SlideShare a Scribd company logo
Shore-based Ship
Security Team Training
Course
Course Objective
• At the end of the course, the trainee will
be able to demonstrate knowledge and
understanding of the requirements for
Ship Security Plans
Course Topics
• Knowledge of current security threats and
patterns;
• The meaning and consequential
requirements of the different security levels;
• Knowledge of the emergency procedures and
contingency plans;
• Recognition and detection of weapons,
dangerous substances and devices;
• Recognition on a non discriminatory basis, of
characteristics and behavioural patterns of
persons who are likely to threaten security;
• Techniques used to circumvent security
measures;
• Security related communications;
• Operations of security equipment and
systems;
• Testing, calibrations and whilst at sea
maintenance of security equipment and
systems;
• Inspection, control, and monitoring
techniques; and
• Methods of physical searches of persons,
personal effects, baggage, cargo and ship’s
stores (including practical exercises)
US Coast Guard and IMO
requirements
Objective: at the end of the topic, the
trainee will be familiar with USCG and
IMO requirements for Ship Security
SOLAS, 1974
as amended
Amendments:
• Chapter XI-2
Special measures to enhance maritime
security
• Annex 1
Adoption of the International Code for
the Security of Ships and Port Facilities
• Annex 1 Part A
Mandatory requirements regarding the
Provisions of Chapter XI-2 of the International
Convention for the Safety of Life at Sea,
1974, as amended
• Annex 1 Part B
Guidance regarding the Provisions of Chapter
XI-2 of the Annex to the International
Convention for the Safety of Life at Sea, 1974
as amended and Part A of the Code
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
USCG NVIC 10-02
Navigation and Vessel Inspection Circular
(NVIC) No. 10-02
Security Guidelines for Vessels
The NVIC establishes new guidelines for
developing security plans, and
implementing security measures and
procedures.
Chapter XI-2 Regulation 2
• Applies to:
a. the following types of ships engaged on
international voyage:
1. Passenger ships, including high-speed
passenger craft;
2. Cargo ships, including high-speed craft, of
500 gross tonnage and upward;
3. Mobile offshore drilling units; and
b. port facilities serving such ships engaged on
international voyages
SOLAS, 1974 as amended
• Chapter V Safety of Navigation
Regulation 19 - Carriage requirements for
shipborne navigational systems and
equipment
“Ships fitted with AIS (Automatic Identification
System) shall maintain AIS in operation at all
times except where international agreements,
rules or standards provide for the protection
of navigational information”
SOLAS, 1974 as amended
• Chapter XI-1
• Regulation 3 – Ship Identification number
The ship identification number shall be
permanently marked with the prefix “IMO”
followed by the 7-digit number.
SOLAS, 1974 as amended
• Regulation 5 – Continuous Synopsis
Record
“the Continuous Synopsis Record is
intended to provide an on-board record
of the history of the ship”
Ship Security Alert System
• Regulation 6 states that:
“ All ships shall be provided with a ship
security alert system be capable of
being activated from the navigation
bridge and in at least one other location”
cont.
Once activated, the system should
transmit a ship-to-shore security alert to
a competent authority designated by the
flag administration. The alarm should
identify the ship and its location and
indicate that the security of the ship is
under threat or has been compromised.
On board the ship, this must not raise
any alarm nor any alarm must be send
to other ships in vicinity.
ISPS certificate
• The ship has to carry an International Ship
Security Certificate indicating that it complies
with the requirements of Chapter XI-2 and
Part A of ISPS Code. Part A of this Code
includes provisions relating to the verification
and certification of the ship’s compliance with
the requirements on an initial, renewal and
intermediate verification basis.
A. security threats and patterns
Security Threats and
Patterns
Objective: at the end of the topic, the
trainee will be familiar with security
threats and it’s patterns
The World will never be the
same again
Background
• In the aftermath of Sept. 11, 2001, the Commandant
of the US Coast Guard reaffirmed USCG Maritime
Homeland Security.
