SlideShare a Scribd company logo
1 of 7
Course Objective - Assess the importance of Port Management
Security.
Instructions: Your initial post should be at least 350 words.
Lesson
Port Facility Operations
“The terrorist threat in the early twenty-first century is testing
the basic political values and structures of democracy, and in
particular, criminal justice roles and processes in controlling
deviance in society. Terrorism and the emergence of homeland
security are changing the character of local policing, not only in
the United States, but around the world”…Kenneth Christopher,
Port Security Management
Port facility security is not the sole responsibility of only one
entity. It is the responsibility of many including international,
national, state and local organizations including the private
sector (Christopher, 2015).
The port authorities often do not have direct control over the
following:
· Customs and border protection
· Police, fire, and emergency medical services
· Immigration and agriculture agencies
· Coast Guard and harbor authorities
· Transportation and utility regulating bodies
· Employer groups, stevedores, and labor unions
· Cargo terminal operators
· Passenger cruise and ferry lines
· Vendors, suppliers, and customers
Collaborations between Port Security and Enforcement
Operations
This week the focus will be on the security management aspects
of port facility operations. As we learned in week six, the
security and safety at U.S. ports is no doubt a shared
responsibility to ensure that port authorities develop and apply
an operational approach that includes various resources,
processes, and systems to establish an interconnected port
security program. Intra and interagency cooperation is essential
to effectively coordinate security efforts between different stake
holders conducting port activities. It is important to understand
that port facility security is not the sole responsibility of only
one entity. It is the responsibility of many including
international, national, state and local organizations including
the private sector (Christopher, 2015, p. 268).
The changing landscape of criminal activity has forced a change
in policing. Since 9/11, police forces are relied upon, more
often than not, to conduct terrorism training, CBRN/WMD
training, intelligence gathering (to some extent) and information
sharing; along with traditional police roles of crime prevention
and follow-on prosecution, public security and assistance. As
with every aspect of our society, this change has encompassed
our port security systems as well. Law enforcement agencies
are expected (and needed) to work with port authorities “to
integrate the appropriate level of law enforcement service into
the Port FSP and security regimen” (Christopher). Developing
mutual Memorandums of Understanding (MOU) and/or
Memorandums of Agreement (MOA) will help to define each
entities' roles, responsibilities and organizational hierarchy.
When we take a closer look, we soon realize that collaboration
between port security and law enforcement operations is critical
if both entities want to interact operationally. Although the
jurisdictions still remain the same, the port FSO generally has
jurisdiction over the respective port. Whereas, the law
enforcement authorities have jurisdiction over their prescribed
geographic area. But, seeing as how a port belongs (or is at
least geographically located in) a city or county, then it can
easily get confusing. There is simply no room for more
confusion in an already extremely complex port environment.
To properly combat this problem, once again the key is
communication. Communication between the heads of each
agency and having a collaborative working relationship is
crucial to smooth and effective port operations. The Chief of
Police of the local law enforcement agency must be able to
speak freely and frequently with the Port FSO. It is easy to
contemplate the need for having both agencies, but, it’s not the
pure simplicity of having more personnel to protect the port.
There are legalities as well that impact how both agencies work
and collaborate. For instance, not all violations fall into the
realm of the port FSO. In many cases, the situation must be
handled by local law enforcement authorities. Yes, the port
security personnel can initially apprehend, but, the specific
violations may require the handling of the situation by local,
state, or federal law enforcement personnel. This is yet another
reason why the two departments should be able to work together
in unison as opposed to working against each other. For
instance, the local police should always be included in any
facility security plan that addresses matters related to
administration, legal authority to act, training, joint training and
exercise functions and activities, and response and recovery
from a natural or manmade disaster or terrorist attack. Together,
both parties can work in harmony and establish a secure and
safe port (Christopher, 2015).
The threat of terrorism continues to evolve and so does
homeland security. It is imperative that all federal, state and
local (in some cases tribal) agencies and authorities are
operating on the same page. Collaboration between all security
and law enforcement entities is the key to deter terrorism and
criminal activities. Port security collaboration with law
enforcement operations is vital, as port facilities have a major
economic impact on towns and the surrounding cities. It is in
the best interest of the law enforcement agency to ensure not
only the port is safe and protected, but the community
surrounding the port is protected as well. Just as important, and
in the best interest of both parties, is to understand one
another’s management and organizational structure. This
understanding can provide and enhance utilization of both
organizations resources when an event or incident occurs.
Trying to train, equip, and organize the port security and law
enforcement elements post event will lead to failure and
potentially result in increased death and destruction within the
port and the surrounding local community.
Challenges of Collaboration in Managing Port Security
Overall, there are three key challenges when working with
numerous agencies for one common goal: “resource allocation”,
“lack of big-picture” (strategic thinking), and “improving risk
communication” (Christopher, 2015). Communication will
always be a big piece when we assess the challenges associated
with collaboration. As with any working relationship between
differing agencies, there will be challenges to overcome. The
