SlideShare une entreprise Scribd logo
1  sur  72
Shore-based Ship
Security Team Training
Course
Course Objective
• At the end of the course, the trainee will
be able to demonstrate knowledge and
understanding of the requirements for
Ship Security Plans
Course Topics
• Knowledge of current security threats and
patterns;
• The meaning and consequential
requirements of the different security levels;
• Knowledge of the emergency procedures and
contingency plans;
• Recognition and detection of weapons,
dangerous substances and devices;
• Recognition on a non discriminatory basis, of
characteristics and behavioural patterns of
persons who are likely to threaten security;
• Techniques used to circumvent security
measures;
• Security related communications;
• Operations of security equipment and
systems;
• Testing, calibrations and whilst at sea
maintenance of security equipment and
systems;
• Inspection, control, and monitoring
techniques; and
• Methods of physical searches of persons,
personal effects, baggage, cargo and ship’s
stores (including practical exercises)
US Coast Guard and IMO
requirements
Objective: at the end of the topic, the
trainee will be familiar with USCG and
IMO requirements for Ship Security
SOLAS, 1974
as amended
Amendments:
• Chapter XI-2
Special measures to enhance maritime
security
• Annex 1
Adoption of the International Code for
the Security of Ships and Port Facilities
• Annex 1 Part A
Mandatory requirements regarding the
Provisions of Chapter XI-2 of the International
Convention for the Safety of Life at Sea,
1974, as amended
• Annex 1 Part B
Guidance regarding the Provisions of Chapter
XI-2 of the Annex to the International
Convention for the Safety of Life at Sea, 1974
as amended and Part A of the Code
USCG NVIC 10-02
Navigation and Vessel Inspection Circular
(NVIC) No. 10-02
Security Guidelines for Vessels
The NVIC establishes new guidelines for
developing security plans, and
implementing security measures and
procedures.
Chapter XI-2 Regulation 2
• Applies to:
a. the following types of ships engaged on
international voyage:
1. Passenger ships, including high-speed
passenger craft;
2. Cargo ships, including high-speed craft, of
500 gross tonnage and upward;
3. Mobile offshore drilling units; and
b. port facilities serving such ships engaged on
international voyages
SOLAS, 1974 as amended
• Chapter V Safety of Navigation
Regulation 19 - Carriage requirements for
shipborne navigational systems and
equipment
“Ships fitted with AIS (Automatic Identification
System) shall maintain AIS in operation at all
times except where international agreements,
rules or standards provide for the protection
of navigational information”
SOLAS, 1974 as amended
• Chapter XI-1
• Regulation 3 – Ship Identification number
The ship identification number shall be
permanently marked with the prefix “IMO”
followed by the 7-digit number.
SOLAS, 1974 as amended
• Regulation 5 – Continuous Synopsis
Record
“the Continuous Synopsis Record is
intended to provide an on-board record
of the history of the ship”
Ship Security Alert System
• Regulation 6 states that:
“ All ships shall be provided with a ship
security alert system be capable of
being activated from the navigation
bridge and in at least one other location”
cont.
Once activated, the system should
transmit a ship-to-shore security alert to
a competent authority designated by the
flag administration. The alarm should
identify the ship and its location and
indicate that the security of the ship is
under threat or has been compromised.
On board the ship, this must not raise
any alarm nor any alarm must be send
to other ships in vicinity.
ISPS certificate
• The ship has to carry an International Ship
Security Certificate indicating that it complies
with the requirements of Chapter XI-2 and
Part A of ISPS Code. Part A of this Code
includes provisions relating to the verification
and certification of the ship’s compliance with
the requirements on an initial, renewal and
intermediate verification basis.
Security Threats and
Patterns
Objective: at the end of the topic, the
trainee will be familiar with security
threats and it’s patterns
The World will never be the
same again
Background
• In the aftermath of Sept. 11, 2001, the Commandant
of the US Coast Guard reaffirmed USCG Maritime
Homeland Security.
• In November 2001, the Commandant of USCG
recommended to IMO the comprehensive security
requirements including amendments to SOLAS and
the new ISPS Code
• In December 2002, IMO adopted the SOLAS
amendment and the ISPS Code
• By 1st of July 2004, both the ISPS Code and related
SOLAS amendments shall entry into force
Procedure and Response to possible
Threats
The Ship Security Plan must include
procedures and responses to possible
threats. These procedures might include the
following actions:
 Securing all access to the ship to prevent
intrusion;
 Performing emergency shutdown of main
engines to prevent unauthorized operation;
 Securing non-critical operations to focus
attention on response;
 Alerting ship and shore-side authorities of an
incident;
 Rendering assistance to a nearby ship
undergoing an unlawful act that threatens its
security;
 Responding to the detection of stowaways or
intruders;
 Repelling boarders;
 Addressing a malfunction of on board security
equipment
 Screening the underwater hull or search the
ship in response to bomb threats;
 Specifying the kind of communications to use
in the event of a breach of security, an
unlawful act, or other emergency;
 Coordinating with waterfront facility response
procedures.
Procedures and Response to
Possible Threats
“Threats” to the Maritime
Industry
1990 2001
Theft Illegal Drugs
Piracy Criminal Acts
Illegal Drugs Stowaways
Stowaways Piracy
Terrorism Terrorism
The Threat to the Maritime Industry:
Assessment of Likelihood
A. Bomb threat or hoax
 Disgruntled Employee/Passenger
 Mentally Unstable Person
 Politically Motivated Groups
B. Sabotage (including ARSON)
 Employee/passenger
C. Bomb Attack (Port Facility)
 Terrorist Groups
 Politically Motivated Groups
D. Bomb Attack (Ship)
 Internal
 External
 Terrorist Groups
USS Cole in ADEN 2000
E.Simulated Armed Attack
 Mentally Unstable Person/Passenger
F. Piracy (only certain areas)
 Criminal gangs
G. Hijacking/Armed Attack
 Terrorist Groups
H. Smuggling
 Employee/Passenger
Piracy Maps 2001
Piracy Maps 2002
PIRACY maps 2003
Achille Lauro (1985)
• 07/10/85
•ABU ABBAS
Palestine
Liberation
Front
I Cargo Tampering
 Crew/passenger
J. Stowaways
 Politically motivated groups
 Smugglers
K.Hostage Taking
 Politically motivated groups
 Terrorist groups
 Criminal gangs
