SlideShare a Scribd company logo
1 of 9
Question 1
Outline the various components of transportation and cargo
security. Specifically what threats exist and what security
measures have been implemented to address those threats.
This assignment should be a minimum of 300 words.
Question 2
Select two (2) infrastructure sectors and thoroughly discuss
how the strategic objectives of the sector-specific security plan
(SSP) will be applied to the two sectors you selected.
This assessment should be a minimum of 300 words.
GENERAL OVERVIEW
Industrial security is concerned with protecting the
manufacturing process. Major threats to industrial security
include accidents, natural disasters, internal theft, sabotage, and
espionage.
Library and museum security is concerned with controlling
both criminal and noncriminal threats to library and museum
inventories which often include rare, priceless, and
irreplaceable objects. Common threats to library and museum
security include theft, vandalism fire, floods, water damage, and
other environmental elements.
Office building security is concerned with securing office
buildings. Major threats to office building security include fire,
inadequate evacuation routes, terroristic activity, bomb threats,
theft, burglary, robbery, sexual assault, and executive
kidnapping. In addition to the aforementioned major threats,
office buildings, because of their open access (i.e., numerous
entry and exit points, multiple agencies occupied one building,
and shared common areas such as lounges and restrooms) and
highly desired equipment and supplies (e.g., copper piping,
recyclable materials, office supplies, payroll checks, classified
information, office equipment, etc.), provide additional
functionality threats to security that must be addressed by
security personnel.
Residential security is concerned with securing personal
residences. For security experts the home is considered a very
unsafe place especially when residents are asleep. Threats to
residential security include accidents, medical emergencies,
fire, theft, burglary, vandalism, assault, homicide, property
damage, personal injury, and natural disasters.
Retail loss prevention is an area of security that is primarily
focused on the retail industry. Internal and external thefts are
the major source of loss for the retail industry. Internal theft
usually occurs at the hands of employees who take cash and/or
merchandise, abuse the referral system, and utilize a variety of
other tactics. External sources of loss include vandalism,
burglary, robbery, credit card fraud, coupon fraud, bad checks,
and shoplifting. Technological advances create unique
challenges for the retail industry as retail sales are conducted in
facilities and wirelessly from home computers, mobile phones,
tablets and other devices.
As a result, card-not-present fraud is an increasing concern for
retailers as it results in fraud losses. In addition, as the types of
products demanded by consumers and the in-facility and online
security needs associated with those demands change, retailers
will most likely rely heavily on technology to help focus on loss
prevention instead of apprehension of criminals after assets
have been lost. Being proactive in trying to reduce asset loss is
extremely important when combatting organized retail crime
(ORC). The Law Enforcement Retail Partnership Network
(LERPnet) tracks organized retail crime across jurisdictions and
shares information with retail loss prevention personnel and
public law enforcement agencies. This collaboration helps in the
apprehension of ORC perpetrators. Protecting human assets
from acts of terrorism is also a concern for retailers and
requires collaborative efforts between retailers, patrons, and law
enforcement.
Zoo and aquarium security is concerned with securing zoos and
aquariums which are home to many rare and exotic plants and
animals. Threats to zoo and aquarium security include
vandalism, accidents, health-related emergencies, theft,
shoplifting, ticket and credit card fraud, auto theft, violence
against persons, bus and tram incidences, people and dangerous
wildlife encounters, ATM issues, and protection of endangered
species.
Across all of the aforementioned types of security
“comprehensive physical security and access control programs,
continuous inventory control procedures...emergency
management planning and procedures, video surveillance,
security personnel,” vigilant employees, and the integration of
existing technologies appropriate to each type of security will
help minimize the loss of assets, reduce or eliminate threats,
and increase security.
“Workplace violence can occur in virtually any workplace and
at any time…may occur between employees, may be the result
of unsafe working conditions, or may stem from a relationship
that exists outside the workplace”. Persons employed in retail
sales, education, healthcare, transportation, private security and
law enforcement are more likely to be victims of workplace
violence than persons employed in other professions. Workplace
shootings are one of the most frequently occurring types of