• In November 2001, the Commandant of USCG
recommended to IMO the comprehensive security
requirements including amendments to SOLAS and
the new ISPS Code
• In December 2002, IMO adopted the SOLAS
amendment and the ISPS Code
• By 1st of July 2004, both the ISPS Code and related
SOLAS amendments shall entry into force
Procedure and Response to possible
Threats
The Ship Security Plan must include
procedures and responses to possible
threats. These procedures might include the
following actions:
 Securing all access to the ship to prevent
intrusion;
 Performing emergency shutdown of main
engines to prevent unauthorized operation;
 Securing non-critical operations to focus
attention on response;
 Alerting ship and shore-side authorities of an
incident;
 Rendering assistance to a nearby ship
undergoing an unlawful act that threatens its
security;
 Responding to the detection of stowaways or
intruders;
 Repelling boarders;
 Addressing a malfunction of on board security
equipment
 Screening the underwater hull or search the
ship in response to bomb threats;
 Specifying the kind of communications to use
in the event of a breach of security, an
unlawful act, or other emergency;
 Coordinating with waterfront facility response
procedures.
Procedures and Response to
Possible Threats
“Threats” to the Maritime
Industry
1990 2001
Theft Illegal Drugs
Piracy Criminal Acts
Illegal Drugs Stowaways
Stowaways Piracy
Terrorism Terrorism
A. security threats and patterns
The Threat to the Maritime Industry:
Assessment of Likelihood
A. Bomb threat or hoax
 Disgruntled Employee/Passenger
 Mentally Unstable Person
 Politically Motivated Groups
B. Sabotage (including ARSON)
 Employee/passenger
A. security threats and patterns
C. Bomb Attack (Port Facility)
 Terrorist Groups
 Politically Motivated Groups
D. Bomb Attack (Ship)
 Internal
 External
 Terrorist Groups
USS Cole in ADEN 2000
E.Simulated Armed Attack
 Mentally Unstable Person/Passenger
F. Piracy (only certain areas)
 Criminal gangs
G. Hijacking/Armed Attack
 Terrorist Groups
H. Smuggling
 Employee/Passenger
A. security threats and patterns
Piracy Maps 2001
Piracy Maps 2002
PIRACY maps 2003
Achille Lauro (1985)
• 07/10/85
•ABU ABBAS
Palestine
Liberation
Front
A. security threats and patterns
I Cargo Tampering
 Crew/passenger
J. Stowaways
 Politically motivated groups
 Smugglers
K.Hostage Taking
 Politically motivated groups
 Terrorist groups
 Criminal gangs
A. security threats and patterns
L. Vandalism
 Crew/ Politically motivated groups
M. Transporting weapons of mass
destruction
 Politically motivated
groups/Terrorist/Criminal gangs
N. Use of the vessel to carry perpetrators
and their equipment
O. Use of a vessel as a weapon
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
Designated Foreign Terrorist
Organizations (August 2002)
1. Abu Nidal Organization (ANO)
a.k.a. Fatah Revolutionary Council, Arab
Revolutionary Brigades, Black September, and
Revolutionary Organization of Socialist Muslims
Has ability to operate worldwide incl. Middle East,
Asia , and Europe
2. Abu Sayyaf Group (ASG)
Primarily operates in the southern Philippines,
occasionally in Manila and has expanded to
Malaysia. Engages in bombings, assassinations,
kidnappings, and extortions.
3. Armed Islamic Group (GIA)
Aims to overthrow secular Algerian regime and
replaces it with Islamic state. Frequent attacks
against civilian and government workers.
4. Aum Supreme Truth (Aum)
a.k.a. Aum Shinrikyo, Aleph
Cult aimed to take over Japan, then the world.
Located in Japan unknown numbers has surfaced
in Russia.
5. Basque Fatherland and Liberty (ETA)
a.k.a Euzkadi Ta Askatasuna. Aim of establishing
an independent homeland based on Marxist
principles.Bombings and assassinations of
Spanish Government officials. Operates primarily
in the Basques autonomous regions.
6. Al-Gama’a al-Islamiyya (Islamic Group, IG)
Egypt’s largest militant group and has external
wing with worldwide presence. Specialized in
armed attacks against Egyptian security and
other government officials. Operates in Egypt and
has worldwide presence incl. Sudan, UK,
Afghanistan, Austria and Yemen
7. HAMAS (Islamic Resistance Movement)
Palestinian branch of Muslim Brotherhood.
