Critical Infrastructure
In regards to airports, most people take into account only what is visible from their vantage point– from the airfield, terminals, roadways, and rail used to flow passengers to baggage, cargo, transportation vehicles, large and small aircrafts, etc.
The most vital system within an airport is the hidden infrastructure of Information Technology and Systems (IT&S), which enables the airport and all of its intricate facets to efficiently and safely function minute-by-minute and day-to-day. Airport managers and operators have become increasingly dependent on IT&S to increase their airport’s capacity and security. IT&S has become a critical component of airports, supporting all phases of their lifecycle—from development to operations, maintenance, and renewal and replacement.
Frontier Solutions Group (FIG) utilizes the latest techniques to provide leading-edge security solutions across airport IT&S globally. FIG constantly improves our knowledge of physical security hardware, including keeping abreast of the latest equipment, mitigation techniques and industry trends, as well as current terrorist tactics based on intelligence information. FIG has conducted numerous vulnerability assessments and has provided security solutions designed to mitigate identified vulnerabilities, as well as enhanced existing operations, equipment, and procedures to ensure the highest level of security possible.
We provide recommendations for all security aspects keeping in mind our client's existing conditions - physical, technical and operational. We have the knowledge and experience to provide appropriate security solutions utilizing time-tested and proven methodologies, in coordination with new and innovative approaches, as well as existing, planned, or recommended technical security systems to ensure the most effective solutions to reduce vulnerabilities and improve the client's security position.
Implementing designs solutions and contribution to their evaluation and ensuring quality at all times.
Providing technical and commercial management.
Applying appropriate theoretical and practical methods to design, develop, implement, commission, operate, maintain, decommission and re-cycle engineering processes, systems, services and products.
Demonstrating a personal commitment to professional standards, recognizing obligations to society, the profession and the environment.
We work very closely with architectural, engineering, planning and construction companies in the planning, design, and construction/ implementation of integrated physical security systems.
Preparing master planning for airport security to assist clients with airport expansions and growth.
These security master plans are based on an assessment of existing security programs, identification of future security needs based on growth and expansion, and the development of plans, designs, and other recommendations for integrating new security programs with existing ones.
Assisting major airports in the transition to biometric technologies and in the integration of these new technologies into existing infrastructure.
Our professional staff includes aviation professionals who are former directors of airport operations, security directors and chiefs of airport police, systems engineers, systems/technical specialists, security consultants, law enforcement, and security personnel.
Security Program Assessments
Comprehensive Security SurveysVulnerability/Threat Assessments
Airport ICAO Audits
Tenant/Cargo Security Plan Review
Bomb Blast Effectiveness Analysis
Training Needs Analysis
Training Needs Analysis
Security Program Support
Security Consultant SupportSecurity Master Plan Development
Policy and Procedure Development
Security Exercise Development
Regulatory Compliance Support
Security Training Support
On-Site Staff Support
Airport Safety & Security System Design and Integration
Access Control DesignIP CCTV Design (True CCTV Over IP & Hybrid)
ID Badging System Design
Communication Center Design
Crisis Management Center Design (Interpreted Command & Control Centers)
Bid Preparation and Evaluation
Construction Management/Oversight
Perimeter Control Systems
Mobile Command Post Systems
Camera Systems
In-Line Explosive Detection Systems (EDS)
X-Ray Security Screening Systems (Passenger Carry-on Baggage and Human Screening)
Biometrics Systems
Perimeter Intrusion Detection Systems (PIDS)
Fire Fighting & Alarm Systems
Crash alarm Systems
Emergency Response System Methodology
Airport Communication Systems
Comprehensive Security SurveysTrunked Radio, Land Mobile Radio, TETRA,
Private Branch Exchange (PBX) Telephone
VoIP Telephone
Cable Management System
Data Center
Airport Master Clock
Premises Distribution (Wiring & Backbone) Systems
Gateways: AFTN Messaging, Web Gateways, ACARS Messaging, Intranet,Extranet
Network Management Systems - Network Security Management, Wide Area Network (WAN), Local Area Network (LAN), Ethernet, Wifi, Multi Frequency Antennae, Radio Spectrum Management Systems
Airline & Airside Operations Systems
Comprehensive Security SurveysAirport Operational Database
Gate Management System
Ticket Counter Management System
Baggage Carousel Management System
Flight Information Display Systems (FIDS)
Gate Information Display Systems (GIDS)
Ramp Information Display Systems
Baggage Information Display Systems (BIDS)
Parking management Display Systems
Common Use Self-Service (CUSS) Kiosks
