SlideShare une entreprise Scribd logo
1  sur  15
Oil terminals, refineries and pipelines appear to be ideal targets for terrorists, with guaranteed media attention and high resonance. In the sensitive markets another aspect that has made refineries more vulnerable is their potential target value for terrorism- for-profit, rather than terrorism- for- political ends, as the majority of the world would like to believe. DocomUSA is prepared to meet these threats on Land and Sea with the most comprehensive refinery security system ever conceived. Proprietary and Confidential 1
Proprietary and Confidential 2 The oil and gas industry is a major component of the national critical infrastructure and as such represents an attractive target for terrorists.  Globally terrorists have attacked every segment of the oil and gas fuel cycle, ranging from attacks on exploration and development sites, to maritime shipment, land-based distribution via pipelines, to retail and distribution networks, such as filling stations.  In addition to international terrorism, two major oil producing countries have also indicated a resort to the use of force in connection with the oil and gas industry:
Proprietary and Confidential 3 DocomUSA Security has three major objectives: Integrated Threat Identification: DocomUSA Security identifies multiple man-made threats for corporation and members of the management team. Comprehensive Risk Assessment: DocomUSA Security enables corporate decision makers to assess the specific risk at the corporate and personal level. Optimal Risk Management: DocomUSA Security assists in the cost-efficient management of risks from internal and external threats.
Proprietary and Confidential 4 DocomUSA Security has a modular structure, with each of the three modules representing a self-contained unit.  By implementing a coherent Security Policy within all management levels of the organization a corporate culture of security will be achieved. Our Goal:   The most secure oil refinery operation in the world.                     ....Profitable, Green, Safe………Secure.
Proprietary and Confidential 5 DocomUSA Anti Piracy and Maritime Security  We live in a dangerous world, therefore DocomUSA is implementing new dynamic training and operational strategies and solutions to the commercial shipping segment of our business responsible for delivering crude oil to our refineries.  All of our operational maritime security professionals are dedicated in delivering an effective security plan for all DocomUSAowned or contract vessels while at sea or in dock.
Proprietary and Confidential 6 Our maritime security and investigative personnel derive from elements of the U.S. Army Green Berets, Navy Seal Teams, Royal Military Police, Royal Marine Commandos and other specialist units of the American, British & other International Armed Forces, bringing a wealth of knowledge and diverse languages together.
Proprietary and Confidential 7 DocomUSA Security anti piracy and maritime services include, but are not exhaustive to the following; Maritime Security Officers (MSO) Specifically trained security guard teams will escort, advise and gain real time intelligence and threat assessments to mitigate the risk to Master and crew onboard vessels that will be transiting through high risk areas, like the Gulf of Aden and West Africa. Our security team will utilize the latest Anti Piracy passive security procedures and training so that the security team and crew can work together to deter and defend the vessel from any potential attack by pirates. Port Security Officers (PSO)  Gate and sentry security personnel to control all assess and guarding elements of the port or installation, including; CCTV, intruder and fire monitoring , screening of work based and visiting personnel, vehicles and equipment of contractors, freight, containers and port buildings. In addition we have highly trained dog and handler patrol teams that specialize in guarding or search of explosives, weapons and drugs.
Proprietary and Confidential 8 Security Search Dive Teams.  Some tankers could be targeted by terrorists or activists; DocomUSA Security has at its disposal experienced security dive search personnel. The diver can search the water line and underside of the hull in order to ascertain if any explosive device(s) have been planted. If an explosive device is discovered, our teams will evacuate the vessel and the immediate area and set up a cordon, they will then inform the local police and continue to liaise with them until the device has been made safe. Maritime Security Liaison Officers (MSLO)  Docom USA Security specialist personnel can also be utilised on a more permanent basis, either on a tanker vessel, or shore based installations and will implement the best practice and business continuity with up to date changes in security policies, Local intelligence, planning, procedures, threat assessments and lock down procedures.
