Maritime Security Threat Vectors

Glacial Processes
December 22, 2019
Environmental Problems & Solutions
December 22, 2019

Maritime Security Threat Vectors

Maritime Security Threat Vectors

The attacks of September 11 have exposed the vulnerability of the American homeland

against terrorism. Terrorists have already expressed their intentions to continue their

aggression towards United States. Their goal is to incur maximum economic damage,

inflict mass casualty, spread unprecedented fear among citizens and thus destabilize the

nation to further their agenda. Many critical sites lay across US maritime borders, all of

which could be potential targets to accomplish these goals. All these sites are simple

elements of a complex body where the vulnerability of the whole system is a function

of the vulnerability of the weakest element against an adaptive adversary. Ports, nuclear

facilities, LNG facilities, urban areas, bridges, chemical plants and other critical

infrastructure are all elements of this complex system. In this paper, we review the

current status of security in the American maritime realm and discuss the programs and

initiatives that seek to minimize terrorism risk. Our goal is to direct attention to various

possible avenues that could be used to illegally introduce weapons, explosives and

other contraband as well as to penetrate terrorists into the American homeland.

1 Disclaimer: This research was supported by the United States Department of

Homeland Security through the Center for Risk and Economic Analysis of Terrorism

Events (CREATE) under grant number N00014-05-0630. However, any opinions,

findings, and conclusions or recommendations in this document are those of the

authors and do not necessarily reflect views of the United States Department of

Homeland Security.

Page 2 of 33

1. Introduction

United States (hereafter US) sea borders include 95,000 miles of coastline and 3.4

million square miles 2 of exclusive economic zone. Huge economic value of trade,

number of jobs provided, and a multitude of stakeholders involved render security

along coasts and waterways critical for the American homeland. Port security is the

underpinning of the US economy and a terrorist attack may deliver a serious blow to

supply-chain operations and continuity of business. Besides, terrorists have already

expressed their intentions to target economic lifeline of the US, which raise concerns

that an attack in the maritime domain may be in the making. Despite the efforts after

September 11 (hereafter 9/11) to improve security, US waterways and critical

infrastructure along the borders remain vulnerable to a terrorist attack.

Maritime security is closely related to border security, which requires a systems

approach to protect the American homeland from a terrorist infiltration or attack. The

main objective of border security should be to minimize casualties, injuries and

economic losses due to terrorism, while ensuring flow of commerce, continuity of

business, conserving environment, as well as supporting international partnerships for

research, development, and education. As terrorist strategies are dynamic and terrorists

have shown their capability to develop tactics that are adaptive to new environments,

gaps in border security should be addressed following a comprehensive approach

seeking to reduce the risk at all potential points of illegal entry or a terrorist attack. As

such, to reduce the risk of terrorism along the borders, a systems-based risk

management approach that captures the complex relationship between multiple

elements and their exposure to interdependent risks should be implemented. Such an

approach will produce comparative risk assessments that will help deploy necessary

resources to sites facing the greatest risk, and mitigate exposure to a nationally tolerable

level.

US Department of Homeland Security (DHS) has adopted a risk based approach to

counter terrorism. In this context, risk is defined as the cross product of threat,

vulnerability and consequence [37]. Threat is defined as the probability of a terrorist

attack. One can extend this definition to specify the time frame, the location, type of

weapon used and the terrorist groups involved in the attack. Nevertheless, this is the

component of risk that the US administration has relatively less control. Vulnerability is

the probability of damage given that a terrorist attack occurs. Damage can take any

form stated in the border security objective statement, as well as other consequences for

which a widely accepted measure does not exist. Consequences are simply the expected

2 Department of State website, www.state.gov

http://www.state.gov/
Page 3 of 33

damage inflicted from a successful terrorist attack. Following this definition of risk, the

goal in this paper is to discuss what constitutes threat in maritime domain and

vulnerabilities that could potentially be exploited by a sophisticated adversary.

Consequence assessments are beyond the scope of this paper.

2. Threats in the Maritime Domain

Terrorism threat from the maritime domain may come in various forms. For example,

weapons or explosives may be concealed in containers, ships may be used as weapons

to destroy critical infrastructure, or terrorists may illegally cross the borders to launch

attacks in the homeland. Terrorists have a wide array of options, which could culminate

into a catastrophic attack. They have already shown their capacity to operate in open

seas successfully for other non-terrorism purposes: piracy, illegal smuggling of

contraband, and illegal human trafficking across the borders. Therefore, they may

utilize the expertise in other forms of maritime crimes that has accumulated over the

years to launch more damaging attacks exploiting vulnerabilities in the global maritime

system. Accordingly, increased capability to respond to each terrorist activity may

prove to be very valuable, and require cooperation between nations.

2.1 PIRACY

Although historically not intertwined with terrorism, piracy is reemerging as a serious

threat to impede conduct of global business. In 2003, there were 445 attacks in which

21 crew members were killed, 71 reported missing, and 359 were taken hostage 3 . The

number of attacks dropped to 325 in 2004 with an increase in the death toll from 21 the

previous year to 30. Actual figures may be far more disturbing. Shipping companies

tend to underreport the incidents due to fears of increasing insurance premiums and

lengthy investigations that may result in loss of reputation. As Singapore’s Deputy

Prime Minister, Tony Tan, said, “piracy is entering a new phase; recent attacks have

been conducted with almost military precision. The perpetrators are well-trained, and

have well laid out plans.” [24] Annual cost of lost cargo has risen to $16 billion, mainly

due to piracy, truck hijacking, and theft around the ports.

Pirates have excelled in hijacking ships over the years. Once the ship is hijacked,

“turning it into a phantom ship, erasing its original identity, is relatively easy” [4]. The

ships are then known to be painted at remote docks and given a completely new

identity. A relatively simple way to do this is getting a new registry by changing flags

3 Annuals statistics released by International Maritime Bureau (IMB).