Tsa Implementation of Surface Security

In: Other Topics

Submitted By J8800
Words 517
Pages 3
Joe Goddard Logistics 239 Bob Casey 7.25.11

TSA Implementation of Surface Transport Security

The Transportation Security Administration or TSA, is an agency within Department of Homeland Security, which developed in the wake of the September 11, 2001 attacks on the World Trade Center. The DHS was created by the Bush Administration as a way to consolidate security information and intelligence to help defend the the United States from foreign and homegrown aggression. The TSA itself was established under the Aviation and Transportation Security Act in November 2001. (http://www.tsa.gov/research/tribute/history.shtm) Since then, the TSA has become household term for air travelers in the United States, even abroad. The familiar annoyance of long lines and uniformed officers disassembling everything you packed. However, air travel in the United States is hardly the only method of transit utilized by the everyday citizen, or terrorist in sheep's clothing for that matter. Ten years later, one may ask, what is the TSA doing to protect other modes of transport? More specifically, what are they doing to help implement security for travelvia surface modes, such as trucks, rail, and ocean vessels? The mere mention of the the Transportation Security Administration conjures up the image of an airport and “prohibited items” lists. However, being the Transportation Security Administration, additional application is needed. Now, let's move forward, to 2011.

TSA involvement in Security Of Surface Transport Beside the nation's airports, there are thousands of miles of roads, rail systems, rivers and oceans that are utilized by transport vehicles. Because these transport routes form large hubs in major metropolitan areas, which include substantial underground infrastructure, bridges, and passenger staging areas, they are vulnerable to attack. they…...

Similar Documents

Aviation & Transportation Security Act

...Aviation Aviation and Transportation Security Act Abstract The passage of the Aviation and Transportation Security Act (ATSA) in 2001 changed the way the aviation industry operated and how passengers travel. The ATSA forced the US Government and aviation to change its security culture to ensure protection of passengers and employees from future attacks like those that occurred on September 11, 2001. The ATSA was passed and signed into law in direct response to the security vulnerabilities that surfaced during the 9/11 attacks. This paper will demonstrate how the ATSA affected how US Government agencies and aviation industry upgraded security processes in an effort to prevent terrorists from attacking the US in the future. Aviation and Transportation Security Act After the September 11, 2001 terrorist attacks, the United States Congress turned its focus towards tightening airport security by voting to standardize airport security nationwide. Before 9/11, airport security was the responsibility of airports and contracted security services utilizing unskilled passenger and baggage screener personnel. Screeners where overworked and received a minimum wage average salary. Many mistakes caused by inadequate employee security training created numerous security vulnerabilities throughout the aviation industry. After the 9/11 attack, a federal government controlled, stricter, and more sweeping passenger and baggage screening replaced this flawed system. With the......

Words: 2440 - Pages: 10

Microsoft Surface

...    MICROSOFT SURFACE: MULTI-TOUCH TECHNOLOGY A White Paper Prepared By: Allison Jeffers Gainey Jeffersa2@winthrop.edu November 2008 EDUC 651 What are multi-touch surfaces? Multi-touch surfaces allow for a device to recognize two or more simultaneous touches by more than one user. Some have the ability to recognize objects by distinguishing between the differences in pressure and temperature of what is placed on the surface. Depending on the size and applications installed in the surface, two or more people can be doing different or independent applications on the device. Multi-touch computing is the direct manipulation of virtual objects, pages, and images allowing you to swipe, pinch, grab, rotate, type, and command them eliminating the need for a keyboard and a mouse. Everything can be done with our finger tips. Microsoft Surface http://www.microsoft.com/surface/index.html  Defined: Microsoft Surface is an interactive table top that can do everything a network computer can do plus more without using a keyboard or a mouse. There are four key features: direct interaction, multi-touch ability, multi-user ability, and object recognition. Direct interaction allows you to touch or grab digital information with your hands and use natural gestures to open, grasp, and command virtual objects, pages and images. The multi-touch feature enables the Surface to recognize many points of contact simultaneously so you can enlarge an image by touching the opposite corners and dragging......

Words: 2281 - Pages: 10

Tsa and Reality

...Second Article Critique: TSA now searching cars at airports Discuss the author's main argument/position and whether you agree/disagree with it. Include your rationale, not simply a review of the article. The author Lance Johnson’s position on this article is whether or not the Transportation Security Administration (TSA) really has the best interest of the people at hand and if they are actually keeping us safer. In the end I think Lance’s main argument is to completely abolish the entire corrupt TSA agency. After reading this article, and having personal experience dealing with the TSA at airports, I tend to agree quite heavily with Lance. I believe the TSA is another bloated bureaucracy that is violating our rights, and I too, like Lance, think it should be abolished. Include assumptions made by the author. Some assumptions I think that Lance makes is that the TSA as a whole are all thieves and that they control the valet security to search all vehicles. He states all the theft that takes place by the TSA, but seems like he assumes the entire agency does it. Even though I doubt he believes that, but he fails to mention that in his article. I myself am not a fan of the TSA, but I do believe there are some good people within the agency. Lance also follows the same rhetoric with the vehicle searches and comes off as if all valet security do these type of searches at all airports across the country. I doubt whether the valet security has the time or......