Proprietary and Confidential 9 Specialist Maritime Security Consultants: Our consultants can be deployed to initiate and implement emergency planning and crisis management surveys and manual written assessments for DocomUSA owned or contract  vessels,  or oil & gas installations. A minimum qualification of a Masters degree in risk and crisis management and emergency planning is required of all personnel. Port Freight & Equipment Tracking: Asset Surveillance Protection: Freight and transportation leaving a port or secure distribution compound can be targeted by criminal gangs intent on hijacking and theft from the vehicle. Quite often the gangs have received inside information from within the distribution warehouse about the vehicles valued freight, planned stops, routes and final destination. Effective measures can be utilized by placing hidden trackers within the shipment, specialist surveillance teams can also be deployed to follow and report any planned or attempted attacks to a dedicated control center and the police.
Proprietary and Confidential 10 Investigation & Infiltration Teams: It  could be discovered that shipments of refined products have been reported as missing and it is suspected that employees are involved in theft from within the company.  Theft can occur from within organizations; bonded warehouses or other cargo storage facilities within the port, these factors can have a big impact on production and profit. Individuals who is specialize in investigation and infiltration techniques can be deployed on the pretext of becoming a regular employee, and then placed within the problematic work area.  Over time the undercover investigator can reveal the identity of the perpetrators and how and where the theft is taking place. Evidence in the form of covert photographic imagery can be produced to company officials to be processed at their discretion.Alternatively management may prefer to investigate the theft in a more overt capacity, utilizing an experienced investigation team.
Proprietary and Confidential 11 Maritime Penetration Testing: It is a good idea to test our own security for vulnerability and possible areas of bad security practice from our own employees using outside sources.  This could be a vessel which is docked in a port, bonded (high value freight) warehouses, port security guard teams etc.; Experienced and specialist operators will test their security, this could be by means of simply gaining entry into a building or vessel or sending a package with a fake bomb inside, and many more.  If the specialist operator has successfully succeeded with their mission, they will then write a full vulnerability assessment report so that the client can assess their most vulnerable areas for the future.
Proprietary and Confidential 12 Port CCTV Installation:  A full risk assessment of the port and any buildings within shall be given, suggesting where best to place CCTV cameras. Covert cameras can also be installed to detect theft of freight or equipment occurring by criminals gaining access into the port or by its own employees.
Proprietary and Confidential 13 Port Security Survey (PSS)  A detailed Port security survey is conducted either before the new key security personnel are implemented or if other security personnel are already in place.  The security survey outlines any changes in; current policy, local threat analysis, vulnerabilities and a recommended security action plan and control measures to be implemented.
Proprietary and Confidential 14 Ship Security Survey (SSS) A detailed independent ship security survey will be conducted on a regular basis to outline the vulnerabilities and recommend security control measures, our action plan lists key priorities to be implemented.  Ship Security Design Plan Common ship design has revealed many critical physical and technical security vulnerabilities and features. An increase in piracy attacks against commercial and private shipping in some cases has shown that the structural design of the ship has allowed the attackers a more successful rate in hijacking and theft. A more secure design on a new build will provide vital resilience in structure and decrease the possibility of successful attacks in the future. Our team is playing a vital role by providing security advice in the early stages of architectural planning as in the case of  both the DocomUSA Solar Hybrid Oil Tanker and DocomUSAHarth Superfast Tanker designs.
Proprietary and Confidential 15 Leadership: The DocomUSA Security team is lead by Captain Bruce Little.  Little is a former US Army Green Beret who saw action in Vietnam at a time when the mortality rate for Green berets was over 80 percent.  Little recently retired from a 34 year career in the New Orleans Police Department and was the commander of the special investigations division.  Little has consulted and trained special forces in several countries friendly to the U.S. and is an expert in port and maritime security.

