StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Port Security Improvements - Research Paper Example

Cite this document
Summary
The current paper highlights that the 9/11 tragedy has given everybody a new perspective of what organizations engaged in terror can do. We have known to be driven only by their unbridled hatred for people with a different perspective from their own have suddenly become an organized network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Port Security Improvements
Read Text Preview

Extract of sample "Port Security Improvements"

Port Security Improvements after 9/11 In the United States Abstract The 9/11 tragedy have given everybody a new perspective of what organizations engaged in terror can do. The disorganized fanatics that we have known to be driven only by their unbridled hatred for people who have a different perspective from their own have suddenly become an organized underground network. 9/11 has proven that terror attacks can happen anywhere if we remain complacent in protecting our way of life and freedom from those who threatens it. They have given a blow to aviation security and in response we have tighten our airport security. The recommendation detailed in this paper will ensure that the United States ports that cater to international freight and cargo will remain unaffected by any terror attacks. The same recommendation also aims to put a buffer zone between the ports and potential threats from incoming cargo and passenger ships. The paper have also taken into consideration threats that are coming from within the United States to ensure that the American government also do its share in protecting the world from threats emanating from within its shores. In the process the ports are also protected from threats coming from within the United States. The recommended off shore and perimeter buffer zone also protect the general public in cases when attacks do happen. 1. Introduction The United States boasting of more than 170 ports along its nineteen thousand nine hundred twenty four kilometre (19,924 km) coastline attribute a considerable amount of its total economic activity through the operation of these ports (United States Statistics Office, 2012). A major disruption in these ports that impedes the flow of goods would cost the United States billions of dollars a prolonged disruption would cripple the United States’ economy at a cost of more than one billion US dollars a day (Grillot, Cruise, & D'Erman, 2010). Thus, it is imperative that the government of the United States not only ensure the reliability of its use but also ensures that terror attacks are completely frustrated. The protection of any United States port would include ensuring that Drugs, Dirty Bombs, Human Trafficking and smuggling, Armaments, Biological weapons, live animals, Air and water contaminants do not make its way into the country. There are two vulnerabilities that can be determined from the ports. The first is a direct terror attack in any of the port that would cast doubt on the reliability and safety of the goods passing through the ports. The second is the use of ports as the gateway for the entry of weapons of mass destruction into the United States (Davis, 2008). The ports and its security system are considered as the last line of defence of the United States against any terror attack that would impact its economy or the safety of its citizens (Sweet, 2005). Thus it is imperative that the security system in place not only makes sense but also ensures that the most extreme scenario is taken into consideration. The following port security improvement are recommended for consideration to augment if not ensure that the continuous operation of the ports are protected but also its personnel are protected as well. 2. Port processes Pre-docking inspection, docking, disembarkation, inspection, stacking and container release are the major processes in any port (Christopher, 2009). Please note that the inspection conducted are not detailed because of the sheer volume of containers coming in and within the containers themselves it will take time to sort through the roughly thirty thousand kilograms worth of items within each container van. The use of x-ray, K-9 and radiation detection system are some of the strategy that is employed in the inspection. It is imperative that these inspections be done in an orderly manner so as not to impede unnecessarily the release and processing of the container vans. Due to the number of container vans arriving on a daily basis, the container yards in any port of the United States may not be able to accommodate the volume of container vans being processed to add another process which is inspection. Inspecting the contents of the container vans maybe an exercise in futility if the container van contains weapons of mass destruction wherein the inspection itself may cause the trigger. The staggering cost to life and the crippling effect of the weapon of mass destruction may result to the closure of the port for some time. The domino effect to the other ports is in the form of paranoia may lead to the closure of the entire port system in the United States. The memory of 9/11 provided us with the lesson of not to allow cracks in the system be taken advantaged off by terror organizations. It is therefore, recommended that a full inspection of each container be implemented in each and every port to ensure that cracks or vulnerabilities of spot checking will not be taken advantaged off by terrorists. 