123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Transportation Security Administration

Profile Picture
By Author: Sherry Roberts
Total Articles: 576
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The Transportation Security Administration (TSA) is the transport controlling and management authority in the USA. The TSA apply the latest technology in the attempt to maintain security in the transportation sector. The high level of sophisticated security equipment enables the TSA to deal effectively and efficiently with the emerging threats. The TSA apply the layered risk-based approach to enhance security through the advanced screening of cargo on transit. The Transportation Security Administration had initialized with the purpose of strengthening the security in the transportation sector. The Transportation Security Administration focused on providing the rights and freedom of movement for the individuals in their daily operations. The transportation security administration scope of security cover the nation’s airport transportation, the aviation security, the Traveler Redress Inquiry program (DHS TRIP), Transport security results, the cargo screening and the visa waiver program.
Improving Security through Layered Risk-based Approach
The TSA transportation security systems apply the layered Risk Approach methodology to maintain a secure environment in the entire transportation system (United States 2010). The Layered Risk-Based Approach has an implementation in the aviation transportation sector, the rail transportation sector, the highway transportation sectors and the pipeline transportation sectors. The law enforcement agencies and the intelligence communities are responsible for setting the standards and the policies utilized in carrying out the transportation transactions and operations that guarantee high-quality security paradigms. One of the standards utilized by the security team is the layered risk-based approach. The strategy ensures total security to the passages and the cargo in transit. The layered risk-based approach enhance the high level of visibility that guarantee the public that the time spent during the transportation period shall entail safety and secured environments. The layered risk-based approach allows the airport checking points where the transportation security officers operate. The aviation sector uses a single security layer that protects the aviation (Cobb, & Primo, 2003). The security layer applies the following measures in the implementation of the security to the public. The security approaches applied include visible approaches and invisible approaches to the public include the following.
a. Intelligence gathering and analysis approach that involves the application of the artificial intelligence systems to determine the status of the goods and people on transit.
b. Checking the passenger manifests against the watch lists involves investigation on the passengers as the use the various transport facilities to visit the USA.
c. Random canine team searches at the airport approach involve the use of heavily trained personnel to implement the security function in the transportation hub. The security experts make use of trained dogs to ensure good and secure operations in the transportation hub.
d. Federal air marshal’s approach ensures that the air transportation has secured and system approach that guarantee security on the air transportation. The screening and the investigation of travelers get implemented by the federal air marshals.
e. Federal freight deck officers refer to agency security team that ensures that every operation within the transportation environment has security as stated by policies. The experts monitor the transportation environment using different technologies to ensure that the transportation hub is free from external and internal attacks.
The TSA continually promotes the security innovations that evolve the systems of securing the passengers. TSA promotes the development of the security methodologies applied in the public transport by impacting knowledge and skills in the development of the intelligence security systems. The aviation sector has developed the ways and the methods that apply sophisticated artificial intelligent system to mitigate the terrorist risks and threats. The layered risk approach has improved the screening operation through the implementation of the artificial intelligence systems that provide the dynamic security in the business inventory and the people on the transit (United States, 2004).
DHS Traveler Redress Inquiry Program (DHS TRIP)
DHS Traveler Redress Inquiry Program refers to a single point provided to care for the individuals who encounter problems during the screening process in the transportation hub. The DHS Traveler Redress Inquiry Program allows the individuals to ask enquire for the issues that affect their transportation process. The checking points like the airports encounter several problems and commotions for the new users of the transport systems (National Research Council (U.S.), 2007). The DHS Traveler Redress Inquiry Program platforms get provided to assist the travelers to have enough awareness of the issues concerning the mode of traveling. The DHS Traveler Redress Inquiry Program provides the elaborate instructions to the travelers to accommodate them within the transportation sector. The solutions solved by the DHS Traveler Redress Inquiry Program include watching list issues. The watching list issues involves the inability of the travelers to capture the language of inability to communicate in the language required. The traveler gets the immediate assistance on reporting the matter through the DHS Traveler Redress Inquiry Program. The travelers faced by the screening problems at the transport checking points get encouraged to report their cases to the DHS Traveler Redress Inquiry Program to get the clear understanding on the matters pertaining the screening of the people at the checking points. The travelers should seek the assistance of the DHS Traveler Redress Inquiry Program when they have full conviction that their rights and freedoms for travelling get compromised by the travelling control team. When the travelers feel that they get inferior treatment from the checking team as well as the unfair or incorrect handling of the issues of personae matters the DHS Traveler Redress Inquiry Program is used to report the matters for safe and secure travelling. The travelers should get the DHS Traveler Redress Inquiry Program assistance when they get denied the opportunities to travel from one state to another. The inclusion screening that may have imposition should get reported to the relevant authorities. The screen of i0ndividuakls should get operated once, any other extra screening does not form the part of the DHS Traveler Redress Inquiry Program security strategy. The screening exercise must take place at the transportation hub and particularly in public (Palmer, et al… 1982).
