Module 4 Case Paper: Maritime Security
Introduction
Maritime cyber attacks have already occurred in recent history, indicating the threat that cyber warfare poses for maritime security. The reality of this situation is so pressing that new International Maritime Organization (IMO) Cyber Security regulations are set to come into effect in 2021 (Klopper, 2019). This paper will discuss the growing maritime threats that have been brought about by advances in technology as well as the potential countermeasures to protect ports and ships from involuntarily participating in a WMD terrorist attack.
Growing Maritime Threats Brought about by Advances in Technology
Growing maritime threats that have come about as a result of technological advances include the ability of hackers to penetrate computer systems from thousands of miles away and that ability of spoofers to spoof GPS signals and thus reroute ships and potentially crash them. Two incidents in recent memory have already occurred showing that both of…...
mlaReferences
Charoen, D., Raman, M., & Olfman, L. (2008). Improving end user behaviour in password utilization: An action research initiative. Systemic Practice and Action Research, 21(1), 55-72.Fouche, G. & Solsvik, T. (2019). Aluminum maker Hydro battles to contain ransomware attack. Retrieved from Klopper, E. (2019). The importance of maritime cybersecurity. Retrieved from https://cyber1.com/press-release/the-importance-of-maritime-cybersecurity/ U.S. Coast Guard. (2019). Cyber Incident Exposes Potential Vulnerabilities Onboard Commercial Vessels. Retrieved from https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/CG-5PC/INV/Alerts/0619.pdfhttps://www.reuters.com/article/us-norsk-hydro-cyber/aluminum-maker-hydro-battles-to-contain-ransomware-attack-idUSKCN1R00NJ
International Ship and Port Security (ISPS) Code on Maritime Security
The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately.
The study feels that the ISPS Code has some impacts upon the Maritime Security in the world. Thus, the study seeks to uncover the various impacts that are realized by the Maritime Security as offered by the ISPS.
Scope
The influence and functionality of the existing ISPS Code run globally. Its effects, as part of its usefulness and importance, are felt by the Maritime Security among other agents of security in the world. Thus, the study will uncover the impacts caused by the ISPS Code on the Maritime Security in various parts of the world. The study will seek further knowledge from different materials; research was done, among…...
International Ship and Port Security (Isps) Code on Maritime Security
Impact of the International Ship and Port Security (ISPS) Code on Maritime Security
The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately.
The study feels that the ISPS Code has some impacts upon the Maritime Security in the world. Thus, the study seeks to uncover the various impacts that are realized by the Maritime Security as offered by the ISPS.
Scope
The influence and functionality of the existing ISPS Code run globally. Its effects, as part of its usefulness and importance, are felt by the Maritime Security among other agents of security in the world. Thus, the study will uncover the impacts caused by the ISPS Code on the Maritime Security in various parts of the world. The…...
Port Security The CBP (Customs and Border Protection) is a unit in the homeland security department and is the agency responsible for regulating, monitoring and facilitating flow of products at the points of entry. CBP policy formulation is done is such a way as to ensure that there is smooth movement of cargo through the border line. CBP enforces the customs and trade rules which are put in place with a view of protecting businesses and customers in the U.S. and collect revenue. CBP also enforces security laws for imports formulated with an objective of preventing illegal drugs, mass destruction weapons and contraband commodities from accessing the U.S.A. The U.S. congress is charged with the duty of defining and authorising the functions of international trade within CBP, allocation of funds for conducting program CBP oversight. The current laws authorising facilitation of trade and enforcing CBP functions are centred on a balance…...
