Startseite Texas takes on the TSA: The Constitutional Fight over Airport Security
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Texas takes on the TSA: The Constitutional Fight over Airport Security

  • Cali M. Ellis EMAIL logo und Michael C. McDaniel
Veröffentlicht/Copyright: 19. April 2013

Abstract

Since 9/11, air transportation has been one of the most important and closely watched areas of homeland security under federal control. Despite this centralization of authority, some states have begun to question some of the policies enacted by the Transportation Security Administration (TSA). In 2011, Texas passed legislation that would have criminalized TSA officers for carrying out such policies, specifically enhanced pat downs of airport travelers. In light of threats from the Department of Justice, Texas ultimately backed down from the legislation, but the legal arguments made by participants on both sides remain relevant to future conflicts between state and federal authority on homeland security. The events in Texas are particularly interesting because they make public the tension between citizen preferences for security and civil liberties, highlighting the role of federalism in the homeland security domain. Using legal analysis, we find that federal power in the realm of aviation security given by the Constitution’s Supremacy Clause is less clear-cut than generally argued. Therefore, Texas’ attempt to assert its authority in this domain was not necessarily legally unsound.


Corresponding author: Cali M. Ellis, University of Michigan, 5700 Haven Hall, 505 South State Street, Ann Arbor, MI 48109-1045, USA, Tel.: +310-683-2149, Fax: +810-752-1847, e-mail:

  1. 1

    Granted, it’s a blog, which sacrifices the depth of the discourse for a quick response, but the TSA’s response is not as nuanced as this issue deserves: “What’s our take on the Texas House of Representatives voting to ban the current TSA pat-down? Well, the Supremacy Clause of the U.S. Constitution (Article. VI. Clause 2) prevents states from regulating the federal government” (Transportation Security Administration 2011).

  2. 2

    Of course, the presence of multiple airport security laws tailored to the preferences of each state undermines the unifying purpose for which the TSA was created. The presence of a weak link could be exploited by terrorists, thus changing the public’s perception of the costs and benefits of intrusive airline security procedures.

  3. 3

    As the dissent notes, however, the commentators have suggested as early as 1954 that nationally elected officials can act as guarantors of constitutional federalism, but the dissent further suggests that then extant reasons for “national action” are no longer valid. On prominent commentator referred to the decision as the “second death of federalism” (Van Alstyne 1985).

  4. 4

    First decided in 215 F.3d 986 (9th Cir. 2000) was reversed, 253 F.3d 359 (9th Cir.) and the opinion vacated, 266 F.3d 979 (9th Cir. 2001).

References

Alkon, A. (2011) Don’t Give the TSA an Easy Time of Violating your Rights. Accessed on March 16, 2012. Available at: http://www.advicegoddess.com/archives/2011/04/26/make it tought.html.Suche in Google Scholar

Bali, V. (2009) “Tinkering Toward a National Identification System: An Experiment on Policy Attitudes,” Policy Studies Journal, 37:233–255.10.1111/j.1541-0072.2009.00312.xSuche in Google Scholar

Best, S. J., B. S. Krueger and S. Pearson-Merkowitz (2012) “Al Qaeda Versus Big Brother: Anxiety about Government Monitoring and Support for Domestic Counterterrorism Policies,” Political Behavior, 34:608–625.10.1007/s11109-011-9177-6Suche in Google Scholar

Birkland, T. A. and S. E. DeYoung (2011) “Emergency Response, Doctrinal Confusion, and Federalism in the Deepwater Horizon Oil Spill,” Publius: The Journal of Federalism, 41(3):471–493.10.1093/publius/pjr011Suche in Google Scholar

Bohrer, B. (2011) Rep. Sharon Cissna, Angry Over TSA Patdown, Arrives by Boat in Alaska. Available at: http://www.huffingtonpost.com/2011/02/24/rep-sharoncissna-tsan827934.html. Accessed on December 3, 2012.Suche in Google Scholar

Clark, B. R. (2003) “The Supremacy Clause as a Check on Federal Power,” George Washington University Law Review, 71:2–43.Suche in Google Scholar

Condon, S. (2011) TSA Child Pat-Down Video Spurs New Legislation. Available at: http://www.cbsnews.com/8301-503544 162-20054000-503544.html. Accessed on March 16, 2012.Suche in Google Scholar

Davis, D. W. and B. D. Silver (2004) “Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America,” American Journal of Political Science, 48:28–46.10.1111/j.0092-5853.2004.00054.xSuche in Google Scholar

Derthick, M. (2007) “Where Federalism didn’t Fail,” Public Administration Review, Special Issue:36–47.10.1111/j.1540-6210.2007.00811.xSuche in Google Scholar

Eisinger, P. (2006) “Imperfect Federalism: The Intergovernmental Partnership for Homeland Security,” Public Administration Review, 66(4):537–545.10.1111/j.1540-6210.2006.00614.xSuche in Google Scholar

Electronic Privacy Information Center (2010) EPIC v. the Department of Homeland Security. Case No. 10-1157 (D.C. Cir. filed July 2, 2010).Suche in Google Scholar

