StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Transportation and Security administration - Research Paper Example

Cite this document
Summary
The paper provides viable courses of actions by providing a better understanding of homeland security, and the roles provided by Transportation and Security Administration (TSA) with the responsibilities and practices, policies, equipment, and civilian prospective. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Transportation and Security administration
Read Text Preview

Extract of sample "Transportation and Security administration"

? Teacher’s TSA [Transportation and Security Administration] needs to focus on broader intelligence gathering, knowledge management, and enhanced coordination with international partners Annotated Bibliography Johnstone, R. W. (2007). Not safe enough: Fixing transportation security. Issues in Science and Technology, 23(2), 51-60. Retrieved from: http://search.proquest.com/docview/195926709?accountid=8289 The author Johnstone in this paper has investigated and compared the security level of the transportation security before and after the terrorist attacks of September 11, 2001. Before attacks, criminal activity and smugglers were the main aim to be stopped while after 5 years of attacks, the vulnerability of attacks became much smaller and improvements were observed. The paper also states that despite all the efforts, problems in the security system could still be detected. Malainen, K. (2011). Detecting danger. Science World, 68(1), 18-21. The author Malainen has discussed the science of scanners, passenger concerns, and the terrorism over time. According to the author, the Transportation Security Administration (TSA) which is a government agency has introduced full body scanners in order to combat the rising terrorist fear in the world. It is mentioned in the paper that the scanners make use of X-rays as well as the millimeter waves and works by bouncing of the skin and producing images of any concealed item. As for the passengers’ concern, adverse health effects and invasion of personal privacy are two main issues that have been raised. McNeill, J. B. (2010), TSA has its security priorities in the wrong place. U.S. News & World Report, 1. The author McNeill has mentioned the use of full-body scanners in the airports and the way Department of Homeland Security is dealing with it. According to this read, the author has mentioned that introduction of new technologies is not a problem, but the way it has been introduced as given the impression that everyone is a terrorist has thus raised a lot of concerns regarding the full-body scan and an aggressive pat-down as part of routine screening. TSA increases reliance on trace machines for bag screening. (2003). Airport Security Report, 10(15), 1-1. The paper investigates the impact of post-9/11 airport security measures on air travel as well as the process of screening baggage and passenger screening measures. These two being one of the major changes in security has worked towards reducing the level of passengers flying. The evidence is provided that baggage screening was the basic factor in reducing this number and thus had more effect as compared to contemporaneous price changes, airport-specific shocks, schedule changes, or other factors. TSA deploys more AIT units. (2011). Airport Security Report, 19(23), n/a-n/a. This article mentions the effort made by the TSA regarding the issues raised by the security measures used at the airport. According to this article TSA has introduced AITs that worked towards reducing the concerns of passengers regarding their privacy. Outline The thesis statement this paper would be holding is “By focusing on risk reduction through pro-active measures such as broader intelligence gathering, knowledge management, and enhanced coordination with international partners, TSA will make equipment as not the only answer to Homeland Security of our Nation. It has been observed that our airports are very vulnerable to a terrorist incident. Most of us have also experienced the security at our country’s airports and are well known of the fact that the specific aspects of airport security are specific vulnerabilities as well. With the problem identified, the goal of this paper is to provide a solution in identifying different security capabilities for security at airport that affect the citizens of this nation; besides just equipment. One must understand that the current strategies are not enough in making this country safe through airport security. Currently, body scanners, pat downs, biometrics, cast scopes, explosive trace detections and imaging technology are used to ensure efficient solution for the current problem which has caused a lot of controversies in the past (TSA). Thus, there is a need to provide viable courses of actions. This paper aims to do the exact same, i.e. providing remedy for this bad course by changing the operational mission of the TSA, and focus on risk reduction through pro-active measures such as broader intelligence gathering, knowledge management, and enhanced coordination with international partners. This research will also provide a better understanding of homeland security, and the roles provided by Transportation and Security Administration (TSA). The use of the social side of knowledge management has also been mentioned in the paper and it has been stated that it must be brought in discussion. In this way, phrases like what we know, how to share it broadly, and how to exploit it for new knowledge can be easily answered. In this case, the agreeableness of the government is never enough. It so happens, that in such circumstances, those who are being governed need to become more cooperative (Mortlock). Abstract The aim of this study is to provide a solution in identifying different security capabilities for security at airport that affect the citizens of this nation; besides just equipment. In order to provide other solutions, the