<p><span>This book deals with two areas: Global Commons and Security: inextricably melted together and more relevant than ever in a world which is ever globalized and⊠with an incognita looming on the horizon: the effects of the Coronavirus pandemic upon the International Relations and globalization
Global Challenges in Maritime Security: An Introduction (Advanced Sciences and Technologies for Security Applications)
â Scribed by Lisa Otto (editor)
- Publisher
- Springer
- Year
- 2020
- Tongue
- English
- Leaves
- 252
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
From pirates to smugglers, migrants to hackers, from stolen fish to smuggled drugs, the sea is becoming a place of increasing importance on the global agenda as criminals use it as a theatre to conduct their crimes unfettered. This volume sets out to provide an introduction to the key issues of pertinence in Maritime Security today. It demonstrates why the sea is a space of great strategic importance, and how threats to security at sea have a real impact for people around the world. It examines an array of challenges and threats to security playing out at sea, including illegal, unreported and unregulated fishing, irregular migration, piracy, smuggling of illicit goods, and cyber security, while also looking at some of the mechanism and role-players involved in addressing these perils. Each chapter provides an overview of the issue it discusses and provides a brief case study to illustrate how this issue is playing out in real-life. This book thus allows readers an insight into this evolving multidisciplinary field of study. As such, it makes for an informative read for academics and practitioners alike, as well as policymakers and students, offering a well-rounded introduction of the main issues in current Maritime Security.
⊠Table of Contents
Global Challenges in Maritime Security
978-3-030-34630-0_BookFrontMatter
Acknowledgements
Contents
Contributors
Abbreviations
Chapter 1: Introducing Maritime Security: The Sea as a Geostrategic Space
1.1 Introduction
1.2 A Brief History of Maritime Security
1.3 The Sea as a Geostrategic Space
1.4 Maritime Security as a Field of Study
1.5 Conclusion
References
Chapter 2: Oceans and Blue Economies
2.1 Introduction
2.2 Background to the Terms Ocean Economy, âBlue Economyâ and âOcean Governanceâ
2.3 Maritime Safety and Security within Sustainable Ocean Economy / Blue Economy Governance Processes
2.4 Case Study: South Africaâs Operation Phakisaâs âUnlocking the Ocean Economyâ â Oceans Phakisa
References
Chapter 3: Illegal, Unreported and Unregulated (IUU) Fishing as a Maritime Security Concern
