Protecting the Nation's Seaports: Balancing Security and Cost

Total Page:16

File Type:pdf, Size:1020Kb

Protecting the Nation's Seaports: Balancing Security and Cost Protecting the Nation’s Seaports: Balancing Security and Cost ••• Editors: Jon D. Haveman Howard J. Shatz 2006 Library of Congress Cataloging-in-Publication Data Protecting the nation’s seaports: balancing security and cost / edited by Jon D. Haveman, Howard J. Shatz p. cm. Includes bibliographical references and indexes. ISBN-13: 978-1-58213-120-7 ISBN-10: 1-58213-120-1 1. Harbors—Security measures—United States—Economic aspects. 2. Marine terminals—Security measures—United States—Economic aspects. 3. Shipping— Security measures—United States. 4. Terrorism—United States—Prevention— Economic aspects. I. Haveman, Jon D., 1964-II. Shatz, Howard J. HE553.P76 2006 363.325’938710973—dc22 2006011932 Copyright © 2006 by Public Policy Institute of California All rights reserved San Francisco, CA Short sections of text, not to exceed three paragraphs, may be quoted without written permission provided that full attribution is given to the source and the above copyright notice is included. PPIC does not take or support positions on any ballot measure or on any local, state, or federal legislation, nor does it endorse, support, or oppose any political parties or candidates for public office. Research publications reflect the views of the authors and do not necessarily reflect the views of the staff, officers, or Board of Directors of the Public Policy Institute of California. Foreword It is sometimes difficult to understand how much the world has changed since September 11. Even diplomats and foreign policy experts, who have far greater knowledge than most, have difficulty understanding all the consequences of events that have unfolded since September 11. One certain consequence is that the daily media reports of death and destruction from all over the world have made it imperative to intensify security measures in many ways. With this report, Protecting the Nation’s Seaports: Balancing Security and Cost, PPIC tries to shed some light on how one significant element of these global security imperatives is affecting Americans and Californians. California is home to three large seaports that are of major significance to the nation’s economy—Los Angeles, Long Beach, and Oakland. The authors in this volume inform us that all California ports are vulnerable to a terrorist attack and that disabling any of the big three could have serious implications for the economic health of the region, as well as for lives and property in the immediate vicinity. This volume is comprehensive—it describes and analyzes what could happen if a terrorist attack on a port were to occur, what can be done to deter such an attack, the characteristics of U.S. port security programs, what factors stand in the way of an adequate port security policy, and some alternative methods for financing that policy. Most important, this multiauthored volume is not alarmist—it is a thoughtful and balanced look at a major problem and its context: how the global economy has fostered huge increases in international trade and how terrorists could exploit the vulnerability of this massive global goods movement. Protecting the Nation’s Seaports may well become a standard reference volume for understanding the issue of port security for the nation and particularly for California. The authors describe the problems iii and the solutions, but full implementation of new policy is still off in the future. Our hope is that this volume will help speed up the process of both policy development and implementation. David W. Lyon President and CEO Public Policy Institute of California iv Contents Foreword......................................... iii Figures .......................................... xi Tables ........................................... xiii Acknowledgments................................... xv Acronyms ........................................ xix Map of the Ports of Los Angeles and Long Beach ............. xxiii 1. INTRODUCTION AND SUMMARY by Jon D. Haveman and Howard J. Shatz ............... 1 The Issue of Port Security .......................... 1 The PPIC Port Security Project ...................... 5 Summary of Main Findings ......................... 6 The Economic Effects of a Terrorist Attack on a Port ..... 6 Best Practices in Port Security...................... 11 Programs and Finance ........................... 16 Implications and Conclusions ....................... 