SlideShare a Scribd company logo
The Port Security Plan - Management of Tasks and
Responsibilities
Our week three lesson will explore the maritime port security
environment and the resultant security demands inherently
placed on the port security management team. More
specifically, the security management team is charged with the
responsibility for ensuring all port security elements are
successfully planned, developed, and executed in order to
execute vital security tasks and responsibilities associated with
a safe and secure maritime port.
No doubt the security management team is one of the most
important components when trying to protect against terrorists,
criminal activities, and other commercial, industrial and natural
disasters that can impact a maritime port. Further, failure to
properly assess, plan and execute the fundamental port security
tasks and responsibilities required would be disastrous to port
security operations in general. As a result, the focus for lesson
three will identify and assess key policy and procedures
necessary for successfully executing maritime security
management operations. Moreover, the importance in building a
solid port security posture must start right at the top of the
organization, to include the port security leadership staff and
the guard force.
As many already know, it all starts at the top. Poor leadership
will result in poor decisions and substandard performance from
the staff, which will ultimately flow down and impact the entire
security workforce. An inept and incompetent security staff will
thoroughly corrupt the ability of the organization to adequately
guard and protect the port as a whole. Poor leadership will
cripple a port, and potentially jeopardize the national security
of the U.S. Also, inexperienced and poorly trained managers
will set the stage for major security gaps in the port to emerge
rapidly, leading to possible exploitation of these gaps by
nefarious individuals…who likely have designs centered on
terrorism or criminal acts. This is further complicated by the
fact that all U.S port’s security funding for current and future
budget years will be substantially cut. Understanding this, it is
essential that the port security teams have continuous education
and skills training to maintain force competencies.
Just as important, the security team must be knowledgeable of
the critical organizational components within the port that tie
into port security. Christopher identified these components as
the communication systems and information sharing capability;
building and maintaining a qualified professional staff;
conducting basic and advance security training; fostering
teamwork, camaraderie, and mission planning. Parallel to these
operational components, it is also important that the port
security team effectively respond to and interface effectively
with incident management systems, attention to communications
interoperability, public/media relations, written plans, policies,
procedures, and last, but not least, mutual aid agreements
(Christopher, 2009, p. 96).
Understanding the depth of the required tasks and
responsibilities require that the port security manager and the
security team be cognizant of how they can best meet the
operational and security needs of the port and its private sector
clients. Bottom line, security managers need to use a layered
approach to security which means using a variety of tools that
provide a strong defense against terrorism, crime, and other
identified risks we have already discussed.
Integrating Technology
In regards to the components of security planning, one of the
biggest that contributes directly to port security planning is the
inclusion of advanced security systems that can be incorporated
into the actual design phase of any new port facility. With new
and improved technologies being developed and introduced each
day, new methods of building an entire security systems must be
assessed and evaluated to make sure they are constructed in the
most cost effective and efficient manner. The ability to
mitigate security risks and gaps through advanced technology
application integration for all new facilities is most important.
It is essential that security infrastructure needs are planned for
during the phase known as the design and architecture stage.
This will ensure that security managers won’t need to request
for security infrastructure changes at a later time, which will
likely result in costly retrofitting of port facilities.
Additionally, budgets cuts will not allow for these post design
phase changes, so it is imperative that security managers get it
right the first time. The days of excessive cost overruns due to
poor planning or design efforts are no longer acceptable in
today’s constrained resource environment.
The Private Sector
Much has been said of the maritime private sector security
connection and the critical role they play in port security
planning. First and foremost, the private sector stakeholder
input is vital to proper port security planning. Knowing what
the internal and external customers’ needs are and how to meet
them is essential to security planning for port operations.
Additionally, a proven and tangible method of identifying ways
to mitigate attacks and other events is having hypothetical
exercise scenarios developed for operational testing and
validation. Conducting these operational tests and
organizational exercises enhances security systems knowledge
and understanding, and results in workable solutions for
comprehensive port security operations. Knowing the security
components and the various approaches available to
management in order to mitigate and remove security gaps with
the private sector working within the port environment is
extremely important. Lastly, including the private sector while
developing and executing a robust test and exercise program is
a best practice for enhanced port security.
