StudyBoss » Security » Operation Noble Air

Operation Noble Air

1 – What do you consider the 3 most important resources available to the MTSA required port FSO in assessing domestic and international risks associated with terrorism and other criminal activity threats posed to port maritime operations and the MTS? Be Specific. This can be policy, data, authorities, etc. This is not simply a cut and paste from three references. You need to explain WHY these are important in the assessment of risk within the MTS.

I think one of most important resource available to port facility security officer under Maritime Transportation Security Act is the have control access to the port and other security vulnerability areas under their responsibility. One of the measure under MTSA that control access to the port is the Transportation Worker Identification Credential (TWIC) which provides workers that have been checked via databases and criminal background checks to ensure that they are cleared to work within the sensitives areas of our nations ports.

Many port access points are secure through machine readers, that reads the barcode or chip within the worker TWIC card for access. Information is fed to a database to show when and where a person access a certain area of the port. By accounting for all personnel within port this contributes to the overall security of the port and its assets.

Another important resource that is available to port facility security officer under the Maritime Transportation Security Act is the Facility and Vessel Vulnerability Assessment which is performed by the Department of Homeland Security (DHS) and provided to the port facility security officer, port owner, or their representative with port or vessel vulnerabilities noted. This gives the port facility security officer a baseline to followed when correcting or fixes vulnerabilities.

The agencies within the Department of Homeland Security that responsibility to perform the assessment is the United States Coast Guard. Those assessments set the standard for a port facility security officer to fixed and correct the vulnerability once noted or otherwise identify. Finally, another resource that is available to the port facility security officer is review of vessel and facility security plans by a competent authority to serve as a deterrent of a security incident. This authority is designated from the Department of Homeland Security is usually the United States Coast Guard.

This allows the port facility security officer to feel confident in their security plan for the overall security of their port and or vessels. The security outline the security, access control, and training requirement for security personnel within each port. Since members of the port security forces are usually private citizens and not government workers it is the responsibility of each employer to insure the competent of all their personnel along with their local policies. 2 – What is the role of the United States Coast Guard in port security operations looking for specific authorities?

The roles of the United States Coast Guard in our nations port security operation is to provided and protect our nations ports and coastlines as part of a larger operation with the Department of Defense called Operation Noble Eagle. Operation Noble Eagle is the United States military along with our Canadian allies’ mission to protect the homeland. While the USCG maintains overall maritime enforcement responsible, other branch of the DoD maintain air and ground responsible in protecting the country against terrorist attacks, such as the events of 9/11.

The security of our nations has changed since the events of 9/11 to ensure that they will never happen again. The United States Air Force is tasked under the Operation Noble Eagle to treat all air threats as hostile, until otherwise verified. If not verified and threat is not stop, USAF pilots may be tasked to shoot aircraft out the sky as a last resort. The United States Coast Guard, however plays an integrated part of both the United States military and homeland security mission.

The United States Coast Guard is only branch within the Department of Defense that has a military and homeland security mission. The United States Coast Guard under Title 14 USC 89 gives them the authority to conduct law enforcement operation within the high seas and waters the United States has authority to enforce federal law (USCG 2001). In a law enforcement capacity, petty officers and officer have the authority to detain and search vessel both in port and on our nations high seas.

The main different between the United States Coast Guard and civilian authority is they are often armed with military weapons such as the . 50 caliber machine gun and M4 since they operated in both a homeland security and military capacity. What do you believe the greatest challenges for the service will be in this mission set? I think the biggest challenges for the United States Coast Guard is the amount of mission sets they are responsible for. Much like many branches of our nation’s military they often operate in more mission than before with less personnel.

This can result in the burning out of personnel if the proper rest of leave is not allowed. Additionally, funding for homeland and military missions often depends on congress passing bills, which often are at the last minute. This in turn can affect the pay checks and moral of personnel performing the mission. The Coast Guard and other Homeland Security entities need to have both the technology and funding to perform their jobs in protect our homeland from attacks and contraband. 3 – What is maritime Cyber terrorism and how does it threaten port security operation?

You can consider the ship, the port and intermodal operations) Emphasis on your analysis of this threat vector. The threat of cyber terrorism within our nation’s is one of the many threats we face as a nation. A cyber-attack within our nation port can render port equipment inoperable or unable to control potential injury or killing workers. For example, cyber-attacks can take control of an automation container loading machine, and perform a remote attack on the workers and vessels in port. This is worst case scenario with devastating effects.

Additional any delay or attacked in our nations ports can have a devastation effect on both our national economy and well-being. Cyber-attacks are increasing and the port areas of our nations is not exempt. We must neutralize all threats and put plans in place so they don’t happen. Both state actors and terrorist have used cyber-attacks to achieved their overall goals in the past and no organization or state can be discount. Many port systems used the internet as automation card readers and security are connect to internet and can be hacked if not properly defended.

The Department of Homeland along with other department within the executive branch are responsible for providing threat assessment on cyber security vulnerabilities under order of the president of the United States cyber executive orders. This includes working with private entities to ensure defenses are in place to defend and deter cyber-attacks. Cyber-Security is the responsible of all within the port security supply chain, to even include those outside the port. Any vulnerability can make all within the port security communities vulnerability if procedures are not follow.

One vulnerability, can make everyone vulnerability in our new cyber world of security. Security manager should always be a breast on up to date technology advancement in the cyber security world as much as the physical security world. Often in the cyber security world advancements in technology are made after the fact and requires quick implementation when needed to secure the system from the threat. Anti-virus software is important to every asset within the supply chain, because one infected computer can affect thousands. This can force the whole port to go down automation possibly cause delays in movement and/or economic hardship.

Cite This Work

To export a reference to this article please select a referencing style below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.