SlideShare a Scribd company logo
Please Remove your Shoes: A Case Study on the Security
Procedures of the Transportation Security Administration
A Senior Project
presented to
the Faculty of the Department of Experience Industry Management
California Polytechnic State University, San Luis Obispo
In Partial Fulfillment
of the Requirements for the Degree
Bachelor of Science
by
Seralyn Fields
December 2016
© 2016 Seralyn Fields
ii
ABSTRACT
PLEASE REMOVE YOUR SHOES: A CASE STUDY ON THE SECURITY
PROCEDURES OF THE TRANSPORTATION SECURITY ADMINISTRATION
SERALYN FIELDS
DECEMEBER 2016
September 11, 2001 was a life changing day for all Americas. It impacted the way
many Americans act and think. To react with the changing world, the Travel Security
Administration was created. The purpose of this study was to analyze the security
regulations implemented by the Transportation Security Administration (TSA).
The researcher used a case study outline to gather information regarding the main
security procedures. The study found that the TSA is doing an effective job at properly
screening both passengers and luggage for dangerous persons and materials. The TSA
should keep in close relations with other government agencies to learn more about
terrorism behaviors, while continuing to use technology to upgrade screening procedures.
Keywords: security, airports, travel, terrorism, 9/11
iii
TABLE OF CONTENTS
PAGE
ABSTRACT........................................................................................................................ ii	
  
TABLE OF CONTENTS...................................................................................................iii	
  
Chapter 1 INTRODUCTION AND REVIEW OF LITERATURE.................................... 1	
  
Background of Study ...................................................................................................... 1	
  
Review of Literature....................................................................................................... 2	
  
Purpose of the Study....................................................................................................... 7	
  
Research Questions......................................................................................................... 8	
  
Chapter 2 METHODS......................................................................................................... 9	
  
Description of Organization............................................................................................ 9	
  
Description of Instrument............................................................................................... 9	
  
Description of Procedures............................................................................................. 10	
  
Chapter 3 PRESENTATION OF THE RESULTS........................................................... 11	
  
Passenger Screening Operations................................................................................... 11	
  
Luggage Screening Operations..................................................................................... 13	
  
Specialty Security Operations....................................................................................... 13	
  
Reported Incidents........................................................................................................ 14	
  
Chapter 4 DISCUSSION AND CONCLUSIONS............................................................ 16	
  
Discussion..................................................................................................................... 16	
  
Conclusions................................................................................................................... 18	
  
Recommendations......................................................................................................... 19	
  
REFERENCES ................................................................................................................. 20	
  
iv
APPENDIXES.................................................................................................................. 24	
  