23 References ..................................... 28 2. PORTS, TRADE, AND TERRORISM: BALANCING THE CATASTROPHIC AND THE CHRONIC by Edward E. Leamer and Christopher Thornberg ......... 31 Introduction ................................... 31 The Cost-Benefit Analysis of Security .................. 35 Most Shocks Do Not Cause Recessions................. 37 September 11 Did Not Cause the 2001 Recession........ 37 Natural Disasters Also Do Not Cause Recessions ........ 39 How Much Disruption to Supply Chains?............... 42 The Problem Is With Labor ....................... 45 Previous Port Closures Hold Lessons for the Present........ 47 Previous Port Shutdowns Have Not Had a Great Effect on the Economy ............................... 51 Event Studies ................................... 56 v Summary and Conclusions ......................... 59 Appendix...................................... 63 References ..................................... 67 3. THE COSTS OF A TERRORIST ATTACK ON TERMINAL ISLAND AT THE TWIN PORTS OF LOS ANGELES AND LONG BEACH by Peter Gordon, James E. Moore, II, Harry W. Richardson, and Qisheng Pan ................................ 71 Introduction ................................... 71 The Los Angeles and Long Beach Ports................. 73 The Southern California Planning Model ............... 74 Radiological Bomb Attack Simulations ................. 76 Terminal Island Attack Simulation .................... 79 Qualifications and Comparisons...................... 86 Conclusions.................................... 89 References ..................................... 89 4. BOOM BOXES: CONTAINERS AND TERRORISM by Stephen S. Cohen.............................. 91 Introduction ................................... 91 Threats ....................................... 94 Direct Catastrophic Damage ...................... 94 Disabling Autoimmune Reactions................... 99 Itineraries, Scenarios, and Documentation: Or, One Container, Two Containers, Three Containers, Four ... 100 Simple and Less-Simple Itineraries .................. 101 Mixed Loads and Complicated Itineraries ............. 103 “Container Bob” and Other Indicators ............... 104 Defense ....................................... 107 Layers ...................................... 108 Conclusion .................................... 120 The Threats .................................. 120 The Constraints ............................... 120 The Approach to Defense......................... 120 References ..................................... 124 vi 5. HARNESSING A TROJAN HORSE: ALIGNING SECURITY INVESTMENTS WITH COMMERCIAL TRAJECTORIES IN CARGO CONTAINER SHIPPING by Jay Stowsky .................................. 129 Introduction ................................... 129 How Has the Private Sector Responded to the Terrorist Threat to Shipping and Ports?.................... 132 The Coexistence of Successive Technology Generations ..... 135 Other Factors Shaping the Private Sector Response ........ 137 The Need for Standards .......................... 138 “Public Good” Aspects of Maritime and Port Security..... 139 Liability Issues ................................ 140 Tradeoffs Between Security and Other Societal Values .... 142 The Special Sensitivity of the Security Market to Terrorist Events .................................... 143 Key Technologies ................................ 143 Sensor Technologies ............................ 144 Identification and Authentication Technologies ......... 145 Screening Technologies .......................... 146 Surveillance Technologies......................... 147 Antitamper Seals and Tracking and Inspection Technologies ............................... 147 Integrated Solution and Data Analysis Technologies ...... 149 Conclusions and Policy Recommendations .............. 151 References ..................................... 153 6. GOVERNANCE CHALLENGES IN PORT SECURITY: A CASE STUDY OF EMERGENCY RESPONSE CAPABILITIES AT THE PORTS OF LOS ANGELES AND LONG BEACH by Amy B. Zegart, Matthew C. Hipp, and Seth K. Jacobson .. 155 Introduction ................................... 155 Organizational Challenges .......................... 157 Background .................................. 157 Findings and Recommendations .................... 162 Status of Implementation......................... 165 Conceptual Challenges ............................ 168 Background .................................. 168 vii Community Emergency Response Teams.............. 