Dynamics of Change in the US Air Transportation System

Total Page:16

File Type:pdf, Size:1020Kb

Dynamics of Change in the US Air Transportation System 2 Abstract The US Air Transportation System is currently facing a number of challenges including an increasing demand for travel and growing environmental requirements. In order to successfully meet future needs, the system will need to transition from its current state using a combination of technology, infrastructure, procedure, and policy changes. However, the complexities of the air transportation system make implementing changes a challenge. In particular, the multi-stakeholder nature of the system poses a significant barrier to transition. Historically, many changes in the air transportation system were driven by safety concerns and implemented following accidents which provided the momentum to overcome transition barriers. As a result of past changes, the system has become increasingly safe resulting in the emergence of new drivers for change. Security has emerged as a driver following the terrorist attacks of 9/11/2001 in the US and a number of system changes have since been implemented. Currently, capacity is one of the largest drivers of change. Addressing capacity issues requires solutions that can be accepted by stakeholders, and pass the necessary certification and approval requirements for implementation. The contribution of aviation to global greenhouse gas emissions is also becoming a significant driver for change in the system. The goal of this work is to understand how the air transportation system changes in response to safety, security, capacity, and environmental drivers for transition. In order to understand the dynamics of transition, historical cases of system change were studied. Twenty seven such cases have been analyzed to construct a feedback process model of transition and to explore specific change dynamics observed. These dynamics include: understanding the role of crisis events as catalyst for change; the effect that timing of solution development has on the overall time constant for change; the role that stakeholder objectives play in the transition process, and the use of approval and certification processes to stall or block change. Understanding the process of change in the US Air Transportation System can inform future changes in aviation as well as in other systems with similar properties. 3 Acknowledgments This work was supported by the FAA under the Joint University Program (JUP) [FAA95-G- 017] and the National Center of Excellence for Aviation Operations Research (NEXTOR) [DTFA01-C-00030]. This document is based on the doctoral thesis of Aleksandra Mozdzanowska. 4 Contents 1 Introduction 9 1.1 The Air Transportation System . 9 1.2 Current Need for System Transition . 11 1.2.1 Safety Concerns as Drivers of System Change . 13 1.2.2 Security Concerns as Drivers of System Change . 14 1.2.3 Capacity Constraints as Drivers of System Change . 14 1.2.4 Environmental Concerns as Drivers of System Change . 17 1.3 Past Efforts of System Modernization . 21 1.4 Objective . 23 2 Research Approach 24 2.1 Topic Exploration . 25 2.2 Feedback Representation of System Transition . 25 2.2.1 Feedback Model Framework . 26 2.3 Case Studies . 28 2.3.1 Interviews . 30 3 Related Work and Literature Review 32 3.1 Models of Policy Change . 32 3.1.1 Rational Choice . 32 3.1.2 Incrementalism . 33 5 3.1.3 Agenda Building . 34 3.2 Stakeholder Dynamics . 36 3.2.1 Stakeholder Relationships . 36 3.2.2 Lock-in . 38 3.3 Existing Efforts at Understanding System Change . 40 3.3.1 Complex Adaptive Systems . 40 3.3.2 Socio-technical System Transition . 41 3.3.3 Climate Change and Adaptation . 42 3.4 Air Transportation System Change . 43 4 Case Studies 45 4.1 Overview of Case Studies . 45 4.1.1 Safety Case Studies (SA) . 45 4.1.2 Security Case Studies (SC) . 48 4.1.3 Capacity Case Studies (CA) . 49 4.1.4 Environment Case Studies (EN) . 55 4.2 Detailed Case Studies . 56 4.2.1 Detailed Safety Case (SA1): Controlled Flight Into Terrain Accidents 56 4.2.2 Detailed Safety Case (SA2): Windshear and Microburst Accidents . 68 4.2.3 Detailed Security Case (SC2): Need for Increased System Security Post 9/11 . 78 4.2.4 Detailed Capacity Case (CA7): Boston Capacity Limitations . 84 4.2.5 Detailed Capacity Case (CA8): LaGuardia Capacity Limitations . 92 4.2.6 Detailed Capacity Case (CA14): Outdated ATC Surveillance System 98 4.2.7 Detailed Environment Case (EN3): International Aviation Emissions 107 5 Awareness Building Process 112 5.1 Identifying the Need for Transition . 115 5.2 Communication and Dissemination of Awareness to a Broader Audience . 120 6 5.3 Mental Model Formation . 122 5.4 The Role of Catalytic Events . 123 5.4.1 Safety Drivers . 124 5.4.2 Security Drivers . 133 5.4.3 Predictive vs. Reactive Transition . 134 5.5 When Catalytic Events are Unclear . 135 5.5.1 Capacity Drivers . 136 5.5.2 Environmental Drivers . 138 5.6 Implications . 140 6 Change Process 141 6.1 Objective Formation—Costs and Benefits . 