3. Incoming Vessel inspection It is recommended to make it mandatory for vessel bound for the United States to be equipped with electronic identifiers that will be monitored at all times. A database of all ships that trade within the US worldwide shall be available to the United States. The information contained in the database includes the historical and current point of origin, destination, route that will be taken including its schedule and all port of calls and its cargo. This will enable authorities for a computer application to be written that will calculate if the ship is able to keep its schedule. This information is vital to lessen the possibility of a clandestine loading at sea of items that is inimical to the interest of the United States. The same set of information will predict the time and location of the ship as soon as it enters the US area of responsibility. Any deviation will have to be explained by the captain otherwise they may be refused entry into any port within the United States by the coast guards. This will also make it easier for authorities to deploy rescue ships. At sea inspection by the coast guard equipped with biological, radioactive, and explosive detection system shall be implemented in order of priority (Ericson, 2005). Ships that do not have any identifiers or defective identifiers and those that deviated from its filed course shall be inspected first. Ships that were not able to keep its schedule shall be priority two. Ships that originated from countries where port security and inspection is non-existent or do not conform to the standard of the United States will be priority three. Those found to be positive for biological, radioactive and explosive trace element shall be detained and quarantined at sea until a full investigation reveals that no threat exist from the vessel has been found. After it has been determined that there are no threats related to weapons of mass destruction has been found in the ships the ship will be allowed to continue to its destination or port. However, inspection for smuggled drugs, human and other items that is considered illegal shall continue until it has arrived at the port. Constant communication between the coast guard boarding party and its base shall be implemented to ensure the safety of the boarding party. The There are about two hundred kilometres of sea between the nearest port and the location of the first inspection. A complete inspection of all the container vans can be implemented on the ship. After completion of the inspection the database will then be updated by the coastguard with its findings. Further action can then be implemented as soon as the ship reaches its destination or port. In cases where illegal items have been found or are suspected to exist in the ship no action shall be taken by the coast guard to ensure their safety. A more detailed inspection shall be conducted on shore to search for the illegal items. Once illegal items are found on the ship the regular laws will apply. Spot checking or secondary checks shall be conducted on shore to ensure that off shore checking is done religiously. The primary criteria for on-shore checking, is when the off-shore checking was conducted hastily or under the standard inspection time. Another criterion for on-shore checking is when the captain at any point in time refused the inspection or has delayed the inspection for one reason or another. Other criteria can be set or added to ensure that proper inspection has been conducted to every container van that is bound for the United States. This recommendation may only be possible if a law will be enacted to implement the ship identifiers and the on board inspection system. Included in the law is the imposition of a limit in the number of container vans that will enable inspectors to have access to each container vans. The law should also mandate each ship plying the shipping lanes within the United States to reveal and file their course to the database repository. The law will also make it legal in the interest of national security to inspect and allow the use of special detection devices (United States Congress Senate, 2010). And in the event that a positive finding shall be revealed by the detection devices the law should authorize the coast guard to commandeer the ship to implement quarantine procedures. The law should also declare that the use of detection devices is not an invasion of privacy but rather the protection of the national security. Refusal to be boarded or refusal to submit to inspections is enough for the coast guard to disallow the ship within the United States are of responsibility. Refusal to install identifiers and or to turn it on shall also be grounds to disallow the ship to ply the United States’ shipping lanes. Refusal to file the necessary course and ship schedule to the database shall also be grounds for the coast guard to disallow the entry of the ship into United States waters. 4. Physical site security: Turning the focus of the recommendation to the physical site security of the ports the following recommendation is hereby proposed. It is recommended that the port be isolated to any commercial and residential area that may come to harms-way in case of terror attack. Existing commercial and residential area are recommended to be relocated to ensure that they are outside of any bomb’s effective radius. It is also recommended that the perimeter of the port be enclosed and any trespasser found between the outer perimeter and the inner perimeter is apprehended. This is to ensure that threats from within the United States are also contained and their chance for any attack to vital installations such as ports for sea and air is not only limited but also frustrated. The area between the inner perimeter and the outside perimeter is recommended to be monitored with the use of sophisticated radar, heat sensors, motion sensors and other similar devices that would effectively ensure that no unauthorized person can enter the port area. It is also recommended that GPS tracking devices be installed in each container van to ensure that they are not hijacked on its way to its destination. All incoming container van to every port that will be for shipment outside of the United States shall also be inspected between the outer and inner perimeter fence. This is to ensure that the threats coming from within the United States shall be neutralized as well. The inspection will also satisfy the fiduciary responsibility of the United States to ensure that threats or any illegal items will not originate from its shore. 5. Personnel Security: It is recommended that the movement of personnel are electronically monitored through their ID tags and camera. The same will be true for visitors, personnel of incoming ships and delivery trucks or vans. Visible number of security personnel at strategic security points deployed around the clock. There should also be proper rotation of personnel to prevent over familiarization to traffic and to the location. 