Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • RSIS Publications
    • CO16184 | Checkpoint or Chokepoint: Aviation Security Lessons from Istanbul and Brussels
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • RSIS Commentary Series
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • Future Issues
    • IDSS Papers
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers

    CO16184 | Checkpoint or Chokepoint: Aviation Security Lessons from Istanbul and Brussels
    Tan E Guang Eugene

    19 July 2016

    download pdf

    Synopsis

    International airports are highly secured buildings, because they are attractive targets for individuals or groups seeking to make a statement, be it out of political, religious, or social frustrations. Some security experts have suggested that instituting more checkpoints to scan visitors will increase security, but some are sceptical.

    Commentary

    THERE HAVE been several attacks by terrorists on major international airports in the past year. In the latest attack on 28 June 2016, a suicide gun-and-bomb attack was carried out by three men at Istanbul Ataturk Airport, causing at least 36 deaths. Another airport in Istanbul, Sabiha Gökçen, was also attacked earlier, on 23 December 2015, by the Kurdistan Freedom Falcons (TAK) causing one death.

    While it would be easy to discount Istanbul as a prime target because of its proximity to the conflict in Syria, the attacks on Brussels Zaventum Airport on 22 March 2016 remind us that terrorist attacks can hit any international airport in the world. On that day, three men detonated suicide vests inside the airport, causing 16 deaths and injuring hundreds more. Moreover, while these attacks have been largely attributed to ISIS and other terrorist organisations like the TAK, there was a smaller scale incident where a homemade bomb was detonated at Shanghai Pudong Airport on 12 June 2016 by a man thought to have huge gambling debts, injuring four people.

    To Check or Not to Check

    The latest attack at Ataturk airport happened just outside the airport, before the security screening checkpoint at the entrance to the airport. The attack at Zaventum and Pudong airports were in the general public area of the airport concourse, located inside the airport.  The attack on Sabiha Gökçen involved mortar shells launched from outside the perimeter of the airport, and away from the terminal buildings. These attacks highlight the difficulty of airport security and the large area that needs to be secured.

    It is thus an often-asked question where checkpoints should be placed, how stringent should the checks be, and what purpose would a security checkpoint serve, or should there  even be security checkpoints before the transit area.

    Proponents of ultimate security would champion the security model that Tel Aviv Ben Gurion Airport reportedly employs, where all vehicles and persons entering the airport are stopped at a distance from the airport and asked a few innocuous questions. It is through this method that suspicious activity can be picked up by the security personnel stationed at that checkpoint. While this ensures that terrorists are kept away from the airport complex, this also increases the time needed for passengers to get to the airport.

    On the other hand, the large public area in Brussels Zaventum enabled the suicide bombers to walk into the terminal building without much fuss, blending with the many travellers present. Similarly, the homemade bomb attack at Pudong International showed the ease of bringing a bomb into the public areas of some airports around the world.

    Istanbul Ataturk, being a major international gateway in a restive region, had hardened its security post-Brussels, instituting a checkpoint scanning everyone entering the airport building. What stood out in the Istanbul Ataturk attack was the level of planning required to land a disruptive attack on the airport proper. A diversionary bomb attack was set off in the car park to trigger the emergency response, resulting in the thinning of the security at the checkpoint. A secondary bomb was then triggered at the checkpoint, where scores of people were waiting to clear security checks. The blast and the resulting damage and confusion allowed a tertiary suicide attack inside the terminal building.

    Effectiveness in Moving Checkpoints

    Following the Brussels Zaventum attacks, there have been calls to strengthen security screening of passengers before allowing access to the public access areas. However, ACI Europe, which promotes the collective interest of Europe’s airports, had warned that additional checks on people entering the public areas of the airport could be disruptive and potentially create new security vulnerabilities by moving rather than securing the target.

    It is of note that the Istanbul Ataturk attacks showed the prophetic nature of ACI Europe’s warning, with most of the casualties having resulted from the secondary attack at the checkpoint. The checkpoint was situated at the entrance of the terminal, where taxis and cars drop off passengers. Heavy traffic flows meant that the crowds waiting to clear the checkpoints were effectively sitting ducks for a terrorist attack.