Their casualties go uncounted, their actions largely unmonitored and their crimes unpunished." Scahill relates that four years into the Iraq occupation "there is no effective system of oversight or accountability governing contractors and their operations, not is there any effective law - military or civilian being applied to their activities." (2007) According to Scahill's report: "Since the launch of the "global war on terror," the administration has systematically funneled billions of dollars in public money to corporations like lackwater USA, DynCorp, Triple Canopy, Erinys and ArmorGroup. They have in turn used their lucrative government pay-outs to build up the infrastructure and reach of private armies so powerful that they rival or outgun some nation's militaries." (2007)
III. The EFFECTIVENESS of DHS
The work of Ahlers (2007) entitled: "Auditor's: Homeland Security Gets Mixed Grades" reports that congressional auditors gave "mixed grades to the Department of Homeland Security on its efforts to unify…...
mlaBibliography
Labott, Elise (2004) U.S.: Probe into Iraq Trafficking Claims. CorpWatch 5 May 2004. Online available at http://www.corpwatch.org/article.php?id=14174
Miller, Steven E. (2003) After the 9/11 Disaster: Washington's Struggle to Improve Homeland Security." Axess Stockholm, Sweden 2 (2003 Mar): 8-11. Online available at http://belfercenter.ksg.harvard.edu/publication/254/after_the_911_disaster.html
Phinney, David (2006) AU.S. Fortress Rises in Baghdad: Asian Workers Trafficked to Build World's Largest Embassy. 17 Oct 2006. CorpWatch. Online available at http://www.corpwatch.org/article.php?id=14173
Scahill, Jeremy (2007) the Mercenary Revolution: Flush with Profits from the Iraq War, Military Contractors See a World of Business Opportunities. The Indypendent 15 Aug 2007. Online available at http://www.indypendent.org/2007/08/10/the-mercenary-revolution-flush-with-profits-from-the-iraq-war-military-contractors-see-a-world-of-business-opportunities/
Essay Topic Examples
1. The Role of International Cooperation in Enhancing Marine Security
This essay will explore how international cooperation, including joint patrols, shared intelligence, and multilateral agreements, contributes to the security of global maritime routes. It will analyse historical precedents and current initiatives like the Combined Maritime Forces to determine the effectiveness of such collaborations in deterring piracy, smuggling and other maritime threats.
2. The Impact of Technological Advancements on Marine Security
In this essay, the focus will be on how technological advancements such as satellite surveillance, unmanned vehicles, and automated identification systems have transformed marine security. The essay will evaluate the benefits and potential vulnerabilities introduced by these technologies and their influence on the overall effectiveness of marine security strategies.
3. Climate Change and Its Implications for Marine Security
This essay will discuss the implications of climate change for marine security, including how rising sea levels, thawing Arctic routes, and increased natural disasters affect…...
mlaPrimary Sources
United Nations. \"United Nations Convention on the Law of the Sea (UNCLOS).\" 10 Dec. 1982.
International Maritime Organization. \"International Ship and Port Facility Security (ISPS) Code.\" 2004. http://www.imo.org/en/OurWork/Security/Guide_to_Maritime_Security/Documents/ISPS%20Code%20English.pdf .International Chamber of Shipping. \"Guidance on Maritime Security and Piracy.\" http://www.ics-shipping.org/docs/default-source/resources/safety-security-and-operations/piracy-guidance-edition-3.pdf?sfvrsn=6 .United States Coast Guard. \"National Maritime Security Advisory Committee Meeting Summaries.\" https://homeport.uscg.mil/Lists/Content/Attachments/39/NMSAC-Meeting-Summary-April-2017.pdf.Maritime Safety Committee. \"MSC.4/Circ.188 – Guidelines for Maritime Cyber Risk Management.\" International Maritime Organization, 5 July 2017. http://www.imo.org/en/OurWork/Security/Documents/MSC.4-Circ.188%20-%20Guidelines%20on%20maritime%20cyber%20risk%20management%20-%20%28Secretariat%29.pdf .https://www.un.org/depts/los/convention_agreements/texts/unclos/unclos_e.pdf .
air cargo industry experienced tremendous growth since inception because of various factors in the aviation industry, particularly the freight sector. The growth and development of this industry is evident in its current significance on the freight sector. Moreover, this industry currently accounts for huge profitability in the freight sector because of increased shipping of various packages across the globe. This increased shipping is fueled by increased interconnectedness of people and countries due to rapid technological factors.
