| Preface |
|
xvii | |
| Acknowledgments |
|
xix | |
| Author |
|
xxi | |
| Introduction |
|
xxv | |
| Chapter 1 Maritime Community |
|
1 | (38) |
|
|
|
1 | (1) |
|
Ports and Port Facilities |
|
|
2 | (2) |
|
|
|
4 | (7) |
|
|
|
11 | (4) |
|
|
|
15 | (3) |
|
Cruise and Passenger Ships |
|
|
15 | (2) |
|
|
|
17 | (1) |
|
|
|
17 | (1) |
|
|
|
18 | (1) |
|
|
|
18 | (1) |
|
State, Territory, and Local Waterway Law Enforcement Agencies |
|
|
18 | (11) |
|
|
|
21 | (4) |
|
U.S. Coast Guard Auxiliary |
|
|
25 | (3) |
|
|
|
28 | (1) |
|
Boat Owners Association of the United States |
|
|
29 | (1) |
|
International Association of Maritime Security Professionals |
|
|
29 | (9) |
|
International Maritime Organization: International Ship and Port Facility Security Code |
|
|
34 | (1) |
|
U.S. Coast Guard: Maritime Transportation Security Act of 2002 |
|
|
35 | (1) |
|
Security and Accountability for Every Port Act of 2006 |
|
|
36 | (1) |
|
Office of Naval Intelligence: National Maritime Intelligence Center |
|
|
36 | (2) |
|
|
|
38 | (1) |
| Chapter 2 Security Threats to the Maritime Community |
|
39 | (18) |
|
|
|
40 | (1) |
|
Traditional Criminal Activity |
|
|
41 | (1) |
|
|
|
41 | (9) |
|
|
|
43 | (1) |
|
|
|
43 | (1) |
|
|
|
44 | (1) |
|
|
|
44 | (1) |
|
|
|
44 | (1) |
|
Typical Profile of a Terrorist |
|
|
44 | (1) |
|
Organizational Structure of Terrorist Groups |
|
|
45 | (1) |
|
|
|
45 | (1) |
|
|
|
46 | (4) |
|
Maritime Terrorism and Weapons of Mass Destruction |
|
|
50 | (1) |
|
Nuclear/Radioactive Weapons |
|
|
50 | (1) |
|
|
|
50 | (1) |
|
|
|
51 | (1) |
|
|
|
51 | (1) |
|
|
|
52 | (2) |
|
|
|
52 | (1) |
|
|
|
52 | (1) |
|
|
|
52 | (1) |
|
|
|
53 | (1) |
|
Suspicious People Who Do Not Belong |
|
|
53 | (1) |
|
|
|
53 | (1) |
|
Deploying Assets/Getting into Position |
|
|
54 | (1) |
|
Use of Criminal Profiling for Counter Maritime Terrorism |
|
|
54 | (1) |
|
|
|
55 | (2) |
| Chapter 3 Cybersecurity Threats to the Maritime Community |
|
57 | (8) |
|
|
|
57 | (1) |
|
The Threat from Cybersecurity Attacks |
|
|
58 | (3) |
|
|
|
58 | (1) |
|
|
|
59 | (1) |
|
|
|
59 | (1) |
|
Chain Letters or E-Mail Malware |
|
|
59 | (1) |
|
|
|
59 | (1) |
|
Data Theft, Leaks, and Loss |
|
|
59 | (1) |
|
|
|
59 | (1) |
|
Domain Name System Hijacking |
|
|
60 | (1) |
|
Fraudulent Antivirus Malware |
|
|
60 | (1) |
|
|
|
60 | (1) |
|
|
|
60 | (1) |
|
|
|
60 | (1) |
|
|
|
61 | (1) |
|
Social Networking Threats |
|
|
61 | (1) |
|
|
|
61 | (1) |
|
|
|
61 | (1) |
|
Countering Maritime Cybersecurity Attacks |
|
|
61 | (3) |
|
|
|
62 | (1) |
|
|
|
62 | (1) |
|
|
|
63 | (1) |
|
|
|
63 | (1) |
|
|
|
63 | (1) |
|
Intrusion Prevention Systems |
|
|
63 | (1) |
|
|
|
63 | (1) |
|
|
|
63 | (1) |
|
|
|
64 | (1) |
| Chapter 4 Components of Maritime Physical Security |
|
65 | (40) |
|
Intrusion Detection Systems |
|
|
66 | (4) |
|
|
|
66 | (1) |
|
|
|
67 | (1) |
|
|
|
67 | (1) |
|
|
|
67 | (1) |
|
|
|
68 | (1) |
|
|
|
68 | (1) |
|
|
|
68 | (1) |
|
|
|
68 | (1) |
|
|
|
68 | (1) |
|
|
|
69 | (1) |
|
Capacitance Proximity Sensors |
|
|
69 | (1) |
|
|
|
70 | (1) |
|
|
|
70 | (2) |
|
Dual-Chamber Smoke Detectors |
