Respond to the following short essay questions based on the course materials presented for weeks 5-8 and developed OUTSIDE sources. You are to prepare and submit your final assessment in a Microsoft word document and attach to the "Assignments" (Times New Roman Font 12). (350-500 words for each topic question). Also, you are to state each topic question followed by your response to that question.
Based on the assigned readings, your responses are to be in your own words with no copying except for minimal quotes that must be properly cited in APA format (APUS Library). What I am looking for here are your own thoughts and opinions that demonstrate your understanding of the topics and the course materials. Include a reference list of any sources cited in your Midterm assessment (APA Format).
1 - What do you consider the 3 most important resources available to the MTSA required port FSO in assessing domestic and international risks associated with terrorism and other criminal activity threats posed to port maritime operations and the MTS? Be Specific. This can be policy, data, authorities, etc. This is not simply a cut and paste from three references. You need to explain WHY these are important in the assessment of risk within the MTS.
2 - What is the role of the United States Coast Guard in port security operations looking for specific authorities? What do you believe the greatest challenges for the service will be in this mission set?
3 - What is maritime Cyber terrorism and how does it threaten port security operation? You can consider the ship, the port and intermodal operations) Emphasis on your analysis of this threat vector.
The information has to come from outside sources none front class readings so any sources about the topic in the directions. The course book is isbn# 13: 978-1-4200-6893-1 (port security management 2nd edition)
Port Security Management
Ed.: Second edition. Boca Raton : CRC Press. 2015
Sea and freshwater ports are a key component of critical infrastructure and essential for maintaining global and domestic economies. In order to effectively secure a dynamic port facility operation, one must understand the business of maritime commerce. Following in the tradition of its bestselling predecessor, Port Security Management, Second Edition continues to supply readers with this understanding. This fully updated edition covers the latest in continuously changing legislation regarding federal mandates, securing vessels, cargo security, and granting employee credentials. Focusing on best practices, it details real-world solutions that law enforcement authorities and security management professionals can put to use immediately.Assuming little prior knowledge of the industry, the book examines port security in the context of global transportation systems. It supplies practitioners and educators with a framework for managing port security and details risk assessment and physical security best practices for securing ships and ports.The book explains how the various stakeholders, including port management, security, government, and private industry, can collaborate to develop safe and secure best practices while maintaining efficient operations.Addressing the legislative measures, regulatory issues, and logistical aspects of port security, the book includes coverage of cruise ships, cargo security, CT-PAT, and emergency operations. complete with a new chapter on intelligence, this book is ideal for anyone with a vested interest in secure and prosperous port facilities who wants to truly understand how to best tackle the management of port security.
BUSINESS & ECONOMICS / Management
POLITICAL SCIENCE / Terrorism
TECHNOLOGY & ENGINEERING / Civil / General
Print/Save 30 pages
eBook Collection (EBSCOhost)
Your Institution of Affiliation
February 27, 2017
1 In my opinion, the 3 most important resources available to the MTSA required port FSO in assessing both domestic and international risks are; (1) information, (2) maritime laws and policies, and (3) help from government organizations in enforcing these laws. The first resource – information – is perhaps one of the most crucial element in order to stop threats of terrorism and other criminal activities. Information should include data from first- and second-hand sources, metadata, and more importantly information which comes from government organizations such as FBI, NSA, and CIA among others. Information should also include the “immediate data” gleaned from the technologies being utilized by the ports, coastguard, and other entities which are dedicated to making our ports secure. Some examples of these information systems include surveillance systems, sophisticated cargo screening techn