workplace violence. Employees at retail outlets, especially
small retail stores, are most at risk of receiving injuries on the
job. Employees should be knowledgeable about the profile of
potential perpetrators of work place violence and they should be
trained to recognize and report these symptoms to appropriate
security personnel. Comprehensive workplace violence policies
and procedures should also be clearly outlined so that
employees are aware of the strategies for addressing workplace
violence (e.g., escape routes) and the consequences for
perpetrating workplace violence.
Threats to the well-being of this nation exist domestically and
internationally. After the September 11, 2001 attack and
destruction of the World Trade Center the concept of
“Homeland Security” was coined. Although the notion of
homeland security and the nation’s response to disasters,
violence, and terror can be traced back to the 1800s, the
contemporary use of the term homeland security refers to the
government’s involvement in addressing threats to the unity of
the federal system of government, national security involving
foreign nations, and enforcing laws enacted by Congress. Thus,
terrorism is one of the activities that falls under the supervision
of homeland security. Terrorism exists in many forms and
generally “involves the use of violence or threats to intimidate
or coerce others”. Terrorist acts can be perpetrated domestically
either at the hands of “home grown terrorists” or international
terrorists. International terrorism is perpetrated across the globe
by various terrorist groups.
The United States government has enacted several pieces of
legislation to respond to terrorism. The foreign intelligence
surveillance act (FISA) of 1978 limited the civil liberties
applicable to foreigners and outlined procedures for the
collection of foreign intelligence information deemed necessary
to protect the United States against any real or potential attacks,
sabotage, or international terrorism. After the 1995 Oklahoma
City bombing the Anti-Terrorism and Effective Death Penalty
Act of 1996 was enacted. After the September 11, 2001 attack
on the World Trade Center the USA PATRIOT Act of 2001 was
enacted, enhancing the authority of local, county, state, and
federal law enforcement agencies to conduct criminal
investigations. The Aviation and Transportation Security Act of
2001 resulted in the creation of the Transportation Security
Administration (TSA) and the Homeland Security Act of 2002
resulted in the establishment of what is now the US Department
of Homeland Security. In 2006 the USA PATRIOT Act
Improvement and Reauthorization Act of 2005 was signed into
law to continue the provisions outlined in USA PATRIOT act of
2001, address issues associated with the infringement of
Americans’ privacy and civil liberties, improve port security,
and increase the tools available to reduce and eliminate the
spread of methamphetamine.
There are several types of weapons and threats that can
negatively impact homeland security such as bomb threats and
weapons of mass destruction (nuclear, biological, chemical, and
radiological). Natural disasters (tornadoes, earthquakes and
tsunamis, and hurricanes), and environmental disasters
(environmental crime, pandemics, and bioterrorism) also pose
threats to homeland security. Similar to local and state law
enforcement agencies the federal government utilizes various
law enforcement agencies to secure its personnel, property, and
sensitive information. However, governmental agencies combat
threats to security domestically and internationally.
In response to the intelligence Reform and Terrorism
Protection Act of 2004 (which was a result of the 9/11
commissions report) and the Post-Katrina Emergency Reform
Act of 2006 (which amended the Homeland Security Act of
2002) the Department of Homeland Security (U.S. DHS)
assumed its current structure on March 31, 2007. The U.S. DHS
is a consolidation of more than 22 agencies (including the
acquisition of the Secret Service and the Coast Guard from the
Treasury Department) and is subdivided into four major
directorates (border and transportation security, emergency
preparedness and response, science and technology, and
information analysis and infrastructure protection). The U.S.
DHS is managed by the office of the secretary which is
informed by several advisory panels and committees (homeland
security advisory Council, national infrastructure advisory
Council, homeland security science and technology advisory
committee, critical infrastructure partnership advisory Council,
and interagency correlating council on emergency preparedness
and individuals with disabilities).
Domestically the border and transportation security directorate
of the U.S. DHS, particularly the transportation portion of that
directorate, is the most recognized primarily because US
citizens utilize various modes of transportation that fall under
the supervision of the U.S. DHS daily. Airline and airport
security are managed by the Transportation Security
Administration (TSA). To reduce threats to homeland security