1
Chapter 1
INTRODUCTION AND REVIEW OF LITERATURE
Background of Study
Security is critical to the travel and tourism industry. With the industry being
worth around 7 trillion dollars a year, it is imperative for worldwide economic prosperity
that individuals continue to spend money on these experiences (World Travel and
Tourism Commission, 2016). In order for tourism to attract travelers, the traveler must
feel that their safety and freedom is protected. Because of this, most major airports have
extensive security screening processes before passengers are allowed to board their
flights.
Terrorists have been targeting planes for attacks since long before before
September 11, 2001. Flintoff (2012) reports that terrorists are attracted to planes as
targets for attacks because it does not require them to ever reach the target country. They
can launch the attack from the air and avoid further difficulties and obstacles that would
be presented if they did initiate the attack from the target nation’s soil. Plane attacks are
also enticing to terrorists because they are able to train for how to take down planes and
are able to practice in a simulated environment until they are familiar with the process. In
addition, planes serve as the weapon as well. The plane is essentially a flying bomb and
the passengers become guaranteed victims.
National airports have implemented intense screening processes to help protect
their citizens from attack. Most Americans can remember exactly where they were when
they learned about the September 11 attacks, which killed thousands of Americans and
2
brought down the Twin Towers in New York City. This attack brought terrorism into the
spot light and increased fears regarding traveling and airport security.
After September 11, the government took measures to increase airport passenger
and baggage security in an attempt to regain the publics trust and decrease the number of
possible breaches that could occur within the system. The purpose of this study was to
analyze the security regulations implemented by the Transportation Security
Administration (TSA).
Review of Literature
Research for this review of literature was conducted at Robert E. Kennedy
Library on the campus of California Polytechnic State University, San Luis Obispo. In
addition to books and other resources, the following online databases were utilized:
Hospitality and Tourism Complete, Academic Search Premier, Statista, Google Scholar
and Academic Search Premier. This review of literature is organized into the following
topic areas: security, security in the travel and tourism industry, how the travel and
tourism industry was affected by the events that occurred on September 11, 2001.
Security is something that historically most people have taken for granted on a
daily basis. They rely on agencies like police, private hired security, body guards and
even other people to keep them safe. These agencies can do their best, but one can still be
left in harm’s way if something were to be overlooked. As the world becomes more and
more dangerous to everyday citizens, there is an increased concern to implement ample
security in most public places for protection.
3
Most governments take citizen security seriously and have national and federal
police forces. This force increases in areas that are larger or that have a particularly at
risk population. In 2013, the United States spent $862 per capita in the District of
Columbia, the most compared to all other 50 states (US Census Bureau, n.d.). Reaves
(2015) reports that in 2013, 81% of local police officers were authorized to use energy
weapons, like tasers. He also reports that about a third of departments used body-worn
cameras to capture incidents while on the job. Not only are there police forces at the local
and state level, but there are federal entities designed to help keep the nation safe from
serious crimes and persons. This includes the Federal Bureau of Investigation and the
Central Intelligence Agency.
However, the monetary amount spent on local police forces is nothing compared
to the over $850 billion dollars that the US has spent on the war in Iraq (Sharp, 2008).
Not only is the military responsible for protecting US citizen’s freedom abroad, but the
Department of Homeland Security has also increased their responsibility for domestic
security (Brooks, 2002). The Department of Defense (n.d.), reports that, “The department
is prepared to conduct homeland defense missions whenever the President, exercising his
constitutional authority as Commander in Chief, authorizes military actions” (para. 41).
The US military is trained to protect against bomb threats, terrorism attacks and more on
US soil, but it remains that most of their work is done abroad. The US military is broken
down into six main departments: Army, Navy, Air Force, Marine Corps, Coast Guard and
the Reserve (Department of Defense, n.d.). Each department is specially trained and
organized to best protect the people of the United States.
4
Battle fields have extended far past the warzone boundaries. With the invention of
the Internet, identity theft and the ability for people to hack personal information is
increasingly easier. However, the real danger is how terrorist groups are using the
Internet to spread radical ideals. Terror groups can use the internet to recruit members
and even train them from abroad. The United States is now engaged in a constant war
against terror. It is no longer just the military who is dealing with increasing security but
is seen across all industries. One industry that has particularly had to increase security is
the travel and tourism field. This field includes hospitality, events, theme parks, national
parks, weddings, concerts, sports tourism and more. These venues are now having to deal
with an increase in their security to keep guests safe in this new era of crime. Most of
these areas and venues have their own version of a police force to help control any
dangerous situations that may arise.
Hotels are one of the biggest components of the tourism industry. Hotels became
a target for terrorists after the September 11 attacks with a series of attacks targeting the
JW Marriott Hotel in South Jakarta, the Taba Hilton in Egypt, and the Islamabad Marriot
and Mumbai Oberoi Hotels in the early 2000’s (Miller, 2004; “Marriot,” 2008). Because
of this, hotels have to keep a close eye on guests and any possible hazard that may arise.
Hotel goers reported that security is one of the most influential factors in choosing a hotel
along with location, service and friendliness of staff (Knutson, 1988). Safety involves not
only preventing guests from injury but also protecting employees and property. Many
hotel companies have used electronic locks, fire sprinklers, smoke detectors and closed
circuit televisions to help reduce risk and injury (Okumus, 2005). The main focus of hotel
security is to prevent unauthorized entries onto the property. Hotels have utilized
5
technology to help them monitor these concerns. Middle eastern hotels have not only
started using the above techniques, but have also started using X-ray machines to screen
guests for dangerous goods or bombs (“Country,” 2005). Many hotels have increased
their security budgets to invest in these kinds of heavy-duty equipment for their reception
areas, bomb sniffing dogs, full time security and improved staff training (Howie, 2005).
Along with hotels, major attractions or events also require security screening
(“Why we,” 2015). Through the years, security at parks, stadiums and movie theaters
have increased to due to the overall rise in soft target attacks. In 2015, Major League
Baseball required all stadiums to have metal detection security. This follows the
requirement by the National Football League in 2013, to require all bags taken into the
stadium to be clear and National Amusements cinemas to ban any backpacks or luggage
from entering the theater.
Security while traveling is imperative in supporting the $7.6 billion travel and
tourism industry (World Travel and Tourism Commission, 2016). The United Nations
World Tourism Organization (2014) reported over 1.1 billion tourists traveled
internationally. This led to over 33 million flights performed by the global airline
industry in 2014 (International Air Transport Association, 2016). If passengers do not
feel that their safety is being prioritized while traveling, they may become less likely to
travel, resulting in an overall decline in the industry that would have worldwide effects.
Bonham, Edmonds and Mak (2006) show how important safety is to the travel and
tourism industry:
When people travel, they do not want to be exposed to personal hazards, so safety
is a paramount concern of most travelers. Not surprisingly, terrorist incidents and
6
other threats to personal safety—whether they are natural disasters or deadly
contagious diseases—reduce people’s propensity to travel. Alternatively, some
people may opt to change their travel plans and visit destinations where they are
exposed to less personal risk. (p. 1)
While security is on the mind of many travelers, it is often assumed that there is someone
looking out for them. When security is breached, for example on September 11, citizens
often become timid to travel again.
September 11 was one of the most devastating and shocking events the world has
ever seen. The aftermath of the attacks on the World Trade Center in New York was felt
around the world. As the world reacted to the horror, they became vigilant about
protecting themselves against any danger or harm that could arise. This caused an overall
decrease in international travel. The World Bank (2005), reports that after September 11
the number of foreign trips saw an immediate and continuous decline. Their reports
included that there were over 60 million trips in 2000 compared to just 54 million trips in
2003. Bonham et al. (2006) reported that the United States saw a large increase in those
who preferred vacationing domestically after September 11. This caused an increase in
the number of US citizens traveling to Hawaii and had an overall positive effect on the
US tourism industry, despite the overall global impact being negative.
Not only was the airline industry affected, but the hospitality industry also saw
decline. Goodrich (2012) reports that hotel industries in major tourist destinations
suffered significantly low occupancy rates due to cancelations of domestic and
international flights. There was an overall decline of around 20-50% with an overall
monetary loss of over $2 billion. Hotels had to start providing incentives to attract further
7
demand so that they would not lose more money. Goodrich also reports that hotels were