paper states that the current strategies are not enough in making this country safe through airport security. The paper also provides viable courses of actions by providing a better understanding of homeland security, and the roles provided by Transportation and Security Administration (TSA) with the responsibilities and practices, policies, equipment, and civilian prospective. The theoretical framework identifies a research direction that highlights some basic dimensions. The research collected data through materials on TSA that covers issues since September 11, 2001. I will also use TSA web site to gather more information on their practices and services. The initial research was conducted through Homeland Digital Library, EBSCOhost, and ProQuest for book and articles. It was identified that the information needed to research in the paper includes the current mitigation strategies for intelligence gathering, knowledge management, and enhanced coordination with international partners on airport security for the security of the nation. Also, the research technological solutions which have not been implemented for airport security were also identified. It has been identified in the paper that intelligence gathering, knowledge management, and enhanced coordination with international partners, manages to introduce the factor of access. This means that the TSA can easily identify areas that are available for penetration by others. Through intelligence gathering, knowledge management, and enhanced coordination, the organization can also identify, gather and disseminate data that will enable TSA to respond to threats that are time-sensitive, thus handing them speed. Further, greater insight is also provided in such way that a greater cultural understanding is achieved and misinterpretation that may occur in the analysis of TSA could be cleared. Another advantage that can be achieved is the ability to perform an action in direct manner. Lastly, it is a great cover for the obvious US actions that can be easily covered as local ones (Rosenbach & Peritz, 2009). Research Paper It has been observed that almost every airport is highly vulnerable to terrorist incidents. Most of us have also experienced the security at our nation airports and are well known with the fact that the specific aspects of airport security are specific vulnerabilities as well. Many studies have been conducted in recent days that have investigated and compared the security level of the transportation security before and after the terrorist attacks of September 11, 2001. Before attacks, criminal activity and smugglers were the main focus of security which needed to be stopped while after 5 years of attacks, the vulnerability of attacks became much lesser and improvements were observed. However, despite all the efforts, problems in the security system can still be detected. All of these problems that are linked to the transportation security system intend to travel further the area of personnel that includes custom agents and checkpoint screeners and aims to include the system priorities along with the accountability and funding as well (Johnstone, 2007). Over this period, serious passenger concerns regarding the security techniques at the airports have been on the rise. Recently, the Transportation Security Administration (TSA) which is a government agency has introduced full body scanners in order to combat the rising terrorist fear in the world. It has been observed that the scanners make use of X-rays as well as the millimeter waves and works by bouncing of the skin and producing images of any concealed item. As for the passengers concern, adverse health effects and invasion of personal privacy are two main issues that have been raised (Malainen, 2011). The use of full-body scanners in the airports and the way Department of Homeland Security is dealing with it is thus a major concern on the rise. Of course one cannot argue that the introduction of new technologies is not a problem, but the way it has been introduced by the government authorities has given nearly everyone the impression that everyone is a terrorist. Moreover, it is also a very embarrassing way for the passenger as well as the TSA officer to be a part of such a security measure. Thus a lot concerns regarding the full-body scan and an aggressive pat-down as part of routine screening have been talked about (McNeill, 2010) The impacts of post-9/11 airport security measures on air travel, as well as the process of screening baggage and passenger screening measures are two of the major changes in security that have worked towards reducing the level of passengers flying. The evidence is provided that passenger screening measures was the basic factor in reducing the number of people taking flights and had thus more effect as compared to contemporaneous price changes, airport-specific shocks, schedule changes, or other factors. Statistics state that over the years, air travel has experienced a lot of cost in air travel. According to data, this industry, has lost a total figure of $1.1 billion out of which, 11 percent is due to the sad incident of 9/11 (Airport security report, 2003). Currently, TSA has introduced Advanced Imaging Technology (AITs) that worked towards reducing the concerns of passengers regarding their privacy. According to the data from airport security report (2011), eight millimeter wave AIT units were provided to the airports so that the privacy of the passengers and the checking process could be made more efficient. These units contain ATR software that detect all kinds of dangerous items and have the history of detecting a total number of 300 dangerous metallic and non metallic objects since the year 2010. Therefore, a total of 100 airports have been facilitated with nearly 500 AIT units. Other than the AIT units, advanced imaging technology also works as an efficient tool to ensure security as well as the privacy of individuals. If we take a look at the security measures