Large-scale suicide bombings against Israeli
civilian and military targets. Primarily operate in
the occupied territories, Israel.
8. Harakat ul-Mujahidin (HUM)
Islamic militant group based in Pakistan and
Afghanistan that operates primarily and
conducts insurgent and terrorist activities in
Kashmir.
9. Hizballah (Party of God)
a.k.a. Islamic Jihad, Revolutionary Justice Org.,
Org. of the Oppressed on Earth, and Islamic
Jihad for the Liberation of Palestine.
Operates in Bekaa Valley, Beirut, and
Lebanon. Has established cells in Europe,
Africa, North and South America, and Asia.
Involved in numerous anti-US terrorist attacks
including suicide bombings, kidnappings, and
hostage takings.
10. Islamic Movement of Uzbekistan (IMU)
Goal is the establishment of an Islamic state in
Uzbekistan. Based in Afghanistan and
Tajikistan and operates in the same area.
Bombings and Hostage takings.
11. Al-Jihad (Egyptian Islamic Jihad)
Egyptian Islamic extremist group and close
partner of Al-Qaida org. Primary goals are to
overthrow Egyptian government and attack US
and Israeli interests in Egypt and abroad.
Network includes Yemen, Afghanistan,
Pakistan, Sudan, Lebanon, and UK.
12. Kahane Chai (Kach)
Goal is to restore the biblical state of Israel. Harass and
threaten Palestinians, Arabs, and Israeli governments
13. Kurdistan Workers Party (PKK)
Goal is to establish and independent Kurdish state in
southeastern Turkey. Targets are Turkish government
diplomatic and commercial facilities, and tourist industry.
14. Liberation Tigers of Tamil Eelam (LTTE)
The most powerful group in Sri Lanka with a cause of
establishing an independent Tamil state. Battlefield
insurgency, terrorism, suicide bombings and narcotics
smugglings.
15. Mujahedin-e Khalq Organization (MEK or
MKO)
Anti-western activity with attacks on the
interests of the clerical regime in Iran and
abroad.
16. National Liberation Army (ELN) – Colombia
Kidnappings, hijackings, bombings, extortion,
and guerrilla war. Operates in Colombia and
Venezuela border regions.
17. Palestine Islamic Jihad (PIJ)
Committed to creation of an Islamic Palestinian
state and the destruction of Israel through holy
war. Primarily operates in Israel and occupied
territories.
18. Palestine Liberation Front (PLF)
An Abu Abbas-led faction formerly based in Tunisia now
based in Iraq.
19. Popular Front for the Liberation of Palestine-General
Command (PFLP-GC)
Violently opposed to Arafat’s PLO. Dozens of attacks in
Europe and Middle East. Bases in Lebanon.
20. Al-Qaida
Established by Usama Bin Ladin. Current goal is to
establish a pan-Islamic Caliphate throughout the world
by working with allied Islamic extremist groups to
overthrow regimes it deems “non-Islamic” and expelling
Westerners and non-Muslims from Muslim countries.
21. Revolutionary Armed Forces of Colombia
(FARC)
Military wing of the Colombian Communist
Party. Involves in kidnappings, bombings,
murder, extortion, hijackings, as well as guerilla
actions against Colombia.
22. Revolutionary Organization 17 November
(17 November)
Radical Greek leftist group with anti-Greek
establishment, anti-US, anti-Turkey, and anti-
NATO. Operates primarily in Greece.
23. Revolutionary People’s Liberation
Army/Front (DHKP/C)
a.k.a. Devrimci Sol (Revolutionary Left), Dev
Sol. A splinter faction of the Turkish People’s
Liberation Front that espouses a Marxist
ideology and is anti-US and anti-NATO.
Conducts attacks in Turkey
24. Shining Path (Sendero Luminoso)
One of the most ruthless terrorist groups in the
Western Hemisphere of a Maoist doctrine.
Conducted bombings and selective
assassinations in Peru.