6. Administration and Maintenance of Detection system: Detection systems in order to be effective should be able to record and store its findings for post inspection analysis. Proper maintenance of the system and its logs should also be maintained to ensure that historical records of its performance are stored for future analysis. Operators and the parameters of its configuration while in operation should also be recorded to determine the efficacy of the detection system as its use matures over time. 7. Incident reporting and handling: Most threats capitalize on the existence of confusion and chaos in a particular place in overcoming its security system. Thus it is imperative to treat each incident as a separate case to enable the security system to overcome the threat if not defeat it. The creation of several Fast Response Teams per shift that are trained to response to any kind of threat is recommended. The creation of several response teams is to ensure that multiple incidents are handled easily even if they happen at any time. Each shift should have a security officer in charge that is separate from the management and operation of the port. This is to ensure that focus on security is absolute and will not be overtaken by operational imperatives or profit. Each incident no matter how small should always be documented, how it happened, when and where including the result of the investigation should be stored in a database that will make it possible for a detailed analysis can be done. An escalation procedure and a call tree should be documented and known to all officers in charge. The result of the analysis of all threat and security incidences should be documented and available. 8. Conclusion 9/11 was a revelation that no one is safe and that the safety and protection of our loved ones within the United States will rely in the sagacity and vigilance of each American. However, cowering in fear will make terror elements succeed in their aim of sowing panic to paralyze our way of life. It is likewise reckless to consider 9/11 as an isolated incident that will never be repeated again because of its audacity (BIddle & Strategic Studies Institute, 2005). It is also the responsibility of the United States to ensure that terror threats or any illegal items will not originate from any of its port. Taken in another context it is also the responsibility of each country to ensure that terror threats or illegal items do not originate from their ports as well. Thus it is imperative that an international treaty addressing this very concern should be drafted amongst all nations that are considered allies in the fight against terror. Each country should likewise enact laws that will severely punish those people found to have been engaged in such criminal activity when proven guilty (Sterba, 2003). The fight against terror is not the responsibility of the United States alone it is the responsibility of every nation around the world. The fight against terror is also not for the benefit of the United States or developed nations, but it also for the benefit of every nation around the world. Each country is connected economically, culturally or even symbiotic with another country if not several countries (Millar & Rosand, 2012). In this day and age the fight against terror can be achieved with renewed vigour if all those involved do their share. The use of technology will enable the collaboration to be more seamless most especially with the recommendation calling for the filing of a ship’s routes and ports that it will visit. The United States ports are considered as a vital infrastructure that supports not only the US economy but also other countries that rely on US products. Its security should not only be given serious consideration but also given serious thought. A risk assessment that will expose the vulnerabilities and the associated threats in every port should be undertaken. The risk assessment shall also prioritize the investment needed to ensure that immediate threats are prioritized for remediation first. The United States’ coastline is unique with several states or jurisdiction detached from the mainland. However, this will not diminish the fact that these detached jurisdictions should also be protected from terror threats or attack. Given the distance of Hawaii by way of example to the mainland any shipment from these ports should be treated as shipment coming from other countries. Bibliography: BIddle, S. D., & Strategic Studies Institute. (2005). American Grand Strategy after 9/11: An Assessment. New York: Create Space. Christopher, K. (2009). Port Security Management. Misouri: Auerback Publication. Davis, A. M. (2008). Terrorism and the Maritime Transportation System. Washington: WingSpan Press. Ericson, C. A. (2005). Hazard Analysis Techniques for System Safety. New York: Wiley-Interscience. Grillot, S. R., Cruise, R. J., & D'Erman, V. J. (2010). Protecting Our Ports (Homelan Security). Oklahoma: Ashgate. Millar, A., & Rosand, E. (2012, January 24). Building Global Alliances in the Fight Against Terrorism. Retrieved from Center on Global Counterterrorism Cooperation: http://www.globalct.org/images/content/pdf/reports/better_world2.pdf Sterba, J. P. (2003). Terrorism and International Justice. Oxford: Oxford University Press USA. Sweet, K. M. (2005). Transportation and Cargo Security: Threats and Solutions. New York: Prentice Hall. United States Congress Senate. (2010). Strengthening Border Security Between the Ports of Entry: The use of technology to protect the borders. Washington DC: United States Congress. United States Statistics Office. (2012). CIA. Retrieved Januart 24, 2012, from http://www.cia.gov/cia/publications/factbook/geos/us.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Port Security Improvements Research Paper Example | Topics and Well Written Essays - 2750 words, n.d.)
Port Security Improvements Research Paper Example | Topics and Well Written Essays - 2750 words. Retrieved from https://studentshare.org/history/1764873-port-security-improvements-after-911
(Port Security Improvements Research Paper Example | Topics and Well Written Essays - 2750 Words)
Port Security Improvements Research Paper Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/history/1764873-port-security-improvements-after-911.
“Port Security Improvements Research Paper Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/history/1764873-port-security-improvements-after-911.
  • Cited: 1 times

