Sie sind auf Seite 1von 159

Sea Guardian Maritime

Corp.

Anti-Piracy

1
Anti-Piracy Awareness

Introductions & Backgrounds


House Rules.
 Cell phones off or on vibrate
 Fire exits
 Lunch
 Restrooms
 Please try to keep movement in and out of the classroom to a
minimum.
 If you need to step out, please do it quietly
Course Overview

 This course is intended to provide the knowledge required for ships


officers & crew to operate in piracy waters with a total
understanding of:
 Auditing and editing of the ship’s security plan measures
 Piracy attacks, un-authorized access, breach of security
 How to use proper training
 Non lethal systems & tactics
 Build awareness in the art of watch keeping and preparations
 To keep the actors off of your ship
Training Overview

This training is NOT designed to make


the student an anti-piracy expert or a
combatant. It is meant to build
awareness in the art of watch keeping
and preparations
Competencies to be Achieved
 General knowledge of piracy and pirate attacks
 International guidance, rules and best practice.
 Be able to assess onboard risks, consequence & vulnerabilities.
 Monitoring & controlling access underway, at anchor and in the
berth
 Methods of detection, deterrence & response to piracy attacks.
 Setting up the ship for possible confrontation
 Radar & Advanced CCTV watch in high impact areas
 Vessel lockdown and crew accountability
 Conducting anti piracy training & drills
 Surviving a hostage situation and taking prisoners
 Knowledge to amend the SSP
General Points
 Safety takes precedence over security
 Don’t endanger yourself or the ship
 Defending the ship is pointless if you let it sink in the process
 The Master remains the ultimate authority
 Even if he defers to the security team
 Everyone has an important role to play
 Even with a security team, the officers and crew must play an active role
Important Things to remember

 THINK
 The best weapon you have in your arsenal is the ability to adapt and
think on your feet
 Don’t panic
 Control your fear and remember that:
 “Fear creates hesitation, and hesitation will make your worst fear come true!”
Piracy
Threats & Patterns

9
Piracy: Yesterday & Today
What is Piracy?

 Piracy dates back as far as the Roman Empire and has existed as long
as maritime trade.
 “Modern piracy is a violent, bloody, ruthless practice," Captain Jayant
Abhyankar, Deputy Director of the IMB (International Maritime
Bureau).
 These actors are nothing more than criminals and IMSN
(International Maritime Security Network) will approach the issues in
a law enforcement style.
American History

 In 1803, the Barbary Pirates held around 300 American sailors for
ransom in modern day Libya
 A small force of U.S. Marines and mercenaries, led by William
Eaton, marched overland from Egypt to force the Barbary States to
release all hostages without tribute
 It was the first counter-terrorism mission by the United States
 Today we still face the threat of piracy off the coasts of Africa
International Maritime Bureau (IMB)
definition:

Piracy is an act of boarding or


attempting to board any ship with the
apparent intent to commit theft or any
other crime and with the apparent
intent or capability to use force in
furtherance of that act.
United Nations definition of Piracy: Article
101
 Any illegal acts of violence or detention, or any act of depredation,
committed for private ends by the crew or the passengers of a
private ship or a private aircraft, and directed:
 (i) on the high seas, against another ship or aircraft, or against
persons or property on board such ship or aircraft;
 (ii) against a ship, aircraft, persons or property in a place outside the
jurisdiction of any State
Global Piracy

 Piracy can happen anywhere


 Somalia; Gulf of Aden
 Ivory Coast
 North Africa
 Straits of Gibraltar
 Straits of Malacca
 Caribbean
 Lake Erie
 Where else? Why?
Stats and Facts Cont:

 The maritime realm covers 139,768,200


square miles.
 Most of this environment lies beyond the
strict jurisdiction of any one state where
there are no clear cut legal answers or
authority!
Stats and Facts
 80% of World’s trade travels by water
 50% World’s trade value and 90% of general
cargo is transported in containers
 75% of World’s trade pass through a handful of
international straights and canals
 1/3 of the World’s trade and half its oil traverse
the Straights of Malacca, Singapore, Somalia and
the Red Sea.
Stats and Facts:
 In 2009, there were 406 pirate attacks, up from 294 attacks in
2008.
 Of those 406 attacks, 217 took place near Somalia.
 In 2009, there had been 49 vessels hijacked and 1052 hostages
taken.
 At the end of the year, pirates held 12 vessels and 263 crew
members.
Stats and Facts:
 As a result of pirate attacks in 2009, 68 people were injured and 8
killed.
 Guns were used in 240 attacks worldwide, up from 139 instances
in 2008.
 Near the end of the year, the IMB reported that over half of the
piracy attacks (attempted or otherwise) worldwide go unreported.
Stats and Facts

