Port Security Paper Example

Paper Type:  Essay
Pages:  7
Wordcount:  1749 Words
Date:  2022-11-04

Introduction

What are four published resources (strategies, International Codes, etc.) available to the port FSO in assessing domestic and international risks associated with terrorism and other criminal activity threats posed to port maritime operations? Provide a critical analysis of each; strengths, weaknesses areas that need further development

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

The port facility security officer is someone who is responsible for the management and planning of the functions of port security. International Convention holds on the fact that the FSO determines the implementation, revision, development, as well as maintenance of ports and is in charge of all security-related functions (Jensen & Lars, 2015). In the assessment of international and domestic risks which are linked with various criminal activities which are related to maritime operations of the port, below are four essential resources which have been availed to the FSO in the fight against terrorism and other criminal activities.

Intelligence Information

Information from intelligence can be broken down into various categories including Open Sources; where information is gotten from public sources like news reports, libraries, and internet (Jensen & Lars, 2015). Such resources are advantageous in enabling research on methodologies and activities which are terror and port threats related. There is more acquaintance with the strategies followed by terrorism groups in executing their actions therefore taking precaution measures before the activities happen (Colesniuc & Dan, 2013).

According to Lee and Robert M (2013), the second category is Human Intelligence whereby data is obtained from certain groups of people who work who have been hired for securing people. The other Intelligence is the electronic transmissions that are collected through satellites, ships, or planes. This is beneficial to the FSO since they can research activities and methodologies of terrorist, enabling them to make an appropriate action plan and take proactive measures which tackle any terrorist attacks.

Surveillance

(Loh, Thai & Vinh, 2015) the support that surveillance is carried out with the help of photos and images which have been obtained by drones and aircraft, enabling FSO's in covering any happening which is unforeseen to happen. Observation of unlikely activities which are unusual is carried out and prepared in advance on how to deal with it. They inform the coast guard after getting such threats, who then takes the appropriate action, neutralizing the threat to security (Colesniuc & Dan, 2013). Such techniques make it possible for the FSO of the port to possess information in a large area in the maritime surroundings from one location (Loh et al., 2015). They get to know of unfamiliar activities, taking fast action. The coastguard is responsible if the threat exists the regulatory control. Vessels of the coastguards are distributed across every big port, ensuring great securing of the port (Taylor, 2009).

Human Resources

According to Lee and Robert M (2013), this refers to recruit personnel who know how to handle threats. These professionals are specifically trained concerning behavior relating to activities of criminals which are in international and domestic platforms as well as some various forms of terror. Private sector organizations are operating many port facilities. Port FSO's must possess good cooperation with local & state government including law enforcement agencies in accessing sources and having command over intelligence information.

These agencies include the Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI). There are some advantages from the named agencies to FSOs since sourcing of data is possible which comes from interviewing criminals. The proceedings of covert which are carried out by CIA and FBI outsources data which can threaten the security of the port. FSO is alarmed by the agencies about the threats and fears before the terrorist groups hitting the targeted area (Frittelli & Lake, 2006).

Sonar technology

Sonar technology assists FSOs in maintaining the security of the port. It is an effective technology with the possibility of testing the properties of sound which are physical and are transmitted via water (Christopher, 2014). It locates items which are below the water and also measures variables which are linked with items such as the speed, distance, size, and the item's direction that poses a threat. Sonar technology is very resourceful at keeping items secured. It possesses multiple functions which include determination of water's depth and any item that is above or below water which could result in catastrophic outcomes if not handled properly.

What is the role of MTSA 2002 required Area Maritime Security Committee or AMSC? Why is this organization critical to the secure operation of a port? Be specific. Are there areas within the security regime that committee members can work more closely?

Ports' security has substantially changed with implementing of the 2002 Maritime Transportation Security Act (MTSA). It is an act which specifically authorized establishing of the Area Maritime Security Committees (AMSCs), which are collaboration platforms for the industry partners as well as the government in working together towards enhancing security around the surroundings of the maritime. It has been achieved via various vulnerability assessments, training, meetings, and partnerships, sharing of information, networking, and developing strategies as well as plans.

Local AMSC annual records are a vital approach which is used in compiling and sharing information which pertains issues concerning AMSC including the organization of committees, challenges, outstanding practices, accomplishments, training events, challenges, and recommendations (Miron, Muita & Kevin, 2014). The contributions ensure that the Coast Guard, as well as the communities of maritime, are maintaining alignment using strategies of national preparedness, aims, requirements of reporting as well as serving towards improving the effectiveness of the AMSC (Miron et al., 2014).

