Expert answer:Course Objective – Explain the specific security challenges in the Port Maritime Environment, Risk-based Management, Megaports Initiative, and the Secure Freight Initiative.Instructions: Your initial post should be at least 350 words. Please respond to at least 2 other students. Responses should be a minimum of 150 words and include direct questions.Initial Post Due: Thursday, by 11:55pm ETResponses Due: Sunday, by 11:55pm ETRespond to the below discussion questions taken from the Lessons (Required Reading). You are expected to give complete answers referring to what you have read. Reference to, or the use of critical thinking, analysis, what you have learned in previous courses, the media, and in your professional lives is also expected. Define the subject; make references to what you have read, what you have learned elsewhere, and then form a response.1. Explain the specific security challenges encountered in the port maritime environment and discuss risk-based management.2. Discuss the Megaports Initiative. Remember I will have the 2 students responses as a attachment: Need for you to respond to their post ok.
post_forum_replies_week_2.docx
post_forum_replies_week_2.docx
Unformatted Attachment Preview
Student 1
1. Explain the specific security challenges encountered in the port maritime environment
and discuss risk-based management.
One security challenge encountered in the port maritime environment is the integration of
security measures with an “open system” for port operations in place. The open system for ports
means that boats and shipments must be able to flow freely in and out in order to sustain its
existence and produce commerce (Christopher, 2014). If the flow is disrupted, this could cause
serious financial issues for the port among other things. This is an issue for port mangers because
they must keep shipments moving in and out while also inspecting shipments and making sure
there are no breaches in security. Christopher (2014) states, “The primary competing interests in
the port environment are quite basic: commerce versus security.” (p.79). There must be a balance
and that is where risk-based management comes into play. Risk-based management is described
by Christopher (2014) as a “comprehensive identification of the possible harm faced by an
organization” (p. 78). Port managers must assess if a particular security measure and its
implementation are beneficial enough to justify the impediment of port operations. Essentially,
will the risk be worth the reward? If not, it is their job to figure out other solutions in order to fix
the process and ensure safe port operations without impeding the flow of shipments. Another
security challenge in the maritime environment is the constant terrorist threat. The theory of
“asymmetric warfare” is one where a smaller, less capable enemy can attack and defeat a larger
more equipped entity (N.a., 2010). The implementation of asymmetric warfare by terrorist
organizations could be disastrous and a ports vulnerability is very apparent. For example, the
attack on the U.S.S. Cole was an example of a smaller less capable enemy using simple tactics to
cause millions of dollar worth of damage as well as cost Americans their lives. Due to the vast
number of vulnerabilities within the port maritime environment, the Megaports Initiative was
introduced to mitigate some of that risk.
2. Discuss the Megaports Initiative.
According to the National Nuclear Security Administration (2010), the Megaports Initiative is
described as a program put in place in order to detect nuclear and other radioactivity that transits
through ports domestically and internationally, focusing on foreign entities. This initiative
provides funding, manning, and equipment to the U.S. and foreign ports to detect the shipment of
radioactive materials. It is implemented at high risk ports as assessed by the Department of
Energy and the National Nuclear Security Administration (N.N.S.A., 2010). There is also a high
rate of inspection and funding for cargo that is U.S. bound. The Megaports Initiative similarly
trains partner nations on equipment use and maintenance in order to sustain long term
effectiveness
References
Christopher, K. (2014). Port Security Management, 2nd ed. Boca Raton, FL: CRC Press Taylor
& Francis Group. Chapter 3 and 4
No Author. (2010, December). Asymmetric Warfare-A Timeless Classic. The Grouchy
Historian.
National Nuclear Security Administration. (2010, September). Megaports Initiative. Office of
the Second Line of Defense.
Student 2
1. Explain the specific security challenges encountered in the port maritime environment
and discuss risk-based management.
According to the reading, there are several security challenges in the port maritime environment
to include “terrorism, weapons of mass destruction, hazardous materials, internal criminal
conspiracies, piracy, cargo theft, vandalism, stowaways, poorly trained security personnel,
crimes against passengers and crew, general civil unrest, workplace violence, economic
espionage, and commercial conspiracies” (Christopher, 2014). Risk management involves the
development of a port’s security plans to lessen the risk associated with these types of
challenges. This is done by establishing strategic goals, assess the risks, determine alternatives to
the risk, determine alternatives processes, implement the solutions and monitor progress
(Christopher, 2014). This process can be very complicated because the port manager must
engage both public and private stakeholders in the risk management process in the hope to
maintain a “open system” (Christopher, 2014). These types of RM processes are utilized by
many civilian and government organizations to estimate the frequency and severity of risks, and
decide what strategies will increase the facilities security posture without affecting cost
efficiencies.
2. Discuss the Megaports Initiative.
The National Nuclear Security Administration’s (NNSA) Megaports Initiative, began in 2003,
where the organization teamed up with several countries to enhance their ability to screen cargo
at major international seaports (NNSA, 2010). The Initiative provided radiation detection
equipment and helped train security personnel to check for nuclear and radioactive materials
within cargo. The Megaports Initiative has three main objectives to include deterring terrorist
from shipping dangerous materials, detecting nuclear and radioactive materials, and interdiction
of dangerous shipments before the materials make it to U.S. or allies borders (NNSA,
2010). The NNSA works closely with the Department of Homeland Security’s Bureau of
Customs and Border Protection Container Security Initiative. Currently, the Megaports Initiative
is operational in Greece, Bahamas, Sri Lanka, Spain, Singapore, the Netherlands and engaged in
expansion negotiations with approximately 20 additional countries in Europe, Asia, the Middle
East, and South America (NNSA, 2010).