Contenu connexe

Tendances

Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelines
nwvirus
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
Noel Tan
 
Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014
captlouis
 

Tendances (20)

Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)
 
ISPS Code
ISPS CodeISPS Code
ISPS Code
 
Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelines
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
Beluga sea piracy training
Beluga sea piracy trainingBeluga sea piracy training
Beluga sea piracy training
 
Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014
 
isps code pp
isps code ppisps code pp
isps code pp
 
Maritime security operative isps
Maritime security operative ispsMaritime security operative isps
Maritime security operative isps
 
Crowd Management
Crowd ManagementCrowd Management
Crowd Management
 
Wareho~1
Wareho~1Wareho~1
Wareho~1
 
Risks and Marine Insurance of Oil Tanker
Risks and Marine Insurance of Oil TankerRisks and Marine Insurance of Oil Tanker
Risks and Marine Insurance of Oil Tanker
 
Piracy, Mediation & seafarers
Piracy, Mediation & seafarersPiracy, Mediation & seafarers
Piracy, Mediation & seafarers
 
Guerreirus Intro
Guerreirus IntroGuerreirus Intro
Guerreirus Intro
 
SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016
 
AFM RAPID DEPLOYMENT TEAM
AFM RAPID DEPLOYMENT TEAMAFM RAPID DEPLOYMENT TEAM
AFM RAPID DEPLOYMENT TEAM
 
Hull & Machinery Insurance and Claims
Hull & Machinery Insurance and ClaimsHull & Machinery Insurance and Claims
Hull & Machinery Insurance and Claims
 
Somalia Piracy Brief2008
Somalia Piracy Brief2008Somalia Piracy Brief2008
Somalia Piracy Brief2008
 
Import and Export cargo insurance solutions
Import and Export cargo insurance solutionsImport and Export cargo insurance solutions
Import and Export cargo insurance solutions
 
Africor Risk Management 111001
Africor Risk Management 111001Africor Risk Management 111001
Africor Risk Management 111001
 

En vedette

En vedette (9)

DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-ppt
 
The DocomUSA Advantage - Delivery Truck of the Future
The DocomUSA Advantage - Delivery Truck of the FutureThe DocomUSA Advantage - Delivery Truck of the Future
The DocomUSA Advantage - Delivery Truck of the Future
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack WhitsittNIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Ship Construction (Structure Part)
Ship Construction (Structure Part)Ship Construction (Structure Part)
Ship Construction (Structure Part)
 

Similaire à DocomUSA Security

Maritime Security
Maritime SecurityMaritime Security
Maritime Security
ijtsrd
 
Brochure original - PDF
Brochure original - PDFBrochure original - PDF
Brochure original - PDF
Joe Park
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docx
simonithomas47935
 
Group CSC Brochure English 2015
Group CSC Brochure English 2015Group CSC Brochure English 2015
Group CSC Brochure English 2015
Bill Strobel
 
2013 Basic Presentation-A
2013 Basic Presentation-A2013 Basic Presentation-A
2013 Basic Presentation-A
Jim Stockstill
 
Please respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docxPlease respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docx
leahlegrand
 
Respond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime TransportatRespond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime Transportat
mickietanger
 
Marine Insurance
Marine InsuranceMarine Insurance
Marine Insurance
Felicia N
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docx
oreo10
 
Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...
Scott Bernat
 

Similaire à DocomUSA Security (20)

Security Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security dutiesSecurity Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security duties
 
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
 
Maritime Security
Maritime SecurityMaritime Security
Maritime Security
 
Brochure original - PDF
Brochure original - PDFBrochure original - PDF
Brochure original - PDF
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docx
 
Group CSC Brochure English 2015
Group CSC Brochure English 2015Group CSC Brochure English 2015
Group CSC Brochure English 2015
 
2013 Basic Presentation-A
2013 Basic Presentation-A2013 Basic Presentation-A
2013 Basic Presentation-A
 
International Armour Co.
International Armour Co.International Armour Co.
International Armour Co.
 
one week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSEone week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSE
 
Please respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docxPlease respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docx
 
Respond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime TransportatRespond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime Transportat
 
FMASP_ShowAudio_short
FMASP_ShowAudio_shortFMASP_ShowAudio_short
FMASP_ShowAudio_short
 
Marine Insurance
Marine InsuranceMarine Insurance
Marine Insurance
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docx
 
Management of shipping (1)
Management of shipping (1)Management of shipping (1)
Management of shipping (1)
 
June 2014 Kickoff A
June 2014 Kickoff AJune 2014 Kickoff A
June 2014 Kickoff A
 
Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...
 