Elias, B. (2011) Changes in airport passenger screening technologies and procedures: Frequently asked questions. CRS Report for Congress R41502, Congressional Research Service.Suche in Google Scholar

Frederickson, H. G. and T. R. LaPorte (2002) “Airport Security, High reliability, and the Problem of Rationality,” Public Administration Review, 62(Special Issue):33–43.10.1111/1540-6210.62.s1.7Suche in Google Scholar

Freedom To Travel USA (2011) TSA Information Kit. Available at: http://supportdignity.com/. Accessed on March 7, 2012.Suche in Google Scholar

Hamilton, A. (1961) Federalist no. 28. In: (C. Rossiter, eds.) The Federalist Papers. New York: New American Library.Suche in Google Scholar

Hetherington, M. and E. Suhay (2011) “Authoritarianism, Threat, and Americans’ Support for the War on Terror,” American Journal of Political Science, 55(3):546–560.10.1111/j.1540-5907.2011.00514.xSuche in Google Scholar

Hogue, A. (2011a) Anti-Groping Bill Clears Committee, Gathers Enough Support to Pass Both Chambers. Available at: http://www.lonestarreport.org/Home/tabid/38/Default.aspx. Accessed on March 7, 2012.Suche in Google Scholar

Hogue, A. (2011b) Bill Targeting TSA Groping in Texas Airports Dead. Available at: http://blogs.star-telegram.com/politex/2011/05/bill-targeting-tsagroping-in-texas-airports-dead-key-senator-says.html. Accessed on March 7, 2012.Suche in Google Scholar

Hogue, A. (2011c) House Anti-Groping Bill Breaks Down, Senate Version up Monday. Available at: http://www.lonestarreport.org/LoneStarReport/BlogArchive/tabid/65/EntryId/1236/House-anti-groping-bill-breaks-down-Senateversion-up-Monday.aspx. Accessed on March 7, 2012.Suche in Google Scholar

Hogue, A. (2011d) TSA Bill Clears Committee, Heads to House Floor Tomorrow; May Signal New Life for Courts Bill. Available at: http://www.lonestarreport.org/LoneStarReport/BlogArchive/tabid/65/EntryId/1244/TSA-bill-clearscommittee-heads-to-House-floor-tomorrow-may-signal-new-life-for-courtsbill.aspx. Accessed on March 7, 2012.Suche in Google Scholar

Holt, K. (2011) Former Miss USA traumatized by TSA in Dallas. Available at: http://www.thenewamerican.com/usnews/crime/7293-former-missusa-traumatized-by-tsa-in-dallas.Suche in Google Scholar

Huddy, L., S. Feldman, C. Taber and G. Lahav (2005) “Threat, Anxiety, and Support of Antiterrorism Policies,” American Journal of Political Science, 49(3):593–608.10.1111/j.1540-5907.2005.00144.xSuche in Google Scholar

Johnson, M. M. (2006) TSA to Begin ‘See-Through’ Scanning Technology Pilot Program at Phoenix Airport. In CQ Homeland Security. December 5, 2006.Suche in Google Scholar

Kettl, D. F. (2003) “Contingent Coordination: Practical and Theoretical Puzzles for Homeland Security,” The American Review of Public Administration, 33(3):253–277.10.1177/0275074003254472Suche in Google Scholar

Kettl, D. F. (2006) “Is the Worst Yet to Come?” Annals of the American Academy of Political and Social Science, 604(1):273–287.10.1177/0002716205285981Suche in Google Scholar

Krane, D. (2007) “The Middle Tier in American federalism: State Government Policy Activism During the Bush Presidency,” Publius: The Journal of Federalism, 37(3):453–477.10.1093/publius/pjm006Suche in Google Scholar

Lord, S. (2010). TSA is Increasing Procurement and Deployment of the Advanced Imaging Technology, but Challenges to this Effort and Other Areas of Aviation Security Remain. Testimony Before the Subcommittee on Transportation Security and Infrastructure Protection, Committee on Homeland Security, House of Representatives GAO-10-484T. Washington D.C.: United States Government Accountability Office.Suche in Google Scholar

Madison, J. (1961) “Federalist no. 39.” In: (C. Rossiter, eds.) The Federalist Papers. New American Library, New York: Penguin.Suche in Google Scholar

May, P. J., A. E. Jochim and J. Sapotichne (2011) “Constructing Homeland Security: An Anemic Policy Regime,” Policy Studies Journal, 39(2):285–307.10.1111/j.1541-0072.2011.00408.xSuche in Google Scholar

Murphy, J. E. (2011) “Letter to Texas leaders,” Letter. May 24. Available at: http://reason.com/assets/db/13063422969183.pdf. Accessed on April 1, 2012.Suche in Google Scholar

Nixon, R. (2012) New Law Clears the Way for Airports to Drop T.S.A. Screeners. March 15. The New York Times, page A10.Suche in Google Scholar