Christopher, Kenneth. Port Security Management, Second Edition, CRC Press, 2014. ProQuest
Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=1578619.
National Nuclear Security Administration. (2010, September). Megaports Initiative. Office of
the Second Line of Defense, https://www.hsdl.org/?view&did=473907.
Student 1
1. Explain the specific security challenges encountered in the port maritime environment
and discuss risk-based management.
One security challenge encountered in the port maritime environment is the integration of
security measures with an “open system” for port operations in place. The open system for ports
means that boats and shipments must be able to flow freely in and out in order to sustain its
existence and produce commerce (Christopher, 2014). If the flow is disrupted, this could cause
serious financial issues for the port among other things. This is an issue for port mangers because
they must keep shipments moving in and out while also inspecting shipments and making sure
there are no breaches in security. Christopher (2014) states, “The primary competing interests in
the port environment are quite basic: commerce versus security.” (p.79). There must be a balance
and that is where risk-based management comes into play. Risk-based management is described
by Christopher (2014) as a “comprehensive identification of the possible harm faced by an
organization” (p. 78). Port managers must assess if a particular security measure and its
implementation are beneficial enough to justify the impediment of port operations. Essentially,
will the risk be worth the reward? If not, it is their job to figure out other solutions in order to fix
the process and ensure safe port operations without impeding the flow of shipments. Another
security challenge in the maritime environment is the constant terrorist threat. The theory of
“asymmetric warfare” is one where a smaller, less capable enemy can attack and defeat a larger
more equipped entity (N.a., 2010). The implementation of asymmetric warfare by terrorist
organizations could be disastrous and a ports vulnerability is very apparent. For example, the
attack on the U.S.S. Cole was an example of a smaller less capable enemy using simple tactics to
cause millions of dollar worth of damage as well as cost Americans their lives. Due to the vast
number of vulnerabilities within the port maritime environment, the Megaports Initiative was
introduced to mitigate some of that risk.
2. Discuss the Megaports Initiative.
According to the National Nuclear Security Administration (2010), the Megaports Initiative is
described as a program put in place in order to detect nuclear and other radioactivity that transits
through ports domestically and internationally, focusing on foreign entities. This initiative
provides funding, manning, and equipment to the U.S. and foreign ports to detect the shipment of
radioactive materials. It is implemented at high risk ports as assessed by the Department of
Energy and the National Nuclear Security Administration (N.N.S.A., 2010). There is also a high
rate of inspection and funding for cargo that is U.S. bound. The Megaports Initiative similarly
trains partner nations on equipment use and maintenance in order to sustain long term
effectiveness
References
Christopher, K. (2014). Port Security Management, 2nd ed. Boca Raton, FL: CRC Press Taylor
& Francis Group. Chapter 3 and 4
No Author. (2010, December). Asymmetric Warfare-A Timeless Classic. The Grouchy
Historian.
National Nuclear Security Administration. (2010, September). Megaports Initiative. Office of
the Second Line of Defense.
Student 2
1. Explain the specific security challenges encountered in the port maritime environment
and discuss risk-based management.
According to the reading, there are several security challenges in the port maritime environment
to include “terrorism, weapons of mass destruction, hazardous materials, internal criminal
conspiracies, piracy, cargo theft, vandalism, stowaways, poorly trained security personnel,
crimes against passengers and crew, general civil unrest, workplace violence, economic
espionage, and commercial conspiracies” (Christopher, 2014). Risk management involves the
development of a port’s security plans to lessen the risk associated with these types of
challenges. This is done by establishing strategic goals, assess the risks, determine alternatives to
the risk, determine alternatives processes, implement the solutions and monitor progress
(Christopher, 2014). This process can be very complicated because the port manager must
engage both public and private stakeholders in the risk management process in the hope to
maintain a “open system” (Christopher, 2014). These types of RM processes are utilized by
many civilian and government organizations to estimate the frequency and severity of risks, and
decide what strategies will increase the facilities security posture without affecting cost
efficiencies.
2. Discuss the Megaports Initiative.
The National Nuclear Security Administration’s (NNSA) Megaports Initiative, began in 2003,
where the organization teamed up with several countries to enhance their ability to screen cargo
at major international seaports (NNSA, 2010). The Initiative provided radiation detection
equipment and helped train security personnel to check for nuclear and radioactive materials
within cargo. The Megaports Initiative has three main objectives to include deterring terrorist
from shipping dangerous materials, detecting nuclear and radioactive materials, and interdiction
of dangerous shipments before the materials make it to U.S. or allies borders (NNSA,
2010). The NNSA works closely with the Department of Homeland Security’s Bureau of
Customs and Border Protection Container Security Initiative. Currently, the Megaports Initiative
is operational in Greece, Bahamas, Sri Lanka, Spain, Singapore, the Netherlands and engaged in
expansion negotiations with approximately 20 additional countries in Europe, Asia, the Middle
East, and South America (NNSA, 2010).
Christopher, Kenneth. Port Security Management, Second Edition, CRC Press, 2014. ProQuest
Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=1578619.
National Nuclear Security Administration. (2010, September). Megaports Initiative. Office of
the Second Line of Defense, https://www.hsdl.org/?view&did=473907.
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more