StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Securing America in the Digital Age - Research Paper Example

Cite this document
Summary
The paper "Securing America in the Digital Age" highlights that the costs relating to drug trafficking are likely to be very huge, considering that the government is already losing $160 billion in annual revenue for illicit drugs that enter the country through smuggling…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Securing America in the Digital Age
Read Text Preview

Extract of sample "Securing America in the Digital Age"

Securing America in the Digital Age American Military # As terrorists have become greater concerns to the government and American citizens, it is important to know that they are exhausting all possible means and channels to accomplish their acts of terror. Carrying out illegal activities at sea has become a major option for them after the United States and the rest of the world have increased their aviation security. This greater presence at sea has made maritime activities more vulnerable to threats and risks. By consulting print, online, and government sources published between 2003 and 2010, this paper has found that piracy, oil smuggling, and drug trafficking, perpetuated or supported by terrorists, are the major threats to maritime security today. However, a huge threat is also imposed by poor relationships among countries since it hinders the deterrence and capture of terrorist elements. This paper found that increased international cooperation is essential to minimizing threats to maritime activities. Introduction Maritime activities are essential to trade and socioeconomic development. It is on the sea that many countries rely on the production and transportation of goods. However, countries and private industries face a worsening threat in maritime activities because of the growing and re-emerging threats at sea. These threats include terrorism, piracy, drug trafficking, oil smuggling, and transportation of criminal elements and materials (Gilbride & Nash, 2004). As Gilbride and Nash note, “oceans are the largest ungoverned space on the planet,” which makes the sea a greater security challenge for the global community. In 2004, then President George W. Bush emphasized that the American government is intent on disrupting every enemy threats (as cited in “National Strategy,” 2005), including those at sea. The first step towards a safer maritime environment is the identification of threats posed by criminal entities. Most of these are related either directly or indirectly to terrorism and pose serious economic threats to every nation around the world. Deng (1997) enumerates five types of activities that fall under maritime activities: “(1) state politics, including military operations, expansion, administration, diplomacy, exile, rebellions, and popular movements against the state; (2) cultural exchange; (3) expeditions; (4) immigration; and (5) trade.” Although the five activities Deng enumerated above are all essential to national development and security, the first and the last ones create the greatest impact for any country. Hence, this paper will focus on their discussion. Furthermore, terrorism will be the most discussed topic in this paper since the studies consulted show that all the threats mentioned by Gilbride and Nash are posed by terrorist organizations, either directly or indirectly. Piracy and Terrorism Renuart and Egli (2008) cite several reasons why the United States must respond promptly and appropriately to the threats posed in the maritime environment. First, 75% of all international trade passes maritime route. Second, 95 percent of all the United States’ imports and exports enter/exit through ports. This is only natural since the United States has a shoreline of 95,000 miles where 361 commercial ports are distributed. Third, 2.4 billion tons of cargoes enter the country each year through some 8,000 foreign vessels that conduct 50,000 visits annually. On a daily basis, American ports serve 1,200 to 1,500 vessels. Such volume of trade and cargo that enter the United States make trade routes to the country more vulnerable to terrorism and piracy. On the part of terrorism, the sea is an excellent way of getting into the country because after 9/11, aviation security has become the focus, leaving many rooms for terrorists enter the country through or target sea vessels (Galletti, 2006). For pirates, the sheer volume of the vessels entering and leaving United States provides them with ample targets for their crimes. The Threats of Piracy to Maritime Activities Although piracy crimes rarely happen on waters near America, and, in fact, piracy attacks from 