McNicholas | Maritime Security | E-Book | sack.de
E-Book

E-Book, Englisch, 472 Seiten, Web PDF

McNicholas Maritime Security

An Introduction
1. Auflage 2011
ISBN: 978-0-08-091953-9
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

An Introduction

E-Book, Englisch, 472 Seiten, Web PDF

ISBN: 978-0-08-091953-9
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



The commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena--the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary 'choke point' - the load seaports and their ships.
This book provides practical, experience-based, and proven knowledge - and a 'how-to-guide' - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports.
- Holds the keys to successfully designing, implementing, and managing effective port and vessel security programs in a high-risk environment
- Provides real-world experience in Maritime Security from the Managing Director of Phoenix Management Services Group in the USA and Panama.
- Offers specifics of a model port security program and case studies of effective tactics in a high-threat environment

Michael McNicholas is the Managing Director of Phoenix Management Services Group in the USA, Panama, and Costa Rica, Operations Support Services (Panama), and Pathfinder Consulting, LLC in the USA. Michael has over fourteen years of distinguished and progressive Law Enforcement, Military, and Intelligence experience and, most recently, twenty years as Founder/Co-Founder of several successful professional security services corporations in Latin America and the USA. A former Non-Commissioned and Commissioned Officer (Direct Presidential Appointment) in the US Army, Mr. McNicholas served for nine years in Airborne Infantry, Military Police, and Military Intelligence units. Mr. McNicholas held a TOP SECRET security clearance in the Central Intelligence Agency (CIA), where he specialized in counter-narcotics trafficking and international terrorism and served on the Vice President's Narcotics Interdiction Task Force and as the CIA Liaison to US Coast Guard Intelligence. Michael designed, implemented, and managed the internationally-acclaimed seaport security program at Manzanillo International Terminal - Panama, the largest container port in Latin America. In 2003, he spearheaded the successful efforts to have Phoenix Management Services Group designated as the first 'Recognized Security Organization” (RSO) by the Republic of Panama and the Dominican Republic. On behalf of the government of Panama, Phoenix evaluated and approved/rejected Ship Security Plans for over 2,500 ships in the Panama Registry. In the Dominican Republic, Phoenix conducted Port Facility Security Assessments and wrote the Port Facility Security Plans for two of the primary ports in the country. Mr. McNicholas is credited with co-pioneering the Maritime Security Team (Anti-piracy/stowaway/drug trafficking/terrorist) concept in commercial cargo shipping and has Maritime Security Teams deployed onboard container and cargo ships in the Caribbean Sea and Pacific Ocean.

