Maritime Security Port Risks

Top 3 Risks at our Ports

Marine Survey / Shipping, Military / First Responder

Share this
Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedIn

The risk of terrorism is very high at our shipping ports.  The next evaluation that any national defense or maritime security unit will make once a risk has been identified is how will the attack be executed?  Where are potential areas of weakness in our security?

The old saying of “thinking like your enemy” could not be more true in national defense applications.  You have to predict all possible outcomes.  Here are the three most likely ways that a port will be struck with terrorist activity:

3.  Piracy

Pirates and ship invasions seem like something that happens only in movies, but especially in Southeast Asia, where piracy has increased by 18%, it is very real (Maritime Executive 2015).  Many attacks are just a few perpetrators high-jacking a ship unarmed or lightly armed for petty theft.  Others are much more serious, causing injuries and sometimes fatalities with the use of more sophisticated attack methods.  Destruction of communication systems is common among these larger scale attacks (Maritime Executive 2015).

These pirate ships could easily be manipulated into vehicles of terrorism.  All it takes is for a well organized group to destroy communications and take over control of the vessel, directing it into an explosive tank, another vessel, or arming it with a bomb.  It is important for ports to have a plan in place for intercepting a pirated ship before it can do more harm outside of what has already been done on board.   Using technologies such as Scanning Sonars or CHIRP Sonars can help gain more insight on the target.

2. Cybersecurity

This is a relatively new problem for security in all industries.   As technology has become more sophisticated, our defense becomes more sophisticated and integrated.  Everyone on the team is connected and able to communicate all kinds of important data about their surroundings, however these same communications are now all dependent on networks, whether it be intranets or the internet.

These networks can be infiltrated and shut down.  When this happens at a port, the ability to detect any on coming attack is significantly reduced.  It is important that all levels of security are prepared to stop potential hacks and have a back up plan of communication and coordinated defense if the hackers are successful.

1. Submersible Security

Underwater vehicles have become more advanced as time has gone on.  Submarines or “U-boats” have been used since the World Wars, but those were driven by humans.  Autonomous submarines are gaining sophistication, making it a risk adverse option for terrorists, even if used as a distraction for another form of attack.

Smugglers are also a problem at Ports and using the hull of ships where it is not easy to detect contraband or bombs.  This is another way that submersible security can be beneficial.  The best answer to protecting the port environment is to have eyes underwater.  The problem is cost of having them and being able to transmit a useful signal for defensive efforts to make a sound decision to protect the port but with Deep Trekker’s ROVs, you can equip a port with video and sonar capabilities at a reasonable price without sacrificing defensive measures.

The ability to get a Deep Trekker in the water in 30 seconds is another major advantage.   If there is a suspected threat in the water, every second counts.  The longer you wait to protect your ports and hulls, the more you are exposed.  Get a quote for a Deep Trekker defense system today!

Share this
Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedIn

One Comment

  • Garth Spence says:

    The very crude and simple suicide attack on a vessel should not be ruled out. This has proved to be a popular method within todays extremis terrorist groups….one which is very difficult to pridict and counter against.

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Your Search