A Practitioner's Guide to Effective Maritime and Port Security
Home > Society and Social Sciences > Social services and welfare, criminology > Social welfare and social services > Emergency services > A Practitioner's Guide to Effective Maritime and Port Security
A Practitioner's Guide to Effective Maritime and Port Security

A Practitioner's Guide to Effective Maritime and Port Security


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Table of Contents:
Introduction xiii Foreword xvii Part OneThe International Maritime Operating Environment Chapter 1 Unique Characteristics of Ports and International Shipping 3 Introduction 3 The Multinational Nature of Shipping and Business Driversin Port Operations 6 Flag States 7 Vessel Registries 7 Types of Vessel Registries 8 Implications for Security 10 Third Country Owners 11 Implications for Security 11 Multinational Crews 13 Implications for Security 14 Port States 14 Regulatory Requirements 16 International Treaties and Codes 16 Oversight Mechanisms 18 Ship-Port Relationships 19 The Supply Chain 20 Just-in-Time Delivery 20 The Components of a Maritime Supply Chain 21 Regulatory Issues 22 Intermodal Links 24 Chapter 2 The Criticality of Ports: Why and How They Matter 27 Introduction 27 Geopolitical Considerations 27 Trade Routes 27 Trade Chokepoints 28 Sea Lines of Communication 30 Ports 33 Ports as Targets 34 Ports as Conduits 36 Cargo Theft 38 Smuggling 40 Ports as Borders 41 Intermodal Connections 42 Part TwoThreats to Ports and the Maritime Domain Chapter 3 Threats 47 Introduction 47 Threats by States 49 State Actors 49 Conventional Military Attacks Against Ports 49 Conventional Attacks Against Supply Chains 51 Asymmetric Attacks 52 State Proxies 56 Proxy Tactics 57 Nonstate Actors 58 Terrorism 61 Criminal Activity 62 Piracy 67 Terrorism, State Actors, and Criminal Nexus 68 Part ThreeCurrent Approaches to Maritime and Port Security Chapter 4 Approaches to Security Policy Development 73 Introduction 73 Political Considerations 73 Commercial Interests 74 Costs of Implementation 74 Increased Government Oversight 74 Potential Delays 75 Domestic Political Constituencies 76 Container Screening 77 Port Security Grants 79 Measuring the Effectiveness of Security Measures 81 Deterrence 81 Punishment 81 Denial 82 Consequence Management 84 Measurement of Activity vs. Effectiveness 87 Measurement of Activity 87 Resources Expended 87 Measurement of Criminal Activity 88 How to Measure Effectiveness 91 Why Don’t We Do This Already? 92 The Maritime Context of Assessing Deterrence 93 Lack of a Risk Approach 94 What is Risk? 95 Dynamic Risk 96 Pure Risk 96 Fundamental Risk 97 Particular Risk 97 Components of Security Risk 97 Threat 97 Vulnerability 98 Consequence 98 Risk Management 99 The Weaknesses of Current Risk Management Approaches 99 Lack of Understanding of Security Risk Components 100 Lack of a Process to Determine Risk Tolerances 100 Tendency Towards Risk Aversion or Avoidance 101 Focus on Risk Mitigation (Reduction) instead of Risk Treatment 101 viii Contents Lack of Recognition of Critical Nodes in the Maritime Domain 101 Overquantifying Security Risk 102 Tendency to Use the Rubric of All-hazard Risk 104 A Propensity to Minimize the Element of Threat in Performing Security Risk Assessments 104 Chapter 5 A Critique of Current Maritime Security Measuresand Approaches 107 Introduction 107 Regulations and Their Limits 108 The ISPS Code 109 Supply Chain Security 112 International Organization for Standardization 116 Lack of Recovery Planning for Key Maritime Supply Chain Components 117 A Disjointed International Regulatory Environment 117 Overreliance on Technology 118 Maritime Domain Awareness (MDA) 118 The Fallacy of 100 Percent Container Screening 120 The 'Magic' of Closed Circuit TV (CCT V) 121 Failure to 'Fire for Effect' 122 The Staten Island Barge Explosion 122 Minimizing the Importance of Understanding Threat 123 Hurricane Katrina--the Wrong Lesson Learned 124 Assessing Threat is Hard 126 Why Understanding Threat Matters 126 Bomb in a Box? 127 Deconstructing the Threat 127 Biological and Chemical Agents 128 Radiological Material 128 The Nuclear Grail 128 The Risk Conundrum 129 The Consequences of not Understanding the Threat 130 Hitting the Bystander 130 Al Qaeda’s View of Saddam’s Iraq and Vice Versa 130 The Threat That Wasn’t 131 The Fallout 131 The Lack of a True Risk-Based Approach 131 Insufficient Focus on System Integrity 135 Transparency 135 Corruption 135 Implications for the Maritime Domain 135 The Impact of Corruption 136 Lack of Incentives for the Private Sector 137 Part FourPrinciples for Effective Maritime and Port Security Chapter 6 Security as an Enabler 141 Introduction 141 Why is it Important for Security to be an Enabler? 