In addition, having private sector input during the design and
architecture stage is vital. Rebuttals, views and opinions from
differing parties should be encouraged and welcomed in order to
ensure one party isn’t “angling” their advice or recommendation
to achieve an underlying motive. If one party were the only one
engaging with the development team, then effective security
components could possibly get overlooked or dumped. The
desired end-state is that everyone must work together to achieve
the same goal….a safe and viable port.
Fortress Mentality
No discussion on port security is complete without
understanding the issue of “fortress mentality” within the port
environment. Simply explained, engineers and architects
specialize on how to build things effectively and efficiently.
This is why we commission them in the first place. However,
that doesn’t mean they know how precisely the security systems
must work or even understand how the port security systems are
properly integrated into the larger security system that protect
the port. Therefore, the port security manager must ensure there
isn’t too much security, where it becomes a detriment to
production as opposed to a contribution to the overall port
production. The goal is to find the right balance between port
production verses a state of excessive security policies and
procedures that bottleneck port operations. The author is not
suggesting we spin the dice and sacrifice security for
production, but slowing down port production to the point it is
no longer viable to conduct business operations due to excessive
security procedures, is fortress mentality. Fortress mentality
will stifle operational processes and procedures that pay the
bills. Too much security is counterproductive when it prevents
the operational component from reaching max production
efficiency.
Finding Balance
One way to find balance is through the “The Secure Freight
Initiative” (SFI). The SFI is a Department of Homeland Security
(DHS) program and part of the SAFE Port Act of 2006. The SFI
uses nuclear detection technology in foreign ports. The
equipment used to support the SFI scans containers for threats
and automatically notify the host country authorities and the
DHS.
This allows both countries to take action and prevent any major
incidents from occurring, such as a WMD placed in a container.
Another important initiative is the implementation of the
Container Security Initiative (CSI) managed through the
Customs and Boarder Protection (CBP) Agency. With the
detection equipment and other cyber centric systems in place,
CBP will have near real-time information such as manifest
submissions to help with risk assessments of shipments coming
to American ports. This is supportive and a derivative of the
Secure Freight Initiative. According to Homeland Security in
the Secure Freight Initiative, 2012, “The Secure Freight
Initiative builds upon a risk-based approach to securing the
international supply chain by leveraging programs like the
Megaports Initiative, Container Security Initiative, and the
Customs Trade Partnership Against Terrorism (C-TAPT)
program.” Each of the initiatives reduces a massive risk burden
on the port security management team, as all high risk
containers are inspected before even arriving in any U.S. Port.
In summary, one of the key goals of the initiatives is to scan as
many containers as possible without disruption of business. Is
that possible in a business such as shipping when time frames
and schedules must be adhered to? We shall see.
In an article written by Douglas Frantz for the Washington
Post, in July 2015; Port Security; U.S. fails to meet deadline for
scanning of cargo containers; he indicates that the U.S. did not
meet a legal deadline for scanning all shipping containers for
radioactive materials. Frantz is highlighting the Secure Freight
Initiative. Even though the requirement is 100% screening at
foreign ports, the cost at that time, according to DHS Director
Napolitano, would be $16 Billion to implement (Frantz 2015).
Instead, the screening is being accomplished on “high-risk”
containers based on intelligence. Even though it may be a good
idea to screen every container, again it is not cost
effective.
As in any business that moves commerce, either goods, products
or people, as in the airline industry or shipping industry, if you
are not moving you are not making money. And of course the
business mission is to turn a profit. For example, on time
departures at airports are the driving force of many decisions
that are made, to include security and the equipment to screen
passengers. As already discussed above, if every shipping
container or bulk cargo item was screened, the time it would
take to accomplish that screening process would be excessive,
thereby causing a bottleneck of all cargo movements and
severely impacting commerce in general. Even though it would
be possible to do that, in a business sense it would not be
practical, or better put in the language of the stakeholders, not
cost effective. Moreover, the cost is not only the cost in time or
shipment delays, but the cost in procuring and sustaining the
equipment necessary to conduct cargo and container
screenings.
To achieve full compliance with government security
regulations, the port security manager must combine security
planning with all aspects of port operations. The port must be
able to interface with national and international port facility
security, and understand clearly what requirements are
mandated by compliance of government regulations. Port
management leaders must have a working knowledge and
understanding of the major pieces of legislation such as the
Homeland Security Act of 2002, Homeland Security Presidential
Directives, MTSA of 2002, SAFE Port Act and others. We will
discuss these policies and regulations in more detail during the
week.
