What is the Difference Between Maritime Security and Maritime Safety? – While often used interchangeably, maritime security and maritime safety are slightly different from each other. Maritime security largely focuses on the protection of vessels and their cargo from external threats such as smuggling and piracy.

Why is maritime safety and security important?

What Is Maritime Security? – Maritime security is a somewhat nebulous concept. There is no international consensus on what maritime security entails, despite the fact that every country has a vested interest in maritime security. Maritime security is not a single entity or action.

Instead, it’s a nexus of several different maritime concerns ranging from port security to the safety of sailors. On one hand, maritime security can refer to the prevention of weapons smuggling, On the other hand, it can also refer to protection against piracy at sea. It can even refer to cybersecurity onboard ships, as operational technology on ships can be hacked just as readily as any other computer.

Generally, maritime security is the nexus of four concerns :

  1. National security
  2. Human security
  3. Marine environment
  4. Economic environment

Within these four concerns are concerns about seapower, resilience, marine safety, and blue economy respectively. Marine safety, for example, can encompass accidents and climate change, while seapower can include inter-state disputes and arms proliferation.

What does maritime security do?

National Strategy for Maritime Security Overview The safety and economic security of the United States depends upon the secure use of the world’s oceans. Since the attacks of September 11, 2001, the Federal government has reviewed and strengthened all of its strategies to combat the evolving threat in the War on Terrorism.

Various departments have each carried out maritime security strategies which have provided an effective layer of security since 2001. In December 2004, the President directed the Secretaries of the Department of Defense and Homeland Security to lead the Federal effort to develop a comprehensive National Strategy for Maritime Security, to better integrate and synchronize the existing Department-level strategies and ensure their effective and efficient implementation.

Maritime security is best achieved by blending public and private maritime security activities on a global scale into an integrated effort that addresses all maritime threats. The new National Strategy for Maritime Security aligns all Federal government maritime security programs and initiatives into a comprehensive and cohesive national effort involving appropriate Federal, State, local, and private sector entities.

  • • National Plan to Achieve Domain Awareness.
  • • Global Maritime Intelligence Integration Plan.
  • • Interim Maritime Operational Threat Response Plan.
  • • International Outreach and Coordination Strategy.
  • • Maritime Infrastructure Recovery Plan.
  • • Maritime Transportation System Security Plan.
  • • Maritime Commerce Security Plan.
  • • Domestic Outreach Plan.

Development of these plans was guided by the security principles outlined in this National Strategy for Maritime Security. These plans will be updated on a periodic basis in response to changes in the maritime threat, the world environment, and national security policies.

  1. Together, the National Strategy for Maritime Security and its eight supporting plans present a comprehensive national effort to promote global economic stability and protect legitimate activities while preventing hostile or illegal acts within the maritime domain.
  2. Section I: Introduction – Maritime Security The safety and economic security of the United States depend in substantial part upon the secure use of the world’s oceans.

The United States has a vital national interest in maritime security. We must be prepared to stop terrorists and rogue states before they can threaten or use weapons of mass destruction or engage in other attacks against the United States and our allies and friends.

Toward that end, the United States must take full advantage of strengthened alliances and other international cooperative arrangements, innovations in the use of law enforcement personnel and military forces, advances in technology, and strengthened intelligence collection, analysis, and dissemination.

Salt water covers more than two-thirds of the Earth’s surface. These waters are a single, great ocean, an immense maritime domain1 that affects life everywhere. Although its four principal geographical divisions – Atlantic, Arctic, Indian, and Pacific – have different names, this continuous body of water is the Earth’s greatest defining geographic feature.

The oceans, much of which are global commons under no State’s jurisdiction, offer all nations, even landlocked States, a network of sea-lanes or highways that is of enormous importance to their security and prosperity. They are likewise a source of food, mineral resources, and recreation, and they support commerce among nations.

They also act as both a barrier to and a conduit for threats to the security of people everywhere. Like all other countries, the United States is highly dependent on the oceans for its security and the welfare of its people and economy. In today’s economy, the oceans have increased importance, allowing all countries to participate in the global marketplace.

More than 80 percent of the world’s trade travels by water and forges a global maritime link. About half the world’s trade by value, and 90 percent of the general cargo, are transported in containers. Shipping is the heart of the global economy, but it is vulnerable to attack in two key areas. Spread across Asia, North America, and Europe are 30 megaports/cities that constitute the world’s primary, interdependent trading web.

Through a handful of international straits and canals pass 75 percent of the world’s maritime trade and half its daily oil consumption. International commerce is at risk in the major trading hubs as well as at a handful of strategic chokepoints. The infrastructure and systems that span the maritime domain, owned largely by the private sector, have increasingly become both targets of and potential conveyances for dangerous and illicit activities.

Moreover, much of what occurs in the maritime domain with respect to vessel movements, activities, cargoes, intentions, or ownership is often difficult to discern. The oceans are increasingly threatened by illegal exploitation of living marine resources and increased competition over nonliving marine resources.

Although the global economy continues to increase the value of the oceans’ role as highways for commerce and providers of resources, technology and the forces of globalization have lessened their role as barriers. Thus, this continuous domain serves as a vast, ready, and largely unsecured medium for an array of threats by nations, terrorists, and criminals.

Defeating this array of threats to maritime security – including the threat or use of weapons of mass destruction (WMD) – requires a common understanding and a joint effort for action on a global scale. Because the economic well-being of people in the United States and across the globe depends heavily upon the trade and commerce that traverses the oceans, maritime security must be a top priority.

Maritime security is required to ensure freedom of the seas; facilitate freedom of navigation and commerce; advance prosperity and freedom; and protect the resources of the ocean. Nations have a common interest in achieving two complementary objectives: to facilitate the vibrant maritime commerce that underpins economic security, and to protect against ocean-related terrorist, hostile, criminal, and dangerous acts.

Since all nations benefit from this collective security, all nations must share in the responsibility for maintaining maritime security by countering the threats in this domain. Section II: Threats to Maritime Security Complexity and ambiguity are hallmarks of today’s security environment, especially in the maritime domain.

In addition to the potential for major combat operations at sea, terrorism has significantly increased the nature of the nonmilitary, transnational, and asymmetric threats in the maritime domain that the United States and its allies and strategic partners must be prepared to counter.

Unlike traditional military scenarios in which adversaries and theaters of action are clearly defined, these nonmilitary, transnational threats often demand more than purely military undertakings to be defeated. Unprecedented advances in telecommunications and dramatic improvements in international commercial logistics have combined to increase both the range and effects of terrorist activities, providing the physical means to transcend even the most secure borders and to move rapidly across great distances.

Adversaries that take advantage of such transnational capabilities have the potential to cause serious damage to global, political, and economic security. The maritime domain in particular presents not only a medium by which these threats can move, but offers a broad array of potential targets that fit the terrorists’ operational objectives of achieving mass casualties and inflicting catastrophic economic harm.

While the variety of actors threatening the maritime domain continues to grow in number and capability, they can be broadly grouped as nation-states, terrorists, and transnational criminals and pirates. Defeating the threat of the widely dispersed terrorist networks that present an immediate danger to U.S.

national security interests at home and abroad remains our foremost objective. Nation-State Threats The prospect of major regional conflicts erupting, escalating, and drawing in major powers should not be discounted. Nonetheless, in the absence of inter-state conflict, individual state actions represent a more significant challenge to global security.

  1. Some states provide safe havens for criminals and terrorists, who use these countries as bases of operations to export illicit activities into the maritime domain and into other areas of the globe.
  2. The probability of a hostile state using a WMD is expected to increase during the next decade.
  3. An alternative danger is that a foreign state will provide critical advanced conventional weaponry, WMD components, delivery systems and related materials, technologies, and weapons expertise to another rogue state or a terrorist organization that is willing to conduct WMD attacks.

WMD issues are of the greatest concern since the maritime domain is the likely venue by which WMD will be brought into the United States. Terrorist Threats Non-state terrorist groups that exploit open borders challenge the sovereignty of nations and have an increasingly damaging effect on international affairs.

  1. With advanced telecommunications, they can coordinate their actions among dispersed cells while remaining in the shadows.
  2. Successful attacks in the maritime domain provide opportunities to cause significant disruption to regional and global economies.
  3. Today’s terrorists are increasing their effectiveness and reach by establishing links with other like-minded organizations around the globe.

Some terrorist groups have used shipping as a means of conveyance for positioning their agents, logistical support, and generating revenue. Terrorists have also taken advantage of criminal smuggling networks to circumvent border security measures. Terrorists have indicated a strong desire to use WMD.