the TSA enforces minimum security measures imposed by the
Federal Aviation Administration (FAA) which include screening
all persons and baggage before entering departure areas,
collaboration with law enforcement, the awareness and
enforcement of security plans developed by airline and airport
management and the knowledge and enforcement of airport
disaster plans. Airport security strategies also include the use of
passenger profiling techniques, U.S. customs agents with
trained dogs, screening of airline employees, positive
identification of all passengers, random baggage searches,
screening equipment, biometrics (e.g., fingerprinting),
automated scanners, explosive detection equipment, and control
integration techniques.
Like humans, cargo is also transported throughout the United
States. The primary function of this cargo transportation is for
commerce. Cargo is transported by air (airplanes), land
(trucking industry and railroad), and sea (maritime). Billions of
dollars are lost each year in transportation and cargo related
thefts. Thefts can be perpetrated by employees and
nonemployees. Various government agencies and policies have
been created and enacted to address issues associated with
transportation and cargo security. Threats can originate
domestically or could potentially be imported from international
providers. The National Cargo Security Council (NCSC)
collects and analyzes cargo theft information from which cargo
security measures can be devised to help prevent cargo losses.
There are also various types of security associated with the
various modes of transportation (trucking industry, railroad,
maritime) utilized for cargo. The trucking industry relies on the
Federal Motor Carrier Safety Administration (FMCSA) to help
enforce its security measures. The Federal Railroad
Administration (FRA) helps enforce railroad security measures.
Maritime security measures are derived from the Maritime
Transportation Security Act (MTSA) of 2002 and the Security
and Accountability for Every (SAFE) Port act of 2006.
The U.S. DHS is also concerned about critical infrastructure
security. Seventeen (17) critical infrastructure sectors have been
identified as needing protective action to prevent and respond to
terrorist attacks or other hazards. Because the majority of the
infrastructure sectors identified by the U.S. DHS are privately
owned and operated, the National Infrastructure Protection Plan
(NIPP) which is supplemented by sector-specific plans (SSPs)
helps to ensure infrastructure security between private and
public owners. The NIPP and the SSPs “define roles and
responsibilities, catalog existing security authorities,
institutionalize already existing security partnerships, and
establish the strategic objectives required to achieve a level of
risk-reduction appropriate to each individual sector”. The SSPs
also share information concerning best practices and threat-
based information within a “sector-specific risk-reduction
consultative network”. The need to maintain infrastructures was
exemplified in the Minneapolis, Minnesota when portions of the
Interstate 35W bridge collapsed into the Mississippi River on
August 1, 2007 near downtown Minneapolis. The September 9,
2010 explosion of the San Bruno gas pipeline in California
exemplifies the need for information sharing among SSPs. The
National Transportation Safety Board (NTSB) strongly
encouraged the operators to establish maximum allowable
operating pressure guidelines (MAOP) based on the weakest
points of the pipeline and to share the findings with other
pipeline operators so that proactive corrective measures
appropriate for their systems could be implemented to avoid any
future ruptures.
Utility security is also an integral part of Homeland security.
The utility industry is tasked with securing not only its
administrative facilities, but it must also secure its remote
facilities, massive infrastructure, and personnel who primarily
work in the field. Industrialized societies must have sufficient
water supplies, sewage systems, natural gas, and electric power
to function. Modern nations are dependent on such utilities for
survival. Threats to security include natural disasters, accidents,
employee theft, vandalism, trespassing, robbery, theft of copper
wiring, energy theft, terrorism, and human and animal attacks in
the field. Utility security measures are designed to prevent and
reduce economic loss, injuries, and deaths. Security measures
include the establishment of emergency preparedness plans the
development of redundant systems and procedures for rapid
recovery after a disaster, accident prevention programs,
employee training and protective equipment, inventory control,
use of covert surveillance cameras, limiting the amount of cash
at facilities, encouraging the use of mail and electronic bill
payment, monitoring energy usage to control energy theft,
training employees on how to avoid confrontation and utilize
de-escalation techniques, and improved training for security
personnel.
Question 1Outline the various components of transportation and.docx

More Related Content

Similar to Question 1Outline the various components of transportation and.docx

Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustryLawrence Nagazina
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMADavid Sweigert
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxwlynn1
 
The Significance of Counterintelligence in National Security.docx
The Significance of Counterintelligence in National Security.docxThe Significance of Counterintelligence in National Security.docx
The Significance of Counterintelligence in National Security.docxNoraRoberts5
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxtawnyataylor528
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trendsijtsrd
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform MovementJennifer Reither
 
Turkey Domestic Terrorism & Evolving Threats
Turkey Domestic Terrorism & Evolving ThreatsTurkey Domestic Terrorism & Evolving Threats
Turkey Domestic Terrorism & Evolving ThreatsGraeme Cross
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxmattinsonjanel
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALIJNSA Journal
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossierYury Chemerkin
 
National Response Framework And National Incident...
National Response Framework And National Incident...National Response Framework And National Incident...
National Response Framework And National Incident...Deb Birch
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
The evolution of terrorism after paris
The evolution of terrorism after parisThe evolution of terrorism after paris
The evolution of terrorism after parisGraeme Cross
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 

Similar to Question 1Outline the various components of transportation and.docx (20)

Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality Industry
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docx
 
The Significance of Counterintelligence in National Security.docx
The Significance of Counterintelligence in National Security.docxThe Significance of Counterintelligence in National Security.docx
The Significance of Counterintelligence in National Security.docx
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
 
Turkey Domestic Terrorism & Evolving Threats
Turkey Domestic Terrorism & Evolving ThreatsTurkey Domestic Terrorism & Evolving Threats
Turkey Domestic Terrorism & Evolving Threats
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docx
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
National Response Framework And National Incident...
National Response Framework And National Incident...National Response Framework And National Incident...
National Response Framework And National Incident...
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
HSDC-HSU White Paper
HSDC-HSU White PaperHSDC-HSU White Paper
HSDC-HSU White Paper
 
The evolution of terrorism after paris
The evolution of terrorism after parisThe evolution of terrorism after paris
The evolution of terrorism after paris
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 

More from IRESH3

PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxPreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxIRESH3
 
Practice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxPractice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxIRESH3
 
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxPrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxIRESH3
 
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxPowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxIRESH3
 
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxPowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxIRESH3
 
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxpreferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxIRESH3
 
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxPrecedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxIRESH3
 
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxPredictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxIRESH3
 
Pre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxPre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxIRESH3
 
Pre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxPre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxIRESH3
 
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxPre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxIRESH3
 
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxPre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxIRESH3
 
PowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxPowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxIRESH3
 
Practice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxPractice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxIRESH3
 
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxPPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxIRESH3
 
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxPpt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxIRESH3
 
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxPrejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxIRESH3
 
Preparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxPreparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxIRESH3
 
PowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxPowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxIRESH3
 
PowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxPowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxIRESH3
 

More from IRESH3 (20)

PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxPreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
 
Practice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxPractice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docx
 
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxPrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
 
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxPowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
 
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxPowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
 
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxpreferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
 
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxPrecedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
 
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxPredictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
 
Pre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxPre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docx
 
Pre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxPre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docx
 
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxPre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
 
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxPre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
 
PowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxPowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docx
 
Practice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxPractice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docx
 
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxPPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
 
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxPpt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
 
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxPrejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
 
Preparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxPreparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docx
 
PowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxPowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docx
 
PowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxPowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docx
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

Question 1Outline the various components of transportation and.docx

  • 1. Question 1 Outline the various components of transportation and cargo security. Specifically what threats exist and what security measures have been implemented to address those threats. This assignment should be a minimum of 300 words. Question 2 Select two (2) infrastructure sectors and thoroughly discuss how the strategic objectives of the sector-specific security plan (SSP) will be applied to the two sectors you selected. This assessment should be a minimum of 300 words. GENERAL OVERVIEW Industrial security is concerned with protecting the manufacturing process. Major threats to industrial security include accidents, natural disasters, internal theft, sabotage, and espionage. Library and museum security is concerned with controlling both criminal and noncriminal threats to library and museum inventories which often include rare, priceless, and irreplaceable objects. Common threats to library and museum security include theft, vandalism fire, floods, water damage, and other environmental elements. Office building security is concerned with securing office buildings. Major threats to office building security include fire, inadequate evacuation routes, terroristic activity, bomb threats, theft, burglary, robbery, sexual assault, and executive kidnapping. In addition to the aforementioned major threats, office buildings, because of their open access (i.e., numerous entry and exit points, multiple agencies occupied one building, and shared common areas such as lounges and restrooms) and
  • 2. highly desired equipment and supplies (e.g., copper piping, recyclable materials, office supplies, payroll checks, classified information, office equipment, etc.), provide additional functionality threats to security that must be addressed by security personnel. Residential security is concerned with securing personal residences. For security experts the home is considered a very unsafe place especially when residents are asleep. Threats to residential security include accidents, medical emergencies, fire, theft, burglary, vandalism, assault, homicide, property damage, personal injury, and natural disasters. Retail loss prevention is an area of security that is primarily focused on the retail industry. Internal and external thefts are the major source of loss for the retail industry. Internal theft usually occurs at the hands of employees who take cash and/or merchandise, abuse the referral system, and utilize a variety of other tactics. External sources of loss include vandalism, burglary, robbery, credit card fraud, coupon fraud, bad checks, and shoplifting. Technological advances create unique challenges for the retail industry as retail sales are conducted in facilities and wirelessly from home computers, mobile phones, tablets and other devices. As a result, card-not-present fraud is an increasing concern for retailers as it results in fraud losses. In addition, as the types of products demanded by consumers and the in-facility and online security needs associated with those demands change, retailers will most likely rely heavily on technology to help focus on loss prevention instead of apprehension of criminals after assets have been lost. Being proactive in trying to reduce asset loss is extremely important when combatting organized retail crime (ORC). The Law Enforcement Retail Partnership Network (LERPnet) tracks organized retail crime across jurisdictions and shares information with retail loss prevention personnel and public law enforcement agencies. This collaboration helps in the
  • 3. apprehension of ORC perpetrators. Protecting human assets from acts of terrorism is also a concern for retailers and requires collaborative efforts between retailers, patrons, and law enforcement. Zoo and aquarium security is concerned with securing zoos and aquariums which are home to many rare and exotic plants and animals. Threats to zoo and aquarium security include vandalism, accidents, health-related emergencies, theft, shoplifting, ticket and credit card fraud, auto theft, violence against persons, bus and tram incidences, people and dangerous wildlife encounters, ATM issues, and protection of endangered species. Across all of the aforementioned types of security “comprehensive physical security and access control programs, continuous inventory control procedures...emergency management planning and procedures, video surveillance, security personnel,” vigilant employees, and the integration of existing technologies appropriate to each type of security will help minimize the loss of assets, reduce or eliminate threats, and increase security. “Workplace violence can occur in virtually any workplace and at any time…may occur between employees, may be the result of unsafe working conditions, or may stem from a relationship that exists outside the workplace”. Persons employed in retail sales, education, healthcare, transportation, private security and law enforcement are more likely to be victims of workplace violence than persons employed in other professions. Workplace shootings are one of the most frequently occurring types of workplace violence. Employees at retail outlets, especially small retail stores, are most at risk of receiving injuries on the job. Employees should be knowledgeable about the profile of potential perpetrators of work place violence and they should be trained to recognize and report these symptoms to appropriate