L. Vandalism
 Crew/ Politically motivated groups
M. Transporting weapons of mass
destruction
 Politically motivated
groups/Terrorist/Criminal gangs
N. Use of the vessel to carry perpetrators
and their equipment
O. Use of a vessel as a weapon
Designated Foreign Terrorist
Organizations (August 2002)
1. Abu Nidal Organization (ANO)
a.k.a. Fatah Revolutionary Council, Arab
Revolutionary Brigades, Black September, and
Revolutionary Organization of Socialist Muslims
Has ability to operate worldwide incl. Middle East,
Asia , and Europe
2. Abu Sayyaf Group (ASG)
Primarily operates in the southern Philippines,
occasionally in Manila and has expanded to
Malaysia. Engages in bombings, assassinations,
kidnappings, and extortions.
3. Armed Islamic Group (GIA)
Aims to overthrow secular Algerian regime and
replaces it with Islamic state. Frequent attacks
against civilian and government workers.
4. Aum Supreme Truth (Aum)
a.k.a. Aum Shinrikyo, Aleph
Cult aimed to take over Japan, then the world.
Located in Japan unknown numbers has surfaced
in Russia.
5. Basque Fatherland and Liberty (ETA)
a.k.a Euzkadi Ta Askatasuna. Aim of establishing
an independent homeland based on Marxist
principles.Bombings and assassinations of
Spanish Government officials. Operates primarily
in the Basques autonomous regions.
6. Al-Gama’a al-Islamiyya (Islamic Group, IG)
Egypt’s largest militant group and has external
wing with worldwide presence. Specialized in
armed attacks against Egyptian security and
other government officials. Operates in Egypt and
has worldwide presence incl. Sudan, UK,
Afghanistan, Austria and Yemen
7. HAMAS (Islamic Resistance Movement)
Palestinian branch of Muslim Brotherhood.
Large-scale suicide bombings against Israeli
civilian and military targets. Primarily operate in
the occupied territories, Israel.
8. Harakat ul-Mujahidin (HUM)
Islamic militant group based in Pakistan and
Afghanistan that operates primarily and
conducts insurgent and terrorist activities in
Kashmir.
9. Hizballah (Party of God)
a.k.a. Islamic Jihad, Revolutionary Justice Org.,
Org. of the Oppressed on Earth, and Islamic
Jihad for the Liberation of Palestine.
Operates in Bekaa Valley, Beirut, and
Lebanon. Has established cells in Europe,
Africa, North and South America, and Asia.
Involved in numerous anti-US terrorist attacks
including suicide bombings, kidnappings, and
hostage takings.
10. Islamic Movement of Uzbekistan (IMU)
Goal is the establishment of an Islamic state in
Uzbekistan. Based in Afghanistan and
Tajikistan and operates in the same area.
Bombings and Hostage takings.
11. Al-Jihad (Egyptian Islamic Jihad)
Egyptian Islamic extremist group and close
partner of Al-Qaida org. Primary goals are to
overthrow Egyptian government and attack US
and Israeli interests in Egypt and abroad.
Network includes Yemen, Afghanistan,
Pakistan, Sudan, Lebanon, and UK.
12. Kahane Chai (Kach)
Goal is to restore the biblical state of Israel. Harass and
threaten Palestinians, Arabs, and Israeli governments
13. Kurdistan Workers Party (PKK)
Goal is to establish and independent Kurdish state in
southeastern Turkey. Targets are Turkish government
diplomatic and commercial facilities, and tourist industry.
14. Liberation Tigers of Tamil Eelam (LTTE)
The most powerful group in Sri Lanka with a cause of
establishing an independent Tamil state. Battlefield
insurgency, terrorism, suicide bombings and narcotics
smugglings.
15. Mujahedin-e Khalq Organization (MEK or
MKO)
Anti-western activity with attacks on the
interests of the clerical regime in Iran and
abroad.
16. National Liberation Army (ELN) – Colombia
Kidnappings, hijackings, bombings, extortion,
and guerrilla war. Operates in Colombia and
Venezuela border regions.
17. Palestine Islamic Jihad (PIJ)
Committed to creation of an Islamic Palestinian
state and the destruction of Israel through holy
war. Primarily operates in Israel and occupied
territories.
18. Palestine Liberation Front (PLF)
An Abu Abbas-led faction formerly based in Tunisia now
based in Iraq.
19. Popular Front for the Liberation of Palestine-General
Command (PFLP-GC)
Violently opposed to Arafat’s PLO. Dozens of attacks in
Europe and Middle East. Bases in Lebanon.
20. Al-Qaida
Established by Usama Bin Ladin. Current goal is to
establish a pan-Islamic Caliphate throughout the world
by working with allied Islamic extremist groups to
overthrow regimes it deems “non-Islamic” and expelling
Westerners and non-Muslims from Muslim countries.
21. Revolutionary Armed Forces of Colombia
(FARC)
Military wing of the Colombian Communist
Party. Involves in kidnappings, bombings,
murder, extortion, hijackings, as well as guerilla
actions against Colombia.
22. Revolutionary Organization 17 November
(17 November)
Radical Greek leftist group with anti-Greek
establishment, anti-US, anti-Turkey, and anti-
NATO. Operates primarily in Greece.
23. Revolutionary People’s Liberation
Army/Front (DHKP/C)
a.k.a. Devrimci Sol (Revolutionary Left), Dev
Sol. A splinter faction of the Turkish People’s
Liberation Front that espouses a Marxist
ideology and is anti-US and anti-NATO.
Conducts attacks in Turkey
24. Shining Path (Sendero Luminoso)
One of the most ruthless terrorist groups in the
Western Hemisphere of a Maoist doctrine.
Conducted bombings and selective
assassinations in Peru.
25. Real IRA (RIRA)
a.k.a. True IRA. Dedicated to removing British
forces from Northern Ireland and unifying
Ireland. Activities such as bombings,
assassinations, smugglings, extortion, and
robberies. Operates in Ireland and UK.
26. United Self-Defense Forces of Colombia
(AUC)
Supported by drug traffickers with activities of
assassinating suspected insurgent supporters
to engaging guerilla combat units. Operates in
Colombia.
27. Communist Party of the Philippines/New
People’s Army (CPP/NPA)
Communist armed groups that operates in
Philippines involved in various terrorist
activities such as extortion, liquidation,
bombings, etc.
28. Al-aqsa Martyrs Brigades
29. Asbat Al-Ansar
30. Lashkar-e-Tayyiba
31. Revolutionary Nuclei (formerly ELA)
32. Salafist Group for Call and Combat (GSPC)
33. PFLP-General Command
34. Jaish-e-Mohammed (Army of Mohammed)
Ship Security Course Covers Requirements & Threats
Ship Security Course Covers Requirements & Threats
Ship Security Course Covers Requirements & Threats
Ship Security Course Covers Requirements & Threats
Ship Security Course Covers Requirements & Threats
Ship Security Course Covers Requirements & Threats
Ship Security Course Covers Requirements & Threats
Ship Security Course Covers Requirements & Threats
Ship Security Course Covers Requirements & Threats

