blog




  • Essay / Port Security Operations and Maritime Cyberterrorism in the United States

    The Facility Security Officer (FSO) is a lot like the Protective Services Officer (PSO) in the world of protective services. The FSO is primarily concerned with directing and implementing policies aimed at ensuring the security of the specific port to which he has been assigned. As efficient as it is, the OFS cannot fulfill its role alone. Their job is to know the laws, implement physical security measures such as patrols and static surveillance, and integrate multiple jurisdictional agencies to carry out the mission. The OFS uses a multitude of sources to assess these national and international risks. Literally, intelligence is gathered from information that can come from anywhere; In today's interconnected and networked world, these sources could be the Internet, open publications, or even social media. With the plethora of agencies such as the FBI, DHS and even the CIA contributing intelligence, updated databases are a very powerful tool for the FSO to rely on. Information sharing is an essential tool in the security arsenal, as we unfortunately learned the hard way on the morning of September 11, 2001. Once threats have been identified and established, the SFO informs its team of the threat and implements measures based on the updated FSP on how to mitigate and respond to threats. If terrorism is on the table, the SFO may decide to close the port completely and divert ships to other ports. Using Coast Guard and DHS resources, this measure provides the ultimate protection against terrorism. The FSO also uses security surveys that outline a plan and identify immediate threats. These surveys also allow the OFS to know the assets it has. The surveys also establish emergency actions such as the nearest evacuation routes, shelters such as police stations and hospitals. The OFS can then use this information to activate the FSP. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay The FSO can use intelligence collected from the Department of Justice and Defense, and even surveillance and CCTV footage. Available documentation comes from FEMA, such as the Handbook for Mitigating Potential Terrorist Attacks on Buildings; Form CG-6025; and the Maritime Transportation Security Act of 2002. The U.S. Coast Guard and DHS will be responsible for intercepting any threats entering the port; however, the FSO will dictate and guide threats to the port itself. Port technologies such as radiation detection, x-ray and cargo scanning technologies also help the SFO in its mission. According to Christopher (2014), the technologies that the SFO can rely on to defend against water-based threats are sonar and radar capabilities as well as divers. Each aspect brings different things to the table. Intelligence is power and allows the SFO to make informed decisions. Surveillance is just as powerful, but it is limited to where patrolling is done, how information is collected, and most importantly, what information cannot be collected. Roving patrols and static watches are effective; however, this is more of a deterrent than an active stop. Intelligence combined with technology with an intelligent FSO is the most powerful combination.However, as I mentioned earlier, this is not an individual mission. The U.S. Coast Guard's Role in Port Security Operations The U.S. Coast Guard is a branch of the Department of Homeland Security developed to enforce maritime laws and defend the coastline along the United States and its ports. Its mission is to monitor and secure waterways and implement measures to protect, mitigate, and respond to immediate threats in U.S. waters in accordance with regulations outlined in USC. The Coast Guard is responsible for protecting citizens and their personal property, protecting the maritime waters, transportation system and protecting the nation from terrorist attacks, criminal and malicious actors and related crimes. The Coast Guard has multiple responsibilities for port security operations. The U.S. Coast Guard also contributes to port security through participation in the International Port Security (IPS) program. The Coast Guard visits foreign ports and gives recommendations on updates to their current security and even assists in screening goods destined for the United States. Because ports contribute enormously to the national economy, this role is essential to avoid disruption. Overall, the Coast Guard implements a tiered approach. For example, in the case of a vessel that fails to meet security requirements or is holding cargo originating from a port that is not a member of the international ISPS agreement, the U.S. Coast Guard enforces its jurisdictional authority by preventing these ships from reaching U.S. ports or by conducting careful monitoring. incoming ships and goods before letting them depart. The U.S. Coast Guard can also establish safety zones, a type of perimeter to control and deter vessels from entering high-risk areas. With terrorism coming from anywhere, the U.S. Coast Guard also performs normal traffic duties on the waterway by acting as a law enforcement capability. Having a direct impact on port security, the U.S. Coast Guard is responsible for regularly conducting a Threat, Hazard Identification, and Risk Assessment (THIRA) at ports, describing port facilities, including any structures surrounding the ports. ports and areas of vulnerability. Maritime Cyberterrorism As already As noted above, the world is now interconnected and networked. Critical infrastructure depends on functional and secure networks. Our country's ports are also part of this infrastructure. Ports represent a significant part of the country's GDP and any disruption results in loss of money and jobs. With the recent election, our country has seen the power of malicious intent in using actors to override security protocols. The nation's ports are vulnerable to maritime cyberterrorism, in part because of our reliance on these networks to carry out our mission. Attacks on port facilities and ships could be carried out for a multitude of reasons. Some of these relate to identity and property theft, national security interventions, and information discovery for terrorist and malicious state actors. Everything is controlled electronically by computers. If systems were hacked and bypassed, information about shipping, cargo, crew and destination could be obtained, ruining the integrity of ports. If surveillance cameras and video surveillance systems could be controlled at!