Airport Security

SAIC is a recognized leader within the Airport and Cargo Security field.



We provide capabilities to help detect and deter criminal acts including:

Risk and Vulnerability Assessments

SAIC's methodology and procedural tools have been used at more than 100 facilities over a 20-year period. This methodology was applied in a logical, sequenced fashion that considered factors like: threat, target identification, aggressor types, malevolent acts of concern, and consequences of a successful attack. Countermeasures were developed to minimize risk, and the methodology was re-applied to determine the relative risk reduction achieved.

Assessments typically focused on a variety of threats and evaluation of all security-related aspects of the facilities including:

  • Guard services
  • Electronic security measures
  • Access controls
  • Barriers
  • Employment of closed-circuit television
  • Alarm systems
  • Information Security

SAIC has conducted detailed vulnerability assessments at several major airports. SAIC uses a risk management approach. Studies compare the existing security system components such as personnel, equipment, training, policies, procedures and practices against a variety of threats. Based on an analysis of results, potential vulnerabilities were identified and recommendations for applicable countermeasures were made.

Airport Security Systems Integration, Design and Installation

SAIC has experienced staff familiar with airport environments, regulations and security challenges. Experienced SAIC project managers are supported by registered Professional Engineers (PE) and RCDDs that are up to date on all the latest technologies and their deployments within varying environmental conditions.

SAIC is a vendor neutral designer and systems integrator providing the following types of services:

  • Security Master Plan
  • Security systems design and construction management
  • Systems integration
  • Access Control Systems
  • Closed Circuit Television (CCTV) surveillance
  • Video analytics
  • Perimeter Intrusion Detection System (PIDS)
  • Command and Control Centers
  • Computer Aided Dispatching
  • Asset management/monitoring
  • LAN/WAN
  • Communications infrastructure

Being vendor neutral, SAIC considers the customer's interest in deploying the best proven solutions and product set to accommodate the project's needs. Technology is constantly improving and SAIC tests and integrates these systems in our facilities to validate manufacture performance and test interfaces between disparate systems.

Smart Cards and Biometrics

Smart Cards can be used to store essential personal data, to document time and attendance information, and to support inventory control measures.

Through the use of Smart Cards for access to secured buildings, computer equipment, and applications, tighter control can be exercised and metrics for ROI can be easily generated. In addition, Smart Cards can be used for security-records management, accessing required security information and forms, and for access to personal banking information from remote locations, such as ATM transactions aboard ship.

SAIC implemented Smart Card systems include:

  • Common Access Card (CAC)
  • The Public Key Enabled (PKE) System
  • The Personnel Security System (PSS)
  • Navy Cash Card

SAIC also has substantial expertise within the field of biometric technology implementation and integration. SAIC's biometrics work encompasses the integration of identification and verification capabilities into new and existing systems. This integration then allows even legacy systems to perform secure system sign-on/sign-off, data administration, application access, electronically signed transactions, and facility access via secure biometric verification.

SAIC implemented Biometrics systems include:

  • Iris identification technology
  • Digital and sonar fingerprints
  • Hand geometry
  • Retina eye patterns
  • Digital facial recognition
  • Voice recognition
  • Database technologies

Information Security (INFOSEC)

SAIC's work with information security offers a detailed pragmatic approach of process analysis and implementation, and includes the following steps:
  • Prepare vulnerability assessments and abatement strategies
  • Review computer and network architectures
  • Examine systems using specialized tools designed to identify vulnerabilities
  • Conduct penetration tests on customer networks and analyze the results
  • Review organizational policies, practices, and procedures
  • Examine system architectures and review training programs for vulnerabilities
  • Establish virus policies and procedures against future virus threats
  • Apply QRA methodology to show risks, consequences, mitigation approaches and costs
  • Provide a priority list of recommendations for correcting concerns
  • Establish around the clock network operations center for remote management of customer firewalls
  • Select, configure and install TBD firewalls

Once these systems and processes have been implemented, SAIC performs scheduled and selective vulnerability probes and assessments of our customer's network communication services, operating systems, key applications, and routers. We also utilize software tools to conduct remote enterprise-wide management of application code.

In addition, SAIC can provide enterprise-wide encryption and crypto-key management services. This is achieved through the utilization of secure network architecture design, and the integration of Public Key Infrastructure (PKI) devices and the necessary supporting infrastructures.

Weapon, Explosive, Drug, and Cargo Detection Systems

SAIC possesses extensive experience in weapon, explosive, drug, and cargo detection systems. Examples of SAIC technologies are the Vehicle and Cargo Inspection System (VACIS) and the RTR-4N™ detection systems. VACIS is an SAIC signature technology that provides a revolutionary, low radiation tool for countering smugglers and other criminals seeking to conceal items (weapons, explosives, cargo, and drugs) in vehicles. It is by far the fastest available method for non-invasive screening. Typical scan speeds are about 1 ft./second, allowing for full inspection of a 40-foot container in less then one minute.

VACIS applications offer contraband interdiction, and manifest verification, at land border crossings, container seaports and airfreight terminals. In addition, VACIS can be used to identify the presence of explosive vehicles used for terrorist attacks on civilian and/or military facilities.

The RTR-4N is the latest and only fully digital portable x-ray equipment available to Explosive Ordnance Disposal (EOD) professionals, providing the ability to quickly and efficiently search for weapons, drugs, and contraband in areas too difficult or time-consuming to search by hand.