Port security is part of a broader definition concerning maritime security. It refers to the defense, law and treaty enforcement, and Counterterrorism activities that fall within the port and maritime domain. It includes the protection of the seaports themselves and the protection and inspection of the cargo moving through the ports. Security risks related to ports often focus on either the physical security of the port, or security risks within the maritime supply chain.
Internationally, port security is governed by rules issued by the International Maritime Organization and its 2002 International Ship and Port Facility Security Code. ISPS Code Requirements for Seafarers, Ships and Ports Additionally, some United States–based programs have become de facto global port security programs, including the Container Security Initiative and the Customs Trade Partnership against Terrorism. However, some businesses argue that port security governance measures are ineffective and costly and that it negatively impacts maritime transport costs.Edgerton, M., 2013. A Practitioner's Guide to Effective Maritime and Port Security. s.l.:John Wiley & Sons, Inc.
Physical port security also falls under the umbrella of maritime terrorism. Ports are attractive targets for terrorists because ships and cargoes are fixed in time once they enter the port, which removes the uncertainty in relation to the location of the target.
Apart from physical port security, the port is connected to a larger supply chain. There are various risks along this supply chain that can affect port security, such as explosives attached to the vessel or unwanted passengers on the vessel. Ports are "potential targets of illegal activity which may impact their ability to function as intended, and ports as conduits into and out of national borders and supply chains, which can be exploited in order to introduce or move illegal materials, persons, or activities". That involves increasing the number of vulnerabilities to port security to the supply chain.
Other measures include collaboration and information sharing. Collaboration with other relevant actors in the maritime sector can help ports stay well informed about global cyber threats, which in turn can help preemptively to address emerging cyber threats.
LNG derives at onshore or offshore ports, where the infrastructure at the port contains terminals that bring the LNG further. It can either be attached to a gas liqufication or storage plant, a regasification and storage plant or just a storage and distribution plant. The infrastructure at LNG terminals are therefore concerned with highly flammable content that is of security risk to personnel. Onshore LNG ports that are located close to cities or dense populations are also a security risk to the area surrounding the port.Lee, P. T.-W. & Chang, Y. T., 2010. Impact of port security on liquefied natural gas and container cargo movements. In: P. Kee & H. Yoshimatsu, eds. Global Movements in the Asia Pacific. Singapore: World Scientific Publishing Co. Pte. Ltd., pp. 323-340. Risks to port security will vary considerably and depend on the waiting position of a tanker, location of the port, and security risk management practices of each specific port.
LNG is naturally linked to maritime terrorism, as disputed areas and chokepoints -such as the Strait of Malacca and Singapore Strait- has the potential to result in hijacking and bombs as the area becomes more active. As the new demand centres for LNG is most notably in Asian countries such as China, India, Japan and South Korea, new geopolitical tensions might increase in the region between LNG- exporting countries such as the U.S., Russia and Qatar. This also relates to energy security, as import dependent countries are vulnerable to a sudden stop in supply of LNG.
The maritime suicide bombing carried out against the USS Cole in October 2000 by Al-Qaeda illustrated the probability of future maritime based terrorist attacks against the U.S. In response, terrorist groups such as Al-Qaeda were flagged as the largest threat to maritime supply chains; as their maritime skills were rapidly improving and U.S. maritime security regimes remained weak.
However, post-9/11, the U.S. government realized the risks and threats associated with unsecured maritime transport - particularly the containerised transport of nuclear material into U.S. ports. Additionally, the U.S. government showed an interest in funding and developing homeland security, which has been critiqued by maritime experts as merely ‘constructing barricades to fend off terrorists’. In the years since, academics have called for the creation of an international security regime that allows the U.S. ‘to remain an open, prosperous, free and globally engaged society’ as more than 6000 international vessels and 100,000 seafarers visit U.S. ports every year.
Although shipping containers have been widely used since World War II, in 2002 it was estimated that less than 3% of the 20 million containers that entered U.S. ports were scanned or inspected.
This statistic is made clearer when understood in the context of the U.S. Customs and Border Protection’s protocol. At Port Newark-Elizabeth Marine Terminal, 82% of the product passing through is "trusted" by the Customs agents as routine activity.
Only 18% of the shipments are an "anomaly" to the known shipments. This, in addition to the requirements for shippers to provide cargo lists, explains the reasoning behind such low search figures.
In the 2005 109th Session of Congress, the most maritime security related bills were introduced since 9/11, showing a significant increase in interest in these issues among federal officials.
All 7 bills, however, died in either the House of Representatives or the Senate.
In 2001, the Customs-Trade Partnership Against Terrorism (CTPAT) was created in an attempt to bolster the Bush Administration's post-9/11 multi-layered cargo enforcement strategy. The initiative is a voluntary partnership between principal stakeholders in the public and private sector (importers, shipping container carriers, customs brokers and manufacturers).
A year later, in 2002, the Container Security Initiative (CSI) was launched by the U.S. Customs and Border Protection. Specifically focusing on containerised cargo entering U.S. ports, the bilateral information sharing initiative was intended to ‘extend the zone of security outward so that American borders are the last line of defence, not the first’. The reciprocal system between U.S. and foreign ports, makes it possible for U.S. bound shipping containers to be inspected at their host port, instead of upon arrival in the U.S.Philpott, D. (2019). Are We Winning the War?. In D. Philpott, Is America Safe?: Terrorism, Homeland Security, and Emergency Preparedness (60-62). London, United Kingdom: Bernan Press.
The 2002 RAND SeaCurity conference revealed that the European Commission ‘strongly opposes’ the Container Security Initiative (CSI) and particularly the Customs-Trade Partnership Against Terrorism (CTPAT). One reason given was that the shipping container's safety seal is only required to be placed on its doors at the port of departure, not the port of origin. Therefore, the container is unsealed and exposed through most of its journey through international ports.
The United Nations Office on Drugs and Crime (UNODC) was established in 1997, however expanded after 9/11 to include maritime crime and piracy. In 2015, the UNODC released the first annual report on their Global Maritime Crime Programme. The programme assists 18 countries in combating ‘the smuggling of migrants and people trafficking, wildlife and forestry crime, piracy and armed robbery, Somali charcoal smuggling,
The International Ship and Port Facility Security Code (ISPS) is an amendment of the Safety of Life at Sea Convention (SOLAS), which entered into force in July 2004. The code provides a security regime for international shipping and port security. Compliance is mandatory for the 148 contracting parties to SOLAS, however there are no consequences for non-compliance. ISPS is therefore a security framework for states, whereby 'each ship and each port facility will have to determine the measures needed to intensify its security measures to appropriately offset the threat by reducing its vulnerability.International Maritime Organisation. (2020). SOLAS XI-2 and the ISPS Code. Retrieved from http://www.imo.org/en/OurWork/Security/Guide_to_Maritime_Security/Pages/SOLAS-XI-2%20ISPS%20Code.aspx
Maritime security expert Peter Chalk acknowledges that government initiatives up until 2008 have ‘conferred a degree of transparency' by laying the parameters - the 'rules, principles, and attendant responsibilities for international cooperation', providing a ‘common framework in which to further develop’.
The U.S. government has taken a segmented approach to problem solving container surveillance weaknesses in an attempt to protect maritime commerce - ‘by necessity, domestic and international maritime security programs have been implemented in parallel to the creation of a coherent strategy and before the development of any measures of effectiveness. The result has been the collection of programs which overlap, interact and leave significant gaps. The overall effectiveness of national and international efforts is impossible to assess’.
Collaborative efforts between the U.S. Immigration and Naturalization Service (INS), the U.S. Coast Guard, the U.S. Bureau of Consular Affairs and the U.S. Department of State have been attempted through a Memorandum of Agreement. However, in 2004, their intelligence was still only limited to ‘detecting a containserized WMD at its port of entry’. In a 2003 report made for Members of Congress, the Congressional Research Service stated that the U.S. Coast Guard and U.S. Customs and Border Protection's programs ‘represent only a framework for building a maritime security regime, and that significant gaps in security still remain’. The report concluded that there is administrative hesitancy within security agencies, specifically ’implementation issues’ regarding the "24 Hour Rule". Under Customs Regulations, U.S. Customs and Border Protection agents are required to ‘receive, by way of a CBP-approved electronic data interchange system, information pertaining to cargo before the cargo is either brought into or sent from the United States by any mode of commercial transportation (sea, air, rail or truck)’.68 F.R. 68139 2003. However, U.S. Customs and Border Protection agents have noted this 'will greatly impact the balance between a prosperous economy and sea and land border defense’.
In a 2007 report made for Members of Congress, the Congressional Research Service quoted former Department of Homeland Security Inspector General Richard Skinner, who stated that ‘overall resource hours devoted to USCG’s homeland security missions grew steadily from FY 2001 through FY 2005’. However the U.S. Coast Guard only achieved 5 out of 19 (26%) homeland security goals. Evaluated with reference to the expectations set out in the Ports and Waterways Safety Act of 1972 and the Maritime Transportation Security Act of 2002, the U.S. Coast Guard's homeland security operations fell short in 9 key areas: funding, assets and personnel levels for performing homeland and non-homeland security missions; division of budget between homeland and non-homeland security missions; coordination with other Department of Homeland Security offices, federal, state and local authorities involved in maritime security - including coordination of operations and intelligence; monitoring compliance with facility and vessel security plans; completing foreign port security assessments; implementing long-range vessel-tracking system required by MTSA; implementing Automatic Identification System (AIS); inland waterway security; and response plans for maritime security incidents.
Ronald O’Rourke, a specialist in U.S. naval affairs, who details the Coast Guard's self assessment for the fiscal year of 2006 and their subsequent trialing of Marine Domain Awareness (MDA) and Automated Identification Systems (AIS) nationwide. Known as Project Hawkeye, the trial was aimed at bringing maritime cargo transport security to the level of air cargo (O’Rourke 2–3). However the radars confused waves with boats and the long range surveillance cameras were only able to capture ‘a sliver of the harbor and coasts’. Due to their ineffectiveness ‘Coast Guard staff personnel have been told not to waste much time looking at it’. Additionally, the Automated Identification System can be turned off, or used to enter an incorrect vessel location and identity.
Former U.S. Coast Guard Commander Stephen Flynn also suggests extending current initiatives to include bilateral and multilateral international inspection zones.
European stakeholders take a similar position to Loy, Ross and Flynn, encouraging the inclusion of the private sector in any counter-measure actions taken by the government, so as to avoid ‘affect container throughput – affecting the commercial imperative’.
The security of ports and their deficiencies are numerous and leave U.S. ports vulnerable to terrorist attack. The vulnerabilities of our ports are many, leading to potential security breaches in almost all aspects of the container shipping industry. With the sheer volume of maritime traffic, there is serious concern of cargo/passenger ship hijackings and pirate attack, as well as accountability of the millions of shipping containers transported worldwide. Given the overwhelming number of ships and containers, there are many areas of concern regarding the security of U.S. ports.
Terrorists can, and eventually may, exploit the shipping industry's deficiencies in port security. Potential threats include the smuggling of weapons of mass destruction (WMD), a radiological "dirty" bomb, a conventional explosive device, and transportation of terrorist operatives, as well. Studies have claimed a Hiroshima sized nuclear detonation at a major seaport would kill fifty thousand to one million people. It is common knowledge within the industry that security measures of major ports cannot have a significant effect on the movement of goods, thereby allowing exploitation of the system for terrorist use.
The geographical/physical layout of the ports themselves is of concern. The protection and security of the landside perimeter of a port is difficult due to their large size. Ports located in highly urbanized areas allow terrorists a densely populated area in which to hide while infiltrating or escaping the port area at their perimeter. The high volume of trucks entering and exiting port facilities pose a threat to the port, as well as surrounding geographical areas. Exiting trucks may contain WMD or terrorist operatives that are to infiltrate a surrounding metropolitan area, i.e., transporting a chemical explosive device (from the Port of Los Angeles) to a more densely populated area (downtown Los Angeles). Container ships anchored at port facilities are particularly vulnerable to both highjacking and explosive devices as they are stationary targets. Most crews of cargo ships are unarmed, and would be defenseless to an armed attack. The disabling of a ship at port is enough to halt all activity at that port for an extended period of time, especially if the disabled ship is blocking a throughway for other vessels.
The economic impact of such an attack would be disastrous on a global scale. An example of such an economic impact can be drawn from a labor-management dispute that closed ports along the west coast of the United States. These port closures cost the U.S. economy approximately $1 billion per day for the first 5 days, and rose exponentially thereafter.
Although there are many government sponsored agencies involved with port security, the responsibility of providing that security is of state and local governments. Allen (2007) states that 'under the protective principle, a state has jurisdiction to prescribe and enforce laws against acts that threaten vital state interests'. The protective principle 'recognizes that a state may apply its laws to protect vital state interests, such as the state's national security or governmental functions'. Some ports may enact their own police forces in addition to city law enforcement.
There have been proposals to consolidate federal agencies responsible for border security. The consolidation may offer some long-term benefits, but three challenges may hinder a successful implementation of security enhancing initiatives at the nations ports: standards, funding, and collaboration.United States Accounting Office. (2002, August). Port Security: Nation Faces Formidable Challenges in Making New Initiatives Successful. Retrieved November 18, 2008 from http://www.gao.gov/new.items/d02993t.pdf
The first challenge involves implementing a set of standards that defines what safeguards a port should have in place. Under the Coast Guard's direction, a set of standards is being developed for all U.S. ports to use in conducting port vulnerability assessments. However, many questions remain about whether the thousands of people who have grown accustomed to working in certain ways at the nation's ports will agree to, and implement, the kinds of changes that a substantially changed environment will require.
The second challenge involves determining the amounts needed and sources of funding for the kinds of security improvements that are likely to be required to meet the standards. Florida's experience indicates that security measures are likely to be more expensive than many anticipate, and determining how to pay these costs and how the federal government should participate will present a challenge.
The third challenge is ensuring that there is sufficient cooperation and coordination among the many stakeholders to make the security measures work. Experience to date indicates that this coordination is more difficult than many stakeholders anticipate, and that continued practice and testing will be key in making it work.
Shipping Container Surveillance
Federal Legislature
Security Initiatives
/ref> However, neither the UNODC's annual reports, nor their Maritime Crime Manual for Criminal Justice Practitioners, make any mention of shipping container surveillance.
Federal Authorities' Homeland Security Initiatives
Marine Domain Awareness
Academic Discourse
Maritime Terrorism and Piracy
Policing
See also
Sources
External links
|
|