144 6.1.1 Example of Asymmetrical Cost and Benefit Distribution in Cases of Runway Construction . 149 6.1.2 Example of Multi-Stakeholder Dependencies in Airline Equipage Decisions . 151 6.2 Action Selection and Decision Refinement . 158 6.2.1 Stakeholder Power and the Role of Leadership . 161 6.2.2 Changing Stakeholder Preferences . 166 6.2.3 Adaptive vs. Transformative Change . 168 6.3 Resource Allocation . 169 6.4 Implications . 172 7 Solution Development Process 173 7.1 Research and Development . 173 7.2 Solutions . 175 7.2.1 Safety Solutions . 175 7.2.2 Security Solutions . 176 7.2.3 Capacity Solutions . 178 7 7.2.4 Environment Solutions . 179 7.3 Solution Availability . 181 7.3.1 Solution Viability . 183 7.4 Implications . 183 8 Implementation Process 185 8.1 Review Processes and Implementation Barriers . 189 8.1.1 Safety Review and Approval Processes . 189 8.1.2 The Environmental Review Process . 192 8.1.3 Deliberate Blocking of Transition . 199 8.2 Overcoming Barriers — Catalytic Events . 202 8.2.1 Example of a Capacity Catalytic Event in the Case of LaGuardia Slot Restrictions (CA8) . 203 8.3 Long Implementation Times . 207 8.4 Implications . 208 9 Conclusions and Implications 210 9.1 Transition Model . 211 9.2 Implications . 215 9.3 Applications to Other Systems . 218 8 Chapter 1 Introduction 1.1 The Air Transportation System The US Air Transportation System is a complex, adaptive, socio-technical system that provides domestic and international flight services for both passengers and cargo. In 2004, the Air Transportation System handled over 70 thousand flights and 146 billion pounds of cargo per day [1]. These operations are enabled by a large infrastructure, numerous stakeholders, and a policy framework. Some of the major components and stakeholders of the system are shown in Table 1-1. Infrastructure Airports Control towers, control centers Communication, navigation, surveillance equipment Stakeholders Transportation providers Equipment providers Support service providers Government Public Media Policy Framework Regulations Procedures Table 1-1: Air Transportation System Components 9 Since its inception in the 1930s, the Air Transportation System has grown continuously and evolved from a luxury and hobby to become an important and necessary part of our economy and lives. Air transportation influences how we conduct business, run companies, visit loved ones, and go on vacation. A study conducted by NASA and the FAA concluded that the air transportation industry contributes about $80–90 billion a year to the national economy (about 1% of the US GDP) and employs about 800,000 people [2]. As a result, the health of the Air Transportation System and the national economy is highly interdependent. This inter- dependance can be seen in Figure 1-1 which shows that the Gross Domestic Product (GDP) and the demand for air transportation have been closely coupled for the past 50 years. Figure 1-1: Annual percentage change in GDP and scheduled domestic revenue traffic, 1954–2000 with economic recessions [3]. Figure courtesy of R. John Hansman. Figure 1-2 shows the interaction between the Air Transportation System and the economy, which leads to the interdependence shown above. The transportation system takes as input the demand for travel and movement of goods, and supplies services to meet these demands. The ability of the system to meet these demands depends on the development of capabilities in the transportation infrastructure as well as the financial status of the transportation providers (airlines) and their ability to acquire appropriate aircraft. Thus, while the air transportation needs the economy to supply demand (and hence revenue) in order to continue operating and 10 growing, a healthy Air Transportation System is also vital for maintaining economic growth and competing in the global market. Figure 1-2: Schematic Diagram of Connection between Air Transportation and the Econ- omy [3]. Figure courtesy of R. John Hansman. In order to continue functioning and providing benefits, the Air Transportation System has to transition to meet changing conditions. Transition is defined as the process of change in a system in response to existing or expected changes in system conditions. 1.2 Current Need for System Transition Today the US Air Transportation System is facing emerging system requirements, growing demand, and the erosion of system components. In order to address these issues and continue meeting needs the system will need to transition. Demand for passenger and cargo travel has been growing since the creation of the system. Currently the growth of demand is out pacing the available system capacity, particularly airport resources, causing delays and disruptions. However, expanding to meet demand may prove to 11 be more difficult in the future as airports in high-demand areas are already near the limits of currently available resources, and new technologies face barriers to implementation.
