Maritime Security -  Michael McNicholas

Maritime Security (eBook)

An Introduction
eBook Download: PDF
2011 | 1. Auflage
472 Seiten
Elsevier Science (Verlag)
978-0-08-091953-9 (ISBN)
Systemvoraussetzungen
59,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena--the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary 'choke point' - the load seaports and their ships.
This book provides practical, experience-based, and proven knowledge - and a 'how-to-guide' - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports.
- Holds the keys to successfully designing, implementing, and managing effective port and vessel security programs in a high-risk environment
- Provides real-world experience in Maritime Security from the Managing Director of Phoenix Management Services Group in the USA and Panama.
- Offers specifics of a model port security program and case studies of effective tactics in a high-threat environment

Michael McNicholas is the Managing Director of Phoenix Management Services Group in the USA, Panama, and Costa Rica, Operations Support Services (Panama), and Pathfinder Consulting, LLC in the USA. Michael has over fourteen years of distinguished and progressive Law Enforcement, Military, and Intelligence experience and, most recently, twenty years as Founder/Co-Founder of several successful professional security services corporations in Latin America and the USA. A former Non-Commissioned and Commissioned Officer (Direct Presidential Appointment) in the US Army, Mr. McNicholas served for nine years in Airborne Infantry, Military Police, and Military Intelligence units. Mr. McNicholas held a TOP SECRET security clearance in the Central Intelligence Agency (CIA), where he specialized in counter-narcotics trafficking and international terrorism and served on the Vice President's Narcotics Interdiction Task Force and as the CIA Liaison to US Coast Guard Intelligence. Michael designed, implemented, and managed the internationally-acclaimed seaport security program at Manzanillo International Terminal - Panama, the largest container port in Latin America. In 2003, he spearheaded the successful efforts to have Phoenix Management Services Group designated as the first 'Recognized Security Organization” (RSO) by the Republic of Panama and the Dominican Republic. On behalf of the government of Panama, Phoenix evaluated and approved/rejected Ship Security Plans for over 2,500 ships in the Panama Registry. In the Dominican Republic, Phoenix conducted Port Facility Security Assessments and wrote the Port Facility Security Plans for two of the primary ports in the country. Mr. McNicholas is credited with co-pioneering the Maritime Security Team (Anti-piracy/stowaway/drug trafficking/terrorist) concept in commercial cargo shipping and has Maritime Security Teams deployed onboard container and cargo ships in the Caribbean Sea and Pacific Ocean.
The commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena--the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary "e;choke point"e; - the load seaports and their ships. This book provides practical, experience-based, and proven knowledge - and a "e;how-to-guide"e; - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports. Holds the keys to successfully designing, implementing, and managing effective port and vessel security programs in a high-risk environment Provides real-world experience in Maritime Security from the Managing Director of Phoenix Management Services Group in the USA and Panama. Offers specifics of a model port security program and case studies of effective tactics in a high-threat environment