  1. This prospect creates a more complex and perilous security situation, further aggravated by countries that are unable to account for or adequately secure their stockpiles of such weapons and associated materials.
  2. This circumstance, coupled with increased access to the technology needed to build and employ those weapons, increases the possibility that a terrorist attack involving WMD could occur.

Similarly, bioterrorism appears particularly suited to use by smaller but sophisticated groups because this tactic is exceedingly difficult to detect in comparison to other mass-effects weapons. Terrorists can also develop effective attack capabilities relatively quickly using a variety of platforms, including explosives-laden suicide boats5 and light aircraft; merchant and cruise ships as kinetic weapons to ram another vessel, warship, port facility, or offshore platform; commercial vessels as launch platforms for missile attacks; underwater swimmers to infiltrate ports; and unmanned underwater explosive delivery vehicles.

  1. Mines are also an effective weapon because they are low-cost, readily available, easily deployed, difficult to counter, and require minimal training.
  2. Terrorists can also take advantage of a vessel’s legitimate cargo, such as chemicals, petroleum, or liquefied natural gas, as the explosive component of an attack.

Vessels can be used to transport powerful conventional explosives or WMD for detonation in a port or alongside an offshore facility. The U.S. economy and national security are fully dependent upon information technology and the information infrastructure.

Terrorists might attempt cyber attacks to disrupt critical information networks, or attempt to cause physical damage to information systems that are integral to the operation of marine transportation and commerce systems. Tools and methodologies for attacking information systems are becoming widely available, and the technical abilities and sophistication of terrorists groups bent on causing havoc or disruption is increasing.

Transnational Criminal and Piracy Threats The continued growth in legitimate international commerce in the maritime domain has been accompanied by growth in the use of the maritime domain for criminal purposes. The smuggling of people, drugs, weapons, and other contraband, as well as piracy and armed robbery against vessels, pose a threat to maritime security.

  • Piracy and incidents of maritime crime tend to be concentrated in areas of heavy commercial maritime activity, especially where there is significant political and economic instability, or in regions with little or no maritime law enforcement capacity.
  • Today’s pirates and criminals are usually well organized and well equipped with advanced communications, weapons, and highspeed craft.

The capabilities to board and commandeer large underway vessels – demonstrated in numerous piracy incidents – could also be employed to facilitate terrorist acts. Just as the world’s oceans are avenues for a nation’s overseas commerce, they are also the highways for the import or export of illegal commodities.

  • Maritime drug trafficking 7 generates vast amounts of money for international organized crime syndicates and terrorist organizations.
  • Laundered through the international financial system, this money provides a huge source of virtually untraceable funds.
  • These monetary assets can then be used to bribe government officials, bypass established financial controls, and fund additional illegal activities, including arms trafficking, migrant smuggling, and terrorist operations.

Further, these activities can ensure a steady supply of weapons and cash for terrorist operatives, as well as the means for their clandestine movement. Environmental Destruction Intentional acts that result in environmental disasters can have far-reaching, negative effects on the economic viability and political stability of a region.

  • Additionally, in recent years, competition for declining marine resources has resulted in a number of violent confrontations as some of the world’s fishers resort to unlawful activity.
  • These incidents underscore the high stakes for the entire world as diminishing resources, such as fish stocks, put increasing pressure on maritime nations to undertake more aggressive actions.

These actions continue to have the potential to cause conflict and regional instability. Similarly, massive pollution of the oceans, whether caused by terrorists or individuals who undertake intentional acts in wanton disregard for the consequences, could result in significant damage to ecosystems and undermine the national and economic security of the nations that depend on them.

  1. Illegal Seaborne Immigration International migration is a long-standing issue that will remain a major challenge to regional stability, and it will be one of the most important factors affecting maritime security through the next 10 years.
  2. Transnational migration, spurred by a decline of social well-being or internal political unrest, has become common over the past decades.

It will continue to drive the movement of many people, with the potential to upset regional stability because of the strain migrants and refugees place on fragile economies and political systems. In some countries the collapse of political and social order prompts maritime mass migrations, such as the ones the United States has experienced from Cuba and Haiti.

The humanitarian and enforcement efforts entailed by the management of such migrations require a significant commitment of security resources. The potential for terrorists to take advantage of human smuggling networks in attempts to circumvent border security measures cannot be ignored. As security in our ports of entry, at land-border crossings, and at airports continues to tighten, criminals and terrorists will likely consider our relatively undefended coastlines to be less risky alternatives for unlawful entry into the United States.

Section III: Strategic Objectives Today’s transnational threats have the potential to inflict great harm on many nations. Thus, the security of the maritime domain requires comprehensive and cohesive efforts among the United States and many cooperating nations to protect the common interest in global maritime security.

  1. This Strategy describes how the United States Government will promote an international maritime security effort that will effectively and efficiently enhance the security of the maritime domain while preserving the freedom of the domain for legitimate pursuits.
  2. This approach does not negate the United States’ inherent right to self-defense or its right to act to protect its essential national security interests.

Defending against enemies is the first and most fundamental commitment of the United States Government. Preeminent among our national security priorities is to take all necessary steps to prevent WMD from entering the country and to avert an attack on the homeland.

This course of action must be undertaken while respecting the constitutional principles upon which the United States was founded. Three broad principles provide overarching guidance to this Strategy. First, preserving the freedom of the seas is a top national priority. The right of vessels to travel freely in international waters, engage in innocent and transit passage, and have access to ports is an essential element of national security.

The free, continuing, unthreatened intercourse of nations is an essential global freedom and helps ensure the smooth operation of the world’s economy. Second, the United States Government must facilitate and defend commerce to ensure this uninterrupted flow of shipping.

  1. The United States is a major trading nation, and its economy, environment, and social fabric are inextricably linked with the oceans and their resources.
  2. The adoption of a just-in-time delivery approach to shipping by most industries, rather than stockpiling or maintaining operating reserves of energy, raw materials, and key components, means that a disruption or slowing of the flow of almost any item can have widespread implications for the overall market, as well as upon the national economy.

Third, the United States Government must facilitate the movement of desirable goods and people across our borders, while screening out dangerous people and material. There need not be an inherent conflict between the demand for security and the need for facilitating the travel and trade essential to continued economic growth.

This Strategy redefines our fundamental task as one of good border management rather than one that pits security against economic well-being. Accomplishing that goal is more manageable to the extent that screening can occur before goods and people arrive at our physical borders. In keeping with these guiding principles, the deep-seated values enshrined in the U.S.

Constitution, and applicable domestic and international law, the following objectives will guide the Nation’s maritime security activities:

  1. • Prevent Terrorist Attacks and Criminal or Hostile Acts
  2. • Protect Maritime-Related Population Centers and Critical Infrastructures
  3. • Minimize Damage and Expedite Recovery
  4. • Safeguard the Ocean and Its Resources

This Strategy does not alter existing authorities or responsibilities of the department and agency heads, including their authorities to carry out operational activities or to provide or receive information. It does not impair or otherwise affect the authority of the Secretary of Defense over the Department of Defense, including the chain of command for military forces from the President and Commander-in-Chief, to the Secretary of Defense, to the commander of military forces, or military command and control procedures.

  • Prevent Terrorist Attacks and Criminal or Hostile Acts
  • Detect, deter, interdict, and defeat terrorist attacks, criminal acts, or hostile acts in the maritime domain, and prevent its unlawful exploitation for those purposes.
  • The United States will prevent potential adversaries from attacking the maritime domain or committing unlawful acts there by monitoring and patrolling its maritime borders, maritime approaches, and exclusive economic zones, as well as high seas areas of national interest, and by stopping such activities at any stage of development or deployment.

The United States will work to detect adversaries before they strike; to deny them safe haven in which to operate unobstructed; to block their freedom of movement between locations; to stop them from entering the United States; to identify, disrupt, and dismantle their financial infrastructure; and to take decisive action to eliminate the threat they pose.

You might be interested:  How To Answer Police Public Safety Testing

As part of this undertaking, the National Strategy to Combat Weapons of Mass Destruction and related presidential directives address the most serious of these threats, and outline plans and policies to execute timely, effective interdiction efforts against the proliferation of WMD, their delivery systems, and related materials, technologies, and expertise.

The basis for effective prevention measures – operations and security programs – is awareness and threat knowledge, along with credible deterrent and interdiction capabilities. Without effective awareness of activities within the maritime domain, crucial opportunities for prevention or an early response can be lost.

  • Awareness grants time and distance to detect, deter, interdict, and defeat adversaries – whether they are planning an operation, or are en route to attack or commit an unlawful act.
  • Forces must be trained, equipped, and prepared to detect, deter, interdict, and defeat terrorists throughout the maritime domain.