 The cost of piracy is estimated to be between $13 and $16 billion


every year and could cost substantially more in coming years.
 Average ransom payments in 2009 were between 3 and 4 million
dollars.
 Piracy attacks have not broken 400 since 2003. 2009 is the fourth
year in a trend of increasing attacks.
Recent Trends in Piracy

21
Piracy Techniques, Craft, and Equipment

 Somali Pirates are using quasi-military attack scenarios


 Approaching from opposite directions
 Coordinating with GPS/Satellite phones
 Targeting “soft,” slow, and unprepared vessels
 RPG’s, dynamite, AK-47s (weapon of choice)
Recent Trends: Piracy Today

 Five to six years ago, when pirates attacked, they used machetes,
knives and pistols.

 Today they still use knives but now they carry AK-47s and RPGs
Piracy Techniques, Craft, and Equipment
Piracy Techniques, Craft, and Equipment

 Mother ships are usually the larger vessels hijacked by pirates.


 It is important to know which ships have been hijacked.
 Pirate mother ships could be identified by sight or with the AIS.
 The small boats are deployed from “mother ships” at a rate of 25
knots plus.
Piracy Techniques, Craft, and Equipment

 Note that the mother ships are also used as a recon tool
 For some time the pirates have been radioing each other about different
vessels they see and try to board – most of the “Mother Ships” are not
mother ships at all, they are scouts!
 How can you use this in your favor
 Do your best to look like a hard target so would-be attackers will avoid your ship
 Use the radio to announce that your ship is prepared
Modern Pirates
 Pirates are generally poor, turning to crime as their only means of
income.
 Some pirates are as young as teenagers or younger
 Even a 10-year-old boy can kill you if he has an AK-47
 The first pirate onboard a ship gets the most money
 This is their only source of income and they are highly motivated
Modern Pirates
 Somali pirates are likely to want you alive for the ransom money
 They are still shooting at you, even a stray round can kill you!
 Pirates in the Straits of Malacca or Nigeria will kill you without a
second thought and take your ship!
 Pirates could be intoxicated or on drugs
 Never assume you are safe!
Modern Pirates

 Many African pirates are known to use Khat (qat, qaat, jaad, chad)
 Khat is a stimulant similar to ecstasy –it is chewed and absorbed into
the bloodstream through the stomach
 Khat is chewed as a pick me up for farmers or workers because it will
suppress appetite
 It is very accessible in many African and Middle Eastern countries –
even to children
Modern Pirates
 Khat can cause euphoria, hyperactivity, hallucinations,
appetite loss, and increased heart rate and blood pressure
 They will be less likely to break down mentally under stress
 An individual on Khat will be harder to incapacitate
Modern Pirates

 Haiti and other Caribbean countries are known to have severe rates
of marijuana use
 Dominican Republic is known to have high rates of amphetamine use
 The same rules apply
 A person in an altered state will be much harder to incapacitate
Is Piracy Terrorism?
 Majority of experts claim that piracy is not terrorism.
 “There is no worthwhile evidence, despite the speculation, of any
cooperation between pirates and insurgent/terrorists,” a 2007
article for the Naval War College Review.”
Piracy and Terrorism

 However is it possible that terrorists could use piracy as a tool,


somewhat like Sept 11th?
 Both crimes involve non-state actors, both aim at civilians, and both involve
acts of homicide and destruction.
 Groups like Al-Qaeda and Al-Shabab in Somalia could easily start
using piracy to further their goals
Piracy and Terrorism
 There is a growing suspicion of financial partnerships between
Somali pirates and Islamic terrorist movements within Somalia, not
only as pirates, but as smuggling operatives as well.
 Dirty bomb material could be smuggled through Somalia into
Venezuela or Colombia.
Piracy Hotspots
Piracy Hotspots: Somalia/ Gulf of Aden
Piracy Hotspots: Somalia
Piracy Hotspots: Somalia

Left: Abshir Boyah Right: The town of


EYL a main pirate base
Somali Fast Boats
Hot Spots: Nigeria
Hot Spots: Nigeria

 Nigeria was in 6th largest oil exporter in the world in mid-2009.