25. Real IRA (RIRA)
a.k.a. True IRA. Dedicated to removing British
forces from Northern Ireland and unifying
Ireland. Activities such as bombings,
assassinations, smugglings, extortion, and
robberies. Operates in Ireland and UK.
26. United Self-Defense Forces of Colombia
(AUC)
Supported by drug traffickers with activities of
assassinating suspected insurgent supporters
to engaging guerilla combat units. Operates in
Colombia.
27. Communist Party of the Philippines/New
People’s Army (CPP/NPA)
Communist armed groups that operates in
Philippines involved in various terrorist
activities such as extortion, liquidation,
bombings, etc.
28. Al-aqsa Martyrs Brigades
29. Asbat Al-Ansar
30. Lashkar-e-Tayyiba
31. Revolutionary Nuclei (formerly ELA)
32. Salafist Group for Call and Combat (GSPC)
33. PFLP-General Command
34. Jaish-e-Mohammed (Army of Mohammed)
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns
A. security threats and patterns

More Related Content

PPTX
Security Training for Seafarers with designated Security duties
PPT
Anti ship piracy training
PPT
POWERPOINT_PRESENTATION_SSO.ppt
PDF
Ship Security Training Manual (Sample)
PPTX
Isps code
PPT
ISPS REVIVE
PPT
ISPS: Security Awareness Training / Designated Security Duty
PPTX
Isps code
Security Training for Seafarers with designated Security duties
Anti ship piracy training
POWERPOINT_PRESENTATION_SSO.ppt
Ship Security Training Manual (Sample)
Isps code
ISPS REVIVE
ISPS: Security Awareness Training / Designated Security Duty
Isps code

What's hot (20)

PDF
Personal safety on deck
PDF
Emsa advanced ship security training 18 20 may 2016 web (1)
PDF
A Short Note on ISPS Code
PPT
Chemical tankers
PPT
Intro to basic safety and seamanship2
PDF
Maritime (isps code) regulations 2014
PPTX
STCW Basic Safety Training
PPT
D. weapons and dangerous substances
PPTX
Solas Presentation
PPTX
ISPS CODE.pptx
PPT
Safety officer on ship
PDF
PDF
Personal Survival and Social Responsibilities(PSSR)
PDF
Maritime Security and Security Responsibilities
PDF
The four pillars of international maritime law
PDF
Safety in mooring Operations
PDF
On board safety
PDF
Maritime law and solas
Personal safety on deck
Emsa advanced ship security training 18 20 may 2016 web (1)
A Short Note on ISPS Code
Chemical tankers
Intro to basic safety and seamanship2
Maritime (isps code) regulations 2014
STCW Basic Safety Training
D. weapons and dangerous substances
Solas Presentation
ISPS CODE.pptx
Safety officer on ship
Personal Survival and Social Responsibilities(PSSR)
Maritime Security and Security Responsibilities
The four pillars of international maritime law
Safety in mooring Operations
On board safety
Maritime law and solas
Ad

Viewers also liked (20)

PPSX
Omamarine
PDF
A pocket-guide-to-safe-confined-space
PDF
Uscg general deck questions master's license (question)`
PPT
Internal audit ctpf
PDF
Ballast Water Management Convention
DOCX
Engine quiz
PPTX
Especialidades y niveles_por_actividad_desempenada_a_bordo
PPSX
Port operations & management slideshow
PDF
ISPS Code
PDF
pfso cert english.PDF
PDF
FIRE SAFETY SYSTEM
PPT
Somalia Pirates
 
PPT
Ship planning part i
PPT
Risk assessment presentasi
DOCX
Maritime security operative isps
PDF
Ism code reminder lesson
PPT
Somali pirates
PDF
Training isps codeon board mv. ctp fortune
PPSX
OPA vs MARPOL
Omamarine
A pocket-guide-to-safe-confined-space
Uscg general deck questions master's license (question)`
Internal audit ctpf
Ballast Water Management Convention
Engine quiz
Especialidades y niveles_por_actividad_desempenada_a_bordo
Port operations & management slideshow
ISPS Code
pfso cert english.PDF
FIRE SAFETY SYSTEM
Somalia Pirates
 
Ship planning part i
Risk assessment presentasi
Maritime security operative isps
Ism code reminder lesson
Somali pirates
Training isps codeon board mv. ctp fortune
OPA vs MARPOL
Ad

Similar to A. security threats and patterns (20)

PDF
ISPS_Code_Basic_Course.pdf
PPT
POWERPOINT_PRESENTATION_SSO.ppt
PDF
POWERPOINT_PRESENTATION_SSO.pdf
PPT
IMO ACTIVITIES TO ENHANCE MARITIME SECURITY .ppt
PPTX
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
