This document is a senior project that analyzes the security procedures of the Transportation Security Administration (TSA) following its creation after 9/11. It uses a case study approach to examine the TSA's main security operations for passenger screening, luggage screening, and special security measures. The study finds that the TSA is effectively screening passengers and luggage for dangerous persons and materials. It recommends that the TSA continue to utilize technology to upgrade screening procedures and maintain close relationships with other government agencies to stay informed about terrorism trends.
Chicago Sun Times Soft Spot In Aircraft Securitypfarina
Chicago Sun Times article "Soft Spot in Aircraft Security" featuring Philip Farina, CPP - Travel Security Expert of Farina and Associates, Ltd.
This personal statement discusses the writer's view of the nursing profession and why they want to pursue it. The writer sees nursing as a respectful profession that can be challenging but also fulfilling and rewarding when patients get well. They believe the key qualities for nursing are being empathetic, a good listener, eager to learn new things and improve, and understanding patients' needs without bias. The writer has faith that they possess these qualities and are well-suited for nursing.
The Joint Task Force for the 2010 National Scout Jamboree (JTF-NSJ) established a fusion cell to collect and analyze threat information from various sources and share it with task force partners. The fusion cell integrated intelligence from the Department of Homeland Security, FBI, Virginia Fusion Center, and other agencies. It also directly liaised with the supported non-government organization, the Boy Scouts of America, to share analyzed unclassified information through threat advisories and other means. This unprecedented level of information sharing across agencies helped ensure a safe and secure event for the 35,000 Boy Scouts in attendance at Fort AP Hill.
This annotated bibliography summarizes 7 sources that discuss airport security systems and technologies. The sources describe the security systems in place before and after September 11, 2001, flaws and criticisms of current systems, and recommendations for improving security, such as using new screening technologies, better training employees, and informing passengers. The sources range from 2000 to 2012 and include articles, a book, a film, and an eBook, providing both historical and current perspectives on airport security.
Un sistema operativo de tiempo real (SOTR) es un sistema operativo diseñado para aplicaciones que requieren respuestas en tiempo determinado. Un SOTR garantiza respuestas dentro de ciertos límites de tiempo y se caracteriza por requisitos de determinismo, sensibilidad, control del usuario, fiabilidad y tolerancia a fallos. Un ejemplo temprano fue el programa de control desarrollado por IBM y American Airlines para el sistema de reservas Sabre.
Este documento describe el uso de internet y las tecnologías de la información y la comunicación (TIC) en la educación. Explica que las TIC han permitido que los usuarios tengan un papel más activo en la selección y ritmo de la información. También destaca algunas ventajas y desventajas del uso de internet en la educación, e identifica ejemplos como las páginas web diseñadas con un enfoque instruccional, las clases a distancia mediante videoconferencias, y los recursos educativos virtuales.
Science Academy is an exciting five-day summer camp that equips students interested in science careers. The camp provides numerous hands-on activities in a university laboratory from a variety of scientific disciplines (molecular biology, human physiology, exercise science & forensic science), visits to numerous local science-related businesses (Rutherford Regional Hospital, Cohesion Phenomics DNA lab and the Rutherford County Sheriff's Forensics Department) as well as interactions with various university departments (nursing, exercise science, university police, & college admissions). Students interested in pursuing a degree or career in science are encouraged to apply to this camp.
Chicago Sun Times Soft Spot In Aircraft Securitypfarina
Chicago Sun Times article "Soft Spot in Aircraft Security" featuring Philip Farina, CPP - Travel Security Expert of Farina and Associates, Ltd.
This personal statement discusses the writer's view of the nursing profession and why they want to pursue it. The writer sees nursing as a respectful profession that can be challenging but also fulfilling and rewarding when patients get well. They believe the key qualities for nursing are being empathetic, a good listener, eager to learn new things and improve, and understanding patients' needs without bias. The writer has faith that they possess these qualities and are well-suited for nursing.
The Joint Task Force for the 2010 National Scout Jamboree (JTF-NSJ) established a fusion cell to collect and analyze threat information from various sources and share it with task force partners. The fusion cell integrated intelligence from the Department of Homeland Security, FBI, Virginia Fusion Center, and other agencies. It also directly liaised with the supported non-government organization, the Boy Scouts of America, to share analyzed unclassified information through threat advisories and other means. This unprecedented level of information sharing across agencies helped ensure a safe and secure event for the 35,000 Boy Scouts in attendance at Fort AP Hill.
This annotated bibliography summarizes 7 sources that discuss airport security systems and technologies. The sources describe the security systems in place before and after September 11, 2001, flaws and criticisms of current systems, and recommendations for improving security, such as using new screening technologies, better training employees, and informing passengers. The sources range from 2000 to 2012 and include articles, a book, a film, and an eBook, providing both historical and current perspectives on airport security.
Un sistema operativo de tiempo real (SOTR) es un sistema operativo diseñado para aplicaciones que requieren respuestas en tiempo determinado. Un SOTR garantiza respuestas dentro de ciertos límites de tiempo y se caracteriza por requisitos de determinismo, sensibilidad, control del usuario, fiabilidad y tolerancia a fallos. Un ejemplo temprano fue el programa de control desarrollado por IBM y American Airlines para el sistema de reservas Sabre.
Este documento describe el uso de internet y las tecnologías de la información y la comunicación (TIC) en la educación. Explica que las TIC han permitido que los usuarios tengan un papel más activo en la selección y ritmo de la información. También destaca algunas ventajas y desventajas del uso de internet en la educación, e identifica ejemplos como las páginas web diseñadas con un enfoque instruccional, las clases a distancia mediante videoconferencias, y los recursos educativos virtuales.
Science Academy is an exciting five-day summer camp that equips students interested in science careers. The camp provides numerous hands-on activities in a university laboratory from a variety of scientific disciplines (molecular biology, human physiology, exercise science & forensic science), visits to numerous local science-related businesses (Rutherford Regional Hospital, Cohesion Phenomics DNA lab and the Rutherford County Sheriff's Forensics Department) as well as interactions with various university departments (nursing, exercise science, university police, & college admissions). Students interested in pursuing a degree or career in science are encouraged to apply to this camp.
The Three Tier Model is Mississippi's approach to ensuring all students receive appropriate instruction to succeed. It consists of three tiers of increasingly intensive instruction and intervention. Tier 1 is core classroom instruction. Students performing below grade level receive supplemental Tier 2 interventions in small groups 2-3 times per week, with progress closely monitored. Those still struggling receive even more intensive Tier 3 interventions tailored to individual needs. The model aims to provide struggling students extra support through universal screening, interventions, and progress monitoring to help all children learn.
The document discusses issues with the Transportation Security Administration (TSA). It argues that TSA screenings are time-consuming, invasive through pat downs and body scans, and often ineffective at providing security. While security precautions are necessary, the current system should be upgraded to actually improve security while respecting individuals' rights and dignity. The document provides examples of how TSA screenings have made people feel vulnerable, degraded people's civil liberties, and disproportionately targeted some racial groups. It also questions the effectiveness of TSA measures given reports that screeners sometimes fail to detect hidden weapons. Overall, the document is critical of TSA practices and calls for reforms to the airport security system in the U.S.
