120 results for “Maritime Security”.
Module 4 Case Paper: Maritime Security
Introduction
Maritime cyber attacks have already occurred in recent history, indicating the threat that cyber warfare poses for maritime security. The reality of this situation is so pressing that new International Maritime Organization (IMO) Cyber Security regulations are set to come into effect in 2021 (Klopper, 2019). This paper will discuss the growing maritime threats that have been brought about by advances in technology as well as the potential countermeasures to protect ports and ships from involuntarily participating in a WMD terrorist attack.
Growing Maritime Threats Brought about by Advances in Technology
Growing maritime threats that have come about as a result of technological advances include the ability of hackers to penetrate computer systems from thousands of miles away and that ability of spoofers to spoof GPS signals and thus reroute ships and potentially crash them. Two incidents in recent memory have already occurred…
References
International Ship and Port Security (ISPS) Code on Maritime Security
The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately.
The study feels that the ISPS Code has some impacts upon the Maritime Security in the world. Thus, the study seeks to uncover the various impacts that are realized by the Maritime Security as offered by the ISPS.
Scope
The influence and functionality of the existing ISPS Code run globally. Its effects, as part of its usefulness and importance, are felt by the Maritime Security among other agents of security in the world. Thus, the study will uncover the impacts caused by the ISPS Code on the Maritime Security in various parts of the world. The study will seek further knowledge from different materials; research…
International Ship and Port Security (Isps) Code on Maritime Security
Impact of the International Ship and Port Security (ISPS) Code on Maritime Security
The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately.
The study feels that the ISPS Code has some impacts upon the Maritime Security in the world. Thus, the study seeks to uncover the various impacts that are realized by the Maritime Security as offered by the ISPS.
Scope
The influence and functionality of the existing ISPS Code run globally. Its effects, as part of its usefulness and importance, are felt by the Maritime Security among other agents of security in the world. Thus, the study will uncover the impacts caused by the ISPS Code on the Maritime Security in various parts…
Port Security
The CBP (Customs and Border Protection) is a unit in the homeland security department and is the agency responsible for regulating, monitoring and facilitating flow of products at the points of entry. CBP policy formulation is done is such a way as to ensure that there is smooth movement of cargo through the border line. CBP enforces the customs and trade rules which are put in place with a view of protecting businesses and customers in the U.S. and collect revenue. CBP also enforces security laws for imports formulated with an objective of preventing illegal drugs, mass destruction weapons and contraband commodities from accessing the U.S.A. The U.S. congress is charged with the duty of defining and authorising the functions of international trade within CBP, allocation of funds for conducting program CBP oversight. The current laws authorising facilitation of trade and enforcing CBP functions are centred on a…
Their casualties go uncounted, their actions largely unmonitored and their crimes unpunished." Scahill relates that four years into the Iraq occupation "there is no effective system of oversight or accountability governing contractors and their operations, not is there any effective law - military or civilian being applied to their activities." (2007) According to Scahill's report: "Since the launch of the "global war on terror," the administration has systematically funneled billions of dollars in public money to corporations like lackwater USA, DynCorp, Triple Canopy, Erinys and ArmorGroup. They have in turn used their lucrative government pay-outs to build up the infrastructure and reach of private armies so powerful that they rival or outgun some nation's militaries." (2007)
III. The EFFECTIVENESS of DHS
The work of Ahlers (2007) entitled: "Auditor's: Homeland Security Gets Mixed Grades" reports that congressional auditors gave "mixed grades to the Department of Homeland Security on its efforts to…
Bibliography
Labott, Elise (2004) U.S.: Probe into Iraq Trafficking Claims. CorpWatch 5 May 2004. Online available at http://www.corpwatch.org/article.php?id=14174
Miller, Steven E. (2003) After the 9/11 Disaster: Washington's Struggle to Improve Homeland Security." Axess Stockholm, Sweden 2 (2003 Mar): 8-11. Online available at http://belfercenter.ksg.harvard.edu/publication/254/after_the_911_disaster.html
Phinney, David (2006) AU.S. Fortress Rises in Baghdad: Asian Workers Trafficked to Build World's Largest Embassy. 17 Oct 2006. CorpWatch. Online available at http://www.corpwatch.org/article.php?id=14173
Scahill, Jeremy (2007) the Mercenary Revolution: Flush with Profits from the Iraq War, Military Contractors See a World of Business Opportunities. The Indypendent 15 Aug 2007. Online available at http://www.indypendent.org/2007/08/10/the-mercenary-revolution-flush-with-profits-from-the-iraq-war-military-contractors-see-a-world-of-business-opportunities/
air cargo industry experienced tremendous growth since inception because of various factors in the aviation industry, particularly the freight sector. The growth and development of this industry is evident in its current significance on the freight sector. Moreover, this industry currently accounts for huge profitability in the freight sector because of increased shipping of various packages across the globe. This increased shipping is fueled by increased interconnectedness of people and countries due to rapid technological factors.
However, the industry has experienced tremendous challenges and concerns in relation to security because of the increase of security issues and emergence of new security threats throughout the world. Some of the major security challenges or issues facing the air cargo industry include terrorism, hijacking threat, vulnerability to security breaches, and probable introduction of explosive devices. These security threats are largely brought by the development of sophisticated tools and means for criminal activities by…
References
"Bilateral and Regulatory Issues Facing the Air Cargo Industry." (n.d.). Chapter 6. Retrieved
April 17, 2015, from http://www.aci-na.org/sites/default/files/chapter_6_-_bilateral_and_regulatory_issues.pdf
Elias, B. (2010, December 2). Screening and Securing Air Cargo: Background and Issues for Congress. Retrieved April 17, 2015, from http://www.fas.org/sgp/crs/homesec/R41515.pdf
"Evaluation of Screening of Air Cargo Transported on Passenger Aircraft." (2010, September).
Private Security
The various factors that influence both the definition and the perception of private security are typically environmental but can be internal and external to the issue of security itself. In most developed nations, the state provides security forces that are paid for by tax payers (local, municipal, state and federal police, and military forces); however, private security forces, typically operated by ex-military officers who bring their training and experience into the private sector to fill gaps in the market where demand cannot be satisfied by state security apparatuses alone, do exist and do operate both in developed and developing nations. Private security contractors like Academi, GRS, and Aegis look like military forces and often work with military forces when political factors require governments to apply to them for assistance (as has been the case with the U.S. government in the Middle East (Elsea) as well as with Middle…
Human Factor in Cargo Security
Is Human Factor important Cargo Security
Cargo security I one of the major issues handled with priority by Homeland security department in United States of America. It is regarded as a positional facilitator in terrorism activities. Another notable factor in implementing security measures for cargo was theft as a direct business cost for U.S. It is observed that businesses lost $15b to $30 billion as a loss to cargo theft in 2006. The research further states that personnel access, vehicles access, and proliferation of papers are one of the major causes of cargo theft. It is evident that certain factors have a direct influence on maintaining security for cargo. Technology, processes, procedures, systems, and all of the above human involvement are major issues in cargo security. It requires maintaining a high level of integrity for all these factors to reduce risk in cargo transportation.
The…
References:
Giermanski, J. (2011, June 01). Facing the realities and probabilities of enhancing supply chain security. The Maritime Executive, Retrieved from http://www.maritime-executive.com/article/facing-the-realities-and-probabilities-of-enhancing-supply-chain-security/
Giermanski, J. (2012). Global Supply Chain Security. USA: Rowman & Littlefield.
Iseby, J. (2008). 9/11 Comm Recommendations. USA: Nova Science Pub Incorporated.
Ivanov, D., & Sokolov, B.V. (2010). Adaptive supply chain management. London: Springer verlag.
security measures. The primary focus while analysing security measures will be on the overall effectiveness and hindrances in their implementation in the aspect of transportation and logistics management (TLM).
Security Measures in Place / Are They Effective?
In order to ensure safety in sensitive areas, to observe traffic or to keep a check on criminal activities, CCTV, video cameras and high-tech surveillance systems are very useful devices. They also play an important role when it comes to the delivery of cargo. In order to prevent cargo theft during the loading / unloading, transporting and storing process, these activities should be carried out under surveillance of video cameras. The primary advantage of using surveillance in these circumstances is that they can significantly reduce premise liability because of access control systems and thus only authorized individuals can access certain areas. (Transportation and Logistics Security Protection 1. n.d.).
For each employee as well…
References
BANOMYONG, R. (2005). The impact of port and trade security initiatives on maritime supply-chain management. Maritime Policy & Management,32(1), 3-13. Retrieved May 2, 2016, from http://cip.management.dal.ca/publications/Impact of port and trade security initiatives on maritime supply-chain management.pdf
Leading Home Security Companies in Security Systems (n.d.). -- Protection 1. Transportation and Logistics Security -- Protection 1. Retrieved May 2, 2016, from http://www.protection1.com/business/logistics-security/
(n.d.). Lean Logistics & Supply Chain Management System (n.d.). -- LeanCor. What's the Problem with Continuous Improvement? - LeanCor Supply Chain Group -- LeanCor Supply Chain Group. Retrieved May 2, 2016, from http://leancor.com/continuous-improvement/
Homeland Security and Preparedness, esponse, Activities and Programs in Disaster esponse or Disaster ecovery
The focus of this study is the homeland security issue as it relates to the preparedness of the U.S.A. government and citizens in response to the emergencies that may emerge.
The research question in this study is one that asks in light of the past disasters experienced by the United States such as the events of September 11, 2001, and Hurricane Katrina among others, are the emergency response agencies and the law enforcement agencies in a better position to handle disasters from preparation to response and ultimately recovery effectively in the event of disasters or terrorist attacks?
Significance
The significance of the research in this study is that the effectiveness of the preparedness of Homeland Security initiatives should be addressed as it is not possible to know where and when disaster will next strike and the…
References
Bowman, M.E. (2007) Law Enforcement Technology Intelligence, and the War on Terror. JFQ. Issue 46, 3rd Quarter 2007. Retrieved from: http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=9dfc7c9b-537f-44b9-a461-ed45b8fa1a76%40sessionmgr12&vid=1&hid=11
Central Intelligence Agency, (2011). About CIA. Retrieved June 30, 2012 from Cowper, TJ and Buerger, ME (nd) Improving Our View of the World: Police and Augmented Reality Technology. Retrieved from: http://www.fbi.gov/stats-services/publications/police-augmented-reality-technology-pdf
Edwards, John B. (2012) Intelligence Led Policing Connecting Urban and Rural Operations. Retrieved from: http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=1afefbff-3d5c-4282-bcda-00e357218031%40sessionmgr11&vid=1&hid=12
from http://www.dhs.gov/files/prepresprecovery.shtm
Fearfulness of non-state actors remains salient, but what is particularly interesting is the way ussia and China are singled out as nations with whom the United States is not currently engaged in war with but which nevertheless present peculiar threats. The Department of Defense's National Defense Strategy notes that China's blossoming wealth has also enabled the proliferation of its military, which threatens peace in the Straits of Taiwan and potentially beyond. ussia presents its own realm of problems, especially in light of the failure of democracy to take root there.