Some terrorist groups, however, commit terrorist acts without regard to their own personal risk. They will never be easily deterred. No amount of credible deterrent capability can guarantee that attacks by such groups will be prevented. If terrorists cannot be deterred by the layered maritime security, then they must be interdicted and defeated, preferably overseas.

  • Protect Maritime-Related Population Centers and Critical Infrastructure Protect maritime-related population centers, critical infrastructure, key resources, transportation systems, borders, harbors, ports, and coastal approaches in the maritime domain.
  • The United States depends on networks of critical infrastructure10 – both physical networks such as the marine transportation system, and cyber networks such as interlinked computer operations systems.

The ports, waterways, and shores of the maritime domain are lined with military facilities, nuclear power plants, locks, oil refineries, levees, passenger terminals, fuel tanks, pipelines, chemical plants, tunnels, cargo terminals, and bridges. Ports in particular have inherent security vulnerabilities: they are sprawling, easily accessible by water and land, close to crowded metropolitan areas, and interwoven with complex transportation networks.

Port facilities, along with the ships and barges that transit port waterways, are especially vulnerable to tampering, theft, and unauthorized persons gaining entry to collect information and commit unlawful or hostile acts. The critical infrastructure and key resources of the maritime domain constitute a vital part of the complex systems necessary for public well-being, as well as economic and national security.

They are essential for the free movement of passengers and goods throughout the world. Some physical and cyber assets, as well as associated infrastructure, also function as defense critical infrastructure, the availability of which must be constantly assured for national security operations worldwide.

  • Beyond the immediate casualties, the consequences of an attack on one node of a critical infrastructure may include disruption of entire systems, significant damage to the economy, or the inability to project military forces.
  • Protection of infrastructure networks must address individual elements, interconnecting systems, and their interdependencies.

Protection of critical infrastructure and key resources is a shared responsibility of the public and private sectors. The Department of Homeland Security is the lead agency for the overall national effort to enhance the protection of critical infrastructure and key resources.

  1. The Federal Government has three primary responsibilities in regard to this national effort:
  2. (1) to produce and distribute timely and accurate threat advisory and alert information and appropriate protective measures to State, local, and tribal governments and the private sector via a dedicated homeland security information network;
  3. (2) provide guidance and standards for reducing vulnerabilities; and

(3) provide active, layered, and scalable security presence to protect from and deter attacks. Since private industry owns and operates the vast majority of the nation’s critical infrastructure and key resources, owners and operators remain the first line of defense for their own facilities.

They are responsible for increasing physical security and reducing the vulnerabilities of their property by conducting routine risk management planning, as well as investing in protective measures – e.g., staff authentication and credentialing, access control, and physical security of their fixed sites and cargoes – as a necessary business function.

As security measures at ports of entry, land-border crossings, and airports become more robust, criminals and terrorists will increasingly consider the lengthy U.S. coastline with its miles of uninhabited areas as a less risky alternative for unlawful entry into the United States.

  • The United States must therefore patrol, monitor, and exert unambiguous control over its maritime borders and maritime approaches.
  • At-sea presence reassures U.S.
  • Citizens, deters adversaries and lawbreakers, provides better mobile surveillance coverage, adds to warning time, allows seizing the initiative to influence events at a distance, and facilitates the capability to surprise and engage adversaries well before they can cause harm to the United States.

Minimize Damage and Expedite Recovery Minimize damage and expedite recovery from attacks within the maritime domain. The United States must be prepared to minimize damage and expedite recovery11 from a terrorist attack or other Incident of National Significance that may occur in the maritime domain.

  1. Our experience dealing with the catastrophic effects of Hurricane Katrina reinforces this key point.
  2. The response to such incidents is implemented through the comprehensive National Incident Management System, governed by the National Response Plan, which coordinates public and private sector efforts and brings to bear all required assets, including defense support of civil authorities.

The public and private sectors must be ready to detect and rapidly identify WMD agents; react without endangering first responders; treat the injured; contain and minimize damage; rapidly reconstitute operations; and mitigate long-term hazards through effective decontamination measures.

  1. These actions will preserve life, property, the environment, and social, economic, and political structures, as well as restore order and essential services for those who live and work within the maritime domain.
  2. A terrorist attack or similarly disruptive Incident of National Significance involving the marine transportation system can cause a severe ripple effect on other modes of transportation, as well as have adverse economic or national security effects.

From the onset of a maritime incident, Federal, State, local, and tribal authorities require the capability to assess the human and economic consequences in affected areas rapidly, and to calculate the effects that may radiate outward to affect other regional, national, or global interests.

These entities must also develop and implement contingency procedures to ensure continuity of operations, essential public services, and the resumption or redirection of maritime commercial activities, including the prioritized movement of cargoes to mitigate the larger economic, social, and possibly national security effects of the incident.

Recovery of critical infrastructure, resumption of the marine transportation system, and restoration of communities within the affected area must all occur simultaneously and expeditiously. Safeguard the Ocean and Its Resources Safeguard the ocean and its resources from unlawful exploitation and intentional critical damage.

  1. The unlawful or hostile exploitation of the maritime domain also requires attention.
  2. The vulnerability is not just within U.S.
  3. Territorial seas and internal waters.
  4. In the future, the United States can anticipate increased foreign fishing vessel incursions into its exclusive economic zones, which may have serious economic consequences for the United States.

Protecting our living marine resources from unlawful or hostile damage has become a matter of national concern. Potential consequences of such damage include conflict and regional instability among nations over the control of marine resources to the detriment of all.

  • The United States and other nations have a substantial economic and security interest in preserving the health and productive capacity of the oceans.
  • We will continue to project a U.S.
  • Presence by monitoring and patrolling the United States’ exclusive economic zones and certain high seas areas of national interest.

Assisting regional partners to maintain the maritime sovereignty of their territorial seas and internal waters is a longstanding objective of the United States and contributes directly to the partners’ economic development as well as their ability to combat unlawful or hostile exploitation by a variety of threats.

For example, as a result of our active discussions with African partners, the United States is now appropriating funding for the implementation of border and coastal security initiatives along the lines of the former Africa Coastal Security (ACS) Program. Preventing unlawful or hostile exploitation of the maritime domain requires that nations collectively improve their capability to monitor activity throughout the domain, establish responsive decision-making architectures, enhance maritime interdiction capacity, develop effective policing protocols, and build intergovernmental cooperation.

The United States, in cooperation with its allies, will lead an international effort to improve monitoring and enforcement capabilities through enhanced cooperation at the bilateral, regional, and global level. Section IV: Strategic Actions The United States recognizes that, because of the extensive global connectivity among businesses and governments, its maritime security policies affect other nations, and that significant local and regional incidents will have global effects.

  1. Success in securing the maritime domain will not come from the United States acting alone, but through a powerful coalition of nations maintaining a strong, united, international front.
  2. The need for a strong and effective coalition is reinforced by the fact that most of the maritime domain is under no single nation’s sovereignty or jurisdiction.

Additionally, increased economic interdependency and globalization, largely made possible by maritime shipping, underscores the need for a coordinated international approach. Less than 3 percent of the international waterborne trade of the United States is carried on vessels owned, operated, and crewed by U.S.

Citizens. The United States also recognizes that the vast majority of actors and activities within the maritime domain are legitimate. Security of the maritime domain can be accomplished only by seamlessly employing all instruments of national power in a fully coordinated manner in concert with other nationstates consistent with international law.

Maritime security is best achieved by blending public and private maritime security activities on a global scale into a comprehensive, integrated effort that addresses all maritime threats. Maritime security crosses disciplines, builds upon current and future efforts, and depends on scalable layers of security to prevent a single point of failure.

  • • Enhance International Cooperation
  • • Maximize Domain Awareness
  • • Embed Security into Commercial Practices
  • • Deploy Layered Security
  • • Assure Continuity of the Marine Transportation System

These five strategic actions are not stand-alone activities. Domain awareness is a critical enabler for all strategic actions. Deploying layered security addresses not only layers of prevention (interdiction and preemption) and protection (deterrence and defense) activities, but also the integration of domestic and international layers of security provided by the first three strategic actions.

Enhance International Cooperation Enhance international cooperation to ensure lawful and timely enforcement actions against maritime threats. As the world’s individual national economies become ever more closely integrated, it is critical that nations coordinate and, where appropriate, collectively integrate their security activities to secure the maritime domain.

Accordingly, the United States supports close cooperation among nations and international organizations that share common interests regarding the security of the maritime domain. This strategic action is designed to involve all nations that have an interest in maritime security, as well as the ability and willingness to take steps to defeat terrorism and maritime crime.