DHS Traveler Redress Inquiry Program has the responsibility to welcome the legitimate travelers on behave of the state and the Homeland Security. The DHS Traveler Redress Inquiry Program has the responsibility to secure the country from through external criminals who may try to use the transportation mediums to cause travelling problems to the members of public. The individuals should who get denied the permission to entry or leaver the USA should file an enquiry of redress to the DHS Traveler Redress Inquiry Program for more considerations. The DHS Traveler Redress Inquiry Program deals with the permission entry and problem dealing with the movements outside the USA transportation hub. The DHS TRIP team seeks the review of the travelers cases through a neutral office that performs the adjudication of the entire request addressed to the DHS TRIP team. The team has different locations and the situations within the transportation hubs. The traveler receives a unique number to help in the process of accessing the feedback to the right individuals. The redress control number or the special identifier assists the traveler to get the feed back within short time. The redress control number allows the specific traveler to check the complaint status online to enhance fast understanding of the matter. The traveler may get an advice on booking the air ticket through the online platform. The redress control number should get proper maintenance until all the matters acquire the appropriate solution (National Research Council (U.S.), 2007).
The Aviation Security
The application of the TSA secure program the DHS require to perform the secure watching of the passengers travelling in and out of the USA through the air transport (National Research Council (U.S.) 2006). The air craft operators and the foreign air carrier flights pass the process of watching the passengers who undergo 100 percent screening. The TSA secure flight program is implement in the response to attempt to identify the individuals who may pose threat to the aviation transportation or to the nation or the entire state, the victims identified with the screening biasness get recommendations for more sophisticated screening. The victims identified by the screening system may get the banned from using the aircraft through as prohibition request to cease from boarding the aircraft for the safety of other human. The TSA secure flight program is never conducted in the foreign countries. However the USA security agency provides the TSA secure flight Program checking in the air line transportation hubs like the united airlines in the northern and the southern America states. The US airways in some states who have subscribed to the TSA security program provide the TSA security programs (Palmer, et al… 1982). The Alaska Airlines and the Delta airlines provide the security screening programs under TSA security program. The TSA require the states handling the last departure to the USA to conduct a quality effective and efficient screening on the travelers (United States. 2009). The security standards specified in the TSA screening policy document must apply in the last departure to the USA. The Travelers boarding to USA must complete the form for the traveler’s application to help in the process of ensuring that the traveler has complied with the standards of the screening implemented by the TSA security program. The TSA security team has enforced the quality checking of travelers to ensure that the terror attacks do not get access to the travelers in transit to USA. The TSA has started the training activities and the programs to foreign countries in response to the increased terror attacks. The individuals get trained on the security matters involving the risk based strategies like the cargo security, the screening techniques, the vulnerability assessment and the airport security management.
Cargo Screening
The global supply chain management ensures secure and prominent functioning of the national cargo security and the economic prosperity. The global supply chain provides the goods that feed our domestic critical infrastructure and support the lives of individuals. All nations country world rely heavily on the goods transported through the global supply chain. The global supply chain department is implementing the multilayered approach to air cargo security. The cargo security involves screening the goods and the services for transit. The department works with established shippers who have the equipments for long distance transporting of goods across the sea. The global chain department works with the explosive detection canine teams responsible for detecting and destroying explosive gadgets like the bombs. The global chain department also works with the covert testers who have the responsibility of testing the quality and standardization of chemicals and the software components transported along with the goods and services. The supply chain department team also works closely with the no – notice inspections of the cargo operation that randomly inspects the contents of the cargo in transit (Cobb, & Primo, 2003).
The Strategies Promoting Efficient and Secure Movement of Goods
The international strategy for Global Supply Chain establishes two main goals for efficient and effective movement of goods and services. The first one is to promote efficient and secure movement of goods and supplying containers (United States 2011). The second one is fostering global supply chain systems that may wi0thsytand evolving threats and hazards as well as recovering from disruptions. The international community in collaboration with the United States government, as well as the key stakeholders, have galvanized and integrated efforts to continue to enhance risk management efforts. The international community has also progressed in protecting the global supply chain through the programs like the Global Shield. The collaboration of World customs organization, the Interpol and the United Nations office on drugs and crime launched the global shield in the support of the Global shield. Within the global supply chain departments, several other supplementing departments have raised to support the supply chain. The Container Security Initiative (CSI) refer to a global chain supply security strategy that deals with the security of the containerized cargo shipped to the United States from other parts of the world. The CSI policies address the threat and risks to border security and the global trade that terrorize implement to supply the weapons. The CSI allow the United States custom and the border protection (CBP) to analyze and perform the investigation on the high-risk maritime containerized cargo within the USA as well as within the foreign seaports (Cobb, & Primo, 2003). The USA agency on the marine platforms works in conjunction with the host government support services to verify and validate the contents of the cargo transferred across the seas to the USA.
The USA Visa Waiver Program
The Visa Waiver Program (VWP) refers to the agreement plan between the government of the USA and 38 foreign government states to allow the citizens to travel in the USA for 90 days for the purpose of the business and the tourism without the visa. The foreign government must also allow the United States Citizens to travel in the foreign country for 90 days without the visa for the purpose of the business transactions and the tourism. The Visa Waiver Programs project got initiated by the Department of the homeland security with the consultation with the state department’s permits. Through the project, the USA has partnered with very many foreign partners in the promotion of the business and the tourism sector. The Visa Waiver Programs implements the risk-based multi – layered approach for detecting and preventing a terrorist from gaining access to the USA (The United States, 2004). Through the risk-based multilayered approach, the USA government can mitigate the criminals from traveling to the USA. The Visa Waiver program has promoted the urge in conducting the regular national level risk analysis and assessment process concerning the individuals desiring to visit the USA. The US national security and the and the law enforcement interest conducts a comprehensive investigations and vetting on the individuals interested in visiting the US through the Visa Waiver program. The USA government has attracted several individual as a visitor through the Visa Waiver Programs (Jenkins, et al… 2012).