PPT
ISPS 1 INTRODUCTION to security training.ppt
PDF
Management of shipping (1)
PPTX
Environmental presentation
PDF
A short note on SOLAS 74
PPTX
Solas assigment
PPT
Exceeding Expectations: Port Readiness Sheldon anthony
PPTX
Solas assigment
PPTX
Effective Management on Safety, Security and Environmental Protection at Sea
PPT
Lecture-9-Maritime-Organizations-ppt.ppt
PDF
14 ircha
PPTX
SOLAS (Safety of Life at Sea).pptx
PDF
Maritime Security
PPTX
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
PDF
Indonesia Port Security - International Standards for Success - The Maritime ...
PDF
Mtsa marsec awareness_model_course_mtsa_04-03
ISPS_Code_Basic_Course.pdf
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pdf
IMO ACTIVITIES TO ENHANCE MARITIME SECURITY .ppt
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
ISPS 1 INTRODUCTION to security training.ppt
Management of shipping (1)
Environmental presentation
A short note on SOLAS 74
Solas assigment
Exceeding Expectations: Port Readiness Sheldon anthony
Solas assigment
Effective Management on Safety, Security and Environmental Protection at Sea
Lecture-9-Maritime-Organizations-ppt.ppt
14 ircha
SOLAS (Safety of Life at Sea).pptx
Maritime Security
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
Indonesia Port Security - International Standards for Success - The Maritime ...
Mtsa marsec awareness_model_course_mtsa_04-03

More from Noel Tan (20)

PDF
Dcfis school development plan
PDF
Module12.ppst5.4.2
PDF
Module11.ppst5.2.2
PDF
Module10.ppst5.1.2
PDF
Module9.ppst4.5.2
PDF
Module8.ppst4.4.2
PDF
Module7.ppst4.1.2
PDF
Module6.ppst3.1.2
PDF
Module5.ppst2.6.2
PDF
Module4.ppst2.3.2
PDF
Module3.ppst1.5.2
PDF
Module2.ppst1.4.2
PDF
Module1.ppst1.1.2
PDF
Ppst rpms manual
PPT
3. hazmat labeling presentation
PPT
4. hazmat placarding presentation
PPT
5. hazmat packaging presentation
PPT
6d. module6d carrier requirement_water
PPT
B. security levels
PPT
E. recognition, on a non discriminatory basis,
Dcfis school development plan
Module12.ppst5.4.2
Module11.ppst5.2.2
Module10.ppst5.1.2
Module9.ppst4.5.2
Module8.ppst4.4.2
Module7.ppst4.1.2
Module6.ppst3.1.2
Module5.ppst2.6.2
Module4.ppst2.3.2
Module3.ppst1.5.2
Module2.ppst1.4.2
Module1.ppst1.1.2
Ppst rpms manual
3. hazmat labeling presentation
4. hazmat placarding presentation
5. hazmat packaging presentation
6d. module6d carrier requirement_water
B. security levels
E. recognition, on a non discriminatory basis,

A. security threats and patterns

  • 2. Course Objective • At the end of the course, the trainee will be able to demonstrate knowledge and understanding of the requirements for Ship Security Plans
  • 3. Course Topics • Knowledge of current security threats and patterns; • The meaning and consequential requirements of the different security levels; • Knowledge of the emergency procedures and contingency plans; • Recognition and detection of weapons, dangerous substances and devices;
  • 4. • Recognition on a non discriminatory basis, of characteristics and behavioural patterns of persons who are likely to threaten security; • Techniques used to circumvent security measures; • Security related communications; • Operations of security equipment and systems; • Testing, calibrations and whilst at sea maintenance of security equipment and systems;
  • 5. • Inspection, control, and monitoring techniques; and • Methods of physical searches of persons, personal effects, baggage, cargo and ship’s stores (including practical exercises)
  • 6. US Coast Guard and IMO requirements Objective: at the end of the topic, the trainee will be familiar with USCG and IMO requirements for Ship Security
  • 7. SOLAS, 1974 as amended Amendments: • Chapter XI-2 Special measures to enhance maritime security • Annex 1 Adoption of the International Code for the Security of Ships and Port Facilities
  • 8. • Annex 1 Part A Mandatory requirements regarding the Provisions of Chapter XI-2 of the International Convention for the Safety of Life at Sea, 1974, as amended • Annex 1 Part B Guidance regarding the Provisions of Chapter XI-2 of the Annex to the International Convention for the Safety of Life at Sea, 1974 as amended and Part A of the Code