3.1 Introduction to IUU Fishing: Concept and Context
3.2 Security Implications
3.2.1 Impacts on Human Communities
3.2.2 Operational Synergies with Crime
3.3 Regulatory Deficiencies and IUU Fishing
3.4 Brief Overview of Emerging Practices
3.5 Multilateral Cooperation and Securitisation
3.5.1 Enhancing Security via Regional Resource Management Fora
3.5.2 Enhancing Security Through Port Cooperation
3.6 Conclusion
References
Chapter 4: Smuggling and Trafficking of Illicit Goods by Sea
4.1 Introduction: Illicit Trade in the Contemporary World
4.2 What Is Smuggling and Trafficking?
4.2.1 Trafficking â Absolute Contraband
4.2.2 Smuggling â Relative Contraband
4.3 Factors Influencing Trafficking and Smuggling Activity
4.3.1 Globalisation and Opening of Markets
4.3.2 The Attraction of the Sea
4.3.3 Land and Sea Nexus
4.4 Responding to Trafficking and Smuggling: Cooperation
4.5 International Law Applicable to Trafficking and Smuggling at Sea
4.5.1 United Nations Convention on Transnational Organised Crime of 2000 and Protocols (UNTOC)
4.5.1.1 Defining Organised Crime and Organised Criminal Groups
4.5.1.2 Applying UNTOC to Smuggling and Trafficking at Sea
4.5.2 United Nations Convention on the Law of the Sea of 1982 (UNCLOS)
4.5.2.1 Jurisdiction
4.5.2.2 Maritime Zones
4.5.2.3 UNCLOS Article 86: High Seas
4.5.3 Other Instruments Applicable to Smuggling and Trafficking
4.6 Case Study: Heroin Trafficking in the Western Indian Ocean (WIO)
4.6.1 Modus Operandi
4.7 International Legal Framework Applicable to Drug Trafficking
4.7.1 UNCLOS
4.7.2 United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances of 1988
4.8 The Response in Practice
4.8.1 Law Enforcement
4.8.2 Prosecution
4.8.3 Suppressing Demand, Eradicating Supply and Harm Reduction Efforts
4.9 Conclusion
References
Chapter 5: Migration, Seafarers and the Humanitarian-Security-Economic Regimes Complex at Sea
5.1 Introduction
5.2 The Normative Dilemma of Discussing Migration as a Maritime Security Challenge
5.3 Humanitarian-Security-Economic Regimes Complex
5.3.1 The Humanitarian Regime at Sea
5.3.2 The Security Regime and Its Interplay with Humanitarianism at Sea
5.3.3 The Economic Regime in Commercial Shipping
5.4 Seafarers and the Humanitarian-Security-Economic Regimes Complex in the Mediterranean Sea
5.5 Conclusion
References
Chapter 6: Maritime Piracy and Armed Robbery at Sea
6.1 Introduction
6.2 Maritime Piracy and Armed Robbery at Sea: Theory and Practice
6.2.1 The Legal Context
6.2.2 Modus Operandi
6.2.3 Causes of Piracy
6.2.4 Costs of Piracy
6.3 Southeast Asia: AÂ Case Study
6.3.1 Origins
6.3.2 What Does Piracy in Southeast Asia Look Like?
6.3.3 How Is Southeast Asian Piracy Being Combatted?
6.4 Conclusion
References
Chapter 7: Maritime Boundaries and Maritime Security
7.1 Introduction
7.2 Maritime Zones and Maritime Boundaries: Definition, Delimitation and Disputes
7.2.1 Definition of Maritime Zones
7.2.2 Delimitation of Maritime Space Between States
7.2.3 Disputes Over Maritime Boundaries
7.3 Unsettled and Disputed Maritime Boundaries and Maritime Security
7.4 Case Study: Somalia and Kenya
7.5 Conclusion
References
Chapter 8: Cybersecurity at Sea
8.1 Introduction
8.2 Defining the Framework for Analysis
8.2.1 What Is Cybersecurity?
8.2.2 What the Maritime Industry Consists Of?
8.2.3 Securitising the Cyberspace
8.3 Is the Maritime Industry a High-Value Cyber Target?
8.4 Case Studies and Lessons Learned
8.4.1 Clarksons
8.4.2 A.P. Moller Maersk
8.4.3 Port of Antwerp
8.4.4 Maritime Off-Shore Drilling Unit
8.5 Fostering the Maritime Industry
8.5.1 Vulnerabilities and Disruptions
8.5.1.1 Identifying the Risk
8.5.2 Risk Assessment and Management, Risk Mitigation and Business Continuity Plan
8.6 Conclusion
Annex AÂ (Table 8.2)
References
Chapter 9: Maritime Terrorism
9.1 Introduction
9.2 Maritime Terrorism: Theory and Practice
9.2.1 What Is Terrorism?
9.2.2 What Is Maritime Terrorism?
9.2.3 Consequences of Maritime Terrorism
9.2.4 The Nexus Between Piracy and Maritime Terrorism
9.2.5 Measures to Address Maritime Terrorism
9.3 The Cases of the Achille Lauro and the USS Cole: Two Case Studies
9.3.1 The Achille Lauro
9.3.2 The USS Cole
9.4 Conclusion
References
Chapter 10: Port Security
10.1 Introduction
10.2 Port Security Threats
10.3 Cyber Threats
10.4 Organisational Risk Sources
10.5 Network-Related Risks
10.6 Port Security Risk Mitigating Strategies
10.6.1 ISPS Code
10.6.2 Maritime Transportation Security Act (MTSA)
10.6.3 Container Security Initiative (CSI)
10.6.4 C-TPAT, Customs-Trade Partnership against Terrorism
10.6.5 European Union Authorised Economic Operator
10.6.6 ISO 28000, Supply Chain Security
10.7 Case Study: Cybersecurity Attacks in the Port of Antwerp
10.8 Cybersecurity in Ports
References
Chapter 11: The Successes and Struggles of Multilateralism: African Maritime Security and Strategy