Contenu connexe

Tendances (20)

Isps code
Isps codeIsps code
Isps code
 
Ship Organization
Ship OrganizationShip Organization
Ship Organization
 
SOLAS Presentation
SOLAS PresentationSOLAS Presentation
SOLAS Presentation
 
Solas Presentation
Solas PresentationSolas Presentation
Solas Presentation
 
A Short Note on MARPOL Regulations
A Short Note on MARPOL RegulationsA Short Note on MARPOL Regulations
A Short Note on MARPOL Regulations
 
Marpol
MarpolMarpol
Marpol
 
Solas assigment
Solas  assigmentSolas  assigment
Solas assigment
 
Marpol annexes
Marpol annexesMarpol annexes
Marpol annexes
 
ISM Code
ISM CodeISM Code
ISM Code
 
Officers and Crew in the Deck Department
Officers and Crew in the Deck DepartmentOfficers and Crew in the Deck Department
Officers and Crew in the Deck Department
 
Taking over a navigational watch lrg
Taking over a  navigational watch lrg Taking over a  navigational watch lrg
Taking over a navigational watch lrg
 
ISM Code
ISM CodeISM Code
ISM Code
 
Bridge resources management lrg
Bridge resources management lrgBridge resources management lrg
Bridge resources management lrg
 
Bridge watchkeeping 2 lrg
Bridge watchkeeping 2 lrg Bridge watchkeeping 2 lrg
Bridge watchkeeping 2 lrg
 
MARPOL ANNEXURES AND IMPACT
MARPOL ANNEXURES AND IMPACT MARPOL ANNEXURES AND IMPACT
MARPOL ANNEXURES AND IMPACT
 
ISM Curso ISPS. 5- Ship security plan.
ISM Curso ISPS. 5- Ship security plan.ISM Curso ISPS. 5- Ship security plan.
ISM Curso ISPS. 5- Ship security plan.
 
