For this week’s assignment, you will submit the items below to ensure they meet the EOP Manual requirements. A refined introduction (Mandatory) Updated Title Page (Mandatory) Copyr
For this week's assignment, you will submit the items below to ensure they meet the EOP Manual requirements.
- A refined introduction (Mandatory)
- Updated Title Page (Mandatory)
- Copyright Page with Declaration (Mandatory)
- Dedication Page (Optional)
- Acknowledgement Page (Optional)
- Abstract (Mandatory)
- Table of Contents (Mandatory)
- List of Tables (Mandatory if tables are used in your thesis)
- List of Figures (Mandatory if figures are used in your thesis)
- IRB paperwork (Mandatory if IRB was required for your thesis)
- References (Mandatory)
1
Transportation Security Proposal
A Master Thesis
Submitted to the Faculty
of
American Public University
by
In Partial Fulfillment of the
Requirements for the Degree
of
Master of Arts
November 2022
American Public University
Charles Town, WV
Abstract
To maintain social and economic equilibrium, day-to-day operations must make use of other modes of transportation, such as buses, trains, and ferries. These intricate and interconnected transit systems need to make use of the proper technology to avoid disruptions in their operations, which would be detrimental to the inhabitants, users, data, and assets they serve. At every stage of the journey, the passengers, the crew, the equipment, and the cargo all need to be safeguarded and protected. This is because of the very complicated and frequently vast landscapes. Transportation routes, such as those found in airports and seaports, need to be routinely examined to verify that they are not only free of obstructions but also that they are operating as smoothly as possible. In addition to the risks posed by other dangers and vulnerabilities, the potential for terrorist attacks is an inherent risk at these transportation facilities; as a result, they require the necessary measures to protect what is most important. In addition to issues regarding the environment and the structure, maintaining the integrity of information technology systems is a consistent focus. In each of these situations, a comprehensive and well-thought-out security solution is necessary, even though the particular needs may vary.
Transportation Security Proposal
Introduction
One of the organizations that have successfully ensured the safety of the nation's transportation system is the Transportation Security Administration (TSA). The transportation business is unique in that it has an impact not only on the specifics of daily living but also on the state of the economy as a whole. When it comes to providing transportation services in a fast and effective manner, the dependability and safety of the organizations providing those services are quite necessary. The transportation industry faces a wide range of issues that get more complex as the market matures. These challenges are exacerbated by the large number of people who use transit stations and the high value of the items that are transported on ships and ferries. Transportation Security in the United States employs a variety of strategies to defend the country, some of which may be covert while others may be obvious to the general public. These strategies are implemented in varying degrees depending on the severity of the threats. This division makes use of tactics such as canine-team airport searches and randomized data collecting and analysis to accomplish its goals. In addition, it works in conjunction with the United States Federal Air Marshals and checks passenger manifests to watch lists. According to Palmer (2020), the Transportation Security Administration (TSA) uses a variety of screening measures to ensure the safety of American citizens. These screening methods might range from the use of technology to direct questioning of potential terrorists. Both a photo identification and a passport are required to verify a passenger's identity. The passenger will be allowed to continue on their journey once the facial recognition process has been finished. In addition, the TSA makes use of very advanced imaging technology, which has been linked to elements that increase the risk of cancer as well as privacy violations. A thorough search of the passenger's person is performed to look for any metals or explosives. Another technique that needs the suspect to step aside to ensure their safety throughout the threat detection process is the use of pat-down searches. Travelers are required to adhere to the procedures and justifications established by the TSA for their safety. This assures that the process of checking passengers for security at the airport will go without a hitch. Because travelers’ shoes will be examined during security checks, they should put on footwear that is simple to take off. When travelling with liquids, such as gels, lotions, and sprays, you are required to carry each item separately, and the total weight of all liquids in a single bag cannot exceed 3.4 ounces. At this point, passengers must put away all electronic devices, including cell phones, laptops, tablets, and so on. However, the administrative division must contend with several obstacles to guarantee the citizens of the area are kept secure regardless of the mode of transportation they choose—driving, flying, sailing, or using the train.
Protecting customers and employees, cutting down on crime and vandalism in transportation corridors, promptly settling liability claims, reacting to crises, and ensuring compliance with privacy regulations and local ordinances are the principal challenges. Operators may be able to avoid these obstacles if they invest in a scalable enterprise video management system that supports both mobile and fixed video monitoring under one roof and with the same user interface. Now, operators can keep tabs on all of their assets as well as the locations of those assets. A management system that incorporates well-known data components such as GPS data (speed, location, and direction) and vehicle data alarms and parameters (such as bus number, operator I.D., impact, hard brake, and door open/closed) provides drivers with a comprehensive view of what is occurring on board. In addition, a management system that incorporates well-known data components such as GPS data (speed, location, and direction) provides drivers with a comprehensive view of what is occurring on board. Because the future is equally as vital as the present in all investments and collaborations, it is essential to make certain that solutions incorporate A.I. that is both transformative and adaptive, cloud storage, and remote services that can be accessed on demand.