 Nigeria has seen an increase in piracy due to sectarian violence and
resentment towards oil companies.
 In 2009, there were 29 attacks with at least 30 unreported
 The Port of Lagos was the second most dangerous in the world in
2009.
Hot spots: Nigeria

 Pirates in Nigeria have shown little regard for the well-being of crews
and may be the most dangerous piracy hotspot in the world at this
time.
 Ships have received little assistance from the Nigerian navy (Nigeria
actually maintains the strongest Navy in the region).
Hot spots: South East Asia

 Indonesia, Malaysia, South China Sea, etc


 The region remains extremely dangerous even though the volume of
attacks has fallen.
 Over half of the attacks in the region have not been reported. Why?
Hot Spots: South East Asia

 In the last 3 years the Indonesian Navy has made significant gains in
reducing piracy.
 They have:
 Increased the Navy’s forces
 Increased cooperation with neighbors
 Kept better Intel
 Better training
 They most recently beat down and defeated the “Tamil Tigers”
Piracy Hotspots: Strait of Malacca,
Philippines, Bangladesh, Indonesia
There are three types of tactics used by
pirates in the Malaccan straits.
 The first type operate in small fast boats and only attack easy targets,
robbing the ship and crew of money and valuables.
 The second is much more organized, using weapons and careful
planning to hijack a ship and hold the crew for ransom while stealing
large amounts of cargo. This type requires organization and funding.
 The third type is also organized and funded but makes a political
statement along with the demand for ransom.
The fight against piracy in the straits
Piracy Hotspots: Latin America

 Attacks in Central and South America more than doubled in 2009


with 37 attacks compared to 14 in 2008.
 Peru had the third most dangerous port in the world in 2009
 Most piracy incidents in South America involve robbery with knives
or swords
Regional Assessment

 See Handout 1
End Part 1
Questions?

10 minute break
Maritime Laws &
Conventions

53
Relevant Codes
 International Maritime Organization
 Safety of Life at Sea (SOLAS)
 International Ship and Port Facility Security (ISPS) Code
 Suppression of Unlawful Acts (SUA) Convention
 33 CFR (US)
 Why are they so important to you and how can they help you fight
piracy attacks
Coast Guard Directive 104-6
 The main reason we are here!
 Requires Anti-Piracy measures to be included in the Ship Security
Plan
 Evasive maneuvers, cooperation with coalition forces, etc
 Also specifies hardening the ship against unauthorized boarding
International Maritime Law

 International Maritime Organization (IMO)


 IMO stance at this time is no guns on ships
 Why?
 Legal issues
 Captain’s authority
 Training
 Storage of weapons
 What happens to you and the ship if you shoot someone
 Other countries laws that will not allow weapons
 What court will you be tried in?
United States Maritime Law

 The U.S. Coast Guard allows weapons on board a ship under the
personal use exemption in Port Security Advisory 4-09 (Rev. 1)
 The United States also affirms mariners’ right to self defense in Port
Security Advisory 3-09
Safety of Life at Sea (SOLAS)
 The SOLAS Convention
 Regarded as the most important of all international treaties concerning the
safety of merchant ships.
 SOLAS amendments for security already in place
 Ship’s Security Plan now must have upgraded Anti-Piracy measures in place.
(SOLAS): Chapter XI-2

 Entered into force July 1, 2004


 Regulation XI-2/3: enshrines the International Ship and Port
Facilities Security Code (ISPS Code).
 Security / MARSEC Levels
 These are set by the contracting governments
 Enhanced measures can be put in place by the Captain of the vessel
(SOLAS): Chapter XI-2

