SlideShare a Scribd company logo
1 of 4
Damian Gillespie
1. How does port facility technology interface with homeland
security?
The interfacing technology of port facility and homeland
security derived as a result from the terrorist attacks that took
place on September 11th, 2001. Prior to then maritime
operations were able to conduct business within its arena with
minimal or no scrutiny from the federal government. The
emphasis on port facilities to develop enhanced and more
complex security technology was implemented upon signature
of the Homeland Security Presidential Directive (HSPD)-8 in
December 2003. This directive required all federal agencies,
private business and partners to these agencies to assist in
strengthening America’s preparedness to prevent and respond to
threats, whether it is man-made or all-hazard. It forced FSOs to
step back and review their security plans from the overarching
guidance provided by the DHS to address any threats to the
homeland. In 2005 the National Strategy for Maritime Security
addressed challenges and threat mitigations in the maritime
domain. It also recognized the need for cohesive security
measures between federal, states, local, tribal and private sector
entities to align with federal programs. Although these
collaborative efforts are nothing new for the port facility
managers, the new oversight of port security posture requires
plans to provide in depth emergent and response procedures to
deter and minimize security incidents.
2. How does situational awareness and situational readiness
affect port safety and emergency management?
Situational awareness and situational readiness highlights the
important relationship between port FSP and technology
management. Having the ability to obtain information and
intelligence from multiple sources regularly to support
operational decision making encompasses situational awareness.
It promotes establishing pathways for addressing strengths and
weakness in the port community, while giving FSOs an edge on
developing mitigation tactics to avoid new and accurate threats.
In basic terms, situational awareness means that FSO knows
what is going on around their port. This information paves the
way for situational readiness or preparedness. The information
or intelligence obtain from being aware of the port’s
surrounding then can be used to develop plans or procedures to
handle unexpected events that may surface. The readiness
comes from the port’s ability to development emergency
operations and response plans to react or respond to particular
events. These plans usually address incident prevention,
personnel and property protection and how to respond with the
appropriate human and physical resources. Situational readiness
also comes with challenges that must be address and one those
primary challenges are communication. A good FSO should
have the ability to facilitate the implementation of procedures at
a port facility through the Maritime Security Levels effectively.
A breakdown on any level of communication can make or
destroy a ports situational readiness causing protocols to not be
obtained.
Damian
Christopher, K. (2014;2015;). Port security management
(Second ed.). Boca Raton, FL: CRC Press
HSPD 7; Homeland Security Presidential Directive 7, Weekly
Compilation of Presidential Documents (December 22, 2003),
v.39 n.51, p.1816-1822, Weekly Compilation of Presidential
Documents: http://www.gpoaccess.gov/wcomp/index.html
Ryan Norton
1. How does port facility technology interface with homeland
security?
The advances in technology that are being used now by the
ports are also advances that can be used in homeland security in
numerous ways. The thermal imaging that is being used to
identify ships that have cargo loads of illegal goods, human
smuggling, drugs etc...is a technology that can be used at our
borders to search vehicles, personnel and aircraft to ensure that
illegal contraband isn't crossing our borders. The use of CCTV
is pretty much everywhere now. You can rarely travel to
anyplace without being picked up on CCTV in some manner.
We use it at the borders, withing our towns and citites and our
ports. This is a way that real time imaging can be used to
capture footage of attempted attacks or to be used to identify
personnel and vehicles that may be suspected in a crime or
potential terrorist plot.
In today's world of cyber warfare, cyber security is one of the
biggest concerns. When it comes to ports and homeland security
cyber terrorism is a serious threat. "Port facilities, which
depend on complex computing architecture to network their
surveillance, credentialing, access controls, communication and
related systems, must seriously consider the increasing risks"
(Christopher, 2014). This is a major concern for homeland
security as well as cyber attacks are happening all the time and
coming from countries such as China, Russia, North Korea and
Syria. The strength in the infrastructure is a key component in
ensuring our cyber networks at all levels remain safe.
2. How does situational awareness and situational
readiness affect port safety and emergency management?
The employess of the ports but always be aware of the situation
going on around them and be ready to combat that threat or
resolve the situation. There will be an Emergency Plan that will
be followed in the event of an attack, accident, spill etc..and
these are imperative for all employees to know. The
Occupational Safety and Health Administration (OSHA) is the
legal foundation in which enforcement of standards is adhered
to. There must be proper handling of all dangerous cargo going
on and off of all vessels within the port. HSPD-8 strengthens
the U.S. preparedness to prevent and respond to threatened or
actual terrorist attacks, natural disasters, or other emergencies.
There are contingency plans for hazardous material spills and
material incidents. So as detailed above all of these steps will
be extremely important in ensuring port security via emergency
management.
Ryan
Christopher, K. (2014). Port Security Management, Second
Edition. CRC Press.