171 Findings and Recommendations .................... 172 Status of Implementation......................... 173 Obstacles and Success Factors ....................... 176 Key Success Factors ............................. 178 Conclusion .................................... 180 Interviews ..................................... 181 References ..................................... 182 7. THE GOVERNMENT RESPONSE: U.S. PORT SECURITY PROGRAMS by Jon D. Haveman, Howard J. Shatz, and Ernesto Vilchis ... 185 Introduction ................................... 185 Port Security Before the September 11 Attacks............ 187 Current Port Security Measures ...................... 190 Maritime
Recommended publications
  • Shipping and Port Security: Challenges and Legal Aspects
    The Business and Management Review, Volume 10 Number 5 December 2019 Shipping and port security: Challenges and legal aspects Zillur Rahman Bhuiyan Managing Director, Marinecare Consultants Bangladesh Ltd. Marine Consultant in Maritime Safety and Security Key Words Globalization, ISPS Code, maritime transport system, security threats, UNCLOS. Abstract The current trend of globalization provides intense impact on access to resources, raw materials and markets, expedited by modern maritime transport system comprising shipping and port operations. Security of ships and port facilities, thus, discernibly an enormous challenge to the globalized world. The international maritime transport system is vulnerable to piracy, terrorism, illegal drug trafficking, gun-running, human smuggling, maritime theft, fraud, damage to ships & port facilities, illegal fishing and pollution, which can all disrupt maritime supply chains to the heavy cost of the global economy. This paper discusses the nature and effect of the security threats to the international shipping and port industry with impact on the international trade & commerce and governmental economy, taking into consideration of the emerging geopolitics, Sea Lines of Communication, chokepoints of maritime trading routes and autonomous ships. The existing legislative measures against maritime security appraised and evolution of automation and digitalization of shipping and port operations taken into consideration. Studying the contemporary maritime transport reviews, existing legislation and the threat scenarios to the shipping and port operations, this paper identifies further advancement to the existing maritime security legislation in respect of piracy and terrorism at sea, and recommends amendment to the International Ship and Port Security (ISPS) Code under the SOLAS Convention. 1 Introduction Globalization is based on the unrestricted movement of commodities, resources, information and people enhancing international trade and commerce through connectivity between the places of production and places of consumption.
    [Show full text]
  • ISSUE 2 Holy Family Writes
    Issue 2 Term 3 August 2020 “Crafty Writers” Your writing is only limited to your imagination! Follow the year levels to see the amazing efforts our This issue, we are showcasing students are making to craft student work that shows a their words so cleverly. variety of author crafting techniques, such as use of of italics, alliteration, similes, Index: onomatopoeia, interrobang, ellipsis and many more! Reception/Year 1 Year 2 Authors in the Year 3 making… Year 4 We hope that in publishing this Year 5/6 digital magazine our young writers feel a sense of great ownership and achievement. Reception/ Year 1 Book making fun in R/1MR Reception/ Year 1 Book making fun in R/1MR Reception/ Year 1 By Athian R/1MP Reception/ Year 1 By Aisha R/1JH Reception/ Year 1 By Ambrose R/1MP Reception/ Year 1 By Dylan R/1MP Reception/ Year 1 By Lina R/1MP Reception/ Year 1 By Ariana R/1JH Reception/ Year 1 By Vincent R/1JH Reception/ Year 1 By Yasha R/1JH Reception/ Year 1 By Isla R/1MP Reception/ Year 1 Reception/ Year 1 Reception/ Year 1 By Kevin R/1MP Reception/ Year 1 Reception/ Year 1 Reception/ Year 1 By Sehana R/1MP Reception/ Year 1 Reception/ Year 1 Reception/ Year 1 Reception/ Year 1 By Victoria R/1MP Reception/ Year 1 Reception/ Year 1 By Hartley R/1MP Reception/ Year 1 Reception/ Year 1 Reception/ Year 1 By Abel R/1MP Year 2 By Cooper 2FA Year 2 By Cooper 2FA Year 2 By Sara 2FA Year 2 By Sara 2FA Year 2 By Sara 2FA Year 2 Year 2 By Dung 2RG Year 2 Year 2 Year 2 Year 2 Year 2 Year 2 By Beau 2RG Year 3 Circus Story Year 3 By Thuy 3JW Year 3 Year 3 Year 3 Year 3 By Vi 3JW Year 3 Dr Seuss is 87 years old.