being used at the airports, one realizes that they are not convenient at all. This can be easily explained with the example of passengers coming at least two hours before their flight departs; the random hand-searches of passengers and the carry-on baggage. Studies state that almost 63 percent of individuals that are travelling have now found flying highly inconvenient and have thus found it as a hassle (Woodyard & De Louis, 2003). According to Sharkey (2002), the airlines have lost a lot of money due to the increased security measures and stated that these airlines have lost billions, as a severe reduction in business air travelers have decided to cut back on flying. Talking specifically about the passenger screening measures, studies find them quite ambiguous. The introduction of new methods and machines has thus introduced the point of rigorous for the passengers, all in the name of privacy and efficiency. So, these methods not only stretch the time for the passengers but also the heights of inconvenience one could imagine (Seidenstat, 2004). Of course, many passengers have started to feel much safer due to increased security. According to a study conducted by Zogby in the year 2004, 59 percent of passengers reported that they now feel much safer due to the security measure adopted by the authorities (American Foundation of Government Employees, 2004). It has also been observed that many airports have become more flexible and aim to reduce the disruptions between the processes. But the fact of the matter remains the same that current strategies are not enough in making this country safe through airport security. Therefore, this paper states that focus on risk reduction through pro-active measures such as broader intelligence gathering, knowledge management, and enhanced coordination with international partners, TSA will make equipment as not the only answer to Homeland Security of our nation that must be made. Therefore, the first and foremost step that needs to be taken to ensure effective security is to identify the need for good intelligence management. Basically, this type of intelligence management must first form the basis of what should be known. This is so, because if the first requirement is not met, then the data collected would only be a collection of unsystematic data where the decision making falters due to incomplete information. The data collected must then be evaluated and transformed into useful information. Further the reliability of these resources must be verified through the use of efficient use of a standardized system (Rosenbach & Peritz, 2009). The above mentioned process is the process of good intelligence gathering, knowledge management, and enhanced coordination with international partners. Basically, as the defense department in our country keeps good relation and liaison with other countries so that they could achieve the diplomatic objectives easily, similarly Transportation and Security Administration could also focus on broader intelligence gathering so that the security could be strengthened. The advantages of this step could be explained in the following lines. To begin with, intelligence gathering, knowledge management, and enhanced coordination with international partners manages to introduce the factor of access. This means that that the TSA can easily identify areas that are available for penetration by others. Through intelligence gathering, knowledge management, and enhanced coordination, the organization can also identify, gather and disseminate data that will enable TSA to respond to threats that are time-sensitive, thus handing them speed. Further, greater insight is also provided in such way as a greater cultural understanding is achieved and misinterpretation that may occur in the analysis of TSA could be cleared. Another advantage that can be achieved is the ability to perform an action in direct manner. Lastly, it is a great cover for the obvious US actions that can be easily covered as local ones (Rosenbach & Peritz, 2009). Evidently, if such an action is implemented, there needs to be a continuous management process that needs to be constantly updated and evaluated. Basically, when intelligence gathering, knowledge management, and enhanced coordination techniques are implemented, motivations of liaison partners, the scope of the relationship, and the potential for other influences must be constantly kept in check. Explaining the first point, the other side of threat is always or mostly concerned with themselves. So the organization in this case must always be aware of the motives of other parties as ulterior motives always come to the surface in the end. This is so because the other parties could be working towards their own self interest by exploiting the significant capabilities of the TSA. Also, appropriate type of partners must be developed. This means that those types of partnerships that best suit the requirements must be made. Some relationships could be short-term while other could be of long-term, depending upon the strategies. Most importantly, the TSA must be well aware of the potential for influence from the other side (Rosenbach & Peritz, 2009). The international cooperation has always been relying on such measures to deal with many problems that have risen. Therefore, TSA can also adopt such a way that can use international cooperation with other countries. After the era of World War II, there have been many instances where the intelligence of two countries has worked together that have been formal and ad hoc. To state the point more clearly, it is eminent at this stage to mention some of the links that have been established in the recent years. Examples of such co operations with other countries and the US can be explained in the following lines (Rosenbach & Peritz, 2009). In 2000, it was reported that the US government had formed an alliance with the United Kingdom to deal with a very dangerous plot. Sources state, that the cooperation between