Cover image for Maritime Security : An Introduction.
Maritime Security : An Introduction.
Title:
Maritime Security : An Introduction.
Author:
McNicholas, Michael.
ISBN:
9780080919539
Personal Author:
Physical Description:
1 online resource (470 pages)
Series:
Butterworth-Heinemann Homeland Security
Contents:
Front Cover -- Maritime Security An Introduction -- Copyright Page -- Dedication Page -- Table of Contents -- About the Author -- Contributors -- Preface -- Acknowledgments -- Chapter 1: Commercial Seaports and Modes of Maritime Transport -- Objectives -- Introduction -- Commercial Seaports -- Container Terminals -- Bulk Cargo Terminals -- Cruise Ship Terminals -- Nontraditonal Ports -- Stakeholders -- Terminal Owners -- Terminal Operators -- Stevedore Company -- Longshoremen -- Intermodalism -- Modes of Maritime Transport -- Tankers -- LNG Tankers -- Chemical Tankers -- Container Ships -- Freighters -- Bulkers -- Oceangoing Tugboats -- Cruise and Passenger Ships -- Summary -- Chapter 2: Documentation, Financial Transactions, and Business Entities in Commercial Maritime Transportation -- Objectives -- Introduction -- Purchase of Goods -- Filling the Order -- Container Stuffing -- Making a Booking -- Documents Used to Export and Import Cargo -- Bill of Lading -- Shipper's Export Declaration -- Certificate of Origin -- Commercial Invoice -- Insurance Certificate -- Export License -- Consular Invoice -- Inspection Certificate -- Phytosanitary Certificate -- The Next Step for the Ocean Carrier -- Documents Specific to Import Cargo Only -- Arrival Notice -- Pro Forma Invoice -- Customs Entries Forms -- Freight Release -- Delivery Order -- Duty Drawback -- Bank Draft -- Letter of Credit -- Business Entities in Commercial Maritime Transportation -- Freight Forwarders -- Customs Brokers -- Ship's Husbands/Agents -- Ship Managers/Operators -- VOCC and NVOCC -- P&I Clubs -- International Maritime Organization -- Classification Societies -- Flag States -- Summary -- Chapter 3: International and U.S. Maritime Security Regulation and Programs -- Objectives -- Introduction -- The ISPS Code -- Amendments to SOLAS.

WCO's Framework of Standards to Secure and Facilitate Global Trade -- U.S. Laws and Programs -- Maritime Transportation Security Act (MTSA) -- Customs-Trade Partnership Against Terrorism (C-TPAT) -- C-TPAT Security Criteria for Sea Carriers -- Business Partner Requirements -- Security Procedures -- Container Security -- Physical Access Controls -- Personnel Security -- Procedural Security -- Security Training and Awareness -- Physical Security -- Information Technology Security -- Security Assessment, Response, and Improvement -- 24-Hour Advance Manifest Rule and the Container Security Initiative (CSI) -- Secure Freight Initiative -- Safe Port Act of 2006 -- Summary -- Chapter 4: Vulnerabilities in the Cargo Supply Chain -- Objectives -- Introduction -- Vulnerabilities and Their Potential Impact -- Lessons Learned from the Drug War -- Recommended Security Practices at the Production/Loading Phase -- Manufacturer, Factory, and Plant -- Recommended Security Practices at the Export Phase -- Carriers and Seaports -- Recommended Security Practices at the Importation/Distribution Phase -- Ports of Entry and Importers -- Special Vulnerabilities in the Maritime Environment -- Cargo Theft -- Internal Conspiracies and Techniques Used to Circumvent Security -- Container Seals -- "Red Flags" of Possible Criminal/Terrorist Surveillance -- Summary -- Chapter 5: Plagues of the Seas: Piracy and Stowaways -- Objectives -- Definition and Historical Beginnings -- Highlights of Recent Cases of Piracy -- Tactics and Techniques in Piracy -- Trends in Piracy -- The Linkage Between Piracy, Organized Crime, and Terrorism -- Stowaways: The Other Plague -- The Motivation of the Stowaway -- Techniques and Tactics Used by Stowaways -- Summary -- Chapter 6: Drug Smuggling via Maritime Cargo, Containers, and Vessels -- Objectives -- Illegal Drug Origins and Production.