Because of the constant flow of traffic, the transportation sector is one of a kind. There are a great number of routes you can take to get from point A to point B, regardless of the mode of transportation you choose (metro, bus, train, or aeroplane). In addition, because there are several teams accountable for the safety of operations, it may be difficult to prove who was responsible for what and when it was done. Any failure might potentially have catastrophic repercussions for the safety and security of the system. A malfunction can present itself in a variety of ways, including a fault with the software, a physical defect, or a failure to maintain a safe and secure environment. The problem is not a lack of technical data; rather, the problem is a lack of correct, up-to-date physical data. On the physical side, our continuous reliance on manual, paper-based, and outmoded procedures puts us at an increased danger of a safety and security catastrophe. This puts the transportation business at an increased risk.
A further key obstacle faced by the transportation industry is the prevalence of one-of-a-kind analogue video recording equipment, systems, and software. Even if they have access to intellectual property, the flexibility, growth capacity, and integration potential of proprietary solutions are limited. Buses and light rail are classic examples of proprietary systems that need employees to swap hard drives from cars manually. These systems also require frequent maintenance. Only if there is no video proof will a camera or recorder be considered to be broken. In light of the abundance of data that is currently accessible, linking video to events that are produced by CAN bus and MIB systems is more significant than it has ever been. The best solution should provide support for increasing automation and integration, with highlighted data and events being promptly offloaded through 5G/4G and the system and device status being accessible in real-time.
Purpose Statement
In this essay, we will look at the various types of criminal activity that are related to transportation infrastructure. It examines the outcomes of the investigation and pinpoints important approaches to make the transportation system more secure. When talking about the safety of transportation in the United States, it is necessary to analyze the role that the economy plays, the problems that currently exist, and the potential solutions. The Transportation Security Administration (TSA) was established by the government of the United States to strengthen safety measures at airports, seaports, and train stations. The Transportation Security Administration (TSA) can be thought of as a nation's first line of defence due to the responsibilities that it performs. When compared to other law enforcement officers, they stand out because they work together and exchange information to strengthen national security. The provision of security by the TSA, which in turn results in the creation of jobs and the attraction of investment, is one factor that contributes to the economic development of a nation. Despite this, the transportation security system in the United States still has several significant flaws that need to be corrected, leaving it susceptible to Attack.
Research Question
The following research questions have emerged
1. What are the possible security threats that exist in the transportation sector
2. What measures have been put by the relevant administrations to address the security concerns
Literature Review
Transport Security
The Transportation Security Administration (TSA), which was established after the attacks of September 11, 2001, is responsible for the development of various transportation security technologies. The Transportation Security Administration (TSA) was established to improve the security of the country's transportation infrastructure and to ensure that people and goods can move freely throughout the country (Homeland Security, 2021). In less than a year, the Transportation Security Administration (TSA) took over responsibility for airport security on a national scale and deployed government officers to examine all passengers and luggage on commercial airlines. At this time, the Transportation Security Administration (TSA) conducts screenings on all arriving, departing, and remaining visitors to the United States. This is accomplished through the utilization of Secure Flight. These programs make use of the most cutting-edge technologies available to stay one step ahead of the ever-evolving dangers. In addition, the most cutting-edge technology is used to conduct security checks on every shipment, irrespective of its dimensions, method of transport, or country of origin (Homeland Security, 2021).
In order to protect the country's transportation infrastructure, the United States adopts a risk-based and layered strategy for transportation security. The Transportation Security Administration (TSA) is continuously working to improve the level of transportation security by utilizing a variety of its resources, including its technologies, processes, staff, and intelligence. The Transportation Security Administration (TSA) is responsible for operating many checkpoints, which all contribute to the enhancement of the overall safety of the American transportation system. In addition to this, there are components of its security that are both visible and invisible to the general public. There are also canine teams that randomly search airports, federal air marshals, federal flight deck officers, and intelligence gathering and analytic teams. Passenger names are checked against watch lists (Homeland Security, 2021). As a result, the Transportation Security Administration (TSA), which is dedicated to system evolution, improves the transportation security system. The general populace, as well as the passengers, in particular, will be safer as a result of this.
