SlideShare une entreprise Scribd logo
1  sur  52
1
Introduction
All guidelines and instructions in this training are for your general
understanding of the present situation (July 2009) in the piracy
risk areas.
Circumstances can differ for each vessel and for each Ship-
owner.
Please always refer to the specific situation on the ship you are
assigned to, as per recommendations and instructions of the
vessel’s DOC holder, the instructions from the Master on board,
the Ship Security Officer and the respective Ship Security Plan.
2
Course overview - part 1
I. Training objectives
II. Piracy – tactics, targets, equipment
• Case study
• Break
3
Course overview – part 2
III. Recommended Best Management Practices (BMP) to deter
Piracy
1. Prior to transit – General Planning (officer training)
2. Prior to transit - Voyage Planning (officer training)
3. Prior to transit - Defensive measures
• Case study
• Break
4
Course overview – part 3
4. In Transit – Operations (officer training)
5. If Attacked by pirates
6. If Boarded by Pirates
7. In the Event of Military Action
8. Post Incident Actions and Reporting
Time for questions
• The training for officers takes about 4 hours, the training for ratings about 2 hours
5
I. Training objectives
The scope of the training is to provide:
• General information regarding the Piracy
• Guidance and best industry practices for vessels passing
through the gulf of Aden (GoA) and other known pirates
infested areas.
• Training on how to avoid, react and cope with piracy and other
related incidents.
At the end of the training seminar you will have acquired:
• adequate knowledge, guidance and skills on the Best
Management Practices (BMP) in avoiding piracy attacks,
deterring attacks, delaying successful attacks and handling the
situation with pirates on board, particularly when transiting the
Gulf of Aden, off the Coast of Somalia and other pirates
infested areas.
6
II. Piracy – tactics, targets, equipment
What is Piracy?
• Piracy is a term used to describe acts of armed robbery,
hijacking and other malicious acts against ships in
international waters.
• Piracy is carried out with the intent of stealing valuables
onboard and/or extorting money from ship owners and/or third
party interests by holding the ship or the crew hostage for
ransom.
7
Piracy – tactics, targets, equipment
8
Recent Piracy Attacks Areas
Piracy – tactics, targets, equipment
Pirates prone areas
Africa:
• Gulf of Aden (GoA)
• Tema (Ghana)
• Lagos & Bonny River (Nigeria)
• Dar Es Salaam (Tanzania)
South East Asia and Indian Sub Continent
• Bangladesh
• Indonesia
• Malacca Strait
• Malaysia
• Philippines
South and Central America and the Carribbean waters
• Brazil
9
Piracy – tactics, targets, equipment
10
Piracy – tactics, targets, equipment
The factors that make a ship more vulnerable are:
• Low Freeboard
• Slow speed
• Inadequate planning and procedures
• Visibly low state of alert and/or evident self protective
measures
• Where a slow response by the ship is evident
11
Piracy – tactics, targets, equipment
Typical Attack profiles and lessons learnt
• It is generally thought that from sighting pirates to being
boarded, takes approximately fifteen (15) minutes.
• Pirates’ use of two or more small high speed (up to 25 knots)
open boats/ ”skiffs” in attacks often approaching from the port
quarter and/or stern
• Pirates use a “mother ship” carrying personnel, equipment and
smaller assault craft
• Majority of attacks have taken place between first light and last
light
• No successful attacks have occurred on ships at 15 knots and
more
12
Piracy – tactics, targets, equipment
13
Pirates operate using small, fast and maneuverable skiffs
with powerful outboard engines.
Piracy – tactics, targets, equipment
14
Types of vessels used as mother ships from which pirates
operate small open boats for carrying out attacks
Piracy – tactics, targets, equipment
15
• The pirates are firing automatic riffles and Rocket Propelled
Grenades (RPG) in an attempt to board and hijack vessels
Piracy – tactics, targets, equipment
16
• The pirates have improved their equipment and now use portable
VHF, GPS systems, AIS and satellite phones.
• It is also likely that they are plugged to an International network that
feeds information from ports in the Gulf, Europe and Asia.
• Good communication equipment and a mother ship now gives them a