The supremacy of the United States as a global military power is an underlying message in these strategy papers, which are written as much to motivate and inspire as to guide policy. isk management is addressed within a characteristically confident framework, reflecting the overall ambition of America's military strategies. Commitments to far-reaching objectives in Iraq and Afghanistan are toughed upon,…
References
Department of Defense (2010). Quadrennial defense review report.
Department of Defense (2008). National defense strategy.
"The National Military Strategy of the United States of America." (2011).
"National Security Strategy." (2010).
[footnoteRef:24] in the Archaic Period, Ancient Greece's initial maritime power was critical but also "sporadic."[footnoteRef:25] During the Classical Period, Athens in particular "pursued a policy of naval imperialism"[footnoteRef:26] and this Period saw the development of "siege warfare" in which the Greeks -- particularly the Athenians -- developed the skills to wage war on the open sea.[footnoteRef:27] in the Hellenistic Period, the scope of warfare was enlarged considerably, as whole areas of land were now in dispute. Consequently, there was an "ancient naval arms race"[footnoteRef:28] in which various kings extending beyond Greece fought for control of mainland Greece, islands of the Aegean, western Turkey and southern Syria.[footnoteRef:29] [21: EH.Net and C. Michael Hogan. "Economy of Ancient Greece." www.eoearth.org Web site. May 1, 2010. http://www.eoearth.org/article/Economy_of_Ancient_Greece (accessed January 17, 2013).] [22: Chester G. Starr. The Influence of Sea Power on Ancient History. New York, NY: Oxford University Press, Inc., 1989, 7.] [23: Ibid.,…
The MdTA Police and the Office of Security (and thus the private security personnel under its supervision) are the extent of the state's commitment in terms of securing the port, aside from the Maryland Area Maritime Security Committee, which works to coordinate the efforts of the MdTA and Office of Security with the relevant federal agencies.
On the federal level, regular port security is handled by the United States Customs and Border Protection (CBP), while threat response and emergencies involves the U.S. Coast Guard. CBP is responsible for maintaining and disseminating examination standards and procedures, and in recent years has placed a special emphasis on cargo container examinations with its program the Container Security Initiative (CSI) (U.S. Customs and Border Protection 2012). The CSI program has three core elements geared towards identifying and stopping threats in cargo containers: "identify high-risk containers […] prescreen and evaluate containers before they are shipped…
References
Department of homeland security. (2012). Retrieved from http://www.dhs.gov/index.shtm
Maryland department of transportation: Port administration. (2012). Retrieved from http://mpa.maryland.gov/content/port-security.php
United States coast guard. (2012). Retrieved from http://www.uscg.mil/
US customs and border protection. (2012). Retrieved from http://www.cbp.gov/
Pacific Plan is a document that was adopted by forum leaders of the nations in the pacific islands aiming to address various challenges that these nations in the pacific regions face. Through strengthening regional cooperation as well as integration in the region, the leaders projected that various developmental challenges would eventually be overcome. The underlying principle is that the Pacific region is supposed to be free from conflict, full of peace, harmony, positive economic growth, and also improved security. In this way, the people living in the region would lead free and satisfactory lives. This paper will look at the origin of this document, the manner in which it will address various development challenges in the pacific region and also the reason why some critics consider the document a 'sham'.
The Pacific Plan is not the first effort in the pacific region aimed at increasing cooperation, improving coordination and advancing…
Works Cited
ADB-Commonwealth Secretariat. Toward a New Pacific Regionalism: An Asian Development Bank and Commonwealth Secretariat Joint Report to the Pacific Islands Forum Secretariat. Asian Development Bank, 2005.
Boxall, Sheryl. Pacific Islands Forum: Facilitating Regional Security Cooperation. Canterbury: University of Canterbury, 2006.
Browne, Christopher. Pacific Island Economies. London: International Monetary Fund, 2006.
Maiava, Iosefa. Pacific Regionalism and the Pacific Plan: Regional Perspectives on Government Reinvention. Regional Forum on Reinventing Government: Exchange and Transfer of Innovations for Transparent Government and State Capacity Conference, 20 -22 February, 2006.
Discouraging is not the same as stopping, and this initiative has little stopping power.
3)
ccording to the National Strategy for Combating Terrorism published in February of 2003, the first major objective in the nation's antiterrorism strategy is simply to defeat the terrorists and their organizations. This seems almost laughably simple, but victory against terrorism is difficult to define; the report itself acknowledges this and includes in its strategy efforts to "compress the scope and capability of terrorist organizations, isolate them regionally, and destroy them within state borders." Even defining when these disparate features have been met is difficult, and thus the strategy itself is somewhat ill-defined in many places. There are two primary objectives that carry more concrete meaning -- and more in-depth explanation -- in the report, but these are grand projects that themselves have ill-defined boundaries and murky understandings of true possibilities. ttempts to deny support to…
According to the National Strategy for Combating Terrorism published in February of 2003, the first major objective in the nation's antiterrorism strategy is simply to defeat the terrorists and their organizations. This seems almost laughably simple, but victory against terrorism is difficult to define; the report itself acknowledges this and includes in its strategy efforts to "compress the scope and capability of terrorist organizations, isolate them regionally, and destroy them within state borders." Even defining when these disparate features have been met is difficult, and thus the strategy itself is somewhat ill-defined in many places. There are two primary objectives that carry more concrete meaning -- and more in-depth explanation -- in the report, but these are grand projects that themselves have ill-defined boundaries and murky understandings of true possibilities. Attempts to deny support to terrorists, through financial and material means as well as through the provision of sanctuary or even simple encouragement, are certainly warranted, but defining which organizations are terrorists is something that cannot be accomplished unilaterally if it is to have any meaning, yet multilateral agreement is often highly difficult to reach. The same can be said of the objective to diminish the conditions that terrorists exploit -- at some point, the level of control needed for this (regardless of the practical difficulties) becomes tyrannical and dictatorial, removed from terrorism only for its level of organization and official sanction.
4)
Especially in the beginning of this report, notably in the first figure presented, the increasing need for homeland security looks suspiciously like the increasing militarization of United States' society. This does indeed seem to be the almost overt stance of the authors of this report at times, though it is never explicitly stated as such. The level of civilian "support" it has been deemed necessary for the Department of Defense to involve itself in, however, is disconcerting. That being said, it is also clear that national security awareness needs to be raised, and that certain situations can increase the risk of a terrorist attack, and thus some extra military involvement in at least an informational manner is definitely warranted. A balance needs to be found between the provision of security and the presence of the military, however, and this report seems highly reactionary and extreme in its conclusions and recommendations.
America's engagement with China, with historic ice-breaking between the two countries carried out by Henry Kissinger, has been complicated. I would suggest that it were the U.S. domestic preoccupations and compulsions that did not allow me to take any bold stance on the issue of Dalai Lama. I disagree with notion that U.S. betrayed the cause of human rights while not choosing to visit Dalai Lama.
It must not be forgotten that unlike ussia, China's geography allows her to exert much more influence than the former. In the words of Kaplan (2010), China is both a land and a sea power. Thus, my foreign policy towards China has been reflective of this potential next power of the world. The U.S. has benefited from the Chinese market significantly in the wake of financial crisis. The author failed to acknowledge the huge compulsions that China faces in meeting its energy and other…
References
Barber, BR 1992 "Jihad vs. McWorld," the Atlantic Monthly 269, no. 3 (March 1992): 53 -- 65.
Cohen, MA, 2011, 'Think Again: The Two State Solution', Foreign Policy, Viewed on 18 June 2013, [ http://www.foreignpolicy.com/articles/2011/09/14/think_again_the_two_state_solution ]
Gettleman, J 2010, 'Africa's Forever Wars,' Foreign Policy, 22 Feb 2010.
Gilboy, GJ and Read, BL 2008, 'Political and Social Reform in China,' Washington Quarterly, summer 2008, pg 143-164.
3
16
JTF
JFACC
JFLCC
JFSOCC
JFMCC
Yellow MOD
Coordination
TACON
OPCON
COCOM
XX
ESG
CSG
SAG
MPS
PATRON
SAG
Amphib
X
SF
NSWTG
PSYOPS
JSOAC
AETF
AEF
ASOG
Yellow
Patrol
Boats
COA 1
Task Force
Command Level
Major Subordinate Element
(MSE) Level
MSE Subordinate
Units Level
Depict Command Relationships
X
XX
Yellow
JTF-50 COA Presentation Format
DJMO C340 EXERCISE MATERIAL
Reading C340.3
17
Phase I-Deter
Air and naval strikes, in coordination with Sof and Marine for Operation theater entry.
Additional forces are brought to the shore whenever it is necessary.
With control area being denied to enemy forces
That could be of a big threat to mine clearing operations.
With central areas denied to enemy forces that could threaten other areas, mine clearing operations commence in the Strait of Mormuz
With the straight being open, some of the forces that are ashore and then withdrawn.
Phase II-Seize Initiative
A…
International Community's esponse to Somalian Piracy. To date, the primary response by the international community to maritime piracy off the coast of Somalia has been to employ combined international naval forces to protect commercial shipping (Maritime Piracy and elated Kidnapping for ansom, 2011). In addition, in January 2009, the international community launched a coordinated initiative targeted at stopping pirate attacks in Somali waters called the Contact Group on Piracy off the Coast of Somalia (Counter Piracy and Maritime Security, 2011).
The Contact Group currently partners with the following: (a) EUNAVFO Operation Atalanta; (b) Combined Maritime Forces Combined Task Force 151; (c) NATO Operation Ocean Shield; and (d) National Counter-Piracy Missions (China, India, Japan, Malaysia, ussia, Saudi Arabia, South Korea, Yemen) (Counter Piracy and Maritime Security, 2011). The Contact Group could benefit from further collaborative efforts with the U.S., including the intelligence-sharing efforts described below.