 Regulation XI-2/8: confirms the role of the Master in exercising his


professional judgment over decisions necessary to maintain the
security of the ship. It says he shall not be constrained by the
Company, the charterer or any other person in this respect.
(SOLAS): Chapter XI-2 (continued)

 Regulation XI-2/5: requires all ships to be provided with a ship


security alert system, fitted by 2006.
 Ship security alert system shall initiate and transmit a ship-to-shore security
alert to a competent authority designated by the Administration, identifying
the ship, its location and indicating that the security of the ship is under
threat or it has been compromised.
 Capable of being activated from nav. bridge and one other location.
ISPS Code: Relevant Definitions

 Ship security plan: A plan developed to ensure the


application of measures on board the ship, designed to
protect persons on board, cargo, cargo transport units,
ship’s stores or the ship from the risks of a security incident.
 Ship Security Officer: The person on board the ship,
accountable to the master, designated by the Company as
responsible for the security of the ship, including
implementation and maintenance of the ship security plan,
and for liaison with the company security officer and port
facility security officers.
ISPS Code: Relevant Definitions

 Company security officer: The person designated by the


Company for ensuring that a ship security assessment is
carried out; that a ship security plan is developed, submitted
for approval, and thereafter implemented and maintained
and for liaison with port facility security officers and the ship
security officer.
 If he or she is on shore they will be the first ones to send help
in the event that you are captured.
 Your company should have a plan in place for this and it
should be drilled as well.
Other Reading

 ISPS Code Part A (International)


 Part B provides guidance on how to read Part A
 33 CFR (USA-specific)
 Coast Guard NVICs provide guidance on compliance
 MSC Circular 623 Rev 3.
 Provides guidance on how to deal with pirate attacks or attempted
attacks
 Similar information is provided by this course
 USCG Port Security Advisory 2-09
 Provides similar information on best practices during a piracy attack
Questions?
Let’s take 10 minutes
Assessing Shipboard
Risks and Identifying
Vulnerabilities

66
Vessel Types
 Tanker
 Chemical Tanker
 Oil Tanker
 Liquefied Natural Gas (LNG) Tanker
 Cargo ships
 General Cargo
 Container ship
 Bulk Carrier
 Roll-on-Roll-off (RORO)
 Special Purpose
Small Freighters are one of the most vulnerable
vessels while in piracy waters
Ultra Large Crude Carrier (loaded)
Ultra Large Crude Carrier (unloaded)
Bulk Carrier
Liquefied Natural Gas (LNG) Tanker
Cargo Ship
Panamax Freighter
TYPICAL ATTACK PROFILES AND
LESSONS LEARNED
 In 2009, the top three types of ships most attacked were:
 Bulk Carrier (109)
 Container (63)
 General Cargo (53)
TYPICAL ATTACK PROFILES AND
LESSONS LEARNED
 Successful attacks illustrate the following common vulnerabilities
 Low Speed
 Low Freeboard
 Inadequate Planning & Procedures
 Visibly low state of alert or lack of evident self-protective measures
 When the ship looks as if it will respond slowly or not at all
 Ship did not heed piracy warnings.
TYPICAL ATTACK PROFILES AND
LESSONS LEARNED
 Frequency of attacks is lower during bad weather
 Frequency of attacks is lower at night
 Success of attacks is lower when the ship takes definitive action
Somali Pirates boarding a vessel
How do they get on board the ship
 Pirates use Grappling hooks and rope or sometimes
ladders to gain access while a ship is underway (This is the
typical tool that they use)
 By coming at the ship from 4 points it makes it easy for them and hard for
you

 At anchor - climbing the anchor chain

 Along side - the lines can be used to gain access

 A successful pirate attack may only take 15 minutes!


Methods to Detect,
Deter and Defend
against Piracy Attacks

81
SITREP

 Coalition forces are operating near Somalia


 Do not expect help every time or anytime, it is too big of an area for them to
patrol completely
 It doesn’t hurt to call for reinforcements though.
 According to the World Peace Foundation, the combined maritime
operations of NATO and allied forces disrupted 411 pirate operations
of 706 encountered; delivered 269 pirates for prosecution.
Relevant Organizations

 To report a piracy attack:


 Call the IMB Piracy Reporting Center
 Call the UKMTO Merchant Vessel Reporting Center
 See Handouts 4 & 5
UK Royal Navy Maritime Trade
Organization
 Established in the Middle East as an extension of the Royal Navy
 Home Office (UK)
 +971 50 552 3215 (CO)
 +971 50 552 6007 (2iC)
 Fax: +971 4 306 5710
 Email: ukmto@aim.ae
 RFA WAVEKNIGHT (operating near Somalia)
 0044 207 807 8657
 Email: 432-ops@a.dii.mod.uk
UKMTO

 IMB Recommends calling the UKMTO first!