Jerica Knox wrote a paper arguing that airport security in the United States has not improved enough since 9/11 and that further improvements are needed. While some security measures have been implemented, such as increased screening procedures and the creation of the Transportation Security Administration (TSA), terrorists continue to innovate new methods to bypass security. Knox proposes giving TSA agents more flexibility in screening and restructuring the Department of Homeland Security to better coordinate security efforts. Overall, Knox believes that both government agencies and citizens must work together to continuously strengthen airport security measures to protect innocent lives.
Jerica Knox wrote a paper arguing that airport security in the United States has not improved enough since 9/11 and that further improvements are needed. While some security measures have been implemented, such as increased screening procedures and the creation of the Transportation Security Administration, terrorists continue to find ways to bypass security. The Department of Homeland Security also needs restructuring to better organize security efforts and share information. The paper concludes that both government agencies and citizens must work together to continuously strengthen airport security measures in order to safeguard innocent lives.
The document discusses problems with airport security as identified by several incidents where screeners failed to detect weapons and explosives in tests. It notes a case where a woman boarded a plane without a ticket and a Somali war criminal worked as an airport security guard. The document argues that the Transportation Security Administration (TSA) is an ineffective bureaucratic agency that is lucky another terrorist attack has not occurred. It states that the paper will illustrate issues with the TSA and provide suggestions to improve airport security.
Hello dr. aguiar and classmates,for this week’s forum we were assimba35
The document discusses three potential capstone project topics related to security management. Topic 1 examines the positive and negative effects of implementing Crime Prevention Through Environmental Design (CPTED) at public schools. Topic 2 focuses on the essential need for U.S. maritime port security and the importance of compatibility between private and government security functions. Topic 3 addresses the required need for adequate training of private security professionals and how integrated training with law enforcement could advance security.
The document provides details from a court case involving Debra McCann and her children being accused of shoplifting at a Walmart store. Two Walmart employees blocked the McCann's exit from the store and told them one of the children had stolen before and was not allowed in the store. McCann was awarded $20,000 for false imprisonment under Maine law. The United States Court of Appeals upheld the ruling, rejecting Walmart's appeals that false imprisonment was not proven and jury instructions were incorrect.
Course Objective - Assess the importance of Port Management .docxvanesaburnand
Course Objective - Assess the importance of Port Management Security.
Instructions: Your initial post should be at least 350 words.
Lesson
Port Facility Operations
“The terrorist threat in the early twenty-first century is testing the basic political values and structures of democracy, and in particular, criminal justice roles and processes in controlling deviance in society. Terrorism and the emergence of homeland security are changing the character of local policing, not only in the United States, but around the world”…Kenneth Christopher, Port Security Management
Port facility security is not the sole responsibility of only one entity. It is the responsibility of many including international, national, state and local organizations including the private sector (Christopher, 2015).
The port authorities often do not have direct control over the following:
· Customs and border protection
· Police, fire, and emergency medical services
· Immigration and agriculture agencies
· Coast Guard and harbor authorities
· Transportation and utility regulating bodies
· Employer groups, stevedores, and labor unions
· Cargo terminal operators
· Passenger cruise and ferry lines
· Vendors, suppliers, and customers
Collaborations between Port Security and Enforcement Operations
This week the focus will be on the security management aspects of port facility operations. As we learned in week six, the security and safety at U.S. ports is no doubt a shared responsibility to ensure that port authorities develop and apply an operational approach that includes various resources, processes, and systems to establish an interconnected port security program. Intra and interagency cooperation is essential to effectively coordinate security efforts between different stake holders conducting port activities. It is important to understand that port facility security is not the sole responsibility of only one entity. It is the responsibility of many including international, national, state and local organizations including the private sector (Christopher, 2015, p. 268).
The changing landscape of criminal activity has forced a change in policing. Since 9/11, police forces are relied upon, more often than not, to conduct terrorism training, CBRN/WMD training, intelligence gathering (to some extent) and information sharing; along with traditional police roles of crime prevention and follow-on prosecution, public security and assistance. As with every aspect of our society, this change has encompassed our port security systems as well. Law enforcement agencies are expected (and needed) to work with port authorities “to integrate the appropriate level of law enforcement service into the Port FSP and security regimen” (Christopher). Developing mutual Memorandums of Understanding (MOU) and/or Memorandums of Agreement (MOA) will help to define each entities' roles, responsibilities and organizational hierarchy.
When we take a closer look, we soon realize that collaboration.
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docxSUBHI7
Running head: A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION 1
A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION 2
A Case Study of the TSA’s Resource Allocation
Rachel S. Pyeatt
HMLS 302 Fall 2012 OL1
Rebecca Himes
September 23, 2012
A Case Study of the TSA’s Resource Allocation
Beyond the immediate death and destruction resulting from the 9/11 attacks, the fact that America’s own technology and equipment was instrumental in the execution thereof resonated so profoundly with private citizens and policymakers alike that drastic security measures were rapidly enacted on a national scale. The Transportation Security Administration (TSA) was one of the high-profile reactionary implementations to prevent future attacks. Over a decade later, the efficiency and utility of the TSA has been criticized by government officials, the press, and even security experts. An evaluation of the TSA’s established protocols in maintaining aviation security suggests the possibility that streamlining the system could simultaneously be more cost and time effective while achieving the desired results of preventing and mitigating terrorist attacks.
The Transportation Security Administration
Although the TSA oversees security for an excess of “9 billion passenger trips per year on the nation’s mass transit systems, more than 161,000 miles of interstate and national highways and their integrated bridges and tunnels, and nearly 800,000 shipments of hazardous materials” (Bullock, Haddow, and Coppola, 2013, p. 250), it is associated by the American public primarily with its role in airport security, particularly passenger screenings. Approximately 50,000 Transportation Security Officers (TSOs) are responsible for screening over two million passengers on a daily basis at more than 700 security checkpoints within 450 airports nationwide (Bullock et al. 2013). By the sheer nature of their duties, to establish and maintain security across all modes of transportation within the United States, the jurisdiction of the TSA is unparalleled by any other law enforcement agencies. Due to the nature of the 9/11 attacks, the vast majority of the organization’s resources are allocated toward aviation security. Approximately 68% of the TSA’s $8.16 billion budget is utilized to conduct inspections of both personnel and baggage intending to fly using Advanced Imaging Technology (AIT), maintain a high TSO and Behavior Detection Officer (BDO) presence within U.S. airports, monitor no-fly and watch lists, and develop innovative counterterrorism security measures (Homeland Security, 2012).
In addition to the commonly referenced inconveniences and potential indignities the TSA’s enforcement of airport security poses passengers, the organization has been the subject of criticisms from renowned security expert Bruce Schneier as well as Congress. Schneier (2012) maintained that the public mistrusts the TSA and that their ineffective procedures achieve very little in the way of securi ...