McNicholas Maritime Security jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Cover;1
2;Copyright Page;5
3;Dedication Page;6
4;TOC$Table of Contents;8
5;About the Author;16
6;Contributors;18
7;Preface;20
8;Acknowledgments;22
9;CH$Chapter 1: Commercial Seaports and Modes of Maritime Transport;24
9.1;Objectives;24
9.2;Introduction;24
9.3;Commercial Seaports;25
9.3.1;Container Terminals;26
9.3.2;Bulk Cargo Terminals;40
9.3.3;Cruise Ship Terminals;44
9.3.4;Nontraditonal Ports;45
9.4;Stakeholders;49
9.4.1;Terminal Owners;49
9.4.2;Terminal Operators;50
9.4.3;Stevedore Company;50
9.4.4;Longshoremen;50
9.5;Intermodalism;51
9.6;Modes of Maritime Transport;52
9.6.1;Tankers;61
9.6.2;LNG Tankers;65
9.6.3;Chemical Tankers;65
9.6.4;Container Ships;67
9.6.5;Freighters;68
9.6.6;Bulkers;68
9.6.7;Oceangoing Tugboats;74
9.6.8;Cruise and Passenger Ships;76
9.7;Summary;80
10;CH$Chapter 2: Documentation, Financial Transactions, and Business Entities in Commercial Maritime Transportation;82
10.1;Objectives;82
10.2;Introduction;82
10.3;Purchase of Goods;84
10.4;Filling the Order;84
10.5;Container Stuffing;85
10.6;Making a Booking;86
10.7;Documents Used to Export and Import Cargo;91
10.7.1;Bill of Lading;91
10.7.2;Shipper's Export Declaration;93
10.7.3;Certificate of Origin;93
10.7.4;Commercial Invoice;96
10.7.5;Insurance Certificate;98
10.7.6;Export License;99
10.7.7;Consular Invoice;99
10.7.8;Inspection Certificate;99
10.7.9;Phytosanitary Certificate;100
10.8;The Next Step for the Ocean Carrier;100
10.9;Documents Specific to Import Cargo Only;101
10.9.1;Arrival Notice;101
10.9.2;Pro Forma Invoice;102
10.9.3;Customs Entries Forms;102
10.9.4;Freight Release;103
10.9.5;Delivery Order;105
10.9.6;Duty Drawback;105
10.9.7;Bank Draft;105
10.9.8;Letter of Credit;106
10.10;Business Entities in Commercial Maritime Transportation;106
10.10.1;Freight Forwarders;106
10.10.2;Customs Brokers;107
10.10.3;Ship's Husbands/Agents;108
10.10.4;Ship Managers/Operators;108
10.10.5;VOCC and NVOCC;108
10.10.6;P&I Clubs;108
10.10.7;International Maritime Organization;109
10.10.8;Classification Societies;109
10.10.9;Flag States;110
10.11;Summary;111
11;CH$Chapter 3: International and U.S. Maritime Security Regulation and Programs;112
11.1;Objectives;112
11.2;Introduction;112
11.3;The ISPS Code;113
11.3.1;Amendments to SOLAS;136
11.4;WCO's Framework of Standards to Secure and Facilitate Global Trade;139
11.5;U.S. Laws and Programs;140
11.5.1;Maritime Transportation Security Act (MTSA);140
11.5.2;Customs-Trade Partnership Against Terrorism (C-TPAT);141
11.6;C-TPAT Security Criteria for Sea Carriers;142
11.6.1;Business Partner Requirements;143
11.6.2;Security Procedures;143
11.6.3;Container Security;144
11.6.4;Physical Access Controls;144
11.6.5;Personnel Security;145
11.6.6;Procedural Security;146
11.6.7;Security Training and Awareness;146
11.6.8;Physical Security;146
11.6.9;Information Technology Security;147
11.6.10;Security Assessment, Response, and Improvement;147
11.7;24-Hour Advance Manifest Rule and the Container Security Initiative (CSI);149
11.8;Secure Freight Initiative;150
11.9;Safe Port Act of 2006;150
11.10;Summary;152
12;CH$Chapter 4: Vulnerabilities in the Cargo Supply Chain;154
12.1;Objectives;154
12.2;Introduction;154
12.3;Vulnerabilities and Their Potential Impact;155
12.4;Lessons Learned from the Drug War;157
12.5;Recommended Security Practices at the Production/Loading Phase;158
12.5.1;Manufacturer, Factory, and Plant;158
12.6;Recommended Security Practices at the Export Phase;163
12.6.1;Carriers and Seaports;163
12.7;Recommended Security Practices at the Importation/Distribution Phase;165
12.7.1;Ports of Entry and Importers;165
12.8;Special Vulnerabilities in the Maritime Environment;168
12.8.1;Cargo Theft;168
12.8.2;Internal Conspiracies and Techniques Used to Circumvent Security;171
12.8.3;Container Seals;174
12.9;"Red Flags" of Possible Criminal/Terrorist Surveillance;182
12.10;Summary;183
13;CH$Chapter 5: Plagues of the Seas: Piracy and Stowaways;184
13.1;Objectives;184
13.2;Definition and Historical Beginnings;184
13.3;Highlights of Recent Cases of Piracy;185
13.4;Tactics and Techniques in Piracy;190
13.5;Trends in Piracy;191
13.6;The Linkage Between Piracy, Organized Crime, and Terrorism;192
13.7;Stowaways: The Other Plague;195
13.7.1;The Motivation of the Stowaway;196
13.7.2;Techniques and Tactics Used by Stowaways;199
13.8;Summary;210
14;CH$Chapter 6: Drug Smuggling via Maritime Cargo, Containers, and Vessels;212
14.1;Objectives;212
14.2;Illegal Drug Origins and Production;212
14.3;Maritime Smuggling Routes and Trends;215
14.4;Drug Smuggling Methods and Techniques;219
14.4.1;Drug Smuggling via Cargo;220
14.4.2;Drug Smuggling via Containers;227
14.4.3;Drug Smuggling via Vessels;236
14.5;Summary;247
15;CH$Chapter 7: Terrorism and Commercial Maritime Transportation;248
15.1;Objectives;248
15.2;The Definition of Terrorism;248
15.3;Brief Review of the History of Terrorism;249
15.4;Current Trends in Terrorism;250
15.5;Types of Weapons Utilized by or Potentially Available to Terrorists;256
15.5.1;Explosives;256
