Viewing papers 1-22 of 22 for piracy maritime terrorism

NOTE:  We can write a brand new paper on your exact topic!  More info.
X Filters 

Piracy Maritime Terrorism Term Paper

… Maritime Piracy and Terrorism in the Atlantic and Caribbean Oceans - a Methodology to Counteract

More than six years after the attacks of September 11th, 2001 showed the United States to be a nation deeply vulnerable to the type of attacks which are favored by terrorist organizations, the security policies and approaches to protecting the American people and America's friends and interests remain deeply impeachable. Security responses relating to the combat of foreign wars, the bureaucratic consolidation of American security agencies, the enhancement of surveillance freedoms to be used against the American people and the selling of America's port security to a state-run firm in the United Arab Emirates are all suggestive of a government which has not taken the proper steps to address the…. [read more]

Contemporary Maritime Issues in the Asia Pacific Region Essay

… ¶ … Maritime Issues in the Asia Pacific region

The security in International maritime terrorism is changing due to the need to counter the threats with different countries getting involved in these strategies by the major seaborne trading countries. These terrorist threats are within the extent on this paper possible attack on a ship or port within the Asia-Pacific area. It does not address on the use of maritime transportation method, neither the supply chain. The transportation includes containers carrying Weapons of Mass Destruction. Rather the focus is on operational deliberations relative to ports and ships. It explains the Sea Lines of Communications security while assessing the overall security of shipping within the Asia-Pacific area. It addresses the different measures by Container Security Initiative (CSI),…. [read more]

Maritime Proposal a Proposal for Investigating U.S Research Paper

… Maritime Proposal

A Proposal for Investigating U.S. Maritime Security

Following the events of September 11th, 2001, in which hijackers crashed commercial airliners into the World Trade Center, the Pentagon and a field in Shanksville, PA, the United States became keenly aware of its previously unrecognized vulnerabilities. The security breaches which allowed for this devastating attack would highlight the need for massive modernization, bureaucratic refinement and technological improvement in a host of America's transportation systems. As the research proposal here denotes, America's maritime security concerns would emerge as substantial in the wake of these attacks. As the research will also demonstrate, there are few areas of America's national transportation infrastructure that remains as vulnerable to security breach.

Indeed, available findings suggest that the incredible wealth of…. [read more]

Maritime Delimitation Essay

… Maritime Border Delimitation

Maritime boundaries have been debated, discussed and litigated for centuries. Despite this the majority of maritime boundaries are not delineated or set by any enforceable means as maritime boundaries lay in what is considered a no-man's land, within reason of coastal borders.

For the most part nations have assumed the right of the waters within a few miles of their shores and any more than this was considered excessive. The maritime space outside this flexible boundary is therefore a type of no-mans-land (which is not land at all) that rules do not penetrate, despite the desire by many to create enforceable rules and regulations regarding personal property use, abuse and resource allocation.

The reason this lack of delineation is problematic relates mostly…. [read more]

Maritime Piracy Research Proposal

… High Seas Piracy: Terrorists, Organized

Crime, And Crimes Of Opportunity

Background and History of Maritime Piracy:

High seas piracy had a long and storied history throughout the late Middle Ages

and well into the 19th century before nation states began fielding large and powerful enough navies to eliminate the problem. Despite the fact that maritime piracy in the modern era is no longer a problem capable of threatening international trade and commerce on the large scale in the manner that it once did, the problem still persists.

This is particularly true in areas of the world where social, economic and political factors provide a motive and proximity to international commercial shipping lanes provides the opportunity.

Unfortunately, the prospect of effective anti-piracy enforcement is undermined by…. [read more]

Maritime Environment Essay

… PortSec supports both tactical day-today decision-making and long-term strategic security planning." (p.1)

III. Asymmetric Warfare

The work entitled "Doctrine for Asymmetric Warfare" reports that asymmetric warfare is such that "encompasses a wide scope of theory, experience, conjecture, and definition, the implicit premise is that asymmetric warfare deals with unknowns, with surprise in terms of ends, ways, and means. The more dissimilar the opponent, the more difficult it is to anticipate his actions." (Military Review, 2003, p.18)

IV. Megaports Initiative

The National Nuclear Security Administration reports that the Megaports Initiative began in 2003 and involves NNSA teaming up with other countries toward enhancement of the ability to screen cargo at major international seaports. The initiative is reported to make the provision of "radiation detection equipment and…. [read more]

Developing a Maritime Policy for Saudi Arabia Term Paper

… ¶ … Rational Maritime Policy for Saudi Arabia

The Untapped Potential of Saudi Arabia's Maritime Resources

Saudi Arabia is not a nation whose fate has been historically associated with the oceans. Images conjured of Saudi Arabia will involve oil fields and vast deserts. At first blush, there seems little reason to even consider a maritime policy for the nation, let alone a rational and holistic one that incorporates information from many maritime interests and successfully coordinates policy decisions for all. This is a misconception. In fact, Saudi Arabia has an intimate and strategic relationship with two major oceanic routes: the Red Sea and the Persian Gulf. As the importance of these routes is certain to grow in the coming years and decades, it is important…. [read more]