More Related Content

Similar to Damian Gillespie1. How does port facility technology interface w.docx

Reply to post 1 & 2 with 150 words each.Post 1 (Marwin)P
Reply to post 1 & 2 with 150 words each.Post 1 (Marwin)PReply to post 1 & 2 with 150 words each.Post 1 (Marwin)P
Reply to post 1 & 2 with 150 words each.Post 1 (Marwin)P
felipaser7p
 
DocomUSA Security
DocomUSA SecurityDocomUSA Security
DocomUSA Security
docomusa
 
Class,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenClass,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differen
VinaOconner450
 
Chapter 11The Threat Matrix In this chapter,
 Chapter 11The Threat Matrix In this chapter,  Chapter 11The Threat Matrix In this chapter,
Chapter 11The Threat Matrix In this chapter,
MargaritoWhitt221
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
tawnyataylor528
 
Reply with 150 words to each post.Post 1 (Kyle)After rea
Reply with 150 words to each post.Post 1 (Kyle)After reaReply with 150 words to each post.Post 1 (Kyle)After rea
Reply with 150 words to each post.Post 1 (Kyle)After rea
felipaser7p
 
Maritime Security
Maritime SecurityMaritime Security
Maritime Security
ijtsrd
 
Security Support for Humanitarian Operations in the Asia Pacific Region - Hom...
Security Support for Humanitarian Operations in the Asia Pacific Region - Hom...Security Support for Humanitarian Operations in the Asia Pacific Region - Hom...
Security Support for Humanitarian Operations in the Asia Pacific Region - Hom...
Scott Bernat
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
Chris Young
 
Reply to post 1 & 2 with 150 words eachPost 1There is a
Reply to post 1 & 2 with 150 words eachPost 1There is a Reply to post 1 & 2 with 150 words eachPost 1There is a
Reply to post 1 & 2 with 150 words eachPost 1There is a
felipaser7p
 
Running head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docx
Running head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docxRunning head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docx
Running head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docx
todd271
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docx
IRESH3
 

Similar to Damian Gillespie1. How does port facility technology interface w.docx (20)

Homeland Security Bill
Homeland Security BillHomeland Security Bill
Homeland Security Bill
 
Port security
Port securityPort security
Port security
 
Reply to post 1 & 2 with 150 words each.Post 1 (Marwin)P
Reply to post 1 & 2 with 150 words each.Post 1 (Marwin)PReply to post 1 & 2 with 150 words each.Post 1 (Marwin)P
Reply to post 1 & 2 with 150 words each.Post 1 (Marwin)P
 
DocomUSA Security
DocomUSA SecurityDocomUSA Security
DocomUSA Security
 
FMASP_ShowAudio_short
FMASP_ShowAudio_shortFMASP_ShowAudio_short
FMASP_ShowAudio_short
 
Class,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenClass,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differen
 
Thinking Highways
Thinking HighwaysThinking Highways
Thinking Highways
 
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
 
Chapter 11The Threat Matrix In this chapter,
 Chapter 11The Threat Matrix In this chapter,  Chapter 11The Threat Matrix In this chapter,
Chapter 11The Threat Matrix In this chapter,
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
 
Reply with 150 words to each post.Post 1 (Kyle)After rea
Reply with 150 words to each post.Post 1 (Kyle)After reaReply with 150 words to each post.Post 1 (Kyle)After rea
Reply with 150 words to each post.Post 1 (Kyle)After rea
 
Maritime Security
Maritime SecurityMaritime Security
Maritime Security
 
Mitigating Ship Piracy Through Crisis (Hostage) Negotiations
Mitigating Ship Piracy Through Crisis (Hostage) NegotiationsMitigating Ship Piracy Through Crisis (Hostage) Negotiations
Mitigating Ship Piracy Through Crisis (Hostage) Negotiations
 