However, the industry has experienced tremendous challenges and concerns in relation to security because of the increase of security issues and emergence of new security threats throughout the world. Some of the major security challenges or issues facing the air cargo industry include terrorism, hijacking threat, vulnerability to security breaches, and probable introduction of explosive devices. These security threats are largely brought by the development of sophisticated tools and means for criminal activities by…...
mlaReferences
"Bilateral and Regulatory Issues Facing the Air Cargo Industry." (n.d.). Chapter 6. Retrieved
April 17, 2015, from http://www.aci-na.org/sites/default/files/chapter_6_-_bilateral_and_regulatory_issues.pdf
Elias, B. (2010, December 2). Screening and Securing Air Cargo: Background and Issues for Congress. Retrieved April 17, 2015, from http://www.fas.org/sgp/crs/homesec/R41515.pdf
"Evaluation of Screening of Air Cargo Transported on Passenger Aircraft." (2010, September).
Port Facilities Manager
Ports have historically played an instrumental role in driving the global economy by facilitating the movement of people and cargo from one part of the globe to another. Due to their phenomenal influence on the global economy, ports must be effectively managed. This is particularly true in terms of their facilities, equipment, and infrastructure. The port facilities manager is tasked with the responsibility of supporting the port in carrying out its day-to-day operations. Their work particularly involves managing and maintaining port facilities, equipment, and infrastructure; supervising and managing port personnel; and supporting the security management function in ensuring the safety of cargo, tenants, and port personnel. The port facilities manager is also involved in liaising with and engaging port users, assisting in the preparation of port facilities budgets, ensuring adherence to the relevant regulatory requirements, as well as coordinating special events held at the port. These roles…...
mlaReferences
Alderton, Patrick. Port management and operations. 3rd ed. London: Informa, 2008.
Bichou, Khalid. Port operations, planning and logistics. New York: Informa Law, 2013.
Branch, Alan. Elements of port operation and management. 1st ed. New York: Chapman and Hall, 1986.
Brooks, Mary, and Thanos Pallis. Considering the perspectives of port users. Port Technology, n.d. Accessed 21 September 2016. ort_usershttps://www.porttechnology.org/technical_papers/considering_the_perspectives_of_p
Private Security
The various factors that influence both the definition and the perception of private security are typically environmental but can be internal and external to the issue of security itself. In most developed nations, the state provides security forces that are paid for by tax payers (local, municipal, state and federal police, and military forces); however, private security forces, typically operated by ex-military officers who bring their training and experience into the private sector to fill gaps in the market where demand cannot be satisfied by state security apparatuses alone, do exist and do operate both in developed and developing nations. Private security contractors like Academi, GRS, and Aegis look like military forces and often work with military forces when political factors require governments to apply to them for assistance (as has been the case with the U.S. government in the Middle East (Elsea) as well as with Middle Eastern…...
Human Factor in Cargo Security
Is Human Factor important Cargo Security
Cargo security I one of the major issues handled with priority by Homeland security department in United States of America. It is regarded as a positional facilitator in terrorism activities. Another notable factor in implementing security measures for cargo was theft as a direct business cost for U.S. It is observed that businesses lost $15b to $30 billion as a loss to cargo theft in 2006. The research further states that personnel access, vehicles access, and proliferation of papers are one of the major causes of cargo theft. It is evident that certain factors have a direct influence on maintaining security for cargo. Technology, processes, procedures, systems, and all of the above human involvement are major issues in cargo security. It requires maintaining a high level of integrity for all these factors to reduce risk in cargo transportation.
The security perspective of…...
mlaReferences:
Giermanski, J. (2011, June 01). Facing the realities and probabilities of enhancing supply chain security. The Maritime Executive, Retrieved from http://www.maritime-executive.com/article/facing-the-realities-and-probabilities-of-enhancing-supply-chain-security/
Giermanski, J. (2012). Global Supply Chain Security. USA: Rowman & Littlefield.
Iseby, J. (2008). 9/11 Comm Recommendations. USA: Nova Science Pub Incorporated.
Ivanov, D., & Sokolov, B.V. (2010). Adaptive supply chain management. London: Springer verlag.
Homeland Security and Preparedness, esponse, Activities and Programs in Disaster esponse or Disaster ecovery
The focus of this study is the homeland security issue as it relates to the preparedness of the U.S.A. government and citizens in response to the emergencies that may emerge.
