Minimize damage and expedite recovery from attacks within the maritime domain. Adversaries that take advantage of such t ransnational capabilities have the potential to cause serious damage to global, political, and economic security. The United States will use the agencies and components of the Federal Government in innovative ways to improve the security of sea-lanes that pass through international straits. 1115 0 obj <>/Encrypt 1106 0 R/Filter/FlateDecode/ID[<463390C88819FF4296AC898970A94B38><62D8ADC9A8A4794AA5504CF9A06CB4E1>]/Index[1105 46]/Info 1104 0 R/Length 76/Prev 642558/Root 1107 0 R/Size 1151/Type/XRef/W[1 3 1]>>stream Ultimately, the foundation of American strength is at home. The Federal Government has three primary responsibilities in regard to this national effort: (1) to produce and distribute timely and accurate threat advisory and alert information and appropriate protective measures to S tate, local, and tribal governments and the private sector via a dedicated homeland security information network ; (2) provide guidance and standards for reducing vulnerabilities; and (3) provide active, layered, and scalable security presence to protect from and deter attacks. This Strategy directs the coordination of United States Government maritime security programs and initiatives to achieve a comprehensive and cohesive national effort involving appropriate Federal, State, local, and private sector entities. xZmoH)a?B-@(> >EG\jzI$D33&Wb1Oyb(_|\lr,i Thus, this continuous domain serves as a vast, ready, and largely unsecured medium for an array of threats by nations, terrorists, and criminals. Some states provide safe havens for criminals and terrorists, who use these countries as bases of operations to export illicit activities into the maritime domain and into other areas of the globe. %PDF-1.7 We must confront deadly technologies. %%EOF More robust international mechanisms will ensure improved transparency in the registration of vessels and identification of ownership, cargoes, and crew of the world's multinational, multi-flag merchant marine. The first line of response in the aftermath of any terrorist attack is the first-responder community police officers, firefighters, emergency medical care providers, public works personnel, and emergency management officials. 2282 0 obj <> endobj Defending against enemies is the first and most fundamental commitment of the United States Government. This strategic action is designed to involve all nations that have an interest in maritime security, as well as the ability and willingness to take steps to defeat terrorism and maritime crime.

5 This maritime mode of terrorist attack has been established, tested, and repeated. of mass destruction against us, make todays security environment more complex and dangerous. Expanding the International Port Security and Maritime Liaison Officer Programs, and the number of agency attachs. %%EOF However, the nature and motivations of these new adversaries, their determination to obtain destructive powers Achieving awareness of the maritime domain is challenging. This Strategy also draws upon the National Strategy for Combating Terrorism, the National Strategy to Combat Weapons of Mass Destruction, the National Strategy for the Physical Protection of Critical Infrastructure and Key Assets, the National Defense Strategy, the National Military Strategy, and the National Drug Control Strategy. This National Strategy presents a vision for the achievement of maritime security for the people and interests of the United States while respecting the information privacy and other legal rights of Americans. These actions will preserve life, property, the environment, and social, economic, and political structures, as well as restore order and essential services for those who live and work within the maritime domain. The smuggling of people, drugs, weapons, and other contraband, as well as piracy and armed robbery against vessels, pose a threat to maritime security. The United States will be prepared to maintain vital commerce and defense readiness in the aftermath of any terrorist attack or other similarly disruptive incidents that occur within the maritime domain. A close partnership between government and the private sector is essential to ensuring critical infrastructure and key resource vulnerabilities are identified and corrected quickly. Tools and methodologies for attacking information systems are becoming widely available, and the technical abilities and sophistication of terrorists groups bent on causing havoc or disruption is increasing. hbbd``b`$gG "Z+$$D[ $X'HV6b``$ ! Additionally, concrete and well-defined coordination protocols and communication mechanisms including procedures for operating jointly to prevent and respond to threats, and for assigning lead agencies for both pre- and post-incident operations, will be implemented. <>/ExtGState<>/XObject<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> The right of vessels to travel freely in international waters, engage in innocent and transit passage, and have access to ports is an essential element of national security. It requires deeper trust and confidence, not less. The vastness of the oceans, the great length of shorelines, and the size of port areas provide both concealment and numerous access points to the land. The Department of Homeland Security is the lead agency for the overall national effort to enhance the protection of critical infrastructure and key resources. These contingency and continuity plans must be developed and exercised in a coordinated fashion by the public and private sectors. The probability of a hostile state using a WMD is expected to increase during the next decade3. In particular, to achieve unity of effort and operational effectiveness, maritime security forces from both the U.S. Armed Forces and law enforcement agencies must have the capability and authority to operate in mutually supporting and complementary roles against the spectrum of expected security threats. Adopting streamlined procedures for inspecting vessels reasonably suspected of carrying suspicious cargo and seizing such cargo when it is identified as subject to confiscation. NTC coordinates with other Federal agencies such as the U.S. Coast Guard, Federal Air Marshals, FBI, Transportation Security Administration, and the Departments of Energy and Agriculture, as well as the intelligence community. These response forces will blend the expertise and resources of the public and private sectors.

To maximize domain awareness, the United States will leverage its global maritime intelligence capability and the diverse expertise of the intelligence and law enforcement communities. Together, the National Strategy for Maritime Security and its eight supporting plans present a comprehensive national effort to promote global economic stability and protect legitimate activities while preventing hostile or illegal acts within the maritime domain. 4 0 obj Unprecedented advances in telecommunications and dramatic improvements in international commercial logistics have combined to increase both the range and effects of terrorist activities, providing the physical means to transcend even the most secure borders and to move rapidly across great distances. The public and private sectors must be ready to detect and rapidly identify WMD agents; react without endangering first responders; treat the injured; contain and minimize damage; rapidly reconstitute operations; and mitigate long-term hazards through effective decontamination measures. A bout one third of the world's trade and half its oil traverse the Straits of Malacca and Singapore . The potential for terrorists to take advantage of human smuggling networks in attempts to circumvent border security measures cannot be ignored. Maritime security is best achieved by blending public and private maritime security activities on a global scale into a comprehensive, integrated effort that addresses all maritime threats. Without effective awareness of activities within the maritime domain, crucial opportunities for prevention or an early response can be lost. Success in securing the maritime domain will not come from the United States acting alone, but through a powerful coalition of nations maintaining a strong, united, international front. In addition to the potential for major combat operations at sea, terrorism has significantly increased the nature of the nonmilitary, transnational, and asymmetric threats in the maritime domain that the United States and its allies and strategic partners must be prepared to counter. Since September 11, 2001 , Federal departments and agencies have risen uncompromisingly to the challenge of maritime security. Regional maritime security regimes are a major international component of this Strategy and are essential for ensuring the effective security of regional seas. Terrorists can also take advantage of a vessels legitimate cargo, such as chemicals, petroleum, or liquefied natural gas, as the explosive component of an attack. Maritime security is best achieved by blending public and private maritime security activities on a global scale into an integrated effort that addresses all maritime threats. Private owners and operators of infrastructure, facilities, and resources are the first line of defense for their own property, and they should undertake basic facility security improvements. Credential services will also be available on a voluntary basis for frequent travelers under various registered traveler programs. Similarly, there is a need for corresponding international coordinating mechanisms to reconstitute commerce and minimize the global impact in the event of a significant maritime incident or threat. In exchange, the shipments of firms that comply will be eligible for expedited clearance and have a reduced likelihood of inspections at departure, transshipment, and arrival ports. Awareness and threat knowledge are critical for securing the maritime domain and the key to preventing adverse events. T o support the accelerating growth of global commerce and security concerns, security measures must: (1) be aligned and embedded with supply chain information flows and business processes; (2) keep pace with supply chain developments; (3) optimize the use of existing databases; and ( 4) be implemented with the minimum essential impact on commercial and trade-flow costs and operations. Complexity and ambiguity are hallmarks of todays security environment, especially in the maritime domain. This circumstance, coupled with increased access to the technology needed to build and employ those weapons, increases the possibility that a terrorist attack involving WMD could occur. The coordination protocols must also outline defined procedures for ensuring national execution of maritime security policy for specific threats or incidents, and more routine encounters where a multiagency response must be seamlessly coordinated. In this ambiguous security environment, responding to these unpredictable and transnational threats requires teamwork to prevent attacks, protect people and infrastructure, minimize damage, and expedite recovery. Collectively, these five strategic actions achieve the objectives of this Strategy: These five strategic actions are not stand-alone activities.

Through a handful of international straits and canals pass 75percent of the worlds maritime trade and half its daily oil consumption. 1 0 obj

This intelligence enterprise will support United States Government agencies and international partners in securing the maritime domain, as well as their other statutorily assigned missions. 1 +jFsA XN!D |{3XAP*Ad ># lp0y z>p/'ScPRX[Xt~epMywwk!btU P%3jeX`Z1&[z\7$6Q/9e!:'yQ$~*uuY;R]Bvh5!,k'~qeLu@>h$"&&.YL.os. Moreover, it underscores our commitment to strengthening our international partnerships and advancing economic well-being around the globe by facilitating commerce and abiding by the principles of freedom of the seas. With advanced telecommunications, they can coordinate their actions among dispersed cells while remaining in the shadows. 0 Protocols for assessment, recovery, and reconstitution must effectively prioritize local, regional, and national interests, manage risk and uncertainty within acceptable levels, and achieve validation through regular drills and exercises. Indeed, we must now begin to conceive of border security and transportation security as fully integrated requirements For maritime security operations on the high seas or in its exclusive economic zones, territorial seas, internal seas, inland rivers, ports, and waterways, the United States must have well- trained, properly equipped, and ready maritime security forces from both the U.S. Armed Forces and national, regional, State, and local law enforcement agencies to detect, deter, interdict, and defeat any potential adversary. The web site is no longer updated and links to external web sites and some internal pages will not work. Authorized elements in the public and private sectors will have access to this integrated shared situational awareness capability, as well as relevant information within their specific area of responsibility. The continued growth in legitimate international commerce in the maritime domain has been accompanied by growth in the use of the maritime domain for criminal purposes.