1994 to 2005 only occurred in the Asia-Africa water stretch, it still remains a serious threat to global progress considering the amount of losses they incur both on merchants and governments. Although those incidents happened regionally, their impacts are globally felt as will be examined later. Piracy has become an especially urgent issue because of the emergence of new piracy hotspots and its rapid growth between 2003 and 2005. To add to its worsening threat, international piracy between 2003 and 2005 resulted in greater loss of goods, vessels, and lives than the previous years (Galletti, 2006). Loss of goods, vessels, and personnel that are supposed to arrive in the United States makes piracy an issue the country should be involved with. In terms of losses in life or injury to crews, piracy has become a greater threat because of a changing pattern in pirate activities, such as the ones in Asia. Previously, pirates operating in Asia focused on robbing ships of valuables and only used intimidation to get achieve their objectives. This method of piracy, where only minimal violence is employed, was eventually called “Asian Piracy.” However, new trends in early 2000s show that piracy in Asia has become dramatically violent, with methodologies “akin to the South American or West African type of piracy” (Ghosh, 2004). New methodologies have also contributed to the worsening threat of piracy. While pirates in the past only attacked ships and rob them of valuables, today’s pirates may seize ships for ransom or seize barge trains that contain fast-selling goods such as sugar (Berg et al., 2006). An infamous example of the former is the capture of MV Semlow off the country of Somalia in 2005. The United Nations-chartered vessel was on its way to Somalia to deliver 937 tons of rice when a group of Somalian pirates on board a speed boat open fired and seized the ship (Associated Press, 2005). Seizing a ship is an even more daring piracy since it shows that attackers are will to fight while holding off a ship. Piracy is a serious threat because, from nearly becoming an obsolete crime in 2001, pirate attacks shot up to 445 in 2003 before international cooperation managed to trim down the number to 276 in 2005 (Galletti, 2006). It is notable that piracy does not occur randomly in the seas of the world. Most incidents involving piracy and armed robbery of ships happen where there are heavy commercial activities (such as in the Strait of Malacca), in regions where there are political instability (as in the case of Somalia), and in areas where maritime laws are not strongly implemented or there are none implemented at all (“National Strategy,” 2005). Recently, the United States Government initiated its anti-piracy campaign in Northeast Africa, near the piracy-infested Somalia seas, in order to prevent criminals from “interfering with maritime commerce, endangering mariners, hindering the provision of humanitarian aid to East Africa, and further destabilizing this troubled region” (U.S. Department of State, 2009). Yet the United States and its allies are most likely to find the task difficult. Piracy has become a greater threat at present times because pirates and armed vessel robbers are now equipped with more advanced communication systems (“National Strategy,” 2005) allowing them maximum coordination during their attacks. Additionally, they are equipped with faster sea crafts and more advanced weapons, making attack and escape faster and more efficient. However, the real problem in the threat of piracy lies not in the capability of enemies. Political instabilities and diplomatic relations are the main reasons why the threat of piracy is difficult to quell. Poor coordination in the international political community, makes current international maritime laws insufficient in deterring and apprehending pirates (Galletti, 2006). For instance, it was only in 2003 when a country, Singapore namely, allowed U.S. personnel to check U.S.-bound ships for bombs (Shanghai Star, 2003). This delay in international agreements regarding maritime security delays response to maritime threats and increases the likelihood of more pirate attacks. The Threats of Terrorism to Maritime Activities The reason for the increasing threat of piracy and the greater boldness of pirates can be attributed to terrorism. Modern piracy is no longer carried out by rogues who only want to make money or who want to pursue the adventures as they were so often portrayed in tales. Today, even piracy carries political and religious significance as they are already being perpetuated or supported by terrorist organizations (Koknar, 2004, p. 75). As Koknar explains, the emergence of this new form of piracy