Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Homeland Security Act of 2002 - Term Paper Example

Comments (0) Cite this document
Homeland Security Act of 2002 University Name Contents Contents 2 Introduction 3 Changes in security due to Homeland Security Act 4 No Fly List and Identification Requirement 4 Passenger Screening 4 Baggage Screening 5 Pat Downs & Full Body Scanners 5 Secure Flight Program 5 Arming Pilots against Terrorism 6 Impact of changes in Security 6 Increased Time for Security Clearance 6 Baggage Screening Problems 7 Revenue Losses 7 Baggage Theft 8 Impact of FFDO Program 8 Racial Profiling of Passengers 8 Information sharing & Gathering 9 FAA Premium War Risk Insurance 9 Conclusion 10 References 11 Abstract This paper discusses the Homeland Security Act of 2002 and the implica…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Homeland Security Act of 2002
Read Text Preview

Extract of sample "Homeland Security Act of 2002"

Download file to see previous pages After discussing the security provisions, the impact of these provisions on airline revenue, profitability and reputation are also discussed. In the end the paper discusses the impact of the provision to cap airline liability in the case of a terrorist attack. It also explains the insurance provided by FAA in the face of high premium charges of private insurers after September 11 attacks Homeland Security Act of 2002 Introduction The Homeland Security Act of 2002 was passed by the US congress in the aftermath of the September 11 attacks in order to prevent further terrorist attacks on US soil. This act has created the Department of Homeland Security which has been given wide ranging powers in order to prevent terrorist strikes on US soil. The formation of this department has been termed as the largest re-organization of the federal government since the creation of Department of Defense. In the 9/11 attacks, airline security was found wanting. It was due to lax security at the airports that terrorists were able hijack planes and ram them into the twin towers. Because of this, airline security is an integral part of the Homeland security act. After 9/11, the Aviation and Transport Security Act (ATSA) was enacted which established the Transport Security administration. Initially, the TSA worked under the Department of Transportation but with the passage of Homeland Security Act, TSA was moved to the Department of Homeland Security from 2003 (Blalock & Kadiyali, 2007). Changes in security due to Homeland Security Act TSA introduced various changes in security measures under the Homeland security act 2002. Some of the major changes introduced have been listed below. No Fly List and Identification Requirement All adult passengers are now required to show a proof if identification before they are allowed to board a plane. Apart from this, TSA also compares the passengers against a No-fly list. Those whose names appear on the no-fly list are not allowed to board. This includes the names of around 21000 people. In addition to this TSA also has a list of Selectees, passengers who are to be screened thoroughly before being allowed to board a flight (Mueller, 2004). Passenger Screening Screening of passengers before boarding flight was initially done by private security screeners. In order to improve efficiency, TSA took over the screening of passenger’s at all commercial airports from November 2002. They increased the compensation of screeners in order to reduce turnover and also increased the amount of training provided to the screeners in order to make them more efficient. Baggage Screening Prior to 9/11 attacks, only 5% of the checked in baggage was screened. TSA mandated compulsory screening of all check in baggage from 2002. They were also asked to positively match the bag checked to a passenger on board the flight. Airlines were free to adopt any of the four methods in order to screen the baggage – Explosion Detection system, Explosion trace detection machines, bomb-sniffing dogs or manual search of the bags. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
(“Homeland Security Act of 2002 Term Paper Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from
(Homeland Security Act of 2002 Term Paper Example | Topics and Well Written Essays - 2250 Words)
“Homeland Security Act of 2002 Term Paper Example | Topics and Well Written Essays - 2250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Homeland Security Act of 2002

The Sale of Goods Act

The goods purchased in contracts should be of satisfactory quality as established by Section 14(2) of the Sale of Goods Act. However, this statutory requirement is applied to goods sold in the normal course of the business. In addition, goods supplied in contracts should have satisfactory quality and should be reasonably fit for the purpose for which the buyer had bought them.
Goods supplied must conform to their original description made at the time of entering into the contract. These requirements benefit the buyer and the supplier will be held liable if these requirements are breached. Essentially, the Sale of Goods Act ensures that the goods supplied must be of satisfactory quality and this requirement applies to the sale...
11 Pages (2750 words) Case Study

The British Constitution vs The Human Rights Act 1998

This research essay analyses the above statement and arrives at a conclusion.
Integration of the provisions of ECHR into U.K’s domestic law by way of HRA 1998 can be regarded as revolutionary as it facilitates the majority of the ECHR rights provisions directly applicable in the U.K. Before that integration, a U.K Court has to presume that when there is a clash between U.K’s domestic law and ECHR rights provision, the ECHR rights provision will always prevail. This principle has been laid down in R v Secretary of Home Dept ex parte Brind1 and R v Secretary of Home Dept ex parte Thakrar. 2
Courts have now the power to declare any statue which they find incompatible with ECHR provisions and order for fine-tunin...
9 Pages (2250 words) Case Study

Analysis of Offences Against the Person Act

She suffered sleeplessness and panic attacks after this and was diagnosed with reactive depression. She told her brother, Ian, who saw Boris in the local pub and threw his beer glass into Boris’s face. The glass broke and Boris lost the sight in one eye as a result. Explain what non-fatal offences may have been committed here. It is also necessary to consider the Sexual Offences Act 2003 as the act of the hypnotist could be regarded as a sexual1.

The most minor assault is common assault as described by s39 Criminal Justice Act 1988. Under s39 an assault is committed if a person assaults another or commits a battery. An assault has been defined as when a person intentionally or recklessly causes another to app...
6 Pages (1500 words) Case Study

The Treason Act of 1351

...The ability and responsibility to promote human rights rests on everyone’s shoulders; but what is acceptable behavior in attempting to prevent a terrible act from occurring, and what is rightfully considered treason? And in terms of ruling courts of law, who should decide what is and is not acceptable? The Treason Act of 1351 was originally written in Norman French, and has gone through several revisions. The Fifth Statute defines treason in the following manner: “II. ITEM, Whereas divers Opinions have been before this Time in what Case Treason shall be said, and in what not;1 the King, at the Request of the Lords and of the Commons, hath made a Declaration in the Manner as hereafter followeth, that is to say; When a Man doth compass...
6 Pages (1500 words) Essay

The Relationship Between Security, Risk and Health in a Large Organisation

...’ (Bradford, 2007, 253). Organizational security is differentiated from the security involved in other human activities, for instance the environmental security (analyzed by Tennberg, 1995). The definition of security in business could be derived through the presentation of its most important aspects: a) physical security (doors, windows, etc.), b) computer security (access to the firm’s data), c) transport security (security when transporting the firm’s goods/ material required for the development of various organizational activities) (Hearnden et al., 199). At a next level, security would be involved in the protection from the acts of invaders as well as from the acts of employees. Terrorism is another threat for a firm’s premises...
9 Pages (2250 words) Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages (1500 words) Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages (2500 words) Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages (1500 words) Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages (1750 words) Assignment

Role of the Police and Private Security

...Report to the Legislator - Committee on Crime and Criminal Justice Congratulations on being appointed to the Committee on Crime and Criminal Justice. As a public servant you are holding a very responsible post that covers many areas of administration including the important role of providing security to the citizens of your constituency and to those individuals who visit it. This report will provide you with a clear picture on the role of security agencies with regard to homeland security. Many of the points mentioned here may be new or already known to you, but they are provided here in any case. It is common knowledge that apart from local and organized crime within the United States, the country is now facing new forms of threats like...
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Homeland Security Act of 2002 for FREE!

Contact Us