Annotated bib revised final

447 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
447
On SlideShare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Annotated bib revised final

  1. 1. Parsons 1Rebekah ParsonsEnglish 101Professor BoltonNovember 8, 2012 Annotated Bibliography I was shocked after reading “Signal Detection,” by Steven Casey. The text tells the story ofRichard Reid, who managed to get through airport security with a bomb in his shoe. Luckily, the flightattendants and passengers on boardwere able to stop him and landed safely. I began to wonder whatcould have been done to prevent Richard Reid from boarding that plane. Before September 9, 2001, terrorism did not present a major threat to air travelers. Since then,though, airport security systems have been a major deal. However, if other terrorists, Richard Reidbeing only one example, can still manage to get through security and onto an airplane, then somethinghas to be done. Airport security systems need to be improved in order to keep people safe.Suggestions to better the security networks have been made: install new technologies, or follow newprocedures. Some airports have listened to these suggestions and upgraded their security. Airportsecurity systems should always be changing in order to keep up with the new technologies andequipment being produced. Also, altering and updating the security systems will keep terrorists ontheir toes, and hopefully catch them before any harm can be done. Although airport security is such ahassle to go through, one should keep in mind the importance of it. Ultimately, what is at stake here isthe future of our country.Fultz, Keith O. Opposing Viewpoints: Terrorism. San Diego: Greenhaven Press, Inc., 2000. Print. Opposing Viewpoints Series. In this source, different technologies and procedures are talked about that can improve the
  2. 2. Parsons 2security at airports. These systems include the computer-assisted passenger screening (CAPS) system,explosives detection technologies, and matching checked bags to the passengers. Another topicdiscussed in the book is how the Federal Aviation Administration (FAA) should assess vulnerability.One way is a standardized model developed by the FAA for conducting airport vulnerabilityassessments. Second, is for the FAA and the FBI to assess threats and vulnerabilities at high-riskairports together. Lastly, airports should conduct periodic vulnerability assessments. Another methodthat can help improve airport security is having well trained employees: Improving the training and testing of people hired by these companies to screen passengers baggage at airport security checkpoints would also improve aviation security. Regardless of advances in technology, the people who operate the equipment are the last and best line of defense against the introduction of any dangerous object into the aviation system. (Fultz 154)The fact that the book is published and on the shelves at public libraries means it is credible andtrustworthy. The book was published in 2000 so the information is not very current, but I will use thisinformation to describe airport security before September 9, 2001. This information will be helpful in describing airport security before September 9, 2001 andhow it has changed. I can also use the information to examine the attitudes toward airline security atthat time.Hawley, Kip. “The Gaps in Airport Security.” Los Angeles Times (2011): n.pag. SIRS Issues Researcher. Web. 04 Nov. 2012. Hawley describes how in the United States, security responsibility is divided according to whoperforms the activity. He explains that the Transportation Security Administration (TSA) personnel,airport law enforcement officers,and vendors all perform different tasks, and when there is a “systemicfailure” (Hawley, par. 1), each claim they did their part. Also, TSA publishes the requirements for each
  3. 3. Parsons 3group, causing three things to happen: “vulnerability is embedded where those measures are weak; theminimum required becomes the maximum undertaken by the security players; and the regulated partyfeels protected from blame because it did what was required” (Hawley, par. 3). Hawley proposes threeways to improve the security. He says that several layers of security are needed throughout the airportthat are frequently changing and appear random. Additionally, everyone must share responsibility forsecurity outcomes, and lastly, assessments of risk-management resources. This article was published in 2011, just a year ago. Hawley is aware of the procedures ofairport security and how it works. He has also spent time researching information about TSA and hasstudied different ways to improve airport security. Since my research paper is on the flaws of airport security, this source will help provideinformation. This article gives an instance where the security can be improved and offersrecommendations to better the system. I can use the