 Handout 4
 Contact Information
 Reporting Format and Reference Codes
Self Defense

 The US Coast Guard authorizes the use of force in the defense of


one’s self or others
 Port Security Advisory 3-09
 Authorizes the use of force (including deadly force) in the event of imminent
danger
 Defines imminent danger as impending bodily harm or death
 A pirate firing an AK-47 at you qualifies as imminent danger!
Common Defensive Methods
 Fire Hoses
 Use of dummies (fake sentries)
 Evasive Maneuvers
 Multilingual Signs stating:
 High voltage defense
 Bad water discharge
 Security Forces on board
 Molotov Cocktails
 Razor wire
 LRAD
 Electrified hand rails
 Rat Guards
 Additives into the H2o defense system
 What else? What would you do?
 All of these are good ideas, USE ANY MEANS NECESSARY
Anti Piracy Strategies

 Keeping the crew & ship safe at all times


 Provide a strong “Rally Point” which allows the crew to be out of
harms way and still control the ship.
 Good accountability of all crew members
 Keeping the threat off the ship!
 Know where you are and how quickly help can arrive
 Communications
 Enhanced watch
 Active and passive Non-lethal deterrents
 Correct Mindset
Defensive Mindset

 A good mindset is the most important aspect of the system


 Staring at a camera can be boring but remember, you are keeping yourself
and your crew members safe
 Everyone has a role to play
 It only takes a lapse by one person to lose the ship
 Become a hunter
 Work out scenarios in your mind when on watch
 Focus on your family and your fellow crew members
The IMSN Defensive Plan
 Make the vessel a hard target

 Three layered security as the new SSP:


The 3 D’s
 “Detect”
 “Deter”
 “Defend”
Monitoring and Control preparations
 Key points on the ship that require control of access
 All low freeboard rails
 The poop deck
 Houser pipe
 The Pilot ladder (remember that the ladder can make a good thing to hook
onto)
 At anchor - security lock down measures
 At the fringe of the hot zone, start running at MARSEC III measures
Detection: Radar & Watch

 Radar watch enhancement


 Outer barrier
 Time set that fast moving vector will reach ship
 Time to bingo
 Time to rally point
 Time until coalition ships arrive
 Communications
 This should be done before entering the hot zone.
 All bridge crew should know how to get the word out for coalition
help
 Remember that others are always listening in!
 SSAS is to be activated
Onboard Radar

 Operation
 Use onboard Automatic Radar Plotting Apparatus (ARPA) to set up grids with
automatic acquisition
 ARPA should already be onboard
 Provides a vector based on true course and speed
 Use in addition to the IMSN EYEON Radar
 Set one radar at the 6-12 mile range and one to a 3 mile range
Radar

 There is a feature on the ARPA called after glow which is a quick way
to see how a vessel is moving.
 Puts a glow behind the target and it mimics a wake of a boat
 A fast boat will have a longer glow (or wake) behind it. 
 Also you can set up an automatic acquisition area around the ship
which will automatically tag any target which comes into the zone.
Radar issues

 Sea clatter
 Rough seas may blot out a small vessel on the radar
 Fortunately Pirates tend to not like rough weather but never assume
anything

Problems/concerns/malfunctions etc
 Small wooden boats are not good reflectors
 Radar may need more time to sweep the set grids than you have with a fast
mover
 Technology can always break down
Radar Issues

 Radar can not show the intent of the small vessel, whereas the IMSN
CCTV system can allow the posted watch to not only see the inbound
vessel, but tell the difference between fishing gear and AK-47’s.
Detection: EyeOn CCTV

