By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 1228 |
Pages: 3|
7 min read
Published: Jun 20, 2019
Words: 1228|Pages: 3|7 min read
Published: Jun 20, 2019
The facility security officer (FSO) is much like the Protective Services Officer (PSO) in the protective services world. The FSO is concerned mostly with directing and implementing policies for the safekeeping of the security of the specific port they have been assigned to. No matter how good the FSO is, they cannot perform their roles alone. Their job is a combination of knowing the laws, implementing physical security measures such as patrols and static watches, and incorporating multiple jurisdictional agencies to successfully complete the mission. The FSO utilizes a myriad of sources to assess these domestic and international risks. Literally, intelligence is gathered from information that may come from anywhere; with today's interconnected and networked world, these sources may be the internet, open publications, or even social media. With the plethora of agencies such as the F.B.I., D.H.S, and even C.I.A. contributing to the intelligence the updated databases are a very powerful tool that the FSO can rely on. Information sharing is essential as a tool in the security arsenal as we, unfortunately, learnt the hard way on the morning of the 11th of September 2001. Once threats have been identified and established, the FSO briefs their team on the threat and implements measures based on the updated FSP on how to mitigate and respond to the threats. If terrorism is on the table, the FSO may decide to shut down the port all together and divert ships to different ports. By utilizing Coast Guard and DHS assets this measure is the ultimate protection against terrorism. The FSO also utilizes security surveys which outline a plan and identify immediate threats. Also, these surveys allow the FSO to see what assets are available to them. The surveys also establish emergency actions such as nearest escape routes, safe havens such as police stations and hospitals. The FSO can then use this information to activate the FSP.
The FSO can utilize intelligence gathered from the Department of Justice and Defence, and even surveillance and CCTV footage. Documentation that is available is from FEMA such as the Manual to Mitigate Potential Terrorist Attacks against Buildings; Form CG-6025; and the Maritime Transportation Security Act of 2002. The U.S. Coast Guard and DHS will be tasked with an interception of any threats coming into the port; however, the FSO will dictate and guide threats to the actual port itself. Port technologies such as radiation detection, x-ray and cargo scanning technologies also aid the FSO in their mission. According to Christopher (2014), technologies that the FSO can rely on that defend again waterborne threats are sonar and radar capabilities and divers. Each aspect brings different things to the table. Intelligence is power and lets the FSO make informed decisions. Surveillance is equally powerful but is limited to where the patrol is performed, how information is collected and even more importantly, what information is unable to be collected. Roving patrols and static watches are effective; however, these are more of a deterrence measure than actively stopping anything. Intelligence combined with technology with a smart FSO is the most powerful combination. Like I mentioned earlier though, it is not a one-man mission.
The role of the United States Coast Guard in port security operations
The US Coast Guard is an arm of the Department of Homeland Security developed to enforce the maritime laws and defend the coastline along the U.S and its ports. Its mission is to monitor and secure the waterways and implement protection, mitigation and response measures to immediate threats in U.S. Waters following regulations outlined in the U.S.C. The Coast Guard is tasked with protecting citizens and their personal property, protecting the Maritime Transportation System and protecting the nation against terrorist attacks, criminal and malicious actors and associated crimes. The Coast Guard has multiple responsibilities when it comes to port security operations. The US Coast Guard also contributes to port security by partaking in the International Port Security (IPS) program. The Coast Guard visit foreign ports to and gives recommendations on updates to their current security and even aids in the screening of cargo destined to the United States. Because the ports are an enormous contributor to the nation's economy this role is essential to diverting disruptions. Overall the Coast Guard implements a layered approach. For example, a vessel that does not meet security requirements, or holding cargo from a port that is not a member of the international agreement of the ISPS, the U.S. Coast Guard enforces their jurisdictional authority by halting such vessels from reaching U.S. Ports or thoroughly screens the incoming vessels and cargo before letting it proceeds. The U.S. Coast Guard also may establish security zones, a sort of perimeter to screen and deter ships from entering high-risk areas. With terrorism coming from anywhere the US Coast Guard also are perform normal traffic duties on the waterway by acting as a law enforcement capacity. Directly impacting port security, the U.S. Coast Guard are tasked with conducting Threat and Hazard Identification and Risk Assessment (THIRA) on the ports on a routine basis which outlines port facilities, including any structure surrounding the ports and areas of vulnerabilities.
Maritime cyber terrorism
As already noted above the world is now interconnected and networked. Critical infrastructure is reliant on functioning and secure networks. Our nation's ports are also a part of this infrastructure. The ports make up a significant portion of the nation’s GDP and any disruption equals money and jobs lost. With the recent elections, our nation has seen the power of malicious intent by utilizing actors to negate security protocols. The nation's ports are susceptible to maritime cyber terrorism partly because of our reliance on these networks to conduct our mission.
The attacks against port facilities and ships could be conducted for a myriad of reasons. Some of these are identity and property theft of property, national security interventions and discovering information for terrorist and malicious state actors. Everything is controlled electronically by computers. If the systems were hacked and bypassed, information on shipping, cargo, crew and destination could be obtained which ruins the integrity of the ports. If surveillance cameras and CCTV was able to be controlled remotely, vital security information could be obtained which makes the nation's ports extremely vulnerable. No matter how tight security networks and cyber security are, there will always be exploitations on these networks. In the protection world, we have dedicated teams of communicators and network specialists who are with us 24/7 as they know how vulnerable these so-called top-secret networks are to outside actors. The ports are one big beacon to the criminal organizations and terrorist enterprises. There is no secret that the ports generate an enormous amount of money. As previously stated any disruption equals real lives impacted. Jobs and wages are always at risk.
Cyber terrorism indeed is a very significant threat to the ports. Utilizing resources these attackers are constantly probing for vulnerabilities in the networks. It is only a matter of time before one is found. Perhaps our biggest threat is our reliance on this technology for automation and ease of distributions. Everything is stored digitally these days also. The FSO and the FSP plan is available on digits. Yes, it is on a secured network but as stated above, this is not 100% Safe. If plans could be transmitted digitally, or security passwords used between jurisdictional agencies, the nation's ports could be in for a very bad day!
Browse our vast selection of original essay samples, each expertly formatted and styled