Abstract
Since 9/11, air transportation has been one of the most important and closely watched areas of homeland security under federal control. Despite this centralization of authority, some states have begun to question some of the policies enacted by the Transportation Security Administration (TSA). In 2011, Texas passed legislation that would have criminalized TSA officers for carrying out such policies, specifically enhanced pat downs of airport travelers. In light of threats from the Department of Justice, Texas ultimately backed down from the legislation, but the legal arguments made by participants on both sides remain relevant to future conflicts between state and federal authority on homeland security. The events in Texas are particularly interesting because they make public the tension between citizen preferences for security and civil liberties, highlighting the role of federalism in the homeland security domain. Using legal analysis, we find that federal power in the realm of aviation security given by the Constitution’s Supremacy Clause is less clear-cut than generally argued. Therefore, Texas’ attempt to assert its authority in this domain was not necessarily legally unsound.
- 1
Granted, it’s a blog, which sacrifices the depth of the discourse for a quick response, but the TSA’s response is not as nuanced as this issue deserves: “What’s our take on the Texas House of Representatives voting to ban the current TSA pat-down? Well, the Supremacy Clause of the U.S. Constitution (Article. VI. Clause 2) prevents states from regulating the federal government” (Transportation Security Administration 2011).
- 2
Of course, the presence of multiple airport security laws tailored to the preferences of each state undermines the unifying purpose for which the TSA was created. The presence of a weak link could be exploited by terrorists, thus changing the public’s perception of the costs and benefits of intrusive airline security procedures.
- 3
As the dissent notes, however, the commentators have suggested as early as 1954 that nationally elected officials can act as guarantors of constitutional federalism, but the dissent further suggests that then extant reasons for “national action” are no longer valid. On prominent commentator referred to the decision as the “second death of federalism” (Van Alstyne 1985).
- 4
First decided in 215 F.3d 986 (9th Cir. 2000) was reversed, 253 F.3d 359 (9th Cir.) and the opinion vacated, 266 F.3d 979 (9th Cir. 2001).
References
Alkon, A. (2011) Don’t Give the TSA an Easy Time of Violating your Rights. Accessed on March 16, 2012. Available at: http://www.advicegoddess.com/archives/2011/04/26/make it tought.html.Suche in Google Scholar
Bali, V. (2009) “Tinkering Toward a National Identification System: An Experiment on Policy Attitudes,” Policy Studies Journal, 37:233–255.10.1111/j.1541-0072.2009.00312.xSuche in Google Scholar
Best, S. J., B. S. Krueger and S. Pearson-Merkowitz (2012) “Al Qaeda Versus Big Brother: Anxiety about Government Monitoring and Support for Domestic Counterterrorism Policies,” Political Behavior, 34:608–625.10.1007/s11109-011-9177-6Suche in Google Scholar
Birkland, T. A. and S. E. DeYoung (2011) “Emergency Response, Doctrinal Confusion, and Federalism in the Deepwater Horizon Oil Spill,” Publius: The Journal of Federalism, 41(3):471–493.10.1093/publius/pjr011Suche in Google Scholar
Bohrer, B. (2011) Rep. Sharon Cissna, Angry Over TSA Patdown, Arrives by Boat in Alaska. Available at: http://www.huffingtonpost.com/2011/02/24/rep-sharoncissna-tsan827934.html. Accessed on December 3, 2012.Suche in Google Scholar
Clark, B. R. (2003) “The Supremacy Clause as a Check on Federal Power,” George Washington University Law Review, 71:2–43.Suche in Google Scholar
Condon, S. (2011) TSA Child Pat-Down Video Spurs New Legislation. Available at: http://www.cbsnews.com/8301-503544 162-20054000-503544.html. Accessed on March 16, 2012.Suche in Google Scholar
Davis, D. W. and B. D. Silver (2004) “Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America,” American Journal of Political Science, 48:28–46.10.1111/j.0092-5853.2004.00054.xSuche in Google Scholar
Derthick, M. (2007) “Where Federalism didn’t Fail,” Public Administration Review, Special Issue:36–47.10.1111/j.1540-6210.2007.00811.xSuche in Google Scholar
Eisinger, P. (2006) “Imperfect Federalism: The Intergovernmental Partnership for Homeland Security,” Public Administration Review, 66(4):537–545.10.1111/j.1540-6210.2006.00614.xSuche in Google Scholar
Electronic Privacy Information Center (2010) EPIC v. the Department of Homeland Security. Case No. 10-1157 (D.C. Cir. filed July 2, 2010).Suche in Google Scholar
Elias, B. (2011) Changes in airport passenger screening technologies and procedures: Frequently asked questions. CRS Report for Congress R41502, Congressional Research Service.Suche in Google Scholar
Frederickson, H. G. and T. R. LaPorte (2002) “Airport Security, High reliability, and the Problem of Rationality,” Public Administration Review, 62(Special Issue):33–43.10.1111/1540-6210.62.s1.7Suche in Google Scholar
