U.S. Ports: Safety and Emergency Management Analytical Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Despite the tremendous efforts in the field of port security, U.S. ports remain vulnerable to the threat of the terrorist attacks due to the complexity of their functional systems and the wide range of stakeholders responsible for the different aspects of safety measures development and implementation.

The following discussion will analyze and critique the safety and emergency management structures in the port environment. In addition, it will address the supporting plans and programs and the legislative policies developed to prevent and respond for a WMD attack at a major port.

The safety and emergency management structure found in the port environment can be evaluated as quite effective with some considerable issues that still remain. The weak points include the following omissions: (1) vessel identification system is not available for every port; (2) omissions are identified in port security assessment procedures; (3) security issues related to foreign vessels; (4) IT technical issues in the port security systems; and (5) inconsistence of emergency management practices in some ports to the general guidelines and regulations provided by the government (U.S. General Accounting Office, 2003a; U.S. General Accounting Office, 2003b).

The supporting plans and programs typically found in a major port operation complex structure of ports amount to ensuring that the brought to ports cargo is safe (U.S. General Accounting Office, 2005). The major components of these plans and programs include the principle of “reporting about every cargo assessment result within the 24-hours period” and “integrated training for all port security workers to ensure their professionalism as for the technical aspect of protection systems” (U.S. General Accounting Office, 2004).

Evaluating the legislative policies developed to prevent, prepare for, respond to, and recover from a WMD attack at a major port, considerable progress since the year 2001 is noted. Legislators did not fail to notice the limitations the port security systems had. Since the terrorist attack on September 11, 2001, the government systematically draws closer to the exalted objective to secure safety in ports.

The remarkable achievements include refining the Automated Targeting System regulations and designing the national standards for the port security workers’ attestation (Congressional Research Service, 2004; U.S. General Accounting Office, 2004). However, as far as I am concerned, the current legislative security policies are insufficient to secure and protect US ports due to the complicated system of port authority distribution between the public and private stakeholders, and interference from multiple governmental and private agencies.

The reality of a terrorist nuclear threat to America’s seaports is high. The situation is getting worse because of the sheer size of cargo being operated in ports every day and absence of the well-designed system of the central authority overseeing the maritime system (Cruise et al., 2013).

As a final point, the vulnerability of the U.S. ports to the terroristic threats remains of high concern to the government and commercial institutions due to a variety of complex issues connected with the port security. The most complicated issues relate to the complexity of ports authority.

Analysis of facts demonstrates that there are too many stakeholders involved in the process of port security control. These stakeholders have problems with implementing the unified security systems developed by the governmental agencies and, as a result, some of the major ports appear vulnerable to a WMD attack due to the existing unifying protection violations.

References

Congressional Research Service. (2004). . A Report to Congress. Web.

Cruise, R. J., D’Erman, V. J., & Grillot, S. R. (2013). Protecting Our Ports: Domestic and International Politics of Containerized Freight Security. New York, N.Y.: Ashgate Publishing, Ltd.

U.S. General Accounting Office. (2003a). . U.S. General Accounting Office. Web.

U.S. General Accounting Office. (2003b). . U.S. General Accounting Office. Web.

U.S. General Accounting Office. (2004). . U.S. General Accounting Office. Web.

U.S. General Accounting Office. (2005). . U.S. Government Accountability Office. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, May 29). U.S. Ports: Safety and Emergency Management. https://ivypanda.com/essays/port-security/

Work Cited

"U.S. Ports: Safety and Emergency Management." IvyPanda, 29 May 2019, ivypanda.com/essays/port-security/.

References

IvyPanda. (2019) 'U.S. Ports: Safety and Emergency Management'. 29 May.

References

IvyPanda. 2019. "U.S. Ports: Safety and Emergency Management." May 29, 2019. https://ivypanda.com/essays/port-security/.

1. IvyPanda. "U.S. Ports: Safety and Emergency Management." May 29, 2019. https://ivypanda.com/essays/port-security/.


Bibliography


IvyPanda. "U.S. Ports: Safety and Emergency Management." May 29, 2019. https://ivypanda.com/essays/port-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1