Verified Document

Israeli Security Methods In U.S. Airports Essay

Related Topics:

Protecting U.S. Skies and Airports: Israeli Security Methods in U.S. Airports As Gaines and Miller (2013) point out, American security forces focus on finding weapons while Israeli security focuses on finding terrorists. The difference gets to the heart of why the Israeli system is so much more efficient. However, Israel has a population of 8 million—less than that of New York City. And New York City is home to just one of many hubs and international airports in the U.S. Approximately 17 million travelers flew into Ben-Gurion Airport in Israel last year, as well—which is about a third of the number that flew into JFK (Zeff, 2017; NBC, 2018). Because of the sheer volume of travelers throughout the U.S., which dwarfs Israel’s numbers completely, the question is whether Israel’s methods can actually scale and work in a nation as big and open to the rest of the world as the U.S. The fact of the matter is, too, that Israel’s airport security is really only different from that of the U.S. in terms of place and intensity—and who is scrutinized. In the U.S. everyone is scrutinized. In Israel, most Israeli citizens are waived through after a few questions. Arabs and foreigners are questioned extensively, undergo full luggage searches and can be detained for hours—except this is not done at the airport. It is done at checkpoints on the road leading to the airport. That is why the airports themselves are not...

The lines are outside the airport (Gaines & Miller, 2013). However, the special relationship between the U.S. and Israel means that the U.S. is not far behind and many American airports have implemented Israeli security methods.
Security Interviews

One of the big ways that American airports are importing Israeli security methods is through the use of security interviews. Cathay Pacific...…a digital pre-check in which the traveler uploads all the information that would be sought out by a security interviewer ahead of time in order to qualify for the pass. Once the pass is approved, the security check has already been rendered. By making the fast pass a pre-requisite for all fliers it would completely reduce the routine of removing belts, shoes, etc. that still take place in American airports.

Conclusion

Israeli security methods have shown themselves to be effective because they primarily profile passengers to identify terrorists whereas Americans tend to scan everyone indiscriminately to avoid being accused of profiling. The latter method leads to lines and delays. The former methods does as well—but the lines and delays are formed outside the airport. American airports are catching up, however, and beginning to adopt Israeli methods by obliging inbound airlines to conduct security interviewing and by getting passengers to profile themselves before flying with…

Cite this Document:
Copy Bibliography Citation

Related Documents

Transportation - Security Contemporary Transportation
Words: 6826 Length: 25 Document Type: Research Proposal

By federal law, all passenger airliners now feature cockpit doors that are locked by the pilots from inside the cockpit. Likewise, pilot training now includes the specific instructions not to open the door in response to any occurrence or emergency in the passenger cabin; instead, pilots are under instructions to land the aircraft immediately in response to any perceived emergency that would have previously been cause to investigate beyond

Detecting Deception the Detection of
Words: 2876 Length: 10 Document Type: Research Proposal

In that regard, the future applications of Ekman's principles and techniques for identifying concealment of emotions and deception of intentions may improve the accuracy, efficiency, and speed of facial analysis. In general, computer applications are much more capable of analyzing such information accurately than even the best-trained human beings (Ekman, 2003). Deliberate attempts to employ anti-detection techniques to counter the methods of detection introduced by Ekman may indeed be possible

Terrorist Threats Challenge the Current
Words: 3207 Length: 10 Document Type: Term Paper

Powell Assertion Number Two: In his Feb. 5, 2003 speech to the U.N., Powell said: "We have no indication that Saddam Hussein has ever abandoned his nuclear weapons program." But in October, 2002, in his memo to the White House, CIA Director George Tenet voiced "strong doubts about a claim President Bush" was about to make in the State of the Union address "that Iraq was trying to buy nuclear

Commercial Aviation Safety in the
Words: 2496 Length: 9 Document Type: Thesis

The background checks can take months and months, so they're walking around with a card in the meantime & #8230;That's why so many of these airport employees are arrested so long after the fact, and are continuing to be arrested in sweeps by the Justice Department. When the information finally does come back, they see they've got somebody out there that has a felony and lied on his application, or

American Terrorism for Many People,
Words: 14357 Length: 50 Document Type: Research Paper

The USA Patriot Act: This was a law that was passed after September 11th. It is giving the police and intelligence officials the power to go after terrorists organizations easier. As it lifted various Constitutional protections when investigating these offenses. Counter Terrorism: These are the activities that: federal, state and local officials are taking to prevent future terrorist attacks. Weapons of Mass Destruction (WMD): These are weapons designed to inflict large amounts

Counterintelligence
Words: 3490 Length: 12 Document Type: question answer

Question 1: Construct an assessment of ONCIX strategy, prevention and detection concerning either insider threats, or, economic threats. Preventing and detecting insider threats is one of the core aspects of the ONCIX strategy. As a new premier counterintelligence and security agency in the U.S. government, ONCIX needs a strong understanding of how to identify and deter insider threats. According to its strategy, “the most effective safeguard against insider threats is a

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now