According to Christopher (2009), frequency of access is a major vulnerability associated with access controls. Goods must enter and depart seaports frequently and those parties doing it become extremely familiar with the architecture, security layout, and access control procedures. All facets of these areas are prone to exploitation by smugglers (pp. 134-135). An additional vulnerability to access controls is advanced notice requirements. This method allows security management to adjust their procedures to the inbound delivery. To assist with advance notice vessels are required to submit digital manifests 96 hours prior to porting. This allows times to vet the documents provided against internal intelligence practices (pp. 135-136).
2. What
…show more content…
Security concerns can stem from lost identification badges. This can lead to counterfeit badges and is always a physical security concern. The FSO ensures the vehicles, personnel and goods are authorized to be in restricted areas. However, this can not function as intended if people can walk security without restrictions or vehicle access is not strictly enforced. Security officers are the front line defense in these matters (pp. 142-148).
3. What are (describe) the following?
The SMART Port Security Legislation.
According to (“House Homeland Security Border and Maritime Security Subcommittee Passes SMART Port Security Legislation”, 2012), The SMART port security legislation is known as the Homeland Security H.R. 4251. It is basically a means to improve collaboration between Federal and local law enforcement. With both working in tandem, security responses from shared intelligence enhance threat reduction. Setting the tone that ports are equally important to the North and South border.
The SAFE Port Act.
According to Caldwell (2007), The SAFE Port Act started in 2006. It arranged fresh programs and focused work to reduce threats from cargo containers, established interagency operation cells, and required radiation scans of containers in high OPTEMPO seaports (p.
They are gonna do that by keeping track of who enters the U.S and leaves the U.S. The VIST system, which is located in 115 airports and land ports keeps track of who is coming and going from the USA. This program also helps us know how long someone is here and if they're here too long we know they're trying to become an illegal citizen so they come looking for that person and get them out. According to Republicanviews.org We are trying to “ provide these benefits, the Republican Party is pushing for the US VISIT system to be used at all borders, as well as to increase the use of reconnaissance cameras, border patrol agents, and unmanned aerial flights at borders. They also seek to provide border patrol agents with more advanced technology, tools, structures, and sufficient force to properly secure the borders.”
For accountability all accountable items are documented on a DD Form1149 Requisition and Invoice Document and when and shipped out to USCG Cutters for installation work by Lynxnet Authorized personnel. These DD Form 1149’s are signed by USCG Authorized personnel and updated in Lynxnet Database and removed off of storage database.
As the eighteenth century roared into existence, a rapidly growing Great Britain was faced with both an exponential commercial and population boom that was unprecedented. It is during this brief one hundred years that the nation, as well as the rest of the world, would be forever changed due to the beginning of the Industrial Revolution. While the Industrial Revolution was liberating in the sense that it gave more occupational choices , as well as the opportunity to move up the rungs of the social ladder through relocation and financial gains, it also brought regulations that had to be put in place. As commerce and trade began to expand, both domestically and abroad through colonial outposts, taxation also saw a parallel increase to not only
The history of Operation Gatekeeper was a Clinton-era measure that was implemented by the U.S.
In the ten years immediately following 9/11, the United States spent 635 billion dollars on homeland security. With this increase in spending American citizens would expect airport security to be greatly improved, but there have been many instances where the TSA failed to do its job. On a flight from Atlanta to Chicago, Blake Alford carried a fully loaded semi-automatic handgun with him all the way to his hotel in Chicago. Mr. Alford turned himself into the TSA after he realized his infraction, but this rare instance has people wondering how often the TSA makes mistakes. Alford went through security like any other traveler in the Atlanta airport, but even a full body scan did not detect his weapon.
“The frustration that port and maritime business professionals may experience as a result of the renewed emphasis on port security is natural” (Christopher, 2015, p.35). The redundancy issues with State vs Government laws are duplications. “Concerns related to the often duplicative requirements of Florida’s port security standards coupled with the new federal security requirements” (Christopher, 2015, p.12). If a State is handling the port in their jurisdiction then there is no need for federal involvement.
National Security Act of 1947 created centralized postwar national security apparatus (CIA, JCS, DoD, NSC); National Security Agency was created in 1952. The National Security Act was one of the most important pieces of legislation during the Cold War. It laid the groundwork for much of the foreign policymaking that would occur during the following 40 years of the Cold War. There were three main parts to the National Security Act. The first part allowed for streamlining and unifying the nation’s military by joining the Navy Department and War Department under the title of Department of Defense.
The last issue under title 1 deals with oversight. Within this issue, there would be three different things that would occur. Number one, there would be the creation of the Homeland Security Border Oversight Task Force, which is made up of 26 members (MPI 5). They would serve the role of reviewing and offering recommendations about immigration and border enforcement strategies. Number two, the statistics on the effectiveness of every border patrol station along the southern border would be required to be reported on by the Department of Homeland Security to Congress.
Police officers were responsible for securing the transportation systems and tightened airplane security. Eventually, this security framework transferred to the Department of Homeland Security in 2003. The Homeland Security ensured a safe homeland against terrorism. The Bush administration formed the U.S. Immigration and Customs Enforcement under the Department of Homeland Security and was responsible for governing border control and immigration. Officials checked the immigration status of many people.
Many foreigners were denied entry into the United States based on a contract labor law. Because they were denied entry many entered the United States illegally usually slipping passed the entry points. Therefor it the evolved the need for a border-control force. In 1885
Measures range from treating schools, courthouses and hospitals as “safe zones” to restricting the ability of local police to detain people on behalf of federal immigration. The law does nothing to curtail the ability of federal agents to come into the state and deport people or carry out raids, but it does make such actions more difficult for agencies with limited resources (Steinmetz,
“My children, this country has lost it’s good heart. People don’t trust each other anymore. Years ago, you would have been heartily welcomed in this village. I hope that you boys find safety before this untrustworthiness and fear causes someone to harm you” (Beah 16). During times of war, trust and survival cease to coexist.
Luggage and passenger screening are now more detailed and passengers must have a ticket to go past the gate. II. New procedures were introduced such as removing jewelry, shoes, liquids etc. when going through security. III.
Porter’s five forces interact to shape the competitive landscape facing port authorities and port service providers. The 5 forces are stated below; 1. The rivalry among existing competitors 2. The threat of new competitors 3. The potential for global substitutes 4.
To scope the maritime safety and health issues are including action which taken by government organization and evolution of