greater ability to find and capture potential targets even far out at sea.
Piracy – tactics, targets, equipment
17
Gulf of Aden (GoA)
•Somali pirates are attacking vessels in the northern Somali coast
(GoA).
•Once the attack is successful and the vessel hijacked, the pirates
sail the vessel to the Somali coast and thereafter demand a ransom
for the safe release of the vessel and crew.
CASE STUDY
(BBC Trinidad)
Case study
Questions:
Who are the parties involved, how did they achieve their objective ?
Seafarers and their families
(feedback from crew involved)
(Feedback from another case)
(Out of the Scene negotiation)
18
Antipiracy Preparedness & Response Training
BREAK
19
III. Recommended BMP to deter Piracy
20
Introduction
Whilst recognising the absolute discretion of the Master at all times to
adopt appropriate measures to avoid, deter or delay piracy attacks, the
following check lists of BMP are provided for ship owners and ship
operators, Masters and their crews.
Not all may be applicable for each ship, therefore as part of the risk
analysis, an assessment is recommended to determine which of the BMP
will be most suitable for the ship.
Recommended BMP to deter Piracy
1. Prior to transit - General Planning
(to be done as per recommendations and instructions of the vessel’s DOC holder)
a. Coordination & Reporting
• IMB Piracy Reporting Centre - Kuala Lumpur, Malaysia
• Maritime Security Centre – Horn of Africa (MSCHOA) and UKMTO Dubai
b. Risk Assessment
c. Company crisis management procedures
d. Advanced notice of the passage plan
e. Safety of the crew and passengers
1.1. Company Planning
1.2. Ship’s Master planning
2. Prior to transit - Voyage planning
21
III. Recommended BMP to deter Piracy
3. Prior to transit – Defensive measures
(Follow the procedures laid down in your SSP)
a. Ensure sufficient watch keepers
b. Increase lookouts c. Man the ER
22
Recommended BMP to deter Piracy
Prior to transit – Defensive measures
d. Minimise external communications e. No work on open deck
23
Recommended BMP to deter Piracy
Prior to transit – Defensive measures
f. Increase readiness and redundancy by running auxiliary machinery
g. Secure and control access to bridge , ER, accommodation, steering gear
24
Recommended BMP to deter Piracy
Prior to transit – Defensive measures
h. Designate a piracy attack muster point – “citadel” away from external
bulkheads and portholes
i. Use maximum lighting during the night hours
25
Recommended BMP to deter Piracy
Prior to transit – Defensive measures
Additional commercially available measures
j. Consider use of dummies at the rails
i. Fire pumps and/or hoses to be pressurized around stern ready for discharge
overboard
26
Recommended BMP to deter Piracy
Prior to transit – Defensive measures
Additional commercially available measures
k. Consider reinforcing accessible portholes with gratings
l. Use “crazy fenders” hanging over the side of the vessel
27
Recommended BMP to deter Piracy
28
Prior to transit – Defensive measures
Additional commercially available measures
m. Use razor/barbed wire around stern and lowest points of access
n. Passive equipment like sandbags to protect the navigation bridge from
bullets of the pirates
Recommended BMP to deter Piracy
Prior to transit – Defensive measures
Additional commercially available measures
o. Accommodation always locked and the access to the crew limited to 1
entrance.
p. Secure all storage areas on open deck with combination padlocks
29
Recommended BMP to deter Piracy
Prior to transit – Defensive measures
Additional commercially available measures
q. Consider providing night vision optic for use during the darkness hours
r. Consider operational use of CCTV (if fitted)
30
Discussion
In the case study – why did the pirates chose the vessel ?
What defensive measures were taken / could have been taken?
Your own experiences?
31
Antipiracy Preparedness & Response Training
BREAK
32
III. Recommended BMP to deter Piracy
4. In transit – Operations
a. Pirates prone areas – BMP Actions check lists
Africa:
• Gulf of Aden (GoA)
• Tema (Ghana)
• Lagos & Bonny River (Nigeria)
• Dar Es Salaam (Tanzania)
South East Asia and Indian Sub Continent
• Bangladesh
• Indonesia
• Malacca strait
• Malaysia
• Philippines
c. South and Central America and the Carribbean waters
• Brazil
33
4b. Gulf of Aden IRTC & Group transit Explanation
34
Gulf of Aden IRTC & Group transit Explanation
