The Perceived Effectiveness of Container Security at Seaports Along the Gulf Coast

The Perceived Effectiveness of Container Security at Seaports Along the Gulf Coast

University of Mississippi eGrove Electronic Theses and Dissertations Graduate School 2012 The Perceived Effectiveness of Container Security at Seaports Along the Gulf Coast William Augustus Neely Follow this and additional works at: https://egrove.olemiss.edu/etd Part of the Transportation Commons Recommended Citation Neely, William Augustus, "The Perceived Effectiveness of Container Security at Seaports Along the Gulf Coast" (2012). Electronic Theses and Dissertations. 208. https://egrove.olemiss.edu/etd/208 This Thesis is brought to you for free and open access by the Graduate School at eGrove. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of eGrove. For more information, please contact [email protected]. THE PERCEIVED EFFECTIVENES OF CONTAINER SECURITY AT SEAPORTS ALONG THE GULF COAST A Thesis presented in partial fulfillment of requirements for the degree of Master of Criminal Justice in the Department of Legal Studies The University of Mississippi by WILLIAM A. NEELY, III May 2012 Copyright William A. Neely, III 2012 ALL RIGHTS RESERVED ABSTRACT With approximately 90% of the world’s goods shipped via cargo containers, it is vital for the security of these containers to be complete and effective. However, given the volume of containers transiting U.S. seaports, the task of providing subsequent security is complicated and, arguably, improbable. Nevertheless, the data analyzed throughout this study disputes that the current cargo container paradigm can be enhanced to accommodate the significant workload. The research conducted throughout this study provided perceptions that were indicative of a security environment that could be and must be improved. More specifically, the data revealed that the biggest threat facing containers was their susceptibility to be exploited for smuggling purposes. In addition, all of the participants acknowledged the use of a layered security framework at their respective ports. However, this “layered” approach was insufficient to scan even a fraction of the containers imported to the U.S. As a result of the limitations associated with container security, the majority of containers receive no form of inspection until their arrival to U.S. seaports. This makes it impossible to inspect and, even, scan 100% of containers. With that in mind, the participants in this study believe that container security could progress, but without knowledgeable, proper and efficient use of technology, no such improvement is achievable. Furthermore, unilateral cooperation from the rest of the global seaport community is essential for container security to advance. Finally, the insurmountable task of providing a dynamic and resilient security framework hinges on CBP’s ability to facilitate and collaborate with the entire seaport community. Keywords: container, WMD, terrorism, security, deputy port directors, inspection, scan ii DEDICATION This work is dedicated to my friends and family. Their support, patience and encouragement, undoubtedly, gave me the fortitude to complete this research. I would also like to dedicate this work to the men and women serving in all branches of the United States military. iii LIST OF ABBREVIATIONS AND SYMBOLS WMD weapon of mass destruction CTPAT Customs Trade Partnership Against Terrorism ATS Automated Targeting System SFI Secure Freight Initiative ISF Importer Security Filing TWIC Transportation Worker Information Credentials CSI Container Security Initiative OSC Operation Safe Commerce TEU Twenty equivalent unit USCG United States Coast Guard CBP Customs and Border Protection DOE Department of Energy GAO Government Accountability Office NII Nonintrusive imaging TSA Transportation Security Agency IMB International Maritime Bureau ISO International Organization of Standardization IAEA International Atomic Energy Association VACIS Vehicle and Cargo Inspection System iv ACKNOWLEDGEMENTS I would like to acknowledge the faculty members who served on my committee: Dr. Michael P. Wigginton, Jr., Dr. Linda Keena, and Dr. Carl J. Jensen. Without their patience and dedicated effort to assist me through this process, I wouldn’t have been able to complete this thesis. Most importantly, I would like to thank Dr. Michael P. Wigginton, Jr. for introducing me to the complicated, yet noteworthy world of transportation security and, more specifically, the importance of container security. Furthermore, his persistent tolerance of my stubbornness made this thesis possible and for that I will always be always be thankful. I would like to thank Dr. Linda Keena for her detailed knowledge of the APA manual and her generous willingness to extend that knowledge to me at a moments notice. Also, I would like to thank Dr. Carl J. Jensen for his guidance and assistance through this entire process. The unwavering cooperation and guidance that my committee exhibited made this thesis achievable and their sacrifices will not be forgotten. Also, I would like to thank Assistant Professor Robert Mongue, J.D., Interim department chair Dr. Stephen L. Mallory, Ms. Carol Reid and the faculty of the Department of Legal Studies for their continued support and dedication towards myself and my fellow graduate students. Additionally, I would like to thank SFC Cameron C. Campbell for introducing me to the online world of the Government Accountability Office, where from a significant majority of my research was based and referenced. Finally, I would like to thank all of the participants at the seaports mentioned within this study. Without their enthusiasm to cooperate and share their particular knowledge, this study v wouldn’t have been feasible. Their generous effort and constant professionalism made this research a more agreeable experience. Although my words of gratitude will never be able to equal the amount of appreciation that I’m attempting to illustrate, their assistance through this process will not soon be forgotten. vi TABLE OF CONTENTS Page ABSTRACT ................................................................................................................................... ii DEDICATION……………………………………………………………………………………iii LIST OF ABBREVIATIONS AND SYMBOLS………………………………………………...iv ACKNOWLEDGMENTS………………………………………………………………………...v LIST OF FIGURES ...................................................................................................................... ix CHAPTER 1: INTRODUCTION .................................................................................................. 1 Threats to Containers ......................................................................................................... 3 Primary Agencies Involved in Container Security ............................................................ 6 Previous Initiatives and Actions Taken ............................................................................. 7 Ports of Interest ................................................................................................................ 11 Statement of the Problem ................................................................................................. 12 Purpose of the Study ........................................................................................................ 14 Assumptions and Limitations .......................................................................................... 15 Significance of the Study ................................................................................................. 16 Definition of Key Terms .................................................................................................. 16 CHAPTER 2: LITERATURE REVIEW ..................................................................................... 21 Twenty Equivalent Units ................................................................................................. 24 Piracy ............................................................................................................................... 26 Types of Vessels Targeted by Piracy ............................................................................... 32 Organized Crime and Terrorism ...................................................................................... 36 Container Theft ................................................................................................................ 38 Stowaways ....................................................................................................................... 39 Agencies Responsible for Security .................................................................................. 42 Seaports of the Study ....................................................................................................... 43 Operation Safe Commerce ............................................................................................... 47 Container Security Initiative ............................................................................................ 49 24 Hour Rule .................................................................................................................... 52 Automated Targeting System .......................................................................................... 54 Secure Freight Initiative ................................................................................................... 57 Strategic Trade Corridor Strategy .................................................................................... 61 Importer Security

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    168 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us