Recommended publications
  • Alumni Day Tues. October 12
    ST. VOLUME 5 BROOKLYN, N. Y., OCTOBER, 1943 NUMBER 1 ALUMNI DAY TUES. OCTOBER 12 A REPORT FROM FR. MAHONEY, C.M. FATHER .. TOM .. GORMAN, C.M., TO SPEAK To the Members of the Alumni: The theme, "Our Honored Dead and Our Men in Service," At the annual Alumni banquet last February, we gave you will feature the twelfth annual Alumni Day to be held on Columbus a picture of the effects of war upon our University. In rhe inter­ Day, Tuesday, October 12, 1943. The program will open with a vening months there has been no substantial change in these mass at 10:30 A.M. in the Perboyre Chapel adjacent to St. John conditions. the Baptist Church. A general meeting will follow in DeGray Hall where the principal speaker will be the Rev. Thomas Gorman, C.M., The war has levied a heavy toll upon our student personnel who for many years taught in the College. Other speakers will be and otherwise disrupted the normal college life to which you the Very Rev. William J. Mahoney, C.M., the president of the were so accustomed. Yet we are making every effort to continue to offer to those who can attend the blessed benefits of Catholic Univecsity. Later as guests of the College, luncheon will be served in the cafeteria. higher education. As you are aware, the Armed Forces are making use of the For many years it has been Alumni tradition to remember our facilities of some colleges throughout the country. And we have dead on Alumni Day.
    [Show full text]
  • International Jurisdiction and the Internet in the Age of Cloud Computing Kurt Wimmer, Eve Pogoriler, and Stephen Satterfield COVINGTON & BURLING LLP, WASHINGTON, D.C
    Reproduced with permission from BNA’s Internet Law Resource Center™, Copyright 2011, The Bureau of National Affairs, Inc. (800-372-1033) www.bna.com. International Jurisdiction and the Internet in the Age of Cloud Computing Kurt Wimmer, Eve Pogoriler, and Stephen Satterfield COVINGTON & BURLING LLP, WASHINGTON, D.C. Kurt Wimmer is a partner concentrating in technology and media law, as well as intellectual property and data privacy. He represents digital media, television, mobile, publishing, and new technology companies. Eve Pogoriler is an associate in the communications and media group. She also practices in the area of privacy and data security. Stephen Satterfield is an associate in the global privacy and data security practice group. Covington & Burling LLP’s web address is http://www.cov.com. __________ The internet touches every country in the world and the lives of some two billion people worldwide who use it.1 The internet’s universality is a great part of its strength as a tool for business, but that universality also creates unique business risks. Worldwide access exposes website operators and internet publishers to the possibility of being haled into courts around the globe. A business operating online must therefore account for the risk of being sued in a distant jurisdiction that may provide very different rights and responsibilities than the jurisdiction the business considers its “home.” The immediacy of this risk rises exponentially as businesses and individuals increasingly utilize “cloud computing” services in which data is stored on remote servers that could be located in any country in the world.2 This Article provides an overview of the risks facing businesses in the online space and a description of recent efforts by courts and regulators to diminish that risk—or at least make it more predictable.