35
Gulf of Aden IRTC & Group transit Explanation
36
37
Gulf of Aden IRTC & Group transit Explanation
38
Gulf of Aden IRTC & Group transit Explanation
39
Gulf of Aden IRTC & Group transit Explanation
40
Gulf of Aden IRTC & Group transit Explanation
41
Gulf of Aden IRTC & Group transit Explanation
42
Gulf of Aden IRTC & Group transit Explanation
III. Recommended BMP to deter Piracy
5. If Attacked by pirates
- BMP Actions Check list (MN, Beluga, Seatrade
6. If boarded by pirates
- BMP Actions Check list (example)
7. In the event of a military action
- BMP Actions Check list (BMP Aug. 09
8. Post Incident Actions and Reporting
-BMP Actions Check list (IMO MISC .1/Circ. 1334)
43
7. In the Event of Military Action
- BMP Actions Check list BMP
In the event of military personnel take action onboard the vessel,
and unless otherwise directed, all personnel should keep low to
the deck, cover their head with hands ( always ensuring that
hands are empty and visible). Be prepared to answer questions
on identity and status, as military personnel may take some
time to differentiate ship’s crew from pirates.
44
8. Post Incident Actions and Reporting
-BMP Actions Check list ( BMP Piracy Home Page Circ 1334 IMO )
Once it is known that an attack is over, and after securing the safety of
the ship and crew:
 Make post incident reports to:
 The UK Maritime Trade Operations (UKMTO) Dubai
 The Maritime Security Center – Horn of Africa ( MSCHOA)
 The International Maritime Bureau (IMB)
 carryout an internal debrief of the ship’s company
 offer professional counseling to those who may have been affected
by events.
 make a post incident report to owners/operators
 consider an appropriate mechanism for informing next of kin
45
8. Post Incident Actions and Reporting
 A debriefing should be conducted by the owner/master, SSO and
CSO to learn from the attack and identify areas of improvement.
 Debriefing should be conducted immediately after the incident so
that the events are fresh and should involve the entire crew.
46
Post Incident Actions and Reporting
Shipowner should be aware that seafarer may suffer from trauma or
similar condition after being victimized under an attack from pirates
or armed robbers. Shipowner should offer advice from professionals
if the seafarer wishes such assistance.
47
8. Post Incident Actions and Reporting
To reduce the risk from trauma the master has to debrief the crew
immediately after the attack or release of a vessel in order to get
crew to confront their experiences.
Counseling professionals to debrief crew as soon as possible after the
attack or release of the vessel in order to assist the crew to manage
their experiences.
48
Antipiracy Preparedness & Response Training
The situation is dynamic – the pirates learn fast and change their tactics –
therefore please study the latest reference material via the below links
• IMB Piracy reporting center – contact details
• Piracy home page Kuala Lumpur
• PIRACY - THE EAST AFRICA/SOMALIA SITUATION. PRACTICAL MEASURES TO AVOID, DETER
OR DELAY PIRACY ATTACKS (OCIMF).
• PRESENTATION: “GULF OF ADEN RECOMMENDED ROUTE”.
49
Antipiracy Preparedness & Response Training
Helpful telephone numbers:
1) United Kingdom Maritime Trade Operations (UK MTO) (will relay to naval units).
e–mail: UKMTO@eim.ae
Telephone: +971 50 552 3215
Fax: +971 4 306 5710
2) Maritime Security Centre – Horn of Africa (MSC – HOA)
Ops Centre Maritime Security Centre (Horn of Africa) European Union Operation HQ Northwood
Headquarters Sandy Lane, Northwood Middlesex HA6 3HP ENGLAND
Tel: +44 (0) 1923 958545
Fax: +44 (0) 1923 958520
Email: postmaster@mschoa.org or opscentre@mschoa.org
50
Antipiracy Preparedness & Response Training
Helpful telephone numbers (cont.):
3) Combined Joint Task Force – Horn of Africa (CJTF- HOA) (has assets and will also relay).
e–mail: brett.j.morash@hoa.centcom.mil or brett.j.morash@hoa.usafrica.com.mil
Telephone: +253 358 978
4) Maritime Liaison Office – Bahrain (Marlo – Bahrain) (will relay).
Telephone: +973 1785 3927
Cell: +973 3944 2117
5) IMB Piracy Reporting Centre IMB/ICC-CCS 24 hour Anti Piracy Helpline
Telephone: +60 3 2031 0014
IMB Piracy Reporting Centre, Kuala Lumpur, Malaysia
e–mail: piracy@icc-ccs.org or: imbkl@icc-ccs.org
Telephone: +60 3 2078 5763
Fax: +60 3 2078 5769
51
Antipiracy Preparedness & Response Training
Questions ?
52