Baggage Handling Systems (BHS)
Baggage Sortation System
Airport Landside Operations Systems
Smart Parking Management Systems: Parking Revenue Control, Electronic Parking Toll (e.g., E-Pass), License Tag Identification System, Parking Space Management System.Automated Vehicle Identification (AVI)
Surface Vehicle Monitoring System
Undercarriage Vehicle Inspection System
Airport Projects Management
From designing, installing and connecting all equipment and systems through to final deployment, Frontier Solutions Group will ensure everything is set for you to begin on-time and on-budget. FIG maintains expertise with our main suppliers’ products, we offer across-the-board skills with the more common systems – which is particularly important where legacy equipment is an issue.Security Program Support
Security Consultant SupportSecurity Master Plan Development
Policy and Procedure Development
Computer Security Police development
Regulatory Compliance Support
Security Training Support
On-Site Staff Support
Emergency & Crisis Management Support
Emergency Plan DevelopmentSecurity Exercise Development
Disaster Recovery Planning
Ongoing capital projects consultancy
| Project Name and Location | Client Name and Contact Information | Brief Scope of Services provided |
| Integrated security management (ISMS) | Kenya Airports Authority | Security survey and design |
| Airport terrestrial trunked radio (tetra) | Kenya Airports Authority Nairobi airport | Concept, System Architecture design, and implementation |
| Security Screening equipment | Kenya Airports Authority | Design tender document, install, commissioning & train |
| Flight information display system (FIDS) | World Bank/ Kenya Airports Authority | Concept, System Architecture design, and implementation |
Substantially Completed Projects
| Project Name and Location | Client Name and Contact Information | Brief Scope of Services provided |
| CCTV Over IP | Kenya Airports Authority Nairobi airport | Concept design, planning, implementation & commissioning |
| Central Screening Facility at JKIA | Kenya Airports Authority Nairobi airport | Concept design for integrated central Security System for a Screening facility CCTV Over IP Undercarriage vehicle screening Drive through Vehicle screening |
| Checkpoint security screening equipment Solution | Kenya Airports Authority Nairobi airport | Plan, concept design specification and installation supervision |
| Flight information display system (FIDS) | Kenya Airports Authority Nairobi airport | Analysis, concept design, planning, implementation & commissioning of integrated CCTV Over IP and flight information display system (FIDS) Solution |
| IP wireless CCTV | Kenya Airports Authority Nairobi airport | Analysis, concept design, planning, implementation |
| Security Survey, analysis of the threat | Juba International Airport | Security strategy and policy, security analysis and management |
Our security methodology always commences with analysis of the threat to any particular business, facility, organisation or location.
Only once the threats have been clearly identified can a security strategy and plan be put together to effectively counter them.
The security strategy and policy clearly defines how a site is to be protected in the broadest possible terms and the plan details, the type, nature, siting and organisation of equipment, guards, manpower, surveillance and building control that will actually achieve the security objectives.
The specification details the clear performance and requirement and type of products that are to be supplied as part of the open competitive bid for the security construction of the project.
The evaluation of contractors’ Tenders and the award of the contract are also a vital part of the process to ensure that the most effective and competent contractor is awarded the contract at a cost-effective price. Our consultants will also manage the client’s contract through to completion and the most important aspect of commissioning and handover. We will also design specific training courses for the client’s staff in how to become effective security managers and security supervisors and provide detailed specific security procedures for the site.
The methodology for a security consultancy contract
Threat AssessmentSecurity Policy & Plan
Security Design
Security Specification
Contractors Tender Evaluation & Award
Project Management & Implementation
Commissioning & Handover
Ongoing Annual Review
Security Threat Assessment
Threat Analysis - The basis of counter measuresAt the start of every project the group carries out a security threat assessment that looks at the threats from crime, burglary, vandalism, terrorism, fire bombs, kidnap and theft or loss of information. We look at the nature of each of these threats and the likelihood and consequence to the business if they actually occur.
Only once you have carried out this process can you then prepare a security strategy, policy and a plan to neutralise and counter these insectionidual threats as they affect each business which is completely different in different parts of the world, different sectors of information and in different security situations.
The security threat assessment is written firstly as a narrative report discussing each of the threats and how they may be neutralised and what the options are for achieving an effective security solution.
