Machine Readable Travel Documents(Doc 9303) MRTDs include Machine Readable Passports, Visas and Official Travel Documents. They facilitate the inspection of international travellers at borders and enhance security Comprehensive specifications and guidance material to assist States in their implementation of MRTDs are published in Doc 9303, which is endorsed by the International Organization for Standardization as ISO/IEC 7501

  16. MRTDsimprove both facilitation and security

  17. Machine ReadableTravel Document (MRTD) Machine Readable Zone

  18. Every ePassporthas an embeddedelectronic chip thatcontains the holder’spersonal information andphoto found in the passport.The ePassport chip is digitallysigned to prevent unauthorized alteration. The technology used is called Public Key Infrastructure (PKI). ePassport

  19. Face Biometric Face Biometric proven as most compatible.Addresses numerous identity related requirements.

  20. Enhancing the MRTD Programme ICAO Traveller Identification Programme (ICAO TRIP) • Holistic approach to identification management and travel documents • Applicable to all modes of transport and borders • Integrates MRTDs, PKD and other elements of traveller identification management • Submittedto the 38th Session of the ICAO Assembly − for the final endorsement of the TRIP Strategy

  21. Holistic Traveller Identification Management: Five Dimensions Civil Registries Airlines Travel Document Issuing Authorities Airports Travel Document Industry International Organizations Aviation Security Authorities Border Control Authorities Law Enforcement Authorities Regional Organizations

  22. Public Key Directory (PKD) The Public Key Directory (PKD) is an ePassport inspection tool that was created at the request of Member States to facilitate the sharing of the public keys required to authenticate ePassports. ICAO encourages all Member States to join the PKD to enhance security in cross-border movement.

  23. PKD has 38 members and is growing The ICAO PKD acts as a central broker, managing the multilateral exchange of information used to validate ePassports Membership is beneficial to travel document issuers and border control authorities and PKD ensures worldwide recognition of States’ ePassports, allowing travellers to cross borders easily http://www.icao.int/Security/mrtd/Pages/icaoPKD.aspx

  24. PKD Assistance • Currently, no alternative mechanism is available for distributing public key infrastructure (PKI) information worldwide in an efficient and economic manner. • The ICAO PKD also provides States with tools and expertise for ensuring adherence to the technical standards and specifications contained in ICAO Doc 9303.

  25. Universal Security Audit Programme (USAP) To determine: • the State’s capability for security oversight; • the degree of compliance of the State with Annex 17 Standards and security-related provisions of Annex 9.

  26. Background: The USAP USAP Cycle II A36-20 2008 – 2013 Annex 17 + Annex 9 Security Related SARPs 178 audits Limited Level of Transparency USAP-CMA A37-17 2014 – onwards Continuous Monitoring Approach Risk- Based Tailored activities Voluntary Technical Evaluations 1989 – 2001 Annex 17 140 Requests 112 Assessments USAP Cycle I A33-1, A35-9 2002 – 2007 Annex 17 181 Audits Confidentiality of Audit Results Follow-up Missions 2005 – 2009 AVSEC

  27. USAP Results Analysis DocumentFifth Edition − 2013 http://portal.icao.int/ Contains extensive information on the results of the completed second cycle of USAP audits.

  28. USAP Beyond 2013 Continuous Monitoring Approach CMA The USAP-CMA will incorporate both a continuous monitoring and risk-based approach customized for aviation security. A transition phase began following the completion of the 2nd cycle of audits and full implementation of the USAP–CMA is expected by Jan 2015.

  29. USAP-CMA Advantages • Move from cyclical audits to continuous monitoring • Flexible framework and methodology • Increased focus on assistance • Findings subjected to a risk assessment based on their impact on aviation security, and recommendations prioritized as short- medium- and long-term • Feedback for policy development

  30. Goals of the USAP-CMA Provide for continuous monitoring and assessment of States’ aviation security performance: • compliance with ICAO security SARPs • adherence to associated international best security-related practices and guidance material • capability for security oversight

  31. Goals of the USAP-CMA • Help States help themselves. • Enable the targeting and tailoring of assistance. • Generate relevant information for ICAO’s deliberative bodies and related Programmes.

  32. USAP-CMA Activities Documentation-based audits Oversight-focused audits Compliance-focused audits Assistance, surveys and other monitoring activities

  33. Selecting Audit Activities and Identifying Priorities USAP-CMA activities and frequency will be tailored to the specific situation for each individual Member State based on established criteria

  34. Evolution of the Universal Security Audit Programme (USAP) • Council approval of USAP-CMA and transition plan

  35. Implementation Support and Development Programme The objective is to assist member States to implement and comply with Annex 17 and security-related provisions of Annex 9

  36. 1) Coordinate, facilitate and provide direct assistance to States as appropriate 3) Assist States to remedy their AVSEC deficiencies identified through the USAP process 2) Foster capacity-building and promote development of AVSEC programmes 4) Develop partnerships with industry and willing partners to support efforts aimed at resolving deficiencies ASSISTANCE OBJECTIVES

  37. Provision of technical training -Aviation Security Training Centre (ASTC) Network, Aviation Security Professional Management Course (AVSEC PMC), Aviation Security Leadership and Management Seminar (AVSEC LAMS),in-state courses andworkshops

  38. Aviation Security Training Centres (ASTCs) deliver ICAO sponsored training activities and deliver a yearly programme of Regional Aviation Security Coursesadapted to regional needs

  39. 25 ICAO Aviation Security Training Centres

  40. Aviation Security Training Packages (ASTPS) BASIC INSTRUCTORS AVSEC EXERCISE MANAGEMENT CRISIS MANAGEMENT NATIONAL INSPECTORS CARGO SECURITY SUPERVISORS

  41. Aviation Security Workshops National Civil Aviation Security Programme National Civil Aviation Security Quality Control Programme National Civil Aviation Security Training Programme National Screener Certification Programme Airport Security Programme

  42. For more information please contact: Aviation Security Branch Air Transport Bureau International Civil Aviation Organization Phone: +1 514-954-6104 Fax: +1 514-954-6408 E-mail: avsec@icao.int http://www2.icao.int/en/avsec/pages/default.aspx/

More Related