Contenu connexe

Tendances

Taking over a navigational watch lrg
Taking over a  navigational watch lrg Taking over a  navigational watch lrg
Taking over a navigational watch lrg
Lance Grindley
 
Bridge resources management lrg
Bridge resources management lrgBridge resources management lrg
Bridge resources management lrg
Lance Grindley
 
Classification society
Classification societyClassification society
Classification society
mscmaritime
 
Marine fire safety
Marine fire safetyMarine fire safety
Marine fire safety
kmsu
 

Tendances (20)

ISPS REVIVE
ISPS REVIVEISPS REVIVE
ISPS REVIVE
 
SOLAS Presentation
SOLAS PresentationSOLAS Presentation
SOLAS Presentation
 
Solas Presentation
Solas PresentationSolas Presentation
Solas Presentation
 
ISM Curso ISPS. 5- Ship security plan.
ISM Curso ISPS. 5- Ship security plan.ISM Curso ISPS. 5- Ship security plan.
ISM Curso ISPS. 5- Ship security plan.
 
Environmental presentation
Environmental presentationEnvironmental presentation
Environmental presentation
 
Maritime Security and Security Responsibilities
Maritime Security and Security ResponsibilitiesMaritime Security and Security Responsibilities
Maritime Security and Security Responsibilities
 
MlC 2006 General Introduction and Preparation
MlC 2006 General Introduction and PreparationMlC 2006 General Introduction and Preparation
MlC 2006 General Introduction and Preparation
 
Safety officer on ship
Safety officer on shipSafety officer on ship
Safety officer on ship
 
Taking over a navigational watch lrg
Taking over a  navigational watch lrg Taking over a  navigational watch lrg
Taking over a navigational watch lrg
 
Planning of the mooring operation
Planning of the mooring operationPlanning of the mooring operation
Planning of the mooring operation
 
LIFE SAVING APPLIANCES by Capt Aung Myin Moe
LIFE SAVING APPLIANCES by Capt Aung Myin MoeLIFE SAVING APPLIANCES by Capt Aung Myin Moe
LIFE SAVING APPLIANCES by Capt Aung Myin Moe
 
A short note on SOLAS 74
A short note on SOLAS 74A short note on SOLAS 74
A short note on SOLAS 74
 
Bridge resources management lrg
Bridge resources management lrgBridge resources management lrg
Bridge resources management lrg
 
Presentación convenio isps
Presentación convenio ispsPresentación convenio isps
Presentación convenio isps
 
Safety of navigation
Safety of navigationSafety of navigation
Safety of navigation
 
Rule 05 look-out
Rule 05     look-outRule 05     look-out
Rule 05 look-out
 
Personal safety on deck
Personal safety on deckPersonal safety on deck
Personal safety on deck
 
Classification society
Classification societyClassification society
Classification society
 
Marine fire safety
Marine fire safetyMarine fire safety
Marine fire safety
 
Maritime operation assignment imo
Maritime operation assignment   imoMaritime operation assignment   imo
Maritime operation assignment imo
 

En vedette

Common symptoms of food borne illness
Common symptoms of food borne illnessCommon symptoms of food borne illness
Common symptoms of food borne illness
Miguel Diaz Medina
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
Noel Tan
 
pfso cert english.PDF
pfso cert  english.PDFpfso cert  english.PDF
pfso cert english.PDF
Jock ANDRE
 
Mathematical model ofrcc dam breakbastorarcc dam as a case study
Mathematical model ofrcc dam breakbastorarcc dam as a case studyMathematical model ofrcc dam breakbastorarcc dam as a case study
Mathematical model ofrcc dam breakbastorarcc dam as a case study
IAEME Publication
 

En vedette (20)

FIRE SAFETY SYSTEM
FIRE SAFETY SYSTEMFIRE SAFETY SYSTEM
FIRE SAFETY SYSTEM
 
Maritime security operative isps
Maritime security operative ispsMaritime security operative isps
Maritime security operative isps
 
Annex I oil pollution prevention
Annex I oil pollution preventionAnnex I oil pollution prevention
Annex I oil pollution prevention
 
Internal audit ctpf
Internal audit ctpfInternal audit ctpf
Internal audit ctpf
 
Common symptoms of food borne illness
Common symptoms of food borne illnessCommon symptoms of food borne illness
Common symptoms of food borne illness
 
(External) initial audit
(External) initial audit(External) initial audit
(External) initial audit
 
Man Over Board Drill
Man Over Board DrillMan Over Board Drill
Man Over Board Drill
 
Kepil (mooring buoy)
Kepil (mooring buoy)Kepil (mooring buoy)
Kepil (mooring buoy)
 
Isps code
Isps codeIsps code
Isps code
 
A pocket-guide-to-safe-confined-space
A pocket-guide-to-safe-confined-spaceA pocket-guide-to-safe-confined-space
A pocket-guide-to-safe-confined-space
 
Omamarine
OmamarineOmamarine
Omamarine
 
SECURITY EXERCISE June 4, 2010 with PFSO Port Kelang, Malaysia
SECURITY EXERCISE June 4, 2010  with PFSO Port Kelang, MalaysiaSECURITY EXERCISE June 4, 2010  with PFSO Port Kelang, Malaysia
SECURITY EXERCISE June 4, 2010 with PFSO Port Kelang, Malaysia
 
Port operations & management slideshow
Port operations & management slideshowPort operations & management slideshow
Port operations & management slideshow
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
pfso cert english.PDF
pfso cert  english.PDFpfso cert  english.PDF
pfso cert english.PDF
 
Mathematical model ofrcc dam breakbastorarcc dam as a case study
Mathematical model ofrcc dam breakbastorarcc dam as a case studyMathematical model ofrcc dam breakbastorarcc dam as a case study
Mathematical model ofrcc dam breakbastorarcc dam as a case study
 
Engine quiz
Engine quizEngine quiz
Engine quiz
 
Somali pirates
Somali piratesSomali pirates
Somali pirates
 
Ship planning part i
Ship planning part iShip planning part i
Ship planning part i
 
Risk assessment presentasi
Risk assessment presentasiRisk assessment presentasi
Risk assessment presentasi
 

Similaire à Anti ship piracy training

POWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdfPOWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdf
InibudiLed
 
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptPOWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.ppt
InibudiLed
 

Similaire à Anti ship piracy training (20)

Effective Management on Safety, Security and Environmental Protection at Sea
Effective Management on Safety, Security and Environmental Protection at SeaEffective Management on Safety, Security and Environmental Protection at Sea
Effective Management on Safety, Security and Environmental Protection at Sea
 
POWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdfPOWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdf
 
Resolve Salvage and Fire
Resolve Salvage and FireResolve Salvage and Fire
Resolve Salvage and Fire
 
Resolve Salvage and Fire - Your Global Emergency Response Partner
Resolve Salvage and Fire - Your Global Emergency Response PartnerResolve Salvage and Fire - Your Global Emergency Response Partner
Resolve Salvage and Fire - Your Global Emergency Response Partner
 
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptPOWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.ppt
 
Security Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security dutiesSecurity Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security duties
 
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
 
leqcia 2.pptx
leqcia 2.pptxleqcia 2.pptx
leqcia 2.pptx
 
Piracy and Armed Robbery
Piracy and Armed RobberyPiracy and Armed Robbery
Piracy and Armed Robbery
 
Malacca DSP SOMS Brosure & STS
Malacca DSP SOMS Brosure & STSMalacca DSP SOMS Brosure & STS
Malacca DSP SOMS Brosure & STS
 
1000643_Brochure
1000643_Brochure1000643_Brochure
1000643_Brochure
 
New Skipper Guide
New Skipper GuideNew Skipper Guide
New Skipper Guide
 
unit 4.pptx
unit 4.pptxunit 4.pptx
unit 4.pptx
 
New Skipper Guide
New Skipper GuideNew Skipper Guide
New Skipper Guide
 
MARINE SAFETY
MARINE SAFETYMARINE SAFETY
MARINE SAFETY
 
Marine accidents
Marine accidentsMarine accidents
Marine accidents
 
SMi Group's Maritime Reconnaissance and Surveillance Technology 2016
SMi Group's Maritime Reconnaissance and Surveillance Technology 2016SMi Group's Maritime Reconnaissance and Surveillance Technology 2016
SMi Group's Maritime Reconnaissance and Surveillance Technology 2016
 
MARITIME-SAFETY-LESSON-1.pptx
MARITIME-SAFETY-LESSON-1.pptxMARITIME-SAFETY-LESSON-1.pptx
MARITIME-SAFETY-LESSON-1.pptx
 
Chemical tankers
Chemical tankersChemical tankers
Chemical tankers
 
Cruise ships / Yolcu Gemileri
Cruise ships / Yolcu GemileriCruise ships / Yolcu Gemileri
Cruise ships / Yolcu Gemileri
 

Plus de Noel Tan (20)

Dcfis school development plan
Dcfis school development planDcfis school development plan
Dcfis school development plan
 
Module12.ppst5.4.2
Module12.ppst5.4.2Module12.ppst5.4.2
Module12.ppst5.4.2
 
Module11.ppst5.2.2
Module11.ppst5.2.2Module11.ppst5.2.2
Module11.ppst5.2.2
 
Module10.ppst5.1.2
Module10.ppst5.1.2Module10.ppst5.1.2
Module10.ppst5.1.2
 
Module9.ppst4.5.2
Module9.ppst4.5.2Module9.ppst4.5.2
Module9.ppst4.5.2
 
Module8.ppst4.4.2
Module8.ppst4.4.2Module8.ppst4.4.2
Module8.ppst4.4.2
 
Module7.ppst4.1.2
Module7.ppst4.1.2Module7.ppst4.1.2
Module7.ppst4.1.2
 
Module6.ppst3.1.2
Module6.ppst3.1.2Module6.ppst3.1.2
Module6.ppst3.1.2
 
Module5.ppst2.6.2
Module5.ppst2.6.2Module5.ppst2.6.2
Module5.ppst2.6.2
 
Module4.ppst2.3.2
Module4.ppst2.3.2Module4.ppst2.3.2
Module4.ppst2.3.2
 
Module3.ppst1.5.2
Module3.ppst1.5.2Module3.ppst1.5.2
Module3.ppst1.5.2
 
Module2.ppst1.4.2
Module2.ppst1.4.2Module2.ppst1.4.2
Module2.ppst1.4.2
 
Module1.ppst1.1.2
Module1.ppst1.1.2Module1.ppst1.1.2
Module1.ppst1.1.2
 
Ppst rpms manual
Ppst rpms manualPpst rpms manual
Ppst rpms manual
 
3. hazmat labeling presentation
3. hazmat labeling presentation3. hazmat labeling presentation
3. hazmat labeling presentation
 