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptPOWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.ppt
 
Personal Survival Techniques(PST)
Personal Survival Techniques(PST)Personal Survival Techniques(PST)
Personal Survival Techniques(PST)
 
List of certificates and documents to be carried on ship as solas marpol and ...
List of certificates and documents to be carried on ship as solas marpol and ...List of certificates and documents to be carried on ship as solas marpol and ...
List of certificates and documents to be carried on ship as solas marpol and ...
 
maritime safety and emergency
maritime safety and emergencymaritime safety and emergency
maritime safety and emergency
 

En vedette

En vedette (20)

Omamarine
OmamarineOmamarine
Omamarine
 
A pocket-guide-to-safe-confined-space
A pocket-guide-to-safe-confined-spaceA pocket-guide-to-safe-confined-space
A pocket-guide-to-safe-confined-space
 
Uscg general deck questions master's license (question)`
Uscg general deck questions  master's license (question)`Uscg general deck questions  master's license (question)`
Uscg general deck questions master's license (question)`
 
Internal audit ctpf
Internal audit ctpfInternal audit ctpf
Internal audit ctpf
 
Ballast Water Management Convention
Ballast Water Management ConventionBallast Water Management Convention
Ballast Water Management Convention
 
Engine quiz
Engine quizEngine quiz
Engine quiz
 
Especialidades y niveles_por_actividad_desempenada_a_bordo
Especialidades y niveles_por_actividad_desempenada_a_bordoEspecialidades y niveles_por_actividad_desempenada_a_bordo
Especialidades y niveles_por_actividad_desempenada_a_bordo
 
Port operations & management slideshow
Port operations & management slideshowPort operations & management slideshow
Port operations & management slideshow
 
ISPS Code
ISPS CodeISPS Code
ISPS Code
 
ISPS CODE
ISPS CODEISPS CODE
ISPS CODE
 
Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014
 
Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)
 
pfso cert english.PDF
pfso cert  english.PDFpfso cert  english.PDF
pfso cert english.PDF
 
FIRE SAFETY SYSTEM
FIRE SAFETY SYSTEMFIRE SAFETY SYSTEM
FIRE SAFETY SYSTEM
 
Somalia Pirates
Somalia PiratesSomalia Pirates
Somalia Pirates
 
Ship planning part i
Ship planning part iShip planning part i
Ship planning part i
 
Risk assessment presentasi
Risk assessment presentasiRisk assessment presentasi
Risk assessment presentasi
 
Maritime security operative isps
Maritime security operative ispsMaritime security operative isps
Maritime security operative isps
 
Ism code reminder lesson
Ism code reminder lessonIsm code reminder lesson
Ism code reminder lesson
 
Somali pirates
Somali piratesSomali pirates
Somali pirates
 

Similaire à Ship Security Course Covers Requirements & Threats

POWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdfPOWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdfInibudiLed
 
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptPOWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptInibudiLed
 
Management of shipping (1)
Management of shipping (1)Management of shipping (1)
Management of shipping (1)Fredrick Olali
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Danladi Caleb
 
Security Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security dutiesSecurity Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security dutiesAnirbanMarine
 
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...AnirbanMarine
 
ISPS_Code_Basic_Course.pdf
ISPS_Code_Basic_Course.pdfISPS_Code_Basic_Course.pdf
ISPS_Code_Basic_Course.pdfInibudiLed
 
Decoding SOLAS (Safety of Life at Sea) by SHM Shipcare
Decoding SOLAS (Safety of Life at Sea) by SHM ShipcareDecoding SOLAS (Safety of Life at Sea) by SHM Shipcare
Decoding SOLAS (Safety of Life at Sea) by SHM ShipcareSHM Shipcare
 
Search and rescue
Search and rescueSearch and rescue
Search and rescueShafiq Ridz
 
Effective Management on Safety, Security and Environmental Protection at Sea
Effective Management on Safety, Security and Environmental Protection at SeaEffective Management on Safety, Security and Environmental Protection at Sea
Effective Management on Safety, Security and Environmental Protection at Seasuperman19921992
 
Llb ii pil u 4.3 treaties
Llb ii pil u 4.3 treatiesLlb ii pil u 4.3 treaties
Llb ii pil u 4.3 treatiesRai University
 
one week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSEone week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSEVincent McNally
 
Domestic Ferry Safety in the Developing World
Domestic Ferry Safety in the Developing WorldDomestic Ferry Safety in the Developing World
Domestic Ferry Safety in the Developing WorldVR Marine Technologies
 

Similaire à Ship Security Course Covers Requirements & Threats (20)

POWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdfPOWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdf
 
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptPOWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.ppt
 
ISPS CODE.pptx
ISPS CODE.pptxISPS CODE.pptx
ISPS CODE.pptx
 
Logistic solas
Logistic solasLogistic solas
Logistic solas
 
Management of shipping (1)
Management of shipping (1)Management of shipping (1)
Management of shipping (1)
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
 