11.1 Introduction
11.1.1 The Success and the Struggle of Multilateralism
11.1.2 The United Nations, Multilateral Cooperation and Maritime Security
11.2 Multilateral Cooperation in the Fight Against Piracy
11.3 Defining Maritime Security
11.4 Why Is Africa Important?
11.5 The African Union and the Implementation of the 2050 AIMS
11.6 Additional AU Multilateral Tools for Promoting African Interests?
11.7 Conclusion
References
Chapter 12: The Role of Navies in the Contemporary Era
12.1 Introduction
12.2 Contemporary Navies: Changing Roles and Responsibilities
12.3 Navies in the Contemporary Era
12.4 Maritime Security: Mapping Security, Actorness and Warfighting
12.5 Sri Lanka
12.5.1 The Sri Lanka Civil War
12.5.2 Post-Civil War
12.6 The Gulf of Guinea
12.6.1 Maritime Security Challenges in the Gulf of Guinea
12.6.2 Maritime Security Actors in the Gulf of Guinea
12.6.3 Regional Maritime Security Actions
12.6.4 Capacity Building in the GoG
12.7 Summary and Conclusions
References
Chapter 13: Non-state Actors in the Maritime Domain: Non-state Responses to Maritime Security Challenges
13.1 Introduction
13.2 Part I: Non-state Actors in (Maritime) Security Governance
13.2.1 Economic, Political and Social Changes in the Post-Cold War
13.2.2 Emerging Maritime Security Threats
13.3 Part II: Non-state Actors in the Maritime Domain: Case Studies
13.3.1 PMSCs and Anti-piracy Services
13.3.1.1 PMSC Anti-piracy Services
13.3.2 NGOs in the Maritime Sphere and SAR Operations in the Mediterranean
13.3.2.1 NGO SAR Operations in the (Central) Mediterranean
13.4 Conclusion
References
Chapter 14: Connecting the Dots: Implications of the Intertwined Global Challenges to Maritime Security
14.1 Introduction
14.2 The Importance of Transnational Maritime Crime Governance
14.3 The Territoriality of Maritime Security
14.4 The Nexus Between Maritime Security and the Blue Economy
14.5 The Importance of Non-state Actors
14.6 The Role of Technology in Securing the Maritime Domain
14.7 Policy Implications: Maritime Domain Awareness Is Key
14.8 Maritime Security: Looking Ahead
References
978-3-030-34630-0_Chapter_1
978-3-030-34630-0_Chapter_2
978-3-030-34630-0_Chapter_3
978-3-030-34630-0_Chapter_4
978-3-030-34630-0_Chapter_5
978-3-030-34630-0_Chapter_6
978-3-030-34630-0_Chapter_7
978-3-030-34630-0_Chapter_8
978-3-030-34630-0_Chapter_9
978-3-030-34630-0_Chapter_10
978-3-030-34630-0_Chapter_11
978-3-030-34630-0_Chapter_12
978-3-030-34630-0_Chapter_13
978-3-030-34630-0_Chapter_14
đ SIMILAR VOLUMES
<p>This book describes an adaptable biothreat assessment process to complement overall biorisk management programs, incorporating threat management and the unique natures of biological assets. Further, this book examines the nexus between public health, international security, and developing technol
<p><span>This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as âmessesâ and âwicked problemsâ that prolifera
<p><span>This book discusses some of the strategic lines in front of the trends related to the new challenges of global security in this new century: some rather universal problems (migration, terrorism, cyberspace, conflict resolutions techniques in prisons, economic intelligence), as well as more
<p><span>The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lo
<p><span>This book aspires to face the challenge of analyzing with due academic rigor, always in the paradigm of security and advanced sciences, but without forgetting the ethical questions that our world raises every day. The work is divided into two main sections: the first section is focused on t