    [Show full text]
  • Dead Canaries in the Coal Mines: the Symbolic Assailant Revisited, 34 Ga
    Georgia State University Law Review Volume 34 Article 1 Issue 3 Spring 2018 5-1-2018 Dead Canaries in the Coal Mines: The yS mbolic Assailant Revisited Jeannine Bell Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://readingroom.law.gsu.edu/gsulr Part of the Civil Rights and Discrimination Commons, Constitutional Law Commons, Criminal Law Commons, Criminal Procedure Commons, Fourteenth Amendment Commons, Fourth Amendment Commons, Law and Race Commons, Law and Society Commons, and the Law Enforcement and Corrections Commons Recommended Citation Jeannine Bell, Dead Canaries in the Coal Mines: The Symbolic Assailant Revisited, 34 Ga. St. U. L. Rev. 513 (2018). Available at: https://readingroom.law.gsu.edu/gsulr/vol34/iss3/1 This Article is brought to you for free and open access by the Publications at Reading Room. It has been accepted for inclusion in Georgia State University Law Review by an authorized editor of Reading Room. For more information, please contact [email protected]. Bell: Dead Canaries in the Coal Mines: The Symbolic Assailant Revisited DEAD CANARIES IN THE COAL MINES: THE SYMBOLIC ASSAILANT REVISITED Jeannine Bell* ABSTRACT The well-publicized deaths of several African-Americans—Tamir Rice, Philando Castile, and Alton Sterling among others—at the hands of police stem from tragic interactions predicated upon well-understood practices analyzed by police scholars since the 1950s. The symbolic assailant, a construct created by police scholar Jerome Skolnick in the mid-1960s to identify persons whose behavior and characteristics the police view as threatening, is especially relevant to contemporary policing.
    [Show full text]
  • Chaos and Terror – Manufactured by Psychiatry
    CCHR_Terror CVR R25-1.ps 10/22/04 8:25 AM Page 1 “Through the use of drugs, the skilled mind controller could first induce a hypnotic trance. Then, one of several behavior modification techniques could be employed with amplified success. In themselves, without directed suggestions, drugs affect the mind in random ways. But when drugs are combined with hypnosis, an individual can be molded and manipulated beyond his own recognition.” CHAOS AND — Walter Bowart Author, Operation Mind Control TERROR Manufactured by Psychiatry Report and recommendations on the role of psychiatry in international terrorism Published by Citizens Commission on Human Rights Established in 1969 CCHR_Terror CVR R25-2.ps 10/22/04 8:25 AM Page 2 Citizens Commission on Human Rights RAISING PUBLIC AWARENESS ducation is a vital part of any initiative to reverse becoming educated on the truth about psychiatry, and that social decline. CCHR takes this responsibility very something effective can and should be done about it. IMPORTANT NOTICE Eseriously. Through the broad dissemination of CCHR’s publications—available in 15 languages— CCHR’s Internet site, books, newsletters and other show the harmful impact of psychiatry on racism, educa- For the Reader publications, more and more patients, families, tion, women, justice, drug rehabilitation, morals, the elderly, professionals, lawmakers and countless others are religion, and many other areas. A list of these includes: he psychiatric profession purports to be know the causes or cures for any mental disorder the sole arbiter on the subject of mental or what their “treatments” specifically do to the THE REAL CRISIS—In Mental Health Today CHILD DRUGGING—Psychiatry Destroying Lives health and “diseases” of the mind.