Class,During this week’s lesson, we learned about two differenVinaOconner450
Class,
During this week’s lesson, we learned about two different type of details. Covert details are designed to blend in with the surrounding environment. Vehicle selection begins with utilizing vehicles that are commonly found in the city, state, or country the principal will be traveling in. Sending out a decoy motorcade to divert attention away from the actual principal is one common tactic found within a covert detail (McGovern, 2011). The positives with utilizing this detail ensures the principal is able to move around discreetly with as little to no details made available to the adversary. Swapping vehicles multiple times is another way in which the protection team can keep the adversary in a reactive state to ensure maximum protection without broadcasting to everyone the principal is on the move. The cons to this type of detail involves the actual principal not agreeing with the vehicle choice he or she may be traveling in. Consistent threat updates and communication with the counter surveillance teams will help minimize the amount of exposure or risk to the principal. An additional area of concern for the covert detail is the strict compliance of Operational Security as we learned in the last lesson. One small detail that is leaked to the public about the principal may tip off the entire covert operation (McGovern, 2011). I would utilize a covert detail when making a visit to higher threat area. For example, when I was deployed to Afghanistan the Secretary of Defense at the time flew into the country in what seemed to be unannounced. Little did I know prior to taking this class this was called a “covert detail.” By design the secret service detail did not want anyone to know he was flying in and thus landed in the middle of the night unannounced to “most”.
An overt detail is the exact opposite. During an overt operation a lot more, details are made available outside the protection team. Public Affairs office and media teams have more situational awareness on when the principal is to arrive at least down to the day and sometimes the hour. The planned itinerary is made available to more personnel. Especially when there may be a planned speech to be given at a specific location at a specific time. I feel this makes the job of the protection team much more difficult. The counter-surveillance team has a lot more responsibility to ensure the information that is made available to the public is not used to plan a coordinated attack. The cons to this type of detail include additional manpower and resources to “lock-down” a specific area more because the public is more in tuned to what and when is exactly going to occur.
Nick
McGovern, G. (2011). Protective Operations: A Handbook for Security and Law Enforcement. Retrieved from http://web.b.ebscohost.com.ezproxy1.apus.edu/ehost/ebookviewer/ebook?sid=71c2fbb7-974b-41b6-9700-7db9e5cf88e6%40pdc-v-sessmgr01&ppid=pp_Cover&vid=0&format=EB
Hello class,
Overt and covert operati ...
This document provides an overview of several United States federal law enforcement agencies. It includes the mission statement and areas of responsibility for each agency. The agencies covered include the Coast Guard Investigative Service, United States Mint Police, Federal Air Marshal Service, United States Border Patrol, Bureau of Alcohol, Tobacco, Firearms and Explosives, Internal Revenue Service Criminal Investigation, United States Secret Service, Drug Enforcement Administration, Federal Bureau of Investigation, United States Marshals Service, United States Postal Inspection Service, United States Capitol Police, United States Park Police, Pentagon Force Protection Agency, and Defense Criminal Investigative Service. For each agency, the mission, operations, logo/badge, and website links are provided.
The document discusses the response of law enforcement to the 9/11 terrorist attacks over the past 10 years. It outlines key initiatives like the National Criminal Intelligence Sharing Plan and Nationwide Suspicious Activity Reporting Initiative that were established to improve information sharing between federal, state and local law enforcement agencies. The Criminal Intelligence Coordinating Council was also formed to advocate for state and local law enforcement needs and provide guidance on bolstering intelligence analysis and sharing capabilities.
The Effective Use of Unmanned Aerial Vehicles for Local Law EnforcementLeighton Gasque
This document discusses the potential use of unmanned aerial vehicles (UAVs) by local law enforcement. It notes that UAVs could provide useful information to police officers responding to emergency calls by giving them visuals of the situation before arriving. UAVs could survey the terrain, determine the number of people involved, and pinpoint locations more quickly than officers traveling by car. The document also reviews how UAVs have already been utilized by other government agencies like the FBI and ATF. It proposes that small, affordable UAVs kept in police cruisers could help increase officers' safety by scouting unknown situations from the air. However, it acknowledges that further research is needed to understand the costs and regulations around law
The Three Tier Model is Mississippi's approach to ensuring all students receive appropriate instruction to succeed. It consists of three tiers of increasingly intensive instruction and intervention. Tier 1 is core classroom instruction. Students performing below grade level receive supplemental Tier 2 interventions in small groups 2-3 times per week, with progress closely monitored. Those still struggling receive even more intensive Tier 3 interventions tailored to individual needs. The model aims to provide struggling students extra support through universal screening, interventions, and progress monitoring to help all children learn.
The document discusses issues with the Transportation Security Administration (TSA). It argues that TSA screenings are time-consuming, invasive through pat downs and body scans, and often ineffective at providing security. While security precautions are necessary, the current system should be upgraded to actually improve security while respecting individuals' rights and dignity. The document provides examples of how TSA screenings have made people feel vulnerable, degraded people's civil liberties, and disproportionately targeted some racial groups. It also questions the effectiveness of TSA measures given reports that screeners sometimes fail to detect hidden weapons. Overall, the document is critical of TSA practices and calls for reforms to the airport security system in the U.S.
Jerica Knox wrote a paper arguing that airport security in the United States has not improved enough since 9/11 and that further improvements are needed. While some security measures have been implemented, such as increased screening procedures and the creation of the Transportation Security Administration (TSA), terrorists continue to innovate new methods to bypass security. Knox proposes giving TSA agents more flexibility in screening and restructuring the Department of Homeland Security to better coordinate security efforts. Overall, Knox believes that both government agencies and citizens must work together to continuously strengthen airport security measures to protect innocent lives.
Jerica Knox wrote a paper arguing that airport security in the United States has not improved enough since 9/11 and that further improvements are needed. While some security measures have been implemented, such as increased screening procedures and the creation of the Transportation Security Administration, terrorists continue to find ways to bypass security. The Department of Homeland Security also needs restructuring to better organize security efforts and share information. The paper concludes that both government agencies and citizens must work together to continuously strengthen airport security measures in order to safeguard innocent lives.
The document discusses problems with airport security as identified by several incidents where screeners failed to detect weapons and explosives in tests. It notes a case where a woman boarded a plane without a ticket and a Somali war criminal worked as an airport security guard. The document argues that the Transportation Security Administration (TSA) is an ineffective bureaucratic agency that is lucky another terrorist attack has not occurred. It states that the paper will illustrate issues with the TSA and provide suggestions to improve airport security.
Hello dr. aguiar and classmates,for this week’s forum we were assimba35
The document discusses three potential capstone project topics related to security management. Topic 1 examines the positive and negative effects of implementing Crime Prevention Through Environmental Design (CPTED) at public schools. Topic 2 focuses on the essential need for U.S. maritime port security and the importance of compatibility between private and government security functions. Topic 3 addresses the required need for adequate training of private security professionals and how integrated training with law enforcement could advance security.
The document provides details from a court case involving Debra McCann and her children being accused of shoplifting at a Walmart store. Two Walmart employees blocked the McCann's exit from the store and told them one of the children had stolen before and was not allowed in the store. McCann was awarded $20,000 for false imprisonment under Maine law. The United States Court of Appeals upheld the ruling, rejecting Walmart's appeals that false imprisonment was not proven and jury instructions were incorrect.
Course Objective - Assess the importance of Port Management .docxvanesaburnand
Course Objective - Assess the importance of Port Management Security.
Instructions: Your initial post should be at least 350 words.
Lesson
Port Facility Operations
“The terrorist threat in the early twenty-first century is testing the basic political values and structures of democracy, and in particular, criminal justice roles and processes in controlling deviance in society. Terrorism and the emergence of homeland security are changing the character of local policing, not only in the United States, but around the world”…Kenneth Christopher, Port Security Management
Port facility security is not the sole responsibility of only one entity. It is the responsibility of many including international, national, state and local organizations including the private sector (Christopher, 2015).
