Parsons 1Rebekah ParsonsEnglish 101Professor BoltonNovember 8, 2012                                        Annotated Bibli...
Parsons 2performs the activity. He explains that the Transportation Security Administration (TSA) personnel,airport law en...
Parsons 3“Airline security resembles swiss cheese, in that there are so many holes for terrorists to infiltrateairliners a...
Parsons 4       This eBook was published in 2004, which is eight years ago. Eight years is certainly a gap;however, the in...
Parsons 5use. The additional information on Richard Reid will be helpful as well since he is talked about in“Signal Detect...
Upcoming SlideShare
Loading in …5

Annotated bib


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Annotated bib

  1. 1. Parsons 1Rebekah ParsonsEnglish 101Professor BoltonNovember 8, 2012 Annotated Bibliography I was shocked after reading “Signal Detection,” by Steven Casey. The text tells the story ofRichard Reid, who managed to get through airport security with a bomb in his shoe. Luckily, the flightattendants and passengers on board were able to stop him and landed safely. I began to wonder whatcould have been done to prevent Richard Reid from boarding that plane. Before September 9, 2001, terrorism did not present a major threat to air travelers. Since thenthough, airport security systems have been a major deal. However, if other terrorists, Richard Reidbeing only one example, can still manage to get through security and onto an airplane, then somethinghas to be done. Airport security systems need to be improved in order to keep people safe.Suggestions to better the security networks have been made: install new technologies, or follow newprocedures. Some airports have listened to these suggestions and upgraded their security. Airportsecurity systems should always be changing in order to keep up with the new technologies andequipment being produced. Also, altering and updating the security systems will keep terrorists ontheir toes, and hopefully catch them before any harm can be done. Although airport security is such ahassle to go through, one should keep in mind the importance of it. Ultimately, what is at stake here isthe future of our country.Hawley, Kip. “The Gaps in Airport Security.” Los Angeles Time (2011): n.pag. SIRS Issues Researcher. Web. 04 November 2012.Hawley describes how in the United States, security responsibility is divided according to who
  2. 2. Parsons 2performs the activity. He explains that the Transportation Security Administration (TSA) personnel,airport law enforcement officers,and vendors all perform different tasks, and when there is a “systemicfailure,” (Hawley, par. 1) each claim they did their part. Also, TSA publishes the requirements for eachgroup, causing three things to happen: “vulnerability is embedded where those measures are weak; theminimum required becomes the maximum undertaken by the security players; and the regulated partyfeels protected from blame because it did what was required” (Hawley, par. 3). Hawley proposes threeways to improve the security. He says that several layers of security are needed throughout the airportthat are frequently changing and appear random. Additionally, everyone must share responsibility forsecurity outcomes, and lastly, assessments of risk-management resources. This article was published in 2011, just a year ago. Hawley is aware of the procedures ofairport security and how it works. He has also spent time researching information about TSA and hasstudied different ways to improve airport security. Since my research paper is on the flaws of airport security, this source will help provideinformation. This article gives an instance where the security can be improved and offersrecommendations to better the system. I can use the instance and recommendations given as examples.Holbrook, Emily. “Airport Security: Privacy vs. Safety.” Risk Management 57.2 (2010): n.pag. Academic OneFile. Web. 04 November 2012.In this article, Holbrook talks about the security systems of airports after September 11, 2001. Shestarts off by giving examples of other attempted terrorist attacks. Since 9/11, some procedures havebeen modified and put in place in order to catch terrorists, but these have also brought about criticism.Full-body scanners and backscatter x-rays, according to Holbrook, are the most controversial; peopleargue that these violate personal privacy and could cause health problems. Some people believe theaviation security networks are dangerously flawed. William Daly, a former FBI investigator, said,