Security Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security dutiesSecurity Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security duties
 
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
 
ISPS_Code_Basic_Course.pdf
ISPS_Code_Basic_Course.pdfISPS_Code_Basic_Course.pdf
ISPS_Code_Basic_Course.pdf
 
Environmental presentation
Environmental presentationEnvironmental presentation
Environmental presentation
 
Decoding SOLAS (Safety of Life at Sea) by SHM Shipcare
Decoding SOLAS (Safety of Life at Sea) by SHM ShipcareDecoding SOLAS (Safety of Life at Sea) by SHM Shipcare
Decoding SOLAS (Safety of Life at Sea) by SHM Shipcare
 
4269267.ppt
4269267.ppt4269267.ppt
4269267.ppt
 
Safety at Sea April 2012
Safety at Sea April 2012Safety at Sea April 2012
Safety at Sea April 2012
 
Search and rescue
Search and rescueSearch and rescue
Search and rescue
 
Effective Management on Safety, Security and Environmental Protection at Sea
Effective Management on Safety, Security and Environmental Protection at SeaEffective Management on Safety, Security and Environmental Protection at Sea
Effective Management on Safety, Security and Environmental Protection at Sea
 
Llb ii pil u 4.3 treaties
Llb ii pil u 4.3 treatiesLlb ii pil u 4.3 treaties
Llb ii pil u 4.3 treaties
 
one week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSEone week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSE
 
A short note on SOLAS 74
A short note on SOLAS 74A short note on SOLAS 74
A short note on SOLAS 74
 
Domestic Ferry Safety in the Developing World
Domestic Ferry Safety in the Developing WorldDomestic Ferry Safety in the Developing World
Domestic Ferry Safety in the Developing World
 
14 ircha
14 ircha14 ircha
14 ircha
 

Plus de Noel Tan

Dcfis school development plan
Dcfis school development planDcfis school development plan
Dcfis school development planNoel Tan
 
Module12.ppst5.4.2
Module12.ppst5.4.2Module12.ppst5.4.2
Module12.ppst5.4.2Noel Tan
 
Module11.ppst5.2.2
Module11.ppst5.2.2Module11.ppst5.2.2
Module11.ppst5.2.2Noel Tan
 
Module10.ppst5.1.2
Module10.ppst5.1.2Module10.ppst5.1.2
Module10.ppst5.1.2Noel Tan
 
Module9.ppst4.5.2
Module9.ppst4.5.2Module9.ppst4.5.2
Module9.ppst4.5.2Noel Tan
 
Module8.ppst4.4.2
Module8.ppst4.4.2Module8.ppst4.4.2
Module8.ppst4.4.2Noel Tan
 
Module7.ppst4.1.2
Module7.ppst4.1.2Module7.ppst4.1.2
Module7.ppst4.1.2Noel Tan
 
Module6.ppst3.1.2
Module6.ppst3.1.2Module6.ppst3.1.2
Module6.ppst3.1.2Noel Tan
 
Module5.ppst2.6.2
Module5.ppst2.6.2Module5.ppst2.6.2
Module5.ppst2.6.2Noel Tan
 
Module4.ppst2.3.2
Module4.ppst2.3.2Module4.ppst2.3.2
Module4.ppst2.3.2Noel Tan
 
Module3.ppst1.5.2
Module3.ppst1.5.2Module3.ppst1.5.2
Module3.ppst1.5.2Noel Tan
 
Module2.ppst1.4.2
Module2.ppst1.4.2Module2.ppst1.4.2
Module2.ppst1.4.2Noel Tan
 
Module1.ppst1.1.2
Module1.ppst1.1.2Module1.ppst1.1.2
Module1.ppst1.1.2Noel Tan
 
Ppst rpms manual
Ppst rpms manualPpst rpms manual
Ppst rpms manualNoel Tan
 
3. hazmat labeling presentation
3. hazmat labeling presentation3. hazmat labeling presentation
3. hazmat labeling presentationNoel Tan
 
4. hazmat placarding presentation
4. hazmat placarding presentation4. hazmat placarding presentation
4. hazmat placarding presentationNoel Tan
 
5. hazmat packaging presentation
5. hazmat packaging presentation5. hazmat packaging presentation
5. hazmat packaging presentationNoel Tan
 
6d. module6d carrier requirement_water
6d. module6d carrier requirement_water6d. module6d carrier requirement_water
6d. module6d carrier requirement_waterNoel Tan
 
Anti ship piracy training
Anti ship piracy trainingAnti ship piracy training
Anti ship piracy trainingNoel Tan
 
B. security levels
B. security levelsB. security levels
B. security levelsNoel Tan
 

Plus de Noel Tan (20)

Dcfis school development plan
Dcfis school development planDcfis school development plan
Dcfis school development plan
 