Cover 1
Copyright Page 5
Dedication Page 6
TOC$Table of Contents 8
About the Author 16
Contributors 18
Preface 20
Acknowledgments 22
CH$Chapter 1: Commercial Seaports and Modes of Maritime Transport 24
Objectives 24
Introduction 24
Commercial Seaports 25
Container Terminals 26
Bulk Cargo Terminals 40
Cruise Ship Terminals 44
Nontraditonal Ports 45
Stakeholders 49
Terminal Owners 49
Terminal Operators 50
Stevedore Company 50
Longshoremen 50
Intermodalism 51
Modes of Maritime Transport 52
Tankers 61
LNG Tankers 65
Chemical Tankers 65
Container Ships 67
Freighters 68
Bulkers 68
Oceangoing Tugboats 74
Cruise and Passenger Ships 76
Summary 80
CH$Chapter 2: Documentation, Financial Transactions, and Business Entities in Commercial Maritime Transportation 82
Objectives 82
Introduction 82
Purchase of Goods 84
Filling the Order 84
Container Stuffing 85
Making a Booking 86
Documents Used to Export and Import Cargo 91
Bill of Lading 91
Shipper's Export Declaration 93
Certificate of Origin 93
Commercial Invoice 96
Insurance Certificate 98
Export License 99
Consular Invoice 99
Inspection Certificate 99
Phytosanitary Certificate 100
The Next Step for the Ocean Carrier 100
Documents Specific to Import Cargo Only 101
Arrival Notice 101
Pro Forma Invoice 102
Customs Entries Forms 102
Freight Release 103
Delivery Order 105
Duty Drawback 105
Bank Draft 105
Letter of Credit 106
Business Entities in Commercial Maritime Transportation 106
Freight Forwarders 106
Customs Brokers 107
Ship's Husbands/Agents 108
Ship Managers/Operators 108
VOCC and NVOCC 108
P& I Clubs
International Maritime Organization 109
Classification Societies 109
Flag States 110
Summary 111
CH$Chapter 3: International and U.S. Maritime Security Regulation and Programs 112
Objectives 112
Introduction 112
The ISPS Code 113
Amendments to SOLAS 136
WCO's Framework of Standards to Secure and Facilitate Global Trade 139
U.S. Laws and Programs 140
Maritime Transportation Security Act (MTSA) 140
Customs-Trade Partnership Against Terrorism (C-TPAT) 141
C-TPAT Security Criteria for Sea Carriers 142
Business Partner Requirements 143
Security Procedures 143
Container Security 144
Physical Access Controls 144
Personnel Security 145
Procedural Security 146
Security Training and Awareness 146
Physical Security 146
Information Technology Security 147
Security Assessment, Response, and Improvement 147
24-Hour Advance Manifest Rule and the Container Security Initiative (CSI) 149
Secure Freight Initiative 150
Safe Port Act of 2006 150
Summary 152
CH$Chapter 4: Vulnerabilities in the Cargo Supply Chain 154
Objectives 154
Introduction 154
Vulnerabilities and Their Potential Impact 155
Lessons Learned from the Drug War 157
Recommended Security Practices at the Production/Loading Phase 158
Manufacturer, Factory, and Plant 158
Recommended Security Practices at the Export Phase 163
Carriers and Seaports 163
Recommended Security Practices at the Importation/Distribution Phase 165
Ports of Entry and Importers 165
Special Vulnerabilities in the Maritime Environment 168
Cargo Theft 168
Internal Conspiracies and Techniques Used to Circumvent Security 171
Container Seals 174
"Red Flags" of Possible Criminal/Terrorist Surveillance 182
Summary 183
CH$Chapter 5: Plagues of the Seas: Piracy and Stowaways 184
Objectives 184
Definition and Historical Beginnings 184
Highlights of Recent Cases of Piracy 185
Tactics and Techniques in Piracy 190
Trends in Piracy 191
The Linkage Between Piracy, Organized Crime, and Terrorism 192
Stowaways: The Other Plague 195
The Motivation of the Stowaway 196
Techniques and Tactics Used by Stowaways 199
Summary 210
CH$Chapter 6: Drug Smuggling via Maritime Cargo, Containers, and Vessels 212
Objectives 212
Illegal Drug Origins and Production 212
Maritime Smuggling Routes and Trends 215
Drug Smuggling Methods and Techniques 219
Drug Smuggling via Cargo 220
Drug Smuggling via Containers 227
Drug Smuggling via Vessels 236
Summary 247
CH$Chapter 7: Terrorism and Commercial Maritime Transportation 248
Objectives 248
The Definition of Terrorism 248
Brief Review of the History of Terrorism 249
Current Trends in Terrorism 250
Types of Weapons Utilized by or Potentially Available to Terrorists 256
Explosives 256
Small Arms and Infantry Weapons 259
Weapons of Mass Destruction (WMDs) 263
Chemical Weapons 263
Biological Weapons 266
Radiological Weapons 267
Nuclear Weapons 270