    In short, this checkpoint was situated in an area that had not been designed for security scanning, and had effectively become a chokepoint for people wanting to enter the terminal building.

    However, as deplorable as loss of life may be, the checkpoint largely protected the airport terminal itself because the force of the attack was kept outside the public area of the terminal. Only one suicide bomber made it past the checkpoint into the terminal building, and he was very swiftly identified as a bomber and tackled to the ground by a security guard.

    Comparatively, the suicide bombers at Brussels Zaventum had no checkpoints to stop them, and caused tremendous damage to the airport itself. Consequently, while Brussels Zaventum was completely closed for twelve days after the attack (and progressively reopened), Istanbul Ataturk was up and running just hours after.

    Tragedy of Unintended Consequences

    It is equally pertinent to note the unintended consequences created by checkpoints. For example, the restrictions on Liquids, Aerosols, and Gels (LAGs) on planes mean that LAG bottles containing more than 100ml are discarded at the security checkpoint. This can be a potential weapon should a large amount of hazardous material be thrown into the same bin by ‘innocuous’-looking passengers.  Hence, while checkpoints can keep intruders out, checkpoints are also a double-edged sword because of the vulnerable chokepoints that they may unwittingly create.

    Airports around the world should carefully consider their individual security needs and flow of human traffic when situating and setting up a checkpoint. The potential danger in rashly moving checkpoints to unsuitable locations is often understated, and more weight should be given to considerations such as ease of access by visitors to the airport, cost of security, and the suitability of areas used for additional screening.

    In conclusion, airport administrators need also to realise that checkpoints are not a silver bullet to prevent intrusion, and they can be bypassed by people who seek to circumvent security checks through a variety of means, including insider cooperation or diversionary tactics.  Checkpoints, if placed strategically and used effectively, can however better detect and prevent would-be terrorists from entering a sensitive area.

    In the wake of these terror attacks, airport authorities need to carefully analyse the risks and benefit that may result from instituting additional checkpoints. Checkpoints may give the illusion of strengthened security against terrorists, but it is the safety of passengers and the continuity of operations at the airport that should be the primary concern of airports.

    About the Author

    Eugene EG Tan is an Associate Research Fellow at the Centre of Excellence for National Security (CENS), a constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

    Categories: RSIS Commentary Series / Conflict and Stability / Country and Region Studies / Terrorism Studies / Europe / Global

    Synopsis

    International airports are highly secured buildings, because they are attractive targets for individuals or groups seeking to make a statement, be it out of political, religious, or social frustrations. Some security experts have suggested that instituting more checkpoints to scan visitors will increase security, but some are sceptical.

    Commentary

    THERE HAVE been several attacks by terrorists on major international airports in the past year. In the latest attack on 28 June 2016, a suicide gun-and-bomb attack was carried out by three men at Istanbul Ataturk Airport, causing at least 36 deaths. Another airport in Istanbul, Sabiha Gökçen, was also attacked earlier, on 23 December 2015, by the Kurdistan Freedom Falcons (TAK) causing one death.

    While it would be easy to discount Istanbul as a prime target because of its proximity to the conflict in Syria, the attacks on Brussels Zaventum Airport on 22 March 2016 remind us that terrorist attacks can hit any international airport in the world. On that day, three men detonated suicide vests inside the airport, causing 16 deaths and injuring hundreds more. Moreover, while these attacks have been largely attributed to ISIS and other terrorist organisations like the TAK, there was a smaller scale incident where a homemade bomb was detonated at Shanghai Pudong Airport on 12 June 2016 by a man thought to have huge gambling debts, injuring four people.

    To Check or Not to Check

    The latest attack at Ataturk airport happened just outside the airport, before the security screening checkpoint at the entrance to the airport. The attack at Zaventum and Pudong airports were in the general public area of the airport concourse, located inside the airport.  The attack on Sabiha Gökçen involved mortar shells launched from outside the perimeter of the airport, and away from the terminal buildings. These attacks highlight the difficulty of airport security and the large area that needs to be secured.

    It is thus an often-asked question where checkpoints should be placed, how stringent should the checks be, and what purpose would a security checkpoint serve, or should there  even be security checkpoints before the transit area.