  3. 3. Parsons 3“Airline security resembles swiss cheese, in that there are so many holes for terrorists to infiltrateairliners and airports” (qtd. in Holbrook par. 10). Others think it is a good idea to prepare and teach thepassengers how to handle dangerous situations. Since the article was published in 2010, two years ago, the information is current. Holbrook hasresearched the different terrorist attacks and the Obama administrations response to the most recentattack. She has studied what others have said about this subject as well. This article will help support my thesis that airport security systems have flaws. It also providesa way in which security can by improved, by informing passengers. I can use this article for acounterargument too. The criticism of privacy and concern about health effects from the securitysystems could be a reason not to use the updated procedures.Opportunities to Improve Airport Passenger Screening with Mass Spectrometry. Washington, D.C.: National Academies Press, 2004. eBook Collection (EBSCOhost). Web. 06 November 2012.The book, Opportunities to Improve Airport Passenger Screening with Mass Spectrometry, describesdifferent technologies designed for screening baggage and passengers in order to “protect the travelingpublic from attacks on the commercial aviation system involving explosives” (1).One of the technologies talked about is explosive detection systems (EDSs), which is designed to detectobjects with dimensions and densities similar to explosive materials. Explosive trace detectors (ETDs),on the other hand, are used to detect vapor or particles of explosive materials. Most of the materialused to make bombs is “very sticky, and once a finger has been in contact with the explosive, it iscapable of leaving many subsequent fingerprints (on briefcases, clothes, boarding passes, etc.) withdetectable amounts of material” (Opportunities to Improve Airport Passenger Screening with MassSpectrometry 1). Since the materials made to make bombs can be left behind, ETDs are effective indetecting the traces of explosives.
  4. 4. Parsons 4 This eBook was published in 2004, which is eight years ago. Eight years is certainly a gap;however, the information will be effective in describing the technology used in airport security soonafter September 9, 2001. This source is also credible because it has been published into theEBSCOhost database. The information in this source will be helpful when describing the different technologiesairports use to detect explosives. I can also use this information to explain how these differenttechnologies work.Outsmarting Terror. “Airport/Airplane Security.” Films Media Group, 2006. Films on Demand. Web. 04 November 2012 < url= aid=3503&xtid=40808&loid=90555>This film discusses some of the different technologies airports use. Until recently, x-rays were the mostcommon and main technology used in airports. However, x-rays are not enough in the modern war onterror. X-rays cannot detect plastic, a common ingredient in explosives, or tell the difference between abar of chocolate and TNT. The film also talks about Richard Reid, the shoe bomber. The explosives inhis show were “impossible to see on x-ray” (Outsmarting Terror, “Airport/Airplane Security”). Afterthis incident, passengers were required to remove shoes when going through security. Airports havestarted using new technologies that use the senses of sight and smell. Since “each plane is a potentialtarget,” (Outsmarting Terror, “Airport/Airplane Security”) airports should make sure the securitysystems used are effective in detecting terrorists. This film uses recent information because events after September 9, 2001 are described.Research on x-rays and the different technologies that airports use has been done. Studies on RichardReid also had to be done in order to provide the information. I can use this film in my research paper to simply describe some of the technologies airports
  5. 5. Parsons 5use. The additional information on Richard Reid will be helpful as well since he is talked about in“Signal Detection,” the story that has provoked me. I can also use the film to show an effect caused byan attempted terrorist attack.Fultz, Keith O. Opposing Viewpoints: Terrorism. San Diego: Greenhaven Press, Inc., 2000. 148-155. Print. Opposing Viewpoints Series.In this source, different technologies and procedures are talked about that can improve the security atairports. These systems include the computer-assisted passenger screening (CAPS) system, explosivesdetection technologies, and matching checked bags to the passengers. Another topic discussed in thebook is how the Federal Aviation Administration (FAA) should assess vulnerability. One way is astandardized model developed by the FAA for conducting airport vulnerability assessments. Second, isfor the FAA and the FBI to assess threats and vulnerabilities at high-risk airports together. Lastly,airports should conduct periodic vulnerability assessments. Another method that can help improveairport security is having well trained employees: Improving the training and testing of people hired by these companies to screen passengers baggage at airport security checkpoints would also improve aviation security. Regardless of advances in technology, the people who operate the equipment are the last and best line of defense against the introduction of any dangerous object into the aviation system. (Fultz 154)The fact that the book is published and on the shelves at public libraries means it is credible andtrustworthy. The book was published in 2000 so the information is not very current, but I will use thisinformation to describe airport security before September 9, 2001. This information will be helpful in describing airport security before September 9, 2001 andhow it has changed. I can also use the information to examine the attitudes toward airline security atthat time.