Module12.ppst5.4.2
Module12.ppst5.4.2Module12.ppst5.4.2
Module12.ppst5.4.2
 
Module11.ppst5.2.2
Module11.ppst5.2.2Module11.ppst5.2.2
Module11.ppst5.2.2
 
Module10.ppst5.1.2
Module10.ppst5.1.2Module10.ppst5.1.2
Module10.ppst5.1.2
 
Module9.ppst4.5.2
Module9.ppst4.5.2Module9.ppst4.5.2
Module9.ppst4.5.2
 
Module8.ppst4.4.2
Module8.ppst4.4.2Module8.ppst4.4.2
Module8.ppst4.4.2
 
Module7.ppst4.1.2
Module7.ppst4.1.2Module7.ppst4.1.2
Module7.ppst4.1.2
 
Module6.ppst3.1.2
Module6.ppst3.1.2Module6.ppst3.1.2
Module6.ppst3.1.2
 
Module5.ppst2.6.2
Module5.ppst2.6.2Module5.ppst2.6.2
Module5.ppst2.6.2
 
Module4.ppst2.3.2
Module4.ppst2.3.2Module4.ppst2.3.2
Module4.ppst2.3.2
 
Module3.ppst1.5.2
Module3.ppst1.5.2Module3.ppst1.5.2
Module3.ppst1.5.2
 
Module2.ppst1.4.2
Module2.ppst1.4.2Module2.ppst1.4.2
Module2.ppst1.4.2
 
Module1.ppst1.1.2
Module1.ppst1.1.2Module1.ppst1.1.2
Module1.ppst1.1.2
 
Ppst rpms manual
Ppst rpms manualPpst rpms manual
Ppst rpms manual
 
3. hazmat labeling presentation
3. hazmat labeling presentation3. hazmat labeling presentation
3. hazmat labeling presentation
 
4. hazmat placarding presentation
4. hazmat placarding presentation4. hazmat placarding presentation
4. hazmat placarding presentation
 
5. hazmat packaging presentation
5. hazmat packaging presentation5. hazmat packaging presentation
5. hazmat packaging presentation
 
6d. module6d carrier requirement_water
6d. module6d carrier requirement_water6d. module6d carrier requirement_water
6d. module6d carrier requirement_water
 
Anti ship piracy training
Anti ship piracy trainingAnti ship piracy training
Anti ship piracy training
 
