04734nam 2200661Ia 450 991078259100332120230721003719.01-281-79003-697866117900350-08-091953-7(CKB)1000000000555914(EBL)365617(OCoLC)437233568(SSID)ssj0000197908(PQKBManifestationID)11187939(PQKBTitleCode)TC0000197908(PQKBWorkID)10169283(PQKB)11470402(MiAaPQ)EBC365617(Au-PeEL)EBL365617(CaPaEBR)ebr10251243(CaONFJC)MIL179003(EXLCZ)99100000000055591420070904d2008 uy 0engur|n|---|||||txtccrMaritime security[electronic resource] an introduction /Michael McNicholasAmsterdam ;Boston Elsevier/Butterworth Heinemannc20081 online resource (470 p.)Butterworth-Heinemann homeland security seriesDescription based upon print version of record.0-12-370859-1 Includes bibliographical references and index.Front Cover; Maritime Security An Introduction; Copyright Page; Dedication Page; Table of Contents; About the Author; Contributors; Preface; Acknowledgments; Chapter 1: Commercial Seaports and Modes of Maritime Transport; Chapter 2: Documentation, Financial Transactions, and Business Entities in Commercial Maritime Transportation; Summary; Chapter 3: International and U.S. Maritime Security Regulation and Programs; Objectives; Introduction; The ISPS Code; Amendments to SOLAS; WCO's Framework of Standards to Secure and Facilitate Global Trade; U.S. Laws and ProgramsMaritime Transportation Security Act (MTSA)Customs-Trade Partnership Against Terrorism (C-TPAT); C-TPAT Security Criteria for Sea Carriers; Business Partner Requirements; Security Procedures; Container Security; Physical Access Controls; Personnel Security; Procedural Security; Security Training and Awareness; Physical Security; Information Technology Security; Security Assessment, Response, and Improvement; Summary; Chapter 4: Vulnerabilities in the Cargo Supply Chain; Objectives; Introduction; Vulnerabilities and Their Potential Impact; Lessons Learned from the Drug WarRecommended Security Practices at the Production/Loading PhaseManufacturer, Factory, and Plant; Recommended Security Practices at the Export Phase; Carriers and Seaports; Recommended Security Practices at the Importation/Distribution Phase; Ports of Entry and Importers; Special Vulnerabilities in the Maritime Environment; Cargo Theft; Internal Conspiracies and Techniques Used to Circumvent Security; Container Seals; ""Red Flags"" of Possible Criminal/Terrorist Surveillance; Summary; Chapter 5: Plagues of the Seas: Piracy and Stowaways; Objectives; Definition and Historical BeginningsHighlights of Recent Cases of PiracyTactics and Techniques in Piracy; Chapter 6: Drug Smuggling via Maritime Cargo, Containers, and Vessels; Chapter 7: Terrorism and Commercial Maritime Transportation; Chapter 8: A Strategic Blueprint for World-Class Seaport Security; Chapter 9: Port Security Management; Chapter 10: Threat Mitigation Strategies; Chapter 11: Information Security and Assurance; Further Reading; Glossary; IndexThe commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena--the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary ""choke point"" - the load seaports and their ships. This book Butterworth-Heinemann homeland security series.Merchant marineSecurity measuresShippingSecurity measuresMarine terminalsSecurity measuresMerchant marineSecurity measures.ShippingSecurity measures.Marine terminalsSecurity measures.387.16387.16 22McNicholas Michael1560673MiAaPQMiAaPQMiAaPQBOOK9910782591003321Maritime security3826822UNINA