Security Support for Humanitarian Operations in the Asia Pacific Region - Hom...
Security Support for Humanitarian Operations in the Asia Pacific Region - Hom...Security Support for Humanitarian Operations in the Asia Pacific Region - Hom...
Security Support for Humanitarian Operations in the Asia Pacific Region - Hom...
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
 
Reply to post 1 & 2 with 150 words eachPost 1There is a
Reply to post 1 & 2 with 150 words eachPost 1There is a Reply to post 1 & 2 with 150 words eachPost 1There is a
Reply to post 1 & 2 with 150 words eachPost 1There is a
 
Running head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docx
Running head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docxRunning head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docx
Running head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docx
 
The Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ ResearchThe Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ Research
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docx
 

More from simonithomas47935

HOSP3075 Brand Analysis Paper 1This is the first of three assignme.docx
HOSP3075 Brand Analysis Paper 1This is the first of three assignme.docxHOSP3075 Brand Analysis Paper 1This is the first of three assignme.docx
HOSP3075 Brand Analysis Paper 1This is the first of three assignme.docx
simonithomas47935
 
Hou, J., Li, Y., Yu, J. & Shi, W. (2020). A Survey on Digital Fo.docx
Hou, J., Li, Y., Yu, J. & Shi, W. (2020). A Survey on Digital Fo.docxHou, J., Li, Y., Yu, J. & Shi, W. (2020). A Survey on Digital Fo.docx
Hou, J., Li, Y., Yu, J. & Shi, W. (2020). A Survey on Digital Fo.docx
simonithomas47935
 
How (Not) to be Secular by James K.A. SmithSecular (1)—the ea.docx
How (Not) to be Secular by James K.A. SmithSecular (1)—the ea.docxHow (Not) to be Secular by James K.A. SmithSecular (1)—the ea.docx
How (Not) to be Secular by James K.A. SmithSecular (1)—the ea.docx
simonithomas47935
 
hoose (1) one childhood experience from the list provided below..docx
hoose (1) one childhood experience from the list provided below..docxhoose (1) one childhood experience from the list provided below..docx
hoose (1) one childhood experience from the list provided below..docx
simonithomas47935
 
HomeAnnouncementsSyllabusDiscussionsQuizzesGra.docx
HomeAnnouncementsSyllabusDiscussionsQuizzesGra.docxHomeAnnouncementsSyllabusDiscussionsQuizzesGra.docx
HomeAnnouncementsSyllabusDiscussionsQuizzesGra.docx
simonithomas47935
 

More from simonithomas47935 (20)

Hours, A. (2014). Reading Fairy Tales and Playing A Way of Treati.docx
Hours, A. (2014). Reading Fairy Tales and Playing A Way of Treati.docxHours, A. (2014). Reading Fairy Tales and Playing A Way of Treati.docx
Hours, A. (2014). Reading Fairy Tales and Playing A Way of Treati.docx
 
How are authentication and authorization alike and how are the.docx
How are authentication and authorization alike and how are the.docxHow are authentication and authorization alike and how are the.docx
How are authentication and authorization alike and how are the.docx
 
How are self-esteem and self-concept different What is the or.docx
How are self-esteem and self-concept different What is the or.docxHow are self-esteem and self-concept different What is the or.docx
How are self-esteem and self-concept different What is the or.docx
 
How are morality and religion similar and how are they different.docx
How are morality and religion similar and how are they different.docxHow are morality and religion similar and how are they different.docx
How are morality and religion similar and how are they different.docx
 
How are financial statements used to evaluate business activities.docx
How are financial statements used to evaluate business activities.docxHow are financial statements used to evaluate business activities.docx
How are financial statements used to evaluate business activities.docx
 
How are Japanese and Chinese Americans similar How are they differe.docx
How are Japanese and Chinese Americans similar How are they differe.docxHow are Japanese and Chinese Americans similar How are they differe.docx
How are Japanese and Chinese Americans similar How are they differe.docx
 
Hot Spot PolicingPlace can be an important aspect of crime and.docx
Hot Spot PolicingPlace can be an important aspect of crime and.docxHot Spot PolicingPlace can be an important aspect of crime and.docx
Hot Spot PolicingPlace can be an important aspect of crime and.docx
 