B. security levels
B. security levelsB. security levels
B. security levels
 

Ship Security Course Covers Requirements & Threats

  • 2. Course Objective • At the end of the course, the trainee will be able to demonstrate knowledge and understanding of the requirements for Ship Security Plans
  • 3. Course Topics • Knowledge of current security threats and patterns; • The meaning and consequential requirements of the different security levels; • Knowledge of the emergency procedures and contingency plans; • Recognition and detection of weapons, dangerous substances and devices;
  • 4. • Recognition on a non discriminatory basis, of characteristics and behavioural patterns of persons who are likely to threaten security; • Techniques used to circumvent security measures; • Security related communications; • Operations of security equipment and systems; • Testing, calibrations and whilst at sea maintenance of security equipment and systems;
  • 5. • Inspection, control, and monitoring techniques; and • Methods of physical searches of persons, personal effects, baggage, cargo and ship’s stores (including practical exercises)
  • 6. US Coast Guard and IMO requirements Objective: at the end of the topic, the trainee will be familiar with USCG and IMO requirements for Ship Security
  • 7. SOLAS, 1974 as amended Amendments: • Chapter XI-2 Special measures to enhance maritime security • Annex 1 Adoption of the International Code for the Security of Ships and Port Facilities
  • 8. • Annex 1 Part A Mandatory requirements regarding the Provisions of Chapter XI-2 of the International Convention for the Safety of Life at Sea, 1974, as amended • Annex 1 Part B Guidance regarding the Provisions of Chapter XI-2 of the Annex to the International Convention for the Safety of Life at Sea, 1974 as amended and Part A of the Code
  • 9.
  • 10.
  • 11.
  • 12. USCG NVIC 10-02 Navigation and Vessel Inspection Circular (NVIC) No. 10-02 Security Guidelines for Vessels The NVIC establishes new guidelines for developing security plans, and implementing security measures and procedures.
  • 13. Chapter XI-2 Regulation 2 • Applies to: a. the following types of ships engaged on international voyage: 1. Passenger ships, including high-speed passenger craft; 2. Cargo ships, including high-speed craft, of 500 gross tonnage and upward; 3. Mobile offshore drilling units; and b. port facilities serving such ships engaged on international voyages
  • 14. SOLAS, 1974 as amended • Chapter V Safety of Navigation Regulation 19 - Carriage requirements for shipborne navigational systems and equipment “Ships fitted with AIS (Automatic Identification System) shall maintain AIS in operation at all times except where international agreements, rules or standards provide for the protection of navigational information”
  • 15. SOLAS, 1974 as amended • Chapter XI-1 • Regulation 3 – Ship Identification number The ship identification number shall be permanently marked with the prefix “IMO” followed by the 7-digit number.
  • 16. SOLAS, 1974 as amended • Regulation 5 – Continuous Synopsis Record “the Continuous Synopsis Record is intended to provide an on-board record of the history of the ship”
  • 17. Ship Security Alert System • Regulation 6 states that: “ All ships shall be provided with a ship security alert system be capable of being activated from the navigation bridge and in at least one other location”
  • 18. cont. Once activated, the system should transmit a ship-to-shore security alert to a competent authority designated by the flag administration. The alarm should identify the ship and its location and indicate that the security of the ship is under threat or has been compromised. On board the ship, this must not raise any alarm nor any alarm must be send to other ships in vicinity.
  • 19. ISPS certificate • The ship has to carry an International Ship Security Certificate indicating that it complies with the requirements of Chapter XI-2 and Part A of ISPS Code. Part A of this Code includes provisions relating to the verification and certification of the ship’s compliance with the requirements on an initial, renewal and intermediate verification basis.
  • 20.
  • 21. Security Threats and Patterns Objective: at the end of the topic, the trainee will be familiar with security threats and it’s patterns
  • 22. The World will never be the same again
  • 23. Background • In the aftermath of Sept. 11, 2001, the Commandant of the US Coast Guard reaffirmed USCG Maritime Homeland Security. • In November 2001, the Commandant of USCG recommended to IMO the comprehensive security requirements including amendments to SOLAS and the new ISPS Code • In December 2002, IMO adopted the SOLAS amendment and the ISPS Code • By 1st of July 2004, both the ISPS Code and related SOLAS amendments shall entry into force
  • 24. Procedure and Response to possible Threats The Ship Security Plan must include procedures and responses to possible threats. These procedures might include the following actions:  Securing all access to the ship to prevent intrusion;  Performing emergency shutdown of main engines to prevent unauthorized operation;
  • 25.  Securing non-critical operations to focus attention on response;  Alerting ship and shore-side authorities of an incident;  Rendering assistance to a nearby ship undergoing an unlawful act that threatens its security;  Responding to the detection of stowaways or intruders;  Repelling boarders;  Addressing a malfunction of on board security equipment
  • 26.  Screening the underwater hull or search the ship in response to bomb threats;  Specifying the kind of communications to use in the event of a breach of security, an unlawful act, or other emergency;  Coordinating with waterfront facility response procedures.
  • 27. Procedures and Response to Possible Threats “Threats” to the Maritime Industry 1990 2001 Theft Illegal Drugs Piracy Criminal Acts Illegal Drugs Stowaways Stowaways Piracy Terrorism Terrorism
  • 28.
  • 29. The Threat to the Maritime Industry: Assessment of Likelihood A. Bomb threat or hoax  Disgruntled Employee/Passenger  Mentally Unstable Person  Politically Motivated Groups B. Sabotage (including ARSON)  Employee/passenger
  • 30.
  • 31. C. Bomb Attack (Port Facility)  Terrorist Groups  Politically Motivated Groups D. Bomb Attack (Ship)  Internal  External  Terrorist Groups
  • 32. USS Cole in ADEN 2000
  • 33. E.Simulated Armed Attack  Mentally Unstable Person/Passenger F. Piracy (only certain areas)  Criminal gangs G. Hijacking/Armed Attack  Terrorist Groups H. Smuggling  Employee/Passenger