challenges in managing port security operations, as identified
by a forum held by the U.S. Government Accountability Office
(GAO) in 2007 are; “improving risk communications, political
obstacles to risk-based resources allocations, and as already
mentioned, a lack of strategic thinking about managing
homeland security risk” (Christopher, 2015). What is
interesting about the three challenges identified is that they
appear to be very similar to the findings of the 9/11
Commission Report on the hijacking of commercial aircraft.
The Commission cited a lack of interagency collaboration in the
sharing of information and communications, political issues
surrounding command and control, and finally a “lack of
imagination” on the part of the government. However, it
appears that the lessons learned from those events have taken
root. Progress has been made in the working relationships to
counter the terrorist threat and impede criminal activities within
the seaport environment.
Port Security and the Dirty Bomb Threat
No discussion on port security challenges is complete without a
brief discussion on the so called dirty bomb. The dirty bomb is
commonly associated with the technical name, Radiation
Dispersal Device or RDD. The initial idea is that radioactive
material would be dispersed (through IED or aerial application)
into a target area by the use of explosives with the intent to
contaminate the area. The radioactive material most associated
with such an attack would be medical grade material or
industrial radioactive waste, not fissile or weapons grade
material. Generally, the RDD would be constructed with various
radioactive elements such as strontium 90, iodine 131, or
cesium 137. These elements are the most likely candidates for
such an attack as they could contaminate large areas with
radioactive material. However, these elements are beta
emitters, and beta particles can be stopped by normal clothing.
However, they can present a major hazard if inhaled or
ingested, resulting in radiation sickness and likely death.
Now the author will opine that this threat is more of a political
hype than reality. Yes, in theory the potential exists. However,
in probability the threat would be low for many reasons.
Obtaining enough radioactive material to construct an RDD
would be problematic. Then there is the transportation issue of
delivering the RDD to target. To date, as confirmed by the
additional reading for week 6, the Council on Foreign Relations
report (2006) on “Dirty Bombs,” there has not been a successful
attack utilizing an RDD. True, there is a lot of talk about
testing and threating the use of a dirty bomb…Iraq in 1987 and
the Chechen rebels in Moscow in 1995, who planted a device
that failed to function (Council on Foreign Relations, 2006).
The RDD threat - the real truth and nothing but the truth
We are exposed to radiation on a daily basis through many
means. However the threat of an RDD accomplishes one of its
major goals, fear. And it is due to this fear that a lot of time
and money has been spent to detect, deter and defeat (the
objective of any security program) such a threat. In the last
few years a lot of money has been spent not only at our ports
but in our local communities as well. Stabilization teams have
been organized and equipped to counter this threat in the local
community. In the political world fear sells, regardless of the
reality. The author is not suggesting that this is not a threat,
but is suggesting that it has obtained more attention than it
should have, thereby propagating the idea that an RDD is a huge
threat within the port environment.
As far as ports and the general public is concerned there are
more realistic threats with a higher probability of success. For
example, all the trucks that transport hazardous materials daily
from and to the port while traversing through our local city
streets. Loads such as ammonium nitrate (fertilizer), chlorine,
or strong acids is a common occurrence. Looking ahead to next
week’s lesson 8, we will see what happened to Texas City,
Texas when a vessel caught fire and exploded at a dock carrying
bulk fertilizer. Spoiler alert – it flattened the town. A similar
event occurred just a few years back at a processing plant
outside of Waco, Texas, when it caught fire and exploded.
Click on the photo below to see the massive power from the
fertilizer plant explosion.
Measuring Risk
Michael German, a fellow with the Brennan Center for Justice’s
Liberty and National Security Programs, wrote an article
entitled: Is Flawed Terrorism Research driving Flawed
Counterterrorism Policies?, which was dated April 7, 2015, and
published by The Daily Threat Brief . The article discusses
how the government is continuing to fund research that supports
desecrated theories rather than using objective empirical
analyses to form policy decisions on counterterrorism defenses.
German uses historical events and the hysteria that led to the
internment of Japanese citizens during WWII and the current
“modern radicalization theory” to justify the tactics used by the
FBI against the American Muslim communities. “The theory
that terrorists incubate through predictable steps from adopting
a radical ideology to committing an act of violence has been
soundly discredited by empirical studies of terrorists” (German,
2015, p.2). Radicalization does occur, which can lead to
violence, such as the Boston Marathon Bombers…this cannot be
denied. But at what cost?
Now what does this have to do with the threat of an RDD in a
seaport? A parallel can be drawn between the governments
polices on Islamic extremist radicalization theory and the RDD
threat. It is simple to assume the worst, and formulate all kinds
of potential threats without looking at the real probability of the
threat occurring or evolving. The problem is that it is not cost
effective to do so. Limited resources are expended attempting
to counter a threat that although is possible, may not be
probable. An effective risk assessment utilizing factual data,
capability, availability, intent in conjunction with empirical
data could form a low probability of risk. This is not saying to
ignore the risk, but placing it where it belongs with all the other
many possibilities that may have a higher probability of causing
harm or damage. But again, in the political world of foreign
policy and money spending, “fear” sells, especially to the
uninformed public.
References
Christopher, K. (2015). Port Security Management, 2nd Ed.
Boca Raton, FL: CRC Press Taylor & Francis Group, ISBN #
13: 978-1-4200- 6893-1 e-book.

