Verified Document

Private Security After 911 The Thesis

The TSA has begun efforts to evaluate the effectiveness of security related technologies. These include items such as biometric identification systems, but the TSA still has failed to develop a plan that will guide airports when technology enhancements are developed. The TSA has pursued the procurement of checkpoint technologies in order to address critical existing vulnerabilities, yet the GAO noted that these technologies are not being deployed on a wide-scale basis (Berrick 2008). Challenges such as these must be addressed if the hybrid federal-private transportation security program is going to truly be effective in keeping America secure. Conclusion:

When the clear morning of September 11th, 2001 was shattered with the first plane strike into the World Trade Center, transportation in the United States would never be the same. The government responded quickly with the creation of the Office of Homeland Security, the passing of the Homeland Security Act of 2002 that would evolve the Office into the Department of Homeland Security, and the creation of the Transportation Security Administration. Privately employed airport screeners were replaced with federal screeners, with the exception of five airports. These five airports took part in the Private Screening Pilot Program, in an effort to meet the mandates of the Aviation and Transportation Security Act, for the Opt-Out program. Through this pilot program, the TSA Screening Partnership Program was developed allowing all airports to apply to use private...

However, nearly eight years after September 11th, there are still challenges the TSA has to address if they are to ensure the safety of American transportation.
References

Berrick, C. (15 Apr 2008). Efforts to strengthen aviation and surface transportation security continue to progress, but more work remains: GAO-08-651T. GAO Reports. Retrieved May 6, 2009, from MasterFILE Premier database.

GAP: TSA's study of private-sector airport screening flawed. (25 Feb 2009). Airport Security Report, 15(30). Retrieved May 6, 2009, from International Security & Counter Terrorism Reference Center database.

Our history. (No date). Retrieved May 6, 2009, from http://www.tsa.gov/research/tribute/history.shtm.

Program overview. (No date). Retrieved May 6, 2009, from http://www.tsa.gov/what_we_do/optout/what_is_spp.shtm.

Rabkin, N. (22 Apr 2004). Aviation security: Private screening contractors have little flexibility to implement innovative approaches: GAO-04-505T. GAO Reports. Retrieved May 6, 2009, from MasterFILE Premier database.

Summary of the President's Executive Order: The Office of Homeland Security & the Homeland Security Council. (Oct 2001). Retrieved May 6, 2009, from http://biotech.law.lsu.edu/cases/adlaw/homeland_security_summary.htm.

TSA awards FirstLine private screening contract. (7 Apr 2006). Retrieved May 6, 2009, from http://www.tsa.gov/press/releases/2006/press_release_1004.shtm.

Sources used in this document:
References

Berrick, C. (15 Apr 2008). Efforts to strengthen aviation and surface transportation security continue to progress, but more work remains: GAO-08-651T. GAO Reports. Retrieved May 6, 2009, from MasterFILE Premier database.

GAP: TSA's study of private-sector airport screening flawed. (25 Feb 2009). Airport Security Report, 15(30). Retrieved May 6, 2009, from International Security & Counter Terrorism Reference Center database.

Our history. (No date). Retrieved May 6, 2009, from http://www.tsa.gov/research/tribute/history.shtm.

Program overview. (No date). Retrieved May 6, 2009, from http://www.tsa.gov/what_we_do/optout/what_is_spp.shtm.
Summary of the President's Executive Order: The Office of Homeland Security & the Homeland Security Council. (Oct 2001). Retrieved May 6, 2009, from http://biotech.law.lsu.edu/cases/adlaw/homeland_security_summary.htm.
TSA awards FirstLine private screening contract. (7 Apr 2006). Retrieved May 6, 2009, from http://www.tsa.gov/press/releases/2006/press_release_1004.shtm.
Cite this Document:
Copy Bibliography Citation

Related Documents

Private Security in Project One,
Words: 1714 Length: 5 Document Type: Term Paper

These devices can help to ensure customer violence is limited. Additionally, by investing in interpersonal training and dispute resolution courses for employees, companies can help to control coworker violence. Furthermore, the use of EAP (Employee Assistance Programs) for frustrated workers can help to provide some outlet for frustrations, further eliminating the possible problems (Hagan, 2004). Through polite, direct, proper communication, most acts of interpersonal workplace violence can be avoided. References ASIS.

911 and Beyond Presage an Era of
Words: 4462 Length: 14 Document Type: Essay

911 and Beyond Presage an Era of New Terrorism? What Problems Does this Pose in Terms of Risk Management? For airports and the airline industry worldwide, the events of September 11, 2001 were absolutely catastrophic, especially in the United States, and resulted in major changes in risk assessment and security procedures. In the United States, all airline security was removed from the hands of the airlines and private contractors and

Security Aviation Security Pre and
Words: 10540 Length: 30 Document Type: Term Paper

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

911 Commission Report Intelligence and Information Sharing
Words: 1736 Length: 6 Document Type: Essay

Intelligence, Information Sharing, and the 9/11 Commission Report Intelligence versus information There two terms are fundamentally different for a number of reasons. The reason the terms are different can be decoded by investigating the ‘why’ from the information gathered. According to Lance (2017) the ‘how’ or ‘what’ is not important in decoding intelligence information. The resource needed to produce valued and true intelligence is by understanding why. The sole purpose any entity

Comprehensive Security Plan for the Maryland Public Safety Education...
Words: 2800 Length: 9 Document Type: Term Paper

Security Plan for the Maryland Public Safety Education and Training Center This paper will focus on a security plan designated for the Maryland Public Safety Education and Training Center. Here emphasis will be given on many things including facility assets that require protection, various threats which are directed towards the assets and the probability of loss. It is important to note that there are many complexes and facilities associated with the

Campus Security Measures the Impact of Mass
Words: 3311 Length: 12 Document Type: Essay

Campus Security Measures The impact of mass shooting at Virginia Polytechnic Institute and State University (Virginia Tech) on April 16, 2007 continues to be felt across the United States and internationally due to a massacre that killed 27 students and five faculty members. Following the weeks after the shooting, the university conducted several extensive reviews and analysis to better understand the attack and provide strategies to prevent future attacks in the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now