 Watch enhancement & vigilance in the hot zone


 EyeOn CCTV system
 Infrared High Definition Visual equipment
 High Definition pan/tilt/zoom
 Thermal imaging
 Recording for documentation purposes
EYEON Systems CCTV
Watch Keeping Techniques

 Enhanced security patrols


 Bow
 Stern
 Roving
 No more than 4 hours per team
 TEAM should mix up the duties between roving and post every 30 - 45 mins

 CCTV & Radar


 Technology can malfunction, your own eyes are the best watch keeping
technique you have
Watch Keeping Accountability

 Make a roster for watch times


 Report everything out-of-the-ordinary you see, no matter how
insignificant
 A small boat can either be a fisherman or a pirate in disguise
 Keep a record of your watch
 Even if it says “nothing to report”
 Pass on a SITREP every time!
Detection & Deterrence: Watch keeping,
Manning, and Duties
 Planning, drills and extra training by the SSO
 3rd party due diligence training by onboard security teams
 Enhanced deck patrols
 Use of a Bow and Stern watch
 Use of dummies (i.e. scarecrow strategy)
 Lighting (Any rail lights or search type lighting)
 Communications for the watch
 Onboard security teams
 Use of ship’s PA system for hailing & auditable sounds to
create confusion to the pirates
 Fortification of the ship
Deterrence

 Evasive ship maneuvers


 Visible defenses
 Triton Shield Wall-of-Water device
 Visible lockdown procedures
 Accountability of every crew member inside the safe house.
Deterrence: The Triton Shield Device
Deterrence: Security Measures

 Enhance vessel security plan to include “Anti-Piracy Measures”


 Identify new lockdown rules in the plan
 The ship must be totally impenetrable from the
outside
 One way in and one way out
 Set times to RP
Deterrence: Security Measures

 IMSN’s base Anti-Piracy plan calls for the bridge to be the rally point
in the event of an attack
 At “Bingo Time” all crew members should be heading for the RP and
be accounted for in the fortified safe room
 When Radar & CCTV watch calls “Danger close” This will mean that
the pirates have made it close to along side.
Defense: Lockdown and Secure RP
 Defenshield will provide armor to make the bridge a security
shelter
 Armored glass panes to stop AK-47 rounds
 Screens to stop RPG rounds
 Clip-on armor and mobile fighting positions are also available for
other areas on the ship
 Ballistic blankets to black out the bridge so pirates can’t see you!
Defenshield
Defenshield Overview
Defense: Security Team

 Security Element Splits Crew into 2 TEAMS with 1


OVERWATCH position
 OUTSIDE (Bravo Team)
 This team will hands on check to see that the ship is locked from out side
 They will also see that the TRITON SHIELD is running correctly
 This TEAM will E&E to the starboard bridge wing and lock in with the rest
of the crew in safe house
 Remember the follow two things:
 Make sure that you have been accounted for to the bridge command
 Once inside the safe house if there is gun fire, stay low and out of the
way of the security teams
Defense: Security Team

 INSIDE (Alpha Team)


 This team will lock down the internal doors and create a trap for the pirates sucking
them into the last line of defense

 Team will E&E to the interior stair well leading to the bridge where they meet up with
the rest of the crew in the safe house

 A sniper OVERWATCH will take the high ground and provide the eye in the sky. This
operator will be the last person inside RP
Security Team
Detect, Deter, Defend

Secure RP Defend
Control
Accountability

Visible Watchkeeping
Visible Lock-down Drill Deter
Visible Defenses
Physical Deterrents

Cameras
Radar
Detect
Enhanced Watchkeeping
Communications
Questions?

Let’s take 10 minutes


Conducting Anti-
Piracy: Training,
Drills, and
Contingency Planning

116
Our Drill Scenario

We will run this just like fire or abandon-ship drills,


remember that the best drills are remembered if the “KISS
SYSTEM” is in place

Always hold a debriefing session immediately after each


drill to gather input and lesson learned.
The Drill: Assignments

 Step 1
 Break the ship’s crew into 2 different groups
 Persons with duties (who will conduct the lock down)
 A TEAM (Inside crew lock down)
 B TEAM (Outside lock down and Triton Shield Device setup)
 Person with no duties (Moves directly to RP)
 Set muster points for all teams
 Persons without duties will go directly to the RP
 Run the ship in MARSEC Level III
The Drill: Standard Procedures
 Step 2
 Crew will be assigned enhanced security watch
 Bow and Stern Watches will be in place, keeping the personnel in a safe,
efficient schedule
 Personnel will be on roving patrol
 Anti-Piracy system and measures will be prepared and ready for use
The Drill: Attack Imminent

