Brussels airport attacks are not just a matter of airport security


Ivano Bongiovanni, Queensland University of Technology

The deadly terror attack in Brussels has again raised the issue of safety and security at airports. But expanding the “security bubble” around airports might not be the best response.

Europe barely had the time to recover from the horror of the Paris attacks last November before another of its capital cities was hit at its heart, presumably by ISIS terrorists.

In a devastated Brussels, investigations are running at full speed and authorities are already flooded with questions about the vulnerability of their critical infrastructure.

Unfortunately, this refrain seems to resurface every time a terrorist attack achieves its goals.

Traditionally, governments respond to these events by setting higher security standards. In this sense, modern airports epitomise the significant improvements that have been achieved in security over the past decades, especially after the September 11 attacks in the US in 2001.

Screening

Security screening has proved to be an effective deterrent against acts of terror such as hijacking and bombing. Following a procedure that is typical of security risk management, the security bubble around the vulnerable element – in this case, the airplane – has been progressively expanded in order to keep malicious individuals out.

The sterile area in a modern airport is among the most secure places on Earth. However, the terminal buildings can still be threatened, such as when the Glasgow airport was hit by a vehicle ramming attack in 2007.

In the aftermath, more stringent regulations were put into place to prevent vehicles from getting too close to the terminal buildings. Thus the security bubble was further expanded.

Even so, in 2011 two suicide bombers managed to kill more than 30 people at Moscow’s Domodedovo airport by walking into the baggage claim area and activating their Improvised Explosive Devices (IEDs). This was an act strikingly similar to what just happened in Brussels.

Increase security?

What should be our response to the latest attack? In the next few days we will probably hear more requests for strengthened airport security. Some might argue for a further expansion of the security bubble in order to cover the check-in area or entrance of the terminal buildings.

Would that be an effective solution? I don’t think so, for three main reasons.

First, the costs associated with the implementation of such a security system would largely outweigh the benefits; the bigger the area, the more expensive its protection.

Second, the associated operational disruptions would require some time (and a lot of patience) to be contained. When the perceived threats are low, people tend to consider security measures as an annoyance rather than a safeguard. Most of time, security awareness is not an ingrained mindset.

Third, and most important, the effectiveness of this new security system would still be questionable. Expanding the bubble would just move its boundaries outwards, with no guarantee that a new attack won’t happen on its edge.

For example, if security were increased before reaching the check-in at the airport, that might cause crowds to gather outside the main doors, and this would present a new target for terrorist attack.

So expanding the bubble would be just another symmetric response to an issue that has proven highly asymmetric.

This last point, in particular, emphasises that the Brussels’ airport attacks are not just a matter of airport security. They involve the need to reconsider our perception of modern security risks.

Where people gather

Airport security works very well these days. The problem is that, especially in some countries, any gathering involving more or less large crowds is a vulnerable target for terrorist attack.

Sport events, public transport, concerts, and even the queue in front of a museum, constitute a potential target for malicious individuals.

This requires governments to adopt a different approach to security. Security management needs to be performed at an asymmetric level, penetrating our societies and engaging terrorists at the individual level.

Random security checkpoints, enhanced intelligence networks and additional investments in street-level security technologies are some examples of asymmetric countermeasures that should be strengthened.

Technology, in particular, seems to be a powerful ally in our fight against terrorism. Especially when technological development is associated with the reduction of security costs.

The Conversation

Ivano Bongiovanni, PhD Candidate in Airport Safety and Security; Sessional Academic in Strategic Management, Queensland University of Technology

This article was originally published on The Conversation. Read the original article.

Check your Google security settings, receive 2GB of free Drive storage


Gigaom

Here’s an easy way to get 2GB of Google Drive storage: In the next week, head to Google’s security checkup page and follow the instructions. On February 28, Google will credit your account with the additional cloud storage space. The security checkup takes less than 5 minutes to complete, and it’s simple — it asks you what your backup email address is, whether any recent account activity is odd, and to review the various apps you’ve given Google account permissions to (there are probably a lot.) Sure, 2GB of additional Google Drive space isn’t a ton (you get 15GB for free), but you probably should review your security settings anyway.

View original post

Through a PRISM darkly: Tracking the ongoing NSA surveillance story


Gigaom

It was a relatively quiet week for internet news until Guardian blogger Glenn Greenwald dropped a bombshell on Thursday, with a story that showed the National Security Agency was collecting data from Verizon thanks to a secret court order. But that was just the beginning: the Washington Post later revealed an even broader program of surveillance code-named PRISM, which involved data collection from the web’s largest players — including Google (s goog), Facebook (s fb) and Apple (s aapl) — and then the Wall Street Journal said data is also being gathered from ISPs and credit-card companies.

This story is moving so quickly that it is hard to keep a handle on all of the developments, not to mention trying to follow the denials and non-denials from those who are allegedly involved, and the threads that tie this particular story to the long and sordid history of the U.S. government’s…

View original post 4,165 more words

Nigeria: Persecution News


The link below is to an article reporting on the security situation in Nigeria for Christians.

For more visit:
http://premiumtimesng.com/regional/127814-police-stop-easter-procession-in-jos.html

Why Facebook Home bothers me: It destroys any notion of privacy


Gigaom

23-remake-of-path-menuOne of the great things about attending Facebook’s events is that one gets to see Mark Zuckerberg mature as a chief executive and hone his presentation skills. And today, he didn’t disappoint in his ability to spin the media corps. It was all claps for “four colors on HTC First” and ideas “inspired” by the likes of Amazon Kindle (ads) and Path. But what he did most brilliantly was obfuscate the difference between an app (Home), the user experience layer and the operating system.

Zuckerberg did that for two reasons: First, to buy his company time to build a proper OS that will come to us in dribs and drabs and then will wash over us suddenly, like a riptide. And secondly, to convince people that “Home” is just like any other app. Unfortunately, Facebook’s Home is not as benign as that.

In fact, Facebook Home should put privacy advocates on…

View original post 482 more words