The port authorities often do not have direct control over the following:
· Customs and border protection
· Police, fire, and emergency medical services
· Immigration and agriculture agencies
· Coast Guard and harbor authorities
· Transportation and utility regulating bodies
· Employer groups, stevedores, and labor unions
· Cargo terminal operators
· Passenger cruise and ferry lines
· Vendors, suppliers, and customers
Collaborations between Port Security and Enforcement Operations
This week the focus will be on the security management aspects of port facility operations. As we learned in week six, the security and safety at U.S. ports is no doubt a shared responsibility to ensure that port authorities develop and apply an operational approach that includes various resources, processes, and systems to establish an interconnected port security program. Intra and interagency cooperation is essential to effectively coordinate security efforts between different stake holders conducting port activities. It is important to understand that port facility security is not the sole responsibility of only one entity. It is the responsibility of many including international, national, state and local organizations including the private sector (Christopher, 2015, p. 268).
The changing landscape of criminal activity has forced a change in policing. Since 9/11, police forces are relied upon, more often than not, to conduct terrorism training, CBRN/WMD training, intelligence gathering (to some extent) and information sharing; along with traditional police roles of crime prevention and follow-on prosecution, public security and assistance. As with every aspect of our society, this change has encompassed our port security systems as well. Law enforcement agencies are expected (and needed) to work with port authorities “to integrate the appropriate level of law enforcement service into the Port FSP and security regimen” (Christopher). Developing mutual Memorandums of Understanding (MOU) and/or Memorandums of Agreement (MOA) will help to define each entities' roles, responsibilities and organizational hierarchy.
When we take a closer look, we soon realize that collaboration.
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docxSUBHI7
Running head: A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION 1
A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION 2
A Case Study of the TSA’s Resource Allocation
Rachel S. Pyeatt
HMLS 302 Fall 2012 OL1
Rebecca Himes
September 23, 2012
A Case Study of the TSA’s Resource Allocation
Beyond the immediate death and destruction resulting from the 9/11 attacks, the fact that America’s own technology and equipment was instrumental in the execution thereof resonated so profoundly with private citizens and policymakers alike that drastic security measures were rapidly enacted on a national scale. The Transportation Security Administration (TSA) was one of the high-profile reactionary implementations to prevent future attacks. Over a decade later, the efficiency and utility of the TSA has been criticized by government officials, the press, and even security experts. An evaluation of the TSA’s established protocols in maintaining aviation security suggests the possibility that streamlining the system could simultaneously be more cost and time effective while achieving the desired results of preventing and mitigating terrorist attacks.
The Transportation Security Administration
Although the TSA oversees security for an excess of “9 billion passenger trips per year on the nation’s mass transit systems, more than 161,000 miles of interstate and national highways and their integrated bridges and tunnels, and nearly 800,000 shipments of hazardous materials” (Bullock, Haddow, and Coppola, 2013, p. 250), it is associated by the American public primarily with its role in airport security, particularly passenger screenings. Approximately 50,000 Transportation Security Officers (TSOs) are responsible for screening over two million passengers on a daily basis at more than 700 security checkpoints within 450 airports nationwide (Bullock et al. 2013). By the sheer nature of their duties, to establish and maintain security across all modes of transportation within the United States, the jurisdiction of the TSA is unparalleled by any other law enforcement agencies. Due to the nature of the 9/11 attacks, the vast majority of the organization’s resources are allocated toward aviation security. Approximately 68% of the TSA’s $8.16 billion budget is utilized to conduct inspections of both personnel and baggage intending to fly using Advanced Imaging Technology (AIT), maintain a high TSO and Behavior Detection Officer (BDO) presence within U.S. airports, monitor no-fly and watch lists, and develop innovative counterterrorism security measures (Homeland Security, 2012).
In addition to the commonly referenced inconveniences and potential indignities the TSA’s enforcement of airport security poses passengers, the organization has been the subject of criticisms from renowned security expert Bruce Schneier as well as Congress. Schneier (2012) maintained that the public mistrusts the TSA and that their ineffective procedures achieve very little in the way of securi ...
Class,During this week’s lesson, we learned about two differenVinaOconner450
Class,
During this week’s lesson, we learned about two different type of details. Covert details are designed to blend in with the surrounding environment. Vehicle selection begins with utilizing vehicles that are commonly found in the city, state, or country the principal will be traveling in. Sending out a decoy motorcade to divert attention away from the actual principal is one common tactic found within a covert detail (McGovern, 2011). The positives with utilizing this detail ensures the principal is able to move around discreetly with as little to no details made available to the adversary. Swapping vehicles multiple times is another way in which the protection team can keep the adversary in a reactive state to ensure maximum protection without broadcasting to everyone the principal is on the move. The cons to this type of detail involves the actual principal not agreeing with the vehicle choice he or she may be traveling in. Consistent threat updates and communication with the counter surveillance teams will help minimize the amount of exposure or risk to the principal. An additional area of concern for the covert detail is the strict compliance of Operational Security as we learned in the last lesson. One small detail that is leaked to the public about the principal may tip off the entire covert operation (McGovern, 2011). I would utilize a covert detail when making a visit to higher threat area. For example, when I was deployed to Afghanistan the Secretary of Defense at the time flew into the country in what seemed to be unannounced. Little did I know prior to taking this class this was called a “covert detail.” By design the secret service detail did not want anyone to know he was flying in and thus landed in the middle of the night unannounced to “most”.
An overt detail is the exact opposite. During an overt operation a lot more, details are made available outside the protection team. Public Affairs office and media teams have more situational awareness on when the principal is to arrive at least down to the day and sometimes the hour. The planned itinerary is made available to more personnel. Especially when there may be a planned speech to be given at a specific location at a specific time. I feel this makes the job of the protection team much more difficult. The counter-surveillance team has a lot more responsibility to ensure the information that is made available to the public is not used to plan a coordinated attack. The cons to this type of detail include additional manpower and resources to “lock-down” a specific area more because the public is more in tuned to what and when is exactly going to occur.
Nick
McGovern, G. (2011). Protective Operations: A Handbook for Security and Law Enforcement. Retrieved from http://web.b.ebscohost.com.ezproxy1.apus.edu/ehost/ebookviewer/ebook?sid=71c2fbb7-974b-41b6-9700-7db9e5cf88e6%40pdc-v-sessmgr01&ppid=pp_Cover&vid=0&format=EB
Hello class,
Overt and covert operati ...
This document provides an overview of several United States federal law enforcement agencies. It includes the mission statement and areas of responsibility for each agency. The agencies covered include the Coast Guard Investigative Service, United States Mint Police, Federal Air Marshal Service, United States Border Patrol, Bureau of Alcohol, Tobacco, Firearms and Explosives, Internal Revenue Service Criminal Investigation, United States Secret Service, Drug Enforcement Administration, Federal Bureau of Investigation, United States Marshals Service, United States Postal Inspection Service, United States Capitol Police, United States Park Police, Pentagon Force Protection Agency, and Defense Criminal Investigative Service. For each agency, the mission, operations, logo/badge, and website links are provided.
The document discusses the response of law enforcement to the 9/11 terrorist attacks over the past 10 years. It outlines key initiatives like the National Criminal Intelligence Sharing Plan and Nationwide Suspicious Activity Reporting Initiative that were established to improve information sharing between federal, state and local law enforcement agencies. The Criminal Intelligence Coordinating Council was also formed to advocate for state and local law enforcement needs and provide guidance on bolstering intelligence analysis and sharing capabilities.
The Effective Use of Unmanned Aerial Vehicles for Local Law EnforcementLeighton Gasque
This document discusses the potential use of unmanned aerial vehicles (UAVs) by local law enforcement. It notes that UAVs could provide useful information to police officers responding to emergency calls by giving them visuals of the situation before arriving. UAVs could survey the terrain, determine the number of people involved, and pinpoint locations more quickly than officers traveling by car. The document also reviews how UAVs have already been utilized by other government agencies like the FBI and ATF. It proposes that small, affordable UAVs kept in police cruisers could help increase officers' safety by scouting unknown situations from the air. However, it acknowledges that further research is needed to understand the costs and regulations around law
2. ii
ABSTRACT
PLEASE REMOVE YOUR SHOES: A CASE STUDY ON THE SECURITY
PROCEDURES OF THE TRANSPORTATION SECURITY ADMINISTRATION
SERALYN FIELDS
DECEMEBER 2016
September 11, 2001 was a life changing day for all Americas. It impacted the way
many Americans act and think. To react with the changing world, the Travel Security
Administration was created. The purpose of this study was to analyze the security
regulations implemented by the Transportation Security Administration (TSA).
The researcher used a case study outline to gather information regarding the main
security procedures. The study found that the TSA is doing an effective job at properly
screening both passengers and luggage for dangerous persons and materials. The TSA
should keep in close relations with other government agencies to learn more about
terrorism behaviors, while continuing to use technology to upgrade screening procedures.
Keywords: security, airports, travel, terrorism, 9/11
3. iii
TABLE OF CONTENTS
PAGE
ABSTRACT........................................................................................................................ ii
TABLE OF CONTENTS...................................................................................................iii
Chapter 1 INTRODUCTION AND REVIEW OF LITERATURE.................................... 1
Background of Study ...................................................................................................... 1
Review of Literature....................................................................................................... 2
Purpose of the Study....................................................................................................... 7
Research Questions......................................................................................................... 8
Chapter 2 METHODS......................................................................................................... 9
Description of Organization............................................................................................ 9
Description of Instrument............................................................................................... 9
Description of Procedures............................................................................................. 10
Chapter 3 PRESENTATION OF THE RESULTS........................................................... 11
Passenger Screening Operations................................................................................... 11
Luggage Screening Operations..................................................................................... 13
Specialty Security Operations....................................................................................... 13
Reported Incidents........................................................................................................ 14
Chapter 4 DISCUSSION AND CONCLUSIONS............................................................ 16
Discussion..................................................................................................................... 16
Conclusions................................................................................................................... 18
Recommendations......................................................................................................... 19
REFERENCES ................................................................................................................. 20
5. 1
Chapter 1
INTRODUCTION AND REVIEW OF LITERATURE
Background of Study
Security is critical to the travel and tourism industry. With the industry being
worth around 7 trillion dollars a year, it is imperative for worldwide economic prosperity
that individuals continue to spend money on these experiences (World Travel and
Tourism Commission, 2016). In order for tourism to attract travelers, the traveler must
feel that their safety and freedom is protected. Because of this, most major airports have
extensive security screening processes before passengers are allowed to board their
flights.
Terrorists have been targeting planes for attacks since long before before
September 11, 2001. Flintoff (2012) reports that terrorists are attracted to planes as
targets for attacks because it does not require them to ever reach the target country. They
can launch the attack from the air and avoid further difficulties and obstacles that would
be presented if they did initiate the attack from the target nation’s soil. Plane attacks are
also enticing to terrorists because they are able to train for how to take down planes and
are able to practice in a simulated environment until they are familiar with the process. In
addition, planes serve as the weapon as well. The plane is essentially a flying bomb and
the passengers become guaranteed victims.
National airports have implemented intense screening processes to help protect
their citizens from attack. Most Americans can remember exactly where they were when
they learned about the September 11 attacks, which killed thousands of Americans and
6. 2
brought down the Twin Towers in New York City. This attack brought terrorism into the
spot light and increased fears regarding traveling and airport security.
After September 11, the government took measures to increase airport passenger
and baggage security in an attempt to regain the publics trust and decrease the number of
possible breaches that could occur within the system. The purpose of this study was to
analyze the security regulations implemented by the Transportation Security
Administration (TSA).
Review of Literature
Research for this review of literature was conducted at Robert E. Kennedy
Library on the campus of California Polytechnic State University, San Luis Obispo. In
addition to books and other resources, the following online databases were utilized:
Hospitality and Tourism Complete, Academic Search Premier, Statista, Google Scholar
and Academic Search Premier. This review of literature is organized into the following
topic areas: security, security in the travel and tourism industry, how the travel and
tourism industry was affected by the events that occurred on September 11, 2001.
Security is something that historically most people have taken for granted on a
daily basis. They rely on agencies like police, private hired security, body guards and
even other people to keep them safe. These agencies can do their best, but one can still be
left in harm’s way if something were to be overlooked. As the world becomes more and
more dangerous to everyday citizens, there is an increased concern to implement ample
security in most public places for protection.
7. 3
Most governments take citizen security seriously and have national and federal
police forces. This force increases in areas that are larger or that have a particularly at
risk population. In 2013, the United States spent $862 per capita in the District of
Columbia, the most compared to all other 50 states (US Census Bureau, n.d.). Reaves
(2015) reports that in 2013, 81% of local police officers were authorized to use energy
weapons, like tasers. He also reports that about a third of departments used body-worn
cameras to capture incidents while on the job. Not only are there police forces at the local
and state level, but there are federal entities designed to help keep the nation safe from
serious crimes and persons. This includes the Federal Bureau of Investigation and the
Central Intelligence Agency.
However, the monetary amount spent on local police forces is nothing compared
to the over $850 billion dollars that the US has spent on the war in Iraq (Sharp, 2008).
Not only is the military responsible for protecting US citizen’s freedom abroad, but the
Department of Homeland Security has also increased their responsibility for domestic
security (Brooks, 2002). The Department of Defense (n.d.), reports that, “The department
is prepared to conduct homeland defense missions whenever the President, exercising his
constitutional authority as Commander in Chief, authorizes military actions” (para. 41).
The US military is trained to protect against bomb threats, terrorism attacks and more on
US soil, but it remains that most of their work is done abroad. The US military is broken
down into six main departments: Army, Navy, Air Force, Marine Corps, Coast Guard and
the Reserve (Department of Defense, n.d.). Each department is specially trained and
organized to best protect the people of the United States.
8. 4
Battle fields have extended far past the warzone boundaries. With the invention of
the Internet, identity theft and the ability for people to hack personal information is
increasingly easier. However, the real danger is how terrorist groups are using the
Internet to spread radical ideals. Terror groups can use the internet to recruit members
and even train them from abroad. The United States is now engaged in a constant war
against terror. It is no longer just the military who is dealing with increasing security but
is seen across all industries. One industry that has particularly had to increase security is
the travel and tourism field. This field includes hospitality, events, theme parks, national
parks, weddings, concerts, sports tourism and more. These venues are now having to deal
with an increase in their security to keep guests safe in this new era of crime. Most of
these areas and venues have their own version of a police force to help control any
dangerous situations that may arise.