4. hazmat placarding presentation
4. hazmat placarding presentation4. hazmat placarding presentation
4. hazmat placarding presentation
 
5. hazmat packaging presentation
5. hazmat packaging presentation5. hazmat packaging presentation
5. hazmat packaging presentation
 
6d. module6d carrier requirement_water
6d. module6d carrier requirement_water6d. module6d carrier requirement_water
6d. module6d carrier requirement_water
 
B. security levels
B. security levelsB. security levels
B. security levels
 
E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,
 

Anti ship piracy training

  • 1. 1
  • 2. Introduction All guidelines and instructions in this training are for your general understanding of the present situation (July 2009) in the piracy risk areas. Circumstances can differ for each vessel and for each Ship- owner. Please always refer to the specific situation on the ship you are assigned to, as per recommendations and instructions of the vessel’s DOC holder, the instructions from the Master on board, the Ship Security Officer and the respective Ship Security Plan. 2
  • 3. Course overview - part 1 I. Training objectives II. Piracy – tactics, targets, equipment • Case study • Break 3
  • 4. Course overview – part 2 III. Recommended Best Management Practices (BMP) to deter Piracy 1. Prior to transit – General Planning (officer training) 2. Prior to transit - Voyage Planning (officer training) 3. Prior to transit - Defensive measures • Case study • Break 4
  • 5. Course overview – part 3 4. In Transit – Operations (officer training) 5. If Attacked by pirates 6. If Boarded by Pirates 7. In the Event of Military Action 8. Post Incident Actions and Reporting Time for questions • The training for officers takes about 4 hours, the training for ratings about 2 hours 5
  • 6. I. Training objectives The scope of the training is to provide: • General information regarding the Piracy • Guidance and best industry practices for vessels passing through the gulf of Aden (GoA) and other known pirates infested areas. • Training on how to avoid, react and cope with piracy and other related incidents. At the end of the training seminar you will have acquired: • adequate knowledge, guidance and skills on the Best Management Practices (BMP) in avoiding piracy attacks, deterring attacks, delaying successful attacks and handling the situation with pirates on board, particularly when transiting the Gulf of Aden, off the Coast of Somalia and other pirates infested areas. 6
  • 7. II. Piracy – tactics, targets, equipment What is Piracy? • Piracy is a term used to describe acts of armed robbery, hijacking and other malicious acts against ships in international waters. • Piracy is carried out with the intent of stealing valuables onboard and/or extorting money from ship owners and/or third party interests by holding the ship or the crew hostage for ransom. 7
  • 8. Piracy – tactics, targets, equipment 8 Recent Piracy Attacks Areas
  • 9. Piracy – tactics, targets, equipment Pirates prone areas Africa: • Gulf of Aden (GoA) • Tema (Ghana) • Lagos & Bonny River (Nigeria) • Dar Es Salaam (Tanzania) South East Asia and Indian Sub Continent • Bangladesh • Indonesia • Malacca Strait • Malaysia • Philippines South and Central America and the Carribbean waters • Brazil 9
  • 10. Piracy – tactics, targets, equipment 10
  • 11. Piracy – tactics, targets, equipment The factors that make a ship more vulnerable are: • Low Freeboard • Slow speed • Inadequate planning and procedures • Visibly low state of alert and/or evident self protective measures • Where a slow response by the ship is evident 11
  • 12. Piracy – tactics, targets, equipment Typical Attack profiles and lessons learnt • It is generally thought that from sighting pirates to being boarded, takes approximately fifteen (15) minutes. • Pirates’ use of two or more small high speed (up to 25 knots) open boats/ ”skiffs” in attacks often approaching from the port quarter and/or stern • Pirates use a “mother ship” carrying personnel, equipment and smaller assault craft • Majority of attacks have taken place between first light and last light • No successful attacks have occurred on ships at 15 knots and more 12
  • 13. Piracy – tactics, targets, equipment 13 Pirates operate using small, fast and maneuverable skiffs with powerful outboard engines.
  • 14. Piracy – tactics, targets, equipment 14 Types of vessels used as mother ships from which pirates operate small open boats for carrying out attacks
  • 15. Piracy – tactics, targets, equipment 15 • The pirates are firing automatic riffles and Rocket Propelled Grenades (RPG) in an attempt to board and hijack vessels