the two countries managed to deal with the dangerous plot to destroy a civilian aircraft over the Atlantic Ocean. Another cooperation between the US and Pakistan was reported in the year 2003. According to news, the cooperation between these two countries managed to deal with the criminal mastermind of 9/11. It so happened that the two countries worked together to capture Khalid Sheikh Muhammad, who was allegedly the criminal mastermind of the 9/11 incident. One more example of the increased cooperation is the US and third world countries alliances and cooperation that deal with narcotics. The cooperation makes use of satellite imagery that helps to deal with the production of narcotics which is also a big issue that the airports have to deal with (Rosenbach & Peritz, 2009). Naturally, the use of intelligence gathering, knowledge management, and enhanced coordination with international partners do bring in a few side effects that can be dealt with if efficient monitoring and vigilant control is established by the TSA. The first downside of intelligence gathering, knowledge management, and enhanced coordination with international partners about which TSA must be vigilant about are the conflicting interests. Basically, it might happen that the adversaries are provided critical information that might be used against the TSA. Thus, the classified information regarding interests, strategies and plans must be kept in a tight check. Other than that, hostile collection is also an issue that might occur. This means that other parties may try to gather information related to the TSA and its security level that could collect sources and methods through overt or covert means. Lastly, moral hazards must be kept in check. The fact of the matter is, that TSA, while intelligence gathering, knowledge management, and enhanced coordination with international partners, must consider the threat of moral hazards. This is so, because many members of the organization might get involves with activities that might be illegal and unethical. Therefore, with these methods kept in check, efficient handling of security could be achieved by the TSA (Rosenbach & Peritz, 2009). The failure in knowledge management was the most apparent in the incident of September 11. Since then, this filed has been questionable. Therefore, in such circumstances, the use of the social side of knowledge management must be brought in discussion. In this way, phrases like what we know, how to share it broadly, and how to exploit it for new knowledge can be easily answered. In this case, the agreeableness of the government is never enough. It so happens, that in such circumstances, those who are being governed need to become more cooperative (Mortlock). Therefore, the social side of the knowledge management is something that needs to be given a deeper look as it is the most neglected side and probably a better solution than the machines being used should be employed to handle the security. Here, the people who generate knowledge are gathered in knowledge circles. That is, the circles can occur as disciplinary, geographically, and culturally diverse. The social circle would also contain a much higher level that would be containing representatives connected back to the foundational circles. With the discussions between these groups from the foundational circles, the second level representatives would have third level representative for the group and so on. In this way, the knowledge generated from each level would work towards gathering information and knowledge that is concentrated, synthesized, and shared as it is a generation from the common. These circles would thus involve each factor from the lowest level to the highest level of the government, thus providing valuable information to the TSA for efficient security. Therefore, the use of such a process would eventually make the knowledge circles a part of the social fabric of work in the TSA (Mortlock). References American Federation of Government Employees (2004): New Poll Shows, Washington, D.C., April 23. Johnstone, R. W. (2007). Not safe enough: Fixing transportation security. Issues in Science and Technology, 23(2), 51-60. [Online] Retrieved 27 February, 2012 from: http://search.proquest.com/docview/195926709?accountid=8289 Malainen, K. (2011). Detecting Danger. Science World, 68(1), 18-21. McNeill, J. B. (2010), TSA has its security priorities in the wrong place. U.S. News & World Report, 1 Mortlock. M , Adigital: People Key To Managing Knowledge, The Public Manager Quarterly For Practitioners. Rosenbach, E. and Peritz, J. A., July 2009, "Intelligence and International Cooperation", Memo in report Confrontation or Collaboration? Congress and the Intelligence Community Seidenstat, Paul (2004): “Terrorism, Airport Security, and the Private Sector," Review of Policy Research, 21(3), Sharkey, Joe (2002): “The Lull Before the Storm for the Nations Airports," New Poll Shows," New York Times, March 25. Transportation and Security Administration, [Online] Retrieved 27 February, 2012 from: http://www.tsa.gov/approach/index.shtm TSA deploys more AIT units. (2011). Airport Security Report, 19(23), n/a-n/a TSA increases reliance on trace machines for bag screening. (2003). Airport Security Report, 10(15), 1-1 Woodyard, C. & De Lollis, B. (2003): Most Flyers Feel Safer, York Times, p. C7, November 19. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Transportation and Security administration Research Paper”, n.d.)
Retrieved from https://studentshare.org/science/1395498-tsa-needs-to-focus-broader-intelligence-gathering
(Transportation and Security Administration Research Paper)
https://studentshare.org/science/1395498-tsa-needs-to-focus-broader-intelligence-gathering.
“Transportation and Security Administration Research Paper”, n.d. https://studentshare.org/science/1395498-tsa-needs-to-focus-broader-intelligence-gathering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Transportation and Security administration