The Transportation Security Administration (TSA) has total responsibility for ensuring that the entire transport industry has dynamic security. The TSA in collaboration with other departments formulate the policies and the standards implemented by ensuring that the internal and external movements of goods and people are under secure parameters. The agreement between the foreign states and US exist that strengthen the security levels in the transport sector. The TSA has greatly improved the marine and air transport in compacting the pirates and the terrorist attacks. The business people, the organizations and the foreign states should work hand in hand with the TSA towards improving the security in the transport industry. The technology experts, as well as the programs, should indulge their minds together in an attempt to bring all the security issues into normalization. The security issues should get automated using sophisticated artificial intelligent programs.

Cobb, R. W., & Primo, D. M. (2003). The plane truth: Airline crashes, the media, and
transportation policy. Washington, D.C: Brookings Institution Press
Jenkins, B. M., Rand Corporation., & RAND Homeland Security and Defense Center.
(2012). Aviation security: After four decades, it's time for a fundamental review. Santa
Monica, Calif.: Rand Corp.
National Research Council (U.S.). (2006). Defending the U.S. air transportation system
against chemical and biological threats. Washington, D.C: National Academies Press.
National Research Council (U.S.). (2007). Fusion of security system data to improve airport
security. Washington, D.C: National Academies Press.
Palmer, J. L., Sawhill, I. V., & Changing Domestic Priorities Project (Urban Institute).
(1982). The Reagan experiment: An examination of economic and social policies under
the Reagan administration. Washington, D.C: Urban Institute Press.
United States. (2004). Building a secure nation: Safeguarding America's transportation
system : Transportation Security Administration strategic plan, executive summary.
Washington, D.C.: Transportation Security Administration.
United States. (2009). Sense of the House regarding TSA action to secure surface
transportation: Report (to accompany H. Res. 28). Washington, D.C.: U.S. G.P.O.
United States. (2010). Providing for consideration of the bill (H.R. 2200) to authorize the
Transportation Security Administration's programs relating to the provision of
transportation security, and for other purposes: Report (to accompany H. Res. 474). Washington, D.C.: U.S. G.P.O..
United States. (2011). Transportation Security Administration Authorization Act: Report
together with minority and additional views (to accompany H.R. 2200) (including cost
estimate of the Congressional Budget Office). Washington, D.C.: U.S. G.P.O..

Sherry Roberts is the author of this paper. A senior editor at Melda Research in research paper writing help 24 hours if you need a similar paper you can place your order for a custom research paper from research proposal writing services.

More About the Author

Author is associated with MeldaResearch.Com which is a global Custom Essay Writing and Term Paper Writing Company. If you would like help in Research Papers and Term Paper Help you can visit Custom Writing Service

Total Views: 39Word Count: 2764See All articles From Author

Add Comment

Education Articles

1. Data Science Course - 360digitmg
Author: Data Science

2. Python Training In Noida
Author: mapping skills

3. How Schools Are Dealing With Covid-19
Author: Prerna Sharma

4. How Montessori Students Progress Through The Levels Of Mathematics
Author: Daviis Collins

5. Business Analytics Course
Author: Business Analytics

6. Ssc Result Marksheet Download
Author: Tapos

7. You Must Learn Some Skills While College Life
Author: KamalDBGI

8. How Do International Students Choose The Right Education Consultant?
Author: Navneet Singh

9. Cat 2020 Exam Registration
Author: Harita Sama

10. How To Start A Blog In India For Free From Scratch In 2020 [step By Step Detailed Guide]
Author: Trendyavinash

11. Make The Education System Better With Online Leadership Programs
Author: Richard Sharp

12. Trainer Services Of Custom Creative Products
Author: Martine Macduglas

13. Characteristics Of Effective Primary School Leadership Programs
Author: Richard Sharp

14. Top Govt Engineering Colleges In Odisha
Author: Gandhi Engineerimg College

15. Education: Expectation Vs Reality
Author: Abhinav

Login To Account
Login Email:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: