Anti-Piracy Defense Course - IMSN, International Maritime Security

IMSN, LLC.
Anti-Piracy Defense
Course
2009
1
IMSN’s Anti-Piracy Defense Course
Introductions & Backgrounds
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Rules of the classroom
•
•
•
•
•
Cell phones off or on vibrate
Fire exits
Lunch
Restrooms
Please try to keep movement in and out of the
classroom to a minimum.
• If you need to step out, please do it quietly
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Course Overview
• This course is intended to provide the
knowledge required for ships officers & crew
to operate in piracy waters with a total
understanding of:
– Auditing and editing of the ship’s security plan
measures
– Piracy attacks, un-authorized access, breach of
security
– How to use proper training
– Non lethal systems & tactics
– Build awareness in the art of watch keeping and
preparations
– To keep the actors off of your ship
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Course Overview
This course is NOT designed to make
the student an anti-piracy expert or a
combatant. It is meant to build
awareness in the art of watch keeping
and preparations
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Competencies to be Achieved
• General knowledge of piracy and pirate attacks
• International guidance, rules and best practice.
• Be able to assess onboard risks, consequence &
vulnerabilities.
• Monitoring & controlling access underway, at anchor and in
the berth
• Methods of detection, deterrence & response to piracy
attacks.
• Setting up the ship for possible confrontation
• Radar & Advanced CCTV watch in high impact areas
• Vessel lockdown and crew accountability
• Conducting anti piracy training & drills
• Surviving a hostage situation and taking prisoners
• Knowledge to amend the SSP
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
General Points
• Safety takes precedence over security
– Don’t endanger yourself or the ship
– Defending the ship is pointless if you let it sink in
the process
• The Master remains the ultimate authority
– Even if he defers to the security team
• Everyone has an important role to play
– Even with a security team, the officers and crew
must play an active role
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Important Things to remember
• THINK
– The best weapon you have in your arsenal is
the ability to adapt and think on your feet
• Don’t panic
• Control your fear and remember that:
• “Fear creates hesitation, and hesitation will make
your worst fear come true!”
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy
Threats & Patterns
9
Piracy: Yesterday & Today
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
What is Piracy?
• Piracy dates back as far as the Roman
Empire and has existed as long as maritime
trade.
• “Modern piracy is a violent, bloody, ruthless
practice," Captain Jayant Abhyankar, Deputy
Director of the IMB.
• These actors are nothing more than criminals
and IMSN will approach the issues in a law
enforcement style.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
American History
• In 1803, the Barbary Pirates held around
300 American sailors for ransom in modern
day Libya
• A small force of U.S. Marines and
mercenaries, led by William Eaton, marched
overland from Egypt to force the Barbary
States to release all hostages without tribute
• It was the first counter-terrorism mission by
the United States
• Today we still face the threat of piracy off the
coasts of Africa
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Bureau (IMB)
definition:
Piracy is an act of boarding or
attempting to board any ship with
the apparent intent to commit theft
or any other crime and with the
apparent intent or capability to use
force in furtherance of that act.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
United Nations definition of Piracy:
Article 101
• Any illegal acts of violence or detention, or
any act of depredation, committed for private
ends by the crew or the passengers of a
private ship or a private aircraft, and directed:
• (i) on the high seas, against another ship or
aircraft, or against persons or property on
board such ship or aircraft;
• (ii) against a ship, aircraft, persons or property
in a place outside the jurisdiction of any State
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Global Piracy
• Piracy can happen anywhere
– Somalia; Gulf of Aden
– Ivory Coast
– North Africa
– Straits of Gibraltar
– Straits of Malacca
– Caribbean
– Lake Erie
– Where else? Why?
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Stats and Facts Cont:
• The maritime realm covers
139,768,200 square miles.
• Most of this environment lies beyond
the strict jurisdiction of any one state
where there are no clear cut legal
answers or authority!
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Stats and Facts
– 80% of World’s trade travels by water
– 50% World’s trade value and 90% of
general cargo is transported in containers
– 75% of World’s trade pass through a
handful of international straights and canals
– 1/3 of the World’s trade and half its oil
traverse the Straights of Malacca,
Singapore, Somalia and the Red Sea.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Stats and Facts:
• In 2009, there were 406 pirate attacks, up
from 294 attacks in 2008.
• Of those 406 attacks, 217 took place near
Somalia.
• In 2009, there had been 49 vessels hijacked
and 1052 hostages taken.
• At the end of the year, pirates held 12
vessels and 263 crew members.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Stats and Facts:
• As a result of pirate attacks in 2009, 68
people were injured and 8 killed.
• Guns were used in 240 attacks worldwide,
up from 139 instances in 2008.
• Near the end of the year, the IMB reported
that over half of the piracy attacks
(attempted or otherwise) worldwide go
unreported.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Stats and Facts
• The cost of piracy is estimated to be between
$13 and $16 billion every year and could cost
substantially more in coming years.
• Average ransom payments in 2009 were
between 3 and 4 million dollars.
• Piracy attacks have not broken 400 since
2003. 2009 is the fourth year in a trend of
increasing attacks.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Recent Trends in Piracy
21
Piracy Techniques, Craft, and
Equipment
• Somali Pirates are using quasi-military attack
scenarios
–
–
–
–
Approaching from opposite directions
Coordinating with GPS/Satellite phones
Targeting “soft,” slow, and unprepared vessels
RPG’s, dynamite, AK-47s (weapon of choice)
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Recent Trends: Piracy Today
• Five to six years ago, when pirates attacked,
they used machetes, knives and pistols.
• Today they still use knives but now they carry
AK-47s and RPGs
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy Techniques, Craft, and
Equipment
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy Techniques, Craft, and
Equipment
• Mother ships are usually the larger vessels
hijacked by pirates.
– It is important to know which ships have been
hijacked.
– Pirate mother ships could be identified by sight or
with the AIS.
• The small boats are deployed from “mother
ships” at a rate of 25 knots plus.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy Techniques, Craft, and
Equipment
• Note that the mother ships are also used as a
recon tool
– For some time the pirates have been radioing each
other about different vessels they see and try to
board – most of the “Mother Ships” are not mother
ships at all, they are scouts!
– How can you use this in your favor
• Do your best to look like a hard target so would-be
attackers will avoid your ship
• Use the radio to announce that your ship is prepared
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Modern Pirates
• Pirates are generally poor, turning to crime
as their only means of income.
• Some pirates are as young as teenagers or
younger
– Even a 10-year-old boy can kill you if he has an
AK-47
• The first pirate onboard a ship gets the most
money
– This is their only source of income and they are
highly motivated
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Modern Pirates
• Somali pirates are likely to want you alive for
the ransom money
– They are still shooting at you, even a stray round
can kill you!
• Pirates in the Straits of Malacca or Nigeria will
kill you without a second thought and take
your ship!
• Pirates could be intoxicated or on drugs
• Never assume you are safe!
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Modern Pirates
• Many African pirates are known to use Khat
(qat, qaat, jaad, chad)
• Khat is a stimulant similar to ecstasy –it is
chewed and absorbed into the bloodstream
through the stomach
• Khat is chewed as a pick me up for farmers or
workers because it will suppress appetite
• It is very accessible in many African and
Middle Eastern countries – even to children
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Modern Pirates
• Khat can cause euphoria, hyperactivity,
hallucinations, appetite loss, and increased heart rate
and blood pressure
• They will be less likely to break down mentally under
stress
• An individual on Khat will be harder to incapacitate
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Modern Pirates
• Haiti and other Caribbean countries are
known to have severe rates of marijuana use
• Dominican Republic is known to have high
rates of amphetamine use
• The same rules apply
– A person in an altered state will be much harder to
incapacitate
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Is Piracy Terrorism?
• Majority of experts claim that piracy is not
terrorism.
• “There is no worthwhile evidence, despite
the speculation, of any cooperation between
pirates and insurgent/terrorists,” a 2007
article for the Naval War College Review.”
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy and Terrorism
• However is it possible that terrorists could use
piracy as a tool, somewhat like Sept 11th?
– Both crimes involve non-state actors, both aim at
civilians, and both involve acts of homicide and
destruction.
• Groups like Al-Qaeda and Al-Shabab in
Somalia could easily start using piracy to
further their goals
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy and Terrorism
• There is a growing suspicion of financial
partnerships between Somali pirates and
Islamic terrorist movements within Somalia,
not only as pirates, but as smuggling
operatives as well.
• Dirty bomb material could be smuggled
through Somalia into Venezuela or Colombia.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy Hotspots
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy Hotspots: Somalia/ Gulf of Aden
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy Hotspots: Somalia
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy Hotspots: Somalia
Left: Abshir Boyah Right: The town of
EYL a main pirate base
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Somali Fast Boats
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Hot Spots: Nigeria
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Hot Spots: Nigeria
• Nigeria was in 6th largest oil exporter in the
world in mid-2009.
• Nigeria has seen an increase in piracy due to
sectarian violence and resentment towards oil
companies.
• In 2009, there were 29 attacks with at least 30
unreported
• The Port of Lagos was the second most
dangerous in the world in 2009.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Hot spots: Nigeria
• Pirates in Nigeria have shown little regard for
the well-being of crews and may be the most
dangerous piracy hotspot in the world at this
time.
• Ships have received little assistance from the
Nigerian navy (Nigeria actually maintains the
strongest Navy in the region).
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Hot spots: South East Asia
• Indonesia, Malaysia, South China Sea, etc
• The region remains extremely dangerous
even though the volume of attacks has fallen.
• Over half of the attacks in the region have not
been reported. Why?
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Hot Spots: South East Asia
• In the last 3 years the Indonesian Navy has
made significant gains in reducing piracy.
• They have:
–
–
–
–
–
Increased the Navy’s forces
Increased cooperation with neighbors
Kept better Intel
Better training
They most recently beat down and defeated the
“Tamil Tigers”
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy Hotspots: Strait of Malacca,
Philippines, Bangladesh, Indonesia
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
There are three types of tactics used by
pirates in the Malaccan straits.
• The first type operate in small fast boats and
only attack easy targets, robbing the ship and
crew of money and valuables.
• The second is much more organized, using
weapons and careful planning to hijack a ship
and hold the crew for ransom while stealing
large amounts of cargo. This type requires
organization and funding.
• The third type is also organized and funded
but makes a political statement along with the
demand for ransom.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
The fight against piracy in the straits
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Piracy Hotspots: Latin America
• Attacks in Central and South America more
than doubled in 2009 with 37 attacks
compared to 14 in 2008.
• Peru had the third most dangerous port in the
world in 2009
• Most piracy incidents in South America
involve robbery with knives or swords
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
IMSN Regional Assessment
• See Handout 1
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
End Part 1
Questions?
10 minute break
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Maritime Laws &
Conventions
53
Relevant Codes
• International Maritime Organization
• Safety of Life at Sea (SOLAS)
• International Ship and Port Facility Security
(ISPS) Code
• Suppression of Unlawful Acts (SUA)
Convention
• 33 CFR (US)
• Why are they so important to you and how
can they help you fight piracy attacks
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Coast Guard Directive 104-6
• The main reason we are here!
• Requires Anti-Piracy measures to be included
in the Ship Security Plan
• Evasive maneuvers, cooperation with coalition
forces, etc
• Also specifies hardening the ship against
unauthorized boarding
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Law
• International Maritime Organization (IMO)
– IMO stance at this time is no guns on ships
• Why?
– Legal issues
• Captain’s authority
• Training
• Storage of weapons
• What happens to you and the ship if you shoot someone
• Other countries laws that will not allow weapons
• What court will you be tried in?
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
United States Maritime Law
• The U.S. Coast Guard allows weapons on
board a ship under the personal use
exemption in Port Security Advisory 4-09
(Rev. 1)
• The United States also affirms mariners’ right
to self defense in Port Security Advisory 3-09
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Safety of Life at Sea (SOLAS)
• The SOLAS Convention
– Regarded as the most important of all international
treaties concerning the safety of merchant ships.
– SOLAS amendments for security already in place
– Ship’s Security Plan now must have upgraded
Anti-Piracy measures in place.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
(SOLAS): Chapter XI-2
• Entered into force July 1, 2004
• Regulation XI-2/3: enshrines the International Ship
and Port Facilities Security Code (ISPS Code).
– Security / MARSEC Levels
• These are set by the contracting governments
• Enhanced measures can be put in place by the Captain of
the vessel
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
(SOLAS): Chapter XI-2
• Regulation XI-2/8: confirms the role of the
Master in exercising his professional judgment
over decisions necessary to maintain the
security of the ship. It says he shall not be
constrained by the Company, the charterer or
any other person in this respect.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
(SOLAS): Chapter XI-2 (continued)
• Regulation XI-2/5: requires all ships to be
provided with a ship security alert system,
fitted by 2006.
– Ship security alert system shall initiate and transmit
a ship-to-shore security alert to a competent
authority designated by the Administration,
identifying the ship, its location and indicating that
the security of the ship is under threat or it has
been compromised.
– Capable of being activated from nav. bridge and
one other location.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
ISPS Code: Relevant Definitions
• Ship security plan: A plan developed to ensure the
application of measures on board the ship, designed
to protect persons on board, cargo, cargo transport
units, ship’s stores or the ship from the risks of a
security incident.
• Ship Security Officer: The person on board the ship,
accountable to the master, designated by the
Company as responsible for the security of the ship,
including implementation and maintenance of the ship
security plan, and for liaison with the company
security officer and port facility security officers.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
ISPS Code: Relevant Definitions
• Company security officer: The person designated
by the Company for ensuring that a ship security
assessment is carried out; that a ship security plan is
developed, submitted for approval, and thereafter
implemented and maintained and for liaison with port
facility security officers and the ship security officer.
• If he or she is on shore they will be the first ones to
send help in the event that you are captured.
• Your company should have a plan in place for this
and it should be drilled as well.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Other Reading
• ISPS Code Part A (International)
– Part B provides guidance on how to read Part A
• 33 CFR (USA-specific)
– Coast Guard NVICs provide guidance on compliance
• MSC Circular 623 Rev 3.
– Provides guidance on how to deal with pirate attacks or
attempted attacks
– Similar information is provided by this course
• USCG Port Security Advisory 2-09
– Provides similar information on best practices during a piracy
attack
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Questions?
Let’s take 10 minutes
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Assessing
Shipboard Risks
and Identifying
Vulnerabilities
66
Vessel Types
• Tanker
– Chemical Tanker
– Oil Tanker
– Liquefied Natural Gas (LNG) Tanker
• Cargo ships
–
–
–
–
General Cargo
Container ship
Bulk Carrier
Roll-on-Roll-off (RORO)
• Special Purpose
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Small Freighters are one of the most
vulnerable vessels while in piracy waters
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Ultra Large Crude Carrier (loaded)
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Ultra Large Crude Carrier (unloaded)
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Bulk Carrier
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Liquefied Natural Gas (LNG) Tanker
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Cargo Ship
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Panamax Freighter
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
TYPICAL ATTACK PROFILES AND
LESSONS LEARNED
• In 2009, the top three types of ships most
attacked were:
– Bulk Carrier (109)
– Container (63)
– General Cargo (53)
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
TYPICAL ATTACK PROFILES AND
LESSONS LEARNED
• Successful attacks illustrate the following
common vulnerabilities
–
–
–
–
Low Speed
Low Freeboard
Inadequate Planning & Procedures
Visibly low state of alert or lack of evident selfprotective measures
– When the ship looks as if it will respond slowly or
not at all
– Ship did not heed piracy warnings.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
TYPICAL ATTACK PROFILES AND
LESSONS LEARNED
• Frequency of attacks is lower during bad
weather
• Frequency of attacks is lower at night
• Success of attacks is lower when the ship
takes definitive action
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Somali Pirates boarding a vessel
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
How do they get on board the ship
• Pirates use Grappling hooks and rope or sometimes
ladders to gain access while a ship is underway
(This is the typical tool that they use)
– By coming at the ship from 4 points it makes it
easy for them and hard for you
• At anchor - climbing the anchor chain
• Along side - the lines can be used to gain access
• A successful pirate attack may only take 15 minutes!
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Methods to Detect,
Deter and Defend
against Piracy
Attacks
81
SITREP
• Coalition forces are operating near Somalia
– Do not expect help every time or anytime, it is too
big of an area for them to patrol completely
– It doesn’t hurt to call for reinforcements though.
• According to the World Peace Foundation, the
combined maritime operations of NATO and
allied forces disrupted 411 pirate operations of
706 encountered; delivered 269 pirates for
prosecution.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Relevant Organizations
• To report a piracy attack:
– Call the IMB Piracy Reporting Center
– Call the UKMTO Merchant Vessel Reporting
Center
• See Handouts 4 & 5
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
UK Royal Navy Maritime Trade
Organization
• Established in the Middle East as an
extension of the Royal Navy
• Home Office (UK)
–
–
–
–
+971 50 552 3215 (CO)
+971 50 552 6007 (2iC)
Fax: +971 4 306 5710
Email: ukmto@aim.ae
• RFA WAVEKNIGHT (operating near Somalia)
– 0044 207 807 8657
– Email: 432-ops@a.dii.mod.uk
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
UKMTO
• IMB Recommends calling the UKMTO first!
• Handout 4
– Contact Information
– Reporting Format and Reference Codes
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Self Defense
• The US Coast Guard authorizes the use of
force in the defense of one’s self or others
• Port Security Advisory 3-09
– Authorizes the use of force (including deadly force)
in the event of imminent danger
• Defines imminent danger as impending bodily harm or
death
• A pirate firing an AK-47 at you qualifies as imminent
danger!
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Common Defensive Methods
•
•
•
•
Fire Hoses
Use of dummies (fake sentries)
Evasive Maneuvers
Multilingual Signs stating:
– High voltage defense
– Bad water discharge
– Security Forces on board
•
•
•
•
•
•
•
•
Molotov Cocktails
Razor wire
LRAD
Electrified hand rails
Rat Guards
Additives into the H2o defense system
What else? What would you do?
All of these are good ideas, USE ANY MEANS NECESSARY
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Anti Piracy Strategies
• Keeping the crew & ship safe at all times
– Provide a strong “Rally Point” which allows the crew to be out
of harms way and still control the ship.
– Good accountability of all crew members
– Keeping the threat off the ship!
• Know where you are and how quickly help can arrive
– Communications
– Enhanced watch
• Active and passive Non-lethal deterrents
• Correct Mindset
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Defensive Mindset
• A good mindset is the most important aspect
of the system
– Staring at a camera can be boring but remember,
you are keeping yourself and your crew members
safe
– Everyone has a role to play
– It only takes a lapse by one person to lose the ship
– Become a hunter
– Work out scenarios in your mind when on watch
– Focus on your family and your fellow crew
members
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
The IMSN Defensive Plan
• Make the vessel a hard target
• Three layered security as the new SSP:
The 3 D’s
• “Detect”
• “Deter”
• “Defend”
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Monitoring and Control preparations
• Key points on the ship that require control of
access
–
–
–
–
All low freeboard rails
The poop deck
Houser pipe
The Pilot ladder (remember that the ladder can
make a good thing to hook onto)
– At anchor - security lock down measures
• At the fringe of the hot zone, start running at
MARSEC III measures
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Detection: Radar & Watch
• Radar watch enhancement
–
–
–
–
–
Outer barrier
Time set that fast moving vector will reach ship
Time to bingo
Time to rally point
Time until coalition ships arrive
• Communications
– This should be done before entering the hot zone.
– All bridge crew should know how to get the word out for
coalition help
– Remember that others are always listening in!
– SSAS is to be activated
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Onboard Radar
• Operation
– Use onboard Automatic Radar Plotting Apparatus
(ARPA) to set up grids with automatic acquisition
• ARPA should already be onboard
• Provides a vector based on true course and speed
• Use in addition to the IMSN EYEON Radar
– Set one radar at the 6-12 mile range and one to a
3 mile range
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Radar
• There is a feature on the ARPA called after
glow which is a quick way to see how a vessel
is moving.
– Puts a glow behind the target and it mimics a wake
of a boat
– A fast boat will have a longer glow (or wake)
behind it.
• Also you can set up an automatic acquisition
area around the ship which will automatically
tag any target which comes into the zone.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Radar issues
• Sea clatter
– Rough seas may blot out a small vessel on the
radar
– Fortunately Pirates tend to not like rough weather
but never assume anything
Problems/concerns/malfunctions etc
– Small wooden boats are not good reflectors
– Radar may need more time to sweep the set grids
than you have with a fast mover
– Technology can always break down
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Radar Issues
• Radar can not show the intent of the small
vessel, whereas the IMSN CCTV system can
allow the posted watch to not only see the
inbound vessel, but tell the difference
between fishing gear and AK-47’s.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Detection: EyeOn CCTV
• Watch enhancement & vigilance in the hot
zone
– EyeOn CCTV system
•
•
•
•
Infrared High Definition Visual equipment
High Definition pan/tilt/zoom
Thermal imaging
Recording for documentation purposes
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
EYEON Systems CCTV
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Watch Keeping Techniques
• Enhanced security patrols
– Bow
– Stern
– Roving
• No more than 4 hours per team
• TEAM should mix up the duties between roving and post
every 30 - 45 mins
• CCTV & Radar
– Technology can malfunction, your own eyes are
the best watch keeping technique you have
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Watch Keeping Accountability
• Make a roster for watch times
• Report everything out-of-the-ordinary you see,
no matter how insignificant
– A small boat can either be a fisherman or a pirate
in disguise
• Keep a record of your watch
– Even if it says “nothing to report”
• Pass on a SITREP every time!
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Detection & Deterrence: Watch
keeping, Manning, and Duties
• Planning, drills and extra training by the SSO
• 3rd party due diligence training by onboard security
teams
• Enhanced deck patrols
• Use of a Bow and Stern watch
• Use of dummies (i.e. scarecrow strategy)
• Lighting (Any rail lights or search type lighting)
• Communications for the watch
• Onboard security teams
• Use of ship’s PA system for hailing & auditable
sounds to create confusion to the pirates
• Fortification of the ship
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Deterrence
• Evasive ship maneuvers
• Visible defenses
– Triton Shield Wall-of-Water device
• Visible lockdown procedures
– Accountability of every crew member inside the
safe house.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Deterrence: The Triton Shield Device
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Deterrence: Security Measures
• Enhance vessel security plan to include “AntiPiracy Measures”
• Identify new lockdown rules in the plan
– The ship must be totally impenetrable from
the outside
– One way in and one way out
– Set times to RP
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Deterrence: Security Measures
• IMSN’s base Anti-Piracy plan calls for the
bridge to be the rally point in the event of an
attack
• At “Bingo Time” all crew members should be
heading for the RP and be accounted for in
the fortified safe room
• When Radar & CCTV watch calls “Danger
close” This will mean that the pirates have
made it close to along side.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Defense: Lockdown and Secure RP
• Defenshield will provide armor to make the
bridge a security shelter
– Armored glass panes to stop AK-47 rounds
– Screens to stop RPG rounds
• Clip-on armor and mobile fighting positions
are also available for other areas on the ship
• Ballistic blankets to black out the bridge so
pirates can’t see you!
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Defenshield
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Defenshield Overview
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Defense: Security Team
• Security Element Splits Crew into 2 TEAMS with 1
OVERWATCH position
• OUTSIDE (Bravo Team)
• This team will hands on check to see that the ship is locked from
out side
• They will also see that the TRITON SHIELD is running correctly
• This TEAM will E&E to the starboard bridge wing and lock in
with the rest of the crew in safe house
• Remember the follow two things:
– Make sure that you have been accounted for to the bridge
command
– Once inside the safe house if there is gun fire, stay low and
out of the way of the security teams
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Defense: Security Team
• INSIDE (Alpha Team)
• This team will lock down the internal doors and create a
trap for the pirates sucking them into the last line of
defense
• Team will E&E to the interior stair well leading to the
bridge where they meet up with the rest of the crew in the
safe house
• A sniper OVERWATCH will take the high ground and
provide the eye in the sky. This operator will be the last
person inside RP
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Security Team
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Detect, Deter, Defend
Secure RP
Control
Accountability
Visible Watchkeeping
Visible Lock-down Drill
Visible Defenses
Physical Deterrents
Cameras
Radar
Enhanced Watchkeeping
Communications
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Defend
Deter
Detect
Questions?
Let’s take 10 minutes
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Conducting AntiPiracy: Training,
Drills, and
Contingency
Planning
116
Our Drill Scenario
We will run this just like fire or abandon-ship drills,
remember that the best drills are remembered if the
“KISS SYSTEM” is in place
Always hold a debriefing session immediately after
each drill to gather input and lesson learned.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
The Drill: Assignments
• Step 1
– Break the ship’s crew into 2 different groups
• Persons with duties (who will conduct the lock down)
– A TEAM (Inside crew lock down)
– B TEAM (Outside lock down and Triton Shield Device
setup)
• Person with no duties (Moves directly to RP)
– Set muster points for all teams
• Persons without duties will go directly to the RP
– Run the ship in MARSEC Level III
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
The Drill: Standard Procedures
• Step 2
– Crew will be assigned enhanced security watch
– Bow and Stern Watches will be in place, keeping
the personnel in a safe, efficient schedule
– Personnel will be on roving patrol
– Anti-Piracy system and measures will be prepared
and ready for use
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
The Drill: Attack Imminent
• Step 3
– The camera system or a watchmen detects a
suspicious craft moving toward the ship
– Warning horn will sound (5 five sec blasts)
– Bridge command will report on PA and on radio
direction that the incoming vessel is on, and also
“BINGO TIME”
– All teams will meet at their muster point and begin
the drill
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Crew Response, Movement, Muster
• Everyone must know their team and their
RP
• YOU KNOW YOUR SHIP – give input when
plans are made to help ensure an efficient
and complete lock down
• Assign someone to be responsible for the
crew RP accountability
– This is a key point. If captain has all his men
Pirates are empty handed!
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
The Drill: Attack Imminent
– A TEAM will meet up and start the internal lock
down
• TEAM Leader must have a good accountability of his
team at this point
• Remember that you are running at M-3, most doors will
be locked
– B TEAM will double check all external doors by
hand and all external hatches
• TEAM Leader must have a good accountability of his
team at this point
• Your running at M-3, but DO NOT assume that all doors
are locked
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
The Drill: Rally Point
• Step 4
– Starboard side bridge wing will be the only outside
entrance to the bridge (RP)
– After all teams are inside the bridge B TEAM
security leader will secure that door
– Comms will be sent to all that can help
– Ship will steam towards the coalition for help
– Time will be called on the drill
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
The Drill: With Security Personnel
• Each team will have a uniformed, security
TEAM leader who will give out assignments
– Call signs will be “Alpha Leader” and “Bravo
Leader”
• Crew members will still be in charge of locking
doors, the security team will provide cover
• Security elements will be on roving patrol
• There will be a sniper on the bridge wing to
observe and provide cover
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
The Sniper's Duties
• Will be in the highest point on the ship, posted
under Defenshield fighting position
• Job
– Eyes on perimeter
– Give off 1st sign of a deterrent to the pirates
– Give cover support to the TEAM members that are on
outside moving to the RP
– Repel any boarders that may breach the perimeter of the
ship
• “Eagle 1” will be the last man into the RP
• Bridge watch reports any close-by vessels to “Eagle
1” and vice-versa
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
In Review:
• Team members will lock down their preassigned doors and hatches while IMSN team
leaders provide cover
• One team member will keep the headcount
and ensure accountability in the rally point
• Persons without any other duties will proceed
to the rally point immediately
• The Captain will sound the alarm, alert the
UKMTO, alert the IMB, alert the company, hit
the SSAS, and initiate serpentine movements
toward coalition forces
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Contingency Plans
• Plan for as many things as possible to go wrong
– Safe room needs:
•
•
•
•
•
•
Fortification of the safe room
Food & Water for 3 days (MREs)
MED supplies for 27 people
CCTV for the outside and the close quarters
Head facilities
Something to do or read
• Every situation is different
– What are some examples of contingency plans?
• The key to a successful mission is the ability to think
on your feet
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Considerations for Certain Ships
• Two-house ships may require two rally points.
• Some ships do not have automatic power
plants.
– IMSN may implement two rally points in this case.
• The IMSN team will split up to guard both rally
points.
• Fortifications and cameras will be
implemented on a ship-by-ship basis.
• IMSN will fully adjust the drill as is necessary.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Defensive Tactics Seminar
• Useful tactics such as breaks, holds,
handcuffing and other security procedures
• IMSN’s policy is that crew members should
not engage pirates directly
– Always have help and always let someone know
where you are
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Defensive Tactics
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Weapons Familiarization Seminar
• Familiarization with operation, break-down
and safe handling of firearms
• IMSN’s policy is that crew members should
not carry firearms individually are engage
pirates in firefights
– Familiarization helps with threat recognition and
can also prevent accidents if a crew member finds,
picks up, or otherwise handles a weapon
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Questions?
Let’s take 10 minutes
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
What do I do if?
Good procedures to follow if…
136
…If You are Taken Hostage
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Pirate Hostages: Then and Now
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Pirate Hostages: Then and Now
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Keith Stansell
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Hostage Considerations
• First steps
– Run away if you can; stay calm if you can't.