PurpleTRAC brochure
PurpleTRAC brochurePurpleTRAC brochure
PurpleTRAC brochure
 
PurpleTRAC Brochure
PurpleTRAC BrochurePurpleTRAC Brochure
PurpleTRAC Brochure
 
Safety at Sea April 2012
Safety at Sea April 2012Safety at Sea April 2012
Safety at Sea April 2012
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

DocomUSA Security

  • 1. Oil terminals, refineries and pipelines appear to be ideal targets for terrorists, with guaranteed media attention and high resonance. In the sensitive markets another aspect that has made refineries more vulnerable is their potential target value for terrorism- for-profit, rather than terrorism- for- political ends, as the majority of the world would like to believe. DocomUSA is prepared to meet these threats on Land and Sea with the most comprehensive refinery security system ever conceived. Proprietary and Confidential 1
  • 2. Proprietary and Confidential 2 The oil and gas industry is a major component of the national critical infrastructure and as such represents an attractive target for terrorists. Globally terrorists have attacked every segment of the oil and gas fuel cycle, ranging from attacks on exploration and development sites, to maritime shipment, land-based distribution via pipelines, to retail and distribution networks, such as filling stations. In addition to international terrorism, two major oil producing countries have also indicated a resort to the use of force in connection with the oil and gas industry:
  • 3. Proprietary and Confidential 3 DocomUSA Security has three major objectives: Integrated Threat Identification: DocomUSA Security identifies multiple man-made threats for corporation and members of the management team. Comprehensive Risk Assessment: DocomUSA Security enables corporate decision makers to assess the specific risk at the corporate and personal level. Optimal Risk Management: DocomUSA Security assists in the cost-efficient management of risks from internal and external threats.
  • 4. Proprietary and Confidential 4 DocomUSA Security has a modular structure, with each of the three modules representing a self-contained unit. By implementing a coherent Security Policy within all management levels of the organization a corporate culture of security will be achieved. Our Goal: The most secure oil refinery operation in the world. ....Profitable, Green, Safe………Secure.
  • 5. Proprietary and Confidential 5 DocomUSA Anti Piracy and Maritime Security We live in a dangerous world, therefore DocomUSA is implementing new dynamic training and operational strategies and solutions to the commercial shipping segment of our business responsible for delivering crude oil to our refineries. All of our operational maritime security professionals are dedicated in delivering an effective security plan for all DocomUSAowned or contract vessels while at sea or in dock.
  • 6. Proprietary and Confidential 6 Our maritime security and investigative personnel derive from elements of the U.S. Army Green Berets, Navy Seal Teams, Royal Military Police, Royal Marine Commandos and other specialist units of the American, British & other International Armed Forces, bringing a wealth of knowledge and diverse languages together.
  • 7. Proprietary and Confidential 7 DocomUSA Security anti piracy and maritime services include, but are not exhaustive to the following; Maritime Security Officers (MSO) Specifically trained security guard teams will escort, advise and gain real time intelligence and threat assessments to mitigate the risk to Master and crew onboard vessels that will be transiting through high risk areas, like the Gulf of Aden and West Africa. Our security team will utilize the latest Anti Piracy passive security procedures and training so that the security team and crew can work together to deter and defend the vessel from any potential attack by pirates. Port Security Officers (PSO) Gate and sentry security personnel to control all assess and guarding elements of the port or installation, including; CCTV, intruder and fire monitoring , screening of work based and visiting personnel, vehicles and equipment of contractors, freight, containers and port buildings. In addition we have highly trained dog and handler patrol teams that specialize in guarding or search of explosives, weapons and drugs.
  • 8. Proprietary and Confidential 8 Security Search Dive Teams. Some tankers could be targeted by terrorists or activists; DocomUSA Security has at its disposal experienced security dive search personnel. The diver can search the water line and underside of the hull in order to ascertain if any explosive device(s) have been planted. If an explosive device is discovered, our teams will evacuate the vessel and the immediate area and set up a cordon, they will then inform the local police and continue to liaise with them until the device has been made safe. Maritime Security Liaison Officers (MSLO) Docom USA Security specialist personnel can also be utilised on a more permanent basis, either on a tanker vessel, or shore based installations and will implement the best practice and business continuity with up to date changes in security policies, Local intelligence, planning, procedures, threat assessments and lock down procedures.