Hurricane Katrina on the Coast of the United States

They must have known that KATRINA 4 evacuation would not be easy, not only because of all of the people involved, but because there were a lot of people in the area without transportation and money to evacuate.... Running head: KATRINA 1 Katrina Educational Institution KATRINA 2 Katrina “Hurricane Katrina was one of the strongest storms to impact the coast of the United States in the last 100 years” (Hurricane Katrina, 2005)....
9 Pages (2250 words) Research Paper

The Transportation Security Administration

hellip; In the United States, this responsibility has been delegated to the Transport security administration (TSA).... The TSA is also charged with the responsibility of inspecting rail cars, looking for bombs at checkpoints in and around the country's airports, and patrolling subways (Transport security administration, 2008).... Its vision, though not yet attained, is to persistently guide the standards for distinction in transportation security through its processes, technology, and people (Transport security administration, 2008)....
15 Pages (3750 words) Essay

Commercial Aviation Safety

Aviation is considered to be one of mankind's greatest inventions for it has been a dream for men to soar unto the heavens and touch the skies.... It has evolved from a mere scientific curiosity into something that brings people and cultures closer together.... hellip; One of the forms in which aviation is used is in commercial aviation, otherwise known as civil aviation ("Civil Aviation", 2006)....
11 Pages (2750 words) Essay

Responsibilities of Management in International Business within Lockheed Martin

With its focus on high technology, it was able to get involved with the US Postal Service, the Department of Defense, the Social Security Administration, and the Transportation and Security administration among others, it said.... Three of its many focus areas are weapons systems, social services, and homeland security....
14 Pages (3500 words) Case Study

CV Letter for Transportation Security Administration

The paper contains a CV letter in which the author would like to be given the opportunity to transfer as an accounting staff in that department of TSA.... The author has the privilege of working for TSA as a screener for 8 years now and never had any disciplinary remarks since my entry.... nbsp; … I would like to continue to be part of your workforce is guided by values of integrity, honest dealing, treating everyone with respect and dignity, striving for mutual advantage, transparency and contributing to human progress....
1 Pages (250 words) Personal Statement

Transportation Security Administration

The author of this assignment "Transportation security administration" focuses on the Customs Border Protection which is among the largest and very complex department from within the Homeland Security.... Passengers only need to provide their ID and boarding pass to Transportation security administration (TSA) employees on entry to the immigration departure department.... Even with proper training, they may not defend themselves in the case of a massive attack by several terrorists with highly specialized weapons and technologyWorks CitedTransportation security administration, (TSA)....
2 Pages (500 words) Assignment

Methods used by Transportation Safety Administration

To… These strategies include the use of human resources especially the Transport security administration that identifies new technology to incorporate into the aviation sector to stay ahead of the The body ensures that the nation's transport systems are secure through use of sophisticated technologies like bottled liquid scanner, Biometrics, Credential Authentication Technology, explosive trace detection explosive detection system and threat image projection.... Secure Flight Plan is another security measure by TSA where airline passengers' information is compared to that in the governments watch list....
5 Pages (1250 words) Term Paper

The organizational structure of the TSA

… The New TSA Security MeasuresOn 19th November, 2001, one month after the September 11 terrorist attacks, the United States Government established the Transportation security administration (TSA), which is now under the Department for homeland The New TSA Security MeasuresOn 19th November, 2001, one month after the September 11 terrorist attacks, the United States Government established the Transportation security administration (TSA), which is now under the Department for homeland security....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us