Each of the threats is also analysed insectionidually and a numerical figure for their likelihood and their consequence if they occur is produced and tabulated as part of the threat assessment. This produces a clearly prioritised and numbered list of threats in severity order which can then be used to prepare the security strategy.
Risk assessment methodologies
We use a variety of risk assessment methodologies from the very simple probability and consequence analysis to detailed country risk reports, View Risk software and Protection Requirements Model for major high security sites such as defence installations.Security Survey And Security Audit
The security threat assessment is the primary means of assessing the risk and developing the security strategy, policy and plan for any development.The Survey on Site
A security survey or audit can either be carried out on the ground by looking in detail at the buildings, the facility, the airport, the port or the business park. It can also be carried out for projects that have not even commenced in construction and in this case it is carried out by a detailed review of the architectural master plan drawings for the site, the buildings or the development.The Survey from Drawings
Our specialist security consultants carry out almost half of their work for projects that have not even commenced construction work on site and this involves a detailed analysis of a number of drawings that may vary from 20 at the initial stages of the project up to 200 if the project is already at the detailed design stage.Mid Survey Briefing, Benchmarking and Planned Improvement
Mid survey briefing, benchmarking and planned improvements at the end of any security survey or audit our consultants will always have a brief meeting with the client and will advise the client verbally of the results of the survey and the main areas for security improvement that have been identified. In this way the client has a very clear view of what information will be contained in the security survey report when it is written up after the security survey has been completed.Survey have been done either by a detailed visit to the site or from drawings if the site is at the initial design or construction stage. The security strategy decides in concept how the site or facilities can be protected. For a very high security site such as a nuclear facility, a bank or a military airfield then the strategy will undoubtedly consist of extensive perimeter security, external alarm systems and CCTV surveillance including perhaps video motion detection together with further alarm systems, doors, locks and perimeter security in buildings together with an integrated and specially trained guard force who are specifically trained to guard the site. As consultants, part of our task is knowledge transfer and so we not only design the strategy policy and plan but also advise and provide training and, most importantly, the security procedures for the site after security systems have been installed and handed over to the client. The procedures in the correct use of the security systems are an absolutely vital part of any security strategy and plan. The security strategy provides the client with options they can consider and select which will then form part of the security policy.
The Security Policy
The security policy is then a clear statement of exactly how the site is to be secured. The policy may have a significant leaning towards the use of very high-tech equipment and a correspondingly much lower level of guard force and operating personnel. Alternatively, for major events, leisure parks or sporting facilities the emphasis may be on much larger customer service and extremely well-trained security and reception staff who are responsible for security.
The Security Plan
The security plan then details the exact equipment including fences, perimeter security, camera locations, alarm systems, access control doors, car park barriers, facial recognition, explosive detection equipment, mail scanning and procedures that are required to implement the strategy policy. The plan will be presented normally as mark-ups on drawings of the installation or facility.
We will then assist the client in reviewing and evaluating the bids and awarding the contract to the selected contracted.
The implementation process starts with a meeting with the selected contractor on site to discuss all details of the specification and the siting and selection of various items of equipment together with the project plan and programme and key milestone dates.
Throughout the project our consultants will maintain contact both with the client and with the contractor to ensure the smooth progression of the contract through to final commissioning and testing of the systems and handover to the client.
One of the most important stages of any contract is the final pre-commissioning testing and commissioning and handover. At this stage the consultants will test and check all aspects of operation of the system to ensure that the system is operating to the specifications and performance that was specified in the original planned specification documents. This is also the time that the client and the client’s staff will be able to view the system in operation for the first time and to be trained by the contractor in the use of all systems prior to handover of the system to the client.
Handover and defects Inspections
Frontier Solutions Group LLC consultants will also supervise the formal handover of the project to the client and the commencement of the one year defects liability period during which time any snagging items or defects can be rectified by the contractor at no cost to the client.
Training and procedures for the correct operation of security equipment and services on a site is probably the most vital element of any security design or installation. Almost 90% of security breaches are caused by the incompatibility between the security procedures or the use of the equipment by individuals who were not sufficiently trained to understand how the equipment operated correctly.
Contractor technical systems training
The contractor is responsible for carrying out detailed technical training in the actual operation and use of each item of the equipment that has been supplied. They are not however responsible for training the security manager and the security staff in the security disciplines of how to actually use the equipment to achieve the security objectives or to carry out the specific security procedures set for the site.