  1. Fundamental to this cooperation must be a shared understanding of threat priorities to unify actions and plans.
  2. New initiatives are needed to ensure that all nations fulfill their responsibilities to prevent and respond to terrorist or criminal actions with timely and effective enforcement.
  3. More robust international mechanisms will ensure improved transparency in the registration of vessels and identification of ownership, cargoes, and crew of the world’s multinational, multi-flag merchant marine.

Weak regulations and enforcement by some nations hinder transparency. Terrorists and criminals are currently exploiting this vulnerability by re-registering vessels under fictitious corporate names, and renaming and repainting vessels. New initiatives will be pursued diplomatically through international organizations such as the International Maritime Organization, the World Customs Organization, and International Standards Organization that already involve strong participation by industry.

  1. Where appropriate, these initiatives will build upon existing efforts, such as the Container Security Initiative, the Proliferation Security Initiative, the Customs-Trade Partnership Against Terrorism, the nonproliferation amendments to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation and the International Code for the Security of Ships and Port Facilities (ISPS Code), and the 2002 amendments to the International Convention for the Safety of Life at Sea, 1974. Initiatives will be coordinated by the Department of State and will include provisions such as:
  2. • Implementing standardized international security and World Customs Organization frameworks for customs practices and standards to ensure that goods and people entering a country do not pose a threat;
  3. • Expanding the use of modernized and automated systems, processes, and trade-data information to make vessel registration, ownership, and operation, as well as crew and cargo identification, more transparent and readily available in a timely manner;
  4. • Developing, funding, and implementing effective measures for interdicting suspected terrorists or criminals;
  5. • Developing and expanding means for rapid exchanges among governments of relevant intelligence and law enforcement information concerning suspected terrorist or criminal activity in the maritime domain;
  6. • Adopting streamlined procedures to verify nationality and take appropriate and verifiable enforcement action against vessels in a timely manner consistent with the well-established doctrine of exclusive flag State jurisdiction;
  7. • Expanding the United States Government’s capabilities to prescreen international cargo prior to lading;
  8. • Adopting procedures for enforcement action against vessels entering or leaving a nation’s ports, internal waters, or territorial seas when they are reasonably suspected of carrying terrorists or criminals or supporting a terrorist or criminal endeavor; and
  9. • Adopting streamlined procedures for inspecting vessels reasonably suspected of carrying suspicious cargo and seizing such cargo when it is identified as subject to confiscation.

The smooth operation of the global economy depends on the free flow of shipping through straits used for international navigation. About one third of the world’s trade and half its oil traverse the Straits of Malacca and Singapore. Many of these key international waterways are relatively narrow and could be closed to shipping, at least temporarily, by an accident or terrorist attack.

The United States will use the agencies and components of the Federal Government in innovative ways to improve the security of sea-lanes that pass through international straits. We will work with our regional and international partners to expand maritime security efforts. Regional maritime security regimes are a major international component of this Strategy and are essential for ensuring the effective security of regional seas.

The United States will continue to promote development of cooperative mechanisms for coordinating regional measures against maritime threats that span national boundaries and jurisdictions. By reducing the potential for regional conflict, maritime security is enhanced worldwide.

  • • Offering maritime and port security assistance, training, and consultation;
  • • Coordinating and prioritizing maritime security assistance and liaison within regions;
  • • Allocating economic assistance to developing nations for maritime security to enhance security and prosperity;
  • • Promoting implementation of the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation and its amendments and other international agreements; and
  • • Expanding the International Port Security and Maritime Liaison Officer Programs, and the number of agency attachés.
  • Maximize Domain Awareness
  • Maximize domain awareness to support effective decision-making.

A key national security requirement is the effective understanding of all activities, events, and trends within any relevant domain – air, land, sea, space, and cyberspace – that could threaten the safety, security, economy, or environment of the United States and its people.

Awareness and threat knowledge are critical for securing the maritime domain and the key to preventing adverse events. Knowledge of an adversary’s capabilities, intentions, methods, objectives, goals, ideology, and organizational structure, plus factors that influence his behavior, are used to assess adversary strengths, vulnerabilities, and centers of gravity.

Such knowledge is essential to supporting decision-making for planning, identifying requirements, prioritizing resource allocation, and implementing maritime security operations. Domain awareness enables the early identification of potential threats and enhances appropriate responses, including interdiction at an optimal distance with capable prevention forces.

  1. Achieving awareness of the maritime domain is challenging.
  2. The vastness of the oceans, the great length of shorelines, and the size of port areas provide both concealment and numerous access points to the land.
  3. Many maritime threats are conveyed in ways that thwart early detection and interdiction.
  4. The lack of complete transparency into the registration and ownership of vessels and cargoes, as well as the fluid nature of the crewing and operational activities of most vessels, offer additional opportunities for concealment and challenges for those attempting to maintain maritime security.

Domain awareness requires integrating all-source intelligence, law enforcement information, and open-source data from the public and private sectors. It is heavily dependent on information sharing and requires unprecedented cooperation among the various elements of the public and private sectors, both nationally and internationally.

  • To maximize domain awareness, the United States will leverage its global maritime intelligence capability and the diverse expertise of the intelligence and law enforcement communities.
  • The efforts of the existing maritime collection and analysis means will contribute to an intelligence enterprise equipped to collect, fuse, integrate, and disseminate timely intelligence and information.

This intelligence enterprise will support United States Government agencies and international partners in securing the maritime domain, as well as their other statutorily assigned missions. Additionally, the Departments of Homeland Security, Defense, and Justice will oversee the implementation of a shared situational awareness capability that integrates intelligence, surveillance, reconnaissance, navigation systems, and other operational information inputs, combined with access at multiple levels throughout the United States Government.

  1. The United States will continue to enhance the capabilities of current systems and develop new capabilities and procedures to locate and track maritime threats and illicit activities. Initiatives to maximize domain awareness include expansion and enhancement of the following:
  2. • Both short- and long-range vessel detection and monitoring capabilities;
  3. • Regulatory and private sector initiatives and agreements to enhance advance notices of arrival, vessel movement information, supply-chain security practices, and manifest and entry information for cargo;
  4. • International arrangements that promote enhanced visibility into the maritime supply chain and the movement of cargo, crews, and passengers;
  5. • Sensor technology, human intelligence collection, and information processing tools to persistently monitor the maritime domain;
  6. • International coalitions to share maritime situational awareness on a timely basis;
  7. • Global maritime intelligence and integration enterprise for intelligence analysis, coordination, and integration that supports all other national efforts;
  8. • Shared situational awareness to disseminate information to users at all levels;
  9. • Automated tools to improve data fusion, analysis, and management in order to systematically track large quantities of data, and to detect, fuse, and analyze aberrant patterns of activity – consistent with the information privacy and other legal rights of Americans; and
  10. • In order to advance to the next level of threat detection, transformational research and development programs in information fusion and analysis – these programs will develop the next qualitative level of capability for detection threats.
  11. Embed Security into Commercial Practices
  12. Embed security into commercial practices to reduce vulnerabilities and facilitate commerce.

Potential adversaries are opportunistic and will attempt to exploit existing vulnerabilities, choosing the time and place to act according to the weaknesses they observe. Private owners and operators of infrastructure, facilities, and resources are the first line of defense for their own property, and they should undertake basic facility security improvements.

They can improve their defenses against terrorist attacks and criminal acts by embedding into their business practices scalable security measures that reduce systemic or physical vulnerabilities. The elimination of security weaknesses depends upon incorporating best practices and establishing centers of excellence, including feedback loops for lessons learned, as well as a periodic review of each country’s security standards for mutual compatibility.

A close partnership between government and the private sector is essential to ensuring critical infrastructure and key resource vulnerabilities are identified and corrected quickly. Since 2001, the United States Government has developed and implemented a cargo container security strategy to identify, target, and inspect cargo containers before they reach U.S.

Ports. Under this strategy, the United States Government uses intelligence to review information on 100 percent of all cargo entering U.S. ports, and all cargo that presents a risk to our country is inspected using large x-ray and radiation detection equipment. Additionally, the United States Government requires that advance information about all containers be given to U.S.

Customs and Border Protection well before they arrive. In fact, the information is required 24 hours before cargo is loaded onto vessels at foreign seaports (24-Hour Rule). Containers posing a potential terrorist threat are identified and targeted before they arrive at U.S.

seaports by the National Targeting Center (NTC). The NTC was established as the centralized coordination point for all of Customs and Border Protection’s anti-terrorism efforts. NTC uses intelligence and terrorist indicators to review advance information for all cargo, passengers, and imported food shipments before arrival into the United States.

NTC coordinates with other Federal agencies such as the U.S. Coast Guard, Federal Air Marshals, FBI, Transportation Security Administration, and the Departments of Energy and Agriculture, as well as the intelligence community. Both the government and the private sector will continue to conduct vulnerability assessments to identify defenses that require improvement.

