a. security threats and patterns

72
Shore-based Ship Security Team Training Course

Upload: noel-tan

Post on 14-Jul-2015

270 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: A. security threats and patterns

Shore-based Ship Security Team Training

Course

Page 2: A. security threats and patterns

Course Objective

• At the end of the course, the trainee will be able to demonstrate knowledge and understanding of the requirements for Ship Security Plans

Page 3: A. security threats and patterns

Course Topics

• Knowledge of current security threats and patterns;

• The meaning and consequential requirements of the different security levels;

• Knowledge of the emergency procedures and contingency plans;

• Recognition and detection of weapons, dangerous substances and devices;

Page 4: A. security threats and patterns

• Recognition on a non discriminatory basis, of characteristics and behavioural patterns of persons who are likely to threaten security;

• Techniques used to circumvent security measures;

• Security related communications;

• Operations of security equipment and systems;

• Testing, calibrations and whilst at sea maintenance of security equipment and systems;

Page 5: A. security threats and patterns

• Inspection, control, and monitoring techniques; and

• Methods of physical searches of persons, personal effects, baggage, cargo and ship’s stores (including practical exercises)

Page 6: A. security threats and patterns

US Coast Guard and IMO requirements

Objective: at the end of the topic, the trainee will be familiar with USCG and IMO requirements for Ship Security

Page 7: A. security threats and patterns

SOLAS, 1974 as amended

Amendments:• Chapter XI-2

Special measures to enhance maritime security

• Annex 1Adoption of the International Code for the Security of Ships and Port Facilities

Page 8: A. security threats and patterns

• Annex 1 Part A

Mandatory requirements regarding the Provisions of Chapter XI-2 of the International Convention for the Safety of Life at Sea, 1974, as amended

• Annex 1 Part B

Guidance regarding the Provisions of Chapter XI-2 of the Annex to the International Convention for the Safety of Life at Sea, 1974 as amended and Part A of the Code

Page 9: A. security threats and patterns
Page 10: A. security threats and patterns
Page 11: A. security threats and patterns
Page 12: A. security threats and patterns

USCG NVIC 10-02

Navigation and Vessel Inspection Circular (NVIC) No. 10-02

Security Guidelines for Vessels

The NVIC establishes new guidelines for developing security plans, and implementing security measures and procedures.

Page 13: A. security threats and patterns

Chapter XI-2 Regulation 2

• Applies to:a. the following types of ships engaged on

international voyage:1. Passenger ships, including high-speed

passenger craft;2. Cargo ships, including high-speed craft, of

500 gross tonnage and upward;3. Mobile offshore drilling units; and

b. port facilities serving such ships engaged on international voyages

Page 14: A. security threats and patterns

SOLAS, 1974 as amended

• Chapter V Safety of Navigation

Regulation 19 - Carriage requirements for shipborne navigational systems and equipment

“Ships fitted with AIS (Automatic Identification System) shall maintain AIS in operation at all times except where international agreements, rules or standards provide for the protection of navigational information”

Page 15: A. security threats and patterns

SOLAS, 1974 as amended

• Chapter XI-1

• Regulation 3 – Ship Identification number

The ship identification number shall be permanently marked with the prefix “IMO”

followed by the 7-digit number.

Page 16: A. security threats and patterns

SOLAS, 1974 as amended

• Regulation 5 – Continuous Synopsis Record

“the Continuous Synopsis Record is intended to provide an on-board record of the history of the ship”

Page 17: A. security threats and patterns

Ship Security Alert System

• Regulation 6 states that:

“ All ships shall be provided with a ship security alert system be capable of being activated from the navigation bridge and in at least one other location”

Page 18: A. security threats and patterns

cont.Once activated, the system should transmit a ship-to-shore security alert to a competent authority designated by the flag administration. The alarm should identify the ship and its location and indicate that the security of the ship is under threat or has been compromised. On board the ship, this must not raise any alarm nor any alarm must be send to other ships in vicinity.

Page 19: A. security threats and patterns

ISPS certificate

• The ship has to carry an International Ship Security Certificate indicating that it complies with the requirements of Chapter XI-2 and Part A of ISPS Code. Part A of this Code includes provisions relating to the verification and certification of the ship’s compliance with the requirements on an initial, renewal and intermediate verification basis.

Page 20: A. security threats and patterns
Page 21: A. security threats and patterns

Security Threats and Patterns

Objective: at the end of the topic, the trainee will be familiar with security threats and it’s patterns

Page 22: A. security threats and patterns

The World will never be the same again

Page 23: A. security threats and patterns

Background

• In the aftermath of Sept. 11, 2001, the Commandant of the US Coast Guard reaffirmed USCG Maritime Homeland Security.