Words: 733 - Pages: 3

Unit 4 Assignment 1 Implementation of an Organization-Wide Security Plan

...Unit 4 Assignment 1 Implementation of an Organization-Wide Security Plan In this security plan we will need to consider all 7 IT infrastructure domains when it comes to developing access controls for the network. Access controls for our facilities will have an appropriate entry system access control that will specify which area should be locked at all times. There will be secondary locks on equipment and storage cabinets within the facility to further secure specific pieces of equipment, such as a database server. Preventing social engineering policy will specify goals for stopping social engineering that will include employee training. Access controls for systems will limit access to those employees who have a legitimate need for that resource. Strong password policy will be in effect that will require you to change it often and you will need to have uppercase, lowercase, numeric and special characters. Application access controls will provide standard testing procedures for any third party application installed in the environment for security. Access controls for data will include data encryption on all sensitive data and enforcing the principle of lowest possible access. Access control for remote access will grant access to the VPN through a two stage authentication process that includes a strong password and a token device. All of these controls will be included in our organization-wide access control plan. Now that we know what are access controls are, we will need......

Words: 380 - Pages: 2

Implementation of an Organization-Wide Security Plan

...Implementation of an Organization-Wide Security Plan Implementation of an Organization-Wide Security Purpose The purpose of this security plan is to establish security requirements to have a controlled access to the information resources. Scope This plan applies to all users of information assets including employees, employees of temporary employment agencies, vendors, business partners, and contractor personnel. Definitions Definition of some of the common terms: Authentication: is the process of determining whether someone or something is, in fact, who or what it is declared to be Availability: Ensuring that authorized users have access to information and associated assets when required. Confidentiality: is a set of rules or a promise that limits access or places restrictions on certain types of information Critical: Degree to which an organization depends on the continued availability of the system or services to conduct its normal operations. Integrity: is the assurance that information can only be accessed and modified by those authorized to do so Sensitive: Concerned with highly classified information or involving discretionary authority over important official matters. Policy Statement Access controls are necessary for the organization systems that contain sensitive or limited access data. This plan describes the mechanisms used to implement access controls and responsibilities to ensure a high level of information security. Access control......

Words: 1112 - Pages: 5

Is 4550 Security Policies and Implementation

...online use of credit cards for loan applications which are estimated to exceed $ 100,000,000 a year. A team will be formed to study the cost, performance, and the security of maintaining a Linux and open source infrastructure and determine what type of server services that are needed to support online transactions which will require a database server, Web server, file server, Simple Mail Transfer Protocol (SMTP) server, and a Lightweight Directory Access Protocol (SLDAP) server which will be set up in a 3 tiered architecture that will be located at a third-party data center. To protect online customers from fraud and identity theft, the First World Bank Savings and Loan must be in compliance with the Gramm-Leach-Bliley Act (GLBA) which protects the customer and requires the financial institution to explain their information sharing practices to their customers and safeguard sensitive data and the Sarbanes-Oxley Act (SOX) which requires top management to certify the accuracy of financial information. To enhance security you will need to implement PCI DSS. This is a security measure that has been designed to protect cardholder data and applies to all entities involved in payment card processing. To protect the network from security breaches and insure that customer information remains secure, an appropriate security policies must put in place for employees and third party vendors so they will know what they are allowed to access. These policies will apply to regular......

Words: 374 - Pages: 2

Transportation Security Administration

...Transportation Security Administration is an agency of the U.S. Department of Homeland Security that exercises authority over the security of the traveling public in the United States. The TSA was created as a response to the September 11, 2001, attacks. The organization was charged with developing policies to protect U.S. transportation, especially in airport security and the prevention of aircraft hijacking. With state, local, and regional partners, the TSA oversees security for highways, railroads, buses, mass transit systems, pipelines and ports. However, the bulk of the TSA's efforts are in aviation security. “Most of TSA’s workforce is Transportation Security Officers. About 50,000 TSOs screen 1.8 million passengers every day at airports all over the country. The TSA has taken several steps in recent years to promote continued education, foster a safe and productive work environment, and identify and reward outstanding performance.” (Transportation Security Administration, 2013) However, it seems the TSA is more interested in the appearance of security than actual security. The TSA has a huge task of ensuring security at different check points of the country. Over the last few years, they have maintained strict security measures because of the few incidents that took place at different intervals of the year. Their major task is to ensure security at the airports and they conduct security checks of the passengers with the help of various procedures. The security......