    [Show full text]
  • Inside Islam Screening Kit – Copyright 2009-2010 Unity Productions Foundation
    Inside Islam A UPF Documentary Film Based on the Gallup Poll of Worldwide Muslim Public Opinion Executive Producers: Michael Wolfe and Alex Kronemer Screening Kit Table of Contents Conducting A Screening in Your City Executive Summary 3 Models Examples to Follow 4 Criteria for Conducting a Screening 5 Recommendations 6 Sample Program 7 Budgeting Example Costs for Different Locations 8 Budget Breakdown 8 Raising Funds and Getting Sponsors Funds for the Screening 12 Getting Organizations on Board and Getting Sponsors 12 Slide for Sponsors in Slideshow 12 Ticket Sales Tips 13 UPF’s Role in the Screening What UPF Can Provide 13 Dates Available 13 Organizer Roles 14 FAQ’s 16 Review…Next Steps 17 Samples & Articles Publicity/Invitation 20 Sponsorship/Feedback Forms 22 Sample Press Release 24 Biographies of Possible Speakers from UPF 28 2 Inside Islam Screening Kit – Copyright 2009-2010 Unity Productions Foundation www.upf.tv 3 Inside Islam Screening Kit – Copyright 2009-2010 Unity Productions Foundation www.upf.tv Conducting a Screening in Your City Executive Summary This ‘Screening Kit’ will take you through the process of planning a screening for UPF’s Inside Islam film in ​ ​ your city. Simply put, a ‘screening’ is a showing of the film to a live audience, which typically takes place in a proper theater and often features a speaker associated with the film. Screenings also feature a reception before or afterward. Conducting a screening is a way of bringing the community together, and building bridges across racial and religious lines, thus promoting UPF’s mission. It’s also a celebration of a completed project and a way of rewarding you and the supporters in your area who have helped make this project a reality.
    [Show full text]
  • The Little SAS® Book a Primer THIRD EDITION
    The Little SAS® Book a primer THIRD EDITION Lora D. Delwiche and Susan J. Slaughter The correct bibliographic citation for this manual is as follows: Delwiche, Lora D. and Slaughter, Susan J., 2003. The Little SAS Book: A Primer, Third Edition. Cary, NC: SAS Institute Inc. The Little SAS Book: A Primer, Third Edition Copyright © 2003, SAS Institute Inc., Cary, NC, USA ISBN 1-59047-333-7 All rights reserved. Produced in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc. U.S. Government Restricted Rights Notice: Use, duplication, or disclosure of this software and related documentation by the U.S. government is subject to the Agreement with SAS Institute and the restrictions set forth in FAR 52.227-19, Commercial Computer Software-Restricted Rights (June 1987). SAS Institute Inc., SAS Campus Drive, Cary, North Carolina 27513. 1st printing, November 2003 SAS Publishing provides a complete selection of books and electronic products to help customers use SAS software to its fullest potential. For more information about our e-books, e-learning products, CDs, and hard- copy books, visit the SAS Publishing Web site at support.sas.com/pubs or call 1-800-727-3228. SAS® and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration. Other brand and product names are trademarks of their respective companies.