  • 12. USCG NVIC 10-02 Navigation and Vessel Inspection Circular (NVIC) No. 10-02 Security Guidelines for Vessels The NVIC establishes new guidelines for developing security plans, and implementing security measures and procedures.
  • 13. Chapter XI-2 Regulation 2 • Applies to: a. the following types of ships engaged on international voyage: 1. Passenger ships, including high-speed passenger craft; 2. Cargo ships, including high-speed craft, of 500 gross tonnage and upward; 3. Mobile offshore drilling units; and b. port facilities serving such ships engaged on international voyages
  • 14. SOLAS, 1974 as amended • Chapter V Safety of Navigation Regulation 19 - Carriage requirements for shipborne navigational systems and equipment “Ships fitted with AIS (Automatic Identification System) shall maintain AIS in operation at all times except where international agreements, rules or standards provide for the protection of navigational information”
  • 15. SOLAS, 1974 as amended • Chapter XI-1 • Regulation 3 – Ship Identification number The ship identification number shall be permanently marked with the prefix “IMO” followed by the 7-digit number.
  • 16. SOLAS, 1974 as amended • Regulation 5 – Continuous Synopsis Record “the Continuous Synopsis Record is intended to provide an on-board record of the history of the ship”
  • 17. Ship Security Alert System • Regulation 6 states that: “ All ships shall be provided with a ship security alert system be capable of being activated from the navigation bridge and in at least one other location”
  • 18. cont. Once activated, the system should transmit a ship-to-shore security alert to a competent authority designated by the flag administration. The alarm should identify the ship and its location and indicate that the security of the ship is under threat or has been compromised. On board the ship, this must not raise any alarm nor any alarm must be send to other ships in vicinity.
  • 19. ISPS certificate • The ship has to carry an International Ship Security Certificate indicating that it complies with the requirements of Chapter XI-2 and Part A of ISPS Code. Part A of this Code includes provisions relating to the verification and certification of the ship’s compliance with the requirements on an initial, renewal and intermediate verification basis.
  • 21. Security Threats and Patterns Objective: at the end of the topic, the trainee will be familiar with security threats and it’s patterns
  • 22. The World will never be the same again
  • 23. Background • In the aftermath of Sept. 11, 2001, the Commandant of the US Coast Guard reaffirmed USCG Maritime Homeland Security. • In November 2001, the Commandant of USCG recommended to IMO the comprehensive security requirements including amendments to SOLAS and the new ISPS Code • In December 2002, IMO adopted the SOLAS amendment and the ISPS Code • By 1st of July 2004, both the ISPS Code and related SOLAS amendments shall entry into force
  • 24. Procedure and Response to possible Threats The Ship Security Plan must include procedures and responses to possible threats. These procedures might include the following actions:  Securing all access to the ship to prevent intrusion;  Performing emergency shutdown of main engines to prevent unauthorized operation;
  • 25.  Securing non-critical operations to focus attention on response;  Alerting ship and shore-side authorities of an incident;  Rendering assistance to a nearby ship undergoing an unlawful act that threatens its security;  Responding to the detection of stowaways or intruders;  Repelling boarders;  Addressing a malfunction of on board security equipment
  • 26.  Screening the underwater hull or search the ship in response to bomb threats;  Specifying the kind of communications to use in the event of a breach of security, an unlawful act, or other emergency;  Coordinating with waterfront facility response procedures.