    Proponents of ultimate security would champion the security model that Tel Aviv Ben Gurion Airport reportedly employs, where all vehicles and persons entering the airport are stopped at a distance from the airport and asked a few innocuous questions. It is through this method that suspicious activity can be picked up by the security personnel stationed at that checkpoint. While this ensures that terrorists are kept away from the airport complex, this also increases the time needed for passengers to get to the airport.

    On the other hand, the large public area in Brussels Zaventum enabled the suicide bombers to walk into the terminal building without much fuss, blending with the many travellers present. Similarly, the homemade bomb attack at Pudong International showed the ease of bringing a bomb into the public areas of some airports around the world.

    Istanbul Ataturk, being a major international gateway in a restive region, had hardened its security post-Brussels, instituting a checkpoint scanning everyone entering the airport building. What stood out in the Istanbul Ataturk attack was the level of planning required to land a disruptive attack on the airport proper. A diversionary bomb attack was set off in the car park to trigger the emergency response, resulting in the thinning of the security at the checkpoint. A secondary bomb was then triggered at the checkpoint, where scores of people were waiting to clear security checks. The blast and the resulting damage and confusion allowed a tertiary suicide attack inside the terminal building.

    Effectiveness in Moving Checkpoints

    Following the Brussels Zaventum attacks, there have been calls to strengthen security screening of passengers before allowing access to the public access areas. However, ACI Europe, which promotes the collective interest of Europe’s airports, had warned that additional checks on people entering the public areas of the airport could be disruptive and potentially create new security vulnerabilities by moving rather than securing the target.

    It is of note that the Istanbul Ataturk attacks showed the prophetic nature of ACI Europe’s warning, with most of the casualties having resulted from the secondary attack at the checkpoint. The checkpoint was situated at the entrance of the terminal, where taxis and cars drop off passengers. Heavy traffic flows meant that the crowds waiting to clear the checkpoints were effectively sitting ducks for a terrorist attack.

    In short, this checkpoint was situated in an area that had not been designed for security scanning, and had effectively become a chokepoint for people wanting to enter the terminal building.

    However, as deplorable as loss of life may be, the checkpoint largely protected the airport terminal itself because the force of the attack was kept outside the public area of the terminal. Only one suicide bomber made it past the checkpoint into the terminal building, and he was very swiftly identified as a bomber and tackled to the ground by a security guard.

    Comparatively, the suicide bombers at Brussels Zaventum had no checkpoints to stop them, and caused tremendous damage to the airport itself. Consequently, while Brussels Zaventum was completely closed for twelve days after the attack (and progressively reopened), Istanbul Ataturk was up and running just hours after.

    Tragedy of Unintended Consequences

    It is equally pertinent to note the unintended consequences created by checkpoints. For example, the restrictions on Liquids, Aerosols, and Gels (LAGs) on planes mean that LAG bottles containing more than 100ml are discarded at the security checkpoint. This can be a potential weapon should a large amount of hazardous material be thrown into the same bin by ‘innocuous’-looking passengers.  Hence, while checkpoints can keep intruders out, checkpoints are also a double-edged sword because of the vulnerable chokepoints that they may unwittingly create.

    Airports around the world should carefully consider their individual security needs and flow of human traffic when situating and setting up a checkpoint. The potential danger in rashly moving checkpoints to unsuitable locations is often understated, and more weight should be given to considerations such as ease of access by visitors to the airport, cost of security, and the suitability of areas used for additional screening.

    In conclusion, airport administrators need also to realise that checkpoints are not a silver bullet to prevent intrusion, and they can be bypassed by people who seek to circumvent security checks through a variety of means, including insider cooperation or diversionary tactics.  Checkpoints, if placed strategically and used effectively, can however better detect and prevent would-be terrorists from entering a sensitive area.

    In the wake of these terror attacks, airport authorities need to carefully analyse the risks and benefit that may result from instituting additional checkpoints. Checkpoints may give the illusion of strengthened security against terrorists, but it is the safety of passengers and the continuity of operations at the airport that should be the primary concern of airports.

    About the Author

    Eugene EG Tan is an Associate Research Fellow at the Centre of Excellence for National Security (CENS), a constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

    Categories: RSIS Commentary Series / Conflict and Stability / Country and Region Studies / Terrorism Studies

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info