Reference no: EM131310699 , Length: word count:900
Click on the following link(s) for the Phase 1 Reading Assignment:
Public Health and Medical Preparedness and Response
The Impact of Incentives and Requirements on Group Collaboration
Airport Screenings & Public Security Policy
The purpose of this assignment is to explore the topic of aviation security as it relates to public safety policy and the issue of individual privacy. You have been directed to write a policy memo for your boss, who is a member of the U.S. House of Representatives and serves on the House Committee on Homeland Security (House Committee on Homeland Security Web site). Using the resources provided below, as well information from resources you identify through your own research efforts, your assignment is to craft a briefing memo of 900-1,200 words that focuses on the questions posed below.
Assignment Guidelines
Students must address the following in 900 words:
The United States, as well as many other countries and airlines, had experienced criminal and terrorist incidents before September 11, 2001. Why had previous incidents not resulted in the dramatic increases in and focus on aviation security that the 9/11 attacks did? Explain.
How was 9/11 different from an aviation security standpoint? Explain.
While there have been further attempts to strike the United States by attacking commercial aircraft since 9/11 (e.g., the "shoe bomber" and the "underwear" bomber), none have been successful. How have the steps and measures taken to improve aviation security since 9/11 contributed to the lack of success of the terrorists? Explain.
What role did the various layers of aviation security play in preventing the attempted attacks after 9/11? Explain.
Were the effective layers tactical, policy driven, or a combination of both? Explain.
Since the regulation that requires the aircraft's cockpit door to be bullet-proof and securely locked before the aircraft leaves the terminal took effect, it is, for all practical purposes, impossible for a terrorist passenger to gain control of an aircraft. Given this change in risk profile, are other layers of security as necessary as before? Why or why not?
Given the number of years after 9/11 without successful aviation attacks, should some security procedures be relaxed? Why or why not?
What are the vulnerabilities and risks if they were? Explain.
Do not write possible scenarios here; rather, identify points of failure and other threats or risks to the aircraft, passengers, and nation).
TSA agents have the right to physically inspect any and all material and persons who are boarding or being loaded onto an aircraft in the United States. With X-ray machines, bomb-sniffing machines, and dogs checking all luggage and passengers, are physical inspections of luggage that allow TSA agents open and look through personal bags necessary? Why or why not?
What are the laws that provide TSA with their authority? Describe them.
Are the practices undertaken by TSA too intrusive? Why or why not?
The Fourth Amendment of the Bill of Rights provides protection against unreasonable searches and seizures. How should the United States balance that right against the security needs of the flying public? Explain.
Has a balance been reached?
If not, in what direction do the scales need to be tipped and how?
Compile your responses in your final policy memo, and submit the file to your instructor.
Be sure to reference all sources using APA style.
Determine the moment of the couple about the z-axis
: The arm ABCD of the industrial robot lies in a vertical plane that is inclined at 40? to the yz-plane. The arm CD makes an angle of 30? with the vertical. A socket wrench attached at point D applies a 52-lb · ft couple about the arm CD, directed a..
|
Data information decision
: With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization. Identify the primary decisions a Database Administrator must make in order to manage suc..
|
Describe the role of dsm-5 in making a diagnosis
: Describe the role of DSM-5 in making a diagnosis. Why is it used?When conducting a clinical interview, what are some important questions you need to ask a client? Why?Discuss how you would make a diagnosis using DSM-5 if you were a counselor. How d..
|
Differences between a competitive and noncompetitive grant
: What are the differences between a competitive and noncompetitive grant? Explain. Which of these 2 approaches to grant writing represents the most effective way to distribute money to agencies? Why
|
What are the vulnerabilities and risks if they were
: What role did the various layers of aviation security play in preventing the attempted attacks after 9/11? Explain.Were the effective layers tactical, policy driven, or a combination of both? Explain.How was 9/11 different from an aviation security s..
|
Explain how smoke components could have contributed to death
: Explain how the smoke components, as well as the smoke itself, could have contributed to the death. Did the light haze visible in the living room contain aerosol droplets that resulted from condensation of gases?
|
Display the basic lan and wan topology for remote sites
: Display the basic LAN and WAN topology for your remote sites. Display router and switch placement. Display computers and workstations.
|
What are some of the symptoms
: Focus your discussion of the disorder on the following: What are some of the symptoms? What would this disorder look like in person? Make sure you relate this back to the DSM criteria
|
What percentage of a radioactive isotope would remain
: If you have 222 g of radioisotope with a half-life of 5 days, how much isotope would remain after 15 days? What percentage of a radioactive isotope would remain after four half-lives?
|