The research question in this study is one that asks in light of the past disasters experienced by the United States such as the events of September 11, 2001, and Hurricane Katrina among others, are the emergency response agencies and the law enforcement agencies in a better position to handle disasters from preparation to response and ultimately recovery effectively in the event of disasters or terrorist attacks?
Significance
The significance of the research in this study is that the effectiveness of the preparedness of Homeland Security initiatives should be addressed as it is not possible to know where and when disaster will next strike and the consequences of such a…...
mlaReferences
Bowman, M.E. (2007) Law Enforcement Technology Intelligence, and the War on Terror. JFQ. Issue 46, 3rd Quarter 2007. Retrieved from: http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=9dfc7c9b-537f-44b9-a461-ed45b8fa1a76%40sessionmgr12&vid=1&hid=11
Central Intelligence Agency, (2011). About CIA. Retrieved June 30, 2012 from Cowper, TJ and Buerger, ME (nd) Improving Our View of the World: Police and Augmented Reality Technology. Retrieved from: http://www.fbi.gov/stats-services/publications/police-augmented-reality-technology-pdf
Edwards, John B. (2012) Intelligence Led Policing Connecting Urban and Rural Operations. Retrieved from: http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=1afefbff-3d5c-4282-bcda-00e357218031%40sessionmgr11&vid=1&hid=12
Fearfulness of non-state actors remains salient, but what is particularly interesting is the way ussia and China are singled out as nations with whom the United States is not currently engaged in war with but which nevertheless present peculiar threats. The Department of Defense's National Defense Strategy notes that China's blossoming wealth has also enabled the proliferation of its military, which threatens peace in the Straits of Taiwan and potentially beyond. ussia presents its own realm of problems, especially in light of the failure of democracy to take root there.
The supremacy of the United States as a global military power is an underlying message in these strategy papers, which are written as much to motivate and inspire as to guide policy. isk management is addressed within a characteristically confident framework, reflecting the overall ambition of America's military strategies. Commitments to far-reaching objectives in Iraq and Afghanistan are toughed upon,…...
mlaReferences
Department of Defense (2010). Quadrennial defense review report.
Department of Defense (2008). National defense strategy.
"The National Military Strategy of the United States of America." (2011).
"National Security Strategy." (2010).
[footnoteRef:24] in the Archaic Period, Ancient Greece's initial maritime power was critical but also "sporadic."[footnoteRef:25] During the Classical Period, Athens in particular "pursued a policy of naval imperialism"[footnoteRef:26] and this Period saw the development of "siege warfare" in which the Greeks -- particularly the Athenians -- developed the skills to wage war on the open sea.[footnoteRef:27] in the Hellenistic Period, the scope of warfare was enlarged considerably, as whole areas of land were now in dispute. Consequently, there was an "ancient naval arms race"[footnoteRef:28] in which various kings extending beyond Greece fought for control of mainland Greece, islands of the Aegean, western Turkey and southern Syria.[footnoteRef:29] [21: EH.Net and C. Michael Hogan. "Economy of Ancient Greece." www.eoearth.org Web site. May 1, 2010. http://www.eoearth.org/article/Economy_of_Ancient_Greece (accessed January 17, 2013).] [22: Chester G. Starr. The Influence of Sea Power on Ancient History. New York, NY: Oxford University Press, Inc., 1989, 7.] [23: Ibid.,…...
The MdTA Police and the Office of Security (and thus the private security personnel under its supervision) are the extent of the state's commitment in terms of securing the port, aside from the Maryland Area Maritime Security Committee, which works to coordinate the efforts of the MdTA and Office of Security with the relevant federal agencies.
