Maritime Security: Potential Terrorist Attacks and Protection Priorities Page: 7 of 30
30 pView a full description of this report.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
CRS-4
Marie, MI, blocking the shipping channel below with debris, by exploding a fuel
tanker truck on the bridge.16
The potential consequences of a terror attack are also an important consideration
in evaluating terrorist objectives. Terrorists groups such as Al Qaeda appear to
choose the scale (and timing) of their attacks in order to maximize media coverage,
and hence, public awareness and psychological impact. As one academic study
concluded,
To make it into the news, terrorists operating in Western countries can commit
some minor terror incident with few fatalities, whereas terrorists in developing
countries need to "produce" a lot of blood to attract the attention of Western
media. 1"
Accordingly, attack scenarios must consider consequences, and how such
consequences would align with the objectives of potential perpetrators. The study
cited above suggests that terrorists attacking the United States may achieve their
media objectives even with relatively minor attacks.
Locations
Where a potential maritime attack could occur is also essential to defining a
terrorism scenario. Examples above have already illustrated that maritime attacks
targeting U.S. interests may occur in U.S. ports (of which there are over 360)18 or
among the ports of the nation's 165 maritime trading partners.19 Specific types of
attacks, such as the smuggling of WMDs in ship-borne cargo containers, may involve
both a foreign port of departure and a U.S. port of entry. Maritime terror attacks may
also occur at sea in areas of concentrated shipping like the Straits of Gibraltar where,
in 2002, Al-Qaeda operatives reportedly plotted to attack U.S. and British warships,
and possibly commercial vessels.20 The Straits of Malacca in southeast Asia is
another location frequently identified by security analysts as a potential locus of
maritime terrorism activity. In 2001, Jemaah Islamiyah terrorists reportedly had
plans to attack U.S. navy vessels visiting the region.21 The Organization for
16 Purvis, Michael. "Bridge Out: Forces Plan for Terrorist Attack." Sault Star. Sault Sainte
Marie, Ontario. May 4, 2005.
17 Frey, Bruno S. and Rohner, Dominik. "Blood and Ink! The Common-Interest-Game
Between Terrorists and the Media." Center for Research in Economics, Management, and
the Arts. Basel, Switzerland. Working Paper No. 2006-8. p. 18
18 American Association of Port Authorities. "U.S. Public Port Facts." Internet page.
Alexandria, VA. July 18, 2006. [http://www.aapa-ports.org
/Industry/content.cfm?ItemNumber=1032]
19 U.S. Maritime Administration. "U.S. Waterborne Trade by Trading Partners, 1997-2005."
Online database. July 18, 2006. [http://www.iwr.usace.army.mil/ndc/usforeign/index.htm]
20 Sawer, Patrick. "Terror Plot to Blow Up Navy Warships is Foiled." The Evening
Standard. London. June 11, 2002. p.4.
21 Raymond, Catherine Z. "The Threat of Maritime Terrorism in the Malacca Straits."
(continued...)
Upcoming Pages
Here’s what’s next.
Search Inside
This report can be searched. Note: Results may vary based on the legibility of text within the document.
Matching Search Results
View eight places within this report that match your search.Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Report.
Parfomak, Paul W. & Frittelli, John. Maritime Security: Potential Terrorist Attacks and Protection Priorities, report, May 14, 2007; Washington D.C.. (https://digital.library.unt.edu/ark:/67531/metadc821733/m1/7/?q=%22transportation%22: accessed June 3, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; crediting UNT Libraries Government Documents Department.