a. security threats and patterns

Post on 14-Jul-2015

271 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Shore-based Ship Security Team Training

Course

Course Objective

• At the end of the course, the trainee will be able to demonstrate knowledge and understanding of the requirements for Ship Security Plans

Course Topics

• Knowledge of current security threats and patterns;

• The meaning and consequential requirements of the different security levels;

• Knowledge of the emergency procedures and contingency plans;

• Recognition and detection of weapons, dangerous substances and devices;

• Recognition on a non discriminatory basis, of characteristics and behavioural patterns of persons who are likely to threaten security;

• Techniques used to circumvent security measures;

• Security related communications;

• Operations of security equipment and systems;

• Testing, calibrations and whilst at sea maintenance of security equipment and systems;

• Inspection, control, and monitoring techniques; and

• Methods of physical searches of persons, personal effects, baggage, cargo and ship’s stores (including practical exercises)

US Coast Guard and IMO requirements

Objective: at the end of the topic, the trainee will be familiar with USCG and IMO requirements for Ship Security

SOLAS, 1974 as amended

Amendments:• Chapter XI-2

Special measures to enhance maritime security

• Annex 1Adoption of the International Code for the Security of Ships and Port Facilities

• Annex 1 Part A

Mandatory requirements regarding the Provisions of Chapter XI-2 of the International Convention for the Safety of Life at Sea, 1974, as amended

• Annex 1 Part B

Guidance regarding the Provisions of Chapter XI-2 of the Annex to the International Convention for the Safety of Life at Sea, 1974 as amended and Part A of the Code

USCG NVIC 10-02

Navigation and Vessel Inspection Circular (NVIC) No. 10-02

Security Guidelines for Vessels

The NVIC establishes new guidelines for developing security plans, and implementing security measures and procedures.

Chapter XI-2 Regulation 2

• Applies to:a. the following types of ships engaged on

international voyage:1. Passenger ships, including high-speed

passenger craft;2. Cargo ships, including high-speed craft, of

500 gross tonnage and upward;3. Mobile offshore drilling units; and

b. port facilities serving such ships engaged on international voyages

SOLAS, 1974 as amended

• Chapter V Safety of Navigation

Regulation 19 - Carriage requirements for shipborne navigational systems and equipment

“Ships fitted with AIS (Automatic Identification System) shall maintain AIS in operation at all times except where international agreements, rules or standards provide for the protection of navigational information”

SOLAS, 1974 as amended

• Chapter XI-1

• Regulation 3 – Ship Identification number

The ship identification number shall be permanently marked with the prefix “IMO”

followed by the 7-digit number.

SOLAS, 1974 as amended

• Regulation 5 – Continuous Synopsis Record

“the Continuous Synopsis Record is intended to provide an on-board record of the history of the ship”

Ship Security Alert System

• Regulation 6 states that:

“ All ships shall be provided with a ship security alert system be capable of being activated from the navigation bridge and in at least one other location”

cont.Once activated, the system should transmit a ship-to-shore security alert to a competent authority designated by the flag administration. The alarm should identify the ship and its location and indicate that the security of the ship is under threat or has been compromised. On board the ship, this must not raise any alarm nor any alarm must be send to other ships in vicinity.

ISPS certificate

• The ship has to carry an International Ship Security Certificate indicating that it complies with the requirements of Chapter XI-2 and Part A of ISPS Code. Part A of this Code includes provisions relating to the verification and certification of the ship’s compliance with the requirements on an initial, renewal and intermediate verification basis.

Security Threats and Patterns

Objective: at the end of the topic, the trainee will be familiar with security threats and it’s patterns

The World will never be the same again

Background

• In the aftermath of Sept. 11, 2001, the Commandant of the US Coast Guard reaffirmed USCG Maritime Homeland Security.

