American Port Security Challenges Analytical Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Tackling the issues associated with port security is of high significance for international trade. Beginning from 2001, the reality of the terrorist threat to America’s ports has increased considerably including the risk of the nuclear attack with the so-called “dirty bomb”.

However, terrorism is not the only port security challenge. Illegal human and contraband trafficking, piracy, and cargo security are other major port security risks. In the following paper, the problem of port security and its connections to the international trade will be observed in more details.

The security challenges associated with port security are terrorism, piracy, illegal human and contraband trafficking, and cargo security (Blake, Schwartz, & Schwartz, 2013).

Each of the fields identified has the broad scope and variety of dimensions. With regards to this fact, port security guards face the tremendously difficult operational task that becomes even more complicated owing to the complex structure of ports, complicated system of port authority distribution between the public and private stakeholders, and interference from multiple governmental and private agencies (Blake et al., 2013).

The significance of mega ports to international trade can be hardly underestimated since they are the main processing harbors for over 80 percent of overseas commerce (Blake et al., 2013). In connection to mega ports, the tactics of the weak or confronting an enemy with the low-tech approaches confounds the tactics of the strong or doing the same with the highly technological weapons by means of implementing unexpected solutions (Blake et al., 2013).

Sadly, terrorists have learnt how to implement the tactics of the weak quite effectively, which can be proved by the high number of dangerous occurrences on the maritime transport and in ports committed by them annually (Blake et al., 2013). However, the system of security in mega ports effectively implements to eliminate terrorists’ efforts and thus, the significance of these ports are crucial.

In line with the above-mentioned information, the importance of rethinking asymmetric threats is conditioned by the changes that take place at the global arena (Blake et al., 2013). Terrorists begin to implement the newest and the most unpredictable methods to attack the vulnerable points in the port protection system. The society is left no other choice but to develop to the more complex and sophisticated safety and security systems.

Moreover, the threat of the “dirty bomb” which is the type of fission weapons remains high (Cruise, D’Erman, & Grillot, 2013). Generally speaking, any bomb containing nuclear materials can be referred to as the “dirty bomb”. The relationship of this threat to port security is inevitable because placing such bombs into cargo is not a very complicated task due to the existing security gaps.

The reality of a terrorist nuclear threat to America’s seaports is thus quite high. The situation is getting worse because of the sheer size of cargo being operated in ports on a daily basis and absence of the well-designed system of central authority overseeing the maritime system (Cruise et al., 2013).

In conclusion, the vulnerability of American ports to the terroristic threats continues to be the reason of concern for both the government and commercial institutions engaging in the international trade. With regards to this problem, it is the high time to rethink asymmetric threats and undergo the needed changes both in thinking and implementing the newly developed security strategy in practice.

References

Blake, P., Schwartz, D., & Schwartz, T. M. (2013). Upgrading NY-NJ Harbor: risks and challenges. International Journal of Business Continuity and Risk Management, 4(3), 266-282.

Cruise, R. J., D’Erman, V. J., & Grillot, S. R. (2013). Protecting Our Ports: Domestic and International Politics of Containerized Freight Security. New York, N.Y.: Ashgate Publishing, Ltd.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, May 30). American Port Security Challenges. https://ivypanda.com/essays/port-security-challenges/

Work Cited

"American Port Security Challenges." IvyPanda, 30 May 2019, ivypanda.com/essays/port-security-challenges/.

References

IvyPanda. (2019) 'American Port Security Challenges'. 30 May.

References

IvyPanda. 2019. "American Port Security Challenges." May 30, 2019. https://ivypanda.com/essays/port-security-challenges/.

1. IvyPanda. "American Port Security Challenges." May 30, 2019. https://ivypanda.com/essays/port-security-challenges/.


Bibliography


IvyPanda. "American Port Security Challenges." May 30, 2019. https://ivypanda.com/essays/port-security-challenges/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1