    [Show full text]
  • Andover Samples Uncommons Harvard, Yale Increase Financial
    “VERITAS VISIT US ON THE WEB AT SUPER www.phillipian.net OMNIA ” Volume CXXX, Number 26 Phillips Academy, Andover, Massachusetts January 11, 2008 GREEN, MURPHY Andover Samples APPLY FOR DEAN Uncommons By SARAH JACOBSON and OF STUDenTS JOB COURTNEY KING Students Split on Crisp - sizzle - fresh - as students, faculty Size of Their Role in the and staff adapt to Phillips Academy’s new dining facility, there are both smiles at the Selection Process organic bar and frowns in the long lines. The expanded dining hall has created new By CHARLES SHOENER benefits and obstacles for the staff as well as students and faculty. Uncommons staff enjoy Chad Green, West Quad North the larger work area, said Pedro Javier. “Es Cluster Dean and Director of Com- más ambigo.” It’s bigger. munity Service, and Paul Murphy, But the increased size also comes with Instructor in Math and Director of more work. Summer Session, are the two candi- Lidia Soto, an Uncommons staff member, dates for Dean of Students and Resi- said, “Está más trabaja, más que limpiar.” dential Life, according to two faculty There is more work, more to clean. members. Dale Hurley, Instructor in Mathematics, The candidates’ names have not also had issues with the new size. “It was yet been officially announced, but an tough [to find food] at first,” he said. email to faculty is expected today, Many students love the improved food according to Rebecca Sykes, Associ- and facility. ate Head of School. Mary Doyle ’08 said, “Love the [organic] Green and Murphy both submit- wheat and cheese - my favorite part.” ted a letter of interest and a resume to Uncommons opened its doors for the first Sykes.
    [Show full text]
  • MUHAMMAD: Life of a Prophet” • 12/4/02 • 1
    M U H A M M A D – Script 9/25/2002 DATE: September 25, 2002 Approved : ______ “MUHAMMAD: Life of a Prophet” • 12/4/02 • 1 V I S U A L A U D I O 01:00:00 NARRATOR CUE #1 Fourteen hundred years ago, a humble merchant who could not read or write changed the face of Arabia. His Timing: (sec; frames) name was Muhammad. Today, his influence has spread 27;06 to every corner of the world including the United States... This is his story. And the story of millions of Americans who revere him as God’s final prophet. CG: Underwriting Credits NARRATOR Major Funding of Muhammad: Legacy of a Prophet has been provided by the CORPORATION FOR PUBLIC BROADCASTING and by THE DAVID AND LUCILE PACKARD FOUNDATION, ARABIAN BULK TRADE, SABADIA FAMILY FOUNDATION, THE EL-HIBRI FOUNDATION, the IRFAN KATHWARI FOUNDATION, and MIR IMRAN. Additional funding has been provided by many other organizations and individuals. 01:01:49 NARRATOR "He was neither tall and lanky, nor short and heavy set. When he looked at someone he looked them in the eyes. He was the most generous hearted of men, the 33;18 most truthful of them in speech, the most mild tempered of them and the noblest of them in lineage. Anyone who would describe him would say I never saw before or after him the like of him." Muhammad, described by a contemporary. 01:02:25 KAREN ARMSTRONG Muhammad was a man who faced an absolutely hopeless situation. There was a whole continent virtually of people killing one another in an endless hopeless vendetta, going down a chute of violence and warfare.
    [Show full text]
  • Testimonies of Jewish Converts to Islam Introduction
    Testimonies of Jewish Converts To Islam Introduction Thousands of Jews convert to Islam, from Rabbis to reform Jews, as well as Jews for Jesus, each after research, study and comparison, discover the Truth and Beauty of Islam and how Islam completes our lives, fills our spirits, and brings us closer to God and on the path of Righteousness. Included here are the testimonies of a few of our fellow Jewish brothers and sisters who have accepted Islam as their religion, Allah as their God, and Muhammad as the final Prophet, ameen. 1. Rachel Singer 2. Rabbi of Makhachkala 3. Hajj Mustafa Ali (David Sterling) 4. Suleyman Ahmad 5. Jemima Goldsmith 6. Maryam Jameelah 7. Fouad 8. Michelle 9. Kari Ann Owen 10. Emad ud Deen 11. Michael Wolfe 12. Muhammad Asad 13. From Messiah to Muslim (Shabbetai Zevi) 14. Abdullah Ibn Sailam, the first Rabbi convert 15. Hasan from Yard Al Mukaddasa 16. Reform Jew convert to Islam 17. Rabbi from Morocco: Abdul Haqq Al-Islami 18. Moshe 19. Founder of Al Azhar 20. Muhammad Daniel (1) WHOMEVER HEARS, ANSWER! Rashida S. (Rachel Singer - USA) I came to Islam late, a daughter of a devout Roman Catholic mother/very devout Jewish father. By age 4 I knew of Allah and in 1991 I traveled to Egypt to read some of my writing. I had already spent almost 20 years among the most pious of Jews, had married, had children. When I heard the muezzin* before Fajr* his voice was like the arrow one dreams that a lover will shoot into the heart, it cut & held me unable to speak.