not the only industry that suffered. Casinos in Las Vegas, Nevada reported up to 50%
decreases in attendance, and guests reported feeling fearful to fly in from other states to
see the entertainment shows. Goodrich states that sport tourism also suffered major
losses:
Security concerns caused the postponement of all 14 National Football League
(NFL) games in America on Sunday, September 16, 2001. Each of these 14
football stadiums holds 60,000 to 75,000 attendees (sports fans). Each attendee
spends an average of $50 for admission, $25 for food, $10 for parking, and $15
for miscellaneous items, (e.g., American flags, T-shirts), for a total of about $100
per person or about $6 million to $7,5 million revenue loss per stadium for that
one Sunday, September 16, 2001, or a grand total of about $84 million to $105
million in lost revenue for the 14 stadiums on the Sunday after the attack. (p. 576)
Each sector of the industry was affected deeply and suffered monetary losses. It is
imperative that all sectors of the industry are providing enough security so that guests and
participants feel confident enough to engage with their company.
Purpose of the Study
The purpose of this study was to analyze the security regulations implemented by
the Transportation Security Administration (TSA).
8
Research Questions
This study attempted to answer the following research questions:
1. What are the Transportation Security Administrations passenger screening
techniques?
2. What are the Transportation Security Administrations baggage screening
techniques?
3. Are the passenger screening procedures of the Transportation Security
Administration effective at stopping dangerous persons from boarding?
9
Chapter 2
METHODS
The purpose of this study was to analyze the security regulations implemented by
the Transportation Security Administration (TSA). This chapter includes the following
sections: description of organization, description of instrument, and description of
procedures.
Description of Organization
A case study was done of the Transportation Security Administration which
operates within the United States. The Transportation Security Administration (2016)
was created on November 19th
, 2001 following the attacks of September 11. The
Transportation Security Administration was established under the Aviation and
Transportation Security act passed by the 107th
Congress. The organization’s mission is
to protect the nation’s transportation systems to ensure freedom of movement for people
and commerce. The Transportation Security Administration employs over 44,000
transportation security officers and are responsible for the security of nearly 440
federalized airports. The Transportation Security Administration is responsible for the
security of both cargo planes and passenger flights.
Description of Instrument
The instrument utilized in the study was an outline developed by the researcher
that organizes the best practices utilized by the Travel Security Administration (see
10
Appendix A). Information from the Review of Literature was used to organize the
instrument and develop ideas for further research. The instrument consists of criteria used
to evaluate the measures that the TSA took to best protect citizen’s safety while traveling
internationally and domestically.
A pilot study was completed using a similar security administration that operates
abroad. Changes were made to the outline, including adding additional numbers under the
screening section and adding future implementations into section F.
Description of Procedures
This case study was done of the Transportation Security Administration which
operates within the United States. The instrument applied in the study was an outline
developed by the researcher that organizes the best practices utilized by the Travel
Security Administration. The research for this study occurred over a two-week period in
November of 2016. Security procedures were analyzed using the TSA official website.
The researcher looked at many pages included the Frequently Asked Questions, About,
and Security Procedures pages to gain information regarding the TSA’s security
practices. The information was then filled into the instrument and additional notes were
taken. Statistics, news portals and various scholarly databases were also utilized.
Statistics websites were used to understand passengers perceived safety while flying out
of an US airport. News outlets were used to analyze any type of breach in the TSA’s
procedures since the September 11 attacks and how the TSA responded to those breaches.
Scholarly articles were utilized to identify how the TSA has changed the travel and
tourism industry and how the creation of the TSA impacted the industry as a whole.
11
Chapter 3
PRESENTATION OF THE RESULTS
The purpose of this study was to analyze the security regulations implemented by
the Transportation Security Administration (TSA). A best practices approach was utilized
to examine the Transportation Security Administration. This chapter includes the
following sections: passenger screening operations, luggage screening operations,
specialty security operations, and reported incidents.
Passenger Screening Operations
There are several programs and practices that the TSA uses for passenger
screening purposes. The Transportation Security Administration uses millimeter wave
advanced imaging technology and metal detectors to screen passengers for any dangerous
or hazardous materials. These systems are able to forgo physical screenings, however in
some cases an additional physical screening may be necessary. A pat down screening can
be offered to those who are unable to walk through a metal detector due to medical
reasons or those who feel uncomfortable with the advanced imaging technology. In these
cases, a physical screening will be conducted by a TSA officer of the same sex. Pat
downs can be done in a private room, and passengers can be accompanied by a person of
their choice. Luggage can be taken with the passenger into the private screening area and
the officer will ask if there is any injury or tender area that they need to be aware of. In
these situations, the passenger will never be asked to lift or remove an article of clothing.
12
The Transportation Security Administration also depends on a program called
Secure Flight. Secure Flight is a risk-based passenger prescreening program that cross
checks passengers against trusted travelers lists before the passenger even arrives to the
airport. These lists help airlines identify passengers who are both low and high risk. This
program also prevents individuals on the No Fly List and the Centers for Disease Control
and Prevention Do Not Board List from boarding an aircraft.
Passengers that are deemed low-risk can apply for the TSA Pre-Check program
which allows them to receive less strict security regulations. Passengers that are approved
for the TSA Pre-Check program are able to keep shoes, belts, and jackets along with
leaving laptops and liquids inside their carry-on luggage. In October of 2016, 97% of
TSA Pre-Check passengers waited in line for less than five minutes. As of 2016, the
TSA-Pre Check program has over three million members and operates in 180+ airports
nationwide. Passengers who would like to apply for the TSA Pre-Check program are
required to complete an online application and schedule an appointment at a registered
enrollment center. A 10 minute in person interview is conducted along with a background
check and fingerprinting. The applicant will receive written notification within three
weeks of the interview of their acceptance.
All travelers over the age of 18 are preferred to have valid identification to be
permitted past the security screening area. These forms of identification include US
drivers license, US passport, US military ID, and other approved documentation. If a
passenger arrives to the airport without a valid form of identification, the TSA officer
will ask them to complete a form to confirm their identity. If the passenger’s identity
cannot be confirmed, they will not be permitted to board the aircraft.
13
Luggage Screening Operations
The Transportation Security Administration also inspects all carry-on and
checked luggage. There are strict rules and regulations regarding what can and cannot be
taken onto the aircraft. Over 50 items are prohibited in carry-on luggage by the TSA
including liquids over 3.4 ounces, spray paint, knives, baseball bats, and self defense
sprays. Passengers are required to remove all liquids and laptops from their carry-on bag
before placing their bag through the safety checkpoint screening area. These items will be
placed in a bin individually and pushed through the detector for screening. If there is
something that indicates further inspection, all carry-on luggage can be personally
inspected by a TSA officer. The Transportation Security Administration inspects 1.1
million checked bags for dangerous items and explosives daily. A passenger’s bag can be
screened at any point of the screening process. The Transportation Security
Administration is also authorized to inspect the inside of any checked bag and go through
personal belongings. If a passenger’s bag has been inspected by a TSA officer, a
notification will be placed on the inside of the bag.
Specialty Security Operations
There are special medical and disability exceptions that are applied to the TSA
screening procedures when appropriate. Medications are permitted on a carry-on but are
subject to inspection by a TSA officer. Medically necessary liquids that exceed the 3.4-
ounce limit are allowed but must be screened separately from other items. Those with
disabilities are also not required to remove their shoes for screening. Current members of
14
the United States Military also qualify for TSA Pre-Check. Military personnel are
prohibited from bringing weapons or ammunition with them onboard the aircraft.
Children under the age of 12 and adults over the age of 75 are permitted to leave on
shoes, jackets and headwear during the screening process. Formula and breast milk are
also exempt from the 3.4-ounce regulation, but must be screened separately. Those with
religious head coverings or other ceremonial items may be subject to a pat down if an
alarm is triggered during screening. If the alarm cannot be resolved by pat down the
passenger may be asked to remove the head covering in a private area. Pets are asked to
be removed from all carrying cases and should be lead through the metal detector while
on a leash. All animal carriers will undergo their own security screening.
Reported Incidents
There have been 25,000 breaches of the TSA security practices since 2001. Of
these breaches, 14,000 passengers were able to access sensitive areas of the airport and