Hotels are one of the biggest components of the tourism industry. Hotels became
a target for terrorists after the September 11 attacks with a series of attacks targeting the
JW Marriott Hotel in South Jakarta, the Taba Hilton in Egypt, and the Islamabad Marriot
and Mumbai Oberoi Hotels in the early 2000’s (Miller, 2004; “Marriot,” 2008). Because
of this, hotels have to keep a close eye on guests and any possible hazard that may arise.
Hotel goers reported that security is one of the most influential factors in choosing a hotel
along with location, service and friendliness of staff (Knutson, 1988). Safety involves not
only preventing guests from injury but also protecting employees and property. Many
hotel companies have used electronic locks, fire sprinklers, smoke detectors and closed
circuit televisions to help reduce risk and injury (Okumus, 2005). The main focus of hotel
security is to prevent unauthorized entries onto the property. Hotels have utilized
9. 5
technology to help them monitor these concerns. Middle eastern hotels have not only
started using the above techniques, but have also started using X-ray machines to screen
guests for dangerous goods or bombs (“Country,” 2005). Many hotels have increased
their security budgets to invest in these kinds of heavy-duty equipment for their reception
areas, bomb sniffing dogs, full time security and improved staff training (Howie, 2005).
Along with hotels, major attractions or events also require security screening
(“Why we,” 2015). Through the years, security at parks, stadiums and movie theaters
have increased to due to the overall rise in soft target attacks. In 2015, Major League
Baseball required all stadiums to have metal detection security. This follows the
requirement by the National Football League in 2013, to require all bags taken into the
stadium to be clear and National Amusements cinemas to ban any backpacks or luggage
from entering the theater.
Security while traveling is imperative in supporting the $7.6 billion travel and
tourism industry (World Travel and Tourism Commission, 2016). The United Nations
World Tourism Organization (2014) reported over 1.1 billion tourists traveled
internationally. This led to over 33 million flights performed by the global airline
industry in 2014 (International Air Transport Association, 2016). If passengers do not
feel that their safety is being prioritized while traveling, they may become less likely to
travel, resulting in an overall decline in the industry that would have worldwide effects.
Bonham, Edmonds and Mak (2006) show how important safety is to the travel and
tourism industry:
When people travel, they do not want to be exposed to personal hazards, so safety
is a paramount concern of most travelers. Not surprisingly, terrorist incidents and
10. 6
other threats to personal safety—whether they are natural disasters or deadly
contagious diseases—reduce people’s propensity to travel. Alternatively, some
people may opt to change their travel plans and visit destinations where they are
exposed to less personal risk. (p. 1)
While security is on the mind of many travelers, it is often assumed that there is someone
looking out for them. When security is breached, for example on September 11, citizens
often become timid to travel again.
September 11 was one of the most devastating and shocking events the world has
ever seen. The aftermath of the attacks on the World Trade Center in New York was felt
around the world. As the world reacted to the horror, they became vigilant about
protecting themselves against any danger or harm that could arise. This caused an overall
decrease in international travel. The World Bank (2005), reports that after September 11
the number of foreign trips saw an immediate and continuous decline. Their reports
included that there were over 60 million trips in 2000 compared to just 54 million trips in
2003. Bonham et al. (2006) reported that the United States saw a large increase in those
who preferred vacationing domestically after September 11. This caused an increase in
the number of US citizens traveling to Hawaii and had an overall positive effect on the
US tourism industry, despite the overall global impact being negative.
Not only was the airline industry affected, but the hospitality industry also saw
decline. Goodrich (2012) reports that hotel industries in major tourist destinations
suffered significantly low occupancy rates due to cancelations of domestic and
international flights. There was an overall decline of around 20-50% with an overall
monetary loss of over $2 billion. Hotels had to start providing incentives to attract further
11. 7
demand so that they would not lose more money. Goodrich also reports that hotels were
not the only industry that suffered. Casinos in Las Vegas, Nevada reported up to 50%
decreases in attendance, and guests reported feeling fearful to fly in from other states to
see the entertainment shows. Goodrich states that sport tourism also suffered major
losses:
Security concerns caused the postponement of all 14 National Football League
(NFL) games in America on Sunday, September 16, 2001. Each of these 14
football stadiums holds 60,000 to 75,000 attendees (sports fans). Each attendee
spends an average of $50 for admission, $25 for food, $10 for parking, and $15
for miscellaneous items, (e.g., American flags, T-shirts), for a total of about $100
per person or about $6 million to $7,5 million revenue loss per stadium for that
one Sunday, September 16, 2001, or a grand total of about $84 million to $105
million in lost revenue for the 14 stadiums on the Sunday after the attack. (p. 576)
Each sector of the industry was affected deeply and suffered monetary losses. It is
imperative that all sectors of the industry are providing enough security so that guests and
participants feel confident enough to engage with their company.
Purpose of the Study
The purpose of this study was to analyze the security regulations implemented by
the Transportation Security Administration (TSA).
12. 8
Research Questions
This study attempted to answer the following research questions:
1. What are the Transportation Security Administrations passenger screening
techniques?
2. What are the Transportation Security Administrations baggage screening
techniques?
3. Are the passenger screening procedures of the Transportation Security
Administration effective at stopping dangerous persons from boarding?
13. 9
Chapter 2
METHODS
The purpose of this study was to analyze the security regulations implemented by
the Transportation Security Administration (TSA). This chapter includes the following
sections: description of organization, description of instrument, and description of
procedures.
Description of Organization
A case study was done of the Transportation Security Administration which
operates within the United States. The Transportation Security Administration (2016)
was created on November 19th
, 2001 following the attacks of September 11. The
Transportation Security Administration was established under the Aviation and
Transportation Security act passed by the 107th
Congress. The organization’s mission is
to protect the nation’s transportation systems to ensure freedom of movement for people
and commerce. The Transportation Security Administration employs over 44,000
transportation security officers and are responsible for the security of nearly 440
federalized airports. The Transportation Security Administration is responsible for the
security of both cargo planes and passenger flights.
Description of Instrument
The instrument utilized in the study was an outline developed by the researcher
that organizes the best practices utilized by the Travel Security Administration (see
14. 10
Appendix A). Information from the Review of Literature was used to organize the
instrument and develop ideas for further research. The instrument consists of criteria used
to evaluate the measures that the TSA took to best protect citizen’s safety while traveling
internationally and domestically.
A pilot study was completed using a similar security administration that operates
abroad. Changes were made to the outline, including adding additional numbers under the
screening section and adding future implementations into section F.
Description of Procedures
This case study was done of the Transportation Security Administration which
operates within the United States. The instrument applied in the study was an outline
developed by the researcher that organizes the best practices utilized by the Travel
Security Administration. The research for this study occurred over a two-week period in
November of 2016. Security procedures were analyzed using the TSA official website.
The researcher looked at many pages included the Frequently Asked Questions, About,
and Security Procedures pages to gain information regarding the TSA’s security
practices. The information was then filled into the instrument and additional notes were
taken. Statistics, news portals and various scholarly databases were also utilized.