Freedom To Travel USA (2011) TSA Information Kit. Available at: http://supportdignity.com/. Accessed on March 7, 2012.Suche in Google Scholar
Hamilton, A. (1961) Federalist no. 28. In: (C. Rossiter, eds.) The Federalist Papers. New York: New American Library.Suche in Google Scholar
Hetherington, M. and E. Suhay (2011) “Authoritarianism, Threat, and Americans’ Support for the War on Terror,” American Journal of Political Science, 55(3):546–560.10.1111/j.1540-5907.2011.00514.xSuche in Google Scholar
Hogue, A. (2011a) Anti-Groping Bill Clears Committee, Gathers Enough Support to Pass Both Chambers. Available at: http://www.lonestarreport.org/Home/tabid/38/Default.aspx. Accessed on March 7, 2012.Suche in Google Scholar
Hogue, A. (2011b) Bill Targeting TSA Groping in Texas Airports Dead. Available at: http://blogs.star-telegram.com/politex/2011/05/bill-targeting-tsagroping-in-texas-airports-dead-key-senator-says.html. Accessed on March 7, 2012.Suche in Google Scholar
Hogue, A. (2011c) House Anti-Groping Bill Breaks Down, Senate Version up Monday. Available at: http://www.lonestarreport.org/LoneStarReport/BlogArchive/tabid/65/EntryId/1236/House-anti-groping-bill-breaks-down-Senateversion-up-Monday.aspx. Accessed on March 7, 2012.Suche in Google Scholar
Hogue, A. (2011d) TSA Bill Clears Committee, Heads to House Floor Tomorrow; May Signal New Life for Courts Bill. Available at: http://www.lonestarreport.org/LoneStarReport/BlogArchive/tabid/65/EntryId/1244/TSA-bill-clearscommittee-heads-to-House-floor-tomorrow-may-signal-new-life-for-courtsbill.aspx. Accessed on March 7, 2012.Suche in Google Scholar
Holt, K. (2011) Former Miss USA traumatized by TSA in Dallas. Available at: http://www.thenewamerican.com/usnews/crime/7293-former-missusa-traumatized-by-tsa-in-dallas.Suche in Google Scholar
Huddy, L., S. Feldman, C. Taber and G. Lahav (2005) “Threat, Anxiety, and Support of Antiterrorism Policies,” American Journal of Political Science, 49(3):593–608.10.1111/j.1540-5907.2005.00144.xSuche in Google Scholar
Johnson, M. M. (2006) TSA to Begin ‘See-Through’ Scanning Technology Pilot Program at Phoenix Airport. In CQ Homeland Security. December 5, 2006.Suche in Google Scholar
Kettl, D. F. (2003) “Contingent Coordination: Practical and Theoretical Puzzles for Homeland Security,” The American Review of Public Administration, 33(3):253–277.10.1177/0275074003254472Suche in Google Scholar
Kettl, D. F. (2006) “Is the Worst Yet to Come?” Annals of the American Academy of Political and Social Science, 604(1):273–287.10.1177/0002716205285981Suche in Google Scholar
Krane, D. (2007) “The Middle Tier in American federalism: State Government Policy Activism During the Bush Presidency,” Publius: The Journal of Federalism, 37(3):453–477.10.1093/publius/pjm006Suche in Google Scholar
Lord, S. (2010). TSA is Increasing Procurement and Deployment of the Advanced Imaging Technology, but Challenges to this Effort and Other Areas of Aviation Security Remain. Testimony Before the Subcommittee on Transportation Security and Infrastructure Protection, Committee on Homeland Security, House of Representatives GAO-10-484T. Washington D.C.: United States Government Accountability Office.Suche in Google Scholar
Madison, J. (1961) “Federalist no. 39.” In: (C. Rossiter, eds.) The Federalist Papers. New American Library, New York: Penguin.Suche in Google Scholar
May, P. J., A. E. Jochim and J. Sapotichne (2011) “Constructing Homeland Security: An Anemic Policy Regime,” Policy Studies Journal, 39(2):285–307.10.1111/j.1541-0072.2011.00408.xSuche in Google Scholar
Murphy, J. E. (2011) “Letter to Texas leaders,” Letter. May 24. Available at: http://reason.com/assets/db/13063422969183.pdf. Accessed on April 1, 2012.Suche in Google Scholar
Nixon, R. (2012) New Law Clears the Way for Airports to Drop T.S.A. Screeners. March 15. The New York Times, page A10.Suche in Google Scholar
Peterman, D. R., B. Elias and J. Frittelli (2011) Transportation Security: Issues for the 112th Congress. CRS Report for Congress, Congressional Research Service.Suche in Google Scholar
Pistole, J. S. (2011) Testimony of Transportation Security Administrator John S. Pistole before the House Committee on Homeland Security, Subcommittee on Transportation Security, “terrorism and transportation security: TSA oversight.” Available at: http://www.dhs.gov/news/2011/02/09/testimonytransportation-security-administrator-john-s-pistole-house-committee. Accessed on October 19, 2011.Suche in Google Scholar
Regan, P. M. and C. J. Deering (2009) “State Opposition to REAL ID,” Publius: The Journal of Federalism, 39(3):476–505.10.1093/publius/pjp004Suche in Google Scholar
Ripberger, J. T. (2011) “Whither Civil Defense and Homeland Security in the Study of Public Policy? A Look at Research on the Policy, The Public, and the Process,” The Policy Studies Journal, 39(S1):77–91.10.1111/j.1541-0072.2010.00389_6.xSuche in Google Scholar
Sanquist, T., H. Mahy and F. Morris (2008) “An Exploratory Risk Perception Study of Attitudes Toward Homeland Security Systems,” Risk Analysis, 28:1125–1133.10.1111/j.1539-6924.2008.01069.xSuche in Google Scholar
