Contributors |
|
xiii | |
Combined Cameo Bios |
|
xv | |
Foreword |
|
xxi | |
Preface |
|
xxiii | |
Acknowledgments |
|
xxv | |
|
|
1 | (22) |
|
Chapter 1 9.11, Maritime Transportation Security Act (MTSA), and how we got to where we are? |
|
|
3 | (20) |
|
|
|
Maritime trade and the Supply Chain Operations Reference model |
|
|
5 | (1) |
|
Components of international maritime trade |
|
|
6 | (6) |
|
Supporting implementation plans of the NSMS |
|
|
12 | (5) |
|
Maritime Domain Awareness |
|
|
12 | (1) |
|
Global Maritime Intelligence Integration Plan |
|
|
13 | (1) |
|
Maritime Operational Threat Response Plan |
|
|
14 | (1) |
|
International outreach and coordination strategy |
|
|
14 | (1) |
|
Maritime Infrastructure Recovery Plan |
|
|
15 | (1) |
|
Maritime Transportation System Security Plan |
|
|
15 | (1) |
|
Maritime Commerce Security Plan |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
Appendix A Title I--Maritime Transportation Security, Section 101: findings |
|
|
18 | (2) |
|
|
20 | (3) |
|
PART II Overview of intermodal maritime operations |
|
|
23 | (48) |
|
Chapter 2 Intermodalism history, advantages, and disadvantages |
|
|
25 | (14) |
|
|
Intermodalism: maritime and rail |
|
|
25 | (1) |
|
Intermodalism: maritime and truck |
|
|
26 | (1) |
|
Advantages to containerization |
|
|
27 | (3) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Reduced inventory carrying costs |
|
|
28 | (1) |
|
Reduced cargo loss and damage |
|
|
29 | (1) |
|
Disadvantages of containerization |
|
|
30 | (3) |
|
|
31 | (2) |
|
|
33 | (1) |
|
Needs of the small shipper and consignee |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (2) |
|
Chapter 3 Water and landside components |
|
|
39 | (16) |
|
|
Physical service providers |
|
|
40 | (1) |
|
Information service providers |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (5) |
|
Port operations and opportunities for security breach |
|
|
48 | (1) |
|
|
49 | (1) |
|
Evolution of port infrastructure |
|
|
49 | (1) |
|
Significance to supply chains |
|
|
50 | (3) |
|
|
53 | (1) |
|
|
53 | (2) |
|
Chapter 4 Other transportation modes |
|
|
55 | (16) |
|
|
|
59 | (1) |
|
|
60 | (2) |
|
Risk to rail and trucking to ports |
|
|
62 | (4) |
|
|
62 | (1) |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (4) |
|
PART III The nature of intermodal maritime security risk |
|
|
|
Chapter 5 Nature of the intermodal maritime security risk? |
|
|
71 | (14) |
|
A dramatic shift in global trade |
|
|
75 | (6) |
|
Rough seas on the North Atlantic |
|
|
81 | (1) |
|
Port-to-port (pier-to-pier) |
|
|
82 | (1) |
|
Door-to-port/port-to-door |
|
|
82 | (1) |
|
Door-to-door (house-to-house) |
|
|
83 | (1) |
|
|
83 | (2) |
|
Chapter 6 Components of intermodal maritime security risk |
|
|
85 | (16) |
|
The container: it is just a big box, right? |
|
|
85 | (3) |
|
Seals: keeping the goods inside and intruders out |
|
|
88 | (9) |
|
|
92 | (1) |
|
|
92 | (1) |
|
Thinking about your supply chain: important considerations |
|
|
92 | (5) |
|
Some final words of advice to shippers |
|
|
97 | (1) |
|
Appendix A Directory for standards associations for seals |
|
|
98 | (1) |
|
Appendix B Glossary of terms regarding seals |
|
|
98 | (1) |
|
|
99 | (2) |
|
Chapter 7 Threats from terrorists and other violent nonstate actors |
|
|
101 | (28) |
|
|
Maritime terrorism: a brief overview |
|
|
102 | (12) |
|
Terrorist threats to intermodal maritime security |
|
|
106 | (8) |
|
Intermodal maritime security threats from nonideologically oriented criminals |
|
|
114 | (7) |
|
|
116 | (5) |
|
Attacking intermodal maritime targets: motivations and challenges |
|
|
121 | (1) |
|
Future projections of threat |
|
|
122 | (2) |
|
|
124 | (5) |
|
Chapter 8 Physical and technological considerations |
|
|
129 | (22) |
|
|
|
Physical security measures |
|
|
129 | (14) |
|
|
131 | (4) |
|
|
135 | (1) |
|
|
136 | (4) |
|
Infrastructure protection and hardening |
|
|
140 | (3) |
|
Technological security measures |
|
|
143 | (4) |
|
|
147 | (1) |
|
|
148 | (3) |