also led to the coinage of a new term for these crimes committed at sea with political motives: maritime terrorism. Maritime terrorists are way more dangerous pirates since they target more valuable vessels, often succeeding with loots ranging from $8 million to $200 million. Maritime terrorists who are backed by organizations such as the Al-Qaeda are able to loot greater sums of money because of their increased armed capabilities, better organization, and support from corrupt government officials (Koknar, 2004, p. 75). Greater risks for the U.S. and general maritime industry are posed by the awareness of terrorist groups that large, high-value vessels are soft targets. They are huge, slow moving and difficult to protect (Galletti, 2006), making them easy (“soft”) targets, allowing terrorist-pirates to take control of those vessels quickly with their swift boats and superior firepower. This is shown in the case of MV Semlow when in June 2005 the carrier vessel was successfully hijacked in just 15 minutes by pirates who approached the vessel through a speedboat (Associated Press, 2005). Big vessels like MV Semlow often carry huge cargoes such as food and oil that are important for their destinations. Disruptions in their operation or theft of their goods could have huge impacts on the localities expecting their arrival. Maritime terrorists, with loots reaching millions of dollars, provide huge amount of funds for terrorist trainings and attacks. However, the piracy-terrorism threat is not strictly a military concern. Wide-scale piracy also poses billion-dollar losses and additional costs to a number of commercial and economic industries at the local and international levels. An example on how piracy would affect international economy is provided by Koknar (2004) in the case of the Strait of Malacca. The Strait of Malacca, a chokepoint that extends 900 km from Malaysia to Singapore, serves as much as 50,000 vessels each year, carries 30 percent of the world’s trade goods, and brings in 80 percent of Japan’s oil needs. It is, more importantly, considered as the link between Asia and the rest of the world. A blockage on the strait would affect the operation of nearly half of the world’s vessels and would require them to find farther routes. As consequences, blockages caused by terrorist groups would increase the need for vessel capacity, raise the price of transporting goods worldwide, and hurt the economies of South Korea, Japan, and China, which are reliant on Gulf oil. Even without any blockage at chokepoints, Koknar (2004) argues that terrorism can still hurt the economy by raising costs for freights and cargoes. He explains that because of terrorism and terrorist-backed piracy, insurers are forced to increase the premiums of the vessels they insure. At present, it is costing the global economy $16 billion each year, with actual losses expected to be way higher if the costs of uninsured and unreported vessels are taken into account. A relatively recent example on how terrorism increased the insurance rates for vessels is the suicide bombing of oil tanker Limburg, off the coast of Yemen, in 2002. Since then, the insurance costs for vessels heading for Yemen has tripled and insurers began charging risk surcharges of $250 for every 20-foot containers and $500 for 40-foot containers. Moreover, vessels from Taiwan, Korea, Singapore, and Thailand were, since then, forced to avoid Yemeni waters, increasing the costs for transporting goods to Western countries. The scenario on the Strait of Malacca show how piracy, especially those backed by terrorist groups, can severely hinder maritime activity. Aside from the costs and additional government actions these threats create, they also slow down international logistics because of the new security measures ports will have to impose. Lengthier checks could well hinder the entry and exit of goods, especially in the United States which is a prime target for terrorists. Aside from the dangers that piracy-linked terrorism poses, Groslin (2007, p. 2) contended that pure terrorism is also a major concern. Terrorists may hijack ships with the intention of inflicting huge damages at ports or coastal areas, in manners similar to what Al-Qaida terrorists did during the September 11, 2001 Terrorist Attacks. He noted, as an example, that in 2003, 35 heavily armed hijackers took over a chemical tanker near Sumatra and ordered its captain to teach them how to operate the ship. Groslin explained that terrorists may use these ships to ram sea vessels, commercial or military to express their political and religious sentiments. Oil Smuggling Oil smuggling in itself does not pose any threat to maritime activities, despite