  • 4. security personnel. Comprehensive workplace violence policies and procedures should also be clearly outlined so that employees are aware of the strategies for addressing workplace violence (e.g., escape routes) and the consequences for perpetrating workplace violence. Threats to the well-being of this nation exist domestically and internationally. After the September 11, 2001 attack and destruction of the World Trade Center the concept of “Homeland Security” was coined. Although the notion of homeland security and the nation’s response to disasters, violence, and terror can be traced back to the 1800s, the contemporary use of the term homeland security refers to the government’s involvement in addressing threats to the unity of the federal system of government, national security involving foreign nations, and enforcing laws enacted by Congress. Thus, terrorism is one of the activities that falls under the supervision of homeland security. Terrorism exists in many forms and generally “involves the use of violence or threats to intimidate or coerce others”. Terrorist acts can be perpetrated domestically either at the hands of “home grown terrorists” or international terrorists. International terrorism is perpetrated across the globe by various terrorist groups. The United States government has enacted several pieces of legislation to respond to terrorism. The foreign intelligence surveillance act (FISA) of 1978 limited the civil liberties applicable to foreigners and outlined procedures for the collection of foreign intelligence information deemed necessary to protect the United States against any real or potential attacks, sabotage, or international terrorism. After the 1995 Oklahoma City bombing the Anti-Terrorism and Effective Death Penalty Act of 1996 was enacted. After the September 11, 2001 attack on the World Trade Center the USA PATRIOT Act of 2001 was enacted, enhancing the authority of local, county, state, and federal law enforcement agencies to conduct criminal
  • 5. investigations. The Aviation and Transportation Security Act of 2001 resulted in the creation of the Transportation Security Administration (TSA) and the Homeland Security Act of 2002 resulted in the establishment of what is now the US Department of Homeland Security. In 2006 the USA PATRIOT Act Improvement and Reauthorization Act of 2005 was signed into law to continue the provisions outlined in USA PATRIOT act of 2001, address issues associated with the infringement of Americans’ privacy and civil liberties, improve port security, and increase the tools available to reduce and eliminate the spread of methamphetamine. There are several types of weapons and threats that can negatively impact homeland security such as bomb threats and weapons of mass destruction (nuclear, biological, chemical, and radiological). Natural disasters (tornadoes, earthquakes and tsunamis, and hurricanes), and environmental disasters (environmental crime, pandemics, and bioterrorism) also pose threats to homeland security. Similar to local and state law enforcement agencies the federal government utilizes various law enforcement agencies to secure its personnel, property, and sensitive information. However, governmental agencies combat threats to security domestically and internationally. In response to the intelligence Reform and Terrorism Protection Act of 2004 (which was a result of the 9/11 commissions report) and the Post-Katrina Emergency Reform Act of 2006 (which amended the Homeland Security Act of 2002) the Department of Homeland Security (U.S. DHS) assumed its current structure on March 31, 2007. The U.S. DHS is a consolidation of more than 22 agencies (including the acquisition of the Secret Service and the Coast Guard from the Treasury Department) and is subdivided into four major directorates (border and transportation security, emergency preparedness and response, science and technology, and information analysis and infrastructure protection). The U.S.