Internship Report: Crowley Maritime Corporation (Cmc) Research Proposal

… Internship Report: Crowley Maritime Corporation (cmc)

CMC Background

Thomas Crowley, the grandfather of current Chairman, President and CEO Thomas B. Crowley, Jr., began Crowley Maritime Corporation (CMC) during 1892 with the purchase of an 18-foot Whitehall boat he used to transport personnel and supplies to ships anchored on San Francisco Bay. In Two Men at the Helm, an historical account of CMC, Thomas B. Crowley Sr. recounts his business practices, and credits what he learned about business to his father. "All his life, every dollar my father ever made he plowed back into the business....Some people call that being a miser, some people call that saving, some people call it reinvesting in business" (Two Men...1992). Currently, Crowley Maritime Corporation serves as a holding company for…. [read more]

Piracy in Somalia Term Paper

… ¶ … Somalian Pirates: The Problem, Central Issues, and Potential Solutions

Attacks by Somalia pirates who demand large ransoms for the return of captured vessels near the Horn of Africa continue to represent a serious threat to a broad spectrum of American and international interests (Counter Piracy and Maritime Security, 2011).

The number of attacks annually by Somali pirates has increased since 2008 and now numbers in the hundreds; the incidence of piracy has subsequently spread beyond the immediate coast of Somalia as far away as the Gulf of Oman and the western Indian Ocean (Background note: Somalia, 2011).

The primary national and international response remains limited in effectiveness (Counter Piracy and Maritime Security, 2011).

Central Issues

Since 1990, Somalia has practically been a failed…. [read more]

War on Global Terrorism, a Term Essay

… War on Global Terror

Terrorism, a term which sends chills down the spine of many, is defined as by the U.S. Department of Defense as "the calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological" (DoD), even though has been around for several centuries was emphasized to the word by the September 11,2011 al Qa'eda attacks on U.S. soil. Over the years, al Qa'eda has managed to chang its tact and sophistication while attacking U.S. interests in domestic and international grounds. In East Africa for instance, Al-Shaabab, a splinter cell of al Qa'eda has been reining terror on Somalis, Kenyans,…. [read more]

Transportation (Attention Essay

… Each year more than 60,000 ships pass through the strait, making it an excellent target for piracy (Japan PDF p. 1). Eight percent of the oil that Japan and South Korea import goes through the strait. According to the statistics presented in this article, there were 37 pirate attacks in the strait in 2004, despite the fact that worldwide piracy fell. More than one-quarter of all pirate attacks that year occurred in Indonesian waters, a total of 93 attacks (Japan PDF, p. 1) Japan, as the recipient of much of the merchandise that passes through the strait, has established a crisis task force to deal with the attacks, one of which was on a Japanese tugboat. The situation is politically sensitive, however, and since Singapore,…. [read more]

5th Fleet in Bahrain Term Paper

… Ultimately, Tehran's only credible choice is to disrupt activity in this major Gulf trade route. Is the Strait of Hormuz really vital to the world's oil market? The answer is: Much less than it used to be.

US and EU Oil Embargo & Iranian Nuclear Program

The decision on an EU embargo on oil exports from Iran was expected on 30 January but as yet no information has emerged. This paper considers the potential outcomes of such an embargo, assuming it is imposed. The initial impact is that the EU countries will have to get alternative supplies to replace their imports of heavy, sour crude from Iran. The right numbers are uncertain. According to OPEC, in 2010 Iran exported 890,000 barrels per day (b/d) to…. [read more]

Israel Internal Security Case Study

… Israel Internal Security Case Study

Nature of the state

Israel is a young nation, developed following WWII, when Britain withdrew from Palestine and the United Nations partitioned a portion of it for the resettlement of displaced Jews following the war. Arab nations in the region and Palestine itself rejected the arrangement, but it was followed through with nonetheless. The arrangement developed into several costly wars in which the Israeli army was successful, with the aide of foreign backing but many deep rooted tensions have not been resolved since. The Israeli government also occupies additional lands, which were acquired through these costly wars, most notably the Gaza strip and a few other regions, though some have been returned to their nation of origin since.

On 25…. [read more]

Outlaw Sea: The Lawless Term Paper

… According to the International Maritime Bureau (IMB) "Piracy and armed robbery attacks against ships rose 14% in the first nine months of the year compared to the same period in 2006, the second consecutive quarterly increase in attacks, as the coastal waters off Nigeria and Somalia became ever more dangerous" (Piracy attacks rise 14% as Nigerian and Somalian coasts become more dangerous, 2007, ICC). However, there have been some success stories such as the Strait of Malacca: "while piracy in Africa has become a major international security concern, the problem in the strait has been almost completely eradicated" (Schuman 2009). The reasons for this success may provide instructive for future endeavors: cooperation was a key element of the defense against piracy. Singapore, Malaysia Indonesia, and…. [read more]

Seaports Vulnerability to Submersible Research Paper

… For the defense from this terrorism under this Act, there should be nationally with the documents of vessels they also flying the flag of their nation, they also have registry of the foreign nation, they have the license of the vessels, for operating the vessels they have equipment which can automatically monitor the system of vessels and identify the system through that device (Posner 2003).