Statistics websites were used to understand passengers perceived safety while flying out
of an US airport. News outlets were used to analyze any type of breach in the TSA’s
procedures since the September 11 attacks and how the TSA responded to those breaches.
Scholarly articles were utilized to identify how the TSA has changed the travel and
tourism industry and how the creation of the TSA impacted the industry as a whole.
15. 11
Chapter 3
PRESENTATION OF THE RESULTS
The purpose of this study was to analyze the security regulations implemented by
the Transportation Security Administration (TSA). A best practices approach was utilized
to examine the Transportation Security Administration. This chapter includes the
following sections: passenger screening operations, luggage screening operations,
specialty security operations, and reported incidents.
Passenger Screening Operations
There are several programs and practices that the TSA uses for passenger
screening purposes. The Transportation Security Administration uses millimeter wave
advanced imaging technology and metal detectors to screen passengers for any dangerous
or hazardous materials. These systems are able to forgo physical screenings, however in
some cases an additional physical screening may be necessary. A pat down screening can
be offered to those who are unable to walk through a metal detector due to medical
reasons or those who feel uncomfortable with the advanced imaging technology. In these
cases, a physical screening will be conducted by a TSA officer of the same sex. Pat
downs can be done in a private room, and passengers can be accompanied by a person of
their choice. Luggage can be taken with the passenger into the private screening area and
the officer will ask if there is any injury or tender area that they need to be aware of. In
these situations, the passenger will never be asked to lift or remove an article of clothing.
16. 12
The Transportation Security Administration also depends on a program called
Secure Flight. Secure Flight is a risk-based passenger prescreening program that cross
checks passengers against trusted travelers lists before the passenger even arrives to the
airport. These lists help airlines identify passengers who are both low and high risk. This
program also prevents individuals on the No Fly List and the Centers for Disease Control
and Prevention Do Not Board List from boarding an aircraft.
Passengers that are deemed low-risk can apply for the TSA Pre-Check program
which allows them to receive less strict security regulations. Passengers that are approved
for the TSA Pre-Check program are able to keep shoes, belts, and jackets along with
leaving laptops and liquids inside their carry-on luggage. In October of 2016, 97% of
TSA Pre-Check passengers waited in line for less than five minutes. As of 2016, the
TSA-Pre Check program has over three million members and operates in 180+ airports
nationwide. Passengers who would like to apply for the TSA Pre-Check program are
required to complete an online application and schedule an appointment at a registered
enrollment center. A 10 minute in person interview is conducted along with a background
check and fingerprinting. The applicant will receive written notification within three
weeks of the interview of their acceptance.
All travelers over the age of 18 are preferred to have valid identification to be
permitted past the security screening area. These forms of identification include US
drivers license, US passport, US military ID, and other approved documentation. If a
passenger arrives to the airport without a valid form of identification, the TSA officer
will ask them to complete a form to confirm their identity. If the passenger’s identity
cannot be confirmed, they will not be permitted to board the aircraft.
17. 13
Luggage Screening Operations
The Transportation Security Administration also inspects all carry-on and
checked luggage. There are strict rules and regulations regarding what can and cannot be
taken onto the aircraft. Over 50 items are prohibited in carry-on luggage by the TSA
including liquids over 3.4 ounces, spray paint, knives, baseball bats, and self defense
sprays. Passengers are required to remove all liquids and laptops from their carry-on bag
before placing their bag through the safety checkpoint screening area. These items will be
placed in a bin individually and pushed through the detector for screening. If there is
something that indicates further inspection, all carry-on luggage can be personally
inspected by a TSA officer. The Transportation Security Administration inspects 1.1
million checked bags for dangerous items and explosives daily. A passenger’s bag can be
screened at any point of the screening process. The Transportation Security
Administration is also authorized to inspect the inside of any checked bag and go through
personal belongings. If a passenger’s bag has been inspected by a TSA officer, a
notification will be placed on the inside of the bag.
Specialty Security Operations
There are special medical and disability exceptions that are applied to the TSA
screening procedures when appropriate. Medications are permitted on a carry-on but are
subject to inspection by a TSA officer. Medically necessary liquids that exceed the 3.4-
ounce limit are allowed but must be screened separately from other items. Those with
disabilities are also not required to remove their shoes for screening. Current members of
18. 14
the United States Military also qualify for TSA Pre-Check. Military personnel are
prohibited from bringing weapons or ammunition with them onboard the aircraft.
Children under the age of 12 and adults over the age of 75 are permitted to leave on
shoes, jackets and headwear during the screening process. Formula and breast milk are
also exempt from the 3.4-ounce regulation, but must be screened separately. Those with
religious head coverings or other ceremonial items may be subject to a pat down if an
alarm is triggered during screening. If the alarm cannot be resolved by pat down the
passenger may be asked to remove the head covering in a private area. Pets are asked to
be removed from all carrying cases and should be lead through the metal detector while
on a leash. All animal carriers will undergo their own security screening.
Reported Incidents
There have been 25,000 breaches of the TSA security practices since 2001. Of
these breaches, 14,000 passengers were able to access sensitive areas of the airport and
6,000 passengers and their luggage were able to get past checkpoints without being
properly screened. In 2014, there were a reported 2,212 firearms that were discovered in
carry-on luggage. Of those firearms, 83% were reported to have been loaded. This is the
largest number of firearm discoveries in one year since 2001.
In November of 2001, Richard Reid was aboard a flight from Paris, France to
Miami, Florida. Reid attempted to light a fuse on the bottom of his shoe, but was taken
down by fellow passengers. It was after this incident that the TSA started enforcing all
adult passengers to remove their shoes during the screening process. In another terrorist
attempt, the “Christmas day bomber” tried to take down a commercial airliner by
19. 15
smuggling in a bomb in his undergarments. Since this attempt, the TSA implemented
their current imaging system that is designed to see past clothes and alert officers of any
alarms.
20. 16
Chapter 4
DISCUSSION AND CONCLUSIONS
Air travel is one of the most utilized methods of transportation. At the forefront of
keeping passengers safe is the Transportation Security Administration (TSA). This
concluding chapter includes the following: a discussion of the major findings,
implications of the findings, limitations, conclusions based on research questions, and
recommendations for the organization, industry, and future research.
Discussion
The way people travel has changed since the events that occurred on September
11, 2001. When major terrorist attacks strike they impact the travel industry. The World
Bank (2005) reports that after September 11 the number of foreign trips saw an
immediate and continuous decline. By providing intensive security measures, the TSA is
able to ensure that passengers are safe while traveling and that the travel industry is not
further impacted by airline terrorist attacks. The Travel Security Administration regulates
who is allowed to fly through their passenger screening program. By using both pre-
screening and in person security measures, they can protect all passengers from
potentially dangerous travelers. The current study discovered that the screening processes
are relatively in depth and extensive when it comes to screening passengers pre-boarding.
The Transportation Security Administration should continue with its passenger screening
techniques, while utilizing the newest technology to further increase the accuracy and
21. 17
lessen the limitations of the current screening process.