• In November 2001, the Commandant of USCG recommended to IMO the comprehensive security requirements including amendments to SOLAS and the new ISPS Code

• In December 2002, IMO adopted the SOLAS amendment and the ISPS Code

• By 1st of July 2004, both the ISPS Code and related SOLAS amendments shall entry into force

Page 24: A. security threats and patterns

Procedure and Response to possible Threats

The Ship Security Plan must include procedures and responses to possible threats. These procedures might include the following actions:

Securing all access to the ship to prevent intrusion;

Performing emergency shutdown of main engines to prevent unauthorized operation;

Page 25: A. security threats and patterns

Securing non-critical operations to focus attention on response;

Alerting ship and shore-side authorities of an incident;

Rendering assistance to a nearby ship undergoing an unlawful act that threatens its security;

Responding to the detection of stowaways or intruders;

Repelling boarders; Addressing a malfunction of on board security

equipment

Page 26: A. security threats and patterns

Screening the underwater hull or search the ship in response to bomb threats;

Specifying the kind of communications to use in the event of a breach of security, an unlawful act, or other emergency;

Coordinating with waterfront facility response procedures.

Page 27: A. security threats and patterns

Procedures and Response to Possible Threats

“Threats” to the Maritime

Industry

1990 2001Theft Illegal Drugs

Piracy Criminal Acts

Illegal Drugs Stowaways

Stowaways Piracy

Terrorism Terrorism

Page 28: A. security threats and patterns
Page 29: A. security threats and patterns

The Threat to the Maritime Industry:Assessment of Likelihood

A. Bomb threat or hoax Disgruntled Employee/Passenger Mentally Unstable Person Politically Motivated Groups

B. Sabotage (including ARSON) Employee/passenger

Page 30: A. security threats and patterns
Page 31: A. security threats and patterns

C. Bomb Attack (Port Facility) Terrorist Groups Politically Motivated Groups

D. Bomb Attack (Ship) Internal External Terrorist Groups

Page 32: A. security threats and patterns

USS Cole in ADEN 2000

Page 33: A. security threats and patterns

E.Simulated Armed Attack Mentally Unstable Person/PassengerF. Piracy (only certain areas) Criminal gangsG. Hijacking/Armed Attack Terrorist GroupsH. Smuggling Employee/Passenger

Page 34: A. security threats and patterns
Page 35: A. security threats and patterns

Piracy Maps 2001

Page 36: A. security threats and patterns

Piracy Maps 2002

Page 37: A. security threats and patterns

PIRACY maps 2003

Page 38: A. security threats and patterns

Achille Lauro (1985)

• 07/10/85•ABU ABBAS Palestine Liberation Front

Page 39: A. security threats and patterns
Page 40: A. security threats and patterns

I Cargo Tampering Crew/passengerJ. Stowaways Politically motivated groups SmugglersK.Hostage Taking Politically motivated groups Terrorist groups Criminal gangs

Page 41: A. security threats and patterns
Page 42: A. security threats and patterns

L. Vandalism Crew/ Politically motivated groupsM. Transporting weapons of mass

destruction Politically motivated

groups/Terrorist/Criminal gangsN. Use of the vessel to carry perpetrators

and their equipmentO. Use of a vessel as a weapon

Page 43: A. security threats and patterns
Page 44: A. security threats and patterns
Page 45: A. security threats and patterns
Page 46: A. security threats and patterns
Page 47: A. security threats and patterns
Page 48: A. security threats and patterns
Page 49: A. security threats and patterns
Page 50: A. security threats and patterns
Page 51: A. security threats and patterns

Designated Foreign Terrorist Organizations (August 2002)

1. Abu Nidal Organization (ANO)a.k.a. Fatah Revolutionary Council, Arab Revolutionary Brigades, Black September, and Revolutionary Organization of Socialist Muslims Has ability to operate worldwide incl. Middle East, Asia , and Europe

2. Abu Sayyaf Group (ASG)Primarily operates in the southern Philippines, occasionally in Manila and has expanded to Malaysia. Engages in bombings, assassinations, kidnappings, and extortions.

Page 52: A. security threats and patterns

3. Armed Islamic Group (GIA)

Aims to overthrow secular Algerian regime and replaces it with Islamic state. Frequent attacks against civilian and government workers.

4. Aum Supreme Truth (Aum)

a.k.a. Aum Shinrikyo, Aleph

Cult aimed to take over Japan, then the world. Located in Japan unknown numbers has surfaced in Russia.

Page 53: A. security threats and patterns

5. Basque Fatherland and Liberty (ETA)

a.k.a Euzkadi Ta Askatasuna. Aim of establishing an independent homeland based on Marxist principles.Bombings and assassinations of Spanish Government officials. Operates primarily in the Basques autonomous regions.

6. Al-Gama’a al-Islamiyya (Islamic Group, IG)

Egypt’s largest militant group and has external wing with worldwide presence. Specialized in armed attacks against Egyptian security and other government officials. Operates in Egypt and has worldwide presence incl. Sudan, UK, Afghanistan, Austria and Yemen

Page 54: A. security threats and patterns

7. HAMAS (Islamic Resistance Movement)

Palestinian branch of Muslim Brotherhood. Large-scale suicide bombings against Israeli civilian and military targets. Primarily operate in the occupied territories, Israel.

8. Harakat ul-Mujahidin (HUM)

Islamic militant group based in Pakistan and Afghanistan that operates primarily and conducts insurgent and terrorist activities in Kashmir.