  • 27. Procedures and Response to Possible Threats “Threats” to the Maritime Industry 1990 2001 Theft Illegal Drugs Piracy Criminal Acts Illegal Drugs Stowaways Stowaways Piracy Terrorism Terrorism
  • 29. The Threat to the Maritime Industry: Assessment of Likelihood A. Bomb threat or hoax  Disgruntled Employee/Passenger  Mentally Unstable Person  Politically Motivated Groups B. Sabotage (including ARSON)  Employee/passenger
  • 31. C. Bomb Attack (Port Facility)  Terrorist Groups  Politically Motivated Groups D. Bomb Attack (Ship)  Internal  External  Terrorist Groups
  • 32. USS Cole in ADEN 2000
  • 33. E.Simulated Armed Attack  Mentally Unstable Person/Passenger F. Piracy (only certain areas)  Criminal gangs G. Hijacking/Armed Attack  Terrorist Groups H. Smuggling  Employee/Passenger
  • 38. Achille Lauro (1985) • 07/10/85 •ABU ABBAS Palestine Liberation Front
  • 40. I Cargo Tampering  Crew/passenger J. Stowaways  Politically motivated groups  Smugglers K.Hostage Taking  Politically motivated groups  Terrorist groups  Criminal gangs
  • 42. L. Vandalism  Crew/ Politically motivated groups M. Transporting weapons of mass destruction  Politically motivated groups/Terrorist/Criminal gangs N. Use of the vessel to carry perpetrators and their equipment O. Use of a vessel as a weapon
  • 51. Designated Foreign Terrorist Organizations (August 2002) 1. Abu Nidal Organization (ANO) a.k.a. Fatah Revolutionary Council, Arab Revolutionary Brigades, Black September, and Revolutionary Organization of Socialist Muslims Has ability to operate worldwide incl. Middle East, Asia , and Europe 2. Abu Sayyaf Group (ASG) Primarily operates in the southern Philippines, occasionally in Manila and has expanded to Malaysia. Engages in bombings, assassinations, kidnappings, and extortions.
  • 52. 3. Armed Islamic Group (GIA) Aims to overthrow secular Algerian regime and replaces it with Islamic state. Frequent attacks against civilian and government workers. 4. Aum Supreme Truth (Aum) a.k.a. Aum Shinrikyo, Aleph Cult aimed to take over Japan, then the world. Located in Japan unknown numbers has surfaced in Russia.
  • 53. 5. Basque Fatherland and Liberty (ETA) a.k.a Euzkadi Ta Askatasuna. Aim of establishing an independent homeland based on Marxist principles.Bombings and assassinations of Spanish Government officials. Operates primarily in the Basques autonomous regions. 6. Al-Gama’a al-Islamiyya (Islamic Group, IG) Egypt’s largest militant group and has external wing with worldwide presence. Specialized in armed attacks against Egyptian security and other government officials. Operates in Egypt and has worldwide presence incl. Sudan, UK, Afghanistan, Austria and Yemen
  • 54. 7. HAMAS (Islamic Resistance Movement) Palestinian branch of Muslim Brotherhood. Large-scale suicide bombings against Israeli civilian and military targets. Primarily operate in the occupied territories, Israel. 8. Harakat ul-Mujahidin (HUM) Islamic militant group based in Pakistan and Afghanistan that operates primarily and conducts insurgent and terrorist activities in Kashmir.
  • 55. 9. Hizballah (Party of God) a.k.a. Islamic Jihad, Revolutionary Justice Org., Org. of the Oppressed on Earth, and Islamic Jihad for the Liberation of Palestine. Operates in Bekaa Valley, Beirut, and Lebanon. Has established cells in Europe, Africa, North and South America, and Asia. Involved in numerous anti-US terrorist attacks including suicide bombings, kidnappings, and hostage takings.