Pursuant to the Piracy off the…
Mexico faces an array of drug-related problems ranging from production and transshipment of illicit drugs to corruption, violence, and increased internal drug abuse. Powerful and well-organized Mexican organizations control drug production and trafficking in and through Mexico, as well as the laundering of drug proceeds. These organizations also have made a concerted effort to corrupt and intimidate Mexican law enforcement and public officials. In addition, the geographic proximity of Mexico to the United States and the voluminous cross-border traffic between the countries provide ample opportunities for drug smugglers to deliver their illicit products to U.S. markets. The purpose of this study was to develop informed and timely answers to the following research questions: (a) How serious is the trade in illicit drugs between Mexico and the United States today and what have been recent trends? (b) How does drug trafficking fund terrorist organizations in general and trade between Mexico and…
References
Delaware fact sheet. (2014). Friends of Narconon, International. Retrieved from http://www.friendsof narconon.org/drug_distribution_in_the_united_states/delaware_drug_facts/delaware_fact
sheet/.
Drug threats in Wilmington. (2014). Drug Enforcement Edu.org. Retrieved from http://www.
drugenforcementedu.org/delaware/wilmington/.
These gunboats would devastate wildlife area and other immense and indefinite environmental impact. These tankers would carry liquefied natural gas or LNG in cruising through Head Harbor Passage. It would take at least 90 minutes for each tanker, the size of Queen Mary, to cross the passage of whale and porpoise feeding areas, breeding grounds and nurseries as well as aquaculture sites and fishing grounds (Figart).
Legal attle
The Passamaquoddy people and their ancestors have, for thousands of years, lived, fished, hunted and cultivated land in the Quoddy region (Harvey, 2004). They have thrived on marine species for survival. ut over 200 years of permanent European settlement in the region since the late 18th century introduced environmental predators and developers. With the passing of the years, they increased and became more and more efficient (Harvey). In response to the situation, the United Nations Environment developed the Global Programme of Action…
BIBLIOGRAPHY
Akagi, H.M. (2002). Appeal to the UN. NGO Committee of the United Nations
International Decade of World's Indigenous Peoples: Sipayik.com. Retrieved on December 19, 2009 from http://www.sipayik.com/akagi's_appeal_to_the_un.htm
CEC (1998). Impact of contaminants on the resources of the Gulf of Maine. A Global
Programme of Action Coalition for the Gulf of Maine. Commission for Environmental Cooperation: Horsley & Witten, Inc. Retrieved on December 20,
' Indians across the political spectrum, especially the country's powerful nuclear weapons establishment, are critical of the NPT, arguing that it unfairly warps international hierarchies to the disadvantage of the non-nuclear-weapon states" (1998:15). In its efforts to balance the pressures from the international community with its own self-interests in formulating foreign policies, the position adopted by India has been starkly different than other countries. In this regard, Karp concludes that, "Most states party to the NPT accept the unfairness of the treaty as a tradeoff that serves their own and global interests. India's leaders insist that fair and genuine nuclear disarmament must start with the nuclear-weapon states themselves, a demand formalized by former Prime Minister ajiv Gandhi in his 1990 global nuclear disarmament initiative" (Karp 1998:14).
As a result of these events, the 20th century witnessed the formation of various positions in Indian foreign policy that would endure throughout the…
References
Berlin, D.L. 2006 "India in the Indian Ocean." Naval War College Review 59(2): 58-59.
Chollett, D. & Lindberg, T. 2007 "A Moral Core for U.S. Foreign Policy." Policy Review 146: 3-
4.
Davis, C.B. & Rill, L.A. 2008 "Testing the Second Level of Agenda Setting: Effects of News
Navies in American Revolution
For hundreds of years, maritime expansion represented the only way to reach distant shores, to attack enemies across channels of water, to explore uncharted territories, to make trade with regional neighbors and to connect the comprised empires. Leading directly into the 20th century, this was the chief mode of making war, maintaining occupations, colonizing lands and conducting the transport of goods acquired by trade or force. Peter Padfield theorized that ultimately, ritish maritime power was decisive in creating breathing space for liberal democracy in the world, as opposed to the autocratic states of continental Europe like Spain, France, Prussia and Russia. The Hapsburgs, the ourbons, Hitler and Stalin all failed to find a strategy that would defeat the maritime empires, which controlled the world's trade routes and raw materials. Successful maritime powers like ritain and, in the 20th Century, the United States, required coastlines with deep…
BIBLIOGRAPHY
Black, Jeremy, "Naval Power, Strategy and Foreign Policy, 1775-1791" in Michael Duffy (ed). Parameters of British Naval Power, 1650-1850. University of Exeter Press, 1992, pp. 93-120.
Black, Jeremy. European Warfare in a Global Context, 1660-1815. Routledge, 2007.
Dull, Jonathan R. A Diplomatic History of the American Revolution. Yale University Press, 1985.
Kelly, J.K. "The Struggle for American Seaborne Independence as Viewed by John Adams." PhD Dissertation, University of Maine, 1973.
Women Participation in Marine Industry
The Relation Ship between the Participation of Woman in Maritime Sectors and Various Policy Organizations
Women represent a considerable portion of the world's labor force. However they face the hurdles of wage discrimination, harassment, and occupational segregation which ultimately limit their economic advancement. Historically, marine industry does not tend to be a successful career path for women. However, with the passage of time women have penetrated quite deeply in this marine industry. This essay highlights the participation of women in marine industry and the role played by policy making organizations like International Transport Federation (ITF), Seafarers International Research Center (SIRC), International Labor Organization (ILO), and International Maritime Organization (IMO). It explains the extent to which these various marine bodies are addressing the issue of gender.
The Relation Ship between the Participation of Woman in Maritime Sectors and Various Policy Organizations
Traditionally marine industry has been…
Bibliography
Belcher, P. Sampson, H., Thomas, M., Veiga, J. & Zhao, M. (2003). Women Seafarers: Global
Employment Practices and Policies, Geneva: International Labor Organization.
Dcomm (2003). Women seafarers: Fighting against the tide? As on land, so by sea: Women join
the ranks of seafarers, World of Work Magazine, 49, Retrieved September 29, 2012, from http://www.ilo.org/global/publications/magazines-and-journals/world-of-work-magazine/articles/WCMS_081322/lang -- en/index.htm
AFICA'S PETOLEUM AND CHINA'S ECONOMIC GOWTH AND DEVELOPMENT
How Africa's Petroleum Supply Is Important to China's Economic Growth and Development
While China continues to grow, its oil demand is poised to grow rapidly. For China to ensure its oil security, it must obtain oil from the global world because it lacks adequate domestic resources to quench the thirsty appetite of the country's rapid economic development. Any approach for growth that the country takes in its demand for oil is likely to affect the global oil market and influence existing system and order of international oil. As one of its oil strategy, China's firms are reaching every corner of the world to purchase oil or invest in oil fields showing to have opportunities disregarding the possible enormous risks. Some of China's national oil enterprises have made outstanding investment activities in African countries (Ma, 2010). Today, China's largest imports from Africa continue…
References
Bhaumik, T.K. (2009). Old China's new economy: The conquest of a billion paupers. New Delhi: SAGE.
Brewer, J. & Miklancic, M. (2013). Convergence: illicit networks and national security in the age of globalization. Published for the Center for Complex Operations Institute for National Strategic Studies By National Defense University Press Washington, D.C.
Buss, T.F. (2011). African security and the African command: Viewpoints on the U.S. role in Africa. Sterling, VA: Kumarian Press.
Cheung, Y.-W., & Haan, J. (2013). The evolving role of China in the global economy. Cambridge, Mass: MIT Press.
Critical Infrastructure and Key Resources
NIPP (National Infrastructure Protection Plan) offers the necessary structure for coordination, synchronization and integration of activities originating from different pertinent statutes, presidential directives and national strategies for the creation of a combined countrywide approach for the implementation of the protection mission of CIKR (Moteff & Parfomak, 2004). The continuity and protection of CIKR is fundamental for national security, safety, vitality, lifestyle and public health. Critical infrastructure can be understood as the systems, networks and assets, virtual or physical (Fisher & Norman 2010). Critical infrastructure is quite fundamental to a nation to the extent that their destruction or incapacitation may cause a devastating impact on public health, national security, safety, or a combination of all (Moteff & Parfomak 2004). Critical infrastructure sectors include:
Food and Agriculture: This sector can be understood as the national animals, feeds, and feeds supply chain as well as the fertilizer, seeds…
Seaports Vulnerability to Submersible Vessels
Criminology
All countries of the world are struggling hard to provide peace to its residents and masses. After all the efforts and struggle, countries are still not completely safe from the dangerous attacks on the borders including dry ports and seaports. In America, it is a severe issue to understand how to secure and protect the seaports of the country. The topic of discussion is also related to the protection of seaports of the country from different types of attacks such as nuclear attacks and submersible vessels (Jaffee and Russell 1997).
It is very important to understand all the seaports security issues and then suggest roadmap for protection policies development as well as its implementation immediately. There are three large seaports in America such as Los Angeles, Long Beach, and Oakland. These are the largest seaports of America and these ports are most vulnerable to…
Works Cited
Chalk, Peter, Bruce Hoffman, Robert T. Reville, and Anna-Britt Kasupski. Trends in Terrorism: Threats to the United States and the254 Future of the Terrorism Risk Insurance Act. Santa Monica, California: The RAND Corporation MG-393-CTRMP, 2005.
Crist, Phillipe. Security in Maritime Transport: Risk Factors and Economic Impact. Paris: Maritime Transport Committee, Directorate for Science, Technology and Industry Organisation for Economic Cooperation and Development, 2003.
Flanagan, William. "CSI Operations and Overview," presentation to Fifth International Conference on Export Controls. Public, Hungary: Budapest, 2003.
Flynn, Stephen E. "America the Vulnerable,. Public, Washington D.C: " Foreign Affairs Department," 2002.
China
Is China a status quo or aggressive power?
Johnston (2013) argues that China's allegedly new assertiveness is nothing of the sort. He makes the case that this view underestimates the aggressiveness of past Chinese foreign policy, and that the country has not really changed its level of assertiveness. This aligns with the explanations that Fravel (2007) has of past hard power that China has used in border disputes, which also highlights that there has been aggression in the past. The author also argues that the assertiveness level of Chinese foreign policy since 2010 has been overstated. The crux of the argument made is that China was always assertive in certain contexts with respect to foreign policy, and it remains assertive in those contexts. The level of assertiveness has not actually changed much. Perhaps people are just noticing it more -- he literally shows a graph of news articles about…
References
Callahan, W. (2012). China's strategic futures. Asian Survey. Vol. 52 (4) 617-642.