Terrorist Targeting of Ships and Ports 271
Use of Ships, Cargo, and Containers to Transport Terrorists and Materials 275
Cooperation with Narcotics Traffickers and Other Terrorist Organizations 281
Summary 284
CH$Chapter 8: A Strategic Blueprint for World-Class Seaport Security 286
Objectives 286
External Security Ring 289
Intelligence Operations 289
Government and Law Enforcement Liaison 289
Perimeter Security Ring 289
Physical Security Barrier and Illumination 289
Waterside Security Measures 289
Perimeter Intrusion Detection 291
Entrance and Exit Gates 291
Access Control Policy and Procedures 293
Port Identification Badge System 294
Narcotics Control at Access Points 294
Explosives Detection at Access Points 294
Weapons of Mass Destruction Detection at Access Points 295
Inner Security Ring 295
Mobile Security Patrols 295
Foot Security Patrols 296
Security Operations Command Center 296
Shift Security Superintendent 296
Site and Asset-Specific Security Rings 296
Administrative and Operations Office Buildings 296
Bonded and High-Risk Warehouses 297
Critical Assets and Essential Equipment 297
Vessel Security Ring 298
Basic Concept 298
VST Deployment for LO/LO Commercial Cargo/Container Vessels and Tankers 298
VST Deployment for RO/RO Vessels 301
Key Vessel Security Procedures 303
Predeparture Search for Contraband and Unauthorized Persons 304
Security Personnel Employment and Training 316
Pre-Employment Screening 316
Basic Security Training 316
Security Officer Equipment 318
Port Security Director 319
Port Facility Security Plan (PFSP/FSP) 319
Summary 319
CH$Chapter 9: Port Security Management 320
Objectives 320
The Port Security Director 320
The Systems Approach, ISO Certifications, Strategic Planning, and Metric Management 324
A Multiorganizational Approach Toward Port Security 328
The Importance of Comprehensive Job Descriptions 332
Planning and Conducting Security-Related Training 334
Visual/Verbal Learners 335
Visual/Nonverbal Learners 335
Auditory/Verbal Learners 335
Tactile/Kinesthetic Learners 335
Designing Training for Different Types of Learners 336
Intelligence and Its Role in Maritime Security 339
Risk Management and Port Security 343
Contingency Planning: A Critical Part of Port Security.Management 349
Getting the Maritime Community Excited About Contingency Planning: A Brief Look at an Introduction to a Contingency Planning Training Session 350
Looking for Well-Respected Sources and Standards on Contingency Planning 353
The Incident Command System (ICS) and the National Incidents Management System (NIMS) 353
Testing Training and Planning Through Exercises and Drills 357
Summary 361
CH$Chapter 10: Threat Mitigation Strategies 362
Objectives 362
Mitigating Pirate Attacks 364
Hostage Survival and Rescue 368
Cargo Container Inspection Techniques 371
Security Equipment, Systems, and Devices Used to Detect Contraband and Unauthorized Persons in a Container 384
Summary 388
CH$Chapter 11: Information Security and Assurance 390
Objectives 390
Introduction 390
Brief History of Information Security 391
The Information Security Function in a Maritime Company 392
Key Concepts in the Field of Information Security 393
Essential Infosec Objectives 393
Levels of Computer Security 394
Computer Hardware and Software 395
Logical Levels of Computer Security 395
Internet Security 395
Network Security 396
Enterprise Resource Planning Systems Security 396
Database Security 397
Application Security 397
Common Vulnerabilities in the Electronic Commerce Environment 397
Human Threats to Information Security 397
Technical Risks 399
Risks of Theft and Loss of Data 399
Mechanical Failures 400
Computer Viruses and Malware 400
Denial of Service Attacks 401
Criminal and Sociological Issues 401
United States Government Organizations 402
Department of Homeland Security 402
Department of Defense 403
Federal Bureau of Investigation 403
US-CERT 403
Computer Emergency Readiness Team/Coordination Center 404
National Institute of Standards and Technology 404
National Security and Public Policy Issues 404
Political, Cultural, and Economic Issues 405
Summary 405
Further Reading 406
Glossary 408
IDX$Index 454

PDFPDF (Adobe DRM)
Größe: 25,4 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Forge a Successful Pathway to Turn Your Culinary Concept into a …

von Chuck Stunton

eBook Download (2023)
Top Notch International (Verlag)
10,99