403 Forbidden

Request forbidden by administrative rules. resources and capabilities must deter detect preempt, negate, and
Terrorists have indicated a strong desire to use WMD4. Nonetheless, in the absence of inter-state conflict, individual state actions represent a more significant challenge to global security. For example, as a result of our active discussions with African partners, the United States is now appropriating funding for the implementation of border and coastal security initiatives along the lines of the former Africa Coastal Security (ACS) Program. Unprecedented advances in telecommunications and dramatic improvements in international commercial logistics have combined to increase both the range and effects of terrorist activities, providing the physical means to transcend even the most secure borders and to move rapidly across great distances. 4 0 obj The first line of response in the aftermath of any terrorist attack is the first-responder community police officers, firefighters, emergency medical care providers, public works personnel, and emergency management officials.

However, this first line of response may have only limited capabilities for dealing with the effects of a WMD event within the maritime domain, such as a nuclear or radiological dirty bomb exploded on a vessel in a major port area. Forces must be trained, equipped, and prepared to detect, deter, interdict, and defeat terrorists throughout the maritime domain. NTC coordinates with other Federal agencies such as the U.S. Coast Guard, Federal Air Marshals, FBI, Transportation Security Administration, and the Departments of Energy and Agriculture, as well as the intelligence community. Expanding the International Port Security and Maritime Liaison Officer Programs, and the number of agency attachs. Non-state terrorist groups that exploit open borders challenge the sovereignty of nations and have an increasingly damaging effect on international affairs.

the United States to rethink and renovate fundamentally its systems for border and transportation security. Persons seeking to enter the UnitedStates will undergo identity checks and biometric screening at the border and in the coastal approaches to verify their lawful admission. 2306 0 obj <>stream Security zones are established and enforced around designated fixed facilities, certain vessels in transit, and sensitive geographic areas to provide an exclusion zone for controlled access and use only by the government. qx7Ubvx6wm+L+c,MfgqC-PWF+Dsqk+>dT9F!9QL@YO3\~bbScQJK+2$"VS($xb*9tW8_1@ixGn Wf>Z+TH>$7rC7Y&m yb|1PGsjUWeL5K-wBK,rL}5O817Z*Sg!fAw`xGaF]"M_ Container ships carry cargo for thousands of companies, and the containers are loaded individually away from the port. Together, the National Strategy for Maritime Security and its eight supporting plans present a comprehensive national effort to promote global economic stability and protect legitimate activities while preventing hostile or illegal acts within the maritime domain. A strong world economy enhances our national security by advancing prosperity and freedom in the rest of the world. Transnational migration, spurred by a decline of social wellbeing or internal political unrest, has become common over the past decades. The identification card for access will use biometrics to link the person to the credential definitively. Accurate assessments regarding closures of selected commercial nodes within the marine transportation system, as well as effective efforts to redirect the affected modes of commerce, can only be achieved with the full cooperation of the private sector. Overly restrictive, unnecessarily costly, or reactionary security measures to reduce vulnerabilities can result in long-term harm both to the United States and global economies, undermine positive countermeasures, and unintentionally foster an environment conducive to terrorism. Port facilities, along with the ships and barges that transit port waterways, are especially vulnerable to tampering, theft, and unauthorized persons gaining entry to collect information and commit unlawful or hostile acts. The safety and economic security of the United States depend in substantial part upon the secure use of the worlds oceans. Credential services will also be available on a voluntary basis for frequent travelers under various registered traveler programs. It is heavily dependent on information sharing and requires unprecedented cooperation among the various elements of the public and private sectors, both nationally and internationally. Further reduction in security vulnerabilities will also occur by encouraging the private sector, by means of outcome-based security standards, incentives, and market mechanisms, to conduct comprehensive self-assessments of their supply chain security practices; adhere voluntarily to baseline security criteria; and implement other regulatory security measures as deemed necessary by the Department of Homeland Security. For protection and deterrence to be successful, maritime security forces must be visible, vigilant, well-trained, well-equipped, mobile, adaptive, and capable of generating effective presence quickly, randomly, and unpredictably. These contingency and continuity plans must be developed and exercised in a coordinated fashion by the public and private sectors. These incidents underscore the high stakes for the entire world as diminishing resources, such as fish stocks, put increasing pressure on maritime nations to undertake more aggressive actions.