    [Show full text]
  • Aesthetics and Visual Resources
    1 Section 3.1 2 Aesthetics and Visual Resources 3 SECTION SUMMARY 4 This section characterizes the existing aesthetic conditions in the proposed Project area and assesses how 5 the construction and operation of the proposed Project or an alternative would alter them. The aesthetics 6 and visual resources impact analysis evaluates and identifies potential impacts associated with 7 implementation of the proposed Project or an alternative on locally-designated scenic highways, scenic 8 resources, light and glare, and visual character of the proposed Project area. 9 The primary features of the proposed Project and alternatives that could affect aesthetic resources include 10 the addition of up to 12 new cranes, additional berthed ships, and additional terminal lighting. Additional 11 features and activities such as redeveloped buildings and stored containers are also considered in this 12 analysis. 13 Section 3.1, Aesthetics and Visual Resources, provides the following: 14 A description of existing visual characteristics in the Port area (including photographs); 15 A description of key areas from which the proposed Project or alternatives would be visible; 16 A description of existing night lighting conditions; 17 A description of applicable local, state, and federal regulations and policies regarding visual 18 resources and scenic highway designations in the proposed Project area; 19 A discussion of the methodology used to determine whether the proposed Project or alternatives 20 would result in an impact to aesthetic and visual resources; 21 An impact analysis of the proposed Project and six alternatives, which includes simulated photos 22 of the proposed future build-out conditions; and, 23 A description of proposed mitigation measures intended to reduce potential impacts, as applicable.
    [Show full text]
  • Song & Music in the Movement
    Transcript: Song & Music in the Movement A Conversation with Candie Carawan, Charles Cobb, Bettie Mae Fikes, Worth Long, Charles Neblett, and Hollis Watkins, September 19 – 20, 2017. Tuesday, September 19, 2017 Song_2017.09.19_01TASCAM Charlie Cobb: [00:41] So the recorders are on and the levels are okay. Okay. This is a fairly simple process here and informal. What I want to get, as you all know, is conversation about music and the Movement. And what I'm going to do—I'm not giving elaborate introductions. I'm going to go around the table and name who's here for the record, for the recorded record. Beyond that, I will depend on each one of you in your first, in this first round of comments to introduce yourselves however you wish. To the extent that I feel it necessary, I will prod you if I feel you've left something out that I think is important, which is one of the prerogatives of the moderator. [Laughs] Other than that, it's pretty loose going around the table—and this will be the order in which we'll also speak—Chuck Neblett, Hollis Watkins, Worth Long, Candie Carawan, Bettie Mae Fikes. I could say things like, from Carbondale, Illinois and Mississippi and Worth Long: Atlanta. Cobb: Durham, North Carolina. Tennessee and Alabama, I'm not gonna do all of that. You all can give whatever geographical description of yourself within the context of discussing the music. What I do want in this first round is, since all of you are important voices in terms of music and culture in the Movement—to talk about how you made your way to the Freedom Singers and freedom singing.