Terror Attack;

The terror may locate the data and information of any cruise or submarine to threat. The submarine may focus to the contribution of national level. It has more difficult, technical, and more expensive to attack a navy offices or at submarines. The terrorist prepares to attack on them for the national and continental threats. We shall also remember…. [read more]

Rules of Engagement Roe Essay

… Rules of Engagement

What are the rules of engagement in war zones and how do the military rules of engagement relate to civilians in dangerous zones of conflict where the United States is involved militarily? This paper will review those rules, the justifications for them, and will also review the controversy surrounding mass shooting incident involving the U.S. private contractor Blackwater.

Rules of Engagement (ROE)

CICS INSTRUCTIONS 312101B: The U.S. Naval War College issued "Standing Rules of Engagement for U.S. Forces" on 13 June, 2005, with a number of important particulars. When operating with multinational forces, U.S. forces do have the right of "self-defense" when attacked. Also, there must be a "reasonable" effort to develop "common ROE" so that all nations' forces working together can…. [read more]

Marine Insurance Term Paper

… An underwriter, to this day, is the person who undertakes the insurance risk of the company. (Marine Insurance)

Soon the form of marine insurance became extremely popular, and there were many people who entered the field of marine insurance as a profession in itself. This became a great boon to the merchant who could spread out his risks among others. It was thus that the concept of marine insurance came into being. One of the earliest marine insurance companies, the 'Atlantic Mutual Insurance Company', has declared the various aspects and points of the insurance policy that it had undertaken to cover, in the unique charming English of those times. These are, according to that ancient document, fire, and any enemies at sea, the pirates of…. [read more]

Galileo Product Idea Description Essay

… Certainly, there is just not enough conventional air reconnaissance to go around at this level. Telematics can play an important role as a force multiplier by giving these lower level leaders the reconnaissance information that they need very quickly. However, given shrinking potential defense budgets, they may need to do this more cheaply that they are now doing it (Campbell 2010, 5-6). For the infantryman the philosophy is better, cheaper, faster and good enough. Turn-around time to support the infantryman in battle is critical. The central issue is the interface and if it is inter-connectable with the other soldiers and units in the area of operations (Henderson and Lyke 2010, 14).

The above reasoning is especially the case for NATO countries where defense budgets are…. [read more]

Globalization and the Demand for Energy in the 21st Century Term Paper

… Globalization and Energy Demands in the 21st Century

According to a May 2004 report from Deloitte Research, supplying enough energy on a reliable basis at prices that will not cripple the global economic growth has become a challenge with consequences that are difficult to predict (Globalization pp). Although this will provide new opportunities for oil and gas companies, pipelines, generators, utilities and others in the energy business, it also carries serious risks (Globalization pp). The demand for energy is growing, not only in the developed economies of Europe, Japan and North American, but in developing countries as well (Globalization pp). In fact, the fastest demand growth is in China and other emerging markets, thus from one side of the globe to the other, societies are…. [read more]

Australia Imports the Australian Import Economy Term Paper

… Australia Imports

The Australian Import Economy and the Environmental Threat of Grounding

The intercession of information technology proliferation (i.e. internet, cellular phones, handheld mobile communication devices) with the intensification of globalization has had the impact of transforming the way in which states relate to one another. The combination of these factors has functioned to erase many of the theoretical borders that have obstructed economic activities between nations of different cultural and ethical dispositions. Australia's proximity to Asia renders it a regular and favored trade partner to many nations on the so-called Pacific Rim. Australia's generally respected geopolitical stature makes it an immediate point of contact in the region for many smaller Asian nations and principalities. Though this brings with it certain economic advantages for Australia…. [read more]

Opportunities Does China's Rise Imply Essay

… The comprehensive reconciliation is the only way out of this particular quandary. Deciding between being in the favor or against China should not be the subject while involving Asia. It is required by Washington to involve each regional power at the same time in a realistic many-sided model that is depended on collaboration among countries. In order to sustain leadership in Asia, United States is required to change narrow ambitions into synergism, on the other hand, a proper checks and balances is also required to held among the regional powers of Asia. The real question thus is: how this ticklish balance can be reached? (Holslag, 2009)

Outline of the paper

The expansion in the global economic sakes of China is obliging it to enlarge its…. [read more]

Airport Security Design Term Paper

… The section on the aircraft movement area should provide a description of any area that may be potentially used for landing, take-off and surface maneuvering of aircraft. This includes all intermediate unpaved sections of the airfield on the airport property. A map or diagram should be attached. This section should provide a description for perimeter barriers or access controls including: Fencing; Gates; Access control systems; AAF locks; and Key Control Systems. (Department of the Interior Aviation Facilities Security Procedures, 2006)

Airport Security Features

In addition, a necessary section of the Airport Security Plan is the section, which describes any airport/AAF Security Procedures including: (1) aircraft security requirements; (2) pedestrian/vehicle access; (3) challenge procedures; and (4) procedures for reporting suspicious behavior. (Department of the Interior Aviation…. [read more]

NOTE:  We can write a brand new paper on your exact topic!  More info.