Facility and Personnel Security
A key and very important position in planning and managing the
security function in the port facility is the Facility Security
Officer (FSO). The FSO is basically responsible for the
development, implementation, revision and maintenance of the
port facility security plan. One of the most important
responsibilities is to instill an awareness of overall port security
for all facility employees and visitors. This awareness
philosophy will provide employees and customers with an
understanding of the importance of security in the port. It goes
without saying that security is everyone’s responsibility.
In this lesson we discussed the port security management
function and briefly highlighted three important tasks and
responsibilities required of the maritime port security manager
and his team. Failure in leadership resulting in poor
management can severely impact the security sector, and would
likely result in disastrous consequences for the port, and to a
larger degree, the U.S. economy. It was also noted that a
critical task and responsibility carried out by the security
management team is to ensure that any new facility design and
architecture is developed and constructed with the necessary
security systems infrastructure enhancements that will
incorporate and support new and emerging technologies. And
lastly, we reviewed the current legislation and government
policies that are currently in-place to protect and safeguard U.S.
ports against terrorist and criminal threats and activities.
Course Objective - Explain the specific security challenges in
the Port Maritime Environment, Risk-based Management,
Megaports Initiative, and the Secure Freight Initiative.
Instructions: Your initial post should be at least 350 words.

More Related Content

DOCX
Please respond to both students separately with a minimum of 150.docx
DOCX
Reply with 150 words to each post.Post 1 (Kyle)After rea
DOCX
Unit 7 Assignment Group Assignment – Risk Analysis and Ident
PDF
Cyber Sec Project Proposal
PDF
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
PDF
Company profile Nov 2015 with the team
PDF
Quantified Risk Assessment as a decision support for the protection of the Cr...
DOC
Automated Incident Handling Using SIM
Please respond to both students separately with a minimum of 150.docx
Reply with 150 words to each post.Post 1 (Kyle)After rea
Unit 7 Assignment Group Assignment – Risk Analysis and Ident
Cyber Sec Project Proposal
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
Company profile Nov 2015 with the team
Quantified Risk Assessment as a decision support for the protection of the Cr...
Automated Incident Handling Using SIM

Similar to The Port Security Plan - Management of Tasks and Responsibilities.docx (20)

PDF
Risk Analysis at Ship to Shore (STS) Cranes in Container Terminal Operational...
DOCX
85Operations Security, Site Security, and Terrorism In.docx
DOCX
This week’s forum discussion is all about training and equipment.
DOCX
This week’s forum discussion is all about training and equipment.
PPTX
UCISA cyber incident response toolkit.pptx
PDF
CTPAT Foreign Manufacturers MSC 2019.pdf
DOCX
Damian Gillespie1. How does port facility technology interface w.docx
PDF
Cyber_Security_Action_Plan_2016
DOCX
Gabriel HarrellExplain the specific security challenges in the P.docx
PDF
IPSecurityCenterTM PSIM Enhancing Port Security
PPTX
CTPAT-MSR.pptx- Presentation Slides for trainees
DOCX
Running head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docx
PPTX
Chapter-Seven.pptxhmhjmhjkhjkhjkljlhjkhjkhj
DOCX
Table of ContentsIntroduction3P.docx
PDF
u10a1-Risk Assessment Report-Beji Jacob
DOCX
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
DOCX
Risk management Phase 1-5 Individual Project.docx
PPTX
PDF
ADAM ADLER FLORIDA
PDF
For Corporate Boards, a Cyber Security Top 10
Risk Analysis at Ship to Shore (STS) Cranes in Container Terminal Operational...
