August 22, 2011
The objective of international trade and supply chain security programs is to create a secure operating environment for commerce. Although the system is commonly referred to as the global supply chain, U.S. Government policies and procedures often seem to be implemented with little regard for the truism “the chain is only as strong as its weakest link”.
U.S. trade security regulations and programs have translated into a focus on increased screening of carriers and cargo entering into the U.S. by customs and law enforcement agencies, but with a lesser emphasis on cargo carriers and containers departing the U.S. for foreign ports of call. This inequity in the level of protection afforded to the security of cargo carriers and containers on their outbound leg represents a threat to the integrity of the overall system. Read the rest of this entry »
June 9, 2011
One of the most valuable contributions a director of security can provide to his company’s executive management is assistance in determining the appropriate “man-machine” mix for their facilities and operations. This guidance should be an essential component of the company’s budgeting process, to be integrated into its ROI calculations for investing in security programs for facilities, vessels, and their operations. Read the rest of this entry »
May 24, 2011
The global energy industry is under threat of attack by criminal and terrorist elements, but for different reasons. It is important to understand that piracy and maritime terrorism are separate “disciplines” that have no direct one-to-one correlation. Piracy is a crime committed for financial gain, while the objective of maritime terrorism is for immediate or strategic political goals. In the case of attacks on the energy industry therefore, the means used to gain control of energy vessels and platforms will be determined by the threat objective. Read the rest of this entry »
May 12, 2011
CNN.com story: Undercover government investigators were able to get into major U.S. seaports — at one point driving a vehicle containing a simulated explosive — by flashing counterfeit or fraudulently obtained port “credentials” to security officials — raising serious questions about a program that has issued the cards to more than 1.6 million people, Congress disclosed Tuesday. Read the rest of this entry »
December 21, 2010
The sheets were frozen hard, and they cut the naked hand;
The decks were like a slide, where a seamen scarce could stand;
The wind was a nor’wester, blowing squally off the sea;
And cliffs and spouting breakers were the only things a-lee.
They heard the surf a-roaring before the break of day;
But ’twas only with the peep of light we saw how ill we lay.
We tumbled every hand on deck instanter, with a shout,
And we gave her the maintops’l, and stood by to go about. Read the rest of this entry »
November 12, 2010
Within the past six months, more and more stories about pirate attacks are mentioning the crew of the attacked vessel gathering in the strong room or Citadel of the vessel. In fact, just last week, a tanker crew retreated to the Citadel as pirates boarded. The pirates, in an attempt to gain access to the Citadel, fired a rocket-propelled grenade at the room only to have the RPG bounce back, injuring three of the pirates. Wouldn’t you have loved to see the pirates faces when that happened? Read the rest of this entry »