6,000 passengers and their luggage were able to get past checkpoints without being
properly screened. In 2014, there were a reported 2,212 firearms that were discovered in
carry-on luggage. Of those firearms, 83% were reported to have been loaded. This is the
largest number of firearm discoveries in one year since 2001.
In November of 2001, Richard Reid was aboard a flight from Paris, France to
Miami, Florida. Reid attempted to light a fuse on the bottom of his shoe, but was taken
down by fellow passengers. It was after this incident that the TSA started enforcing all
adult passengers to remove their shoes during the screening process. In another terrorist
attempt, the “Christmas day bomber” tried to take down a commercial airliner by
15
smuggling in a bomb in his undergarments. Since this attempt, the TSA implemented
their current imaging system that is designed to see past clothes and alert officers of any
alarms.
16
Chapter 4
DISCUSSION AND CONCLUSIONS
Air travel is one of the most utilized methods of transportation. At the forefront of
keeping passengers safe is the Transportation Security Administration (TSA). This
concluding chapter includes the following: a discussion of the major findings,
implications of the findings, limitations, conclusions based on research questions, and
recommendations for the organization, industry, and future research.
Discussion
The way people travel has changed since the events that occurred on September
11, 2001. When major terrorist attacks strike they impact the travel industry. The World
Bank (2005) reports that after September 11 the number of foreign trips saw an
immediate and continuous decline. By providing intensive security measures, the TSA is
able to ensure that passengers are safe while traveling and that the travel industry is not
further impacted by airline terrorist attacks. The Travel Security Administration regulates
who is allowed to fly through their passenger screening program. By using both pre-
screening and in person security measures, they can protect all passengers from
potentially dangerous travelers. The current study discovered that the screening processes
are relatively in depth and extensive when it comes to screening passengers pre-boarding.
The Transportation Security Administration should continue with its passenger screening
techniques, while utilizing the newest technology to further increase the accuracy and
17
lessen the limitations of the current screening process.
The Travel and Security Administration does not just depend on the screening of
passengers, but also of their luggage. The airline industry is not the only industry that has
started to screen luggage to keep guests safe. Middle eastern hotels have not only started
using passenger screening techniques, but have also started using X-ray machines to
screen guests for dangerous goods or bombs (“Country,” 2005). Passengers are only half
the battle when it comes to protecting against terrorist attacks. Malicious passengers will
try to sneak on explosives, knives, or other dangerous goods with the intent of hurting
those on the plane. The Travel Security Administration is doing an adequate job keeping
up with new technology and screening procedures. The Transportation Security
Administration should increase the number of randomly screened bags, and continue to
adjust policy where necessary after learning where there might be possibilities for a
luggage security breach.
Since the September 11 attacks, safety is a paramount concern for most travelers
(Bonham et al. 2006). The Travel Security Administration is having to constantly adjust
to different ways that terrorists could breach the system. Since the creation of the TSA,
they have made several adjustments to their regulations which implies that they are
keeping up with new information of ways passengers could breach the system. However,
some of these implementations come after a breach has already occurred, which reduces
their effectiveness. The Transportation Security Administration should continue to
implement new technology and remain in close contact with agencies like the Federal
Bureau of Investigation to learn trends and characteristics of dangerous travelers to
prevent major breaches.
18
There were multiple limitations in this study. The TSA may be regulating the
amount of information that is published on their security procedures as a way to preserve
an element of surprise for those who are attempting to breach the system. Without getting
any insider information, it would be impossible to confirm if the public has access to full
knowledge of what is happening at and before passengers arrive at the airport. The
information was all sourced from online, and from government owned websites that
might be skewed in favor of the TSA. The researcher may also have been influenced
through personal bias in being a traveler and interested in pursuing a career in a travel-
related industry. Although the study ran only two weeks, the information gathered was
relevant and necessary to the study.
Through this study, the researcher found that most of the security regulations put
in place by the Travel Security Administration are effective at keeping passengers safe.
Their screening processes catches thousands of potentially dangerous items and travelers
each year which help keep US airports safe. The Travel Security Administration utilizes a
great balance between on-site technology and past behavior patterns to create a well
rounded system that other companies could build upon.
Conclusions
Based on the findings of this study, the following conclusions are drawn:
1.   The Travel Security Administration passenger screening techniques utilize
metal detectors, millimeter wave advanced imagining technology, and pat
down techniques.
2.   The Travel Security Administration baggage screening techniques utilize
19
prohibited item lists, metal detectors, and random bag searches.
3.   The Travel Security Administration uses both in person and pre-check in
information to flag possible dangerous passengers, which effectively prohibit
these travelers from ever boarding the aircraft.
Recommendations
Based on the conclusions of this study, the following recommendations are made:
1.   Increase the number of security measures that are required at all travel sites
and large tourist gatherings.
2.   Establish a closer relationship with agencies like the Federal Bureau of
Investigation to understand patterns and characteristics of potentially
dangerous persons.
3.   Increase the number of random luggage and passenger screenings that are
conducted at all airports across the United States.
4.   Continue to utilize increases in technology that are implemented as soon as
possible in all airports.
5.   Continue to adjust policy where necessary after learning where there might be
possibilities for a luggage security breach.
6.   Further research should examine the passenger perceptions to the increase in
security and how this effects their willingness to travel.
20
REFERENCES
21
REFERENCES
Bonham, C., Edmonds, C. & Mak, J. (2006). The impact of September 11 and other
terrible global events on Tourism in the U.S and Hawaii. Retrieved from:
http://www.economics.hawaii.edu/research/workingpapers/WP_06-2.pdf
Brooks, R. A. (2002). The military and homeland security. Policy and Management
Review, 2(2), 1-18. Retrieved from http://spaef.org/article/179/The-Military-and-
Homeland-Security
Country reports on terrorism (2005). Global security. Retrieved from:
http://www.globalsecurity.org/security/library/report/2006/c-rprt-terrorism
_2005-05d.htm.
Department of Defense. (n.d). Department of defense 101 sections. Retrieved from:
http://www.defense.gov
Flintoff, C. (2012). Why do terrorists so often go for planes? National Public Radio.
Retrieved from http://www.npr.org
Goodrich, J.N. (2002). September 11, 2001 attack on America: a record of the immediate
impacts and reactions in the USA travel and tourism industry. Tourism
Management. Retrieved from: http://www.muskingum.edu/~bking/2011nyno/2-
Sept-11-Impact-on-Tourism.pdf
Howie, L. (2005). There is nothing to fear but fear itself (and terrorists): Public
perception, terrorism and the workplace. Proceedings Social Change in the 21st
Century Conference, Retrieved from http://eprints.qut.edu.au/3493/1/3493.pdf
International Air Transport Association. (2016). Number of flights performed by the
global airline industry from 2004 to 2016 (in millions). In Statista - The Statistics
22
Portal. Retrieved from: https://www.statista.com
Knutson, B.J. (1988). Frequent travelers: making them happy and bring them back
Cornell Hotel and Restaurant Administration Quarterly. Retrieved from:
https://scholars.opb.msu.edu/en/publications/frequent-travelers-making-them-
happy-and-bringing-them-back-2
Marriot blast: 4 foreigners among 53 dead. (2008). Geo Television Network
Retrieved from: http://www.geo.tv/9-21-2008/25363.htm
Miller, J.K. (2004). WPI – Transformations: Safe or secure? Can Your Hotel Room be
Both? Safe or Secure? Retrieved from:
http://www.wpi.edu./News/Transformations/2004Winter/safesecure.html
Okumus, F. (2005. Safety, International Encyclopedia of Hospitality Management.
Retrieved from: https://www.scribd.com/doc/145056259/International-
Encyclopedia-of-Hospitality-Management-pdf
Reaves, B. (2015). Local police department 2013: Equipment and technology, Bureau of
Justice Statistic. Retrieved from:
http://www.bjs.gov/index.cfm?ty=pbdetail&iid=5321
Sharp, T. (2008). Tying US defense spending to GDP: bad logic, bad policy. Parameters,
38(3), 5+. Retrieved from:
http://go.galegroup.com/ps/i.do?p=AONE&sw=w&u=calpolyw_csu&v=2.1&it=r
&id=GALE%7CA190888947&asid=0d04d6b3bed6b4820cf648d6cec88409
TSA (2016), Home page, Retrieved from: https://www.tsa.gov
United Nations World Travel and Tourism Organization (2014). UNWTO Annual Report
2014. Retrieved from: http://www2.unwto.org/en
23
US Census Bureau. (n.d.). Per capita state and local government expenditures for police
protection in the U.S. in 2013, by state (in USD). In Statista - The Statistics
Portal. Retrieved from: https://www.statista.com
Why We Must Re-Emphasize Security Measures. (2015). Tourist Attractions & Parks,
45(6), 32-35. Retrieved from: http://tapmag.com
World Bank (2005). World Development Indicators, Retrieved from:
http://data.worldbank.org
World Travel and Tourism Commission. (2016). Travel and tourism economic impact
2016. Retrieved from http://www.wttc.org
24
APPENDIXES
25
Appendix A
Instrument
26
INSTRUMENT
I.   TSA
a.   Creation
i.  
ii.  
iii.  
iv.  
b.   Security Screening
i.  
ii.  
iii.  
iv.  
v.  
c.   TSA Secure Flight
i.  
ii.  
d.   General operations
i.  
ii.  
e.   Prevented/ Breach Attacks
i.  
ii.  
f.   Future Implementations
27
i.  
ii.  