85Operations Security, Site Security, and Terrorism In.docx
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
UCISA cyber incident response toolkit.pptx
CTPAT Foreign Manufacturers MSC 2019.pdf
Damian Gillespie1. How does port facility technology interface w.docx
Cyber_Security_Action_Plan_2016
Gabriel HarrellExplain the specific security challenges in the P.docx
IPSecurityCenterTM PSIM Enhancing Port Security
CTPAT-MSR.pptx- Presentation Slides for trainees
Running head ENHANCING MARITIME AND PORT SECURITY1ENHANCING MA.docx
Chapter-Seven.pptxhmhjmhjkhjkhjkljlhjkhjkhj
Table of ContentsIntroduction3P.docx
u10a1-Risk Assessment Report-Beji Jacob
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
Risk management Phase 1-5 Individual Project.docx
ADAM ADLER FLORIDA
For Corporate Boards, a Cyber Security Top 10
Ad

More from oreo10 (20)

DOCX
All scientific theories must be able to make testable predictions. S.docx
DOCX
All I wnat is to write a reflection paper on my project which is hac.docx
DOCX
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docx
DOCX
All healthcare organizations must convert to an Electronic Health Re.docx
DOCX
All round writer onlyThis is an individual Mediation assignment..docx
DOCX
Alice was wondering whether it was a good idea to invest her money i.docx
DOCX
All organisms have DNA, which differs only in the number and order o.docx
DOCX
All literature involves some kind of performance which is intended f.docx
DOCX
All key elements of the assignment are covered in a substantiv.docx
DOCX
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docx
DOCX
Alice Jones was employed as a clerk-typist by a company. She request.docx
DOCX
Air and Water Pollution PaperAir and water pollutants exist in m.docx
DOCX
Air pollution is an environmental health problem in many cities thro.docx
DOCX
After your topic has been approved, the next step is to research.docx
DOCX
After watching three of the five movie clips listed in the Multime.docx
DOCX
Aging and Disability WorksheetPart IIdentify 2 or .docx
DOCX
After watching the video and reading the Web Resource, CDC Autism .docx
DOCX
AI Artificial Intelligence1Reading responsePeter .docx
DOCX
Agree or disagree with, and discuss the following statement Corp.docx
DOCX
After watching Reactions to an Impending Death Sentence and Ti.docx
All scientific theories must be able to make testable predictions. S.docx
All I wnat is to write a reflection paper on my project which is hac.docx
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docx
All healthcare organizations must convert to an Electronic Health Re.docx
All round writer onlyThis is an individual Mediation assignment..docx
Alice was wondering whether it was a good idea to invest her money i.docx
All organisms have DNA, which differs only in the number and order o.docx
All literature involves some kind of performance which is intended f.docx
All key elements of the assignment are covered in a substantiv.docx
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docx
Alice Jones was employed as a clerk-typist by a company. She request.docx
Air and Water Pollution PaperAir and water pollutants exist in m.docx
Air pollution is an environmental health problem in many cities thro.docx
After your topic has been approved, the next step is to research.docx
After watching three of the five movie clips listed in the Multime.docx
Aging and Disability WorksheetPart IIdentify 2 or .docx
After watching the video and reading the Web Resource, CDC Autism .docx
AI Artificial Intelligence1Reading responsePeter .docx
Agree or disagree with, and discuss the following statement Corp.docx
After watching Reactions to an Impending Death Sentence and Ti.docx
Ad

Recently uploaded (20)

PDF
Empowerment Technology for Senior High School Guide
PPTX
Computer Architecture Input Output Memory.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
International_Financial_Reporting_Standa.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
20th Century Theater, Methods, History.pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
advance database management system book.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Empowerment Technology for Senior High School Guide
Computer Architecture Input Output Memory.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
FORM 1 BIOLOGY MIND MAPS and their schemes
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
International_Financial_Reporting_Standa.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Paper A Mock Exam 9_ Attempt review.pdf.
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
What if we spent less time fighting change, and more time building what’s rig...