The new National Strategy for Maritime Security aligns all Federal government maritime security programs and initiatives into a comprehensive and cohesive national effort involving appropriate Federal, State, local, and private sector entities. Many of these key international waterways are relatively narrow and could be closed to shipping, at least temporarily, by an accident or terrorist attack. 11 Recovery is defined by the National Response Plan as the development, coordination, and execution of service- and site-restoration plans for impacted communities and the reconstitution of government operations and services. This Strategy also draws upon the National Strategy for Combating Terrorism, the National Strategy to Combat Weapons of Mass Destruction, the National Strategy for the Physical Protection of Critical Infrastructure and Key Assets, the National Defense Strategy, the National Military Strategy, and the National Drug Control Strategy. Domain awareness is a critical enabler for all strategic actions. xZmoH)a?B-@(> >EG\jzI$D33&Wb1Oyb(_|\lr,i A key national security requirement is the effective understanding of all activities, events, and trends within any relevant domain air, land, sea, space, and cyberspace that could threaten the safety, security, economy, or environment of the United States and its people. Instead, a prudent and measured response will be taken based on an assessment of the specific incident, including available intelligence. The United States must build rapid-reaction forces to support first responders with capabilities to respond to WMD and other terrorist incidents that occur in the maritime domain. The oceans are increasingly threatened by illegal exploitation of living marine resources and increased competition over nonliving marine resources. Similarly, there is a need for corresponding international coordinating mechanisms to reconstitute commerce and minimize the global impact in the event of a significant maritime incident or threat. Moreover, much of what occurs in the maritime domain with respect to vessel movements, activities, cargoes, intentions, or ownership is often difficult to discern. The Department of Homeland Security is the lead agency for the overall national effort to enhance the protection of critical infrastructure and key resources. 3 Mapping the Global Future , National Intelligence Council, Washington, DC: December 2004. Since the attacks of September 11, 2001, the Federal government has reviewed and strengthened all of its strategies to combat the evolving threat in the War on Terrorism. Because the economic well-being of people in the United States and across the globe depends heavily upon the trade and commerce that traverses the oceans, maritime security must be a top priority. The infrastructure and systems that span the maritime domain, owned largely by the private sector, have increasingly become both targets of and potential conveyances for dangerous and illicit activities. This circumstance, coupled with increased access to the technology needed to build and employ those weapons, increases the possibility that a terrorist attack involving WMD could occur. Maritime drug trafficking 7 generates vast amounts of money for international organized crime syndicates and terrorist organizations. Supply chain personnel will employ various methods to prevent the misuse of containers and conveyances for transporting illegal commodities, as well as to detect tampering. ", National Plan to Achieve Domain Awareness, Global Maritime Intelligence Integration Plan, Interim Maritime Operational Threat Response Plan, International Outreach and Coordination Strategy, Maritime Transportation System Security Plan, Protect Maritime-Related Population Centers and Critical Infrastructures.

A terrorist attack or similarly disruptive Incident of National Significance involving the marine transportation system can cause a severe ripple effect on other modes of transportation, as well as have adverse economic or national security effects. Around these zones, the private sector employs other layers of physical security, such as access barriers, fencing, lighting, surveillance cameras, and guards, along with oversight procedures, to ensure system integrity for the critical infrastructure and key resources that they own and operate. Unlike traditional military scenarios in which adversaries and theaters of action are clearly defined, these nonmilitary, transnational threats often demand more than purely military undertakings to be defeated. Integrated planning and effective management of agency resources Federal, State, and local are essential for an effective response. Salt water covers more than two-thirds of the Earths surface. The United States , in cooperation with its allies, will lead an international effort to improve monitoring and enforcement capabilities through enhanced cooperation at the bilateral, regional, and global level. The prospect of major regional conflicts erupting, escalating, and drawing in major powers should not be discounted. In cooperation with the private sector, the United States will establish a system-wide common credential for use across all transportation modes by individuals requiring unescorted physical access to secure, restricted, and critical areas of the maritime domain. Since September 11, 2001 , Federal departments and agencies have risen uncompromisingly to the challenge of maritime security. The United States also recognizes that t he vast majority of actors and activities within the maritime domain are legitimate. Defeating the threat of the widely dispersed terrorist networks that present an immediate danger to U.S. national security interests at home and abroad remains our foremost objective. <> This is historical material, "frozen in time." The response to such events should not default to an automatic shutdown of the marine transportation system; instead, the United States will be prepared to disengage selectively only designated portions, and immediately implement contingency measures to ensure the public's safety and continuity of commerce. %%EOF The United States has a vital national interest in maritime security.