Fravel, M. (2007). Power shifts and escalation explaining China's use of force in territorial disputes. International Security. Vol. 32 (3) 44-83.
Huang, Y. & Ding, S. (2006). Dragon's underbelly: An analysis of China's soft power. East Asia Vol. 23 (4) 22-44.
Hughes, C. (2011). Reclassifying Chinese nationalism: The geopolitik turn. Journal of Contemporary China Vol. 20 (71) 601-620.
"When a court strikes a contract provision for unconscionability it is declaring that provision is so unfair or oppressive that the court will refuse to enforce it." (Gillespie, 2007). The Thirteenth Amendment to the United States Constitution provides that, "Neither slavery nor involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted, shall exist within the United States, or any place subject to their jurisdiction." (U.S. Const. amend. XIII, 1). The contract that the parties signed purported to make Mrs. Lowell the property of Mr. Lowell. Because the Lowells are Americans and purchased their ticket in America, it is unlikely that an American court would recognize Mr. Lowell's ability to contract away his wife's right to be recognized as a legal individual in a contract dispute. Furthermore, the Fourteenth Amendment guarantees Mrs. Lowell the equal protection of the laws, (U.S. Const. amend. XIV, 1)…
Referenced
Cruise Lines International Association. (2008). Personal safety and security. Retrieved December 9, 2008 from Cruise Lines International Association
Web site: http://www.cruising.org/industry/personal_safety_security.cfm
Fl. Stat. 731.301(b)(1).
Gillespie, D. (2007). Survey of Illinois law: contract law. Retrieved December 9, 2008 from Southern Illinois University School of Law
Search and Rescue is the search that is done to provide aid to the people who are feeling distressed or any sort of obvious danger. The general field of SAR encompasses many sub-fields that are generally acknowledged by the sort of terrain over which the search has been conducted. The types of terrain include ground search and rescue, which also includes the use of dogs for search and rescue. This is a kind of search and rescue that is done in the urban settings. Other kinds include the mountain rescue, combat search and rescue that is done on the battlefield and finally the air-sea rescue that is done over water. In this paper, particular importance will be given with respect to the last kind of SAR.
In Malta, the responsibility of SAR pertaining to search and rescue comes under the Armed Forces of Malta. This is conducted by the maritime…
Bibliography
Arteaga, Felix (2007). State-of-the-art Operations: The Canary Islands Regional Coordination Centre (Centro de Coordinacion Regional de Canarias -- CCRC).
MaltaMedia News. (January 2008). "Search & Rescue meeting between Libya and Malta."
SAR Seamanship Reference Manual (2000).Minister of Public Works and Government Services.
Search and Rescue Training Centre - Armed Forces of Malta (2004). "Search and Rescue (SAR) in Malta."
According to Toronto Star reporter Stephan Handelman in an article printed in 2005, the U.S. senior intelligence analysts consider China to be the greatest long-term threat to U.S. stability. China's military force and computer intelligence has reached its peak. Both the Europeans and the U.S. agree that the expansion of the Chinese military is more than "worrisome."
Another article posted on November 16, 2007 by the Washington Post claims that spying by China in the United States is the biggest threat keeping American technologies secret. Advances by the Chinese military are catching U.S. intelligence officials by surprise. It has also been suggested that the U.S. Department of Defense could inadvertently outsource the manufacturing of key weapons and military equipment to China. China is attempting to reverse its move into free markets by setting up state-owned enterprises and control over the 12 major industries, which include oil, telecommunications, shipping, automobiles, steel…
Resources
1. Article: online
Kim Zetter (February 3, 2010). Threat Level: Privacy, Crime and Security Online
Report Details Hacks Targeting Google, Others, (1), 1. http://www.wired.com/threatlevel/2010/02/apt-hacks/
2. Article Publication: online and hardcopy
S. law. Legislation such as many elements of the U.S.A. PATRIOT ACT are problematic because they do not provide adequate controls to ensure that investigative methods and procedures appropriate under some circumstances cannot be used in circumstances where they are inappropriate under U.S. law.
4. What is the FISA Court? Explain how it works. What authorities can it grant law enforcement? How is it different from traditional courts? What concerns exist about expanding the use of FISA?
The Foreign Intelligence and Surveillance Act of 1978 (FISA) was established to regulate the use of surveillance by the executive branch of government in the wake of various unconstitutional investigations conducted by the Nixon administration in connection with monitoring political rivals and government opposition groups. The FISA Act authorized the covert monitoring of information and communication exchanges of entities of foreign governments engaged in espionage and intelligence collection activities in the U.S. pursuant…
EAL DO YOU THINK THE TEOIST THEAT IS TO THE COMMECIAL SECTO?
With the current wave of terrorist's activities and attacks, terrorists' threat is incredibly real to the commercial sector. Since 2008, terrorists target commercial organizations such as hotel that accommodate huge numbers of people. For instance, in 2009, terrorists bombed the JW Marriott and itz-Carlton hotels in Jakarta, Indonesia leaving 9 people dead and 42 injured. While terrorism has been around in geographical isolation, for scores of years, 20% of terrorists' acts affect the business community (Levene 2007, p.7). The contemporary history is full of horrific incidences carried out by extremists for divergent reasons. Indeed, terrorism is the plague of a contemporary and civilized society, and it is real and detrimental to the commercial sector.
Numerous countries across the globe experience terrorism triggered by different reasons; ideological, social, religious among other causes. The effects of terrorists' attack and threat…
References List
Business Executives for National Security Metro Atlanta Region 2003. Company primer on preparedness and response planning for terrorist and bioterrorists attacks. Washington: BENS.
Gill, M 2006. The handbook o security. London: Palgrave Macmillan
Homeland Security 2011. The evolving terrorist threat: Enhancing vigilance for commercial facilities. New York: Policy Agenda.
Jackson, R 2011. Terrorism: A critical introduction. New York: Palgrave Macmillan.
Foreign Policy of China (Beijing consensus)
Structure of Chinese Foreign Policy
The "Chinese Model" of Investment
The "Beijing Consensus" as a Competing Framework
Operational Views
The U.S.-China (Beijing consensus) Trade Agreement and Beijing Consensus
Trading with the Enemy Act
Export Control Act.
Mutual Defense Assistance Control Act
Category B
Category C
The 1974 Trade Act.
The Operational Consequences of Chinese Foreign Policy
The World Views and China (Beijing consensus)
Expatriates
The Managerial Practices
Self Sufficiency of China (Beijing consensus)
China and western world: A comparison
The China (Beijing consensus)'s Policy of Trading Specialized Goods
Chapter 5
The versions of China (Beijing consensus)'s trade development
The China (Beijing consensus) Theory of Power Transition
eferences
Foreign Policy of China (Beijing consensus)
Chapter 1
Abbreviations
ACD arms control and disarmament
ACDA Arms Control and Disarmament Agency
ADB Asian Development Bank
ADF Asian Development Fund
APEC Asia-Pacific Economic Cooperation
AF ASEAN [Association of Southeast…
References
Barnett, A.D. (1977). China (Beijing consensus) and the Major Powers in East Asia. Washington, DC: The Brookings Institution. Retrieved September 10, 2011, from Questia database: http://www.questia.com/PM.qst?a=o&d=34158088
Boorman, H.L., Eckstein, A., Mosely, P.E., & Schwartz, B. (1957). Moscow-Peking Axis: Strengths and Strains (1st ed.). New York: Harper & Brothers Publishers. Retrieved September 10, 2011, from Questia database: http://www.questia.com/PM.qst?a=o&d=53424557
Sardesai, D.R. (1974). Chapter 6 India: A Balancer Power?. In Southeast Asia under the New Balance of Power, Chawla, S., Gurtov, M., & Marsot, A. (Eds.) (pp. 94-104). New York: Praeger. Retrieved September 10, 2011, from Questia database: http://www.questia.com/PM.qst?a=o&d=14691923
Chawla, S., Gurtov, M., & Marsot, A. (Eds.). (1974). Southeast Asia under the New Balance of Power. New York: Praeger. Retrieved September 10, 2011, from Questia database: http://www.questia.com/PM.qst?a=o&d=14691822
Bahrain Ministries IT Service
Studying the Potential of Moving Bahrain Ministries IT Services Into Private Cloud Computing
Information technology (IT) is not only an important part of life for many people, but it is also a booming business (Amies, et al., 2012). One of the most significant steps IT has made in recent years is the advent of cloud computing. This is similar to the old style of storing information, where everything went to a central server, or mainframe (Voorsluys, Broberg, & Buyya, 2011). The technological advances that have been seen since then mean that the way the information is sent, stored, and retrieved has vastly improved from the original design. Now companies can store all their information off-site, yet they know that information is being kept safe and can be retrieved anytime (Amies, et al., 2012). This frees up their computers and keeps them from needing IT departments and…
References
Amies, A., Sluiman, H., Tong, Q.G., & Liu, G.N. (2012). Infrastructure as a Service Cloud Concepts. Developing and Hosting Applications on the Cloud. IBM Press.
Cohn, C., & Samuels, J. (2012). Megaupload and the Government's Attack on Cloud Computing. Electronic Frontier Foundation.
Faroughy, A. (1951). The Bahrein Islands (750 -- 1951): A Contribution to the Study of Power Politics in the Persian Gulf. NY: Verry, Fisher & Co.
Houtsma, M.T. (1960). "Ba-rayn." Encyclopedia of Islam. I. Leiden: E.J. Brill.
On November 8, 2001, the U.S. Senate passed several new conditions before direct 'military-to-military relations can be restored with Indonesia including the punishment of the individuals who murdered three humanitarian aid workers in West Timor, establishing a civilian audit of armed forces expenditures, and granting humanitarian workers access to Aceh, West Timor, West Papua, and the Moluccas."
Following are two very recent bills and rulings by the U.S. Congress concerning the Indonesian presence, changes, and sanctions.
In the House resolution, number 666, urton (R-IN), Wexler (D-FL), and lumenauer (D-OR) congratulate the Indonesian people and government for a successful election process, supported Indonesia in political and economic transformations, expresses gratitude to Indonesian leadership for arresting 109 terrorists, supports the emerging legal framework, commends Indonesia for "discovering new ways of working with regional law enforcement and intelligence communities in a sincere effort to root out domestic radicalism, and urged Indonesia to conduct…
Bibliography
(2001). U.S. And Indonesia Pledge Cooperation, Joint Statement Between the United States of America and the Republic of Indonesia.