20th Century Theater, Methods, History.pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
advance database management system book.pdf
My India Quiz Book_20210205121199924.pdf
IGGE1 Understanding the Self1234567891011
MBA _Common_ 2nd year Syllabus _2021-22_.pdf

The Port Security Plan - Management of Tasks and Responsibilities.docx

  • 1. The Port Security Plan - Management of Tasks and Responsibilities Our week three lesson will explore the maritime port security environment and the resultant security demands inherently placed on the port security management team. More specifically, the security management team is charged with the responsibility for ensuring all port security elements are successfully planned, developed, and executed in order to execute vital security tasks and responsibilities associated with a safe and secure maritime port. No doubt the security management team is one of the most important components when trying to protect against terrorists, criminal activities, and other commercial, industrial and natural disasters that can impact a maritime port. Further, failure to properly assess, plan and execute the fundamental port security tasks and responsibilities required would be disastrous to port security operations in general. As a result, the focus for lesson three will identify and assess key policy and procedures necessary for successfully executing maritime security management operations. Moreover, the importance in building a solid port security posture must start right at the top of the organization, to include the port security leadership staff and the guard force. As many already know, it all starts at the top. Poor leadership will result in poor decisions and substandard performance from the staff, which will ultimately flow down and impact the entire security workforce. An inept and incompetent security staff will thoroughly corrupt the ability of the organization to adequately guard and protect the port as a whole. Poor leadership will cripple a port, and potentially jeopardize the national security of the U.S. Also, inexperienced and poorly trained managers will set the stage for major security gaps in the port to emerge rapidly, leading to possible exploitation of these gaps by nefarious individuals…who likely have designs centered on
  • 2. terrorism or criminal acts. This is further complicated by the fact that all U.S port’s security funding for current and future budget years will be substantially cut. Understanding this, it is essential that the port security teams have continuous education and skills training to maintain force competencies. Just as important, the security team must be knowledgeable of the critical organizational components within the port that tie into port security. Christopher identified these components as the communication systems and information sharing capability; building and maintaining a qualified professional staff; conducting basic and advance security training; fostering teamwork, camaraderie, and mission planning. Parallel to these operational components, it is also important that the port security team effectively respond to and interface effectively with incident management systems, attention to communications interoperability, public/media relations, written plans, policies, procedures, and last, but not least, mutual aid agreements (Christopher, 2009, p. 96). Understanding the depth of the required tasks and responsibilities require that the port security manager and the security team be cognizant of how they can best meet the operational and security needs of the port and its private sector clients. Bottom line, security managers need to use a layered approach to security which means using a variety of tools that provide a strong defense against terrorism, crime, and other identified risks we have already discussed. Integrating Technology In regards to the components of security planning, one of the biggest that contributes directly to port security planning is the inclusion of advanced security systems that can be incorporated into the actual design phase of any new port facility. With new and improved technologies being developed and introduced each day, new methods of building an entire security systems must be assessed and evaluated to make sure they are constructed in the most cost effective and efficient manner. The ability to mitigate security risks and gaps through advanced technology
  • 3. application integration for all new facilities is most important. It is essential that security infrastructure needs are planned for during the phase known as the design and architecture stage. This will ensure that security managers won’t need to request for security infrastructure changes at a later time, which will likely result in costly retrofitting of port facilities. Additionally, budgets cuts will not allow for these post design phase changes, so it is imperative that security managers get it right the first time. The days of excessive cost overruns due to poor planning or design efforts are no longer acceptable in today’s constrained resource environment. The Private Sector Much has been said of the maritime private sector security connection and the critical role they play in port security planning. First and foremost, the private sector stakeholder input is vital to proper port security planning. Knowing what the internal and external customers’ needs are and how to meet them is essential to security planning for port operations. Additionally, a proven and tangible method of identifying ways to mitigate attacks and other events is having hypothetical exercise scenarios developed for operational testing and validation. Conducting these operational tests and organizational exercises enhances security systems knowledge and understanding, and results in workable solutions for comprehensive port security operations. Knowing the security components and the various approaches available to management in order to mitigate and remove security gaps with the private sector working within the port environment is extremely important. Lastly, including the private sector while developing and executing a robust test and exercise program is a best practice for enhanced port security. In addition, having private sector input during the design and architecture stage is vital. Rebuttals, views and opinions from differing parties should be encouraged and welcomed in order to ensure one party isn’t “angling” their advice or recommendation to achieve an underlying motive. If one party were the only one