More Related Content

Similar to srproj_fields_fall16

Clinical Recruitment
Clinical RecruitmentClinical Recruitment
Clinical Recruitment
Kimberly Jones
 
TSA
TSATSA
Research Paper
Research PaperResearch Paper
Research Paper
Jerica Knox
 
Research Paper
Research PaperResearch Paper
Research Paper
Jerica Knox
 
The Security Administration ( Tsa )
The Security Administration ( Tsa )The Security Administration ( Tsa )
The Security Administration ( Tsa )
Kelley Hunter
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
simba35
 
Security Guard Training Report
Security Guard Training ReportSecurity Guard Training Report
Security Guard Training Report
Michelle Singh
 
Course Objective - Assess the importance of Port Management .docx
Course Objective - Assess the importance of Port Management .docxCourse Objective - Assess the importance of Port Management .docx
Course Objective - Assess the importance of Port Management .docx
vanesaburnand
 
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docxRunning head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
SUBHI7
 
Class,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenClass,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differen
VinaOconner450
 
Gallagher.M Exam1
Gallagher.M Exam1Gallagher.M Exam1
Gallagher.M Exam1
mgalla22
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
Kerry McCartney-Prout
 
The Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
The Effective Use of Unmanned Aerial Vehicles for Local Law EnforcementThe Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
The Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
Leighton Gasque
 

Similar to srproj_fields_fall16 (13)

Clinical Recruitment
Clinical RecruitmentClinical Recruitment
Clinical Recruitment
 
TSA
TSATSA
TSA
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Research Paper
Research PaperResearch Paper
Research Paper
 
The Security Administration ( Tsa )
The Security Administration ( Tsa )The Security Administration ( Tsa )
The Security Administration ( Tsa )
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
Security Guard Training Report
Security Guard Training ReportSecurity Guard Training Report
Security Guard Training Report
 
Course Objective - Assess the importance of Port Management .docx
Course Objective - Assess the importance of Port Management .docxCourse Objective - Assess the importance of Port Management .docx
Course Objective - Assess the importance of Port Management .docx
 
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docxRunning head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
 
Class,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenClass,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differen
 
Gallagher.M Exam1
Gallagher.M Exam1Gallagher.M Exam1
Gallagher.M Exam1
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
 
The Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
The Effective Use of Unmanned Aerial Vehicles for Local Law EnforcementThe Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
The Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
 