CHECK THESE SAMPLES OF Port Security Improvements

Invention by Design: How Engineers Get From Thought to Thing

Also, the initial designs of both devices were far from perfect and thus they had to undergo continuous improvements over time.... As previously noted, the key was largely a status symbol and security device.... To ensure security, a person could only obtain a key for a lock that they had....
4 Pages (1000 words) Essay

Written submission

The estate consists of some 900 inter war properties.... They range from single bedroom flats to four bed roomed houses which are not many.... Due to its poor reputation, there are low levels of customer… The estate also presents several challenges in regards to day to day management.... This report seeks to identify ways through which the Lowfeaf Estate can attract more customers. Most of the tenants (55%) are young families....
4 Pages (1000 words) Essay

Develop an analysis on US modes of transportaation and security

The high ridership, the open access features, the high costs of security improvements, vastness of the urban area, the existence of multiple access points and the problem of coordination with the various stakeholders make this type of transportation mode difficult to secure (Guerrero, 2002).... Despite these challenges, the agencies involved in mass transport have come up with safety and security measures namely: “1) vulnerability assessments; 2) fast-track security improvements; 3) immediate, inexpensive security improvements; 4) intensified security presence; 5) increased emergency drills; 6) revised emergency plans; and 7) additional training on anti-terrorism” (Guerrero, 2002)....
2 Pages (500 words) Essay

Company's Need for Correct Information Support

The benefits of IS to an organization are seen through customer satisfaction, and improvements in clinical as well as other units of the healthcare organization (John and Kenneth 383).... All planning activities must be integrated with specific improvements in customer performance through improvements in patient care.... Information… Information maintenance lays emphasis on issues such as data security, user training, performance improvement, HIPAA rules among others (John and Kenneth Assignment 4 It is necessary for an organization to have adequate information support for all its activities so as to maintenance high standards in service delivery....
1 Pages (250 words) Essay

Green Computing Research Project Part 2

As stated early, the customers will be scanning their checks and documents then send them to the company by filling in their personal information that will be protected by the company's security.... This will also be accompanied by the security the company is to provide to the customers.... This includes installation of maintenance software and the security protection system in the company's system....
3 Pages (750 words) Case Study

A part of an outline for security on campus paper

However, students and university staff rarely have the time to educate themselves about security.... This combination means that a whole new approach must installed to guarantee that students learn how… It is important to question students about their most serious security concerns.... Enquiring from them means that the security improvement measures will be appreciated and taken seriously by the students. The researcher knows that problems regarding Outline for security on Campus Objectives and Accomplishments Sustaining a safe environment on campus cannot learn when they feel they are unsafe....
1 Pages (250 words) Essay

Agile Port System

Exchange of valuable information helps in security checks and value added logistics, and this is only achievable through partnerships for the common good of making profits.... The essay "Agile port System" describes economic expansion and globalization limit the limits of sport, and this is a challenge for the future of intermodal transport.... Old ports, such as Baltimore and Philadelphia, must adopt flexible port systems in their search for expansion....
2 Pages (500 words) Essay

Intelligence Reform and Terrorism Prevention Act

These include the establishment of a Director of National Intelligence, creation of a National Counterterrorism Center, National Counter Proliferation Center, and a National Intelligence Centers, creation of Joint Intelligence Community Councils, improvement in education for the intel community, improvements in intel activities, protecting the privacy and civil liberties, amendments to prior standards, dealing with a litany of personal issues, and an entire section entitled “other matters” – which sought to provide a compendium of unrelated issues that must be discussed within the framework of IRTPA....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us