SlideShare a Scribd company logo
1 of 3
Reply with 150 words to each post.
Post 1 (Kyle)
After reading the materials provided for the week and watching
the video, the BIMCO video, the elements I consider most
critical to successful operations at the port are two-fold,
according to me, and these are effective planning and
convergence or collaboration or cooperation among security
agencies; both private and federal. Effective planning and the
port involves training and assessment of the various threats to
the port, port vulnerability, and associated risks (Noakes &
Hunter, 2017). For effective planning, there needs to be an
assessment by the appropriate agencies to establish the threats
likely to affect the port, how vulnerable to the established
threats the port is, and risks that can be taken in terms of port
security (Leonard et al., 2015). Through the assessment, a
focused plan is established on the various steps needed to
proceed with security effectively, and the various
countermeasures required to ensure security is in place. In
addition to the focused plan, training is brought into play where
all port members, considering mostly the security personnel, get
a chance to be trained on the threat capabilities, starting from
the least likely to the most suitable.
Apart from effective planning, constant communication through
collaborative and cooperative means is another critical element.
Ports should make efforts to advance their means of
communicating so that there is constant communication to allow
the exchange of up to date information and to provide room for
discussing the various security issues at the port (Konecny et
al., 2016). With effective and constant means of communication
among the security personnel and other port employees at
various ports, a single port’s security program can be easily
extended to form a national alliance consisting of many
programs concerned with port security, and working
collaboratively with all other maritime industry elements
(Konecny et al., 2016). Merging this alliance with the joint
training programs between the private and public security
agencies at the ports, there could be excellent outcomes in terms
of security gaps, cooperation, communication, role
understanding, and security policymaking (Leonard et al.,
2015). Therefore, because of the constant changes taking place
in the types of threats, and the daily new tactics being
improvised by attackers, effective planning for training and
assessment and constant communication between or among
agencies will keep the ports safe for various operations.
Post 2 (David)
The most critical elements to maintain port security and
operations was the development of the Area Maritime Security
Committees (AMSC). The AMSC brought multiple law
enforcement agencies and private stakeholders together to assist
in improving the security of US ports. Combining all of these
assets together was an excellent initiative, because no single
entity can carry out such a large task. The planning,
coordination, communication, working relationships and joint
training exercises are all a part of the AMSC effort to create
layered security (USCG, 2017, p. 1). Through this effort, the
AMSC is essentially creating a common operating picture that
identifies which assets (federal, state, local, and private) are
available, their locations, and what their roles are in providing
security, as well as their specific mission in the event of an
attack.
One crucial element of the AMSC is information
sharing. Since the AMSC is comprised of multiple agencies, it
is easier to share information such as updated security threats,
and it cuts out the typical bureaucracy that is associated with
numerous government agencies. Training is also another
element that is essential to port security. Anyone can have a
solid plan built, but it is the training that ensures the AMSC can
work together effectively. In 2016, AMSCs conducted 671
meetings, 332 Joint Agency training meetings, 189 Maritime
Security training events and conducted 45 training exercises
nationwide (USCG, 2017, p. 3). These stats reveal the hard
work and collaboration of multiple agencies working towards
the common goal of maritime transportation security.
In reference to the port of Boston, they have developed
an intelligent video system that has the ability to analyze video
content and identify suspicious behavior (Pate, Taylor, Kubu,
2007, p. 81). This video system has been installed around the
perimeter, to include the water boundary. This is accompanied
by a command center to oversee the entire operation. Advanced
video technology is critical to port operations, since there are
too many people/trucks entering and leaving the facility for
security to track them all. This type of technology is equipped
with alarms to notify personnel within the command center of
suspicious activity. Granted the report referenced is from 2007,
it still identifies security practices that are essential in keeping
ports secure.

More Related Content

Similar to Reply with 150 words to each post.Post 1 (Kyle)After rea

This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. ariysn
 
· Per the e-Activity, analyze one (1) of the core tenets establish.docx
· Per the e-Activity, analyze one (1) of the core tenets establish.docx· Per the e-Activity, analyze one (1) of the core tenets establish.docx
· Per the e-Activity, analyze one (1) of the core tenets establish.docxLynellBull52
 
DHS_NCSWIC-SAFECOM_Spring_052915v2
DHS_NCSWIC-SAFECOM_Spring_052915v2DHS_NCSWIC-SAFECOM_Spring_052915v2
DHS_NCSWIC-SAFECOM_Spring_052915v2Phil Royce
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project ProposalChris Young
 
Speaker 5 Capt D N Goswami
Speaker 5 Capt D N GoswamiSpeaker 5 Capt D N Goswami
Speaker 5 Capt D N Goswamicmmindia2017
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxsimonithomas47935
 