|
|
71 | (1) |
|
Rate of Rise Heat Detectors |
|
|
71 | (1) |
|
Natural Gas or Carbon Monoxide Detectors |
|
|
72 | (1) |
|
|
|
72 | (1) |
|
|
|
72 | (3) |
|
|
|
73 | (1) |
|
Transmission of the Signal |
|
|
74 | (1) |
|
|
|
74 | (1) |
|
Digital Recording and Monitoring |
|
|
74 | (1) |
|
|
|
74 | (1) |
|
Determining Total System Costs |
|
|
75 | (8) |
|
|
|
76 | (1) |
|
System Installation Costs |
|
|
77 | (1) |
|
|
|
77 | (1) |
|
|
|
78 | (1) |
|
|
|
78 | (1) |
|
|
|
79 | (1) |
|
|
|
79 | (1) |
|
|
|
79 | (1) |
|
|
|
80 | (1) |
|
|
|
80 | (3) |
|
|
|
81 | (2) |
|
Locks, Key Controls, and Access Controls |
|
|
83 | (7) |
|
|
|
84 | (1) |
|
|
|
84 | (1) |
|
|
|
85 | (1) |
|
High-Security Deadbolt Locks |
|
|
85 | (2) |
|
Card Access Electrified Locks |
|
|
87 | (1) |
|
|
|
87 | (2) |
|
|
|
89 | (1) |
|
Control of Keys and Locking Devices |
|
|
90 | (1) |
|
|
|
90 | (1) |
|
|
|
90 | (1) |
|
|
|
90 | (1) |
|
Disposition of Employee Keys upon Transfer or Termination |
|
|
90 | (1) |
|
|
|
90 | (3) |
|
|
|
92 | (1) |
|
Security Barriers and Fencing |
|
|
93 | (3) |
|
|
|
96 | (2) |
|
|
|
97 | (1) |
|
|
|
97 | (1) |
|
|
|
98 | (1) |
|
|
|
98 | (1) |
|
Protection of Windows and Utility Ports |
|
|
98 | (3) |
|
|
|
98 | (1) |
|
|
|
99 | (1) |
|
|
|
99 | (1) |
|
|
|
99 | (1) |
|
Annealed Glass with a Security Film |
|
|
99 | (1) |
|
|
|
99 | (1) |
|
|
|
99 | (2) |
|
|
|
100 | (1) |
|
|
|
100 | (1) |
|
|
|
100 | (1) |
|
Radio Frequency Identification, Magnetometers, and X-Rays |
|
|
101 | (1) |
|
|
|
102 | (1) |
|
|
|
102 | (1) |
|
|
|
102 | (3) |
| Chapter 5 Security Departments |
|
105 | (24) |
|
|
|
105 | (1) |
|
Determining the Size of the Security Department |
|
|
106 | (1) |
|
Mission of the Security Department |
|
|
106 | (2) |
|
Legal Authorization to Protect a Facility and Ship |
|
|
108 | (1) |
|
|
|
108 | (1) |
|
|
|
109 | (1) |
|
Profiles and Security Threats |
|
|
109 | (1) |
|
Size of the Facility and Ship |
|
|
110 | (1) |
|
|
|
110 | (1) |
|
Number of Employees-Visitors |
|
|
110 | (1) |
|
Proprietary Security Force |
|
|
110 | (1) |
|
|
|
111 | (1) |
|
Security Department Uniforms and Identification |
|
|
112 | (1) |
|
Staff and Visitor Identification |
|
|
113 | (1) |
|
Security Department Protective Equipment |
|
|
114 | (1) |
|
|
|
115 | (3) |
|
Security Department Vehicles |
|
|
118 | (1) |
|
Emergency Vehicle Lighting |
|
|
119 | (1) |
|
Security Department Communications |
|
|
119 | (1) |
|
Security Department Reports |
|
|
120 | (1) |
|
Incident/Complaint Reports |
|
|
120 | (1) |
|
|
|
120 | (1) |
|
Protection of Security Department Information |
|
|
121 | (1) |
|
|
|
121 | (1) |
|
|
|
121 | (1) |
|
Security Department Training |
|
|
122 | (1) |
|
Professional Security Certifications |
|
|
123 | (1) |
|
|
|
124 | (3) |
|
|
|
127 | (1) |
|
|
|
127 | (2) |
| Chapter 6 Marina Security |
|
129 | (28) |
|
|
|
129 | (25) |
|
Marina Security Awareness Program |
|
|
141 | (1) |
|
Physical Security for the Marina |
|
|
142 | (3) |
|
Marina Perimeter Security |
|
|
142 | (3) |
|
Marina Access and Key Control |
|
|
145 | (1) |
|
|
|
146 | (2) |
|
|
|