15.5.2;Small Arms and Infantry Weapons;259
15.5.3;Weapons of Mass Destruction (WMDs);263
15.5.3.1;Chemical Weapons;263
15.5.3.2;Biological Weapons;266
15.5.3.3;Radiological Weapons;267
15.5.3.4;Nuclear Weapons;270
15.6;Terrorist Targeting of Ships and Ports;271
15.7;Use of Ships, Cargo, and Containers to Transport Terrorists and Materials;275
15.8;Cooperation with Narcotics Traffickers and Other Terrorist Organizations;281
15.9;Summary;284
16;CH$Chapter 8: A Strategic Blueprint for World-Class Seaport Security;286
16.1;Objectives;286
16.2;External Security Ring;289
16.2.1;Intelligence Operations;289
16.2.2;Government and Law Enforcement Liaison;289
16.3;Perimeter Security Ring;289
16.3.1;Physical Security Barrier and Illumination;289
16.3.2;Waterside Security Measures;289
16.3.3;Perimeter Intrusion Detection;291
16.3.4;Entrance and Exit Gates;291
16.3.5;Access Control Policy and Procedures;293
16.3.6;Port Identification Badge System;294
16.3.7;Narcotics Control at Access Points;294
16.3.8;Explosives Detection at Access Points;294
16.3.9;Weapons of Mass Destruction Detection at Access Points;295
16.4;Inner Security Ring;295
16.4.1;Mobile Security Patrols;295
16.4.2;Foot Security Patrols;296
16.4.3;Security Operations Command Center;296
16.4.4;Shift Security Superintendent;296
16.5;Site and Asset-Specific Security Rings;296
16.5.1;Administrative and Operations Office Buildings;296
16.5.2;Bonded and High-Risk Warehouses;297
16.5.3;Critical Assets and Essential Equipment;297
16.6;Vessel Security Ring;298
16.6.1;Basic Concept;298
16.6.2;VST Deployment for LO/LO Commercial Cargo/Container Vessels and Tankers;298
16.6.3;VST Deployment for RO/RO Vessels;301
16.6.4;Key Vessel Security Procedures;303
16.6.5;Predeparture Search for Contraband and Unauthorized Persons;304
16.7;Security Personnel Employment and Training;316
16.7.1;Pre-Employment Screening;316
16.7.2;Basic Security Training;316
16.7.3;Security Officer Equipment;318
16.8;Port Security Director;319
16.9;Port Facility Security Plan (PFSP/FSP);319
16.10;Summary;319
17;CH$Chapter 9: Port Security Management;320
17.1;Objectives;320
17.2;The Port Security Director;320
17.3;The Systems Approach, ISO Certifications, Strategic Planning, and Metric Management;324
17.4;A Multiorganizational Approach Toward Port Security;328
17.5;The Importance of Comprehensive Job Descriptions;332
17.6;Planning and Conducting Security-Related Training;334
17.6.1;Visual/Verbal Learners;335
17.6.2;Visual/Nonverbal Learners;335
17.6.3;Auditory/Verbal Learners;335
17.6.4;Tactile/Kinesthetic Learners;335
17.6.5;Designing Training for Different Types of Learners;336
17.7;Intelligence and Its Role in Maritime Security;339
17.8;Risk Management and Port Security;343
17.9;Contingency Planning: A Critical Part of Port Security.Management;349
17.9.1;Getting the Maritime Community Excited About Contingency Planning: A Brief Look at an Introduction to a Contingency Planning Training Session;350
17.9.2;Looking for Well-Respected Sources and Standards on Contingency Planning;353
17.9.3;The Incident Command System (ICS) and the National Incidents Management System (NIMS);353
17.9.4;Testing Training and Planning Through Exercises and Drills;357
17.10;Summary;361
18;CH$Chapter 10: Threat Mitigation Strategies;362
18.1;Objectives;362
18.2;Mitigating Pirate Attacks;364
18.3;Hostage Survival and Rescue;368
18.4;Cargo Container Inspection Techniques;371
18.5;Security Equipment, Systems, and Devices Used to Detect Contraband and Unauthorized Persons in a Container;384
18.6;Summary;388
19;CH$Chapter 11: Information Security and Assurance;390
19.1;Objectives;390
19.2;Introduction;390
19.3;Brief History of Information Security;391
19.4;The Information Security Function in a Maritime Company;392
19.5;Key Concepts in the Field of Information Security;393
19.6;Essential Infosec Objectives;393
19.7;Levels of Computer Security;394
19.7.1;Computer Hardware and Software;395
19.7.2;Logical Levels of Computer Security;395
19.7.2.1;Internet Security;395
19.7.2.2;Network Security;396
19.7.2.3;Enterprise Resource Planning Systems Security;396
19.7.2.4;Database Security;397
19.7.2.5;Application Security;397
19.8;Common Vulnerabilities in the Electronic Commerce Environment;397
19.9;Human Threats to Information Security;397
19.10;Technical Risks;399
19.10.1;Risks of Theft and Loss of Data;399
19.10.2;Mechanical Failures;400
19.10.3;Computer Viruses and Malware;400
19.10.4;Denial of Service Attacks;401
19.10.5;Criminal and Sociological Issues;401
19.11;United States Government Organizations;402
19.11.1;Department of Homeland Security;402
19.11.2;Department of Defense;403
19.11.3;Federal Bureau of Investigation;403
19.11.4;US-CERT;403
19.11.5;Computer Emergency Readiness Team/Coordination Center;404
19.11.6;National Institute of Standards and Technology;404
19.12;National Security and Public Policy Issues;404
19.13;Political, Cultural, and Economic Issues;405
19.14;Summary;405
20;Further Reading;406
21;Glossary;408
22;IDX$Index;454



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.