instance and recommendations given as examples.Holbrook, Emily. “Airport Security: Privacy vs. Safety.” Risk Management 57.2 (2010): n.pag. Academic OneFile. Web. 04 Nov. 2012. In this article, Holbrook talks about the security systems of airports after September 11, 2001.She starts off by giving examples of other attempted terrorist attacks. Since 9/11, some procedureshave been modified and put in place in order to catch terrorists, but these have also brought aboutcriticism. Full-body scanners and backscatter x-rays, according to Holbrook, are the mostcontroversial; people argue that these violate personal privacy and could cause health problems. Somepeople believe the aviation security networks are dangerously flawed. William Daly, a former FBIinvestigator, said, “Airline security resembles swiss cheese, in that there are so many holes forterrorists to infiltrate airliners and airports” (qtd. in Holbrook, par. 10). Others think it is a good idea toprepare and teach the passengers how to handle dangerous situations.
  4. 4. Parsons 4 Since the article was published in 2010, two years ago, the information is current. Holbrook hasresearched the different terrorist attacks and the Obama administrations response to the most recentattack. She has studied what others have said about this subject as well. This article will help support my thesis that airport security systems have flaws. It also providesa way in which security can by improved, by informing passengers. I can use this article for acounterargument too. The criticism of privacy and concern about health effects from the securitysystems could be a reason not to use the updated procedures.Opportunities to Improve Airport Passenger Screening with Mass Spectrometry. National Academies Press, 2004. eBook Collection (EBSCOhost). Web. 06 Nov. 2012. The book, Opportunities to Improve Airport Passenger Screening with Mass Spectrometry,describes different technologies designed for screening baggage and passengers in order to “protect thetraveling public from attacks on the commercial aviation system involving explosives” (1).One of thetechnologies talked about is explosive detection systems (EDSs), which is designed to detect objectswith dimensions and densities similar to explosive materials. Explosive trace detectors (ETDs), on theother hand, are used to detect vapor or particles of explosive materials. Most of the material used tomake bombs is “very sticky, and once a finger has been in contact with the explosive, it is capable ofleaving many subsequent fingerprints (on briefcases, clothes, boarding passes, etc.) with detectableamounts of material” (Opportunities1). Since the materials made to make bombs can be left behind,ETDs are effective in detecting the traces of explosives. This eBook was published in 2004, which is eight years ago. Eight years is certainly a gap;however, the information will be effective in describing the technology used in airport security soonafter September 9, 2001. This source is also credible because it has been published into theEBSCOhost database.
  5. 5. Parsons 5 The information in this source will be helpful when describing the different technologiesairports use to detect explosives. I can also use this information to explain how these differenttechnologies work.Outsmarting Terror. “Airport/Airplane Security.” Films Media Group, 2006. Films on Demand. Web. 04 Nov. 2012 <http://storm.hgtc.edu:2048/login? url=http://digital.films.com/PortalPlaylists.aspx? aid=3503&xtid=40808&loid=90555>. This film discusses some of the different technologies airports use. Until recently, x-rays werethe most common and main technology used in airports. However, x-rays are not enough in themodern war on terror. X-rays cannot detect plastic, a common ingredient in explosives, or tell thedifference between a bar of chocolate and TNT. The film also talks about Richard Reid, the shoebomber. The explosives in his show were “impossible to see on x-ray” (Outsmarting Terror,“Airport/Airplane Security”). After this incident, passengers were required to remove shoes whengoing through security. Airports have started using new technologies that use the senses of sight andsmell. Since “each plane is a potential target,” (Outsmarting Terror, “Airport/Airplane Security”)airports should make sure the security systems used are effective in detecting terrorists. This film uses recent information because events after September 9, 2001 are described.Research on x-rays and the different technologies that airports use has been done. Studies on RichardReid also had to be done in order to provide the information. I can use this film in my research paper to simply describe some of the technologies airportsuse. The additional information on Richard Reid will be helpful as well since he is talked about in“Signal Detection,” the story that has provoked me. I can also use the film to show an effect caused byan attempted terrorist attack.

×