  • 34.
  • 38. Achille Lauro (1985) • 07/10/85 •ABU ABBAS Palestine Liberation Front
  • 39.
  • 40. I Cargo Tampering  Crew/passenger J. Stowaways  Politically motivated groups  Smugglers K.Hostage Taking  Politically motivated groups  Terrorist groups  Criminal gangs
  • 41.
  • 42. L. Vandalism  Crew/ Politically motivated groups M. Transporting weapons of mass destruction  Politically motivated groups/Terrorist/Criminal gangs N. Use of the vessel to carry perpetrators and their equipment O. Use of a vessel as a weapon
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Designated Foreign Terrorist Organizations (August 2002) 1. Abu Nidal Organization (ANO) a.k.a. Fatah Revolutionary Council, Arab Revolutionary Brigades, Black September, and Revolutionary Organization of Socialist Muslims Has ability to operate worldwide incl. Middle East, Asia , and Europe 2. Abu Sayyaf Group (ASG) Primarily operates in the southern Philippines, occasionally in Manila and has expanded to Malaysia. Engages in bombings, assassinations, kidnappings, and extortions.
  • 52. 3. Armed Islamic Group (GIA) Aims to overthrow secular Algerian regime and replaces it with Islamic state. Frequent attacks against civilian and government workers. 4. Aum Supreme Truth (Aum) a.k.a. Aum Shinrikyo, Aleph Cult aimed to take over Japan, then the world. Located in Japan unknown numbers has surfaced in Russia.
  • 53. 5. Basque Fatherland and Liberty (ETA) a.k.a Euzkadi Ta Askatasuna. Aim of establishing an independent homeland based on Marxist principles.Bombings and assassinations of Spanish Government officials. Operates primarily in the Basques autonomous regions. 6. Al-Gama’a al-Islamiyya (Islamic Group, IG) Egypt’s largest militant group and has external wing with worldwide presence. Specialized in armed attacks against Egyptian security and other government officials. Operates in Egypt and has worldwide presence incl. Sudan, UK, Afghanistan, Austria and Yemen
  • 54. 7. HAMAS (Islamic Resistance Movement) Palestinian branch of Muslim Brotherhood. Large-scale suicide bombings against Israeli civilian and military targets. Primarily operate in the occupied territories, Israel. 8. Harakat ul-Mujahidin (HUM) Islamic militant group based in Pakistan and Afghanistan that operates primarily and conducts insurgent and terrorist activities in Kashmir.
  • 55. 9. Hizballah (Party of God) a.k.a. Islamic Jihad, Revolutionary Justice Org., Org. of the Oppressed on Earth, and Islamic Jihad for the Liberation of Palestine. Operates in Bekaa Valley, Beirut, and Lebanon. Has established cells in Europe, Africa, North and South America, and Asia. Involved in numerous anti-US terrorist attacks including suicide bombings, kidnappings, and hostage takings.
  • 56. 10. Islamic Movement of Uzbekistan (IMU) Goal is the establishment of an Islamic state in Uzbekistan. Based in Afghanistan and Tajikistan and operates in the same area. Bombings and Hostage takings. 11. Al-Jihad (Egyptian Islamic Jihad) Egyptian Islamic extremist group and close partner of Al-Qaida org. Primary goals are to overthrow Egyptian government and attack US and Israeli interests in Egypt and abroad. Network includes Yemen, Afghanistan, Pakistan, Sudan, Lebanon, and UK.
  • 57. 12. Kahane Chai (Kach) Goal is to restore the biblical state of Israel. Harass and threaten Palestinians, Arabs, and Israeli governments 13. Kurdistan Workers Party (PKK) Goal is to establish and independent Kurdish state in southeastern Turkey. Targets are Turkish government diplomatic and commercial facilities, and tourist industry. 14. Liberation Tigers of Tamil Eelam (LTTE) The most powerful group in Sri Lanka with a cause of establishing an independent Tamil state. Battlefield insurgency, terrorism, suicide bombings and narcotics smugglings.
  • 58. 15. Mujahedin-e Khalq Organization (MEK or MKO) Anti-western activity with attacks on the interests of the clerical regime in Iran and abroad. 16. National Liberation Army (ELN) – Colombia Kidnappings, hijackings, bombings, extortion, and guerrilla war. Operates in Colombia and Venezuela border regions. 17. Palestine Islamic Jihad (PIJ) Committed to creation of an Islamic Palestinian state and the destruction of Israel through holy war. Primarily operates in Israel and occupied territories.
  • 59. 18. Palestine Liberation Front (PLF) An Abu Abbas-led faction formerly based in Tunisia now based in Iraq. 19. Popular Front for the Liberation of Palestine-General Command (PFLP-GC) Violently opposed to Arafat’s PLO. Dozens of attacks in Europe and Middle East. Bases in Lebanon. 20. Al-Qaida Established by Usama Bin Ladin. Current goal is to establish a pan-Islamic Caliphate throughout the world by working with allied Islamic extremist groups to overthrow regimes it deems “non-Islamic” and expelling Westerners and non-Muslims from Muslim countries.
  • 60. 21. Revolutionary Armed Forces of Colombia (FARC) Military wing of the Colombian Communist Party. Involves in kidnappings, bombings, murder, extortion, hijackings, as well as guerilla actions against Colombia. 22. Revolutionary Organization 17 November (17 November) Radical Greek leftist group with anti-Greek establishment, anti-US, anti-Turkey, and anti- NATO. Operates primarily in Greece.
  • 61. 23. Revolutionary People’s Liberation Army/Front (DHKP/C) a.k.a. Devrimci Sol (Revolutionary Left), Dev Sol. A splinter faction of the Turkish People’s Liberation Front that espouses a Marxist ideology and is anti-US and anti-NATO. Conducts attacks in Turkey 24. Shining Path (Sendero Luminoso) One of the most ruthless terrorist groups in the Western Hemisphere of a Maoist doctrine. Conducted bombings and selective assassinations in Peru.
  • 62. 25. Real IRA (RIRA) a.k.a. True IRA. Dedicated to removing British forces from Northern Ireland and unifying Ireland. Activities such as bombings, assassinations, smugglings, extortion, and robberies. Operates in Ireland and UK. 26. United Self-Defense Forces of Colombia (AUC) Supported by drug traffickers with activities of assassinating suspected insurgent supporters to engaging guerilla combat units. Operates in Colombia.
  • 63. 27. Communist Party of the Philippines/New People’s Army (CPP/NPA) Communist armed groups that operates in Philippines involved in various terrorist activities such as extortion, liquidation, bombings, etc. 28. Al-aqsa Martyrs Brigades 29. Asbat Al-Ansar 30. Lashkar-e-Tayyiba 31. Revolutionary Nuclei (formerly ELA) 32. Salafist Group for Call and Combat (GSPC) 33. PFLP-General Command 34. Jaish-e-Mohammed (Army of Mohammed)