– According to security experts, your best chance for escape
is almost always during the initial phases of the hijacking.
• How to act
– once you're in your captor's custody, remain courteous
and comply with instructions. Don't get hostile or lose your
temper: Aggression is only likely to result in punishment.
– become a "gray person“ neither resistant nor overly be
submissive. That way, terrorists are less inclined to single
you out for punishment.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Hostage Considerations
• Try to get the hostage taker to see your worth
– You have a family
– You work hard for a living too
– You might have a medical condition that could
render you very ill or dead. How much money can
they get then?
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Hostage Considerations
• It's important to remember that people
are working to get you released.
• The feeling of hopelessness works
completely against you.
• Try to stay positive and help keep others
in the same frame of mind.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Hostage Considerations
• Plans should be in place at your home port for
an event like this
• Are these plans in place?
• Ask questions of your Master, CSO and your
union.
• GET ANSWERS!
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Dealing with rescuers as a hostage
• Don’t be surprised if you are treated like a bad guy
– Get to the deck as fast as you can
– Follow the commands that are given
• Do not approach the rescuer in a fast or excited
motions that may be taken as a hostile action
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
…You Take Prisoners
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Proper handling of prisoners
• Remember the essentials to life
–
–
–
–
Food, Water, Shelter
Exercise (Controlled)
Bathroom (Doesn’t have to be private)
Remove emotions and add duty
• Treat a captured pirate the same way you
would treat a stowaway
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Proper handling of prisoners
• Fourth Geneva Convention Part III
– Relevant guidance on humane prisoner
treatment
– You are not necessarily bound by Geneva
Conventions but they provide helpful standards
• Don’t put yourself or your company in a bad
position by mistreating a prisoner
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Holding Prisoners
• Prisoners should be kept in the brig
– Follow standard procedure
– Make sure there is nothing in the room to use as a
weapon
• Prisoners should be strip-searched
– You should return clothes and personal effects to
them
• Prisoners should be properly bound
– Remember that your safety and theirs relies on
subdued hands and feet
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Holding Prisoners
• Prisoner movement
– Be sure that you’re truly in control of the actor
• Handcuff prisoners through bars or cracked
door
– Do not enter the brig with them
• Prisoners should be guarded
– Divide watch times between the crew
• Prisoners should be split up
– Guarding multiple prisoners will be an IMSN
problem
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Reporting and Transfer
• Call the UKMTO and report the situation
– They will be able to put you in touch with the
proper authorities or coalition forces
– Start a report ASAP as you will rapidly forget
important parts.
• All crew involved should be allowed to sit alone to re-cap
the events.
• Sometimes adding 3 reports together makes the best total
picture
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
…Someone gets hit.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
…Someone gets Hit
• Remember the first rule…THINK!
– Is the scene safe to poke you head out ?
• Your 1st Aid training in regards to safe
handling of blood, may not be time efficient in
some cases
• Stay Calm
– Stick to your own tasks unless otherwise directed.
– Make sure the doors are locked and get to the safe
room.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
…Someone gets Hit
• IMSN team members will direct you in the
event of a casualty.
• You may have to make hard decisions
– Don’t let fear get the better of you but don’t try to
be a hero either.
– Other people are still counting on you to do your
job.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
In conclusion PLEASE REMEMBER
• Pirates:
– Appear to be well armed, but truly have old and outdated
weapons and equipment
– Might outnumber you
– THINK that they have the element of surprise
– Don’t realize that you are ready for them
• The Mariner:
–
–
–
–
–
The ability to look like and be a hard target
REALLY have the element of surprise
The great advantage of fighting from the higher ground
The ability to fall back to a secure position
The ability, through training and drills, to control the fear that
the pirates want to put on you
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Thoughts
• Never assume you won’t be attacked, plan on
fending off pirates anywhere, anytime.
• Rely on your team to be prepared and rely on
yourself.
• When we excel in defense, it is because the
enemy can not decide how to attack.
– If they have to re-think their plans, pirates tend to
call off their attack.
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED
Thank you for your time and
service
“Remember that you’re not captured or
dead until YOU SAY SO!”
“Don’t give up the ship!”
International Maritime Security Network, LLC © 2010 ALL RIGHTS RESERVED