Current Challenges in Transport Security
Physical passenger Protection
For decades, airports have been the primary topic of conversation on issues about security. There have been a large number of cases in which airport systems have been vulnerable to control by terrorists (Gillen & Morrison, 2015). In addition to this, there are indications that a great deal of aircraft was taken by force throughout the 1970s (Slack & Rodrigue, 2020). In addition, terrorists have taken advantage of the absence of protection to hijack aeroplanes to gain publicity and extract ransom (Slack & Rodrigue, 2020). In addition, theft is one of the major problems that has been hurting all kinds of freight facilities. Theft problems are especially dangerous in settings where expensive commodities are being handled (Slack & Rodrigue, 2020). In certain locations, such as the docks, the local labour unions have been given the impression of being under the authority of organized crime. With time, access to freight terminals has been more restricted, and the deployment of security officers has contributed, at least to some extent, to the prevention of theft. As a solution to this issue, multiple precautions against potential danger have been put into place. For instance, the airline industry and a global regulatory agency created methods for examining both people and their luggage. The number of instances of hijacking has dropped, which indicates that these methods are working well. On the other hand, terrorist organizations started using new strategies, such as hiding explosives in unattended baggage (Gillen & Morrison, 2015).
Concerns about national security have had a significant impact on the aviation industry in a variety of ways, including the raising of prices, delaying of flights, and other types of inconveniences. Additionally, as a direct consequence of the COVID-19 pandemic, a new component of passenger transportation security known as epidemiological security has emerged (Slack & Rodrigue, 2020). This has proven to be particularly disastrous for modes of transportation that have a high passenger density, such as train travel, air travel, and cruise ships (Sivak & Flannagan, 2004). It is quite evident that many locations, like airports, ports, and terminals, among others, need to beef up their security procedures. By doing so, both the tourists and their goods will be protected from harm and kept safe from theft.
Protection During Transportation
The freight sector has long recognized the need for security as a primary priority. Illegal immigration, dodging of customs charges, drug trafficking, the use of vessels that do not meet safety standards, and piracy are some of the most important challenges (Gillen & Morrison, 2015). The process of securing freight transit is undergoing a steady transformation that emphasizes developing a plan that is more extensive and complicated per global supply networks (Friedrich & Balster, 2013). It is exceedingly difficult for a variety of different reasons to find a solution to the problem of insufficient security in the maritime industry. These include the difficulty of detection, the wide diversity of commodities transported on board, the scale of the global shipping fleet, and the sheer number of ports across the world (Slack & Rodrigue, 2020). In addition to this, the vulnerabilities of ports are susceptible to attack from both land and ocean (Arway, 2013).
Cyberattacks
Chief executive officers in the transportation sector are the most likely to face cyber threats. Hackers have extra access points since fleet telematics systems are being used increasingly frequently to monitor the location, condition, and status of physical assets. Despite the fact that breaching a private network exposes sensitive customer information, the greatest concern for companies in the transportation industry is the possibility that cybercriminals will cause actual damage to a truck or its expensive cargo. This is the case even though the breaching of a private network will reveal this information. Cybercriminals can take control of the digital dashboard of a truck that is hauling fresh food and change the temperature measurement that is displayed there so that it is accurate even when the cooling systems are turned off. The result is rotten food worth thousands of dollars, which the driver might not see until he or she stops to make a delivery. However, the driver could be unaware of the situation until this point. Automation, network technology, and electronic sensors are all heavily utilized in the train business as well. Power distribution, communications, train track signalling, and positive train control all necessitate the utilization of these technological advancements. Products and commodities that are very popular Rail companies may be particularly vulnerable to cyberattacks launched by political actors because of the greater possibility that supply chain disruptions may occur.
Advanced Technology
It is anticipated that the introduction of novel technologies such as semi- and fully-automated cars, as well as the utilization of sensors connected to the Internet of Things, would increase the cyber security concerns associated with transportation. In addition to reducing the risk of cyberattacks, the technology in question can also make driving more secure and help alleviate the current driver shortage. Companies, on the other hand, face the risk of slipping behind their competitors and missing out on big opportunities if they choose to ignore these advancements or fail to adapt to them. As operative technology progresses, operators of critical infrastructure must ensure that new architecture is not installed until it can be regulated and protected. This must be done before the new architecture can be implemented. As businesses grow and become more technologically advanced, they will make themselves more vulnerable to cyberattacks. Security can be compromised by efforts such as updating obsolete computer systems.