More Related Content

Similar to Assess Port Management Security

William Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docxWilliam Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docxambersalomon88660
 
Week One – Risk and the All Hazards ApproachIt seems logical for.docx
Week One – Risk and the All Hazards ApproachIt seems logical for.docxWeek One – Risk and the All Hazards ApproachIt seems logical for.docx
Week One – Risk and the All Hazards ApproachIt seems logical for.docxphilipnelson29183
 
Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)Jill Baldwin
 
Reply with 150 words to each post.Post 1 (Kyle)After rea
Reply with 150 words to each post.Post 1 (Kyle)After reaReply with 150 words to each post.Post 1 (Kyle)After rea
Reply with 150 words to each post.Post 1 (Kyle)After reafelipaser7p
 
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docxWeek Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docxphilipnelson29183
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxtawnyataylor528
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mfelipaser7p
 
Discussion Question  For this week’s assigned reading, you were t.docx
Discussion Question  For this week’s assigned reading, you were t.docxDiscussion Question  For this week’s assigned reading, you were t.docx
Discussion Question  For this week’s assigned reading, you were t.docxelinoraudley582231
 
The Energy Sector Paper
The Energy Sector PaperThe Energy Sector Paper
The Energy Sector PaperSonia Sanchez
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxIRESH3
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxoreo10
 
admin,+GroJIL+6(1)+-+Samuel+and+Chai.pdf
admin,+GroJIL+6(1)+-+Samuel+and+Chai.pdfadmin,+GroJIL+6(1)+-+Samuel+and+Chai.pdf
admin,+GroJIL+6(1)+-+Samuel+and+Chai.pdfCssiusChai
 

Similar to Assess Port Management Security (12)

William Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docxWilliam Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docx
 
Week One – Risk and the All Hazards ApproachIt seems logical for.docx
Week One – Risk and the All Hazards ApproachIt seems logical for.docxWeek One – Risk and the All Hazards ApproachIt seems logical for.docx
Week One – Risk and the All Hazards ApproachIt seems logical for.docx
 
Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)
 
Reply with 150 words to each post.Post 1 (Kyle)After rea
Reply with 150 words to each post.Post 1 (Kyle)After reaReply with 150 words to each post.Post 1 (Kyle)After rea
Reply with 150 words to each post.Post 1 (Kyle)After rea
 
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docxWeek Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
 
Discussion Question  For this week’s assigned reading, you were t.docx
Discussion Question  For this week’s assigned reading, you were t.docxDiscussion Question  For this week’s assigned reading, you were t.docx
Discussion Question  For this week’s assigned reading, you were t.docx
 
The Energy Sector Paper
The Energy Sector PaperThe Energy Sector Paper
The Energy Sector Paper
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docx
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docx
 
admin,+GroJIL+6(1)+-+Samuel+and+Chai.pdf
admin,+GroJIL+6(1)+-+Samuel+and+Chai.pdfadmin,+GroJIL+6(1)+-+Samuel+and+Chai.pdf
admin,+GroJIL+6(1)+-+Samuel+and+Chai.pdf
 

More from vanesaburnand

InstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxInstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxvanesaburnand
 
InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxvanesaburnand
 
InstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxInstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxvanesaburnand
 
InstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxInstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxvanesaburnand
 
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxInstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxvanesaburnand
 
InstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxInstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxvanesaburnand
 
InstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxInstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxvanesaburnand
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxvanesaburnand
 
InstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxInstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxvanesaburnand
 
InstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxInstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxvanesaburnand
 
InstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxInstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxvanesaburnand
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxvanesaburnand
 
InstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxInstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxvanesaburnand
 
InstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxInstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxvanesaburnand
 
InstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxInstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxvanesaburnand
 
InstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxInstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxvanesaburnand
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxvanesaburnand
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxvanesaburnand
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxvanesaburnand
 
InstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxInstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxvanesaburnand
 

More from vanesaburnand (20)

InstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxInstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docx
 
InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docx
 
InstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxInstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docx
 
InstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxInstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docx
 
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxInstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
 
InstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxInstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docx
 
InstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxInstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docx
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docx
 
InstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxInstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docx
 
InstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxInstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docx
 
InstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxInstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docx
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
 
InstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxInstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docx
 
InstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxInstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docx
 
InstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxInstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docx
 
InstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxInstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docx
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docx
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docx
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docx
 
InstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxInstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docx
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 

Recently uploaded (20)