The Travel and Security Administration does not just depend on the screening of
passengers, but also of their luggage. The airline industry is not the only industry that has
started to screen luggage to keep guests safe. Middle eastern hotels have not only started
using passenger screening techniques, but have also started using X-ray machines to
screen guests for dangerous goods or bombs (“Country,” 2005). Passengers are only half
the battle when it comes to protecting against terrorist attacks. Malicious passengers will
try to sneak on explosives, knives, or other dangerous goods with the intent of hurting
those on the plane. The Travel Security Administration is doing an adequate job keeping
up with new technology and screening procedures. The Transportation Security
Administration should increase the number of randomly screened bags, and continue to
adjust policy where necessary after learning where there might be possibilities for a
luggage security breach.
Since the September 11 attacks, safety is a paramount concern for most travelers
(Bonham et al. 2006). The Travel Security Administration is having to constantly adjust
to different ways that terrorists could breach the system. Since the creation of the TSA,
they have made several adjustments to their regulations which implies that they are
keeping up with new information of ways passengers could breach the system. However,
some of these implementations come after a breach has already occurred, which reduces
their effectiveness. The Transportation Security Administration should continue to
implement new technology and remain in close contact with agencies like the Federal
Bureau of Investigation to learn trends and characteristics of dangerous travelers to
prevent major breaches.
22. 18
There were multiple limitations in this study. The TSA may be regulating the
amount of information that is published on their security procedures as a way to preserve
an element of surprise for those who are attempting to breach the system. Without getting
any insider information, it would be impossible to confirm if the public has access to full
knowledge of what is happening at and before passengers arrive at the airport. The
information was all sourced from online, and from government owned websites that
might be skewed in favor of the TSA. The researcher may also have been influenced
through personal bias in being a traveler and interested in pursuing a career in a travel-
related industry. Although the study ran only two weeks, the information gathered was
relevant and necessary to the study.
Through this study, the researcher found that most of the security regulations put
in place by the Travel Security Administration are effective at keeping passengers safe.
Their screening processes catches thousands of potentially dangerous items and travelers
each year which help keep US airports safe. The Travel Security Administration utilizes a
great balance between on-site technology and past behavior patterns to create a well
rounded system that other companies could build upon.
Conclusions
Based on the findings of this study, the following conclusions are drawn:
1. The Travel Security Administration passenger screening techniques utilize
metal detectors, millimeter wave advanced imagining technology, and pat
down techniques.
2. The Travel Security Administration baggage screening techniques utilize
23. 19
prohibited item lists, metal detectors, and random bag searches.
3. The Travel Security Administration uses both in person and pre-check in
information to flag possible dangerous passengers, which effectively prohibit
these travelers from ever boarding the aircraft.
Recommendations
Based on the conclusions of this study, the following recommendations are made:
1. Increase the number of security measures that are required at all travel sites
and large tourist gatherings.
2. Establish a closer relationship with agencies like the Federal Bureau of
Investigation to understand patterns and characteristics of potentially
dangerous persons.
3. Increase the number of random luggage and passenger screenings that are
conducted at all airports across the United States.
4. Continue to utilize increases in technology that are implemented as soon as
possible in all airports.
5. Continue to adjust policy where necessary after learning where there might be
possibilities for a luggage security breach.
6. Further research should examine the passenger perceptions to the increase in
security and how this effects their willingness to travel.
25. 21
REFERENCES
Bonham, C., Edmonds, C. & Mak, J. (2006). The impact of September 11 and other
terrible global events on Tourism in the U.S and Hawaii. Retrieved from:
http://www.economics.hawaii.edu/research/workingpapers/WP_06-2.pdf
Brooks, R. A. (2002). The military and homeland security. Policy and Management
Review, 2(2), 1-18. Retrieved from http://spaef.org/article/179/The-Military-and-
Homeland-Security
Country reports on terrorism (2005). Global security. Retrieved from:
http://www.globalsecurity.org/security/library/report/2006/c-rprt-terrorism
_2005-05d.htm.
Department of Defense. (n.d). Department of defense 101 sections. Retrieved from:
http://www.defense.gov
Flintoff, C. (2012). Why do terrorists so often go for planes? National Public Radio.
Retrieved from http://www.npr.org
Goodrich, J.N. (2002). September 11, 2001 attack on America: a record of the immediate
impacts and reactions in the USA travel and tourism industry. Tourism
Management. Retrieved from: http://www.muskingum.edu/~bking/2011nyno/2-
Sept-11-Impact-on-Tourism.pdf
Howie, L. (2005). There is nothing to fear but fear itself (and terrorists): Public
perception, terrorism and the workplace. Proceedings Social Change in the 21st
Century Conference, Retrieved from http://eprints.qut.edu.au/3493/1/3493.pdf
International Air Transport Association. (2016). Number of flights performed by the
global airline industry from 2004 to 2016 (in millions). In Statista - The Statistics
26. 22
Portal. Retrieved from: https://www.statista.com
Knutson, B.J. (1988). Frequent travelers: making them happy and bring them back
Cornell Hotel and Restaurant Administration Quarterly. Retrieved from:
https://scholars.opb.msu.edu/en/publications/frequent-travelers-making-them-
happy-and-bringing-them-back-2
Marriot blast: 4 foreigners among 53 dead. (2008). Geo Television Network
Retrieved from: http://www.geo.tv/9-21-2008/25363.htm
Miller, J.K. (2004). WPI – Transformations: Safe or secure? Can Your Hotel Room be
Both? Safe or Secure? Retrieved from:
http://www.wpi.edu./News/Transformations/2004Winter/safesecure.html
Okumus, F. (2005. Safety, International Encyclopedia of Hospitality Management.
Retrieved from: https://www.scribd.com/doc/145056259/International-
Encyclopedia-of-Hospitality-Management-pdf
Reaves, B. (2015). Local police department 2013: Equipment and technology, Bureau of
Justice Statistic. Retrieved from:
http://www.bjs.gov/index.cfm?ty=pbdetail&iid=5321
Sharp, T. (2008). Tying US defense spending to GDP: bad logic, bad policy. Parameters,
38(3), 5+. Retrieved from:
http://go.galegroup.com/ps/i.do?p=AONE&sw=w&u=calpolyw_csu&v=2.1&it=r
&id=GALE%7CA190888947&asid=0d04d6b3bed6b4820cf648d6cec88409
TSA (2016), Home page, Retrieved from: https://www.tsa.gov
United Nations World Travel and Tourism Organization (2014). UNWTO Annual Report
2014. Retrieved from: http://www2.unwto.org/en
27. 23
US Census Bureau. (n.d.). Per capita state and local government expenditures for police
protection in the U.S. in 2013, by state (in USD). In Statista - The Statistics
Portal. Retrieved from: https://www.statista.com
Why We Must Re-Emphasize Security Measures. (2015). Tourist Attractions & Parks,
45(6), 32-35. Retrieved from: http://tapmag.com
World Bank (2005). World Development Indicators, Retrieved from:
http://data.worldbank.org
World Travel and Tourism Commission. (2016). Travel and tourism economic impact
2016. Retrieved from http://www.wttc.org
30. 26
INSTRUMENT
I. TSA
a. Creation
i.
ii.
iii.
iv.
b. Security Screening
i.
ii.
iii.
iv.
v.
c. TSA Secure Flight
i.
ii.
d. General operations
i.
ii.
e. Prevented/ Breach Attacks
i.
ii.
f. Future Implementations