Lack of Drivers
The American Trucking Association predicts that by the year 2022, there will be almost 100,000 fewer truck drivers operating on the nation's roadways. The primary factors contributing to the ongoing labour shortage are the retirement of older workers, the difficulty of replacing vacant positions with new hires, and the increased delivery demand that is a direct result of the growth of e-commerce. It is estimated that truck drivers in the United States reach the age of 56 on average. Younger folks have difficulties accepting the long, alone, inactive hours that are a part of the trucking lifestyle, even though incomes are rising and signing bonuses are being offered to new drivers. Furthermore, an older workforce is associated with a higher prevalence of health conditions as well as a larger consumption of employee benefits, all of which contribute to a rise in these expenses for firms. Because there is a lack of drivers, senior drivers are under increased pressure to make additional trips and spend more time behind the wheel each day to meet delivery deadlines. This contributes to increased levels of driver tiredness and the risk of being involved in an accident.
Destroyed Infrastructure
Ground transportation in the United States will continue to have issues, and there will be more people using the roads and rails as a result of the ageing and, in some places, decaying infrastructure in the country. Even short delays can result in significant financial losses for the proprietors and operators of rail and transportation businesses. According to Dwyer, in 2014, there was a total of 6.9 billion vehicle hours worth of road delays created as a result of traffic congestion in 470 urban areas (2018). Because of these delays, the United States was forced to throw away 3.1 billion gallons of fuel, which resulted in a total cost of 160 billion dollars. According to projections made by the ASCE, the total amount of time lost due to delays will increase by 20% by the year 2020, reaching 8.3 billion hours. Poorly maintained roads increase the likelihood of vehicle damage, which results in the need for either more frequent maintenance or more expensive repairs. This is in addition to higher fuel prices and delivery delays. In addition to this, it is highly unlikely that things will get better any time soon. According to projections provided by the ASCE infrastructure research, the investment shortfall will amount to $1.1 trillion between now and 2025 and an additional $3.2 trillion between 2026 and 2040.
Moreover, the price of gasoline has a significant impact on the profit margins of businesses involved in the transportation industry. A decrease in the price of oil leads to a decrease in the price of gasoline, which puts more money in the pockets of drivers. Because of the terrible inconsistency of oil prices, the trucking, rail, and aviation businesses are forced to contend with unpredictable price swings, which have a disproportionately negative impact on each industry. When gasoline prices are low, a greater number of shippers choose to deliver products via truck rather than rail because trucks are typically faster than rail (Dwyer, 2018). When oil prices are higher and freight trains offer a greater value than gas-guzzling tractor-trailers, railways may see an increase in business. This is because freight trains use far less fuel than tractor-trailers. In addition to shifts in the cost of oil, factors such as international trade conflicts and political unrest can impact shipping volumes and disrupt supply networks around the world. According to research conducted by Fitch Ratings, the transportation industry in the United States may be impacted by taxes on steel and aluminium as well as levies placed on automobiles. If auto tariffs dramatically increased the cost of buying a vehicle, it is possible that they would have the effect of taxing drivers by increasing the cost of driving and, as a result, reducing demand (Dwyer,2018).
Strategies to Improve the Safety Of The Transport System
The Transportation Security Administration has been the subject of a wealth of writing. These resources talk about the strategies that the TSA uses to increase security, the security standards that they have developed, the effects that those strategies have, and some suggested solutions for making those strategies more effective. Among the strategies that are used include the application of various forms of technology, the study of human behaviour, and the employment of other animals, such as dogs. Every traveller is required to behave by the procedures that have been outlined by the TSA. A nation will experience both positive and negative effects as a result of the TSA. The implementation of TSA has led to a variety of positive outcomes, including the generation of new job possibilities, the decline in the dependency rates of a nation, the growth of the economy of that nation, and many more. On the other hand, it has led to an increased risk of cancer as well as invasions of privacy.
Using Technology in Improving the Safety
Technology plays an increasingly important role in the operation of our transportation and logistics networks, from the high-tech traffic signals and speed limits that are being implemented in our smart cities to the robots and sensors that make "just in time" delivery possible in the modern era. Because of this, transportation networks must continue their digitization efforts and incorporate cutting-edge tools and analytics to raise their level of efficiency. The very same technologies that make it possible for people and commodities to move around also cause problems that need to be understood and managed as population concentrations continue to rise. Cybersecurity concerns must first be identified, then anticipated, and then avoided if at all possible (Bouhdada, 2019).
It is difficult to modernize the transportation company because, like many other businesses, it relies on established techniques and systems that have never been forced to consider cybersecurity. This makes the process tough. As a result of this lack of awareness, industry professionals have an immediate obligation to take action and create industry standards for new large- and small-scale solutions (Bouhdada, 2019). The increased possibility of something unfavourable taking place as a result of increased connectedness.