    [Show full text]
  • The Symbolic Assailant Revisited
    THE SYMBOLIC ASSAILANT REVISITED Jeannine Bell* Abstract The well-publicized deaths of several African Americans—Tamir Rice, Philando Castile and Alton Sterling among others—at the hands of police stem from tragic interactions predicated upon well-understood practices that police scholars have been analyzing since the 1950s. The symbolic assailant, a construct created by police scholar Jerome Skolnick in the mid-1960s to identify persons whose behavior and characteristics the police view as threatening is especially relevant to contemporary policing. This Article explores the societal roots of the creation of a Black symbolic assailant in contemporary American policing. The construction of African American men as symbolic assailants is one of the most important factors characterizing police interaction with African American males. This is not a one size fits all approach to blackness. As the Article discusses, police officers’ treatment of African American women is also fraught, but markedly different. I argue that current strategies for ending police violence do not sufficiently address the prominence of the symbolic assailant in proactive policing strategies. This Article suggests an unusual solution to commonly understood mechanisms of addressing police violence. Based on my experience with police who had productive relationships with crime victims of color, I suggest a reorientation of policing practices predicated on a more reactive model of policing. * Richard S. Melvin Professor of Law, Indiana University Maurer School of Law, Bloomington. A.B. Harvard College, 1991; J.D. University of Michigan, 1999; Ph.D. (Political Science) 2000. This article was presented in draft at U.C. Berkeley, Duke and the University of Wisconsin law schools.
    [Show full text]
  • Mental Illness Frontmatter 3/1/04 8:45 AM Page 1
    Mental Illness Frontmatter 3/1/04 8:45 AM Page 1 Mental Illness OPPOSING VIEWPOINTS ® Mental Illness Frontmatter 3/1/04 8:45 AM Page 2 Other Books of Related Interest OPPOSING VIEWPOINTS SERIES Alcohol An Aging Population Chemical Dependency Child Abuse The Death Penalty Health Care Health and Fitness The Homeless Suicide Teens at Risk CURRENT CONTROVERSIES SERIES Alcoholism Capital Punishment The Disabled Mental Health Suicide Teen Addiction AT ISSUE SERIES Teen Suicide CONTEMPORARY ISSUES COMPANION Depression Eating Disorders Mental Illness Frontmatter 3/1/04 8:45 AM Page 3 Mental Illness OPPOSING VIEWPOINTS ® Tamara L. Roleff and Laura Egendorf, Book Editors David L. Bender, Publisher Bruno Leone, Executive Editor Bonnie Szumski, Editorial Director David M. Haugen, Managing Editor Greenhaven Press, Inc., San Diego, California Mental Illness Frontmatter 3/1/04 8:45 AM Page 4 Cover photo: PhotoDisc, Inc. Library of Congress Cataloging-in-Publication Data Mental illness / Tamara L. Roleff, Laura K. Egendorf, book editors. p. cm. — (Opposing viewpoints series) Includes bibliographical references and index. ISBN 0-7377-0348-2 (hc : alk. paper) — ISBN 0-7377-0347-4 (pbk. : alk. paper) 1. Mental illness—Public opinion. 2. Mental illness—Social aspects. 3. Mental illness—Miscellanea. I. Roleff, Tamara L., 1959– . II. Egendorf, Laura K., 1973– . III. Series. RC454.4 .M463 2000 616.89—dc21 99-055632 CIP Copyright ©2000 by Greenhaven Press, Inc. Printed in the U.S.A. No part of this book may be reproduced or used in any form or by any means, electrical, mechanical, or otherwise, including, but not limited to, photocopy, recording, or any information storage and retrieval system, without prior written permission from the publisher.
    [Show full text]
  • New York Times
    The New York Times July 15, 2013 An Economy on the Mend Lifts Corporate Travel By Joe Sharkey IdeaWorksCompany contributed information to this article - - see italics. BUSINESS travelers in the United States will spend about $273.3 billion on the road in 2013, a 4.3 percent increase over last year and a reflection of stronger growth in domestic travel as the national economy stabilizes, according to the Global Business Travel Association. Of that estimated $273.3 billion, about $117.1 billion will be spent on group travel — meetings and conventions, conferences, incentive trips and the like. And $33.1 billion will be spent in the United States on international travel, the trade group says in a report preceding its annual convention, which will be held early next month in San Diego. No matter how you parse it, that’s a whole lot of spending for corporate travel managers and individual business travelers to evaluate and track. Another report is coming out this week, from Concur, the travel expense management company, that seeks to “shine a bright light on a big chunk of data” for business travel spending, said Robson Grieve, executive vice president for marketing. I had an early look at the Concur study, which examined individual travel expense accounts totaling $50 billion at 18,000 corporate clients last year. Among the findings I found most interesting: Travelers at small and midsize companies on average spent significantly more in every expense category — hotels, airfares, dining and entertainment — than those at large corporations. That trend is surprising, said Mr. Grieve, who suggested that it probably reflects more aggressive regional business activity by smaller companies scrambling for growth.