Peterman, D. R., B. Elias and J. Frittelli (2011) Transportation Security: Issues for the 112th Congress. CRS Report for Congress, Congressional Research Service.Suche in Google Scholar

Pistole, J. S. (2011) Testimony of Transportation Security Administrator John S. Pistole before the House Committee on Homeland Security, Subcommittee on Transportation Security, “terrorism and transportation security: TSA oversight.” Available at: http://www.dhs.gov/news/2011/02/09/testimonytransportation-security-administrator-john-s-pistole-house-committee. Accessed on October 19, 2011.Suche in Google Scholar

Regan, P. M. and C. J. Deering (2009) “State Opposition to REAL ID,” Publius: The Journal of Federalism, 39(3):476–505.10.1093/publius/pjp004Suche in Google Scholar

Ripberger, J. T. (2011) “Whither Civil Defense and Homeland Security in the Study of Public Policy? A Look at Research on the Policy, The Public, and the Process,” The Policy Studies Journal, 39(S1):77–91.10.1111/j.1541-0072.2010.00389_6.xSuche in Google Scholar

Sanquist, T., H. Mahy and F. Morris (2008) “An Exploratory Risk Perception Study of Attitudes Toward Homeland Security Systems,” Risk Analysis, 28:1125–1133.10.1111/j.1539-6924.2008.01069.xSuche in Google Scholar

Scavo, C., R. C. Kearney and R. J. Kilroy Jr. (2007) “Challenges to Federalism: Homeland Security and Disaster Response,” Publius: The Journal of Federalism, 38(1):81–110.10.1093/publius/pjm029Suche in Google Scholar

Schildkraut, D. J. (2009) “The Dynamics of Public Opinion on Ethnic Profiling after 9/11,” American Behavioral Scientist, 53:61–79.10.1177/0002764209338786Suche in Google Scholar

Schneider, S. (2008) “Who’s to Blame? (mis) Perceptions of the Intergovernmental Response to Disasters,” Publius: The Journal of Federalism, 38(4):715–738.10.1093/publius/pjn019Suche in Google Scholar

Sedat, J., M. Shuman, D. Agard and R. Stroud (2010) Letter to John P. Holdren. Available at: http://www.propublica.org/documents/item/april-2011-letter-to-join-holdren. Accessed on April 1, 2012.Suche in Google Scholar

Silver, N. (2010) New Poll Suggests Shift in Public Views on T.S.A. Procedures. New York Times. November 22. http://fivethirtyeight.blogs.nytimes.com/2010/11/22/new-poll-suggests-shift-in-public-views-on-t-s-a-procedures/. Accessed on March 16, 2012.Suche in Google Scholar

Sullivan, E. (2011) “TSA Warning Describes Surgically Implanted Bombs,” The Christian Science Monitor. The Christian Science Monitor. July 7. http://www.csmonitor.com/USA/Latest-News-Wires/2011/0707/TSA-warning-describes-surgically-implanted-bombs. Accessed on March 16, 2012.Suche in Google Scholar

Transportation Security Administration. More Information: Advanced Imaging technology. Available at: http://www.tsa.gov/approach/tech/ait/reading.shtm. Accessed on March 31, 2013.Suche in Google Scholar

Transportation Security Administration (2010) TSA Statement on New Patdown Procedures. Available at: http://www.tsa.gov/press/happenings/102810patdown. shtm. Accessed on March 16, 2012.Suche in Google Scholar

Transportation Security Administration (2011) Texas House of Representatives Seeking to Ban Current TSA Pat-Down. Avaialble at: http://blog.tsa.gov/2011/05/texashouse-of-representatives-seeking.html. Accessed on March 16, 2012.Suche in Google Scholar

Van Alstyne, W. W. (1985) “The Second Death of Federalism,” Michigan Law Review, 83(1709):1709–1733.10.2307/1288970Suche in Google Scholar

Published Online: 2013-04-19
Published in Print: 2013-01-01

©2013 by Walter de Gruyter Berlin Boston

Artikel in diesem Heft

  1. Masthead
  2. Masthead
  3. Research Articles
  4. Integrating Federal Approaches to Post-Cyber Incident Mitigation
  5. Cybersecurity and US Legislative Efforts to address Cybercrime
  6. The Military’s Response to Domestic CBRNE Incidents
  7. Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
  8. Situated Response and Learning of Distributed Bushfire Coordinating Teams
  9. A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
  10. “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
  11. Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
  12. Understanding Incident Response to Unplanned Releases at Chemical Facilities
  13. A Study on the Responsiveness of Local Health Departments that Use Facebook
  14. Texas takes on the TSA: The Constitutional Fight over Airport Security
  15. The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
  16. The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
  17. Diffusion of Emergency Information during a Crisis within a University
  18. Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
  19. Communication and News
  20. A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
  21. Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
  22. It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
  23. Finding the New High Ground in Cyber War: Malware as an Instrument of War
  24. Opinions
  25. Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
  26. Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
  27. Book Review
  28. Emergency Management: The American Experience 1900–2010 (2nd Edition)
Heruntergeladen am 23.9.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2012-0068/html
Button zum nach oben scrollen