its massive effects on the world economy. However, when linked to terrorism, it becomes a serious concern to the United States and the global community. Terrorism hinders maritime activities because, as said earlier, terrorist organizations fund pirates, who in turn, hinder trade and impose additional costs on maritime activities and security. An incident of terrorist-related oil smuggling was revealed recently in India. D’Mello (2010) reported that Indian officials recently discovered an oil-smuggling syndicate operating in the country that was run by allies of the notorious terrorist Dawhood Ibrahim. These terrorists smuggle oil from Iraq by shipping them through the United Arab Emirates before unloading them at Karachi, India. The implications of such terrorist-perpetuated smugglings on maritime activities are twofold. First, it necessitates the fortification and reinforcement of coast guards and other maritime law enforcers to prevent the smuggling of oil and their sale by terrorist organizations. This creates additional costs for concerned nations such as India. Second, the funds that terrorists derive from oil smuggling would strengthen their forces inland and offshore. This results into another cycle of threats to maritime and port security and could also encourage other terrorist organizations to carry out their crimes at sea. Smuggling-related threats are a special problem for the international community because of the complications involved in capturing criminals, especially issues regarding jurisdiction. In 2006, a group of men stealing oil from Iraqi port were able to evade arrests by utilizing national borders. These smugglers, after being detected by the Iraqi coast guard, fled on their speedboat into Iranian waters. The Iraqi coast guard was not able to catch them after being intercepted by the coast guard from neighboring Iran (Blanche, 2006). The incident shows how oil smuggling and lack of international cooperation threatens maritime activities. It not only prevents the capture of terrorists but it also how refusal of other countries to cooperate prevents the reduction of maritime threats. Narco-Terrorism Ghosh (2004) characterizes drug trafficking as an “important adjunct to maritime terrorism.” Ghosh’s description implies that drug trafficking has become an important source of income for terrorist organizations, as in the case of oil smuggling. Schmid (2005) noted that the convergence between drug and terrorist activities has led to the creation of a new term called “narco-terrorism.” Narco-terrorism is a threat to maritime activity since the trafficking of drugs by huge terrorist organizations necessitates the use of the sea to transport illegal substances. For instance, the Liberation Tigers of Tamil Ealam (LTTE) are using their own fleets in transporting drugs along with other commercial products to Asian countries. This increases the presence of terrorist elements at sea, making trade routes more dangerous for commercial and cruise vessels. As a consequence of increased threats, ships will have to pay higher insurance premiums to maritime insurers, just like in the case of Yemen mentioned above. Just how much the United States government is spending to stop drug trafficking in nearby waters can be hinted by the description of the U.S. Southern Command (2010): Normally, U.S. Navy, U.S Coast Guard and partner nation (British, French, Dutch, Canadian and Colombian) ships patrol the waters in the Caribbean Sea, Gulf of Mexico, and the eastern Pacific on a year-round basis. Embarked on U.S., and at times partner nation naval vessels, is a Coast Guard Law Enforcement Detachment that takes the lead during operations to board suspected vessels, seize illegal drugs, and arrest suspects. Also, a Navy helicopter squadron detachment is on board to assist in detection and monitoring. The efforts of U.S. military to stop drug trafficking at sea is likely to cost millions of dollars annually. Guarding maritime areas of concern not only requires sea presence but aerial support as well. The costs relating to drug trafficking are likely to be very huge, considering that the government is already losing $160 billion in annual revenue for illicit drugs that enter the country through smuggling (U.S. Southern Command, 2010). Despite government effort, there are still huge risks that drugs and terrorist entities can enter the country because containers entering and exiting ports are rarely inspected (IAGS, 2005). Conclusion All the threats to maritime activities mentioned above revolve around terrorism. Those threats are either initiated or supported by terrorist groups, who have become more active since 2001. Piracy, drug trafficking, and