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 

Assess Port Management Security

  • 1. Course Objective - Assess the importance of Port Management Security. Instructions: Your initial post should be at least 350 words. Lesson Port Facility Operations “The terrorist threat in the early twenty-first century is testing the basic political values and structures of democracy, and in particular, criminal justice roles and processes in controlling deviance in society. Terrorism and the emergence of homeland security are changing the character of local policing, not only in the United States, but around the world”…Kenneth Christopher, Port Security Management Port facility security is not the sole responsibility of only one entity. It is the responsibility of many including international, national, state and local organizations including the private sector (Christopher, 2015). The port authorities often do not have direct control over the following: · Customs and border protection · Police, fire, and emergency medical services · Immigration and agriculture agencies · Coast Guard and harbor authorities · Transportation and utility regulating bodies · Employer groups, stevedores, and labor unions · Cargo terminal operators · Passenger cruise and ferry lines · Vendors, suppliers, and customers Collaborations between Port Security and Enforcement Operations
  • 2. This week the focus will be on the security management aspects of port facility operations. As we learned in week six, the security and safety at U.S. ports is no doubt a shared responsibility to ensure that port authorities develop and apply an operational approach that includes various resources, processes, and systems to establish an interconnected port security program. Intra and interagency cooperation is essential to effectively coordinate security efforts between different stake holders conducting port activities. It is important to understand that port facility security is not the sole responsibility of only one entity. It is the responsibility of many including international, national, state and local organizations including the private sector (Christopher, 2015, p. 268). The changing landscape of criminal activity has forced a change in policing. Since 9/11, police forces are relied upon, more often than not, to conduct terrorism training, CBRN/WMD training, intelligence gathering (to some extent) and information sharing; along with traditional police roles of crime prevention and follow-on prosecution, public security and assistance. As with every aspect of our society, this change has encompassed our port security systems as well. Law enforcement agencies are expected (and needed) to work with port authorities “to integrate the appropriate level of law enforcement service into the Port FSP and security regimen” (Christopher). Developing mutual Memorandums of Understanding (MOU) and/or Memorandums of Agreement (MOA) will help to define each entities' roles, responsibilities and organizational hierarchy. When we take a closer look, we soon realize that collaboration between port security and law enforcement operations is critical if both entities want to interact operationally. Although the jurisdictions still remain the same, the port FSO generally has jurisdiction over the respective port. Whereas, the law enforcement authorities have jurisdiction over their prescribed geographic area. But, seeing as how a port belongs (or is at least geographically located in) a city or county, then it can easily get confusing. There is simply no room for more
  • 3. confusion in an already extremely complex port environment. To properly combat this problem, once again the key is communication. Communication between the heads of each agency and having a collaborative working relationship is crucial to smooth and effective port operations. The Chief of Police of the local law enforcement agency must be able to speak freely and frequently with the Port FSO. It is easy to contemplate the need for having both agencies, but, it’s not the pure simplicity of having more personnel to protect the port. There are legalities as well that impact how both agencies work and collaborate. For instance, not all violations fall into the realm of the port FSO. In many cases, the situation must be handled by local law enforcement authorities. Yes, the port security personnel can initially apprehend, but, the specific violations may require the handling of the situation by local, state, or federal law enforcement personnel. This is yet another reason why the two departments should be able to work together in unison as opposed to working against each other. For instance, the local police should always be included in any facility security plan that addresses matters related to administration, legal authority to act, training, joint training and exercise functions and activities, and response and recovery from a natural or manmade disaster or terrorist attack. Together, both parties can work in harmony and establish a secure and safe port (Christopher, 2015). The threat of terrorism continues to evolve and so does homeland security. It is imperative that all federal, state and local (in some cases tribal) agencies and authorities are operating on the same page. Collaboration between all security and law enforcement entities is the key to deter terrorism and criminal activities. Port security collaboration with law enforcement operations is vital, as port facilities have a major economic impact on towns and the surrounding cities. It is in the best interest of the law enforcement agency to ensure not only the port is safe and protected, but the community surrounding the port is protected as well. Just as important, and