  1. A consistent risk management approach, which requires a comprehensive assessment of threat, likelihood, vulnerability, and criticality, will allow the private sector to invest in protective measures as a supporting business function.
  2. Further reduction in security vulnerabilities will also occur by encouraging the private sector, by means of outcome-based security standards, incentives, and market mechanisms, to conduct comprehensive self-assessments of their supply chain security practices; adhere voluntarily to baseline security criteria; and implement other regulatory security measures as deemed necessary by the Department of Homeland Security.
You might be interested:  Who Is Responsible For Health And Safety Inspections

Enhanced reporting, verification, and compliance procedures by the private sector, as well as the use of technology to allow greater visibility into the supply chain, will enable the government to develop more accurate processes for separating high-risk cargo from that which can be afforded expedited clearance.

In exchange, the shipments of firms that comply will be eligible for expedited clearance and have a reduced likelihood of inspections at departure, transshipment, and arrival ports. The complexity of the process for handling containerized shipments makes it more difficult to embed security practices and reduce vulnerabilities than for other types of cargo.

Container ships carry cargo for thousands of companies, and the containers are loaded individually away from the port. Each transfer of a container from one party to the next is a point of vulnerability in the supply chain. The security of each transfer facility and the trustworthiness of each company are therefore critical to the overall security of the shipment.

  • Cargo must be loaded in containers at secure facilities and the integrity of the container maintained to its final destination.
  • Supply chain personnel will employ various methods to prevent the misuse of containers and conveyances for transporting illegal commodities, as well as to detect tampering.
  • They will report the occurrence of each incident to the Department of Homeland Security and, when appropriate, resolve such incidents prior to the arrival of the identified containers in the United States.

Embedding security practices and vulnerability reduction efforts into commercial practices rests upon the implementation of key legislation, such as the Maritime Transportation Security Act of 2002 and the Trade Act of 2002, as well as International Maritime Organization requirements such as the International Ship and Port Facility Security Code, and public-private partnerships such as the Customs-Trade Partnership Against Terrorism.

The United States will build upon these statutes, international instruments, and identified best practices to develop a program of formal maritime security governance. Commercial businesses must put in place effective means to control access to their facilities. In cooperation with the private sector, the United States will establish a system-wide common credential for use across all transportation modes by individuals requiring unescorted physical access to secure, restricted, and critical areas of the maritime domain.

The identification card for access will use biometrics to link the person to the credential definitively. To receive this credential, individuals will undergo appropriate background checks. Credential services will also be available on a voluntary basis for frequent travelers under various registered traveler programs.

  1. Overly restrictive, unnecessarily costly, or reactionary security measures to reduce vulnerabilities can result in long-term harm both to the United States and global economies, undermine positive countermeasures, and unintentionally foster an environment conducive to terrorism.
  2. Security measures must accommodate commercial and trade requirements, facilitate faster movement of more cargo and more people, and respect the information privacy and other legal rights of Americans.

To support the accelerating growth of global commerce and security concerns, security measures must:

  • (1) be aligned and embedded with supply chain information flows and business processes;
  • (2) keep pace with supply chain developments;
  • (3) optimize the use of existing databases; and

(4) be implemented with the minimum essential impact on commercial and trade-flow costs and operations. This will require new and enhanced partnerships, as well as cost- and burden-sharing between the private and public sectors. Deploy Layered Security Deploy layered security to unify public and private security measures.

  1. The ability to achieve maritime security is contingent upon a layered security system that integrates the capabilities of governments and commercial interests throughout the world.
  2. The public and private sectors acting in concert can prevent terrorist attacks and criminal acts only by using diverse and complementary measures, rather than relying upon a single point solution.

Specifically, a layered approach to maritime security means applying some measure of security to each of the following points of vulnerability: transportation, staff, passengers, conveyances, access control, cargo and baggage, ports, and security en route.

This layered security is not static, but deters attack by continually evolving through calculated improvements that introduce uncertainty into the adversary’s deliberate planning process and efforts to conduct surveillance or reconnaissance. In deciding whether to implement a new security layer, the United States must take into account its effectiveness and cost in reducing risks Americans face, both in absolute terms and relative to other possible measures, and must ensure consistency with the information privacy and other legal rights of Americans.

• The Department of Homeland Security, the Department of Defense, and the Department of Justice, as well as the Department of State when diplomatic activities are required, will lead the United States’ efforts to integrate and align all United States Government maritime security programs and initiatives into a comprehensive, cohesive national effort of scalable, layered security.

  • This includes full alignment and coordination with appropriate State and local agencies, the private sector, and other nations.
  • To intercept and defeat transnational threats, the Department of Homeland Security and the Department of Defense will develop a mutually agreed process for ensuring rapid, effective support to each other.

Terrorist threats will be addressed as national security incidents employing as appropriate all instruments of national power to defeat the threat. All other maritime threats will be addressed through national authorities, consistent with national and international law, for mission accomplishment and self-defense, employing use-of-force protocols where necessary.

Physical protection is a fundamental layer of security. Primary protection measures by government agencies include maritime security or enforcement zones, vessel movement control, and the inspection of targeted cargo. Security zones are established and enforced around designated fixed facilities, certain vessels in transit, and sensitive geographic areas to provide an exclusion zone for controlled access and use only by the government.

Around these zones, the private sector employs other layers of physical security, such as access barriers, fencing, lighting, surveillance cameras, and guards, along with oversight procedures, to ensure system integrity for the critical infrastructure and key resources that they own and operate.

Security standards and procedures employed in the United States are developed in conjunction with other nations and industry, and are shared with State, local, and tribal governments. • The rapid and accurate identification of individuals for access to secure, restricted, and critical areas is a paramount protection measure that must be implemented by the private sector, in cooperation with the Federal Government.

Persons seeking to enter the United States will undergo identity checks and biometric screening at the border and in the coastal approaches to verify their lawful admission. • Protection layers also include the positive control of high-interest vessels.

  1. Mandatory adherence to a national vessel-movement reporting system is required for all vessels entering and departing U.S. ports.
  2. Security forces assigned to provide physical security for critical infrastructure and key resources must be trained and equipped to detect, identify, interdict, and defeat vessels that pose a threat.

• Not all maritime assets, facilities, systems, or ports require equal protection. The Federal Government will collaborate with State, local, and tribal governments and the private sector to assess and prioritize critical facilities, resources, infrastructure, and venues that are at greatest risk from hostile or unlawful acts.

Physical cargo inspection adds another layer of security. With as many as 30,000 containers entering the United States every day, physical inspection of all cargo would effectively shut down the entire U.S. economy, with ripple effects far beyond the seaports. Inspections on this scale are prohibitively expensive and often ineffective.

Using mandatory reporting information provided by the private sector, the United States will screen all inbound cargo and inspect all cargo designated as high-risk and ideally prescreen it before loading. In addition, all inbound cargo will be screened for WMD or their components.

  1. Establishment of the Domestic Nuclear Defense Office will contribute to improving the detection of a nuclear device or fissile or radiological material entering the United States through the maritime domain.
  2. Interdiction of personnel and materials that pose a threat to the United States or the maritime domain is an essential layer of security.

Interdiction, whether against terrorist personnel, terrorist materiel support, WMD, or other contraband, will be carefully coordinated to ensure prioritization of intelligence, proper allocation of resources, and, when necessary, swift, decisive action.

The United States, along with its international partners, will monitor those vessels, cargoes, and people of interest from the point of origin, through intervening ports, to the point of entry to ensure the integrity of the transit, to manage maritime traffic routing, and, if necessary, to interdict or divert vessels for inspection and search.

The United States will promote efforts to enhance the efficiency and effectiveness of detecting and determining the status of unidentified or unauthorized vessels, people, and cargo within the maritime domain. Military and law enforcement response provides a fourth security layer.

For maritime security operations on the high seas or in its exclusive economic zones, territorial seas, internal seas, inland rivers, ports, and waterways, the United States must have well trained, properly equipped, and ready maritime security forces from both the U.S. Armed Forces and national, regional, State, and local law enforcement agencies to detect, deter, interdict, and defeat any potential adversary.

For protection and deterrence to be successful, maritime security forces must be visible, vigilant, well-trained, well-equipped, mobile, adaptive, and capable of generating effective presence quickly, randomly, and unpredictably. In many instances each layer of maritime security is the responsibility of a different agency with multiple jurisdictions and functions.

