1 / 70

ISPS

ISPS. 1. Introduction. ISPS - Introduction. Purpose and evaluation Course Overview Competencies to be achieved History Current security threats and patterns Ship and port operations and conditions. I. Introduction – Purpose & Evaluation.

vic
Download Presentation

ISPS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ISPS 1. Introduction

  2. ISPS - Introduction • Purpose and evaluation • Course Overview • Competencies to be achieved • History • Current security threats and patterns • Ship and port operations and conditions

  3. I. Introduction – Purpose & Evaluation International Ship and Port Facility Security (ISPS) Code • SOLAS (adopted 12/Dec./2002) • Part A – Part B • Purpose of ISPS-Code?

  4. I. Introduction – Purpose & Evaluation • Build International Framework (Governments – Shipping & Port Industries) • detect security threats • preventive measures • Security incidents

  5. I. Introduction – Purpose & Evaluation • Establish roles & responsibilities • Governments • Ship & port Industries • National & international lvl • Ensure maritime security

  6. I. Introduction – Purpose & Evaluation • Early & efficient • Collection • Exchange Security related information

  7. I. Introduction – Purpose & Evaluation • Provide methodology for security assessments • Plans • Procedures React to changing security lvls

  8. I. Introduction – Purpose & Evaluation • Ensure confidence • Adequate • Proportionate Security measures in place

  9. I. Introduction – Purpose & Evaluation Training objectives: • To enable trainees to undertake the role and duties of SSO • To prepare trainees to understand Security and Risk Assessment • To prepare trainees to understand the threat to the industry

  10. I. Introduction – Purpose & Evaluation Training objectives: • To prepare trainees to understand the ship security plan and conduct a SSA • To acquaint trainees with port security measures • To outline to trainees relevant legislations

  11. ISPS - Introduction • Purpose and evaluation • Course Overview • Competencies to be achieved • History • Current security threats and patterns • Ship and port operations and conditions

  12. II. Course Overview • Introduction • Competencies to be achieved • History • Current security threads and patterns • Ship and port operations and conditions • Maritime security policy • International conventions, codes and recommendations • Relevant government legislation and regulations • Definitions • Legal implications of action or non-action by SSO • Handling sensitive security-related information and communications

  13. II. Course Overview • Security Responsibilities • Contracting governments • Recognised Security Organisations • The Company • The Ship • The port facility • SSO • CSO • PFSO • Vessel personnel with specific security duties • Facility personnel with specific security duties

  14. II. Course Overview • Ship Security Assessment • Risk assessment methodology • Assessment tools • On-scene security surveys • Security assessment documentation • Security Equipment • Security equipment and systems • Operational limitations of security equipment and systems • Testing, calibrating and maintenance of security equipment and systems

  15. II. Course Overview • Ship Security Plan • Purpose of SSP • Contents of SSP • Confidentiality issues • Implementation of SSP • Maintenance and modification of SSP • Threat identification, recognition and response • Recognition and detection of weapons, dangerous substances and devices • Methods of physical searches and non-intrusive inspections • Implementing and coordinating searches • Recognition, on a non-discriminatory basis, of persons posing potential security risks • Techniques used to circumvent security measures • Crowd management and control techniques

  16. II. Course Overview • Ship security actions • Actions required by different security levels • Maintaining security of ship/port interface • Usage of Declaration of Security • Implementation of security procedures • Emergency preparedness, Drills and exercises • Contingency planning • Security drills and exercises • Assessment of security drills and exercises

  17. II. Course Overview • Security administration • Documentation and records • Reporting security breaches • Monitoring and control • Security audits and inspections • Reporting nonconformities • Security training • Security requirements

  18. ISPS - Introduction • Purpose and evaluation • Course Overview • Competencies to be achieved • History • Current security threats and patterns • Ship and port operations and conditions

  19. III. Competencies to be achieved No Fighting! • Identify • Deter • Mitigate (verlichten – atténuer) • Planning • Preparation • coordination

  20. III. Competencies to be achieved • security administration; • relevant international conventions, codes and recommendations; • relevant Government legislation and regulations; • responsibilities and functions of other security organizations; • methodology of ship security assessment; • methods of ship security surveys and inspections; • ship and port operations and conditions; • ship and port facility security measures; • emergency preparedness and response and contingency planning; • instruction techniques for security training and education, including security measures and procedures; • handling sensitive security related information and security related communications; • knowledge of current security threats and patterns;

  21. III. Competencies to be achieved • recognition and detection of weapons, dangerous substances and devices; • recognition, on a non discriminatory basis, of characteristics and behavioural patterns of persons who are likely to threaten security; • techniques used to circumvent security measures; • security equipment and systems and their operational limitations; • methods of conducting audits, inspection, control and monitoring; • methods of physical searches and non-intrusive inspections; • security drills and exercises, including drills and exercises with port facilities; and • assessment of security drills and exercises. • the layout of the ship; • the ship security plan and related procedures (including scenario-based training on how to respond);

  22. III. Competencies to be achieved • crowd management and control techniques; • operations of security equipment and systems and • testing, calibration and whilst at sea maintenance of security equipment and systems.

  23. ISPS - Introduction • Purpose and evaluation • Course Overview • Competencies to be achieved • History • Current security threats and patterns • Ship and port operations and conditions

  24. IV. History

  25. IV. History • Terrorism—defined here as the systematic use of murder, injury, and destruction, or the threat of such acts, aimed at achieving politicalends is not new.

