Thursday, June 11, 2020

Port Operations Activities Between Internal / External Stakeholders - 1100 Words

Port Operations: Activities Between Internal / External Stakeholders (Essay Sample) Content: Port SecurityStudents NameUniversity AffiliationIntroductionOf all the means of transportation available in the current business environment, the port remains the most ideal and affordable channel for the transportation of bulky goods. Operations at the large ports are diverse ranging from loading and off-loading ships, customer services, movement of vessels and containers, warehousing and other storage operations. The smooth processes at the ports require efficient mechanisms to manage the above activities between the internal and external stakeholders.Most industries such as the energy and the manufacturing industries rely on the goods transported by ships for their daily operations. Every year, the ports in the US handle approximately two billion tons of cargo and contribute over $3.15 trillion in revenue from the business operation in the country. However, like any other business, the ports are at risk of domestic and international criminal activities such as ter rorism, cargo theft, drug smuggling, piracy, and cyber security which can affect their smooth operations (Stelter, 2015).These threats can result in damage to the ships, cargos or other infrastructure at the ports, thus negatively affect economic activities. The maritime security is in the hands of the United State Coast Guard which is responsible for providing timely security service to the ports against all manners of domestic and international threats (Stelter, 2015). This paper analyzes the security risks faced by the ports in their operations and the responsibilities of the Coast Guard in securing the ports.Resources Used by Port FSO in Security Risk AssessmentThe duties of the port facility security officer (PFSO) are to develop, implement, revise and maintain the security plans for the port in collaboration with other security personnel. The PFSO also conducts security risk assessment to determine potential domestic and international threats such as terrorism and other crimin al activities. To aid in the security risk assessment, the PFSO uses a variety of resources and tools.The Port Security Risk Assessment Tool (PSRAT) is a risk assessment tool that was developed by the Coast Guard to enable the PFSOs to investigate the risk from terrorist activities in their jurisdictions. Through the system, the PFSO can quantify the security risks of the infrastructure at the port, determine the key drivers for the risk and examine the relevant solutions to mitigate the risk (Edwards, 2014).Maritime Security Risk Analysis Model (MSRAM) is another useful resource the PFSO can use to assess security threats. This system works similarly as the PSRAT but has a feedback mechanism from Homeland Security department. Intelligence from the Coast Guard is fed into the system, which then quantifies the threat, measures the vulnerability of infrastructure to the threat and the consequences of the security threat. The MSRAM promotes consistency in threat assessment across all t he ports in the US (Lewis, Darken, Mackin, Dudenhoeffer, 2012).Portsec is another resource which is allocated to the PFSO to assess and mitigate security risks such as terrorism at the port. It helps to maintain a balance between smooth operations at the port and reduce security threats. The Portsec can provide daily tactical security decision and security plans which can be used for a long time. Portsec analyzes the vulnerability of critical infrastructures at the ports such as the cranes to potential security threats, and the consequences of the threat to the ports' operations (Orosz, 2013).The Role of the Coast GuardThe Coast Guards provide security services to all the ports in the US by enforcing several security measures. T, The Coast Guard division is divided into districts which are easier to monitor to manage all the ports in the country efficiently. A Coast Guard Captain is assigned to each major port in the district to oversee all the security operations and ensure smooth operations at the port. The captain has the authority to enforce security measures, penalties or even close the port in case of security concerns and threats (Engel, 2016).One of the roles of the Coast Guards in port security is to collect relevant and timely intelligence on the port's operation and vessels regarding potential security threats. The information collected can be used to develop and execute preventive security measures before the threat materializes. The Coast Guards also conduct security assessments on specific ships and port facilities that can pose security risks. Also, they perform antiterrorism assessments at foreign ports which handle cargos that are to be imported into the US. All commercial vessels entering the US must be fitted with automatic identification systems for tracking and monitoring by the Coast Guard division (Hara, 2012). The Coast Guard division has to ensure that the physical layout of the port is safe from any terrorist threats that can be perp etrated using the commercial ships. Trained and armed sea Marshalls who are ready to neutralize any potential security escort commercial vessels to a safe harbor. The sea Marshalls can board the ships to inspect cargos, baggage and stores and conduct verification and screening of the crews and the passengers. Another division called the Maritime Safety, and Security Teams ((MSSTs) provide additional security to the port and patrols the areas at the port on high-speed boats. They also conduct underwater threat assessment using sonars, video equipment, and divers. The Coast Guard also operates another unit called the Port Security Unit (PSU) which can be organized within 24 hours to carry out sustained security operations at the port. PSU offers protection to essential facilities at the port such as high-value vessels and the entrance to the harbor (NAP, 2017). Cyberterrorism and its Effects on Port Security OperationCyberterrorism is a planned attack on electronic information, compu ter systems, software or data which can result in physical damage and financial losses. Criminal organizations, freelance hackers, rival companies or political institutions which are well funded and have malicious intentions can perpetrate cyberterrorism. The ports are highly vulnerable to cyberterrorism since most of their operations rely heavily on the use of information technology. Sophisticated computer programmes are used to control big vessels and operate several activities at the port such as loading and offloading containers, billing, and communication between ships. The heavy reliance on port's operations on technology increases the risk to cyberterrorism (WebMaster, 2015). Forms of cyberterrorism at the ports and their effects on the port operationsCyberterrorists can gain unauthorized access to the ports computer networks and manipulate damage, or erase all the data that are important in handling cargos. They can also release cargos without permission, resulting in the t heft and loss of cargos that can disrupt the entire operations at the port. The search for the lost cargos can take weeks and hamper the distribution of other cargos at the port. Malicious hackers can override the security controls at the port or the ships remotely, causing explosions and fire that can damage the vessels and other infrastructure (Homeland Security, 2016).The hacker can also disrupt the industrial control systems which are used to direct cranes and handle bulk cargos. Jamming the signal that controls the cranes can interrupt and disable their operation, resulting in disruption of services since containers cannot be loaded or offloaded due to the damage of the cranes by the attack. Another form of cyberterrorism can involve the unauthorized access to the port's computer systems where the hacker can steal information such as surveillance videos, access code and the routes taken by ships. This information can be used to conduct secondary crimes such as theft, piracy, a nd terrorisms (Homeland Security, 2016).Maritime cyberterrorism can also occur when the malicious user takes over the control of the ships or disrupt the navigation system used to direct vessels to the port causing collision of ships which can be disastrous if hazardous cargos are involved. The operations at the port can be disrupted since the crash would block the route used by the vessel to enter or exit the port (Homeland Security, 2016).Safety challenges facing the port facilities and infrastructureThe operations at the ports depend heavily on the use of computer systems and programs that to control and monitor the safety and operations majority of the instruments, ships, and cargos. Some of the challenges facing the safety of the port facilities and operations are:Poor LeadershipThe overall safety of the port is the responsibility of the management. The management should carefully examine, plan and execute appropriate safety and security measures that can safeguard the port fro m potential threats which can affect the smooth operations at the port. Poor leadership at the ports can result in poor decision making and performance that can flow from the management to the employees who could become incompetent and careless in their work. Poor leadership can create a platform for critical security and safety issues that can be exploited by malicious people or organizations, resulting in crippled operations at the ports (Homeland Security, 2016).Internal threatEmployees working at the ports have access to a lot of high-value information and knowledge. However, some of these employees can use the information on the port facility and security system to cause harm, thus posing a risk to the safety and operation of the port. Driven by split loyalty, financial benefits, anger or job dissatisfaction, employees can sell or provide unauthorized access to critical information of the port...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.