Integrating these disparate maritime security layers requires a clear delineation of roles and responsibilities and cannot be achieved through cooperation alone. In particular, to achieve unity of effort and operational effectiveness, maritime security forces from both the U.S. Armed Forces and law enforcement agencies must have the capability and authority to operate in mutually supporting and complementary roles against the spectrum of expected security threats.

These security forces must have a high degree of interoperability, reinforced by joint, interagency, international training and exercises to ensure a high rate of readiness, and supported by compatible communications and, where appropriate, common doctrine and equipment.

• Recognizing the critical importance of interoperability, maritime security actions at the operational and tactical levels will be based on a network-centric approach that employs resources, as needed, from multiple agencies – primarily from the Department of Homeland Security and the Department of Defense – including surveillance and reconnaissance assets, aircraft, ships, boats, land units, and shore support facilities, all linked by an operational information network.

• Wherever feasible and operationally effective, agencies should co-locate in multiagency centers to facilitate direct interaction and efficient use of limited resources. Additionally, concrete and well-defined coordination protocols and communication mechanisms including procedures for operating jointly to prevent and respond to threats, and for assigning lead agencies for both pre- and post-incident operations, will be implemented.

The coordination protocols must also outline defined procedures for ensuring national execution of maritime security policy for specific threats or incidents, and more routine encounters where a multiagency response must be seamlessly coordinated. • Integrated planning and effective management of agency resources – Federal, State, and local – are essential for an effective response.

Therefore, agencies will also share training, planning, and other resources, where practical and permissible, to standardize operational concepts, develop common technology requirements, and coordinate budget planning for maritime security missions. • Acquisition and logistics processes must support the continuous assessment of all requirements to optimize the allocation of appropriate resources and capabilities.

  • Cooperative research and development efforts, coupled with reformed acquisition processes with coordinated requirements, funding, and scheduling, along with management, will identify unmet and emerging needs.
  • Assure Continuity of the Marine Transportation System Assure continuity of the marine transportation system to maintain vital commerce and defense readiness.

The United States will be prepared to maintain vital commerce and defense readiness in the aftermath of any terrorist attack or other similarly disruptive incidents that occur within the maritime domain. The response to such events should not default to an automatic shutdown of the marine transportation system; instead, the United States will be prepared to disengage selectively only designated portions, and immediately implement contingency measures to ensure the public’s safety and continuity of commerce.

  1. (1) a common framework with clearly defined roles for those charged with response and recovery;
  2. (2) ready forces that are properly trained and equipped to manage incidents, especially those involving WMD;
  3. (3) carefully crafted and exercised contingency plans for response, assessment, and recovery; and
  4. (4) extensive coordination among public, private, and international communities.

As stated in the Maritime Transportation Security Act and the National Response Plan, the Department of Homeland Security, with the U.S. Coast Guard as its executive agency, has the primary responsibility for maritime homeland security, including the coordination of mitigation measures to expedite the recovery of infrastructure and transportation systems in the maritime domain, with the exception of DOD installations.

Although this Strategy advocates that incidents should be managed at the lowest possible organizational and jurisdictional level, maritime incidents of national significance will require the combined expertise of all levels of government and the private sector, and coordination with international trading partners.

The United States will respond using the common coordinating structures contained within the National Response Plan and the National Incident Management System. Similarly, there is a need for corresponding international coordinating mechanisms to reconstitute commerce and minimize the global impact in the event of a significant maritime incident or threat.

  1. The first line of response in the aftermath of any terrorist attack is the first-responder community – police officers, firefighters, emergency medical care providers, public works personnel, and emergency management officials.
  2. However, this first line of response may have only limited capabilities for dealing with the effects of a WMD event within the maritime domain, such as a nuclear or radiological dirty bomb exploded on a vessel in a major port area.

The United States must build rapid-reaction forces to support first responders with capabilities to respond to WMD and other terrorist incidents that occur in the maritime domain. These response forces will blend the expertise and resources of the public and private sectors.

They will be organized, trained, equipped, and exercised to operate in contaminated environments and manage the consequences of WMD incidents. Specifically, they will develop and deploy capabilities to detect and identify harmful chemical and biological agents, as well as conduct casualty extraction and mass decontamination in the maritime environment.

Concurrent with efforts to ensure the public’s well-being, actions to maintain continuity of commerce must be implemented as quickly as possible, with a focus on expediting the recovery of maritime infrastructure, transportation systems, and affected maritime communities.

Contingency and continuity plans for the public and private sector must be developed and exercised. Protocols for assessment, recovery, and reconstitution must effectively prioritize local, regional, and national interests, manage risk and uncertainty within acceptable levels, and achieve validation through regular drills and exercises.

The marine transportation system will not be shut down as an automatic response to a maritime incident. Instead, a prudent and measured response will be taken based on an assessment of the specific incident, including available intelligence. Assessment and recovery efforts must be a shared responsibility of the public and private sectors.

  1. Accurate assessments regarding closures of selected commercial nodes within the marine transportation system, as well as effective efforts to redirect the affected modes of commerce, can only be achieved with the full cooperation of the private sector.
  2. To facilitate these actions, a formally recognized, national-level, coordinating body comprising private sector interests will liaison with Federal and State governments in developing and implementing these significant measures.

The direct and indirect costs associated with a prolonged and systemic disruption of the marine transportation system can be avoided by following the provisions of in-place contingency and continuity plans. These plans for assessment, recovery, and reconstitution must prioritize local, regional, and national interests, as well as manage risk and uncertainty within acceptable levels.

These contingency and continuity plans must be developed and exercised in a coordinated fashion by the public and private sectors. Section V: Conclusion This National Strategy presents a vision for the achievement of maritime security for the people and interests of the United States while respecting the information privacy and other legal rights of Americans.

Moreover, it underscores our commitment to strengthening our international partnerships and advancing economic well-being around the globe by facilitating commerce and abiding by the principles of freedom of the seas. As a vision for the future, it certainly faces some serious challenges.

The sheer magnitude of the maritime domain complicates the arduous and complex task of maintaining maritime security. The United States confronts a diverse set of adversaries fully prepared to exploit this vast milieu for nefarious purposes. The seas serve as the medium for a variety of transnational threats that honor no national frontier and that seek to imperil the peace and prosperity of the world.

Many of these threats mingle with legitimate commerce, either to provide concealment for carrying out hostile acts, or to make available weapons of mass destruction, their delivery systems, and related materials to nations and non-state actors of concern.

In this ambiguous security environment, responding to these unpredictable and transnational threats requires teamwork to prevent attacks, protect people and infrastructure, minimize damage, and expedite recovery. It necessitates the integration and alignment of all maritime security programs and initiatives into a far-reaching and unified national effort involving the Federal, State, local, and private sectors.

Since September 11, 2001, Federal departments and agencies have risen uncompromisingly to the challenge of maritime security. But even an enhanced national effort is not sufficient. The challenges that remain ahead for the United States, the adversaries we confront, and the environment in which we operate compel us to strengthen our ties with allies and friends and to seek new partnerships with others.

  1. Therefore, international cooperation is critical to ensuring that lawful private and public activities in the maritime domain are protected from attack and hostile or unlawful exploitation.
  2. Such collaboration is fundamental to worldwide economic stability and growth, and it is vital to the interests of the United States.

It is only through such an integrated approach among all maritime partners – governmental and nongovernmental, public and private – that we can improve the security of the maritime domain. Thus, effective implementation of this National Strategy requires greater cooperation, not less.

It requires deeper trust and confidence, not less. It requires a concerted application of collective capabilities to: increase our awareness of all activities and events in the maritime domain; enhance maritime security frameworks domestically and internationally; deploy a layered security based on law enforcement authorities, private sector partners’ competencies, and military might; pursue transformational research and development to move to the next level of information fusion and analysis and WMD detection technologies for qualitative improvements in threat detection; and lastly improve our response posture should an incident occur.

With this National Strategy, the course has been set, but rhetoric is no substitute for action, and action is no substitute for success. Annex A: Supporting Implementation Plans This Strategy directs the coordination of United States Government maritime security programs and initiatives to achieve a comprehensive and cohesive national effort involving appropriate Federal, State, local, and private sector entities.

  1. In support of this Strategy, eight national implementation plans provide amplifying detail and specificity: 1.
  2. National Plan to Achieve Maritime Domain Awareness lays the foundation for an effective understanding of anything associated with the maritime domain that could impact the security, safety, economy, or environment of the United States, and identifying threats as early and as distant from our shores as possible.2.
You might be interested:  Which Comes First Safety Or Security

Global Maritime Intelligence Integration Plan uses existing capabilities to integrate all available intelligence regarding potential threats to U.S. interests in the maritime domain.3. Maritime Operational Threat Response Plan aims for coordinated United States Government response to threats against the United States and its interests in the maritime domain by establishing roles and responsibilities that enable the government to respond quickly and decisively.4.