    [Show full text]
  • Is Airline Passenger Profiling Necessary?
    University of Miami Law Review Volume 62 Number 1 Volume 62 Number 1 (October 2007) Article 2 10-1-2007 Is Airline Passenger Profiling Necessary? Timothy M. Ravich Follow this and additional works at: https://repository.law.miami.edu/umlr Part of the Law Commons Recommended Citation Timothy M. Ravich, Is Airline Passenger Profiling Necessary?, 62 U. Miami L. Rev. 1 (2007) Available at: https://repository.law.miami.edu/umlr/vol62/iss1/2 This Article is brought to you for free and open access by the Journals at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in University of Miami Law Review by an authorized editor of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. University of Miami Law Review VOLUME 62 OCTOBER 2007 NUMBER 1 ARTICLES Is Airline Passenger Profiling Necessary? TIMOTHY M. RAVICH* I. INTRODUCTION ...................................................... 1 II. PROFILING INITIATIVES ................................................ 5 A. Computer Assisted Passenger Prescreening System (CAPPS) ............ 9 B . CA PPS II ....................................................... 16 C . Secure Flight.................................................... 19 D. Biometrics and the Registered Traveler Program ...................... 25 III. DISCUSSION .. ....................................................... 29 A. Identifying the Enemy ............................................. 31 B. Is Airline PassengerProfiling Rational
    [Show full text]
  • Determining Jurisdiction in Internet Defamation Cases: Insights on Latin America Eduardo Bertoni *
    Determining jurisdiction in Internet defamation cases: Insights on Latin America Eduardo Bertoni * Introduction Criminal law includes defamation among the range of proscribed conducts. The nomen juris attributed to related crimes in Latin America covers from libel and slander to contumely and other definitions which usually seek to protect "honor" as a legal interest, both in its objective (reputation) and subjective (self- esteem) dimensions. Irrespective of criminal law theories, we could say that including honor among the interests protected by the State's criminal law apparatus serves either to deter risk or harm to a legal interest or to reinforce –through the threat of criminal action– the value attached at a given time by a society to the relevant legal interest, by punishing conducts that result in risk or damage to it. 1 Meanwhile, civil law also provides a response to violations of the right to honor. In filing a civil action for defamation, the allegedly aggrieved party seeks a monetary compensation for injury to his or her likeness, honor, moral integrity or reputation. Notwithstanding the fact that jurisdictions differ in the causes of action for defamation and the limitations that they admit, it has been recognized in Latin America that moral damage arising from defamation can lead to an award of damages. However, the quantification of this concept poses several difficulties. The basis for both criminal and civil actions is always a form of speech. The form of this expression – written, oral or artistic– does not determine the legal consequences, although the scope of its dissemination may be one of the factors that should be considered, for instance, to establish the extent of the damage.
    [Show full text]
  • The Essential Guide to Business Etiquette
    The Essential Guide to Business Etiquette Lillian Hunt Chaney Jeanette St. Clair Martin Praeger The Essential Guide to Business Etiquette The Essential Guide to Business Etiquette LILLIAN HUNT CHANEY AND JEANETTE ST. CLAIR MARTIN Library of Congress Cataloging-in-Publication Data Chaney, Lillian H. The essential guide to business etiquette / Lillian Hunt Chaney and Jeanette St. Clair Martin. p. cm. Includes bibliographical references and index. ISBN 978–0–275–99714–4 (alk. paper) 1. Business etiquette. 2. Interpersonal relations. 3. Business communication. 4. Self-presentation. I. Martin, Jeanette S. II. Title. HF5389.C468 2007 395.5’2—dc22 2007022771 British Library Cataloguing in Publication Data is available. Copyright © 2007 by Lillian Hunt Chaney and Jeanette St. Clair Martin All rights reserved. No portion of this book may be reproduced, by any process or technique, without the express written consent of the publisher. Library of Congress Catalog Card Number: 2007022771 ISBN: 978–0–275–99714–4 First published in 2007 Praeger Publishers, 88 Post Road West, Westport, CT 06881 An imprint of Greenwood Publishing Group, Inc. www.praeger.com Printed in the United States of America The paper used in this book complies with the Permanent Paper Standard issued by the National Information Standards Organization (Z39.48-1984). 10987654321 Contents Introduction xi 1. Job Interview Etiquette 1 Applicant Etiquette 2 Interviewer Etiquette 8 2. Business Dress and Grooming 13 Dress Considerations 14 Attributes of Dress 17 Research Findings Related to Business Dress 18 Business Professional Attire 18 Business Casual Attire 21 Dress for Special Events and Occasions 22 3. Office Politics 25 Self-Promotion 26 Honesty and Truth-Telling 28 Compliments and Flattery 29 Gossip 30 vi Contents Favors and Hidden Motives 32 Dress and Grooming 32 Business Socializing and Etiquette 33 4.