There are numerous examples of the impact that technology is having on transportation and logistics, such as the following: haulage fleets can increase their fuel efficiency by using real-time telematics and GPS data; ports are digitizing processes to streamline the flow of goods, and Alibaba and Amazon are pushing shipping companies to adopt Internet of Things (IoT) technologies to provide more visibility into their cargoes. Several governments are already investigating the possibility of installing infrastructure along railroad tracks to provide 5G internet connectivity to train passengers and on-board systems while the passengers are travelling to and from work (Bouhdada, 2019). All of these interconnected technologies hold a great deal of potential, but at the same time, they present serious safety concerns. Systems that were once protected from network attacks are now vulnerable to internet-related dangers, and potential attackers are persistent in their search for vulnerabilities to exploit across any attack surface that is accessible to them.
Transport Security of America Strategies
Accelerating the screening and searching processes to cut down on wait times is one of the numerous ways that the Transportation Security Administration (TSA) works to ensure the nation's safety (Narh, 2021). In addition, the Transportation Security Administration (TSA) established the Screening Partnership Program (SPP), under which the TSA awards contracts to qualify organizations and people to assist with screening and search activities. For the purpose of screening passengers, the Transportation Security Administration has access to the most advanced technological equipment. In 2017, electronic devices that were larger than a typical mobile phone were required to be thrown into a bin before being x-rayed to identify any contraband materials or items. (Fischer& Walters 2019). These technologies and machines have an efficiency of up to 99 per cent and produce flawless results. In addition to screening passengers, they also directly question them about whether or not they appear suspicious based on their behaviour or appearance. Since the terrorist attacks of September 11, 2001, the United States has been protected against potential dangers by the Transportation Security Administration's (TSA) aviation security measures, which are regarded as the toughest in the world.
The first thing that happens as you get through airport security is an identification check. Airport personnel check passengers' identification cards before they proceed through the security checkpoints. After the member of the staff has verified your identity, you will proceed to the TSA agents, who will scan both your boarding pass and your I.D., as well as perform a face recognition check to guarantee that you are the legitimate owner of the I.D. After that, you will proceed to the security checkpoint, where both you and your belongings will be subjected to screenings. TSO is committed to utilizing what is widely regarded as one of the safest ways available. In addition, TSA agents will execute pat-down searches on passengers who have the appearance of being suspicious or who have violated security laws. Some of these justifications include the usage of bulky jewellery, the donning of a coat, or the donning of a sweater. If the TSA has reasonable grounds to suspect that you are acting suspiciously, you will be subjected to a pat-down search, which may be uncomfortable for you (U.S. Department of Homeland Security).
In addition, the transportation industry is anticipated to confront many issues in the not-too-distant future which may result in a shift in the priorities of the Transportation Security Administration (TSA) to handle the security issue (Kim et al., 2017). He examined earlier studies, discovered significant factors that can cause changes, constructed multi-driver scenarios, categorized the scenarios, identified techniques for constructing transportation, and, as a final step, established essential strategies for addressing the security issue. Because fewer people in the United States are taking advantage of the nation's rail network, the federal government has increased spending on highways and airports.
Behaviour Detection
This technique is utilized frequently by the TSA to identify individuals whose behaviour raises questions. According to Holmes (2011), the face is the single most reliable indicator of whether or not a person is telling the truth when they are being interviewed. This is because of the ongoing interaction that takes place between the neural viewpoint of the face and the brain. Since the relevant neurons and facial muscles move involuntarily in response to emotional states, the face can portray either the truth or a lie (Hill & Craig, 2002). Officials at the TSA can tell the difference between voluntary expressions and those that are involuntary, which enables them to spot lies (Ekman, 2009). According to Holmes (2011), a standard polygraph machine can also be used to detect dishonesty by applying infrared technology, remote sensors, and other approaches. This can be done using a variety of different methods. These sensors measure physiological reactions like temperature, respiration, and heart rate, which can be used to determine with a high degree of accuracy whether something is genuine or not. The neuroscientific technique also incorporates neuroimaging to examine and decode subjective experiences (Davatzikos, 2005). This method yields trustworthy data that can be put to use in studies investigating the intricate relationship that exists between the mind and the brain (Holmes, 2011).
Program Implementation
The mission and purpose of the TSA, which is to strengthen security, are reflected in the programs that they offer. According to Tarpey (2016), the Foreign Airport Assessment Program (FAAP) provides the Transportation Security Administration with the ability to conduct inspections at international airports, as well as U.S. air carriers and international air carriers that provide services that are comparable to those provided in the U.S. This agency
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.