srproj_fields_fall16

  • 1. Please Remove your Shoes: A Case Study on the Security Procedures of the Transportation Security Administration A Senior Project presented to the Faculty of the Department of Experience Industry Management California Polytechnic State University, San Luis Obispo In Partial Fulfillment of the Requirements for the Degree Bachelor of Science by Seralyn Fields December 2016 © 2016 Seralyn Fields
  • 2. ii ABSTRACT PLEASE REMOVE YOUR SHOES: A CASE STUDY ON THE SECURITY PROCEDURES OF THE TRANSPORTATION SECURITY ADMINISTRATION SERALYN FIELDS DECEMEBER 2016 September 11, 2001 was a life changing day for all Americas. It impacted the way many Americans act and think. To react with the changing world, the Travel Security Administration was created. The purpose of this study was to analyze the security regulations implemented by the Transportation Security Administration (TSA). The researcher used a case study outline to gather information regarding the main security procedures. The study found that the TSA is doing an effective job at properly screening both passengers and luggage for dangerous persons and materials. The TSA should keep in close relations with other government agencies to learn more about terrorism behaviors, while continuing to use technology to upgrade screening procedures. Keywords: security, airports, travel, terrorism, 9/11
  • 3. iii TABLE OF CONTENTS PAGE ABSTRACT........................................................................................................................ ii   TABLE OF CONTENTS...................................................................................................iii   Chapter 1 INTRODUCTION AND REVIEW OF LITERATURE.................................... 1   Background of Study ...................................................................................................... 1   Review of Literature....................................................................................................... 2   Purpose of the Study....................................................................................................... 7   Research Questions......................................................................................................... 8   Chapter 2 METHODS......................................................................................................... 9   Description of Organization............................................................................................ 9   Description of Instrument............................................................................................... 9   Description of Procedures............................................................................................. 10   Chapter 3 PRESENTATION OF THE RESULTS........................................................... 11   Passenger Screening Operations................................................................................... 11   Luggage Screening Operations..................................................................................... 13   Specialty Security Operations....................................................................................... 13   Reported Incidents........................................................................................................ 14   Chapter 4 DISCUSSION AND CONCLUSIONS............................................................ 16   Discussion..................................................................................................................... 16   Conclusions................................................................................................................... 18   Recommendations......................................................................................................... 19   REFERENCES ................................................................................................................. 20  
  • 5. 1 Chapter 1 INTRODUCTION AND REVIEW OF LITERATURE Background of Study Security is critical to the travel and tourism industry. With the industry being worth around 7 trillion dollars a year, it is imperative for worldwide economic prosperity that individuals continue to spend money on these experiences (World Travel and Tourism Commission, 2016). In order for tourism to attract travelers, the traveler must feel that their safety and freedom is protected. Because of this, most major airports have extensive security screening processes before passengers are allowed to board their flights. Terrorists have been targeting planes for attacks since long before before September 11, 2001. Flintoff (2012) reports that terrorists are attracted to planes as targets for attacks because it does not require them to ever reach the target country. They can launch the attack from the air and avoid further difficulties and obstacles that would be presented if they did initiate the attack from the target nation’s soil. Plane attacks are also enticing to terrorists because they are able to train for how to take down planes and are able to practice in a simulated environment until they are familiar with the process. In addition, planes serve as the weapon as well. The plane is essentially a flying bomb and the passengers become guaranteed victims. National airports have implemented intense screening processes to help protect their citizens from attack. Most Americans can remember exactly where they were when they learned about the September 11 attacks, which killed thousands of Americans and
  • 6. 2 brought down the Twin Towers in New York City. This attack brought terrorism into the spot light and increased fears regarding traveling and airport security. After September 11, the government took measures to increase airport passenger and baggage security in an attempt to regain the publics trust and decrease the number of possible breaches that could occur within the system. The purpose of this study was to analyze the security regulations implemented by the Transportation Security Administration (TSA). Review of Literature Research for this review of literature was conducted at Robert E. Kennedy Library on the campus of California Polytechnic State University, San Luis Obispo. In addition to books and other resources, the following online databases were utilized: Hospitality and Tourism Complete, Academic Search Premier, Statista, Google Scholar and Academic Search Premier. This review of literature is organized into the following topic areas: security, security in the travel and tourism industry, how the travel and tourism industry was affected by the events that occurred on September 11, 2001. Security is something that historically most people have taken for granted on a daily basis. They rely on agencies like police, private hired security, body guards and even other people to keep them safe. These agencies can do their best, but one can still be left in harm’s way if something were to be overlooked. As the world becomes more and more dangerous to everyday citizens, there is an increased concern to implement ample security in most public places for protection.
  • 7. 3 Most governments take citizen security seriously and have national and federal police forces. This force increases in areas that are larger or that have a particularly at risk population. In 2013, the United States spent $862 per capita in the District of Columbia, the most compared to all other 50 states (US Census Bureau, n.d.). Reaves (2015) reports that in 2013, 81% of local police officers were authorized to use energy weapons, like tasers. He also reports that about a third of departments used body-worn cameras to capture incidents while on the job. Not only are there police forces at the local and state level, but there are federal entities designed to help keep the nation safe from serious crimes and persons. This includes the Federal Bureau of Investigation and the Central Intelligence Agency. However, the monetary amount spent on local police forces is nothing compared to the over $850 billion dollars that the US has spent on the war in Iraq (Sharp, 2008). Not only is the military responsible for protecting US citizen’s freedom abroad, but the Department of Homeland Security has also increased their responsibility for domestic security (Brooks, 2002). The Department of Defense (n.d.), reports that, “The department is prepared to conduct homeland defense missions whenever the President, exercising his constitutional authority as Commander in Chief, authorizes military actions” (para. 41). The US military is trained to protect against bomb threats, terrorism attacks and more on US soil, but it remains that most of their work is done abroad. The US military is broken down into six main departments: Army, Navy, Air Force, Marine Corps, Coast Guard and the Reserve (Department of Defense, n.d.). Each department is specially trained and organized to best protect the people of the United States.
  • 8. 4 Battle fields have extended far past the warzone boundaries. With the invention of the Internet, identity theft and the ability for people to hack personal information is increasingly easier. However, the real danger is how terrorist groups are using the Internet to spread radical ideals. Terror groups can use the internet to recruit members and even train them from abroad. The United States is now engaged in a constant war against terror. It is no longer just the military who is dealing with increasing security but is seen across all industries. One industry that has particularly had to increase security is the travel and tourism field. This field includes hospitality, events, theme parks, national parks, weddings, concerts, sports tourism and more. These venues are now having to deal with an increase in their security to keep guests safe in this new era of crime. Most of these areas and venues have their own version of a police force to help control any dangerous situations that may arise. Hotels are one of the biggest components of the tourism industry. Hotels became a target for terrorists after the September 11 attacks with a series of attacks targeting the JW Marriott Hotel in South Jakarta, the Taba Hilton in Egypt, and the Islamabad Marriot and Mumbai Oberoi Hotels in the early 2000’s (Miller, 2004; “Marriot,” 2008). Because of this, hotels have to keep a close eye on guests and any possible hazard that may arise. Hotel goers reported that security is one of the most influential factors in choosing a hotel along with location, service and friendliness of staff (Knutson, 1988). Safety involves not only preventing guests from injury but also protecting employees and property. Many hotel companies have used electronic locks, fire sprinklers, smoke detectors and closed circuit televisions to help reduce risk and injury (Okumus, 2005). The main focus of hotel security is to prevent unauthorized entries onto the property. Hotels have utilized
  • 9. 5 technology to help them monitor these concerns. Middle eastern hotels have not only started using the above techniques, but have also started using X-ray machines to screen guests for dangerous goods or bombs (“Country,” 2005). Many hotels have increased their security budgets to invest in these kinds of heavy-duty equipment for their reception areas, bomb sniffing dogs, full time security and improved staff training (Howie, 2005). Along with hotels, major attractions or events also require security screening (“Why we,” 2015). Through the years, security at parks, stadiums and movie theaters have increased to due to the overall rise in soft target attacks. In 2015, Major League Baseball required all stadiums to have metal detection security. This follows the requirement by the National Football League in 2013, to require all bags taken into the stadium to be clear and National Amusements cinemas to ban any backpacks or luggage from entering the theater. Security while traveling is imperative in supporting the $7.6 billion travel and tourism industry (World Travel and Tourism Commission, 2016). The United Nations World Tourism Organization (2014) reported over 1.1 billion tourists traveled internationally. This led to over 33 million flights performed by the global airline industry in 2014 (International Air Transport Association, 2016). If passengers do not feel that their safety is being prioritized while traveling, they may become less likely to travel, resulting in an overall decline in the industry that would have worldwide effects. Bonham, Edmonds and Mak (2006) show how important safety is to the travel and tourism industry: When people travel, they do not want to be exposed to personal hazards, so safety is a paramount concern of most travelers. Not surprisingly, terrorist incidents and
  • 10. 6 other threats to personal safety—whether they are natural disasters or deadly contagious diseases—reduce people’s propensity to travel. Alternatively, some people may opt to change their travel plans and visit destinations where they are exposed to less personal risk. (p. 1) While security is on the mind of many travelers, it is often assumed that there is someone looking out for them. When security is breached, for example on September 11, citizens often become timid to travel again. September 11 was one of the most devastating and shocking events the world has ever seen. The aftermath of the attacks on the World Trade Center in New York was felt around the world. As the world reacted to the horror, they became vigilant about protecting themselves against any danger or harm that could arise. This caused an overall decrease in international travel. The World Bank (2005), reports that after September 11 the number of foreign trips saw an immediate and continuous decline. Their reports included that there were over 60 million trips in 2000 compared to just 54 million trips in 2003. Bonham et al. (2006) reported that the United States saw a large increase in those who preferred vacationing domestically after September 11. This caused an increase in the number of US citizens traveling to Hawaii and had an overall positive effect on the US tourism industry, despite the overall global impact being negative. Not only was the airline industry affected, but the hospitality industry also saw decline. Goodrich (2012) reports that hotel industries in major tourist destinations suffered significantly low occupancy rates due to cancelations of domestic and international flights. There was an overall decline of around 20-50% with an overall monetary loss of over $2 billion. Hotels had to start providing incentives to attract further
  • 11. 7 demand so that they would not lose more money. Goodrich also reports that hotels were not the only industry that suffered. Casinos in Las Vegas, Nevada reported up to 50% decreases in attendance, and guests reported feeling fearful to fly in from other states to see the entertainment shows. Goodrich states that sport tourism also suffered major losses: Security concerns caused the postponement of all 14 National Football League (NFL) games in America on Sunday, September 16, 2001. Each of these 14 football stadiums holds 60,000 to 75,000 attendees (sports fans). Each attendee spends an average of $50 for admission, $25 for food, $10 for parking, and $15 for miscellaneous items, (e.g., American flags, T-shirts), for a total of about $100 per person or about $6 million to $7,5 million revenue loss per stadium for that one Sunday, September 16, 2001, or a grand total of about $84 million to $105 million in lost revenue for the 14 stadiums on the Sunday after the attack. (p. 576) Each sector of the industry was affected deeply and suffered monetary losses. It is imperative that all sectors of the industry are providing enough security so that guests and participants feel confident enough to engage with their company. Purpose of the Study The purpose of this study was to analyze the security regulations implemented by the Transportation Security Administration (TSA).
  • 12. 8 Research Questions This study attempted to answer the following research questions: 1. What are the Transportation Security Administrations passenger screening techniques? 2. What are the Transportation Security Administrations baggage screening techniques? 3. Are the passenger screening procedures of the Transportation Security Administration effective at stopping dangerous persons from boarding?
  • 13. 9 Chapter 2 METHODS The purpose of this study was to analyze the security regulations implemented by the Transportation Security Administration (TSA). This chapter includes the following sections: description of organization, description of instrument, and description of procedures. Description of Organization A case study was done of the Transportation Security Administration which operates within the United States. The Transportation Security Administration (2016) was created on November 19th , 2001 following the attacks of September 11. The Transportation Security Administration was established under the Aviation and Transportation Security act passed by the 107th Congress. The organization’s mission is to protect the nation’s transportation systems to ensure freedom of movement for people and commerce. The Transportation Security Administration employs over 44,000 transportation security officers and are responsible for the security of nearly 440 federalized airports. The Transportation Security Administration is responsible for the security of both cargo planes and passenger flights. Description of Instrument The instrument utilized in the study was an outline developed by the researcher that organizes the best practices utilized by the Travel Security Administration (see
  • 14. 10 Appendix A). Information from the Review of Literature was used to organize the instrument and develop ideas for further research. The instrument consists of criteria used to evaluate the measures that the TSA took to best protect citizen’s safety while traveling internationally and domestically. A pilot study was completed using a similar security administration that operates abroad. Changes were made to the outline, including adding additional numbers under the screening section and adding future implementations into section F. Description of Procedures This case study was done of the Transportation Security Administration which operates within the United States. The instrument applied in the study was an outline developed by the researcher that organizes the best practices utilized by the Travel Security Administration. The research for this study occurred over a two-week period in November of 2016. Security procedures were analyzed using the TSA official website. The researcher looked at many pages included the Frequently Asked Questions, About, and Security Procedures pages to gain information regarding the TSA’s security practices. The information was then filled into the instrument and additional notes were taken. Statistics, news portals and various scholarly databases were also utilized. Statistics websites were used to understand passengers perceived safety while flying out of an US airport. News outlets were used to analyze any type of breach in the TSA’s procedures since the September 11 attacks and how the TSA responded to those breaches. Scholarly articles were utilized to identify how the TSA has changed the travel and tourism industry and how the creation of the TSA impacted the industry as a whole.
  • 15. 11 Chapter 3 PRESENTATION OF THE RESULTS The purpose of this study was to analyze the security regulations implemented by the Transportation Security Administration (TSA). A best practices approach was utilized to examine the Transportation Security Administration. This chapter includes the following sections: passenger screening operations, luggage screening operations, specialty security operations, and reported incidents. Passenger Screening Operations There are several programs and practices that the TSA uses for passenger screening purposes. The Transportation Security Administration uses millimeter wave advanced imaging technology and metal detectors to screen passengers for any dangerous or hazardous materials. These systems are able to forgo physical screenings, however in some cases an additional physical screening may be necessary. A pat down screening can be offered to those who are unable to walk through a metal detector due to medical reasons or those who feel uncomfortable with the advanced imaging technology. In these cases, a physical screening will be conducted by a TSA officer of the same sex. Pat downs can be done in a private room, and passengers can be accompanied by a person of their choice. Luggage can be taken with the passenger into the private screening area and the officer will ask if there is any injury or tender area that they need to be aware of. In these situations, the passenger will never be asked to lift or remove an article of clothing.
  • 16. 12 The Transportation Security Administration also depends on a program called Secure Flight. Secure Flight is a risk-based passenger prescreening program that cross checks passengers against trusted travelers lists before the passenger even arrives to the airport. These lists help airlines identify passengers who are both low and high risk. This program also prevents individuals on the No Fly List and the Centers for Disease Control and Prevention Do Not Board List from boarding an aircraft. Passengers that are deemed low-risk can apply for the TSA Pre-Check program which allows them to receive less strict security regulations. Passengers that are approved for the TSA Pre-Check program are able to keep shoes, belts, and jackets along with leaving laptops and liquids inside their carry-on luggage. In October of 2016, 97% of TSA Pre-Check passengers waited in line for less than five minutes. As of 2016, the TSA-Pre Check program has over three million members and operates in 180+ airports nationwide. Passengers who would like to apply for the TSA Pre-Check program are required to complete an online application and schedule an appointment at a registered enrollment center. A 10 minute in person interview is conducted along with a background check and fingerprinting. The applicant will receive written notification within three weeks of the interview of their acceptance. All travelers over the age of 18 are preferred to have valid identification to be permitted past the security screening area. These forms of identification include US drivers license, US passport, US military ID, and other approved documentation. If a passenger arrives to the airport without a valid form of identification, the TSA officer will ask them to complete a form to confirm their identity. If the passenger’s identity cannot be confirmed, they will not be permitted to board the aircraft.
  • 17. 13 Luggage Screening Operations The Transportation Security Administration also inspects all carry-on and checked luggage. There are strict rules and regulations regarding what can and cannot be taken onto the aircraft. Over 50 items are prohibited in carry-on luggage by the TSA including liquids over 3.4 ounces, spray paint, knives, baseball bats, and self defense sprays. Passengers are required to remove all liquids and laptops from their carry-on bag before placing their bag through the safety checkpoint screening area. These items will be placed in a bin individually and pushed through the detector for screening. If there is something that indicates further inspection, all carry-on luggage can be personally inspected by a TSA officer. The Transportation Security Administration inspects 1.1 million checked bags for dangerous items and explosives daily. A passenger’s bag can be screened at any point of the screening process. The Transportation Security Administration is also authorized to inspect the inside of any checked bag and go through personal belongings. If a passenger’s bag has been inspected by a TSA officer, a notification will be placed on the inside of the bag. Specialty Security Operations There are special medical and disability exceptions that are applied to the TSA screening procedures when appropriate. Medications are permitted on a carry-on but are subject to inspection by a TSA officer. Medically necessary liquids that exceed the 3.4- ounce limit are allowed but must be screened separately from other items. Those with disabilities are also not required to remove their shoes for screening. Current members of