Maritime Smuggling Routes and Trends -- Drug Smuggling Methods and Techniques -- Drug Smuggling via Cargo -- Drug Smuggling via Containers -- Drug Smuggling via Vessels -- Summary -- Chapter 7: Terrorism and Commercial Maritime Transportation -- Objectives -- The Definition of Terrorism -- Brief Review of the History of Terrorism -- Current Trends in Terrorism -- Types of Weapons Utilized by or Potentially Available to Terrorists -- Explosives -- Small Arms and Infantry Weapons -- Weapons of Mass Destruction (WMDs) -- Chemical Weapons -- Biological Weapons -- Radiological Weapons -- Nuclear Weapons -- Terrorist Targeting of Ships and Ports -- Use of Ships, Cargo, and Containers to Transport Terrorists and Materials -- Cooperation with Narcotics Traffickers and Other Terrorist Organizations -- Summary -- Chapter 8: A Strategic Blueprint for World-Class Seaport Security -- Objectives -- External Security Ring -- Intelligence Operations -- Government and Law Enforcement Liaison -- Perimeter Security Ring -- Physical Security Barrier and Illumination -- Waterside Security Measures -- Perimeter Intrusion Detection -- Entrance and Exit Gates -- Access Control Policy and Procedures -- Port Identification Badge System -- Narcotics Control at Access Points -- Explosives Detection at Access Points -- Weapons of Mass Destruction Detection at Access Points -- Inner Security Ring -- Mobile Security Patrols -- Foot Security Patrols -- Security Operations Command Center -- Shift Security Superintendent -- Site and Asset-Specific Security Rings -- Administrative and Operations Office Buildings -- Bonded and High-Risk Warehouses -- Critical Assets and Essential Equipment -- Vessel Security Ring -- Basic Concept -- VST Deployment for LO/LO Commercial Cargo/Container Vessels and Tankers -- VST Deployment for RO/RO Vessels -- Key Vessel Security Procedures.

Predeparture Search for Contraband and Unauthorized Persons -- Security Personnel Employment and Training -- Pre-Employment Screening -- Basic Security Training -- Security Officer Equipment -- Port Security Director -- Port Facility Security Plan (PFSP/FSP) -- Summary -- Chapter 9: Port Security Management -- Objectives -- The Port Security Director -- The Systems Approach, ISO Certifications, Strategic Planning, and Metric Management -- A Multiorganizational Approach Toward Port Security -- The Importance of Comprehensive Job Descriptions -- Planning and Conducting Security-Related Training -- Visual/Verbal Learners -- Visual/Nonverbal Learners -- Auditory/Verbal Learners -- Tactile/Kinesthetic Learners -- Designing Training for Different Types of Learners -- Intelligence and Its Role in Maritime Security -- Risk Management and Port Security -- Contingency Planning: A Critical Part of Port Security’Management -- Getting the Maritime Community Excited About Contingency Planning: A Brief Look at an Introduction to a Contingency Planning Training Session -- Looking for Well-Respected Sources and Standards on Contingency Planning -- The Incident Command System (ICS) and the National Incidents Management System (NIMS) -- Testing Training and Planning Through Exercises and Drills -- Summary -- Chapter 10: Threat Mitigation Strategies -- Objectives -- Mitigating Pirate Attacks -- Hostage Survival and Rescue -- Cargo Container Inspection Techniques -- Security Equipment, Systems, and Devices Used to Detect Contraband and Unauthorized Persons in a Container -- Summary -- Chapter 11: Information Security and Assurance -- Objectives -- Introduction -- Brief History of Information Security -- The Information Security Function in a Maritime Company -- Key Concepts in the Field of Information Security -- Essential Infosec Objectives.

Levels of Computer Security -- Computer Hardware and Software -- Logical Levels of Computer Security -- Internet Security -- Network Security -- Enterprise Resource Planning Systems Security -- Database Security -- Application Security -- Common Vulnerabilities in the Electronic Commerce Environment -- Human Threats to Information Security -- Technical Risks -- Risks of Theft and Loss of Data -- Mechanical Failures -- Computer Viruses and Malware -- Denial of Service Attacks -- Criminal and Sociological Issues -- United States Government Organizations -- Department of Homeland Security -- Department of Defense -- Federal Bureau of Investigation -- US-CERT -- Computer Emergency Readiness Team/Coordination Center -- National Institute of Standards and Technology -- National Security and Public Policy Issues -- Political, Cultural, and Economic Issues -- Summary -- Further Reading -- Glossary -- Index.
Abstract:
The commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena--the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary "choke point" - the load seaports and their ships. This book provides practical, experience-based, and proven knowledge - and a "how-to-guide" - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports. - Holds the keys to successfully designing, implementing, and managing effective port and vessel security programs in a high-risk environment - Provides real-world experience in Maritime Security from the Managing Director of Phoenix Management Services Group in the USA and Panama. - Offers specifics of a model port security program and case studies of effective tactics in a high-threat environment.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: