Why is it in the news?
- On October 21, a series of bomb threats disrupted multiple Indian airlines, including Air India, Vistara, and Indigo, leading to emergency landings and flight rerouting. Notably, an Indigo Flight from Saudi Arabia made an emergency landing in Jaipur on October 15.
- Military jets intercepted some flights in international airspace; although the threats were determined to be hoaxes, they caused significant delays and financial losses estimated at ₹13 lakh-₹17 lakh per hour.
Nature of the Threats
- According to Union Civil Aviation Minister, most threats were received via social media. Intelligence agencies are currently investigating, focusing on tracking IP addresses and VPN usage.
- With over 275 threats affecting approximately 48,000 flights, authorities are considering amending aviation laws to enhance responses to such threats. So far, only a minor has been detained for making a hoax call, but social media platforms have committed to combating terrorism-related threats against Indian flights.
The Aviation Security Architecture
- India’s aviation security standards are largely based on the International Civil Aviation Organization’s (ICAO) Annex 17—Aviation Security guidelines.
- An ICAO spokesperson emphasized the importance of Standards and Recommended Practices (SARPs), which are detailed in the technical annexes of the Chicago Convention.
- The ICAO framework aims to prevent unlawful interference in civil aviation globally, with member states adhering to protocols outlined in Annex 17 and Doc 8973 of the Aviation Security Manual. These guidelines are regularly updated to address evolving security risks.
- In India, the Bureau of Civil Aviation Security oversees civilian flight security, while the Directorate General of Civil Aviation (DGCA) manages safety. Other agencies involved include the Airports Authority of India, Central Industrial Security Force, National Security Guard, Intelligence Bureau, and the Ministry of Home Affairs.
Possible Amendments in Aviation Laws
- In response to these recurring threats, the government is considering amendments to the Aircraft Act of 1934, the Aircraft Rules of 1937, and the Suppression of Unlawful Acts Against Safety of Civil Aviation Act of 1982.
- Proposed changes could introduce stricter penalties, a ‘no-fly list’ for offenders, and broader legal authority for action, even when aircraft are on the ground.
- Current regulations primarily focus on in-flight incidents, highlighting the need for expanded jurisdiction to pre-emptively manage threats.
Airport Protocols for Handling Threats
- Airports, airlines, and security agencies have established procedures to address various security threats, including bomb threats, hijackings, and communication failures.
- These procedures are regularly tested and updated and involve isolating potentially dangerous aircraft while coordinating with air traffic control and law enforcement.
- Although the specific documents governing these procedures are restricted, they provide a clear protocol for involved agencies to mitigate risks effectively.
- An aviation security expert suggests that tackling hoax calls will require investments in advanced call tracking, AI-based analysis, voice stress detection, and improved threat assessments.
- Technologies like quantum computing, an aviation cybersecurity framework, and a global hoax call database could bolster these efforts.
- The expert recommends using AI chatbots for initial threat assessments and enhancing psychological profiling of callers. Additionally, a former Civil Aviation Safety Advisory Council member proposed displaying offenders’ photos publicly at airports and on social media to deter future incidents.
Conclusion
- India’s aviation industry is grappling with significant challenges due to frequent security threats, prompting discussions on legal reforms, technological investments, and stricter penalties for offenders.
- These measures, alongside adherence to ICAO guidelines, aim to safeguard air travel in India and equip the sector to address emerging security risks.