International Outreach and Coordination Strategy provides a framework to coordinate all maritime security initiatives undertaken with foreign governments and international organizations, and solicits international support for enhanced maritime security.5. Maritime Infrastructure Recovery Plan recommends procedures and standards for the recovery of the maritime infrastructure following attack or similar disruption.6.

Maritime Transportation System Security Plan responds to the President’s call for recommendations to improve the national and international regulatory framework regarding the maritime domain.7. Maritime Commerce Security Plan establishes a comprehensive plan to secure the maritime supply chain.8.

What are the three aim of maritime security?

Maritime security matrix – The maritime security matrix looks at the semantic relations between maritime security and other maritime concepts (see also semiotics ) using four dimensions to relate and situate maritime security topics in and to the general concept of ‘maritime security’:

  • Marine environment (e.g. connected to marine safety )
  • Economic development (e.g. connected to blue economy )
  • National security (e.g. connected to seapower )
  • Human security (e.g. connected to human trafficking )

A matrix may have each concept in a corner of a square, maritime security being situated in the centre. Depending on what is being analysed, concepts like human trafficking can then be situated e.g. between ‘maritime security’, ‘human security’, and ‘economic development’.

What are the 4 pillars of IMO?

2. What are the pillars of IMO? – The four pillars of IMO are the International Convention for the Safety of Life at Sea (SOLAS), International Convention on Standards of Training, Certification and Watchkeeping for Seafarers (STCW), International Convention for the Prevention of Pollution from Ships (MARPOL) and Maritime Labour Convention (MLC).

Who is responsible for ship safety and security?

The Duties Of Ship Security Officer (SSO) – International Register of Shipping (INTLREG) August 30, 2019 by INTLREG Admin A ship security officer (SSO) is an important entity under the International Ship and Port Facility (ISPS) code. The SSO is a person appointed by the company and the ship’s master for ensuring the security of the ship. Ship’s security is one of the greatest concerns for every shipping company whose ships ply in international waters.

The main duties of the ship security officer (SSO) include implementation and maintenance of a ship security plan, while working closely with the company security officer (CSO) and the port facility security officer (PFCO).According to the ISPS code, every ship must have a ship security officer, who has the full responsibility of the ship’s security.The main responsibilities of ship security officer (SSO) are:

Implementing and maintaining the ship security plan (SSP) Conducting security inspections at regular intervals of time to ensure that proper security steps are taken Making changes to the ship security plan if need arise Propose modifications to the ship security plan by taking various aspects of the ship into consideration Help in ship security assessment (SSA) Ensure that the ship’s crew is properly trained to maintain a high ship security level Enhance security awareness and vigilance on board ship Guide ship’s crew by teaching ways to enhance ship’s security Report all security incidents to the company and the ship’s master Taking view and suggestions of the company security officer and the port facility security officer into consideration while making amendments to the ship security plan Help company security officer (CSO) in his duties Take into account various security measures related to handling of cargo, engine room operations, ship’s store etc. Coordinate with ship board personnel and port authorities to carry out all ship operations with utmost security Ensure that the ship security equipment is properly operated, tested, calibrated, and maintained

The duties of ship security officer might change, increase, or decrease, depending on the type of the ship and situation. However, the main duties remain the same as mentioned above. The importance of maritime security has substantially increased with the increase in the number of piracy attacks.

What are the challenges of maritime security?

What are the maritime security challenges in India? Discuss the organizational, technical and procedural initiatives taken to improve the maritime security. Sample Answer Introduction Owing to a 7000 km long maritime border, Maritime Security is imperative to India’s National Security. Body Challenges in Maritime border Management

Less focus on Maritime security. Coordination issues due to – Fragmented Approach & Overlapping jurisdiction between State Police, Indian Coast Guards and Navy. Unsettled maritime borders ex – Pakistan. Uncooperative Behaviour by neighbouring countries – Ex – Sri Lanka allowing Chinese Ship.

Steps Taken to ensure Maritime Security Organisational

The National Committee for Strengthening Maritime and Coastal Security (NCSMCS) HEADED BY CABINET SECRETARY is a national-level forum for maritime and coastal security. The Indian Navy, Indian Coast Guard and State Marine Police, as a three tiered cover.

Participation in Regional groupings:

IORA – Indian Ocean Rim Association IONS – Indian Ocean Naval Symposium IOC – Indian Ocean commission BIMSTEC


Indigenous capacity building:

INS Arihant (Nuclear submarine) INS Vikrant (Aircraft carrier) Achieved Nuclear triad Electronic – Coastal Surveillance Network (CSN).


Post 26/11 – establishment of mechanisms for inter-agency coordination. State-wise Standard Operating Procedures (SOPs) for inter-agency coordination Coastal Security Exercises by Indian Navy and Indian Coast Guard

Conclusion There is a need for wholistic approach focussing on Geo-Political engagement, Capacity building along with the strengthening of the Security forces. : What are the maritime security challenges in India? Discuss the organizational, technical and procedural initiatives taken to improve the maritime security.

What are the requirements for maritime security?

You must have demonstrable skills with firearms and other small weapons, knowledge of the latest security practices and global security issues, and a willingness to work in potentially dangerous conditions.

What is SOLAS in maritime?

What is SOLAS? The International Convention for the Safety of Life at Sea (SOLAS) is an important international treaty concerning the safety of merchant ships. It ensures that ships registered by signatory States comply with minimum safety standards in construction, equipment and operation of ships.

What is the difference between SOLAS and IMO?

What does the SOLAS acronym mean? What is the relationship between IMO, SOLAS and MED? SOLAS is an acronym for Safety OfLife At Sea. SOLAS is a set of international standards established within the IMO, first released in 1914, following the Titanic disaster.

  1. Today SOLAS regulates the basic safety aspects for ships on international voyages such as stability, machinery, electrical installations, fire protection and lifesaving appliances.
  2. The main objective of the SOLAS Convention is to specify minimum standards for the construction, equipment and operation of ships.

We recall that the IMO, as a specialized agency of the United Nations, is the global standard-setting authority for the safety, security and environmental performance of international shipping. The Implementation Regulation (EU) 2019/1397 of MED Directive collects all the legislative and regulatory references useful for CE certification and placing on the European market of marine equipment.

For each MED Item the (SOLAS and IMO) design, construction and efficiency requirements are reported, together with the standards test provided by international instruments (ISO, EN standards). The SOLAS convention rules and IMO resolutions and circulars relevant to the SCBA are listed, together with the referring test standards, in the item MED/3.7, while the references for respirators for emergency evacuations (EEBD) are listed in the item MED/3.41.

: What does the SOLAS acronym mean? What is the relationship between IMO, SOLAS and MED?

What are the 4 common maritime threats?

The areas from which ships and maritime operations need protecting include terrorism, piracy, robbery, illegal trafficking of goods and people, illegal fishing and pollution.

What are maritime hazards?

Overview – The maritime industry includes the construction, repair, and scrapping of vessels, as well as the movement of cargo and other materials. Hazards include slips, trips, and falls, machinery and equipment hazards, hazardous chemicals, confined/enclosed spaces, and fire hazards.

What is the difference between safety and security?

Table Summarising the Difference between Safety and Security –

Safety Security
Meaning The word safety is used to refer to a condition where someone or a thing is protected from causes that are likely to cause harm to them. The word security means protecting organisations/people against threats/danger.
Usage It is used as a Noun. It is used as a Noun.
Example Miners have to take various precautions before they go into the mines for their own safety, The Queen’s security is of the utmost importance.

As you can see, the words ‘safety’ and ‘security’ are not the same. The following in-depth explanations of the words will help students understand these a bit more clearly. Let’s take a look.

What are the security level 1 2 and 3?

Security Requirements at KFTL Security at KFTL is governed by the governed by CMA-CGM Terminal Security Guidelines and by the requirements of the International Ship and Port Facility Security (ISPS) Code. For KFTL the ISPS Code is enforced by the designated regulatory authority in Jamaica, the Port Authority of Jamaica (PAJ). The ISPS Code employs an international system of three Security Levels:

Security Level 1: Normal Security Level 2: Heightened Security Level 3: Exceptional

These Security Levels reflect the likelihood that a security incident will occur; the higher the Security Level the greater the likelihood of a security incident. Levels above Security Level 2 is set by the government of Jamaica Minister with responsibility for Transport in conjunction with the Minister with responsibility for National Security in the Jamaica.

  • It is communicated through PAJ to the Terminal; the Maritime Authority of Jamaica, the JDF Coast Guard, Marine Police and vessels which have signaled their intention to call at KFTL.
  • At Security Level 1, the Terminal is required to have baseline security measures in place.
  • Security Level 2 represents a heightened level of threat, and the Terminal is required to increase levels of protective security.