Security standards and procedures employed in the United States are developed in conjunction with other nations and industry, and are shared with State, local, and tribal governments. The vulnerability is not just within U.S. territorial seas and internal waters. To receive this credential, individuals will undergo appropriate background checks. Deploy layered security to unify public and private security measures. The smuggling of people, drugs, weapons, and other contraband, as well as piracy and armed robbery against vessels, pose a threat to maritime security. Therefore, international cooperation is critical to ensuring that lawful private and public activities in the maritime domain are protected from attack and hostile or unlawful exploitation. North America, and Europe are 30 megaports/cities that constitute the worlds primary, interdependent trading web. Concurrent with efforts to ensure the public's well-being, actions to maintain continuity of commerce must be implemented as quickly as possible, with a focus on expediting the recovery of maritime infrastructure, transportation systems, and affected maritime communities. Security of the maritime domain can be accomplished only by seamlessly employing all instruments of national power in a fully coordinated manner in concert with other nation-states consistent with international law. It is only through such an integrated approach among all maritime partners governmental and nongovernmental, public and private that we can improve the security of the maritime domain. However, the nature and motivations of these new adversaries, their determination to obtain destructive powers In deciding whether to implement a new security layer, the United States must take into account its effectiveness and cost in reducing risks Americans face, both in absolute terms and relative to other possible measures, and must ensure consistency with the information privacy and other legal rights of Americans. Primary protection measures by government agencies include maritime security or enforcement zones, vessel movement control, and the inspection of targeted cargo. 5 This maritime mode of terrorist attack has been established, tested, and repeated. The United States and other nations have a substantial economic and security interest in preserving the health and productive capacity of the oceans. Inspections on this scale are prohibitively expensive and often ineffective. "It is the policy of the United States to take all necessary and appropriate actions, consistent with U.S. law, treaties and other international agreements to which the United States is a party, and customary international law as determined for the United States by the President, to enhance the security of and protect U.S. interests in the Maritime Domain", Presidential Directive Maritime Security PolicyDecember 21, 2004, Today's t ransnational threats have the potential to inflict great harm on many nations. Terrorists might attempt cyber attacks to disrupt critical information networks, or attempt to cause physical damage to information systems that are integral to the operation of marine transportation and commerce systems.

Achieving awareness of the maritime domain is challenging. Successful attacks in the maritime domain provide opportunities to cause significant disruption to regional and global economies. Both short- and long-range vessel detection and monitoring capabilities; Regulatory and private sector initiatives and agreements to enhance advance notices of arrival, vessel movement information, supply-chain security practices, and manifest and entry information for cargo; International arrangements that promote enhanced visibility into the maritime supply chain and the movement of cargo, crews, and passengers; Sensor technology, human intelligence collection, and information processing tools to persistently monitor the maritime domain; International coalitions to share maritime situational awareness on a timely basis; Global maritime intelligence and integration enterprise for intelligence analysis, coordination, and integration that supports all other national efforts; Shared situational awareness to disseminate information to users at all levels; Automated tools to improve data fusion, analysis, and management in order to systematically track large quantities of data, and to detect, fuse, and analyze aberrant patterns of activity consistent with the information privacy and other legal rights of Americans; and. 9 The National Response Plan defines prevention as actions taken to avoid an incident or to intervene to stop an incident from occurring. The United States must therefore patrol, monitor, and exert unambiguous control over its maritime borders and maritime approaches. They will never be easily deterred. These waters are a single, great ocean, an immense maritime domain1 that affects life everywhere. The sheer magnitude of the maritime domain complicates the arduous and complex task of maintaining maritime security. Since private industry owns and operates the vast majority of the nation's critical infrastructure and key resources, owners and operators remain the first line of defense for their own facilities. In fact, the information is required 24 hours before cargo is loaded onto vessels at foreign seaports (24-Hour Rule). Todays pirates and criminals are usually well organized and well equipped with advanced communications, weapons, and high-speed craft. Embedding security practices and vulnerability reduction efforts into commercial practices rests upon the implementation of key legislation, such as the Maritime Transportation Security Act of 2002 and the Trade Act of 2002, as well as International Maritime Organization requirements such as the International Ship and Port Facility Security Code, and public-private partnerships such as the Customs-Trade Partnership Against Terrorism.
No se encontró la página – Santali Levantina Menú

Uso de cookies

Este sitio web utiliza cookies para que usted tenga la mejor experiencia de usuario. Si continúa navegando está dando su consentimiento para la aceptación de las mencionadas cookies y la aceptación de nuestra política de cookies

ACEPTAR
Aviso de cookies