  • 16. Piracy – tactics, targets, equipment 16 • The pirates have improved their equipment and now use portable VHF, GPS systems, AIS and satellite phones. • It is also likely that they are plugged to an International network that feeds information from ports in the Gulf, Europe and Asia. • Good communication equipment and a mother ship now gives them a greater ability to find and capture potential targets even far out at sea.
  • 17. Piracy – tactics, targets, equipment 17 Gulf of Aden (GoA) •Somali pirates are attacking vessels in the northern Somali coast (GoA). •Once the attack is successful and the vessel hijacked, the pirates sail the vessel to the Somali coast and thereafter demand a ransom for the safe release of the vessel and crew.
  • 18. CASE STUDY (BBC Trinidad) Case study Questions: Who are the parties involved, how did they achieve their objective ? Seafarers and their families (feedback from crew involved) (Feedback from another case) (Out of the Scene negotiation) 18
  • 19. Antipiracy Preparedness & Response Training BREAK 19
  • 20. III. Recommended BMP to deter Piracy 20 Introduction Whilst recognising the absolute discretion of the Master at all times to adopt appropriate measures to avoid, deter or delay piracy attacks, the following check lists of BMP are provided for ship owners and ship operators, Masters and their crews. Not all may be applicable for each ship, therefore as part of the risk analysis, an assessment is recommended to determine which of the BMP will be most suitable for the ship.
  • 21. Recommended BMP to deter Piracy 1. Prior to transit - General Planning (to be done as per recommendations and instructions of the vessel’s DOC holder) a. Coordination & Reporting • IMB Piracy Reporting Centre - Kuala Lumpur, Malaysia • Maritime Security Centre – Horn of Africa (MSCHOA) and UKMTO Dubai b. Risk Assessment c. Company crisis management procedures d. Advanced notice of the passage plan e. Safety of the crew and passengers 1.1. Company Planning 1.2. Ship’s Master planning 2. Prior to transit - Voyage planning 21
  • 22. III. Recommended BMP to deter Piracy 3. Prior to transit – Defensive measures (Follow the procedures laid down in your SSP) a. Ensure sufficient watch keepers b. Increase lookouts c. Man the ER 22
  • 23. Recommended BMP to deter Piracy Prior to transit – Defensive measures d. Minimise external communications e. No work on open deck 23
  • 24. Recommended BMP to deter Piracy Prior to transit – Defensive measures f. Increase readiness and redundancy by running auxiliary machinery g. Secure and control access to bridge , ER, accommodation, steering gear 24
  • 25. Recommended BMP to deter Piracy Prior to transit – Defensive measures h. Designate a piracy attack muster point – “citadel” away from external bulkheads and portholes i. Use maximum lighting during the night hours 25
  • 26. Recommended BMP to deter Piracy Prior to transit – Defensive measures Additional commercially available measures j. Consider use of dummies at the rails i. Fire pumps and/or hoses to be pressurized around stern ready for discharge overboard 26
  • 27. Recommended BMP to deter Piracy Prior to transit – Defensive measures Additional commercially available measures k. Consider reinforcing accessible portholes with gratings l. Use “crazy fenders” hanging over the side of the vessel 27
  • 28. Recommended BMP to deter Piracy 28 Prior to transit – Defensive measures Additional commercially available measures m. Use razor/barbed wire around stern and lowest points of access n. Passive equipment like sandbags to protect the navigation bridge from bullets of the pirates
  • 29. Recommended BMP to deter Piracy Prior to transit – Defensive measures Additional commercially available measures o. Accommodation always locked and the access to the crew limited to 1 entrance. p. Secure all storage areas on open deck with combination padlocks 29
  • 30. Recommended BMP to deter Piracy Prior to transit – Defensive measures Additional commercially available measures q. Consider providing night vision optic for use during the darkness hours r. Consider operational use of CCTV (if fitted) 30
  • 31. Discussion In the case study – why did the pirates chose the vessel ? What defensive measures were taken / could have been taken? Your own experiences? 31
  • 32. Antipiracy Preparedness & Response Training BREAK 32
  • 33. III. Recommended BMP to deter Piracy 4. In transit – Operations a. Pirates prone areas – BMP Actions check lists Africa: • Gulf of Aden (GoA) • Tema (Ghana) • Lagos & Bonny River (Nigeria) • Dar Es Salaam (Tanzania) South East Asia and Indian Sub Continent • Bangladesh • Indonesia • Malacca strait • Malaysia • Philippines c. South and Central America and the Carribbean waters • Brazil 33