  • 4. engaging with the development team, then effective security components could possibly get overlooked or dumped. The desired end-state is that everyone must work together to achieve the same goal….a safe and viable port. Fortress Mentality No discussion on port security is complete without understanding the issue of “fortress mentality” within the port environment. Simply explained, engineers and architects specialize on how to build things effectively and efficiently. This is why we commission them in the first place. However, that doesn’t mean they know how precisely the security systems must work or even understand how the port security systems are properly integrated into the larger security system that protect the port. Therefore, the port security manager must ensure there isn’t too much security, where it becomes a detriment to production as opposed to a contribution to the overall port production. The goal is to find the right balance between port production verses a state of excessive security policies and procedures that bottleneck port operations. The author is not suggesting we spin the dice and sacrifice security for production, but slowing down port production to the point it is no longer viable to conduct business operations due to excessive security procedures, is fortress mentality. Fortress mentality will stifle operational processes and procedures that pay the bills. Too much security is counterproductive when it prevents the operational component from reaching max production efficiency. Finding Balance One way to find balance is through the “The Secure Freight Initiative” (SFI). The SFI is a Department of Homeland Security (DHS) program and part of the SAFE Port Act of 2006. The SFI uses nuclear detection technology in foreign ports. The equipment used to support the SFI scans containers for threats and automatically notify the host country authorities and the DHS. This allows both countries to take action and prevent any major
  • 5. incidents from occurring, such as a WMD placed in a container. Another important initiative is the implementation of the Container Security Initiative (CSI) managed through the Customs and Boarder Protection (CBP) Agency. With the detection equipment and other cyber centric systems in place, CBP will have near real-time information such as manifest submissions to help with risk assessments of shipments coming to American ports. This is supportive and a derivative of the Secure Freight Initiative. According to Homeland Security in the Secure Freight Initiative, 2012, “The Secure Freight Initiative builds upon a risk-based approach to securing the international supply chain by leveraging programs like the Megaports Initiative, Container Security Initiative, and the Customs Trade Partnership Against Terrorism (C-TAPT) program.” Each of the initiatives reduces a massive risk burden on the port security management team, as all high risk containers are inspected before even arriving in any U.S. Port. In summary, one of the key goals of the initiatives is to scan as many containers as possible without disruption of business. Is that possible in a business such as shipping when time frames and schedules must be adhered to? We shall see. In an article written by Douglas Frantz for the Washington Post, in July 2015; Port Security; U.S. fails to meet deadline for scanning of cargo containers; he indicates that the U.S. did not meet a legal deadline for scanning all shipping containers for radioactive materials. Frantz is highlighting the Secure Freight Initiative. Even though the requirement is 100% screening at foreign ports, the cost at that time, according to DHS Director Napolitano, would be $16 Billion to implement (Frantz 2015). Instead, the screening is being accomplished on “high-risk” containers based on intelligence. Even though it may be a good idea to screen every container, again it is not cost effective. As in any business that moves commerce, either goods, products or people, as in the airline industry or shipping industry, if you
  • 6. are not moving you are not making money. And of course the business mission is to turn a profit. For example, on time departures at airports are the driving force of many decisions that are made, to include security and the equipment to screen passengers. As already discussed above, if every shipping container or bulk cargo item was screened, the time it would take to accomplish that screening process would be excessive, thereby causing a bottleneck of all cargo movements and severely impacting commerce in general. Even though it would be possible to do that, in a business sense it would not be practical, or better put in the language of the stakeholders, not cost effective. Moreover, the cost is not only the cost in time or shipment delays, but the cost in procuring and sustaining the equipment necessary to conduct cargo and container screenings. To achieve full compliance with government security regulations, the port security manager must combine security planning with all aspects of port operations. The port must be able to interface with national and international port facility security, and understand clearly what requirements are mandated by compliance of government regulations. Port management leaders must have a working knowledge and understanding of the major pieces of legislation such as the Homeland Security Act of 2002, Homeland Security Presidential Directives, MTSA of 2002, SAFE Port Act and others. We will discuss these policies and regulations in more detail during the week. Facility and Personnel Security A key and very important position in planning and managing the security function in the port facility is the Facility Security Officer (FSO). The FSO is basically responsible for the development, implementation, revision and maintenance of the port facility security plan. One of the most important responsibilities is to instill an awareness of overall port security for all facility employees and visitors. This awareness philosophy will provide employees and customers with an
  • 7. understanding of the importance of security in the port. It goes without saying that security is everyone’s responsibility. In this lesson we discussed the port security management function and briefly highlighted three important tasks and responsibilities required of the maritime port security manager and his team. Failure in leadership resulting in poor management can severely impact the security sector, and would likely result in disastrous consequences for the port, and to a larger degree, the U.S. economy. It was also noted that a critical task and responsibility carried out by the security management team is to ensure that any new facility design and architecture is developed and constructed with the necessary security systems infrastructure enhancements that will incorporate and support new and emerging technologies. And lastly, we reviewed the current legislation and government policies that are currently in-place to protect and safeguard U.S. ports against terrorist and criminal threats and activities. Course Objective - Explain the specific security challenges in the Port Maritime Environment, Risk-based Management, Megaports Initiative, and the Secure Freight Initiative. Instructions: Your initial post should be at least 350 words.