    [Show full text]
  • U.S. Coast Guard Port Security Unit History
    U.S. Coast Guard Port Security Unit History Early Roots The roots of the Coast Guard's deployable port security mission are traced back to World War I and World War II and the traditional CONUS port safety and security duties of the Captain of the Port (COTP). During World War II, some overseas COTP-type operations were carried out by the Coast Guard in both the Pacific and European Theaters. Experiences in Vietnam demonstrated that a need for Coast Guard port security capabilities in overseas ports continued to exist. During the early 1980's, DoD planners formally identified the need for port security forces in OCONUS seaports of debarkation. Dialogue began between the Army, Navy, and Coast Guard, and the concept of the deployable Port Security Unit (PSU) was born. In January 1985 the Commandant approved three notional PSUs to respond to the requirements of DoD operations plans. The three units were located in the Ninth Coast Guard District at Buffalo, NY, Cleveland, OH, and Milwaukee, WI. Mission Defined PSUs are organized, equipped, and trained to operate in joint security areas, specifically in accessible (ice-free) harbors and port areas worldwide in support of regional Combatant Commanders’ requirements, and in company with DoD for national defense regional contingencies. PSUs provide 24-hour operations under all environmental conditions within the limits of equipment and personnel. PSUs normally protect vessels in transit, at the pier/port complex, or along the waterfront facility. Harbor defense and port security operations are frequently characterized by confined and traffic-congested water and air space. Notional Mission Assessment In the years between the approval of the three notional PSUs and their first deployment in 1990, the PSUs suffered from inconsistent budgetary, programmatic, and training support.
    [Show full text]
  • Maritime Security: Potential Terrorist Attacks and Protection Priorities
    Order Code RL33787 Maritime Security: Potential Terrorist Attacks and Protection Priorities Updated May 14, 2007 Paul W. Parfomak and John Frittelli Resources, Science, and Industry Division Maritime Security: Potential Terrorist Attacks and Protection Priorities Summary A key challenge for U.S. policy makers is prioritizing the nation’s maritime security activities among a virtually unlimited number of potential attack scenarios. While individual scenarios have distinct features, they may be characterized along five common dimensions: perpetrators, objectives, locations, targets, and tactics. In many cases, such scenarios have been identified as part of security preparedness exercises, security assessments, security grant administration, and policy debate. There are far more potential attack scenarios than likely ones, and far more than could be meaningfully addressed with limited counter-terrorism resources. There are a number of logical approaches to prioritizing maritime security activities. One approach is to emphasize diversity, devoting available counter- terrorism resources to a broadly representative sample of credible scenarios. Another approach is to focus counter-terrorism resources on only the scenarios of greatest concern based on overall risk, potential consequence, likelihood, or related metrics. U.S. maritime security agencies appear to have followed policies consistent with one or the other of these approaches in federally-supported port security exercises and grant programs. Legislators often appear to focus attention on a small number of potentially catastrophic scenarios. Clear perspectives on the nature and likelihood of specific types of maritime terrorist attacks are essential for prioritizing the nation’s maritime anti-terrorism activities. In practice, however, there has been considerable public debate about the likelihood of scenarios frequently given high priority by federal policy makers, such as nuclear or “dirty” bombs smuggled in shipping containers, liquefied natural gas (LNG) tanker attacks, and attacks on passenger ferries.
    [Show full text]
  • The Terrorist Naval Mine/Underwater Improvised Explosive Device Threat
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2015 Port Security: The eT rrorist Naval Mine/ Underwater Improvised Explosive Device Threat Peter von Bleichert Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Peter von Bleichert has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Karen Shafer, Committee Chairperson, Public Policy and Administration Faculty Dr. Gregory Dixon, Committee Member, Public Policy and Administration Faculty Dr. Anne Fetter, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2015 Abstract Port Security: The Terrorist Naval Mine/Underwater Improvised Explosive Device Threat by Peter A. von Bleichert MA, Schiller International University (London), 1992 BA, American College of Greece, 1991 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University June 2015 Abstract Terrorist naval mines/underwater improvised explosive devices (M/UWIEDs) are a threat to U.S. maritime ports, and could cause economic damage, panic, and mass casualties.
    [Show full text]