 Step 3
 The camera system or a watchmen detects a suspicious craft moving toward
the ship
 Warning horn will sound (5 five sec blasts)
 Bridge command will report on PA and on radio direction that the incoming
vessel is on, and also “BINGO TIME”
 All teams will meet at their muster point and begin the drill
Crew Response, Movement, Muster
 Everyone must know their team and their RP
 YOU KNOW YOUR SHIP – give input when plans are made to help
ensure an efficient and complete lock down
 Assign someone to be responsible for the crew RP accountability
 This is a key point. If captain has all his men Pirates are empty handed!
The Drill: Attack Imminent

 A TEAM will meet up and start the internal lock down


 TEAM Leader must have a good accountability of his team at this point
 Remember that you are running at M-3, most doors will be locked
 B TEAM will double check all external doors by hand and all external hatches
 TEAM Leader must have a good accountability of his team at this point
 Your running at M-3, but DO NOT assume that all doors are locked
The Drill: Rally Point

 Step 4
 Starboard side bridge wing will be the only outside entrance to the bridge
(RP)
 After all teams are inside the bridge B TEAM security leader will secure that
door
 Comms will be sent to all that can help
 Ship will steam towards the coalition for help
 Time will be called on the drill
The Drill: With Security Personnel

 Each team will have a uniformed, security TEAM leader who will give
out assignments
 Call signs will be “Alpha Leader” and “Bravo Leader”
 Crew members will still be in charge of locking doors, the security
team will provide cover
 Security elements will be on roving patrol
 There will be a sniper on the bridge wing to observe and provide
cover
The Sniper's Duties
 Will be in the highest point on the ship, posted under
Defenshield fighting position
 Job
 Eyes on perimeter
 Give off 1st sign of a deterrent to the pirates
 Give cover support to the TEAM members that are on outside
moving to the RP
 Repel any boarders that may breach the perimeter of the ship
 “Eagle 1” will be the last man into the RP
 Bridge watch reports any close-by vessels to “Eagle 1”
and vice-versa
In Review:

 Team members will lock down their pre-assigned doors and hatches
while IMSN team leaders provide cover
 One team member will keep the headcount and ensure
accountability in the rally point
 Persons without any other duties will proceed to the rally point
immediately
 The Captain will sound the alarm, alert the UKMTO, alert the IMB,
alert the company, hit the SSAS, and initiate serpentine movements
toward coalition forces
Contingency Plans

 Plan for as many things as possible to go wrong


 Safe room needs:
 Fortification of the safe room
 Food & Water for 3 days (MREs)
 MED supplies for 27 people
 CCTV for the outside and the close quarters
 Head facilities
 Something to do or read
 Every situation is different
 What are some examples of contingency plans?
 The key to a successful mission is the ability to think on your
feet
Considerations for Certain Ships

 Two-house ships may require two rally points.


 Some ships do not have automatic power plants.
 IMSN may implement two rally points in this case.
 The IMSN team will split up to guard both rally points.
 Fortifications and cameras will be implemented on a ship-by-ship
basis.
 IMSN will fully adjust the drill as is necessary.
Defensive Tactics Seminar

 Useful tactics such as breaks, holds, handcuffing and other security


procedures
 IMSN’s policy is that crew members should not engage pirates
directly
 Always have help and always let someone know where you are
Defensive Tactics
Weapons Familiarization Seminar

 Familiarization with operation, break-down and safe handling of


firearms
 IMSN’s policy is that crew members should not carry firearms
individually are engage pirates in firefights
 Familiarization helps with threat recognition and can also prevent accidents
if a crew member finds, picks up, or otherwise handles a weapon
Questions?