  • 18. 14 the United States Military also qualify for TSA Pre-Check. Military personnel are prohibited from bringing weapons or ammunition with them onboard the aircraft. Children under the age of 12 and adults over the age of 75 are permitted to leave on shoes, jackets and headwear during the screening process. Formula and breast milk are also exempt from the 3.4-ounce regulation, but must be screened separately. Those with religious head coverings or other ceremonial items may be subject to a pat down if an alarm is triggered during screening. If the alarm cannot be resolved by pat down the passenger may be asked to remove the head covering in a private area. Pets are asked to be removed from all carrying cases and should be lead through the metal detector while on a leash. All animal carriers will undergo their own security screening. Reported Incidents There have been 25,000 breaches of the TSA security practices since 2001. Of these breaches, 14,000 passengers were able to access sensitive areas of the airport and 6,000 passengers and their luggage were able to get past checkpoints without being properly screened. In 2014, there were a reported 2,212 firearms that were discovered in carry-on luggage. Of those firearms, 83% were reported to have been loaded. This is the largest number of firearm discoveries in one year since 2001. In November of 2001, Richard Reid was aboard a flight from Paris, France to Miami, Florida. Reid attempted to light a fuse on the bottom of his shoe, but was taken down by fellow passengers. It was after this incident that the TSA started enforcing all adult passengers to remove their shoes during the screening process. In another terrorist attempt, the “Christmas day bomber” tried to take down a commercial airliner by
  • 19. 15 smuggling in a bomb in his undergarments. Since this attempt, the TSA implemented their current imaging system that is designed to see past clothes and alert officers of any alarms.
  • 20. 16 Chapter 4 DISCUSSION AND CONCLUSIONS Air travel is one of the most utilized methods of transportation. At the forefront of keeping passengers safe is the Transportation Security Administration (TSA). This concluding chapter includes the following: a discussion of the major findings, implications of the findings, limitations, conclusions based on research questions, and recommendations for the organization, industry, and future research. Discussion The way people travel has changed since the events that occurred on September 11, 2001. When major terrorist attacks strike they impact the travel industry. The World Bank (2005) reports that after September 11 the number of foreign trips saw an immediate and continuous decline. By providing intensive security measures, the TSA is able to ensure that passengers are safe while traveling and that the travel industry is not further impacted by airline terrorist attacks. The Travel Security Administration regulates who is allowed to fly through their passenger screening program. By using both pre- screening and in person security measures, they can protect all passengers from potentially dangerous travelers. The current study discovered that the screening processes are relatively in depth and extensive when it comes to screening passengers pre-boarding. The Transportation Security Administration should continue with its passenger screening techniques, while utilizing the newest technology to further increase the accuracy and
  • 21. 17 lessen the limitations of the current screening process. The Travel and Security Administration does not just depend on the screening of passengers, but also of their luggage. The airline industry is not the only industry that has started to screen luggage to keep guests safe. Middle eastern hotels have not only started using passenger screening techniques, but have also started using X-ray machines to screen guests for dangerous goods or bombs (“Country,” 2005). Passengers are only half the battle when it comes to protecting against terrorist attacks. Malicious passengers will try to sneak on explosives, knives, or other dangerous goods with the intent of hurting those on the plane. The Travel Security Administration is doing an adequate job keeping up with new technology and screening procedures. The Transportation Security Administration should increase the number of randomly screened bags, and continue to adjust policy where necessary after learning where there might be possibilities for a luggage security breach. Since the September 11 attacks, safety is a paramount concern for most travelers (Bonham et al. 2006). The Travel Security Administration is having to constantly adjust to different ways that terrorists could breach the system. Since the creation of the TSA, they have made several adjustments to their regulations which implies that they are keeping up with new information of ways passengers could breach the system. However, some of these implementations come after a breach has already occurred, which reduces their effectiveness. The Transportation Security Administration should continue to implement new technology and remain in close contact with agencies like the Federal Bureau of Investigation to learn trends and characteristics of dangerous travelers to prevent major breaches.
  • 22. 18 There were multiple limitations in this study. The TSA may be regulating the amount of information that is published on their security procedures as a way to preserve an element of surprise for those who are attempting to breach the system. Without getting any insider information, it would be impossible to confirm if the public has access to full knowledge of what is happening at and before passengers arrive at the airport. The information was all sourced from online, and from government owned websites that might be skewed in favor of the TSA. The researcher may also have been influenced through personal bias in being a traveler and interested in pursuing a career in a travel- related industry. Although the study ran only two weeks, the information gathered was relevant and necessary to the study. Through this study, the researcher found that most of the security regulations put in place by the Travel Security Administration are effective at keeping passengers safe. Their screening processes catches thousands of potentially dangerous items and travelers each year which help keep US airports safe. The Travel Security Administration utilizes a great balance between on-site technology and past behavior patterns to create a well rounded system that other companies could build upon. Conclusions Based on the findings of this study, the following conclusions are drawn: 1.   The Travel Security Administration passenger screening techniques utilize metal detectors, millimeter wave advanced imagining technology, and pat down techniques. 2.   The Travel Security Administration baggage screening techniques utilize
  • 23. 19 prohibited item lists, metal detectors, and random bag searches. 3.   The Travel Security Administration uses both in person and pre-check in information to flag possible dangerous passengers, which effectively prohibit these travelers from ever boarding the aircraft. Recommendations Based on the conclusions of this study, the following recommendations are made: 1.   Increase the number of security measures that are required at all travel sites and large tourist gatherings. 2.   Establish a closer relationship with agencies like the Federal Bureau of Investigation to understand patterns and characteristics of potentially dangerous persons. 3.   Increase the number of random luggage and passenger screenings that are conducted at all airports across the United States. 4.   Continue to utilize increases in technology that are implemented as soon as possible in all airports. 5.   Continue to adjust policy where necessary after learning where there might be possibilities for a luggage security breach. 6.   Further research should examine the passenger perceptions to the increase in security and how this effects their willingness to travel.
  • 25. 21 REFERENCES Bonham, C., Edmonds, C. & Mak, J. (2006). The impact of September 11 and other terrible global events on Tourism in the U.S and Hawaii. Retrieved from: http://www.economics.hawaii.edu/research/workingpapers/WP_06-2.pdf Brooks, R. A. (2002). The military and homeland security. Policy and Management Review, 2(2), 1-18. Retrieved from http://spaef.org/article/179/The-Military-and- Homeland-Security Country reports on terrorism (2005). Global security. Retrieved from: http://www.globalsecurity.org/security/library/report/2006/c-rprt-terrorism _2005-05d.htm. Department of Defense. (n.d). Department of defense 101 sections. Retrieved from: http://www.defense.gov Flintoff, C. (2012). Why do terrorists so often go for planes? National Public Radio. Retrieved from http://www.npr.org Goodrich, J.N. (2002). September 11, 2001 attack on America: a record of the immediate impacts and reactions in the USA travel and tourism industry. Tourism Management. Retrieved from: http://www.muskingum.edu/~bking/2011nyno/2- Sept-11-Impact-on-Tourism.pdf Howie, L. (2005). There is nothing to fear but fear itself (and terrorists): Public perception, terrorism and the workplace. Proceedings Social Change in the 21st Century Conference, Retrieved from http://eprints.qut.edu.au/3493/1/3493.pdf International Air Transport Association. (2016). Number of flights performed by the global airline industry from 2004 to 2016 (in millions). In Statista - The Statistics
  • 26. 22 Portal. Retrieved from: https://www.statista.com Knutson, B.J. (1988). Frequent travelers: making them happy and bring them back Cornell Hotel and Restaurant Administration Quarterly. Retrieved from: https://scholars.opb.msu.edu/en/publications/frequent-travelers-making-them- happy-and-bringing-them-back-2 Marriot blast: 4 foreigners among 53 dead. (2008). Geo Television Network Retrieved from: http://www.geo.tv/9-21-2008/25363.htm Miller, J.K. (2004). WPI – Transformations: Safe or secure? Can Your Hotel Room be Both? Safe or Secure? Retrieved from: http://www.wpi.edu./News/Transformations/2004Winter/safesecure.html Okumus, F. (2005. Safety, International Encyclopedia of Hospitality Management. Retrieved from: https://www.scribd.com/doc/145056259/International- Encyclopedia-of-Hospitality-Management-pdf Reaves, B. (2015). Local police department 2013: Equipment and technology, Bureau of Justice Statistic. Retrieved from: http://www.bjs.gov/index.cfm?ty=pbdetail&iid=5321 Sharp, T. (2008). Tying US defense spending to GDP: bad logic, bad policy. Parameters, 38(3), 5+. Retrieved from: http://go.galegroup.com/ps/i.do?p=AONE&sw=w&u=calpolyw_csu&v=2.1&it=r &id=GALE%7CA190888947&asid=0d04d6b3bed6b4820cf648d6cec88409 TSA (2016), Home page, Retrieved from: https://www.tsa.gov United Nations World Travel and Tourism Organization (2014). UNWTO Annual Report 2014. Retrieved from: http://www2.unwto.org/en
  • 27. 23 US Census Bureau. (n.d.). Per capita state and local government expenditures for police protection in the U.S. in 2013, by state (in USD). In Statista - The Statistics Portal. Retrieved from: https://www.statista.com Why We Must Re-Emphasize Security Measures. (2015). Tourist Attractions & Parks, 45(6), 32-35. Retrieved from: http://tapmag.com World Bank (2005). World Development Indicators, Retrieved from: http://data.worldbank.org World Travel and Tourism Commission. (2016). Travel and tourism economic impact 2016. Retrieved from http://www.wttc.org
  • 30. 26 INSTRUMENT I.   TSA a.   Creation i.   ii.   iii.   iv.   b.   Security Screening i.   ii.   iii.   iv.   v.   c.   TSA Secure Flight i.   ii.   d.   General operations i.   ii.   e.   Prevented/ Breach Attacks i.   ii.   f.   Future Implementations