  • 56. 10. Islamic Movement of Uzbekistan (IMU) Goal is the establishment of an Islamic state in Uzbekistan. Based in Afghanistan and Tajikistan and operates in the same area. Bombings and Hostage takings. 11. Al-Jihad (Egyptian Islamic Jihad) Egyptian Islamic extremist group and close partner of Al-Qaida org. Primary goals are to overthrow Egyptian government and attack US and Israeli interests in Egypt and abroad. Network includes Yemen, Afghanistan, Pakistan, Sudan, Lebanon, and UK.
  • 57. 12. Kahane Chai (Kach) Goal is to restore the biblical state of Israel. Harass and threaten Palestinians, Arabs, and Israeli governments 13. Kurdistan Workers Party (PKK) Goal is to establish and independent Kurdish state in southeastern Turkey. Targets are Turkish government diplomatic and commercial facilities, and tourist industry. 14. Liberation Tigers of Tamil Eelam (LTTE) The most powerful group in Sri Lanka with a cause of establishing an independent Tamil state. Battlefield insurgency, terrorism, suicide bombings and narcotics smugglings.
  • 58. 15. Mujahedin-e Khalq Organization (MEK or MKO) Anti-western activity with attacks on the interests of the clerical regime in Iran and abroad. 16. National Liberation Army (ELN) – Colombia Kidnappings, hijackings, bombings, extortion, and guerrilla war. Operates in Colombia and Venezuela border regions. 17. Palestine Islamic Jihad (PIJ) Committed to creation of an Islamic Palestinian state and the destruction of Israel through holy war. Primarily operates in Israel and occupied territories.
  • 59. 18. Palestine Liberation Front (PLF) An Abu Abbas-led faction formerly based in Tunisia now based in Iraq. 19. Popular Front for the Liberation of Palestine-General Command (PFLP-GC) Violently opposed to Arafat’s PLO. Dozens of attacks in Europe and Middle East. Bases in Lebanon. 20. Al-Qaida Established by Usama Bin Ladin. Current goal is to establish a pan-Islamic Caliphate throughout the world by working with allied Islamic extremist groups to overthrow regimes it deems “non-Islamic” and expelling Westerners and non-Muslims from Muslim countries.
  • 60. 21. Revolutionary Armed Forces of Colombia (FARC) Military wing of the Colombian Communist Party. Involves in kidnappings, bombings, murder, extortion, hijackings, as well as guerilla actions against Colombia. 22. Revolutionary Organization 17 November (17 November) Radical Greek leftist group with anti-Greek establishment, anti-US, anti-Turkey, and anti- NATO. Operates primarily in Greece.
  • 61. 23. Revolutionary People’s Liberation Army/Front (DHKP/C) a.k.a. Devrimci Sol (Revolutionary Left), Dev Sol. A splinter faction of the Turkish People’s Liberation Front that espouses a Marxist ideology and is anti-US and anti-NATO. Conducts attacks in Turkey 24. Shining Path (Sendero Luminoso) One of the most ruthless terrorist groups in the Western Hemisphere of a Maoist doctrine. Conducted bombings and selective assassinations in Peru.
  • 62. 25. Real IRA (RIRA) a.k.a. True IRA. Dedicated to removing British forces from Northern Ireland and unifying Ireland. Activities such as bombings, assassinations, smugglings, extortion, and robberies. Operates in Ireland and UK. 26. United Self-Defense Forces of Colombia (AUC) Supported by drug traffickers with activities of assassinating suspected insurgent supporters to engaging guerilla combat units. Operates in Colombia.
  • 63. 27. Communist Party of the Philippines/New People’s Army (CPP/NPA) Communist armed groups that operates in Philippines involved in various terrorist activities such as extortion, liquidation, bombings, etc. 28. Al-aqsa Martyrs Brigades 29. Asbat Al-Ansar 30. Lashkar-e-Tayyiba 31. Revolutionary Nuclei (formerly ELA) 32. Salafist Group for Call and Combat (GSPC) 33. PFLP-General Command 34. Jaish-e-Mohammed (Army of Mohammed)