148 | (1) |
|
|
|
149 | (2) |
|
|
|
151 | (1) |
|
Security of Boat Storage Areas |
|
|
151 | (1) |
|
Security of Fueling Facilities |
|
|
152 | (1) |
|
Security of Chemical Storage Tanks |
|
|
153 | (1) |
|
|
|
153 | (1) |
|
|
|
154 | (3) |
| Chapter 7 Port Facility Security |
|
157 | (16) |
|
Port Facility Security Officer and Security Force |
|
|
157 | (1) |
|
Training of the Security Force |
|
|
158 | (1) |
|
Port Facility Security Assessment |
|
|
159 | (1) |
|
Port Facility Security Plan |
|
|
160 | (1) |
|
Physical Security of the Port and Port Facility |
|
|
161 | (8) |
|
|
|
161 | (2) |
|
Port Facility Access and Key Control |
|
|
163 | (1) |
|
Port Facility Security Signage |
|
|
164 | (2) |
|
Port Facility Security Lighting |
|
|
166 | (1) |
|
Port Facility Security Cameras |
|
|
167 | (1) |
|
|
|
168 | (1) |
|
Security of Port Facility Chemical Storage TANKS |
|
|
169 | (1) |
|
Port Facility Internet Security |
|
|
169 | (1) |
|
Port Facility Security Communications |
|
|
170 | (1) |
|
Port Facility Security Administration |
|
|
170 | (1) |
|
Port Facility Emergency Security Drills and Exercises |
|
|
171 | (1) |
|
U.S. Navy Physical Security at Private Contractor's Facilities |
|
|
171 | (1) |
|
|
|
172 | (1) |
| Chapter 8 Small Watercraft and Yacht Security |
|
173 | (6) |
|
Shipboard Physical Security |
|
|
173 | (1) |
|
Security and Crew Selection |
|
|
174 | (1) |
|
|
|
174 | (1) |
|
Small Watercraft Trailer and Storage Security |
|
|
175 | (2) |
|
|
|
177 | (2) |
| Chapter 9 Ship Security |
|
179 | (10) |
|
Vessel and Company Security Officer and Vessel Security Personnel |
|
|
179 | (1) |
|
|
|
179 | (1) |
|
|
|
179 | (1) |
|
Vessel and Company Security Personnel |
|
|
180 | (1) |
|
Training of the Security Force |
|
|
180 | (1) |
|
Vessel Security Assessment |
|
|
181 | (1) |
|
|
|
181 | (2) |
|
Physical Security and Equipment for Vessels |
|
|
183 | (1) |
|
|
|
183 | (1) |
|
Vessel Security Communications |
|
|
184 | (1) |
|
Vessel Security Administration |
|
|
185 | (1) |
|
Vessel Emergency Security Drills and Exercises |
|
|
185 | (1) |
|
Naval Vessel Protective Zone |
|
|
186 | (1) |
|
|
|
187 | (2) |
| Chapter 10 U.S. Coast Guard America's Waterway Watch Program |
|
189 | (10) |
|
Identifying Suspicious Activity |
|
|
190 | (1) |
|
Documenting and Reporting Suspicious Activity |
|
|
191 | (1) |
|
America's Waterway Watch (AWW) Program Security Recommendations |
|
|
192 | (5) |
|
|
|
194 | (1) |
|
America's Waterway Watch Program Security Recommendations |
|
|
194 | (1) |
|
|
|
195 | (1) |
|
Research Questions and Hypotheses |
|
|
195 | (1) |
|
|
|
196 | (1) |
|
|
|
196 | (1) |
|
|
|
196 | (1) |
|
|
|
197 | (1) |
|
|
|
197 | (2) |
| Appendix A: United States and Territory Boating Law Enforcement Agencies |
|
199 | (6) |
| Appendix B: Security, Maritime Security, and Boating Organizations |
|
205 | (2) |
| Appendix C: Security, Maritime Security, and Boating Publications |
|
207 | (2) |
| Appendix D: U.S. Piracy Laws |
|
209 | (4) |
| Appendix E: U.S. Navy Physical Security at Private Contractor's Facilities |
|
213 | (12) |
| Index |
|
225 | |