Words: 3117 - Pages: 13

Security Policies and Implementation Week Four Lab

...and roles. This will provide recovery support for the organization. ------------------------------------------------- Week 4 Laboratory: Part 2 Part 2: Craft a Security or Computer Incident Response Policy – CIRT Response Team Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Define the purpose of a security or computer incident response team * Identify the major elements of a security or computer incident response methodology * Align the roles and responsibilities to elements of a CIRT response team * Identify critical management, HR, Legal, IT, and information systems security personnel required for the CIRT response team * Create a CIRT Response Policy Definition that defines the purpose and goal of the CIRT Response Team and the Authority Granted During an Incident Week 4 Lab Part 2: Assessment Worksheet Craft a Security or Computer Incident Response Policy – CIRT Response Team Overview In this hands-on lab, you are to create an organization-wide policy defining and authorizing a Security or Computer Incident Response Team to have full access and authority to all IT systems, applications, data and physical IT assets when a security or other incident occurs. Here is your scenario: * Regional ABC Credit union/bank with multiple branches and locations throughout the region * Online banking and use of......

Words: 1852 - Pages: 8

Aviation Security

...Invasive Security: Does it Work Bruno Gerardo Introduction to Canadian Aviation (MOS 1022F) Dr. Suzanne Kearns 23 November, 2011 Abstract On September 11, 2001, the world watched in terror as America was under attack. As a result of these events, the aviation industry was restructured to improve reliability and security of commercial air travel. Although the new security changes have improved the overall safety of air travel, concerns have been raised that the changes introduced are invasive to privacy, and are an infringement of individual rights. Biometric and advanced imaging technology have been criticized for this reason, however, they have been effective at preventing further terrorist attacks. The purpose of this paper is to analyze the security measures that have been introduced as a result of September 11th 2001, and evaluate the effectiveness of the changes and how they impact both safety and privacy. Keywords: Biometrics, Advanced imaging technology, September 11 Invasive Security: Does it Work On September 11, 2001, the world watched in terror as America was under attack. Early that morning, four commercial airliners departed from Newark and Boston with arrivals at San Francisco and Los Angeles were taken over by nineteen hijackers (National Commission, 2004). Two of these aircrafts collided with the Twin Towers in New York City resulting in the destruction of both buildings. An additional aircraft flew into the Pentagon in Washington D.C,......

Words: 3337 - Pages: 14

27attack Surface Analysis and Managing an Application's Attack Surface.

...It is targeted to be used by developers to understand and manage application security risks as they design and change an application, as well as by application security specialists doing a security risk assessment. The focus here is on protecting an application from external attack - it does not take into account attacks on the users or operators of the system (e.g. malware injection, social engineering attacks), and there is less focus on insider threats, although the principles remain the same. The internal attack surface is likely to be different to the external attack surface and some users may have a lot of access. The Attack Surface describes all of the different points where an attacker could get into a system, and where they could get data out. The Attack Surface of an application is:1.The sum of all paths for data/commands into and out of the application, and2.The code that protects these paths (including resource connection and authentication, authorization, activity logging, data validation and encoding), and3.All valuable data used in the application, including secrets and keys, intellectual property, critical business data, personal data and PII, and4.The code that protects these data (including encryption and checksums, access auditing, and data integrity and operational security controls).The security implications of having a variety of client platforms are: 1. Violation of a security policy by a user2. Disgruntled employee sabotage3. Download of non-business......

Words: 442 - Pages: 2

Aviation Security

...Aviation Security Since the September 11th 2001 attack, aviation security has become a main focal point of national security. Air travel is one of the most frequently used forms of transportation within the United States and is supported by over 400 airports across the country. During this attack, terrorists utilized the weakened state of security in airports to fulfill one of our nation’s most devastating events. Due to these events security measures have increased dramatically over the last ten years to include new technology and security programs to reduce possible terrorist threats from boarding plans. I would like to understand if the correlation between the increased aviation security measures and the deterrence of terrorist utilizing this form of transportation in a terrorist plot. Understanding whether or not aviation security measures are effectively deterring terrorist threats could help shape the future of transportation security within the United States. If effective then some form of these security programs can then be applied to other forms of transportation such as railways or buses. The Transportation Security Administration (TSA) states We use layers of security to ensure the security of the traveling public and the Nation's transportation system that include intelligence gathering and analysis, checking passenger manifests against watch lists, random canine team searches at airports, federal air marshals, federal flight deck officers and more......