  • 34. 4b. Gulf of Aden IRTC & Group transit Explanation 34
  • 35. Gulf of Aden IRTC & Group transit Explanation 35
  • 36. Gulf of Aden IRTC & Group transit Explanation 36
  • 37. 37 Gulf of Aden IRTC & Group transit Explanation
  • 38. 38 Gulf of Aden IRTC & Group transit Explanation
  • 39. 39 Gulf of Aden IRTC & Group transit Explanation
  • 40. 40 Gulf of Aden IRTC & Group transit Explanation
  • 41. 41 Gulf of Aden IRTC & Group transit Explanation
  • 42. 42 Gulf of Aden IRTC & Group transit Explanation
  • 43. III. Recommended BMP to deter Piracy 5. If Attacked by pirates - BMP Actions Check list (MN, Beluga, Seatrade 6. If boarded by pirates - BMP Actions Check list (example) 7. In the event of a military action - BMP Actions Check list (BMP Aug. 09 8. Post Incident Actions and Reporting -BMP Actions Check list (IMO MISC .1/Circ. 1334) 43
  • 44. 7. In the Event of Military Action - BMP Actions Check list BMP In the event of military personnel take action onboard the vessel, and unless otherwise directed, all personnel should keep low to the deck, cover their head with hands ( always ensuring that hands are empty and visible). Be prepared to answer questions on identity and status, as military personnel may take some time to differentiate ship’s crew from pirates. 44
  • 45. 8. Post Incident Actions and Reporting -BMP Actions Check list ( BMP Piracy Home Page Circ 1334 IMO ) Once it is known that an attack is over, and after securing the safety of the ship and crew:  Make post incident reports to:  The UK Maritime Trade Operations (UKMTO) Dubai  The Maritime Security Center – Horn of Africa ( MSCHOA)  The International Maritime Bureau (IMB)  carryout an internal debrief of the ship’s company  offer professional counseling to those who may have been affected by events.  make a post incident report to owners/operators  consider an appropriate mechanism for informing next of kin 45
  • 46. 8. Post Incident Actions and Reporting  A debriefing should be conducted by the owner/master, SSO and CSO to learn from the attack and identify areas of improvement.  Debriefing should be conducted immediately after the incident so that the events are fresh and should involve the entire crew. 46
  • 47. Post Incident Actions and Reporting Shipowner should be aware that seafarer may suffer from trauma or similar condition after being victimized under an attack from pirates or armed robbers. Shipowner should offer advice from professionals if the seafarer wishes such assistance. 47
  • 48. 8. Post Incident Actions and Reporting To reduce the risk from trauma the master has to debrief the crew immediately after the attack or release of a vessel in order to get crew to confront their experiences. Counseling professionals to debrief crew as soon as possible after the attack or release of the vessel in order to assist the crew to manage their experiences. 48
  • 49. Antipiracy Preparedness & Response Training The situation is dynamic – the pirates learn fast and change their tactics – therefore please study the latest reference material via the below links • IMB Piracy reporting center – contact details • Piracy home page Kuala Lumpur • PIRACY - THE EAST AFRICA/SOMALIA SITUATION. PRACTICAL MEASURES TO AVOID, DETER OR DELAY PIRACY ATTACKS (OCIMF). • PRESENTATION: “GULF OF ADEN RECOMMENDED ROUTE”. 49
  • 50. Antipiracy Preparedness & Response Training Helpful telephone numbers: 1) United Kingdom Maritime Trade Operations (UK MTO) (will relay to naval units). e–mail: UKMTO@eim.ae Telephone: +971 50 552 3215 Fax: +971 4 306 5710 2) Maritime Security Centre – Horn of Africa (MSC – HOA) Ops Centre Maritime Security Centre (Horn of Africa) European Union Operation HQ Northwood Headquarters Sandy Lane, Northwood Middlesex HA6 3HP ENGLAND Tel: +44 (0) 1923 958545 Fax: +44 (0) 1923 958520 Email: postmaster@mschoa.org or opscentre@mschoa.org 50
  • 51. Antipiracy Preparedness & Response Training Helpful telephone numbers (cont.): 3) Combined Joint Task Force – Horn of Africa (CJTF- HOA) (has assets and will also relay). e–mail: brett.j.morash@hoa.centcom.mil or brett.j.morash@hoa.usafrica.com.mil Telephone: +253 358 978 4) Maritime Liaison Office – Bahrain (Marlo – Bahrain) (will relay). Telephone: +973 1785 3927 Cell: +973 3944 2117 5) IMB Piracy Reporting Centre IMB/ICC-CCS 24 hour Anti Piracy Helpline Telephone: +60 3 2031 0014 IMB Piracy Reporting Centre, Kuala Lumpur, Malaysia e–mail: piracy@icc-ccs.org or: imbkl@icc-ccs.org Telephone: +60 3 2078 5763 Fax: +60 3 2078 5769 51
  • 52. Antipiracy Preparedness & Response Training Questions ? 52