4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docx
4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docx4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docx
4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docxblondellchancy
 
Health and Safety in the Construction Industry in Catanduanes, Philippines
Health and Safety in the Construction Industry in Catanduanes, PhilippinesHealth and Safety in the Construction Industry in Catanduanes, Philippines
Health and Safety in the Construction Industry in Catanduanes, PhilippinesDr. Amarjeet Singh
 
National Security and Public-Private Partnership for Cybersecurity: Strengths...
National Security and Public-Private Partnership for Cybersecurity: Strengths...National Security and Public-Private Partnership for Cybersecurity: Strengths...
National Security and Public-Private Partnership for Cybersecurity: Strengths...CODE BLUE
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Community Protection Forum
 
AT Level I Training Application Trains 5 Million
AT Level I Training Application Trains 5 MillionAT Level I Training Application Trains 5 Million
AT Level I Training Application Trains 5 MillionJohn Jaques
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureAnn Treacy
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
Class,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenClass,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenVinaOconner450
 
Managing Director ( Sse Hydro ) Essay
Managing Director ( Sse Hydro ) EssayManaging Director ( Sse Hydro ) Essay
Managing Director ( Sse Hydro ) EssayLaura Torres
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docxcharisellington63520
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docxtodd521
 
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION 2 .docx
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION  2 .docxINITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION  2 .docx
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION 2 .docxmaoanderton
 
Risk Severity Framework for a BOT Highway Project
Risk Severity Framework for a BOT Highway ProjectRisk Severity Framework for a BOT Highway Project
Risk Severity Framework for a BOT Highway ProjectIOSRJMCE
 

Similar to Reply with 150 words to each post.Post 1 (Kyle)After rea (20)

This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
 
· Per the e-Activity, analyze one (1) of the core tenets establish.docx
· Per the e-Activity, analyze one (1) of the core tenets establish.docx· Per the e-Activity, analyze one (1) of the core tenets establish.docx
· Per the e-Activity, analyze one (1) of the core tenets establish.docx
 
DHS_NCSWIC-SAFECOM_Spring_052915v2
DHS_NCSWIC-SAFECOM_Spring_052915v2DHS_NCSWIC-SAFECOM_Spring_052915v2
DHS_NCSWIC-SAFECOM_Spring_052915v2
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
 
Speaker 5 Capt D N Goswami
Speaker 5 Capt D N GoswamiSpeaker 5 Capt D N Goswami
Speaker 5 Capt D N Goswami
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docx
 
4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docx
4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docx4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docx
4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docx
 
Health and Safety in the Construction Industry in Catanduanes, Philippines
Health and Safety in the Construction Industry in Catanduanes, PhilippinesHealth and Safety in the Construction Industry in Catanduanes, Philippines
Health and Safety in the Construction Industry in Catanduanes, Philippines
 
National Security and Public-Private Partnership for Cybersecurity: Strengths...
National Security and Public-Private Partnership for Cybersecurity: Strengths...National Security and Public-Private Partnership for Cybersecurity: Strengths...
National Security and Public-Private Partnership for Cybersecurity: Strengths...
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...
 
AT Level I Training Application Trains 5 Million
AT Level I Training Application Trains 5 MillionAT Level I Training Application Trains 5 Million
AT Level I Training Application Trains 5 Million
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Class,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenClass,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differen
 
Managing Director ( Sse Hydro ) Essay
Managing Director ( Sse Hydro ) EssayManaging Director ( Sse Hydro ) Essay
Managing Director ( Sse Hydro ) Essay
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docx
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docx
 
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION 2 .docx
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION  2 .docxINITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION  2 .docx
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION 2 .docx
 
Risk Severity Framework for a BOT Highway Project
Risk Severity Framework for a BOT Highway ProjectRisk Severity Framework for a BOT Highway Project
Risk Severity Framework for a BOT Highway Project
 

More from felipaser7p

Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docxDiscussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docxfelipaser7p
 
Discussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docxDiscussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docxfelipaser7p
 
Discussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docxDiscussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docxfelipaser7p
 
Discussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docxDiscussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docxfelipaser7p
 
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docxDiscussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docxfelipaser7p
 
Discussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docxDiscussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docxfelipaser7p
 
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docxDiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docxfelipaser7p
 
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docxDiscussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docxfelipaser7p
 
Discussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docxDiscussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docxfelipaser7p
 
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docxDiscussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docxfelipaser7p
 
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docxDiscussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docxfelipaser7p
 
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docxDiscussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docxfelipaser7p
 
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docxDiscussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docxfelipaser7p
 
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docxDiscussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docxfelipaser7p
 