Let’s take 10 minutes


What do I do if?
Good procedures to follow if…

136
…If You are Taken Hostage
Pirate Hostages: Then and Now
Pirate Hostages: Then and Now
Keith Stansell
Hostage Considerations

 First steps
 Run away if you can; stay calm if you can't.
 According to security experts, your best chance for escape is
almost always during the initial phases of the hijacking.
 How to act
 once you're in your captor's custody, remain courteous and
comply with instructions. Don't get hostile or lose your temper:
Aggression is only likely to result in punishment.
 become a "gray person“ neither resistant nor overly be
submissive. That way, terrorists are less inclined to single you out
for punishment.
Hostage Considerations

 Try to get the hostage taker to see your worth


 You have a family
 You work hard for a living too
 You might have a medical condition that could render you very ill or dead.
How much money can they get then?
Hostage Considerations

 It's important to remember that people are


working to get you released.
 The feeling of hopelessness works
completely against you.
 Try to stay positive and help keep others in
the same frame of mind.
Hostage Considerations

 Plans should be in place at your home port for an event like this
 Are these plans in place?
 Ask questions of your Master, CSO and your union.
 GET ANSWERS!
Dealing with rescuers as a hostage

 Don’t be surprised if you are treated like a bad guy


 Get to the deck as fast as you can
 Follow the commands that are given
 Do not approach the rescuer in a fast or excited motions
that may be taken as a hostile action
…You Take Prisoners
Proper handling of prisoners

 Remember the essentials to life


 Food, Water, Shelter
 Exercise (Controlled)
 Bathroom (Doesn’t have to be private)
 Remove emotions and add duty
 Treat a captured pirate the same way you would treat a stowaway
Proper handling of prisoners

 Fourth Geneva Convention Part III


 Relevant guidance on humane prisoner treatment
 You are not necessarily bound by Geneva Conventions but they provide
helpful standards
 Don’t put yourself or your company in a bad position by
mistreating a prisoner
Holding Prisoners

 Prisoners should be kept in the brig


 Follow standard procedure
 Make sure there is nothing in the room to use as a weapon
 Prisoners should be strip-searched
 You should return clothes and personal effects to them
 Prisoners should be properly bound
 Remember that your safety and theirs relies on subdued hands and feet
Holding Prisoners

 Prisoner movement
 Be sure that you’re truly in control of the actor
 Handcuff prisoners through bars or cracked door
 Do not enter the brig with them
 Prisoners should be guarded
 Divide watch times between the crew
 Prisoners should be split up
 Guarding multiple prisoners will be an IMSN problem
Reporting and Transfer

 Call the UKMTO and report the situation


 They will be able to put you in touch with the proper authorities or coalition
forces
 Start a report ASAP as you will rapidly forget important parts.
 All crew involved should be allowed to sit alone to re-cap the events.
 Sometimes adding 3 reports together makes the best total picture
…Someone gets hit.
…Someone gets Hit

 Remember the first rule…THINK!


 Is the scene safe to poke you head out ?
 Your 1st Aid training in regards to safe handling of blood, may not be
time efficient in some cases
 Stay Calm
 Stick to your own tasks unless otherwise directed.
 Make sure the doors are locked and get to the safe room.
…Someone gets Hit

 IMSN team members will direct you in the event of a casualty.

 You may have to make hard decisions


 Don’t let fear get the better of you but don’t try to be a hero either.
 Other people are still counting on you to do your job.
In conclusion PLEASE REMEMBER

 Pirates:
 Appear to be well armed, but truly have old and outdated weapons
and equipment
 Might outnumber you
 THINK that they have the element of surprise
 Don’t realize that you are ready for them
 The Mariner:
 The ability to look like and be a hard target
 REALLY have the element of surprise
 The great advantage of fighting from the higher ground
 The ability to fall back to a secure position
 The ability, through training and drills, to control the fear that the
pirates want to put on you
Thoughts
 Never assume you won’t be attacked, plan on fending off pirates
anywhere, anytime.
 Rely on your team to be prepared and rely on yourself.
 When we excel in defense, it is because the enemy can not decide
how to attack.
 If they have to re-think their plans, pirates tend to call off their attack.
Thank you for your time and
service
“Remember that you’re not captured or dead until YOU SAY SO!”

“Don’t give up the ship!”

Das könnte Ihnen auch gefallen