142 Security as a Value-Add 142 A Culture of Security 142 Changing Security’s Image 143 Security a Key Organizational Component 143 Resilience 144 Why Resilience? 145 Risks of Ignoring Resiliency 145 Additional Risks 147 The Benefits of a Resilience Approach 147 Resilience and Maritime Security 149 Resilience Guidance 149 Integrating Security into Resilience 150 The Elements of Resilience 151 The Medical Comparison 155 Enabling Resilience 156 Chapter 7 Standards and Regulations 159 Introduction 159 Review of the ISPS Code 159 The ISPS Code 160 ISPS Code 2.0 161 Use ISO 28000 as the Foundation for a new ISPS Code 162 Considerations 164 Acceptance Issues 164 Implementation Issues 167 Other Implementation Considerations 171 Notional Contents and Structure of a New Code 173 The New Code 174 Chapter 8 Assessing and Managing Risk 177 Introduction 177 ISO 31000 178 Risk Terminology 180 Risk 180 Risk Management 180 Risk Assessment 180 Risk Analysis 180 Risk Appetite or Tolerance 180 Other Definitions 181 Threat 181 Hazards 181 Vulnerability 181 Likelihood 181 Consequence 181 Core Components of Risk 182 Establishing the Risk Management Context 182 Identify Risks 183 Analyze Risks 185 Evaluate Risks 186 Treat Risks 188 Making the Business Case for Risk Treatment 190 What is a Business Case? 192 Composition of the Business Case 192 The Business Case and Risk Treatment 193 Monitor and Review 194 Communicate and Consult 195 Maritime Considerations 197 Chapter 9 Measuring Effectiveness 199 Introduction 199 Measure Effectiveness, Not Security Activity 200 Measurement of Activity 201 Resources Expended 201 Measurement of Criminal Activity 201 Uniform Crime Reporting System 202 CompStat 202 The Black Swan Effect 202 Measuring Effectiveness 203 A Hybrid Solution 203 Ask the Enemy 204 Crunch the Numbers 207 Deterrence as the Primary Measure 207 Deterrence 208 Ensuring Integrity and Countering Corruption 209 Foster Continuous Improvement 210 Chapter 10 Conclusion 211 Appendices Appendix A Conducting Security Risk Assessments 215 Introduction 215 Risk Assessment Steps 216 Establish the Risk Management Context 217 Identify Risks 217 Analyze Risks 218 Evaluate Risks 218 Conducting Risk Assessments 219 Assessment Team Composition 219 All Assessors 219 Lead Assessor 219 Assessment Team Members 220 Facility Risk Assessment Process 220 Facility Risk Assessment Preparation 221 Written Notification to Facility Operators 221 Planning Assessment Activity 222 Facility Risk Assessment Administration and Logistics 223 Facility Risk Assessment Activity 223 Document Reviews 224 Formal and Informal Interviews 224 Observations 224 Assessment Opening and Closing Meetings 224 Opening Meeting 224 Closing Meeting 225 Facility Assessment Reporting 225 Assessing Vulnerability 225 Assessing Consequence 227 Developing a Risk Rating 227 Appendix B Conducting Threat Assessments 231 Introduction 231 Consistency with ISO 31000 232 Threat Identification 233 Identify the Range of Potential Threat Actors 234 Identify an Extensive List of Threat Actor Characteristics 234 Identify Sources of Threat-Related Information 234 Analyze and Organize Threat-Related Information 238 Threat Evaluation 238 Threat Actors and Scenarios 241 Develop The Design Basis Threat 241 Appendix C Tips for Assessing Risk Appetite 259 Introduction 259 Defining Risk Appetite 259 Risk Appetite and ISO 31000 260 Assessing Risk Appetite 260 Helping a Client Determine Risk Appetite 261 Pairwise Exercise 262 Risk Appetite and Risk Treatment 263 Index 269

About the Author :
MICHAEL EDGERTON is a security and risk manager based in the Middle East with more than twenty-five years of experience in maritime security, security risk management, critical infrastructure protection, and crisis management. He has advised national governments, agencies, and corporations on security matters and has performed strategic-level, risk-based assessments of critical infrastructure, including system resiliency, business continuity, and recoverability. Prior to entering the private sector, Mr. Edgerton served in the United States Coast Guard and United States Navy as a commissioned officer specializing in security and intelligence.


Best Sellers


Product Details
  • ISBN-13: 9781118633175
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Language: English
  • ISBN-10: 1118633172
  • Publisher Date: 25 Oct 2013
  • Binding: Digital (delivered electronically)
  • No of Pages: 296


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
A Practitioner's Guide to Effective Maritime and Port Security
John Wiley & Sons Inc -
A Practitioner's Guide to Effective Maritime and Port Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

A Practitioner's Guide to Effective Maritime and Port Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!