(2001, October 1). U.S. To Send Team to Indonesia To Discuss Combating Terrorism. Xinhua News Agency.
(2001, November 27). U.S. Admiral Urges Indonesian Military To Account for East Timor Mayhem. Agence France-Presse.
Baker, P. (1997, April 22). U.S. To Impose Sanctions on Burma for Repression. Washington Post.
Rationalist Theories of International Relations
Despite the name, rationalist theories of international relations are anything but, limited as they are by both an almost childlike understanding of human behavior and a catastrophic lack of imagination. Rationalist theories of international relations, like the Objectivism which developed in the same post-orld ar II period, rely on a number of assumptions which have since been shown to be empirically false. Rationalism assumes that the most important, and in fact, the only entities dictating international relations are nation states, and that these nation states are engaged in a zero-sum game of diplomacy and war, in which the goals of every nation state is eventual dominance above all others, so that international relations are dictated almost exclusively through violence or coercion, with diplomacy essentially reduced to the well-spoken threat of force. Thus, rationalist theories of international relations are not only incorrect, but altogether dangerous, as…
Works Cited
Art, Robert, and Kenneth Waltz. The use of force: military power and international politics.
Lanham: Rowan and Littlefield Publishers, 2009.
Baylis, John, Steve Smith, and Patricia Owens. The globalization of world politics: an introduction to international relations. Oxford: Oxford University Press, 2008.
Blatter, Joachim. "Performing Symbolic Politics and International Environmental Regulation:
Paccom
What long-range steps might Pacific Command (PACOM) take, as part of a broader national strategy, to help constructively engage China, while dissuading and deterring China from using force or the threat of force against others?
The challenges of today's battlefield do not provide an easy answer to this question and leaves the leader of the 21st century sometimes questioning the rationale behind defending America. As a potential member of PACOM and ultimately contributing to its success in one form or another by my service, this analysis provides both an internal and external review of the current state of my leadership as I experience it. Containing China and ensuring a peaceful coexistence with this powerful nation represents a national goal, and through this goal many individual and organizational goals are simultaneously achieved as well. The purpose of this essay is to examine this question using the three conceptual frameworks introduced…
Bibliography
National Security Strategy. May 2010. The Office of the President of the United States. Retrieved http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf .
Whetten, D. & Cameran, K.(2010). Developing Management Skills. New York: Prentice Hall.
Rank
Third Semester Exam
How does Command and Control and Intelligence help the JFC and staff integrate, synchronize and direct joint operations?
Joint Force Commands seek to utilize the full spectrum of abilities and strengths that our military possesses across the entire range of the battlefield. Therefore, JFCs typically focus their efforts in particular types of operations and hold back in others. Thus major operation and campaign tactics must utilize the correct balance between offense, defense and stability operations at all points in planning. It is crucial that planning for stability operations be initiated when joint operation planning begins and not to allow a simple focus on offense and defense obfuscate planning. JFCs must possess a strategic long view and anticipate the switch from combat operations (whether offensive or defensive) to the end of joint operations and the reinstitution of civilian control. A myopic focus on planning offensive and defensive…
Target Folder
Target Identification and Description
Target identification data.
Located at 1407 W. Wilson. Chicago IL. 60647
Description and significance.
This residence is suspected as being a safe house for individuals recruited as foreign fighters. These individuals pass through the safe house in transit to unknown locations in the Horn of Africa. The intent of the upcoming direct action is to deploy a Special Forces team to raid the residence in the hope of capturing individuals, documents, and equipment for further exploitation.
Detailed target description.
The three story brick apartment building houses lower income people of various races. The suspects live on the first floor. The building is accessed by two different doors. The apartment is quiet and unassuming.
D. Target vulnerability assessment.
The target is very vulnerable as the high traffic on the nearby sidewalks and streets make the place a great place. The landlords are very respectful of…
Petersburg, would not discuss in detail SI's other work for agencies such as Special Operations Command, but said he hopes this work eventually will amount to a $36.5-million Navy contract. U.S. ep. Bill Young, -St. Petersburg, who has used his clout to funnel Defense Department dollars to the region, sees a bright future (Krueger).
Since 2007, SI St. Petersburg has grown to almost 70 staff members as its &D activities have expanded. In addition, the U.S. Naval Air Systems Command awarded SI and its National Center for Maritime and Port Security a five-year, $36.5 million contract to develop a maritime domain awareness system to improve port security in the United States. Other SI &D projects have included development and local testing of an innovative, energy-producing buoy device; mapping the floor of Tampa Bay in conjunction with a maritime homeland security experiment conducted by the U.S. Navy, Coast Guard and other…
References
Hundley, Kris. (2007). Incentives seem like small change for SRI. St. Petersburg Times. 4 Jan 2007.
Krueger, Curtis. (2008). Tech firm SRI slowly blossoming, St. Petersburg Times. 27 July 2008.
Pinellas County, (2006). Governor Bush Announces SRI International Selects St. Petersburg. 01 Dec 2006. Retrieved November 24, 2008 at http://www.pced.org/newsroom/news_view_print.asp?int_newsroomID=4324
Silva, Cristina. (2008). SRI tech research facility brings jobs, Tampa Bay Times, 29 Oct 2008.
Marine Insurance
The concept of Marine insurance is something that has been developing at a fast rate of late. (Marine Insurance: Barlow, Lyde and Gilbert) What exactly is insurance and how long has the concept been recognized? Insurance can be defined as a form of provision of a safety net for the distribution of risks. This is generally made in the form of a financial provision that is meant to protect against losses that may occur due to certain unavoidable reasons. Insurance works like this: a person who wishes to insure an object or possession or belonging of his will pay a certain amount of money that has already been fixed by the insurance agent in order to offer the security of the money to distribute the risks when the insurer happens, by misfortune, to lose his possession or damage it because of an unavoidable reason. The insurer, by the…
References
Admiralty Law.com" Retrieved at http://www.admiraltylaw.com/papers/2000.htm. Accessed on 19 September, 2004
Averagium" Retrieved at http://harvey-ashby.co.uk/Averagium%20-%20Winter%202002.pdf. Accessed on 19 September, 2004
Commercial Hull" (2004) Retrieved at http://www.veromarine.co.nz/dirvz/marine/marine.nsf/content/ProductsHullCommercialHullAccessed on 19 September, 2004
English Marine Insurance Act 1906" Retrieved at http://www.solarnavigator.net/english_marine_insurance_act_1906.htm . Accessed on 19 September, 2004
The chambers approach may be more suitable for states that seek a quick resolution to a particular dispute or for other compelling reasons; however, like the full Court, these alternatives are likewise voluntary in nature and require the consent of the disputants to have the case heard by one of the three foregoing chamber types. According to the Court's published information concerning "Chambers and Committees" (2009), "Despite the advantages that chambers can offer in certain cases, under the terms of the Statute their use remains exceptional. Their formation requires the consent of the parties. While, to date, no case has been heard by either of the first two types of chamber, by contrast there have been six cases dealt with by ad hoc chambers."
Given the significant representation by most of the countries of the world in the UN, the UCJ has the capability to provide a valuable forum in…
References
Alvarez, Jose E. And Thomas M. Franck, "Judging the Security Council." American Journal of International Law, 90(1), 2 (1999).
Basic Facts about the United Nations, Department of Public Information. New York: United
Nations (2004).
Black's Law Dictionary. St. Paul: West Publishing Co. (1990).
Sea Cargo and Transportation
Maritime Transportation is the main channel of international trade; however, the share of its weight sustained by the sea is difficult to come across. Increase in population, increasing living standards, quick industrialization, congestion of roads, over-exploitation of local resources, and removal of trade barriers all play a role in the ongoing development in maritime transportation. In nations with passable rivers or long shorelines, or in nations made up of several islands, water transportation might play a vital role in domestic trades, for instance, Japan, Greece, Indonesia, USA, and Norway (UNCTAD, 2004).
Economics
The load carrying capacity of the world fleet reached 857 million tons at the conclusion of 2003, which is an increase of 25% over 1890. There was also a rapid growth in the capacity of the container ships fleet with about 727% increase. These substituted the general cargo ships in main liner trades. To…
References
European Commission, (1997). Green paper on seaports and maritime infrastructure, COM (97) 678 Final, European Commission, Brussels.
Fisenko, A. I. (2013). CONDITION AND PROSPECTS OF MARITIME FREIGHT TRANSPORTATIONS IN THE SOUTHERN ZONE OF THE RUSSIAN FAR EAST.Asia-Pacific Journal Of Marine Science & Education, 3(1), 59-65.
Higginson, J. K., & Dumitrascu, T. (2007). Great Lakes Short Sea Shipping and the Domestic Cargo-Carrying Fleet. Transportation Journal (American Society Of Transportation & Logistics Inc.), 46(1), 38-50.
Persson, J.A. & Gothe-Lundgren, M. (2005). Shipment planning at oil refineries using column generation and valid inequalities. European Journal of Operational Research 163, 631-652.
S. transportation infrastructure is a bad idea. But in contrast to these doom and gloom pessimists, a restructuring and revitalization of U.S. transportation infrastructure is not only an excellent idea, but is very necessary if the U.S. economy is going to survive and continue to be a major global economic superpower (Lindsey, 2007).
Without the highway infrastructure, the U.S. would have been unable to grow as it did in the 1950's and 1960's. The same idea is true for future growth. Since the 1960's there has been little development of the current system and many of the U.S.'s bridges and highways are falling into disrepair as other priorities, like the War in Iraq, have taken priority. But the transportation infrastructure, the skeleton and circulatory system of the U.S. economic body, is vastly important for both economic and political stability and security.
US power plants and the internet infrastructure are grossly…
References
IMPA. (2010). IMPA Homepage. Accessed via web on August 19, 2010 at .
Combating Criminal Narcotics Activity Along Southern order
The initiatives the 2009 Recovery Act funds must accomplish program-specific goals, and must be developed for furthering at least one of its general purposes, which are creation and preservation of jobs, promotion of economic recovery; assisting individuals most adversely affected by recession; providing investments required for increasing economic efficiency, through spurring technological advancements in health and science; investing in environmental protection, transportation, and other infrastructure which will offer economic gains in the long-term and stabilization of local and federal government budgets, for minimizing and preventing increases in counter-productive local and State tax, and reductions in vital services (FDA, n.d.).