Page 55: A. security threats and patterns

9. Hizballah (Party of God)

a.k.a. Islamic Jihad, Revolutionary Justice Org., Org. of the Oppressed on Earth, and Islamic Jihad for the Liberation of Palestine.

Operates in Bekaa Valley, Beirut, and Lebanon. Has established cells in Europe, Africa, North and South America, and Asia. Involved in numerous anti-US terrorist attacks including suicide bombings, kidnappings, and hostage takings.

Page 56: A. security threats and patterns

10. Islamic Movement of Uzbekistan (IMU)Goal is the establishment of an Islamic state in Uzbekistan. Based in Afghanistan and Tajikistan and operates in the same area. Bombings and Hostage takings.

11. Al-Jihad (Egyptian Islamic Jihad)Egyptian Islamic extremist group and close partner of Al-Qaida org. Primary goals are to overthrow Egyptian government and attack US and Israeli interests in Egypt and abroad. Network includes Yemen, Afghanistan, Pakistan, Sudan, Lebanon, and UK.

Page 57: A. security threats and patterns

12. Kahane Chai (Kach)

Goal is to restore the biblical state of Israel. Harass and threaten Palestinians, Arabs, and Israeli governments

13. Kurdistan Workers Party (PKK)

Goal is to establish and independent Kurdish state in southeastern Turkey. Targets are Turkish government diplomatic and commercial facilities, and tourist industry.

14. Liberation Tigers of Tamil Eelam (LTTE)

The most powerful group in Sri Lanka with a cause of establishing an independent Tamil state. Battlefield insurgency, terrorism, suicide bombings and narcotics smugglings.

Page 58: A. security threats and patterns

15. Mujahedin-e Khalq Organization (MEK or MKO)

Anti-western activity with attacks on the interests of the clerical regime in Iran and abroad.

16. National Liberation Army (ELN) – Colombia

Kidnappings, hijackings, bombings, extortion, and guerrilla war. Operates in Colombia and Venezuela border regions.

17. Palestine Islamic Jihad (PIJ)

Committed to creation of an Islamic Palestinian state and the destruction of Israel through holy war. Primarily operates in Israel and occupied territories.

Page 59: A. security threats and patterns

18. Palestine Liberation Front (PLF)

An Abu Abbas-led faction formerly based in Tunisia now based in Iraq.

19. Popular Front for the Liberation of Palestine-General Command (PFLP-GC)

Violently opposed to Arafat’s PLO. Dozens of attacks in Europe and Middle East. Bases in Lebanon.

20. Al-Qaida

Established by Usama Bin Ladin. Current goal is to establish a pan-Islamic Caliphate throughout the world by working with allied Islamic extremist groups to overthrow regimes it deems “non-Islamic” and expelling Westerners and non-Muslims from Muslim countries.

Page 60: A. security threats and patterns

21. Revolutionary Armed Forces of Colombia (FARC)

Military wing of the Colombian Communist Party. Involves in kidnappings, bombings, murder, extortion, hijackings, as well as guerilla actions against Colombia.

22. Revolutionary Organization 17 November (17 November)

Radical Greek leftist group with anti-Greek establishment, anti-US, anti-Turkey, and anti-NATO. Operates primarily in Greece.

Page 61: A. security threats and patterns

23. Revolutionary People’s Liberation Army/Front (DHKP/C)

a.k.a. Devrimci Sol (Revolutionary Left), Dev Sol. A splinter faction of the Turkish People’s Liberation Front that espouses a Marxist ideology and is anti-US and anti-NATO. Conducts attacks in Turkey

24. Shining Path (Sendero Luminoso)

One of the most ruthless terrorist groups in the Western Hemisphere of a Maoist doctrine. Conducted bombings and selective assassinations in Peru.

Page 62: A. security threats and patterns

25. Real IRA (RIRA)

a.k.a. True IRA. Dedicated to removing British forces from Northern Ireland and unifying Ireland. Activities such as bombings, assassinations, smugglings, extortion, and robberies. Operates in Ireland and UK.

26. United Self-Defense Forces of Colombia (AUC)

Supported by drug traffickers with activities of assassinating suspected insurgent supporters to engaging guerilla combat units. Operates in Colombia.

Page 63: A. security threats and patterns

27. Communist Party of the Philippines/New People’s Army (CPP/NPA)Communist armed groups that operates in Philippines involved in various terrorist activities such as extortion, liquidation, bombings, etc.

28. Al-aqsa Martyrs Brigades29. Asbat Al-Ansar30. Lashkar-e-Tayyiba31. Revolutionary Nuclei (formerly ELA)32. Salafist Group for Call and Combat (GSPC)33. PFLP-General Command34. Jaish-e-Mohammed (Army of Mohammed)

Page 64: A. security threats and patterns
Page 65: A. security threats and patterns
Page 66: A. security threats and patterns
Page 67: A. security threats and patterns
Page 68: A. security threats and patterns
Page 69: A. security threats and patterns
Page 70: A. security threats and patterns
Page 71: A. security threats and patterns
Page 72: A. security threats and patterns