HOSP3075 Brand Analysis Paper 1This is the first of three assignme.docx
HOSP3075 Brand Analysis Paper 1This is the first of three assignme.docxHOSP3075 Brand Analysis Paper 1This is the first of three assignme.docx
HOSP3075 Brand Analysis Paper 1This is the first of three assignme.docx
 
Hou, J., Li, Y., Yu, J. & Shi, W. (2020). A Survey on Digital Fo.docx
Hou, J., Li, Y., Yu, J. & Shi, W. (2020). A Survey on Digital Fo.docxHou, J., Li, Y., Yu, J. & Shi, W. (2020). A Survey on Digital Fo.docx
Hou, J., Li, Y., Yu, J. & Shi, W. (2020). A Survey on Digital Fo.docx
 
How (Not) to be Secular by James K.A. SmithSecular (1)—the ea.docx
How (Not) to be Secular by James K.A. SmithSecular (1)—the ea.docxHow (Not) to be Secular by James K.A. SmithSecular (1)—the ea.docx
How (Not) to be Secular by James K.A. SmithSecular (1)—the ea.docx
 
Hopefully, you enjoyed this class on Digital Media and Society.Q.docx
Hopefully, you enjoyed this class on Digital Media and Society.Q.docxHopefully, you enjoyed this class on Digital Media and Society.Q.docx
Hopefully, you enjoyed this class on Digital Media and Society.Q.docx
 
hoose (1) one childhood experience from the list provided below..docx
hoose (1) one childhood experience from the list provided below..docxhoose (1) one childhood experience from the list provided below..docx
hoose (1) one childhood experience from the list provided below..docx
 
honesty, hard work, caring, excellence HIS 1110 Dr. .docx
honesty, hard work, caring, excellence  HIS 1110      Dr. .docxhonesty, hard work, caring, excellence  HIS 1110      Dr. .docx
honesty, hard work, caring, excellence HIS 1110 Dr. .docx
 
hoose one of the four following visualsImage courtesy o.docx
hoose one of the four following visualsImage courtesy o.docxhoose one of the four following visualsImage courtesy o.docx
hoose one of the four following visualsImage courtesy o.docx
 
HomeworkChoose a site used by the public such as a supermark.docx
HomeworkChoose a site used by the public such as a supermark.docxHomeworkChoose a site used by the public such as a supermark.docx
HomeworkChoose a site used by the public such as a supermark.docx
 
Homework 2 Please answer the following questions in small paragraph.docx
Homework 2 Please answer the following questions in small paragraph.docxHomework 2 Please answer the following questions in small paragraph.docx
Homework 2 Please answer the following questions in small paragraph.docx
 
HomeNotificationsMy CommunityBBA 2010-16J-5A21-S1, Introductio.docx
HomeNotificationsMy CommunityBBA 2010-16J-5A21-S1, Introductio.docxHomeNotificationsMy CommunityBBA 2010-16J-5A21-S1, Introductio.docx
HomeNotificationsMy CommunityBBA 2010-16J-5A21-S1, Introductio.docx
 
HomeAnnouncementsSyllabusDiscussionsQuizzesGra.docx
HomeAnnouncementsSyllabusDiscussionsQuizzesGra.docxHomeAnnouncementsSyllabusDiscussionsQuizzesGra.docx
HomeAnnouncementsSyllabusDiscussionsQuizzesGra.docx
 
Homeless The Motel Kids of Orange CountyWrite a 1-2 page pa.docx
Homeless The Motel Kids of Orange CountyWrite a 1-2 page pa.docxHomeless The Motel Kids of Orange CountyWrite a 1-2 page pa.docx
Homeless The Motel Kids of Orange CountyWrite a 1-2 page pa.docx
 
Home work 8 Date 042220201. what are the different between.docx
Home work  8 Date 042220201. what are the  different between.docxHome work  8 Date 042220201. what are the  different between.docx
Home work 8 Date 042220201. what are the different between.docx
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Damian Gillespie1. How does port facility technology interface w.docx