  • 9. Proprietary and Confidential 9 Specialist Maritime Security Consultants: Our consultants can be deployed to initiate and implement emergency planning and crisis management surveys and manual written assessments for DocomUSA owned or contract vessels, or oil & gas installations. A minimum qualification of a Masters degree in risk and crisis management and emergency planning is required of all personnel. Port Freight & Equipment Tracking: Asset Surveillance Protection: Freight and transportation leaving a port or secure distribution compound can be targeted by criminal gangs intent on hijacking and theft from the vehicle. Quite often the gangs have received inside information from within the distribution warehouse about the vehicles valued freight, planned stops, routes and final destination. Effective measures can be utilized by placing hidden trackers within the shipment, specialist surveillance teams can also be deployed to follow and report any planned or attempted attacks to a dedicated control center and the police.
  • 10. Proprietary and Confidential 10 Investigation & Infiltration Teams: It could be discovered that shipments of refined products have been reported as missing and it is suspected that employees are involved in theft from within the company. Theft can occur from within organizations; bonded warehouses or other cargo storage facilities within the port, these factors can have a big impact on production and profit. Individuals who is specialize in investigation and infiltration techniques can be deployed on the pretext of becoming a regular employee, and then placed within the problematic work area. Over time the undercover investigator can reveal the identity of the perpetrators and how and where the theft is taking place. Evidence in the form of covert photographic imagery can be produced to company officials to be processed at their discretion.Alternatively management may prefer to investigate the theft in a more overt capacity, utilizing an experienced investigation team.
  • 11. Proprietary and Confidential 11 Maritime Penetration Testing: It is a good idea to test our own security for vulnerability and possible areas of bad security practice from our own employees using outside sources. This could be a vessel which is docked in a port, bonded (high value freight) warehouses, port security guard teams etc.; Experienced and specialist operators will test their security, this could be by means of simply gaining entry into a building or vessel or sending a package with a fake bomb inside, and many more. If the specialist operator has successfully succeeded with their mission, they will then write a full vulnerability assessment report so that the client can assess their most vulnerable areas for the future.
  • 12. Proprietary and Confidential 12 Port CCTV Installation: A full risk assessment of the port and any buildings within shall be given, suggesting where best to place CCTV cameras. Covert cameras can also be installed to detect theft of freight or equipment occurring by criminals gaining access into the port or by its own employees.
  • 13. Proprietary and Confidential 13 Port Security Survey (PSS) A detailed Port security survey is conducted either before the new key security personnel are implemented or if other security personnel are already in place. The security survey outlines any changes in; current policy, local threat analysis, vulnerabilities and a recommended security action plan and control measures to be implemented.
  • 14. Proprietary and Confidential 14 Ship Security Survey (SSS) A detailed independent ship security survey will be conducted on a regular basis to outline the vulnerabilities and recommend security control measures, our action plan lists key priorities to be implemented. Ship Security Design Plan Common ship design has revealed many critical physical and technical security vulnerabilities and features. An increase in piracy attacks against commercial and private shipping in some cases has shown that the structural design of the ship has allowed the attackers a more successful rate in hijacking and theft. A more secure design on a new build will provide vital resilience in structure and decrease the possibility of successful attacks in the future. Our team is playing a vital role by providing security advice in the early stages of architectural planning as in the case of both the DocomUSA Solar Hybrid Oil Tanker and DocomUSAHarth Superfast Tanker designs.
  • 15. Proprietary and Confidential 15 Leadership: The DocomUSA Security team is lead by Captain Bruce Little. Little is a former US Army Green Beret who saw action in Vietnam at a time when the mortality rate for Green berets was over 80 percent. Little recently retired from a 34 year career in the New Orleans Police Department and was the commander of the special investigations division. Little has consulted and trained special forces in several countries friendly to the U.S. and is an expert in port and maritime security.