Words: 1350 - Pages: 6

Tsa Public Relations

...TSA Public Relations By Victoria Czaia Contemporary Issues in Homeland security 25th October 2015 Introduction The TSA is fundamental in protecting airlines and the passengers and crew that board the airplanes. The September 11th attacks caused the government to take action and try to find a method in which to keep the public safe from terrorism. The creation of the Department of Homeland Security was the largest collaborative effort between agencies that the public had ever seen. Since that time, the DHS hired many men and women for the TSA. These men and women don uniforms every day represent and protect this nation. They meet roughly over two million travelers a year. That is quite a bit of responsibility and not all passengers are content with the new systems in place. The reason for this paper is to identify whether the public support is needed or warranted for the TSA. Security and civil liberties are on a thin line these days as the citizens wish to have their safety and their privacy at the same time. This writer will identify the issues within the TSA and the public’s lack of trust with the agency. Transportation Security Administration The days of walking into the terminal to say goodbye to relatives are long gone however, that is the way the older generation remember airline protocol. Older Americans do not trust the TSA and the newer technologies as much as the younger generation. Most of these citizens feel that the government should get rid of the......

Words: 760 - Pages: 4

Air Cargo Security Issues

...Running Head: AIR CARGO SECURITY ISSUES Air Cargo Security Issues Following the 9/11 Act Abstract In August 2007, the Implementing the 9/11 Commission Recommendations Act of 2007 was signed into law requiring the Department of Homeland Security to establish more stringent procedures for the security screening of air cargo. The law required that by February 2009, 50 percent of all air cargo on passenger aircraft would be security screened, and by August 2010, all air cargo traveling on passenger aircraft must be 100 percent screened individually. The requirement presents numerous logistical, financial, and technological challenges to airlines and all entities involved in air cargo shipping. The Transportation Security Administration has lessened some of the burden by creating the Certified Cargo Screening Program, enabling the screening of cargo by certified shippers prior to aircraft delivery. On August 3, 2007, President Bush signed the Implementing Recommendations of the 9/11 Commission Act of 2007, commonly known as the 9/11 Act, into law. The Act required the Transportation Security Administration to establish a system for the 100 percent security screening of all cargo transported on passenger aircraft within three years. Additionally, the 9/11 Act required that 50 percent of air cargo would be screened on passenger aircraft by February, 2009. Air cargo handlers in all aspects of the logistical arena have responded well to the 50% mandate, but the 100%......

Words: 3343 - Pages: 14

Microsoft Surface

...    MICROSOFT SURFACE: MULTI-TOUCH TECHNOLOGY A White Paper Prepared By: Allison Jeffers Gainey Jeffersa2@winthrop.edu November 2008 EDUC 651 What are multi-touch surfaces? Multi-touch surfaces allow for a device to recognize two or more simultaneous touches by more than one user. Some have the ability to recognize objects by distinguishing between the differences in pressure and temperature of what is placed on the surface. Depending on the size and applications installed in the surface, two or more people can be doing different or independent applications on the device. Multi-touch computing is the direct manipulation of virtual objects, pages, and images allowing you to swipe, pinch, grab, rotate, type, and command them eliminating the need for a keyboard and a mouse. Everything can be done with our finger tips. Microsoft Surface http://www.microsoft.com/surface/index.html  Defined: Microsoft Surface is an interactive table top that can do everything a network computer can do plus more without using a keyboard or a mouse. There are four key features: direct interaction, multi-touch ability, multi-user ability, and object recognition. Direct interaction allows you to touch or grab digital information with your hands and use natural gestures to open, grasp, and command virtual objects, pages and images. The multi-touch feature enables the Surface to recognize many points of contact simultaneously so you can enlarge an image by touching the opposite corners......

Words: 2281 - Pages: 10

Tsa Terrorizes Wheelchair-Bound

...ridiculous the "national security" theater is in America today, a U.S. Transportation Security Administration screener at O'Hare International Airport in Chicago has been caught on tape patting down a three-year-old in a wheelchair, and swabbing the boy's body, cast, and chair for explosives. Russia Today reports that the boy and his parents, grandparents, and two siblings were on their way to Walt Disney World in Florida when a TSA screener decided to pull the boy aside. As captured by the boy's father, the screener, who in all fairness was gentle and kind to the boy during the process, proceeded to pat the boy down, lift up his shirt, and swab his person and wheelchair for explosives. Visibly shaken throughout the entire experience, the young boy is seen on camera shaking and scared while his father, who was filming the incident, repeatedly reassures his son that everything will be fine. However, the boy's father was not allowed to get near his son and comfort him during the process, and was reportedly refused by TSA screeners from even holding the boy's hand. You can watch a video clip of the incident at the following link: http://www.digitaljournal.com/article/321444 "My little boy wanted me to come over to hold his hand and give him a hug. He was trembling with fear," said the father to the Toronto Sun. "I was told I could NOT touch him during this process. Instead, we had to pretend this (procedure) was 'OK' so he didn't panic." According to TSA, the......

Words: 428 - Pages: 2