oil smuggling are threats to maritime activities since they signify presence of terrorists operating at sea. These activities are not only threats because they bring terrorist presence in maritime routes but also because they provide ample source of income for terrorism. As a result of greater revenue, terrorist organizations are able to carry out bigger and more dangerous operations. There are growing concerns over the security of ports because of growing maritime terrorist activities. Those activities not only make ports points of entries for terror elements but also make them likely targets for attacks. Problems are worsened by relatively weak security at ports, although awareness by the federal government has prompted law enforcers to monitor not only ports but oversea trade routes as well. References Associated Press (2005). How Pirates Hi-Jacked Us. Retrieved June 18, 2010, from News24, Africa section: http://www.news24.com/Africa/News/How-pirates-hijacked-us-20051006 Berg, D. et al. (2006). Piracy—Threat at Sea: A Risk Analysis. Retrieved June 18, 2010, from: Munich Re Insurance: http://www.munichre.com/publications/302-05053_en.pdf Blanche, E. (2006). “Bleeding Iraq Dry: Lured by Immense Profits, Insurgents, Corrupt Officials and Smugglers Are Stealing Iraqs Oil and Driving the Country to Ruin.” The Middle East, 366, 18. Deng, G. (1997). Chinese Maritime Activities and Socio-economic Development, c. 2100 B.C.-1900 A.D. Westport, CT: Greenwood. D’Mello, M. (2010). Crude Oil Smuggling is a Threat to National Security: IB Report. Retrieved June 18, 2010, from The Times India: http://www.mail-archive.com/bharatudaymission@yahoogroups.com/msg01773.html Galletti, S.C. (2006). Old and New Threats: Piracy and Maritime Terrorism.” Retrieved June 18, 2010, from Asia Studies Virtual Library/South China Sea: http://www.southchinasea.org/ docs/Galletti-Piracy,%20Old%20and%20New%20Threats.pdf Ghosh, P.K. (2004). Maritime Challenges in South Asia and the Indian Ocean: Response Strategies. Retrieved June 18, 2010, from Middlebury College: http://community.middlebury.edu/~scs/docs/ghosh,%20maritime%20security%20challenges%20in%20SAsia%20&%20Indian%20Ocean.pdf Gilbride, A., & Nash, R. (2004). Maritime Environment of Growing Importance. In National Maritime Intelligence Center. Retrieved June 18, 2010, from National Maritime Domain Awareness Coordination Office: http://www.gmsa.gov/gmiss/presentations/Gilbride_Nash_NMIC.pdf Groslin, C. (2007). Maritime and Port Security White Paper. Retrieved June 18, 2010, from http://www.sibgonline.com/public/userlisting/wpaper_upload/16637_13_wp.pdf IAGS/ Institute for the Analysis of Global Security. (2005). Maritime Terrorism: A New Challenge for NATO. Retrieved June 18, 2010, from Institute for the Analysis of Global Security: http://www.iags.org/n0124051.htm Koknar, A. (2004). “Terror on the High Seas: Piracy and Terrorism Are Joining Forces and Creating Troubled Waters for the Maritime Industry.” Security Management, 18 (6), 75. National Strategy for Maritime Security. (2005). Retrieved June 18, 2010, from Department of Homeland Security: http://www.dhs.gov/xlibrary/assets/HSPD13_MaritimeSecurityStrategy.pdf Renuart, V., & Egli, D. (2008). “Closing the Capability Gap: Developing New Solutions to Counter Martime Threats.” Naval War College Review, 61 (2), 14. Schmid, A. (2005). Links between Terrorism and Drug Trafficking: A Case of ‘Narco-Terrorism’? Retrieved June 18, 2010, from Club de Madrid: http://english.safe-democracy.org/causes/links-between-terrorism-and-drug-trafficking-a-case-of-narcoterrorism.html Shanghai Star. (2003). Maritime Threats. Retrieved June 18, 2010, from Shanghai Star: http://app1.chinadaily.com.cn/star/2003/0116/fe22-1.html U.S. Department of State. (2009). United States Actions to Counter Piracy of the Horn of Africa. Retrieved June 18, 2010, from United States Department of State: http://www.state.gov/t/pm/rls/fs/128540.htm United States Southern Command. (2010). Counter Drug / Counter Narco-Terrorism. Retrieved June 18, 2010, from United States Southern Command: http://www.southcom.mil/appssc/pages/counternarco.php Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Current Threats to Maritime Activity Research Paper”, n.d.)
Retrieved de https://studentshare.org/miscellaneous/1567919-current-threats-to-maritime-activity
(Current Threats to Maritime Activity Research Paper)
https://studentshare.org/miscellaneous/1567919-current-threats-to-maritime-activity.
“Current Threats to Maritime Activity Research Paper”, n.d. https://studentshare.org/miscellaneous/1567919-current-threats-to-maritime-activity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Securing America in the Digital Age