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docxDiscussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docxfelipaser7p
 
Discussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docxDiscussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docxfelipaser7p
 
discussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docxdiscussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docxfelipaser7p
 
Discussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docxDiscussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docxfelipaser7p
 
Discussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docxDiscussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docxfelipaser7p
 
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docxDiscussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docxfelipaser7p
 

More from felipaser7p (20)

Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docxDiscussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
 
Discussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docxDiscussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docx
 
Discussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docxDiscussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docx
 
Discussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docxDiscussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docx
 
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docxDiscussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
 
Discussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docxDiscussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docx
 
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docxDiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
 
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docxDiscussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
 
Discussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docxDiscussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docx
 
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docxDiscussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
 
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docxDiscussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
 
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docxDiscussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
 
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docxDiscussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
 
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docxDiscussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
 
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docxDiscussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
 
Discussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docxDiscussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docx
 
discussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docxdiscussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docx
 
Discussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docxDiscussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docx
 
Discussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docxDiscussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docx
 
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docxDiscussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

Reply with 150 words to each post.Post 1 (Kyle)After rea

  • 1. Reply with 150 words to each post. Post 1 (Kyle) After reading the materials provided for the week and watching the video, the BIMCO video, the elements I consider most critical to successful operations at the port are two-fold, according to me, and these are effective planning and convergence or collaboration or cooperation among security agencies; both private and federal. Effective planning and the port involves training and assessment of the various threats to the port, port vulnerability, and associated risks (Noakes & Hunter, 2017). For effective planning, there needs to be an assessment by the appropriate agencies to establish the threats likely to affect the port, how vulnerable to the established threats the port is, and risks that can be taken in terms of port security (Leonard et al., 2015). Through the assessment, a focused plan is established on the various steps needed to proceed with security effectively, and the various countermeasures required to ensure security is in place. In addition to the focused plan, training is brought into play where all port members, considering mostly the security personnel, get a chance to be trained on the threat capabilities, starting from the least likely to the most suitable. Apart from effective planning, constant communication through collaborative and cooperative means is another critical element. Ports should make efforts to advance their means of communicating so that there is constant communication to allow the exchange of up to date information and to provide room for discussing the various security issues at the port (Konecny et al., 2016). With effective and constant means of communication among the security personnel and other port employees at
  • 2. various ports, a single port’s security program can be easily extended to form a national alliance consisting of many programs concerned with port security, and working collaboratively with all other maritime industry elements (Konecny et al., 2016). Merging this alliance with the joint training programs between the private and public security agencies at the ports, there could be excellent outcomes in terms of security gaps, cooperation, communication, role understanding, and security policymaking (Leonard et al., 2015). Therefore, because of the constant changes taking place in the types of threats, and the daily new tactics being improvised by attackers, effective planning for training and assessment and constant communication between or among agencies will keep the ports safe for various operations. Post 2 (David) The most critical elements to maintain port security and operations was the development of the Area Maritime Security Committees (AMSC). The AMSC brought multiple law enforcement agencies and private stakeholders together to assist in improving the security of US ports. Combining all of these assets together was an excellent initiative, because no single entity can carry out such a large task. The planning, coordination, communication, working relationships and joint training exercises are all a part of the AMSC effort to create layered security (USCG, 2017, p. 1). Through this effort, the AMSC is essentially creating a common operating picture that identifies which assets (federal, state, local, and private) are available, their locations, and what their roles are in providing security, as well as their specific mission in the event of an attack. One crucial element of the AMSC is information sharing. Since the AMSC is comprised of multiple agencies, it is easier to share information such as updated security threats,
  • 3. and it cuts out the typical bureaucracy that is associated with numerous government agencies. Training is also another element that is essential to port security. Anyone can have a solid plan built, but it is the training that ensures the AMSC can work together effectively. In 2016, AMSCs conducted 671 meetings, 332 Joint Agency training meetings, 189 Maritime Security training events and conducted 45 training exercises nationwide (USCG, 2017, p. 3). These stats reveal the hard work and collaboration of multiple agencies working towards the common goal of maritime transportation security. In reference to the port of Boston, they have developed an intelligent video system that has the ability to analyze video content and identify suspicious behavior (Pate, Taylor, Kubu, 2007, p. 81). This video system has been installed around the perimeter, to include the water boundary. This is accompanied by a command center to oversee the entire operation. Advanced video technology is critical to port operations, since there are too many people/trucks entering and leaving the facility for security to track them all. This type of technology is equipped with alarms to notify personnel within the command center of suspicious activity. Granted the report referenced is from 2007, it still identifies security practices that are essential in keeping ports secure.