• In November 2001, the Commandant of USCG recommended to IMO the comprehensive security requirements including amendments to SOLAS and the new ISPS Code

• In December 2002, IMO adopted the SOLAS amendment and the ISPS Code

• By 1st of July 2004, both the ISPS Code and related SOLAS amendments shall entry into force

Procedure and Response to possible Threats

The Ship Security Plan must include procedures and responses to possible threats. These procedures might include the following actions:

Securing all access to the ship to prevent intrusion;

Performing emergency shutdown of main engines to prevent unauthorized operation;

Securing non-critical operations to focus attention on response;

Alerting ship and shore-side authorities of an incident;

Rendering assistance to a nearby ship undergoing an unlawful act that threatens its security;

Responding to the detection of stowaways or intruders;

Repelling boarders; Addressing a malfunction of on board security

equipment

Screening the underwater hull or search the ship in response to bomb threats;

Specifying the kind of communications to use in the event of a breach of security, an unlawful act, or other emergency;

Coordinating with waterfront facility response procedures.

Procedures and Response to Possible Threats

“Threats” to the Maritime

Industry

1990 2001Theft Illegal Drugs

Piracy Criminal Acts

Illegal Drugs Stowaways

Stowaways Piracy

Terrorism Terrorism

The Threat to the Maritime Industry:Assessment of Likelihood

A. Bomb threat or hoax Disgruntled Employee/Passenger Mentally Unstable Person Politically Motivated Groups

B. Sabotage (including ARSON) Employee/passenger

C. Bomb Attack (Port Facility) Terrorist Groups Politically Motivated Groups

D. Bomb Attack (Ship) Internal External Terrorist Groups

USS Cole in ADEN 2000

E.Simulated Armed Attack Mentally Unstable Person/PassengerF. Piracy (only certain areas) Criminal gangsG. Hijacking/Armed Attack Terrorist GroupsH. Smuggling Employee/Passenger

Piracy Maps 2001

Piracy Maps 2002

PIRACY maps 2003

Achille Lauro (1985)

• 07/10/85•ABU ABBAS Palestine Liberation Front

I Cargo Tampering Crew/passengerJ. Stowaways Politically motivated groups SmugglersK.Hostage Taking Politically motivated groups Terrorist groups Criminal gangs

L. Vandalism Crew/ Politically motivated groupsM. Transporting weapons of mass

destruction Politically motivated

groups/Terrorist/Criminal gangsN. Use of the vessel to carry perpetrators

and their equipmentO. Use of a vessel as a weapon

Designated Foreign Terrorist Organizations (August 2002)

1. Abu Nidal Organization (ANO)a.k.a. Fatah Revolutionary Council, Arab Revolutionary Brigades, Black September, and Revolutionary Organization of Socialist Muslims Has ability to operate worldwide incl. Middle East, Asia , and Europe

2. Abu Sayyaf Group (ASG)Primarily operates in the southern Philippines, occasionally in Manila and has expanded to Malaysia. Engages in bombings, assassinations, kidnappings, and extortions.

3. Armed Islamic Group (GIA)

Aims to overthrow secular Algerian regime and replaces it with Islamic state. Frequent attacks against civilian and government workers.

4. Aum Supreme Truth (Aum)

a.k.a. Aum Shinrikyo, Aleph

Cult aimed to take over Japan, then the world. Located in Japan unknown numbers has surfaced in Russia.

5. Basque Fatherland and Liberty (ETA)

a.k.a Euzkadi Ta Askatasuna. Aim of establishing an independent homeland based on Marxist principles.Bombings and assassinations of Spanish Government officials. Operates primarily in the Basques autonomous regions.

6. Al-Gama’a al-Islamiyya (Islamic Group, IG)

Egypt’s largest militant group and has external wing with worldwide presence. Specialized in armed attacks against Egyptian security and other government officials. Operates in Egypt and has worldwide presence incl. Sudan, UK, Afghanistan, Austria and Yemen

7. HAMAS (Islamic Resistance Movement)

Palestinian branch of Muslim Brotherhood. Large-scale suicide bombings against Israeli civilian and military targets. Primarily operate in the occupied territories, Israel.

8. Harakat ul-Mujahidin (HUM)

Islamic militant group based in Pakistan and Afghanistan that operates primarily and conducts insurgent and terrorist activities in Kashmir.

9. Hizballah (Party of God)

a.k.a. Islamic Jihad, Revolutionary Justice Org., Org. of the Oppressed on Earth, and Islamic Jihad for the Liberation of Palestine.

