Cookies Policy
X

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.

I accept this policy

Find out more here

Security: Operational And Technical Approaches

Brill’s MyBook program is exclusively available on BrillOnline Books and Journals. Students and scholars affiliated with an institution that has purchased a Brill E-Book on the BrillOnline platform automatically have access to the MyBook option for the title(s) acquired by the Library. Brill MyBook is a print-on-demand paperback copy which is sold at a favorably uniform low price.

Access this chapter

+ Tax (if applicable)

Chapter Summary

This chapter considers tools which States have employed in order to be in a better position to combat new threats to maritime security, and thus provides a few of the more important examples of control and monitoring regimes devised as a result of the changing security environment. A port State has the right to control access to and close its ports and exercise jurisdiction over events, people and things within its port is undisputed. The current challenge is to prevent threats from materializing and, thus, the key issue relates to the efficiency or otherwise of the current legal regime in enabling a port State to detect such threats, thus allowing it to take the required and permitted action before it occurs. Possibly the most obvious threat to the security and safety of any port comes in the form of containerized cargo.

Keywords: containerized cargo; maritime security; port State

10.1163/ej.9789004182097.i-258.24
/content/books/10.1163/ej.9789004182097.i-258.24
dcterms_subject,pub_keyword
6
3
Loading

Sign-in

Can't access your account?
  • Tools

  • Add to Favorites
  • Printable version
  • Email this page
  • Recommend to your library

    You must fill out fields marked with: *

    Librarian details
    Your details
    Why are you recommending this title?
    Select reason:
     
    Migrant Smuggling by Sea — Recommend this title to your library
  • Export citations
  • Key

  • Full access
  • Open Access
  • Partial/No accessInformation