Book
Maritime Security: Protection of Marinas, Ports, Small Watercraft, Yachts, and Ships
With the majority of the surface of the globe being water, most of the cargo that is shipped to, or from, the United States as well as other countries is accomplished by the maritime community, which is the economic lifeline of the country. The security of the maritime industry is vital to its continued operation and national security, which is the reason for writing this book. The threat to the maritime community and the United States from natural threats, traditional criminal activity, piracy, and terrorism has continued from colonial days to the present. These threats have included the theft of cargo and vessels and the smuggling of people, weapons, drugs, and other contraband. During periods of war, the threats have included sabotage and espionage, such as the bombing of the Black Tom Island port and military supply depot, which was located across the water from New York City, by German saboteurs during World War I. The fight against piracy has been nonstop since the formation of the U.S. Navy to counter the Islamic pirates off the Barbary Coast to the use of the U.S. Navy Seals to free Captain Phillips during the piracy of his ship and his hijacking ordeal. The goal of this book is to provide valuable information to assist in the development of an effective maritime security program. It is not the intent of this book to address the security of cargo in the maritime supply chain but rather to focus on the protection of ships, watercraft, and the maritime infrastructure. With the protection of the maritime industry, in turn, cargo will also be secured. Chapters 1 and 2 explore what comprises the maritime community, such as marinas and ports. Numerous types of watercraft and ships are identified as well as the various threats to the maritime community. This includes natural threats such as storms as well as traditional criminal activity and piracy. The current terrorism threat is presented in great detail. The new threat from cyberterrorism and cybercrime is addressed in Chapter 3. The components of a physical security program and an effective security force are examined in Chapters 4 and 5. This lays the foundation
Judul | Edisi | Bahasa |
---|---|---|
Biological shielding assessment and dose rate calculation for a neutron inspection portal | en |