Scavo, C., R. C. Kearney and R. J. Kilroy Jr. (2007) “Challenges to Federalism: Homeland Security and Disaster Response,” Publius: The Journal of Federalism, 38(1):81–110.10.1093/publius/pjm029Suche in Google Scholar
Schildkraut, D. J. (2009) “The Dynamics of Public Opinion on Ethnic Profiling after 9/11,” American Behavioral Scientist, 53:61–79.10.1177/0002764209338786Suche in Google Scholar
Schneider, S. (2008) “Who’s to Blame? (mis) Perceptions of the Intergovernmental Response to Disasters,” Publius: The Journal of Federalism, 38(4):715–738.10.1093/publius/pjn019Suche in Google Scholar
Sedat, J., M. Shuman, D. Agard and R. Stroud (2010) Letter to John P. Holdren. Available at: http://www.propublica.org/documents/item/april-2011-letter-to-join-holdren. Accessed on April 1, 2012.Suche in Google Scholar
Silver, N. (2010) New Poll Suggests Shift in Public Views on T.S.A. Procedures. New York Times. November 22. http://fivethirtyeight.blogs.nytimes.com/2010/11/22/new-poll-suggests-shift-in-public-views-on-t-s-a-procedures/. Accessed on March 16, 2012.Suche in Google Scholar
Sullivan, E. (2011) “TSA Warning Describes Surgically Implanted Bombs,” The Christian Science Monitor. The Christian Science Monitor. July 7. http://www.csmonitor.com/USA/Latest-News-Wires/2011/0707/TSA-warning-describes-surgically-implanted-bombs. Accessed on March 16, 2012.Suche in Google Scholar
Transportation Security Administration. More Information: Advanced Imaging technology. Available at: http://www.tsa.gov/approach/tech/ait/reading.shtm. Accessed on March 31, 2013.Suche in Google Scholar
Transportation Security Administration (2010) TSA Statement on New Patdown Procedures. Available at: http://www.tsa.gov/press/happenings/102810patdown. shtm. Accessed on March 16, 2012.Suche in Google Scholar
Transportation Security Administration (2011) Texas House of Representatives Seeking to Ban Current TSA Pat-Down. Avaialble at: http://blog.tsa.gov/2011/05/texashouse-of-representatives-seeking.html. Accessed on March 16, 2012.Suche in Google Scholar
Van Alstyne, W. W. (1985) “The Second Death of Federalism,” Michigan Law Review, 83(1709):1709–1733.10.2307/1288970Suche in Google Scholar
©2013 by Walter de Gruyter Berlin Boston
Artikel in diesem Heft
- Masthead
- Masthead
- Research Articles
- Integrating Federal Approaches to Post-Cyber Incident Mitigation
- Cybersecurity and US Legislative Efforts to address Cybercrime
- The Military’s Response to Domestic CBRNE Incidents
- Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
- Situated Response and Learning of Distributed Bushfire Coordinating Teams
- A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
- “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
- Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
- Understanding Incident Response to Unplanned Releases at Chemical Facilities
- A Study on the Responsiveness of Local Health Departments that Use Facebook
- Texas takes on the TSA: The Constitutional Fight over Airport Security
- The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
- The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
- Diffusion of Emergency Information during a Crisis within a University
- Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
- Communication and News
- A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
- Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
- It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
- Finding the New High Ground in Cyber War: Malware as an Instrument of War
- Opinions
- Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
- Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
- Book Review
- Emergency Management: The American Experience 1900–2010 (2nd Edition)
Artikel in diesem Heft
- Masthead
- Masthead
- Research Articles
- Integrating Federal Approaches to Post-Cyber Incident Mitigation
- Cybersecurity and US Legislative Efforts to address Cybercrime
- The Military’s Response to Domestic CBRNE Incidents
- Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
- Situated Response and Learning of Distributed Bushfire Coordinating Teams
- A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
- “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
- Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
- Understanding Incident Response to Unplanned Releases at Chemical Facilities
- A Study on the Responsiveness of Local Health Departments that Use Facebook
- Texas takes on the TSA: The Constitutional Fight over Airport Security
- The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
- The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
- Diffusion of Emergency Information during a Crisis within a University
- Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
- Communication and News
- A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
- Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
- It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
- Finding the New High Ground in Cyber War: Malware as an Instrument of War
- Opinions
- Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
- Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
- Book Review
- Emergency Management: The American Experience 1900–2010 (2nd Edition)