On the federal level, regular port security is handled by the United States Customs and Border Protection (CBP), while threat response and emergencies involves the U.S. Coast Guard. CBP is responsible for maintaining and disseminating examination standards and procedures, and in recent years has placed a special emphasis on cargo container examinations with its program the Container Security Initiative (CSI) (U.S. Customs and Border Protection 2012). The CSI program has three core elements geared towards identifying and stopping threats in cargo containers: "identify high-risk containers […] prescreen and evaluate containers before they are shipped…...
mlaReferences
Department of homeland security. (2012). Retrieved from http://www.dhs.gov/index.shtm
Maryland department of transportation: Port administration. (2012). Retrieved from http://mpa.maryland.gov/content/port-security.php
United States coast guard. (2012). Retrieved from http://www.uscg.mil/
US customs and border protection. (2012). Retrieved from http://www.cbp.gov/
U.S./India Security Ties After 11th September 2001Executive SummaryThis paper examines security ties between the US and India in the years after the 9/11 attacks on America. To provide context for those security ties and their development, it first looks at the relationship between India and the US in the years following 2, when the Cold ar caused some tension between the two states. It shows how rifts were caused by various political maneuverings on the part of the US and India, respectively.Following the establishment of historical context on the matter, the paper turns to an examination of the ways in which US-India security ties have improved since 9/11. It gives several instances that show that these ties have developed and strengthened, particularly during the Bush and Obama Administrations. This section supports the thesis of this paper, which is that since 9/11 security ties between the US and India have improved…...
mlaWorks CitedAhmad, Afroz. \\\\\\\\\\\\\\\"Before and After 9/11: Indo-US Counterterrorism Cooperation.\\\\\\\\\\\\\\\" Journal of International & Global Studies 9.2 (2018): 128-138.Cohen, Stephen and Dhruva Jaishankar. “Indo-U.S. Ties: The Ugly, the Bad and the Good.” Brookings Institute, 2009. Accessed 15 Apr 2021.Council on Foreign Relations. “US-India Relations.” https://www.cfr.org/timeline/us-india-relations . Accessed 15 Apr 2021.Javaid, Umbreen, and Muhammad Imran Rashid. \\\\\\\\\\\\\\\"India-US-Pakistan Strategic Relations.\\\\\\\\\\\\\\\" Journal of Political Studies 24.1 (2017): 131.Morehouse, W., and M. A. Subramaniam, M. A. The Bhopal Tragedy: What Really Happened and What it Means for American Workers and Communities at Risk. Council on International and Public Affairs, 1986.Pellon, G. “Why Should Non-Profit Organisations Know the Basics of Anti-Money Laundering and Counter-Terrorist Financing (AML/CFT)?” https://philanthropyinfocus.org/2020/05/28/why-should-non-profit-organisations-know-the-basics-of-anti-money-laundering-and-counter-terrorist-financing-aml-cft/. Accessed 15 Apr 2021.Pitlo III, Lucio Blanco. \\\\\\\\\\\\\\\"US pivot to Asia: a review of the East Asia forum.\\\\\\\\\\\\\\\" Asian Politics & Policy 5.2 (2013): 312-315.Roy, Nobhojit. \\\\\\\\\\\\\\\"Attack on the Taj Mahal Palace Hotel: a proxy war on America?.\\\\\\\\\\\\\\\" Disaster medicine and public health preparedness 3.1 (2009): 1-1.Thakker, Aman. “US-India Ties Under Modi 2.0: The Good, Bad, and Ugly.” The Diplomat, 2019. https://thediplomat.com/2019/06/us-india-ties-under-modi-2-0-the-good-bad-and-ugly/ . Accessed 15 Apr 2021.Vijayalakshmi, Kunduchi P. \\\\\\\\\\\\\\\"India–US Strategic Partnership: Shifting American Perspectives on Engaging India.\\\\\\\\\\\\\\\" International Studies 54.1-4 (2017): 42-61.https://www.brookings.edu/articles/indo-u-s-ties-the-ugly-the-bad-and-the-good/ .
Thesis Statement:
The United States Navy has played a crucial role in shaping the course of history, safeguarding national interests, and upholding global security. Its contributions encompass a wide spectrum of operations, from defending territorial waters to conducting humanitarian missions, demonstrating its unwavering commitment to protecting the nation and its allies.
Arguments/Points to Discuss:
1. Historical Significance:
- Highlight the Navy's origins during the American Revolutionary War, emphasizing its instrumental role in securing independence.
- Discuss the Navy's involvement in major conflicts, including the War of 1812, the Spanish-American War, World War I, World War II, and the Korean War, showcasing its adaptability....
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now