Security of Digital Signatures

The paper "Security of digital Signatures" deals with digital signatures, as they are considered to be addressing integrity, confidentiality, and non-repudiation of data exchanged digitally, the history of cryptography as the first concept that derived digital signatures and encryption algorithms.... we will discuss the nature, privacy, and implementation of digital signatures.... Furthermore, we will discuss new tools, techniques, methods and standards that are used along with the drawbacks associated with digital signatures....
14 Pages (3500 words) Literature review

The Concept of Copyright in Digital Media

ISPs have a large role to play in ensuring that copyright law is applied in the digital sphere (Albanesius).... DMCA was designed to give corporate content producers, 'global protection from piracy in a digital age' (Wright 83).... The paper "The Concept of Copyright in digital Media" states that before the advent of computers, mobile communications, the Internet, and digital media copying tools.... The 1998 digital Millennium Copyright Act (DMCA) embodies the legislative shift from treating various products as public resources to seeing them as corporate assets (Wright 83)....
11 Pages (2750 words) Essay

Photographers of the Mixed Media

Photographers of the Mixed Media: Loretta Lux, Paul Shambroom, Sandy Skoglund, and Calum Colvin Loretta Lux Discussing the works of Loretta Lux, we must at first pay attention on her personal backgrounds; then, shifting to her working methodologies, we will be able to discuss her chosen formats, analogue, digital or both, in order to define this influences in terms of narrative and perception.... Furthermore, her working methodologies, as they appeared in her works such as “The waiting girl,” 2006, “The rose garden,” 2001, “Study of a boy 1,” 2001, “At the window,” 2004, “Self-portrait,” 2000, and “The bride,” “Study of a boy 3,” “The wanderer,” “Study of a girl 2,” may be presented as a combination of painting, photo, and digital manipulation....
5 Pages (1250 words) Essay

An Assessment on the Contribution by Education and Schooling to the Production of a Good Childhood

Before the age of 5, these children were said to possess primitive animal instincts and therefore had to be guided, not repressed.... He discusses that medieval times showed that families shifted from the extended to the nuclear set-ups; moreover, age-graded schools were also founded (Sawyer, 2010, p.... In the setting of Colonial america, children were seen as innocents who were likely to commit evil acts, if not enlightened (Gross, 2010)....
12 Pages (3000 words) Essay

Balance in the Administration of Justice Security

In the piece, Communications Privacy in the digital age (1997), a number of legal issues confronted by people, in general, are laid out.... Most of the time also, the parties concerned contest the method of obtaining data quite too late and they barely survive to win in the proceedings ("Communications Privacy in the digital age", 1997).... In 1996 alone, there were about 839 orders given out, and the statistics increase by twenty percent every year since then ("Communications Privacy in the digital age", 1997)....
8 Pages (2000 words) Coursework

U.S. Border Security

We pride ourselves on our profound and almost unique commitment to liberty, and the legal institutions and civic culture that have made America probably the freest society in history" (Herman Schwartz, Security and liberty in an age of terrorism).... Although not the first such assault in this country-an effort had been made to destroy the World Trade Center just eight and a half years earlier-the deaths of 3,000 people going about their daily lives, and the destruction of one of the most important symbols of American economic power....
10 Pages (2500 words) Essay

The Music Industry and Digital Technology

All industry sectors in the digital age are enjoying the grace of computerization over traditional paperwork.... Yet, there is a downside to the digital age with regards to the music industry.... This paper ''The Music Industry and Digital Technology'' tells that In the boundless ocean of the digital culture, everything should appear as a blessing.... Because of piracy or MP3's, whichever name we give to the mixed blessing of the digital economy as it concerns the music industry....
12 Pages (3000 words) Essay

Importance of Defending Online Privacy in Digital Age

The essay "Importance of Defending Online Privacy in digital age" focuses on the critical analysis of whether illegal data mining is a threat to the Internet and American technology companies.... In the modern digital age, people are being encouraged to share their personal information online....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us