Security Level 3 represents an imminent and specific threat, and the Terminal is required to increase security provisions still further and respond to instructions from relevant national security control authorities. KFTL also executes other security protocols in order to ensure cargo and container integrity and to comply with local and international mandates relating to contraband enforcement, dangerous cargo and high security cargo.

  • In this regard, all necessary measures and standards are implemented with respect to access control, searches, surveillance and perimeter and facility integrity, loss prevention and asset protection and in so doing KFTL runs and maintains a robust physical security protection system.
  • The aim of the protective security measures is to reduce the risk to the Terminal to an acceptable level.

Therefore, at times when risk is assessed to be greater there will be more stringent security measures in force than when the risk is deemed to be the risk is lower. Dangerous Goods and Hazardous Substances Procedures The Terminal employs strict protocols in relation to any dangerous goods passing through the port facility and procedures for handling, securing and recording the transit of such goods are in place.

Existing safety requirements (consistent with the International Maritime Dangerous Goods Code, IMDG Code) provide a strong foundation on which security requirements are based. Ships’ Crew and Shore Leave The Terminal considers it essential that the rights and needs of seafarers are considered throughout the security process and that security measures do not unduly inhibit seafarers’ ability to access shore facilities, take shore leave and receive visitors.

The Terminal will pay particular attention to the needs of ships’ crew when implementing pass systems and conducting searching. Ship’s crew are required to carry passports, Seafarer’s ID card, or ship’s pass in order to exit or enter the port facility.

Ship and Port Facility Communication Links The Terminal will ensure that there are effective channels of communication between the port facility and ships within, or intending to enter, KFTL. For example, the Terminal must be aware of the Security Level of any ship intending to enter so that, where necessary, appropriate actions can be taken.

The Terminal will also ensure effective communication between security personnel within KFTL which will allow coordinated response to a security incident. Ship Security Alert Response to any criminal activity on the seas in Jamaican waters rests with the Marine Police and the Jamaica Defence Force Coast Guard (JDF CG).

  1. Responsibility for investigation and prosecution of all offences committed in Jamaican waters rests with the Jamaican Police.
  2. The Ship Security Alert System (SSAS), if activated in Jamaican waters will be received by the JDF Coast Guard on behalf of the Maritime Authority of Jamaica and the Coast Guard will determine in conjunction with the MAJ any required action.

Response Agencies and Control Authorities KFL keeps up to date contact details for all relevant response agencies and control authorities to ensure rapid and effective communication in security emergencies or when necessary. Relevant agencies / authorities may include:

Port Authority of Jamaica (PAJ); Jamaica Constabulary Force (JCF) ; Jamaica Customs Agency; Jamaica Defense Force- Coast Guard; Ministry of Transport and Works; Ministry of Health Marine Police; Fire Department; Passport Immigration Citizenship Agency.

Designated restricted areas The Terminal will designate restricted areas within a port facility. The following areas will generally be classed as restricted areas:

Areas where dangerous goods and hazardous substances are stored; Areas where high value cargo are stored under surveillance; Passenger berths gangways/ shore-side areas immediately adjacent to the ship; Waterside at berths; Container freight storage areas; Empty container storage areas; Container exchange areas; Break bold and customs inspections areas; Warfage and fee payment areas; control authorities’ check and search points; and essential electrical, radio and telecommunication, water and other utility installations; engineering building and workshops; operations buildings; administrative buildings

Restricted areas will, in the majority of cases, be permanent and such areas will be delineated, secured and sign-posted. However, when the Terminal handles a particular vessel, cargo or traffic type on an infrequent basis, the restricted area may be temporary (albeit with the same characteristics i.e.

signed and secured). Signs are displayed around the perimeter of restricted areas to make clear that access is prohibited unless a person has a recognized pass and has been liable to body/possession or vehicular search. Signs will be clear, legible and prominently displayed either on the approach to the area or affixed to structures forming part of that area.

The Terminal will ensure that access to restricted areas is not facilitated by the proximity of vehicles or any other item that could be used as a climbing aid to help circumvent the fence. This “clear zone” is maintained around a restricted area irrespective of the prevailing Security Level.

  • The Terminal will post signs along the berth face to warn approaching unauthorized vessels that they are in a restricted area and the consequences of the breach Pass Systems.
  • FTL is required to have pass systems for all those requiring access to Terminal and controlled buildings.
  • The primary purpose of a pass system is to aid identification and control access.

The Terminal pass system incudes full passes, temporary passes and day passes for both persons and vehicles. Full Passes An identity document produced either automatically or manually, must be issued to all members of staff employed at the Terminal that require regular, authorized and unescorted access to a restricted area or controlled building.

A recent photograph and full name of the holder. A pass-specific serial number. A readily identifiable KFTL design or logo. Colour or shading to enable full passes to be easily distinguished from other passes. Expiry Date.

Temporary Passes A temporary pass must be issued to all contractors, consultants and regular trade persons who are employed for specific periods of time or who may require occasional, authorized and unescorted access to a restricted zone or controlled building.

Temporary passes will incorporate the same features as full passes, but are not required to include a photograph of the pass holder. Before a day pass is issued, visitors / trades persons must present at least one valid form of photo identification (preferably a passport or drivers licence) and provide a valid reason for requiring access to the area or building.

Day Passes A day pass will be issued to all visitors and occasional trades persons requiring access to a restricted area or Controlled Building. Day passes will incorporate the same features as full passes, but are not required to include a photograph of the pass holder.

  • Before a day pass is issued, visitors / trades persons must present at least one valid form of photo identification (preferably a passport or drivers licence) and provide a valid reason for requiring access to the area or building.
  • Vehicle Passes Full, temporary or day vehicle passes (as appropriate) may be issued to all persons requiring access to a restricted area by vehicle.

All vehicle passes will include the following details:

Vehicle Registration Make and model of vehicle A pass-specific serial number. A readily identifiable KFTL specific design or logo. Colour or shading to enable full passes to be easily distinguished from other passes. Expiry Date.

Before a vehicle pass is issued, the equivalent identification requirements for full, temporary and day passes outlined above must be met.

What does ISPS Code stand for?

What is ISPS? – ISPS (International Ship and Port Facility Security Code) is a security measure put into place in response to the 9/11 attacks by the IMO (International Maritime Organization) as part of the Safety of Life at Sea (SOLAS) Convention. ISPS assigns responsibilities to governments, shipping companies, shipping personnel, and port/facility personnel to detect security threats and take preventative measures against those threats affecting ships or ports used in international trade.

What is maritime security level 1 2 3?

– Security Level 1, normal; the level at which ships and port facilities normally operate; – Security Level 2, heightened; the level applying for as long as there is a heightened risk of a security incident; and – Security Level 3, exceptional, the level applying for the period of time when there is the probable or

Why is the maritime industry important?

1. The Maritime Industry Is Essential for Global Trade – Global trade is the lifeblood of the maritime industry. Without it, the industry would simply not exist. The shipping industry is responsible for transporting and delivering more than 95% of global trade by volume—roughly 11 billion tons annually.

This is an almost unbelievable number, especially considering the fact that this feat is carried out by only 50,000 merchant vessels. It’s hard to overstate how much we rely on the stability and efficiency of this complex network of merchant ships and ports. For a clear example of this fact, look no further than the container ship Ever Given.

When the Ever Given ran aground in the Suez Canal in 2020, over $60 billion worth of global trade was held up until the ship was freed. Among the goods that were held up was wood pulp used to produce products like paper, tissues, and perhaps most notably, toilet paper.

What is the importance of safe and unsafe working practices onboard the ship?

Proper housekeeping and safe ship working practices ensure a comfortable working environment and are critical for staying safe on the open water. Establishing and following a set of health and safety guidelines can keep ships functioning at an optimal level.

What is the importance of STCW in maritime?

Purpose of the STCW Code – The Code was established to set certain minimum international training standards for professional mariners. The level of certification and training you are required to have is based on the capacity you serve in & the type of vessel you work on.

What is the objective of maritime security awareness?

Maritime Security Awareness Training – Full Day Course (0800 – 1600) This course involves the skills and knowledge required to follow maritime security procedures in accordance with own role and responsibilities under Australian security requirements and regulations and the International Ship and Port Facility Security Code (ISPS Code).

Maintain basic awareness of potential security risks and situationsAssess a security incident and take appropriate action to report and rectify the situationSet priorities and manage security aspects of work tasks Work with others in the maintenance of vessel and port securityCommunicate effectively with others on security issues related to work role and functions