  • 6. DHS is managed by the office of the secretary which is informed by several advisory panels and committees (homeland security advisory Council, national infrastructure advisory Council, homeland security science and technology advisory committee, critical infrastructure partnership advisory Council, and interagency correlating council on emergency preparedness and individuals with disabilities). Domestically the border and transportation security directorate of the U.S. DHS, particularly the transportation portion of that directorate, is the most recognized primarily because US citizens utilize various modes of transportation that fall under the supervision of the U.S. DHS daily. Airline and airport security are managed by the Transportation Security Administration (TSA). To reduce threats to homeland security the TSA enforces minimum security measures imposed by the Federal Aviation Administration (FAA) which include screening all persons and baggage before entering departure areas, collaboration with law enforcement, the awareness and enforcement of security plans developed by airline and airport management and the knowledge and enforcement of airport disaster plans. Airport security strategies also include the use of passenger profiling techniques, U.S. customs agents with trained dogs, screening of airline employees, positive identification of all passengers, random baggage searches, screening equipment, biometrics (e.g., fingerprinting), automated scanners, explosive detection equipment, and control integration techniques. Like humans, cargo is also transported throughout the United States. The primary function of this cargo transportation is for commerce. Cargo is transported by air (airplanes), land (trucking industry and railroad), and sea (maritime). Billions of dollars are lost each year in transportation and cargo related thefts. Thefts can be perpetrated by employees and nonemployees. Various government agencies and policies have
  • 7. been created and enacted to address issues associated with transportation and cargo security. Threats can originate domestically or could potentially be imported from international providers. The National Cargo Security Council (NCSC) collects and analyzes cargo theft information from which cargo security measures can be devised to help prevent cargo losses. There are also various types of security associated with the various modes of transportation (trucking industry, railroad, maritime) utilized for cargo. The trucking industry relies on the Federal Motor Carrier Safety Administration (FMCSA) to help enforce its security measures. The Federal Railroad Administration (FRA) helps enforce railroad security measures. Maritime security measures are derived from the Maritime Transportation Security Act (MTSA) of 2002 and the Security and Accountability for Every (SAFE) Port act of 2006. The U.S. DHS is also concerned about critical infrastructure security. Seventeen (17) critical infrastructure sectors have been identified as needing protective action to prevent and respond to terrorist attacks or other hazards. Because the majority of the infrastructure sectors identified by the U.S. DHS are privately owned and operated, the National Infrastructure Protection Plan (NIPP) which is supplemented by sector-specific plans (SSPs) helps to ensure infrastructure security between private and public owners. The NIPP and the SSPs “define roles and responsibilities, catalog existing security authorities, institutionalize already existing security partnerships, and establish the strategic objectives required to achieve a level of risk-reduction appropriate to each individual sector”. The SSPs also share information concerning best practices and threat- based information within a “sector-specific risk-reduction consultative network”. The need to maintain infrastructures was exemplified in the Minneapolis, Minnesota when portions of the Interstate 35W bridge collapsed into the Mississippi River on August 1, 2007 near downtown Minneapolis. The September 9,
  • 8. 2010 explosion of the San Bruno gas pipeline in California exemplifies the need for information sharing among SSPs. The National Transportation Safety Board (NTSB) strongly encouraged the operators to establish maximum allowable operating pressure guidelines (MAOP) based on the weakest points of the pipeline and to share the findings with other pipeline operators so that proactive corrective measures appropriate for their systems could be implemented to avoid any future ruptures. Utility security is also an integral part of Homeland security. The utility industry is tasked with securing not only its administrative facilities, but it must also secure its remote facilities, massive infrastructure, and personnel who primarily work in the field. Industrialized societies must have sufficient water supplies, sewage systems, natural gas, and electric power to function. Modern nations are dependent on such utilities for survival. Threats to security include natural disasters, accidents, employee theft, vandalism, trespassing, robbery, theft of copper wiring, energy theft, terrorism, and human and animal attacks in the field. Utility security measures are designed to prevent and reduce economic loss, injuries, and deaths. Security measures include the establishment of emergency preparedness plans the development of redundant systems and procedures for rapid recovery after a disaster, accident prevention programs, employee training and protective equipment, inventory control, use of covert surveillance cameras, limiting the amount of cash at facilities, encouraging the use of mail and electronic bill payment, monitoring energy usage to control energy theft, training employees on how to avoid confrontation and utilize de-escalation techniques, and improved training for security personnel.