Topic > Port Security Operations and Maritime Cyber ​​Terrorism in the United States

The facility security officer (FSO) is very similar to the Protective Services Officer (PSO) in the protective services world. The FSO is mainly responsible for directing and implementing policies to safeguard the security of the specific port to which they have been assigned. No matter how good the FSO is, it cannot fulfill its role alone. Their work is a combination of knowing the laws, implementing physical security measures such as patrols and static watches, and incorporating multiple jurisdictional agencies to successfully complete the mission. The FSO uses a myriad of sources to assess these national and international risks. Literally, intelligence is gathered from information that can come from anywhere; With today's interconnected and networked world, these sources can be the Internet, open publications, or even social media. With the plethora of agencies like the FBI, DHS, and even the CIA contributing to intelligence, updated databases are a very powerful tool that the FSO can rely on. Information sharing is essential as a tool in the security arsenal, as we unfortunately learned the hard way on the morning of September 11, 2001. Once threats are identified and established, the FSO informs its team about the threat and implements measures based on the updated FSP on how to mitigate and respond to threats. If terrorism is on the table, the FSO may decide to close the port altogether and divert ships to different ports. Utilizing Coast Guard and DHS resources, this measure represents the ultimate protection against terrorism. The FSO also uses security investigations that outline a plan and identify immediate threats. Furthermore, these investigations allow the FSO to see what resources are available to it. Investigations also establish emergency actions such as nearest escape routes, safe havens such as police stations and hospitals. The FSO can then use this information to activate the FSP. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay The FSO can use intelligence gathered by the Department of Justice and Defense and even surveillance and CCTV footage. Available documentation comes from FEMA, such as the Manual for Mitigating Potential Terrorist Attacks on Buildings; Form CG-6025; and the Maritime Transportation Security Act of 2002. The U.S. Coast Guard and DHS will be tasked with intercepting any threat entering the port; however, the FSO will dictate and guide threats to the port itself. Port technologies such as radiation detection, X-ray and cargo scanning also help the UST in its mission. According to Christopher (2014), the technologies that the FSO can rely on to defend against threats from water are sonar and radar capabilities and divers. Each aspect brings different things to the table. Intelligence is power and allows the FSO to make informed decisions. Surveillance is equally powerful but is limited to where the patrol is carried out, how information is collected and, more importantly, what information cannot be collected. Roving patrols and stationary guards are effective; however, these are more of a deterrent measure than an active shutdown. Intelligence combined with technology with an intelligent UST is the most powerful combination. As I said before, however, this is not an individual mission. The Role of the United States Coast Guard in Port Security Operations The United States Coast Guard is an arm of the Department of Homeland Securitydeveloped to enforce maritime laws and defend the coastline along the United States and its ports. Its mission is to monitor and protect waterways and implement protection, mitigation, and response measures to immediate threats in U.S. waters by following regulations outlined in the USC. The Coast Guard is tasked with protecting citizens and their personal property, protecting the nation's marine transportation system and protecting it against terrorist attacks, criminal and malicious actors, and associated crimes. The Coast Guard has multiple responsibilities when it comes to port security operations. The U.S. Coast Guard also contributes to port security by participating in the International Port Security (IPS) program. The Coast Guard visits foreign ports and provides recommendations on updates to their current security and also assists in screening cargo destined for the United States. Since ports contribute enormously to the national economy, this role is essential to avoid disruptions. Overall the Coast Guard takes a multi-layered approach. For example, in the case of a vessel that does not meet safety requirements or that is detaining cargo from a port that is not a member of the international ISPS agreement, the United States Coast Guard applies its jurisdictional authority by preventing such vessels to reach US ports or by thoroughly checking incoming ships and cargo before proceeding. The U.S. Coast Guard can also set up security zones, a kind of perimeter to screen and discourage ships from entering high-risk areas. With terrorism coming from everywhere, the United States Coast Guard also performs normal traffic duties on waterways acting as law enforcement authorities. Having a direct impact on port security, the U.S. Coast Guard is tasked with regularly conducting Threat and Hazard Identification and Risk Assessment (THIRA) at ports, delineating port facilities, including any facilities surrounding ports and areas of vulnerability. noted above, the world is now interconnected and networked. Critical infrastructure depends on functioning and secure networks. Our nation's ports are also part of this infrastructure. Ports represent a significant portion of the nation's GDP, and any disruption equates to lost money and jobs. With the recent election, our nation has seen the power of malicious intent in using actors to negate security protocols. The nation's ports are susceptible to maritime cyberterrorism in part because of our reliance on these networks to conduct our mission. Attacks against port facilities and ships could be conducted for myriad reasons. Some of these are identity and property theft, national security interventions, and intelligence discovery for terrorists and malicious state actors. Everything is controlled electronically by computers. If the systems were hacked and bypassed, information about the shipment, cargo, crew and destination could be obtained, which would ruin the integrity of the ports. If surveillance cameras and CCTV cameras could be controlled remotely, vital security information could be obtained that would make the nation's ports extremely vulnerable. No matter how tight the security networks and cybersecurity are, there will always be exploitations on these networks. In the world of security, we have dedicated teams of communicators and network specialists who are with us 24/7, because they know how vulnerable these!