  26. IV. History • Terrorism is not brutal, unthinking violence • Experts agree that there is almost always a strategy behind terrorist actions. Whether it takes the form of bombings, shootings, hijackings, or assassinations, terrorism is neither random, spontaneous, nor blind; it is a deliberate use of violence against civilians for political or religious ends.

  27. 4 key-elements of terrorism IV. History • It is premeditated—planned in advance, rather than an impulsive act of rage. • It is political—not criminal, like the violence that groups such as the mafia use to get money, but designed to change the existing political order. • It is aimed at civilians—not at military targets or combat-ready troops. • It is carried out by subnational groups—not by the army of a country.

  28. IV. History • 44 BC: The murder on Julius Ceasar • 1st century AC: The « Sicarii » (latin for dagger) used violance to oppose the Roman control of Judea • 11th Century - Afghanistan: The Hashashins (etymology: assassin) – Members of an Islamite sect (Nizaris) had the duty to kill hostile leaders • 1773: The Boston tea party. Colonist, dressed as Indians, dumped tea in the port of Boston to protest against the British tax policy (beginning of the fighting between Britain & the Colonies) • 1881: Tsar Alexander II is killed by the “Narodnaja Volja” (will of the people)

  29. IV. History Leon Czolgosz, anarchist, killed the American president William McKinley. The year was …………. 1901

  30. IV. History • 1914: WWI is triggered by the assassination of Franz-Ferdinand, archduke of Austria by a radical Serbian Nationalist • 1963: Klu-Klux-clan reacts violant to the civil right movement in Birmingham (Alabama) • 1972: Deadly Olympic games – Munich (Members of a Palestinian Terrorist organisation kill 2 Israeli athletes and take 9 others hostage)

  31. IV. History • 1983: Suicide attack by the Hezbollah on the American embassy in Beirut • 1995: Timoty McVeigh blows up the federal government building in Oklahoma City with ammonium-nitrate (fertiliser) • 1995: Apocalypse in the subway of Tokyo. The Aum Shinrikyo sect releases Sarin gas in the subway killing 12 people and making several thousand sick. They believed that the end of the world was nearby

  32. History Full Of Terror

  33. IV. History History goes on ………….

  34. IV. History 2004

  35. IV. History • The 11 March 2004 Madrid train bombings (also known as 11/3, 3/11, M-11 and 11-M) were a series of coordinated terrorist bombings against the commuter train system of madrid, Spain on the morning of 11 March 2004, which killed 191 people and wounded 1,460.

  36. IV. History • 2004 - Iraqi terrorist decapitate the South-Korean hostage when his country refuses to withdraw her troops from Iraq • 16/11/04 Iraqi terrorist murder the British- Irish -Iraqi charity worker Margaret Hassan

  37. IV. History 2005

  38. IV. History 2005

  39. History goes on – London 21/7/05 IV. History On Thursday 7 July 2005 a series of four bomb attacks struck London’s public transport system during the morning rush hour. At 8:50 a.m. three bombs exploded within 50 seconds of each other on three London underground trains. A fourth bomb exploded on a bus at 9:47 a.m. in Tavistock Square. Fifty-six people were killed in the attacks, with 700 injured. The incident was the deadliest single act of terrorism in the U.K. since the 1988 bombing of Pan Am flight 103 (which killed 270), and the deadliest bombing in London since the WWII.

  40. London – 21/07/05 IV. History

  41. IV. History Where will it stop……….. ? • Next animated film for children promotes suicide bombings • This film was aired on the Iranian television October 28, 2005 • http://memritv.org/Search.asp?ACT=S1# • http://switch3.castup.net.nyud.net:8090/cunet/gm.asp?ClipMediaID=87439&ak=null

  42. IV. History Definition Security: • The quality or state of being secure • Being secure = Free from fear or distrust • Translations: • Dutch = veiligheid(sgevoel) • French = Sécurité (sentiment de -)

  43. IV. History Humans are thick-headed: • International legislation only changes AFTER major catastrophes • Examples • TITANIC => SOLAS (1914) • SEVERAL ACCIDENTS 76 & 77 => MARPOL Protocol 1978 • TEXACO CARIBBEAN => TSS systems • ESTONIA => ISM on board of Ro-Ro’s • EXXON VALDEZ => OPA90 & MARPOL 13F&G • ERIKA => Accelerated phasing out of single hull tankers • AND SO ON !!!!!!!!!!!!!!!!!!!!!!!!!!!

  44. The Achille Laurowas to Security As The The Titanic was to Safety IV. History

  45. IV. History • Security Breached • 1985 • 7th October • Time: 1330 hours • 4 Terrorists from Palestine Liberation Front (PLF) hijack the Achille Lauro Achille Lauro

  46. IV. History • In 1985, Palestinian militants (PLF) under the command of Abbu Abbas hijacked the Italian cruise ship Achille Lauro. Before the siege ended, an elderly wheelchair-bound American Jew, Leon Klinghoffer, had been murdered and dumped into the sea. • Abbas always claimed it was all a mistake, a military mission that went wrong. "There was no plan to hijack the ship or hurt the people aboard."

  47. Victim: US citizen Klinghoffer IV. History

  48. Abbas Quote: IV. History This statement makes a bridge between political goals & violance

More Related