  • 1. Damian Gillespie 1. How does port facility technology interface with homeland security? The interfacing technology of port facility and homeland security derived as a result from the terrorist attacks that took place on September 11th, 2001. Prior to then maritime operations were able to conduct business within its arena with minimal or no scrutiny from the federal government. The emphasis on port facilities to develop enhanced and more complex security technology was implemented upon signature of the Homeland Security Presidential Directive (HSPD)-8 in December 2003. This directive required all federal agencies, private business and partners to these agencies to assist in strengthening America’s preparedness to prevent and respond to threats, whether it is man-made or all-hazard. It forced FSOs to step back and review their security plans from the overarching guidance provided by the DHS to address any threats to the homeland. In 2005 the National Strategy for Maritime Security addressed challenges and threat mitigations in the maritime domain. It also recognized the need for cohesive security measures between federal, states, local, tribal and private sector entities to align with federal programs. Although these collaborative efforts are nothing new for the port facility managers, the new oversight of port security posture requires plans to provide in depth emergent and response procedures to deter and minimize security incidents. 2. How does situational awareness and situational readiness affect port safety and emergency management? Situational awareness and situational readiness highlights the important relationship between port FSP and technology management. Having the ability to obtain information and intelligence from multiple sources regularly to support operational decision making encompasses situational awareness. It promotes establishing pathways for addressing strengths and
  • 2. weakness in the port community, while giving FSOs an edge on developing mitigation tactics to avoid new and accurate threats. In basic terms, situational awareness means that FSO knows what is going on around their port. This information paves the way for situational readiness or preparedness. The information or intelligence obtain from being aware of the port’s surrounding then can be used to develop plans or procedures to handle unexpected events that may surface. The readiness comes from the port’s ability to development emergency operations and response plans to react or respond to particular events. These plans usually address incident prevention, personnel and property protection and how to respond with the appropriate human and physical resources. Situational readiness also comes with challenges that must be address and one those primary challenges are communication. A good FSO should have the ability to facilitate the implementation of procedures at a port facility through the Maritime Security Levels effectively. A breakdown on any level of communication can make or destroy a ports situational readiness causing protocols to not be obtained. Damian Christopher, K. (2014;2015;). Port security management (Second ed.). Boca Raton, FL: CRC Press HSPD 7; Homeland Security Presidential Directive 7, Weekly Compilation of Presidential Documents (December 22, 2003), v.39 n.51, p.1816-1822, Weekly Compilation of Presidential Documents: http://www.gpoaccess.gov/wcomp/index.html Ryan Norton 1. How does port facility technology interface with homeland security? The advances in technology that are being used now by the ports are also advances that can be used in homeland security in numerous ways. The thermal imaging that is being used to identify ships that have cargo loads of illegal goods, human smuggling, drugs etc...is a technology that can be used at our
  • 3. borders to search vehicles, personnel and aircraft to ensure that illegal contraband isn't crossing our borders. The use of CCTV is pretty much everywhere now. You can rarely travel to anyplace without being picked up on CCTV in some manner. We use it at the borders, withing our towns and citites and our ports. This is a way that real time imaging can be used to capture footage of attempted attacks or to be used to identify personnel and vehicles that may be suspected in a crime or potential terrorist plot. In today's world of cyber warfare, cyber security is one of the biggest concerns. When it comes to ports and homeland security cyber terrorism is a serious threat. "Port facilities, which depend on complex computing architecture to network their surveillance, credentialing, access controls, communication and related systems, must seriously consider the increasing risks" (Christopher, 2014). This is a major concern for homeland security as well as cyber attacks are happening all the time and coming from countries such as China, Russia, North Korea and Syria. The strength in the infrastructure is a key component in ensuring our cyber networks at all levels remain safe. 2. How does situational awareness and situational readiness affect port safety and emergency management? The employess of the ports but always be aware of the situation going on around them and be ready to combat that threat or resolve the situation. There will be an Emergency Plan that will be followed in the event of an attack, accident, spill etc..and these are imperative for all employees to know. The Occupational Safety and Health Administration (OSHA) is the legal foundation in which enforcement of standards is adhered to. There must be proper handling of all dangerous cargo going on and off of all vessels within the port. HSPD-8 strengthens the U.S. preparedness to prevent and respond to threatened or actual terrorist attacks, natural disasters, or other emergencies. There are contingency plans for hazardous material spills and material incidents. So as detailed above all of these steps will be extremely important in ensuring port security via emergency
  • 4. management. Ryan Christopher, K. (2014). Port Security Management, Second Edition. CRC Press.