|
Chapter 9 Vulnerabilities, gaps, and the future of physical and technological security measures |
|
|
151 | (18) |
|
|
|
Vulnerabilities and gaps in security measures |
|
|
151 | (5) |
|
Future of physical and technological security measures |
|
|
156 | (10) |
|
|
157 | (1) |
|
|
158 | (2) |
|
|
160 | (2) |
|
Infrastructure protection and hardening |
|
|
162 | (2) |
|
Technological security measures |
|
|
164 | (1) |
|
|
165 | (1) |
|
Appendix A University, government agency, and industry research organizations |
|
|
166 | (1) |
|
|
167 | (2) |
|
Chapter 10 Information security and cyber threats and vulnerabilities |
|
|
169 | (26) |
|
|
Information security introduction |
|
|
169 | (1) |
|
|
170 | (8) |
|
|
170 | (8) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
Transportation-related cybersecurity |
|
|
179 | (5) |
|
Maritime Transportation Security Act of 2002 |
|
|
180 | (1) |
|
U.S. Coast GuaruTTSA Transportation Worker Identification Credential |
|
|
181 | (1) |
|
U.S. Customs and Border Protections programs |
|
|
181 | (1) |
|
Cargo Systems Messaging Service |
|
|
181 | (1) |
|
Automated Commercial Environment |
|
|
181 | (1) |
|
Customs-Trade Partnership Against Terrorism |
|
|
182 | (1) |
|
Container security initiative |
|
|
183 | (1) |
|
Intra-shipment and post-shipment controls |
|
|
184 | (3) |
|
Supervisory control and data acquisition processes |
|
|
184 | (1) |
|
U.S. Coast Guard's Automatic Identification System |
|
|
185 | (1) |
|
CBP vehicle and cargo inspection system |
|
|
185 | (1) |
|
Radiation portals at ports |
|
|
186 | (1) |
|
Port security and surveillance systems |
|
|
187 | (1) |
|
|
187 | (4) |
|
|
191 | (1) |
|
|
192 | (3) |
|
Part IV Security measures and public policy |
|
|
195 | (40) |
|
Chapter 11 Multilateral trading partner policies |
|
|
197 | (18) |
|
|
|
Why the focus on intermodal transportation? |
|
|
197 | (1) |
|
Taxonomy of intermodal threats |
|
|
198 | (1) |
|
Immediate post-world war II |
|
|
198 | (3) |
|
Developed nations expand global oversight |
|
|
201 | (5) |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
204 | (2) |
|
National Maritime Intelligence-Integration Office |
|
|
206 | (4) |
|
Customs-trade partnership against terrorism |
|
|
206 | (1) |
|
Container security initiative |
|
|
207 | (1) |
|
Authorized economic operator credential |
|
|
207 | (1) |
|
The proliferation security initiative |
|
|
208 | (1) |
|
Multilayered defenses still leave gaps |
|
|
209 | (1) |
|
Appendix A Wassenaar checklist for international sellers |
|
|
210 | (2) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
Finance and contract conditions |
|
|
212 | (1) |
|
Appendix B Wassenaar checklist for transit and transshipment |
|
|
212 | (1) |
|
|
213 | (2) |
|
Chapter 12 Intermodal transport security--the Israeli perspective |
|
|
215 | (20) |
|
|
|
Part I Overview of maritime security |
|
|
215 | (1) |
|
|
215 | (2) |
|
The vital role of ports and shipping of Israel |
|
|
216 | (1) |
|
|
217 | (7) |
|
Threats to maritime transport to and from Israel |
|
|
219 | (2) |
|
Maritime transport--a vector for smuggling of military hardware |
|
|
221 | (1) |
|
Smuggling of military hardware |
|
|
222 | (1) |
|
|
223 | (1) |
|
Smuggling illicit goods and drugs to sponsor terror activities |
|
|
223 | (1) |
|
Containers as a direct vector for terrorist attack |
|
|
223 | (1) |
|
Thwarting threats to freedom of navigation--Israeli national doctrine |
|
|
224 | (1) |
|
How are these goals achievable? |
|
|
224 | (1) |
|
Securing Israeli commercial ports |
|
|
225 | (1) |
|
|
225 | (1) |
|
Part II Implementation of security |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
Freedom of navigation--the Israeli perspective |
|
|
228 | (1) |
|
|
229 | (3) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (2) |
|
PART V Risk mitigation approach |
|
|
235 | (80) |
|
Chapter 13 Loading at a foreign port |
|
|
237 | (22) |
|
|
|
|
Illustrative case: Ready-Tech, Inc |
|
|
237 | (3) |
|
Three shipments and their particulars |