Identify two or three goals of your program
Goal #1: Recovery Act: Job Preservation
A significant decline has been seen in manpower at the Drug Enforcement ureau in the last eight months, with a loss of four squads. These posts were transferred, because of…
Bibliography
FDA. (n.d.). Recovery Act - State and Local Law Enforcement Assistance Program. Catalog of Federal Domestic Assistance. Retrieved from: https://www.cfda.gov/index?s=program&mode=form&tab=core&id=62fe817b03c850cffccc8a74d8bb2665
NSBCS. (2013). NATIONAL SOUTH WEST BORDER COUNTER NARCOTICS STRATEGY. Office of National Drug Control Policy.
Wals, J. (2012). Project Eagle Eye. U.S. Department of Justice .
Like most litigations on such complicated issues the company had little to do but show reasonable accommodation, adopt better surface practices and wait out a lengthy period before their liability was reduced substantially by the courts.
Ethical analysis:
The key ethical issues of the case are pretty clear, did the captain knowingly endanger the environment by continuing to retain his position and navigate tankers through the area and did the company know that such was the case. Both ethical dilemmas are clear and were ruled upon by many hours of court time and subsequent appeals, though the final Supreme Court ruling on Exxon's liability for the spill was split 4:4 every other deciding body laid full responsibility on Exxon's lap. ("Exxon Valdez Damages educed," June 2008, NP). An additional ethical issue, though much less openly understood or known by the average American is weather it was ethical to pay fishermen…
References
Feinman, J.M. (2000). Law 101: Everything You Need to Know about the American Legal System. Oxford: Oxford University Press.
Exxon Valdez Damages Reduced," June 2008, Business Law Prof Blog Retrieved November 18, 2008. http://lawprofessors.typepad.com/business_law/2008/06/on-wednesday-th.html
Greely, J. (1989, May 29). Alaska over the Barrels: The Spills and Spoils of Big Oil. The Nation, 248, 721.
Jasanoff, S. (2006) "Transparency in Public Science: Purposes, Reasons, Limits." Law and Contemporary Problems 69.3, 21.
Tonkin Gulf Crisis
The Debate over the Tonkin Gulf Crisis
The Tonkin Gulf Crisis 1964 ranks with the Japanese attack on Pearl Harbor and the assassination of President John F. Kennedy as events that David Kaiser of the U.S. Naval War College refers to as "controversies in American political history that dwarf all others (Ford, 1997)."
There is evidence that President Lyndon Johnson deliberately lied about the incidents leading to the Vietnam War to ensure that plans for war were supported. However, many opponents of this claim say that this is not so. According to Sedgwick Tourison in the book Secret Army, Secret War and Dr. Edwin Moise's Tonkin Gulf and the Escalation of the Vietnam War, evidence that Johnson's administration was deceitful is becoming clearer than it was (Ford, 1997).
Today, Tonkin Gulf researchers are still examining the evidence to determine whether or not Johnson's administration intentionally instigated the…
Bibliography
Austin, Anthony. (1971). The President's War. Lippincott.
Cohen, Jeff. Solomon, Norman. (July 27, 1994). 30-Year Anniversary: Tonkin Gulf Lie Launched Vietnam War. Media Beat. Retrieved from the Internet at http://www.fair.org/media-beat/940727.html .
Department of State Bulletin. (August 24, 1964) The Tonkin Gulf Incident: President Johnson's Message to Congress. Retrieved from the Internet at http://pages.xtn.net/~wingman/docs/tonkin.htm.
Ford, Ronnie. (August, 1997). New Light On Gulf Of Tonkin. Vietnam Magazine, pp. 165-172.
In that same year as well, Portuguese ships reached China, re-establishing direct trade for the first time since its termination 150 years prior. The Chinese were particularly eager to purchase Spanish silver from the Andes, which the Portuguese provided in exchange for Chinese silk, highly coveted throughout Europe. The Portuguese even went as far as Japan, where they established contact briefly before that country's isolation. Expeditions were also sent to conquer Malacca and explore Borneo in 1511 and 1524.
Odd as it may seem, the Portuguese were the first to establish viceroys to govern over their colonies in India. Beginning under King Manuel I, the Portuguese presence in India was cemented by the appointment of the first viceroy, Francisco de Almeida, who governed from 1505-08. His capital was established at Cochin, where he waged wars against a number of Indian rulers for control of commerce in the region. His successor…
Works Cited
Feudalism." Middle Ages.Org. n.d. Middle Ages.Org. 19 October 2008. http://www.middle-ages.org.uk/feudalism.htm
Kreis, Steven. "Renaissance Humanism." 2004. Lectures on Modern European
Intellectual History. 19 October 2008. The History Guide. http://www.historyguide.org/intellect/humanism.html
Middle Ages Religion." n.d. Middle Ages. Org. 19 October 2008. Middle Ages.Org. http://www.middle-ages.org.uk/middle-ages-religion.htm
S. For its weapons sales to Taiwan. (Janbo)
It must also be noted that China's Naval expansion is a departure from what many experts conjectured in the recent past. Like many before, Lee Lai To commented just a few years ago that China, regardless of its even then obvious desire to expand its naval might would be very unlikely to challenge the U.S. In any significant way. To argues that:
"U.S. military deterrence and U.S. interests -- particularly with regard to maintaining the security of the sea-lanes and forward deployment of the U.S. military in the Asia-Pacific region, including the South China Sea area -- have made and will continue to make China extremely cautious about engaging in actions that might draw Washington into the South China Sea disputes. (To 26)" (Wong)
To was also quick to note that up to the time of his research and work in 2003…
References
"China tells U.S. that'd. China Sea is 'core interest' in new policy." Associated Press 3 July 2010: http://www.breitbart.com/article.php?id=D9GNI5600&show_article=1 .
"Gates on China: Speaking the truth makes the Pacific a safer place." Wals Street Journal Opinion 6 June 2010: http://online.wsj.com/article/NA_WSJ_PUB:SB10001424052748704183204575289743788180892.html .
Janbo, Jian. "China Takes New Tack in Maritime Diplomacy ." Asia Times Online 14 July 2010: http://www.atimes.com/atimes/China/LG14Ad01.html.
Kate, Daniel Ten. "U.S. Criticism of China's Military May Overshadow Asian Security Meeting." Bloomberg 15 July 2010: http://www.bloomberg.com/news/2010-07-15/u-s-criticism-of-china-s-military-may-overshadow-asian-security-meeting.html .
Sino-U.S. elations in the Post-Cold War Era
Today, China and the United States are inextricably linked in the modern world and some observers maintain that any disagreements that emerge between the two countries are relatively insignificant and will not adversely affect this growing economic and political relationship. By contrast, other international analysts argue that recent trends in China's economic and military growth will inevitably result in armed conflict between these two superpowers. To determine the facts, this paper provides a discussion concerning the accuracy of these respective viewpoints concerning the status of Sino-U.S. relations in the post-Cold War era, followed by a summary of the research and important findings in the conclusion.
China's development in the 20th century
The 20th century was a turbulent one for China, marred by major famines, foreign occupation and civil unrest.[footnoteef:1] Despite these problems and the enormous challenges in achieving self-sufficiency in food production, the…
References
Bruce, Jacobs J. "Looking North, Looking South: China, Taiwan, and the South Pacific," China Review International (Fall 2012) 19(3), pp. 367-372.
Buszynski, Leszek, "The South China Sea: Oil, Maritime Claims, and U.S. -- China Strategic Rivalry," The Washington Quarterly (2012), 35(2), pp. 139-156.
"China" (2015). CIA World Factbook. [online] available https://www.cia.gov/library / publications/the-world-factbook/geos/ch.html.
"China economic profiles," (2015) NationMaster. [online] available: http://www.nation master.com/country-info/profiles/China/Economy.
political framework of EU and OCT
European Union (EU) and Overseas Countries and Territories (OCTs) are in association with each other via a system which is based on the provisions of part IV of the Treaty on the Functioning of the EU (TFEU), consisting of detailed rules and measures which are laid down in the document issued on 27th November 2001 title Oversees Association Decision. The expiry date of this association decision is 31st December 2013. Stress has been laid down by the European Council in its conclusions issued on 22nd December 2009 that the relationship between OCT and EU should continuously be updated in order to reflect latest developments not only in EU and OCT but thorough out the world. The commission has also been encouraged to make revisions to the Overseas Association Decision and present it in front of the council prior to July 2012 (Hill et al.,…
References
Agnew John, "Geopolitics re-vision world politics," Routledge Taylor & Francies Group, pp 1-5
Alan Taylor, American Colonies: New York: Viking, 2001, pp. 57 -- 8.
Baldwin, David. Ed. Neo-Realism And Neoliberalism: The Contemporary Debate, New York: Columbia University Press, 1993.
Balzacq, T. (Ed.). Understanding securitization theory. The design and evolution of security problems. Oxon: Routledge, 2010.
outlaw sea: The lawless sea of today's modern age
The word piracy commonly brings to mind men with peg legs, funny accents, and parrots on their shoulders. However, William Langewiesche's book The Outlaw Sea underlines the fact that piracy is still a way of life for many people even today. The book demonstrates that international waters are just as rife with danger and under-regulated as they were many centuries ago, despite the efforts of numerous nations and international agencies to bring pirates to justice. Piracy might seem to be used purely for economic reasons on its surface but it can also be deployed to fuel and support terrorism. Langewiesche's 2004 book is a clarion cry about the need to do something to address the problem before more lives are lost. However, there is little evidence that the ten years since the book was published have brought forth substantial improvements.
One…
References
Barise, H. (2005). Somalia: Where pirates roam free. BBC. Retrieved:
http://news.bbc.co.uk/2/hi/africa/4424264.stm
Langewiesche, William. (2004). The outlaw sea. New York: North Point Press.
Piracy attacks rise 14% as Nigerian and Somalian coasts become more dangerous. (2007). ICC.
China in the South China Sea
The geopolitical and economic consequences of China's occupation of the Spratly Islands in the South China Sea can perhaps best be measured the est's (or simply ashington's) response to China's move. As Durden notes, the South China Sea is not just important to China; it is important to ashington, too, which is accused of "militarizing the region" by the Chinese. But this is essentially what the U.S. is accusing China of, while Japan meanwhile claims that China is siphoning natural gas from its side of the "economic zone" (Durden). Thus, by building islands and runways in the Spratlys and expanding itself in the South China Sea, China is provoking a host of reactions from other nations (estern or estern-supported), indicating that there is a serious economic and geopolitical clash at hand over this issue. The main economic consequence coming from the U.S. will be…
Works Cited
Assange, Julian. "The Trans-Pacific Partnership: Secretive Deal Isn't about Trade, but Corporate Control." Democracy Now! Democracy Now, 27 May 2015. Web. 24 September 2015.
Butool, S. (2013). "Pakistani Responses to AfPak Policy Local Narratives and an Ending Global War?" Asian Survey, 53(6): 1005-1036.
"China's Maritime Disputes." Council on Foreign Relations. Council on Foreign
Relations, n.d. Web. 24 September 2015.
Peace
Freedom is the Foundation of Peace. Without freedom, there is no peace. America, by nature, stands for freedom, and we must always remember, we benefit when it expands. So we must stand by those nations moving toward freedom. We must stand up to those nations who deny freedom and threaten our neighbors or our vital interests. We must assert emphatically that the future will belong to the free. Today's world is different from the one we faced just several years ago. We are no longer divided into armed camps, locked in a careful balance of terror. Yet, freedom still has enemies. Our present dangers are less concentrated and more varied. They come from rogue nations, from terrorism, from missiles that threaten our forces, our friends, our allies and our homeland.
Since the signing of the Treaty of Ryswick between the kingdoms of Spain and France in 1697, the island…
Bibliography
"Beginning of Diplomatic Relations." Department of Foreign Affairs and International Relations. (January 2004) Retrieved June 3, 2005 from http://www.dfait-maeci.gc.ca /latinamerica/haitirelations-en.asp.
Graham, Andrew. "Canada bolsters support to Haiti." Media Relations Office
Canadian International Development Agency. (July 2004) Retrieved June 3, 2005 from
5TH FLEET IN BAHAIN AND THE U.S. AND EU OIL EMBAGO IN IAN
OLE OF THE U.S. 5TH FLEET IN BAHAIN AND THE U.S. AND EU OIL EMBAGO IN IAN
ole of the U.S. 5th fleet" in Bahrain
ole of the U.S. 5th fleet" in Bahrain
foreign aid to Bahrain, where the U.S. Fifth Fleet is centered, constitutes directly to the U.S. Government's aims to maintain safety in the Persian Gulf. Bahrain is the only Arab state that has led one of the Coalition Task Forces that move around the Gulf, and has issued to move its flagship in support of the formation counter-piracy mission. As suggested by Edward & Marolda (1998) U.S. aids assists Bahrain, which have no oil wealth of its neighbors, get the training and equipment it requirement to operate alongside U.S. air and naval forces. U.S. military access to Bahrain also uplifts the operations in Iraq,…
References
1. Michael A. Palmer, On Course to Desert Storm: The U.S. Navy and the Persian Gulf (Washington, D.C.: Naval Historical Center, 1992), 122.
2. OPLAN 1019 Arabian Gauntlet," GlobalSecurity.org. Available from http://www. globalsecurity.org/military/ops/arabian-gauntlet.htm (accessed November 1, 2009).
3. Edward J. Marolda and Robert J. Schneller Jr., Shield and Sword: The United States Navy and the Persian Gulf War (Washington, D.C.: Naval Institute Press, 1998), 33.
4. Edward J. Marolda and Robert J. Schneller Jr., Shield and Sword: The United States Navy and the Persian Gulf War (Washington, D.C.: Naval Institute Press, 1998), 32-35.
Organizations
The Structure of the British Army Compared to a Civilian Business Organization
Military life, especially during combat situations, is difficult for the individual who has always been a civilian to imagine. The structure of the organization is rigid, strict control is maintained of all personnel, the management style is historically largely authoritarian, and conditions can be harsh. However, there are always people who volunteer for this service for many reasons. The individual lacks responsibility and wishes to gain it, there is a scarcity of sustainable employment, the promise of adventure awaits the soldier. Other reasons exist, every soldier or sailor has one, but whatever the reason when a person joins the military they soon understand the organization. There is no mystery regarding large goals or minor objectives. The British Army has a unique history and purpose that can be useful to companies that want to survive and remain successful…
References
Andrzejewski, S., 1954. Military organization and society. London: Routledge & Kegan Paul.
British Army., 2010. British army: An introduction. Retrieved December 15, 2010 from http://www.army.mod.uk/documents/general/2010_ARMY_Brochure_9.0_ (2).pdf
Caniglia, R.R., 2001. Leadership: U.S. And British approaches to force protection. Military Review, 81(4), pp. 72-81
Cassidy, R.M., 2005. The British army and counterinsurgency: The salience of military culture. Military Review, 85(3), pp. 53-64.
Japanese vs. Russian ar
The war between Russia and Japan is a conspicuous occurrence. This was the initial thunderbolt blow of Admiral Togo upon the exposed Russian fleet in Port Arthur as well as the end maturing of the quarrel plus the continuity of the war, which were manifested through a swift unattainable decisiveness under the same circumstances a century ago. It could be true that win of Japanese over Russian was due to strategic and operational skills but not their opponent blunder. The circumstances could be the capacity of the leader and the conditions upon which they are called so that they could act; Lesser and Napoleon men differences could be another factor. The well-known concern was that the war had to turn on only sea and land co-ordination right from its initial by the involved belligerents. Though all of them tried this kind of co-ordination, Japanese were the…
Work cited
Alfred T. Mahan (1908). "Retrospect Upon the War Between Japan
and Russia" Published by Little, Brown, and Company.
Corbett, Sir Julian (1907). Maritime Operations In The Russo-Japanese War 1904 -- 1905. Originally classified, and in two volumnes, ISBN 1-55750-129-7
Forczyk, Robert (2009). Russian Battleship vs. Japanese Battleship, Yellow Sea 1904-05. Osprey. ISBN 9781846033308.
Ecstasy Use by Adolescents in Miami-Dade County, FL
Ecstasy, also known as MDMA, Methylenedioxymethamphetamine, has become popular as a club drug and at techno dance events, such as raves, trance scenes and private parties. Many who attend raves and trances do not use drugs, but those who do, may be attracted to their generally low cost and to the intoxicating highs that are said to deepen the rave or trance experience ("NIDA," 2004). It has gained the reputation as a "hug drug" promoting empathy, relaxation, and sexuality. Studies indicate an increase in abuse of this drug, especially among adolescents and/or teenagers. It is a human-made drug that acts as both a stimulant and a hallucinogen. It is taken orally, in the form of a capsule or a tablet. It has short-term effects including feelings of mental stimulation, emotional warmth, enhanced sensory perception, and increased physical energy.
Health effects can include,…
References
Chassin, L., Pitts, S.C., DeLucia, C., Todd, M. (1999). A longitudinal study of children of alcoholics: Predicting young adult substance use disorders, anxiety, and depression. Journal of Abnormal Psychology, 108, pp.106-119
Director's report of the national advisory council on drug abuse. (1999). National
Institute on Drug Abuse. Retrieved April 22, 2005 from http://drugabuse.gov/DirReports
Drug facts. (2004). Office of National Drug Control Policy. Retrieved April 21, 2005
International egulation of Tourism in Antarctica
Since the mid-1980s, Antarctica has been an increasingly popular tourist destination, despite the relative danger of visiting the largest, least explored -- and arguably least understood -- continent on earth. Beginning with the 1959 treaty establishing Antarctica as an international zone free of claims of sovereignty by nation's that had been instrumental in establishing research stations there, there has been almost constant negotiation about how to administer regulations pertaining to the preservation of life forms on the continent, what those regulations should be, and what sanctions should be applied and by whom.
To understand the depths of the negotiations, and the potential for discord, it is necessary to understand what the continent offer the 65% of global nations that are party to the 1959 and all subsequent treaties. To understand the possible future of Antarctica, it is necessary to outline treaty attempts to minimize…
References
Antarctica. Siyabona Africa Web site. Retrieved September 28, 2004 at http://balule.krugerpark.co.za/africa_antarctica.html
Chile Web site. Retrieved September 17, 2004 at http://www.visit-chile.org/antartica/antartica.phtml
Australia urges regulation as tourism to Antarctica escalates. (2004, March 24) Agence France Presse English. Retrieved September 14, 2004 at http://www.highbeam.com .
Bulgaria in Antarctica. Retrieved September 15, 2004 at http://www.bluelink.net/antarctic/ant_en/BGant.htm
Jones Act, VISA, and commercial military sealift
The impact of the following on transportation and logistics in the U.S.
The Jones Act
The Jones Act has gained much relevance to the U.S. domestic and national transportation and logistics than before. A close diagnosis of the industry reveals that the Act has served the interest of Americans because it provided set of sealift vessels, a knowledgeable and experienced workforce, and a base of shipbuilding industry, which is being used to protect the security of U.S. economy and military. Since its implementation, the U.S. navy has experienced a persistent shrink as it suffers from increased tear and wear leading to an increase in financial pressures as cheap foreign labor remains a challenge to the workforce. Therefore, it is evident that the Jones Act has made significant contributions to the U.S. national security (McCullough, 2010).
Cargo Preference Act of 1904
Since the Cargo…
References
McCullough, D.G. (2010). The path between the seas: The creation of the Panama Canal 1870-1914. New York.
Truver, S.C. & United States. (2007). Lifeline of the nation: The U.S. Merchant Marine in the 21st century. Greenbelt, Maryland: Gryphon Technologies and Bluewater Agency, Ltd.
United States (2009). MARAD: The annual report of the Maritime Administration for fiscal year. Washington, D.C: U.S. Dept. Of Commerce, Maritime Administration.
Security
Module 4 Case Paper: Maritime Security Introduction Maritime cyber attacks have already occurred in recent history, indicating the threat that cyber warfare poses for maritime security. The reality of…
Read Full Paper ❯Safety
International Ship and Port Security (ISPS) Code on Maritime Security The study will be based on the question that "What is the impact of the International Ship and Port…
Read Full Paper ❯Safety
International Ship and Port Security (Isps) Code on Maritime Security Impact of the International Ship and Port Security (ISPS) Code on Maritime Security The study will be based on…
Read Full Paper ❯Security
Port Security The CBP (Customs and Border Protection) is a unit in the homeland security department and is the agency responsible for regulating, monitoring and facilitating flow of products…
Read Full Paper ❯Military
Their casualties go uncounted, their actions largely unmonitored and their crimes unpunished." Scahill relates that four years into the Iraq occupation "there is no effective system of oversight or…
Read Full Paper ❯Transportation
air cargo industry experienced tremendous growth since inception because of various factors in the aviation industry, particularly the freight sector. The growth and development of this industry is evident…
Read Full Paper ❯Security
Private Security The various factors that influence both the definition and the perception of private security are typically environmental but can be internal and external to the issue of…
Read Full Paper ❯Business
Human Factor in Cargo Security Is Human Factor important Cargo Security Cargo security I one of the major issues handled with priority by Homeland security department in United States…
Read Full Paper ❯Security
security measures. The primary focus while analysing security measures will be on the overall effectiveness and hindrances in their implementation in the aspect of transportation and logistics management (TLM).…
Read Full Paper ❯Criminal Justice
Homeland Security and Preparedness, esponse, Activities and Programs in Disaster esponse or Disaster ecovery The focus of this study is the homeland security issue as it relates to the…
Read Full Paper ❯Military
Fearfulness of non-state actors remains salient, but what is particularly interesting is the way ussia and China are singled out as nations with whom the United States is not…
Read Full Paper ❯Military
[footnoteRef:24] in the Archaic Period, Ancient Greece's initial maritime power was critical but also "sporadic."[footnoteRef:25] During the Classical Period, Athens in particular "pursued a policy of naval imperialism"[footnoteRef:26] and…
Read Full Paper ❯Military
The MdTA Police and the Office of Security (and thus the private security personnel under its supervision) are the extent of the state's commitment in terms of securing the…
Read Full Paper ❯Transportation - Environmental Issues
Pacific Plan is a document that was adopted by forum leaders of the nations in the pacific islands aiming to address various challenges that these nations in the pacific…
Read Full Paper ❯Military
Discouraging is not the same as stopping, and this initiative has little stopping power. 3) ccording to the National Strategy for Combating Terrorism published in February of 2003, the…
Read Full Paper ❯History - Israel
America's engagement with China, with historic ice-breaking between the two countries carried out by Henry Kissinger, has been complicated. I would suggest that it were the U.S. domestic preoccupations…
Read Full Paper ❯Military
3 16 JTF JFACC JFLCC JFSOCC JFMCC Yellow MOD Coordination TACON OPCON COCOM XX ESG CSG SAG MPS PATRON SAG Amphib X SF NSWTG PSYOPS JSOAC AETF AEF ASOG…
Read Full Paper ❯Literature - African
International Community's esponse to Somalian Piracy. To date, the primary response by the international community to maritime piracy off the coast of Somalia has been to employ combined international…
Read Full Paper ❯Sports - Drugs
Mexico faces an array of drug-related problems ranging from production and transshipment of illicit drugs to corruption, violence, and increased internal drug abuse. Powerful and well-organized Mexican organizations control…
Read Full Paper ❯Transportation - Environmental Issues
These gunboats would devastate wildlife area and other immense and indefinite environmental impact. These tankers would carry liquefied natural gas or LNG in cruising through Head Harbor Passage. It…
Read Full Paper ❯History - Asian
' Indians across the political spectrum, especially the country's powerful nuclear weapons establishment, are critical of the NPT, arguing that it unfairly warps international hierarchies to the disadvantage of…
Read Full Paper ❯Literature - Latin-American
Navies in American Revolution For hundreds of years, maritime expansion represented the only way to reach distant shores, to attack enemies across channels of water, to explore uncharted territories,…
Read Full Paper ❯Sports - Women
Women Participation in Marine Industry The Relation Ship between the Participation of Woman in Maritime Sectors and Various Policy Organizations Women represent a considerable portion of the world's labor…
Read Full Paper ❯Energy
AFICA'S PETOLEUM AND CHINA'S ECONOMIC GOWTH AND DEVELOPMENT How Africa's Petroleum Supply Is Important to China's Economic Growth and Development While China continues to grow, its oil demand is…
Read Full Paper ❯Security
Critical Infrastructure and Key Resources NIPP (National Infrastructure Protection Plan) offers the necessary structure for coordination, synchronization and integration of activities originating from different pertinent statutes, presidential directives and…
Read Full Paper ❯Military
Seaports Vulnerability to Submersible Vessels Criminology All countries of the world are struggling hard to provide peace to its residents and masses. After all the efforts and struggle, countries…
Read Full Paper ❯Government
China Is China a status quo or aggressive power? Johnston (2013) argues that China's allegedly new assertiveness is nothing of the sort. He makes the case that this view…
Read Full Paper ❯Business - Law
"When a court strikes a contract provision for unconscionability it is declaring that provision is so unfair or oppressive that the court will refuse to enforce it." (Gillespie, 2007).…
Read Full Paper ❯Military
Search and Rescue is the search that is done to provide aid to the people who are feeling distressed or any sort of obvious danger. The general field of…
Read Full Paper ❯Education - Computers
According to Toronto Star reporter Stephan Handelman in an article printed in 2005, the U.S. senior intelligence analysts consider China to be the greatest long-term threat to U.S. stability.…
Read Full Paper ❯Terrorism
S. law. Legislation such as many elements of the U.S.A. PATRIOT ACT are problematic because they do not provide adequate controls to ensure that investigative methods and procedures appropriate…
Read Full Paper ❯Terrorism
EAL DO YOU THINK THE TEOIST THEAT IS TO THE COMMECIAL SECTO? With the current wave of terrorist's activities and attacks, terrorists' threat is incredibly real to the commercial…
Read Full Paper ❯Economics
Foreign Policy of China (Beijing consensus) Structure of Chinese Foreign Policy The "Chinese Model" of Investment The "Beijing Consensus" as a Competing Framework Operational Views The U.S.-China (Beijing consensus)…
Read Full Paper ❯Education - Computers
Bahrain Ministries IT Service Studying the Potential of Moving Bahrain Ministries IT Services Into Private Cloud Computing Information technology (IT) is not only an important part of life for…
Read Full Paper ❯Government
On November 8, 2001, the U.S. Senate passed several new conditions before direct 'military-to-military relations can be restored with Indonesia including the punishment of the individuals who murdered three…
Read Full Paper ❯Government
Rationalist Theories of International Relations Despite the name, rationalist theories of international relations are anything but, limited as they are by both an almost childlike understanding of human behavior…
Read Full Paper ❯Leadership
Paccom What long-range steps might Pacific Command (PACOM) take, as part of a broader national strategy, to help constructively engage China, while dissuading and deterring China from using force…
Read Full Paper ❯Military
Rank Third Semester Exam How does Command and Control and Intelligence help the JFC and staff integrate, synchronize and direct joint operations? Joint Force Commands seek to utilize the…
Read Full Paper ❯Urban Studies
Target Folder Target Identification and Description Target identification data. Located at 1407 W. Wilson. Chicago IL. 60647 Description and significance. This residence is suspected as being a safe house…
Read Full Paper ❯Business
Petersburg, would not discuss in detail SI's other work for agencies such as Special Operations Command, but said he hopes this work eventually will amount to a $36.5-million Navy…
Read Full Paper ❯Economics
Marine Insurance The concept of Marine insurance is something that has been developing at a fast rate of late. (Marine Insurance: Barlow, Lyde and Gilbert) What exactly is insurance…
Read Full Paper ❯Business - Law
The chambers approach may be more suitable for states that seek a quick resolution to a particular dispute or for other compelling reasons; however, like the full Court, these…
Read Full Paper ❯Transportation
Sea Cargo and Transportation Maritime Transportation is the main channel of international trade; however, the share of its weight sustained by the sea is difficult to come across. Increase…
Read Full Paper ❯Physics
S. transportation infrastructure is a bad idea. But in contrast to these doom and gloom pessimists, a restructuring and revitalization of U.S. transportation infrastructure is not only an excellent…
Read Full Paper ❯Criminal Justice
Combating Criminal Narcotics Activity Along Southern order The initiatives the 2009 Recovery Act funds must accomplish program-specific goals, and must be developed for furthering at least one of its…
Read Full Paper ❯Business - Law
Like most litigations on such complicated issues the company had little to do but show reasonable accommodation, adopt better surface practices and wait out a lengthy period before their…
Read Full Paper ❯Military
Tonkin Gulf Crisis The Debate over the Tonkin Gulf Crisis The Tonkin Gulf Crisis 1964 ranks with the Japanese attack on Pearl Harbor and the assassination of President John…
Read Full Paper ❯Mythology - Religion
In that same year as well, Portuguese ships reached China, re-establishing direct trade for the first time since its termination 150 years prior. The Chinese were particularly eager to…
Read Full Paper ❯History - Asian
S. For its weapons sales to Taiwan. (Janbo) It must also be noted that China's Naval expansion is a departure from what many experts conjectured in the recent past.…
Read Full Paper ❯History - Asian
Sino-U.S. elations in the Post-Cold War Era Today, China and the United States are inextricably linked in the modern world and some observers maintain that any disagreements that emerge…
Read Full Paper ❯Government
political framework of EU and OCT European Union (EU) and Overseas Countries and Territories (OCTs) are in association with each other via a system which is based on the…
Read Full Paper ❯Business - Miscellaneous
outlaw sea: The lawless sea of today's modern age The word piracy commonly brings to mind men with peg legs, funny accents, and parrots on their shoulders. However, William…
Read Full Paper ❯Political Science
China in the South China Sea The geopolitical and economic consequences of China's occupation of the Spratly Islands in the South China Sea can perhaps best be measured the…
Read Full Paper ❯Literature - Latin-American
Peace Freedom is the Foundation of Peace. Without freedom, there is no peace. America, by nature, stands for freedom, and we must always remember, we benefit when it expands.…
Read Full Paper ❯History - Israel
5TH FLEET IN BAHAIN AND THE U.S. AND EU OIL EMBAGO IN IAN OLE OF THE U.S. 5TH FLEET IN BAHAIN AND THE U.S. AND EU OIL EMBAGO IN…
Read Full Paper ❯Military
Organizations The Structure of the British Army Compared to a Civilian Business Organization Military life, especially during combat situations, is difficult for the individual who has always been a…
Read Full Paper ❯Drama - World
Japanese vs. Russian ar The war between Russia and Japan is a conspicuous occurrence. This was the initial thunderbolt blow of Admiral Togo upon the exposed Russian fleet in…
Read Full Paper ❯Sports - Drugs
Ecstasy Use by Adolescents in Miami-Dade County, FL Ecstasy, also known as MDMA, Methylenedioxymethamphetamine, has become popular as a club drug and at techno dance events, such as raves,…
Read Full Paper ❯Recreation
International egulation of Tourism in Antarctica Since the mid-1980s, Antarctica has been an increasingly popular tourist destination, despite the relative danger of visiting the largest, least explored -- and…
Read Full Paper ❯Transportation
Jones Act, VISA, and commercial military sealift The impact of the following on transportation and logistics in the U.S. The Jones Act The Jones Act has gained much relevance…
Read Full Paper ❯