  • 4. in the best interest of both parties, is to understand one another’s management and organizational structure. This understanding can provide and enhance utilization of both organizations resources when an event or incident occurs. Trying to train, equip, and organize the port security and law enforcement elements post event will lead to failure and potentially result in increased death and destruction within the port and the surrounding local community. Challenges of Collaboration in Managing Port Security Overall, there are three key challenges when working with numerous agencies for one common goal: “resource allocation”, “lack of big-picture” (strategic thinking), and “improving risk communication” (Christopher, 2015). Communication will always be a big piece when we assess the challenges associated with collaboration. As with any working relationship between differing agencies, there will be challenges to overcome. The challenges in managing port security operations, as identified by a forum held by the U.S. Government Accountability Office (GAO) in 2007 are; “improving risk communications, political obstacles to risk-based resources allocations, and as already mentioned, a lack of strategic thinking about managing homeland security risk” (Christopher, 2015). What is interesting about the three challenges identified is that they appear to be very similar to the findings of the 9/11 Commission Report on the hijacking of commercial aircraft. The Commission cited a lack of interagency collaboration in the sharing of information and communications, political issues surrounding command and control, and finally a “lack of imagination” on the part of the government. However, it appears that the lessons learned from those events have taken root. Progress has been made in the working relationships to counter the terrorist threat and impede criminal activities within the seaport environment. Port Security and the Dirty Bomb Threat No discussion on port security challenges is complete without a brief discussion on the so called dirty bomb. The dirty bomb is
  • 5. commonly associated with the technical name, Radiation Dispersal Device or RDD. The initial idea is that radioactive material would be dispersed (through IED or aerial application) into a target area by the use of explosives with the intent to contaminate the area. The radioactive material most associated with such an attack would be medical grade material or industrial radioactive waste, not fissile or weapons grade material. Generally, the RDD would be constructed with various radioactive elements such as strontium 90, iodine 131, or cesium 137. These elements are the most likely candidates for such an attack as they could contaminate large areas with radioactive material. However, these elements are beta emitters, and beta particles can be stopped by normal clothing. However, they can present a major hazard if inhaled or ingested, resulting in radiation sickness and likely death. Now the author will opine that this threat is more of a political hype than reality. Yes, in theory the potential exists. However, in probability the threat would be low for many reasons. Obtaining enough radioactive material to construct an RDD would be problematic. Then there is the transportation issue of delivering the RDD to target. To date, as confirmed by the additional reading for week 6, the Council on Foreign Relations report (2006) on “Dirty Bombs,” there has not been a successful attack utilizing an RDD. True, there is a lot of talk about testing and threating the use of a dirty bomb…Iraq in 1987 and the Chechen rebels in Moscow in 1995, who planted a device that failed to function (Council on Foreign Relations, 2006). The RDD threat - the real truth and nothing but the truth We are exposed to radiation on a daily basis through many means. However the threat of an RDD accomplishes one of its major goals, fear. And it is due to this fear that a lot of time and money has been spent to detect, deter and defeat (the objective of any security program) such a threat. In the last few years a lot of money has been spent not only at our ports but in our local communities as well. Stabilization teams have been organized and equipped to counter this threat in the local
  • 6. community. In the political world fear sells, regardless of the reality. The author is not suggesting that this is not a threat, but is suggesting that it has obtained more attention than it should have, thereby propagating the idea that an RDD is a huge threat within the port environment. As far as ports and the general public is concerned there are more realistic threats with a higher probability of success. For example, all the trucks that transport hazardous materials daily from and to the port while traversing through our local city streets. Loads such as ammonium nitrate (fertilizer), chlorine, or strong acids is a common occurrence. Looking ahead to next week’s lesson 8, we will see what happened to Texas City, Texas when a vessel caught fire and exploded at a dock carrying bulk fertilizer. Spoiler alert – it flattened the town. A similar event occurred just a few years back at a processing plant outside of Waco, Texas, when it caught fire and exploded. Click on the photo below to see the massive power from the fertilizer plant explosion. Measuring Risk Michael German, a fellow with the Brennan Center for Justice’s Liberty and National Security Programs, wrote an article entitled: Is Flawed Terrorism Research driving Flawed Counterterrorism Policies?, which was dated April 7, 2015, and published by The Daily Threat Brief . The article discusses how the government is continuing to fund research that supports desecrated theories rather than using objective empirical analyses to form policy decisions on counterterrorism defenses. German uses historical events and the hysteria that led to the internment of Japanese citizens during WWII and the current “modern radicalization theory” to justify the tactics used by the FBI against the American Muslim communities. “The theory that terrorists incubate through predictable steps from adopting a radical ideology to committing an act of violence has been soundly discredited by empirical studies of terrorists” (German, 2015, p.2). Radicalization does occur, which can lead to violence, such as the Boston Marathon Bombers…this cannot be
  • 7. denied. But at what cost? Now what does this have to do with the threat of an RDD in a seaport? A parallel can be drawn between the governments polices on Islamic extremist radicalization theory and the RDD threat. It is simple to assume the worst, and formulate all kinds of potential threats without looking at the real probability of the threat occurring or evolving. The problem is that it is not cost effective to do so. Limited resources are expended attempting to counter a threat that although is possible, may not be probable. An effective risk assessment utilizing factual data, capability, availability, intent in conjunction with empirical data could form a low probability of risk. This is not saying to ignore the risk, but placing it where it belongs with all the other many possibilities that may have a higher probability of causing harm or damage. But again, in the political world of foreign policy and money spending, “fear” sells, especially to the uninformed public. References Christopher, K. (2015). Port Security Management, 2nd Ed. Boca Raton, FL: CRC Press Taylor & Francis Group, ISBN # 13: 978-1-4200- 6893-1 e-book.