The association is vital to the securing of the port operations. .AMS Committees provide a structure which has resulted in improving information sharing among stakeholders in the port security. The AMS Committee advise to and offer assistance to the COTP in development of the AMS Plan (Marsh &McLennan Companies, 2014). It also identifies critical port infrastructure as well as operations, identifies risks which may include security, potential, and cyber, security. It also plays a significant role in determining implementation methods and mitigation strategies and describe and develop processes which continually evaluate overall port security through the AMS exercises. The Committee is a link as well in communicating changes as well as threats in Maritime Security (MARSEC) and is responsible for the dissemination of appropriate security information directed to port stakeholders (Marsh &McLennan Companies, 2014).

AMSCs should ensure continuity in evolving and adapting for combatting of the various emerging threats and at the same time guaranteeing the unimpeded flow of commerce (Thai, Grewal&Devinder, 2007). Security challenges, which are either cyber-related or physical, are a constant, posing impacts which are potentially diverse on the critical MTS. Coordination via AMSCs and information sharing are vital, as well as continued collaboration, in the mitigation of the essential and risks in facilitating efficient commerce.

Within the security regime, the committees can work on several areas more closely. One of these areas is the Cyber Security/Cyber Risk Management. Field units have requested more guidance or policy from the CG Headquarters which relate to cybersecurity maritime issues as well as the development of training on resiliency, preparedness, and recovery from an incident of cyber security (Thai et al., 2007). Several AMSCs suggest dialogue which is open as well as engaging the FBI and Infra-Gard like useful data with resource sharing. Another area the committees can work on closely is the Unmanned Aerial Systems (UAS). AMSCs can recommend the Department of Homeland Security (DHS) and the U.S. Coast Guard (USCG) help in any legislative and their policy efforts in providing state, Federal, and Local law enforcement with authorities with purposes of identifying, interdicting, and ultimately prosecuting cases in which maritime infrastructure and the critical assets of MTS are at risk from the UASs. Also, the DHS and the USCG need to support the creation of procedures, tactics, techniques, and funding for the required equipment in addressing potential risks which are associated with negligent or nefarious use of UASs.

Active Shooter incidents are also another area the AMSCs need to focus on more closely. AMSCs have been facilitating active shooter workshops, as well as other training for relevant subcommittees which include law enforcement and intelligence among others (Khan, Omera, Burnes & Bernard, 2007). Many AMSCs have recommended port partners to incorporate active shooter scenarios into their security and safety drills. Maritime security has been at the forefront of the waterway infrastructure security posture and the United States ports. The AMSCs need to keep gearing efforts in the evolvement and adaptation by combat emerging threats while at the same time ensuring the flow of commerce is unimpeded (Khan et al., 2007).

Define and give examples of Cyber maritime terrorism. How does it threaten port security operations now and in the future? Be specific.

Cyber terrorism is the 'unlawful attack' against networks of computers causing violence to property or persons and coercing a government. Also, it is carried out against critical and essential infrastructure, causing significance. Attacks which merely disrupting services which are non-essential are not a cyber terrorism act (Fok & Edward, 2013). With the increase in the dependency and use of information technology, cyber terrorism may turn out to be the next method of attack which terrorists adopt.

Primarily, the physical presence of the terrorist when it comes to cyber terrorism is unnecessary. A terrorist can thus cause distraction from their homes. This is because regardless of their residential location, the internet has provided an inexpensive tool being used for destruction. The only things which are required are good hacking and computer skills which exceed that of the opponent (Eski&Yarin, 2011).

Cyber terrorism has threatened port security operations. It has provided the cyber-terrorist with anonymity in a way that makes it very difficult for the security agencies to identify the real identity of the terrorist. The number of targets of cyber terrorism is unlimited, including public utilities and the government. Moreover, since several vulnerabilities exist in the software system, they are easily be exploited by cyber terrorists.

Cyber terrorism is a big risk resulting from the maritime industry increasing dependency on information technology. Terrorists have as a result gotten the opportunity of resorting to such measures (Eski&Yarin, 2011). Such threats have been referred to as 'cyber-Pearl Harbour.' The awareness of the maritime industry regarding cyber terrorism threats has been deemed 'low to non-existent.' With various maritime activities significantly relying on the accuracy and effectiveness of computer data and information technology, any disruption or interference in addition to that leads to disastrous consequences.

The maritime industry has, therefore, an imminent need for ensuring the prevention of cyber-attacks. A legal framework which is adequate should...

Cite this page

Port Security Paper Example. (2022, Nov 04). Retrieved from https://proessays.net/essays/port-security-paper-example

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism