The Threat Vectors in the Port of Miami
Words: 852 Pages: 3
Table of Contents
01. Possible Threat Vectors
02. Major Threat Vector
03. Critical Infrastructure
04. Conclusion
05. References
The level of maritime shipping has increased considerably during the past decades. One of the major factors for this growth was
the use of shipping containers that enables companies to decrease their costs (Haas, 2013). Haas (2013) notes that the amount
of maritime exchange reached almost 9 billion tons in 2011. For instance, almost 9 million tons of cargo entered and left the
USA through the port of Miami (Port Miami, 2016). This port is one of the major maritime facilities that has advanced technology,
including cranes necessary for containers shipment. This port is a significant commercial hub, which can make it a potential
target of some groups.
Possible Threat Vectors
One of the major challenges of the modern world is global terrorism. There are always chances of military conflicts with other
countries, but these scenarios are less likely than terrorist attacks. The latter can take quite different forms as ports can be
attacked with the help of small boats, hijacked large vessels, floating IEDs, and the so-called CBRN (chemical, biological,
radiological, and nuclear) agents. Analysts claim that ports are less vulnerable than vessels in the sea, but various threats still
exist (CBRNe Portal, 2012). For example, hijacked vessels carrying chemical or radiological agents can pose a significant threat to
port infrastructure and cause casualties. However, security systems of the port of Miami are quite sophisticated, so hijacked
vessels are unlikely to enter the port area (Port Miami, 2017a). Terrorist groups will also need to have various professionals to
hijack, control, and use the hazardous cargo properly (CBRNe Portal, 2012). Terrorists’ small boat attacks are most likely to cause
quite limited damage to the infrastructure and will be detected and destroyed quite easily.
Cyberattacks are often seen as one of the central threats to ports. Clearly, the use of technology is essential for the system of
maritime exchange, which makes it quite vulnerable. Numerous cyberattacks have been successful in different areas so any
system can be damaged. However, the US government is paying considerable attention to the cybersecurity of its strategic
infrastructure. The port of Miami has effective cybersecurity strategies and technologies (Port Miami, 2017a). Therefore, it is
possible to note that this vulnerability is controllable.
Major Threat Vector
CBRNE attacks pose the most serious threat to the port of Miami. The facility accepts millions of vessels annually, and it is
impossible to check all of them (Haas, 2013). The gaps in the system of cargo control are obvious as the volume of drug
trafficking is rather substantial. Thus, terrorists can load some explosives in several containers. The use of dirty bombs can
make the impact more serious especially when it comes to economic outcomes (CBRNe Portal, 2012). Terrorists can place such
bombs in several containers to make the damaged area, as well as financial losses, considerable. It is necessary to note that
casualties will not be numerous, which makes this target less attractive to terrorists who aim at causing panic. Nevertheless,
any significant damage to such maritime hub as the port of Miami can have various adverse effects on the economic well-being
of the region.
Critical Infrastructure
One of the distinctive features of the port of Miami is its cranes that enabled the port to reach the cargo tonnage mentioned
above. The cranes have a lift capacity of one hundred tons (Port Miami, 2017b). Therefore, these cranes can be regarded as
critical infrastructure as the port will lose its significance if these facilities are damaged or destroyed. As has been mentioned
above, the control over the content of the containers is not perfect, and explosives can enter the port area quite easily.
Terrorists can detonate the explosives placed in different containers to increase their chances of hitting the cranes (or some of
them). This scenario is possible but can be quite easy to implement as the location of containers at different periods of time
can be traced with the help of RFID technologies. The explosives can be detonated when placed near the cranes. Terrorists can
access the area and put the explosives that entered the port in one of the containers.
Conclusion
On balance, the port of Miami can become an attractive target of terrorist in the recent future. Although the possibility of wide
military conflicts and associated risks exists, terrorist attacks are more likely to occur. The port of Miami has a considerable
capacity due to the use of cranes that can handle containers. Damage to these cranes, as well as other facilities or the port
infrastructure, can result in considerable financial losses as well as certain casualties. Cyberattacks are associated with
considerable threats as the cyberworld is rather vulnerable. However, the security system of the port is quite sophisticated and
can address diverse challenges. At the same time, the control over container content is not proper. Terrorists can use dirty
bombs to cause physical damage and contamination of a large part of the port, which will potentially lead to substantial
financial losses and economic issues for the entire state. Multiple attacks on several ports can cause considerable issues to the
entire nation so these threats should receive more attention.
References
CBRNe Portal. (2012). The risks of maritime CBRN terrorism – is shipping the weak link? Web.
Haas, M. (2013). Shipping as a repository of strategic vulnerability. Web.
Port Miami. (2016). 2016 statistics. Web.
Port Miami. (2017a). Cargo safety & security. Web.
Port Miami. (2017b). New Super Post-Panamax cranes. Web.