    [Show full text]
  • Appeal of FOIA Request No. TSA 10-0780
    Laura Rotolo Staff Attorney AMERICANCIVIL LIBERTIESUNION ACLU of Massachusetts OF MASSACHUSETTS • 211 Congress Street Boston, MA 02110 (617) 4,82-3170 lrotolo(r1Jacl II m .org -- FREEDOM OF INFORMATION APPEAL -- September 2 L 2011 Kimberly Walton, Special Counselor Office of the Special Counselor Transportation Security Administration 601 South l i 11Street East Building, E7- l 2 l S Arlington. VA 20598-6033 Re: Appeal of FOIA Request No. TSA 10-0780 Dear Ms. Walton, This letter constitutes an appeal pursuant to 5 U.S.C. § 552(a)(6) of the determination made on August 17, 2011 in response to request number TSA 10-0780. The underlying request for "(any) repo1is addressing the effectiveness or performance of [Electronic Trace Po1ials (ETP)]. Documents addressing perfor.mance issues that have led to ETPs being removed from some airports" was made by the American Civil Liberties Union Foundation of Massachusetts (A CLUM). Exhibit A. The agency responded by letter dated August 17, 2011, signed by Yvonne L. Coates. Director, Freedom of Information Act Office. Exhibit B. The letter stated that TSA found 75 pages of responsive documents. However only fifty-six (56) pages accompanied the letter. The agency did not provide an explanation for the nineteen (19) ACLU Foundation of Massachusetts 211 Congress St. Boston MA 02110 .. 617.482.3170 .. 617.451.0009 (f) :: www.aclum.org ~25 pages that were withheld. In addition, the agency redacted most of thi1ieen ( 13) pages, citing 5 U.S.C. § 552(b)(3) and (b)(6). For the following reasons, we appeal both the withholding of nineteen ( 19) pages and the redactions in the released documents.
    [Show full text]
  • Dead Canaries in the Coal Mines: the Symbolic Assailant Revisited
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Articles by Maurer Faculty Faculty Scholarship 2018 Dead Canaries in the Coal Mines: The Symbolic Assailant Revisited Jeannine Bell Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facpub Part of the Civil Rights and Discrimination Commons, Law and Race Commons, and the Law and Society Commons Recommended Citation Bell, Jeannine, "Dead Canaries in the Coal Mines: The Symbolic Assailant Revisited" (2018). Articles by Maurer Faculty. 2731. https://www.repository.law.indiana.edu/facpub/2731 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Articles by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. DEAD CANARIES IN THE COAL MINES: THE SYMBOLIC ASSAILANT REVISITED Jeannine Bell* ABSTRACT The well-publicized deaths of several African-Americans-Tamir Rice, Philando Castile, and Alton Sterling among others-at the hands of police stem from tragic interactions predicated upon well-understood practices analyzed by police scholars since the 1950s. The symbolic assailant, a construct created by police scholar Jerome Skolnick in the mid-1960s to identify persons whose behavior and characteristics the police view as threatening, is especially relevant to contemporary policing. This Article explores the societal roots of the creation of a Black symbolic assailant in contemporary American policing. The construction of African- American men as symbolic assailants is one of the most important factors characterizing police interaction with African-American males.
    [Show full text]