Operates in Bekaa Valley, Beirut, and Lebanon. Has established cells in Europe, Africa, North and South America, and Asia. Involved in numerous anti-US terrorist attacks including suicide bombings, kidnappings, and hostage takings.

10. Islamic Movement of Uzbekistan (IMU)Goal is the establishment of an Islamic state in Uzbekistan. Based in Afghanistan and Tajikistan and operates in the same area. Bombings and Hostage takings.

11. Al-Jihad (Egyptian Islamic Jihad)Egyptian Islamic extremist group and close partner of Al-Qaida org. Primary goals are to overthrow Egyptian government and attack US and Israeli interests in Egypt and abroad. Network includes Yemen, Afghanistan, Pakistan, Sudan, Lebanon, and UK.

12. Kahane Chai (Kach)

Goal is to restore the biblical state of Israel. Harass and threaten Palestinians, Arabs, and Israeli governments

13. Kurdistan Workers Party (PKK)

Goal is to establish and independent Kurdish state in southeastern Turkey. Targets are Turkish government diplomatic and commercial facilities, and tourist industry.

14. Liberation Tigers of Tamil Eelam (LTTE)

The most powerful group in Sri Lanka with a cause of establishing an independent Tamil state. Battlefield insurgency, terrorism, suicide bombings and narcotics smugglings.

15. Mujahedin-e Khalq Organization (MEK or MKO)

Anti-western activity with attacks on the interests of the clerical regime in Iran and abroad.

16. National Liberation Army (ELN) – Colombia

Kidnappings, hijackings, bombings, extortion, and guerrilla war. Operates in Colombia and Venezuela border regions.

17. Palestine Islamic Jihad (PIJ)

Committed to creation of an Islamic Palestinian state and the destruction of Israel through holy war. Primarily operates in Israel and occupied territories.

18. Palestine Liberation Front (PLF)

An Abu Abbas-led faction formerly based in Tunisia now based in Iraq.

19. Popular Front for the Liberation of Palestine-General Command (PFLP-GC)

Violently opposed to Arafat’s PLO. Dozens of attacks in Europe and Middle East. Bases in Lebanon.

20. Al-Qaida

Established by Usama Bin Ladin. Current goal is to establish a pan-Islamic Caliphate throughout the world by working with allied Islamic extremist groups to overthrow regimes it deems “non-Islamic” and expelling Westerners and non-Muslims from Muslim countries.

21. Revolutionary Armed Forces of Colombia (FARC)

Military wing of the Colombian Communist Party. Involves in kidnappings, bombings, murder, extortion, hijackings, as well as guerilla actions against Colombia.

22. Revolutionary Organization 17 November (17 November)

Radical Greek leftist group with anti-Greek establishment, anti-US, anti-Turkey, and anti-NATO. Operates primarily in Greece.

23. Revolutionary People’s Liberation Army/Front (DHKP/C)

a.k.a. Devrimci Sol (Revolutionary Left), Dev Sol. A splinter faction of the Turkish People’s Liberation Front that espouses a Marxist ideology and is anti-US and anti-NATO. Conducts attacks in Turkey

24. Shining Path (Sendero Luminoso)

One of the most ruthless terrorist groups in the Western Hemisphere of a Maoist doctrine. Conducted bombings and selective assassinations in Peru.

25. Real IRA (RIRA)

a.k.a. True IRA. Dedicated to removing British forces from Northern Ireland and unifying Ireland. Activities such as bombings, assassinations, smugglings, extortion, and robberies. Operates in Ireland and UK.

26. United Self-Defense Forces of Colombia (AUC)

Supported by drug traffickers with activities of assassinating suspected insurgent supporters to engaging guerilla combat units. Operates in Colombia.

27. Communist Party of the Philippines/New People’s Army (CPP/NPA)Communist armed groups that operates in Philippines involved in various terrorist activities such as extortion, liquidation, bombings, etc.

28. Al-aqsa Martyrs Brigades29. Asbat Al-Ansar30. Lashkar-e-Tayyiba31. Revolutionary Nuclei (formerly ELA)32. Salafist Group for Call and Combat (GSPC)33. PFLP-General Command34. Jaish-e-Mohammed (Army of Mohammed)

top related