|
|
238 | (1) |
|
Specific logistics arrangements |
|
|
239 | (1) |
|
Information flows at port of loading |
|
|
240 | (4) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
Comparing the processes: maintaining the flow of commerce and protecting supply chains |
|
|
244 | (2) |
|
Manifests: types and uses |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
Information and documentation |
|
|
246 | (5) |
|
Physical and technological security measures |
|
|
247 | (3) |
|
|
250 | (1) |
|
Physical, technological, and cyber impacts on risk |
|
|
251 | (2) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
How does this tie together? |
|
|
254 | (1) |
|
|
255 | (2) |
|
|
257 | (2) |
|
Chapter 14 In-transit threats and risk management |
|
|
259 | (22) |
|
|
|
260 | (1) |
|
|
260 | (5) |
|
|
260 | (2) |
|
|
262 | (1) |
|
|
263 | (2) |
|
Risk management strategies |
|
|
265 | (14) |
|
Risk-based decision-making |
|
|
265 | (1) |
|
Conventions, codes, and regulations |
|
|
266 | (2) |
|
Governmental initiatives, policies, and guidance |
|
|
268 | (1) |
|
|
269 | (1) |
|
Training, drills, and exercises |
|
|
270 | (1) |
|
Vessel security assessments and vessel security plans |
|
|
271 | (2) |
|
|
273 | (2) |
|
Rerouting and risk avoidance |
|
|
275 | (1) |
|
Military and paramilitary intervention |
|
|
275 | (2) |
|
Security systems and equipment |
|
|
277 | (2) |
|
|
279 | (1) |
|
|
279 | (2) |
|
|
281 | (14) |
|
|
281 | (3) |
|
Comparisons reveal contrasts |
|
|
281 | (2) |
|
|
283 | (1) |
|
|
284 | (2) |
|
Preparedness is paramount |
|
|
286 | (3) |
|
|
289 | (3) |
|
|
292 | (1) |
|
|
292 | (3) |
|
Chapter 16 Routing analysis, risk, and resiliency |
|
|
295 | (20) |
|
|
|
295 | (1) |
|
General discussion of risk assessment models |
|
|
296 | (3) |
|
Transportation risk assessment models |
|
|
299 | (1) |
|
Maritime risk assessment models |
|
|
300 | (3) |
|
Maritime CARVER framework |
|
|
303 | (7) |
|
How does this benefit the industry? |
|
|
310 | (1) |
|
Where do we go from here? |
|
|
311 | (1) |
|
|
312 | (3) |
|
PART VI The way forward: Recommendations |
|
|
315 | (46) |
|
Chapter 17 Systems considerations for Intermodal Maritime Security operations |
|
|
317 | (20) |
|
|
System definitions and key concepts |
|
|
318 | (1) |
|
Maritime domain awareness using systems thinking |
|
|
319 | (3) |
|
Considerations for the intermodal Maritime Security System |
|
|
322 | (7) |
|
|
329 | (1) |
|
|
329 | (8) |
|
Chapter 18 Public policy and security partnerships |
|
|
337 | (8) |
|
|
Stemming the tide of drug smuggling |
|
|
332 | (2) |
|
Terrorism and changing international trade forever |
|
|
334 | (3) |
|
|
337 | (1) |
|
The public--private partnership |
|
|
338 | (1) |
|
Internationalization of trade partnerships |
|
|
339 | (3) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
Chapter 19 Intermodal maritime security: where do we go from here? |
|
|
345 | (16) |
|
|
|
A high level overview of intermodal maritime security |
|
|
347 | (1) |
|
Thinking about the threats |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
Trading between related companies |
|
|
349 | (1) |
|
Security measures taxonomy |
|
|
350 | (2) |
|
Manual versus automated international trade documentation |
|
|
352 | (1) |
|
Technological and cyber threats that impact all aspects of the supply chain |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
Government trade regulation |
|
|
354 | (1) |
|
Importers, exporters, and trade intermediaries |
|
|
354 | (1) |
|
Where do we go from here? |
|
|
354 | (2) |
|
Near-sourcing and crossborder shipments |
|
|
355 | (1) |
|
Resilience of supply chains |
|
|
355 | (1) |
|
Distributed decision-making, often done in a vacuum |
|
|
356 | (1) |
|
Where research can benefit intermodal maritime security? |
|
|
356 | (2) |
|
|
357 | (1) |
|
Appendix A Security measures taxonomy assessment |
|
|
358 | (2) |
|
Domestic and international procedural processes |
|
|
358 | (2) |
|
|
360 | (1) |
List of additional reading |
|
361 | (2) |
Index |
|
363 | |