SlideShare a Scribd company logo
1 of 53
Download to read offline
Module 4: Disrupting, Identifying and
Responding Early to Maritime Security
Incidents
Official
Aim
To provide an awareness of methods for
disrupting, identifying and responding to
maritime security incidents at an early stage.
Objectives
- Identify common phases of terrorist attacks
- Understand methods for handling hostile
reconnaissance, suspicious behaviour,
suspicious items and bomb threats
- Describe initial actions that can be taken in
response to security incidents
Official
Official
Hostile Reconnaissance
Hostile
A person who wants to attack or disrupt an
organisation for profit or to make a political or
ideological point.
Hostile Reconnaissance
A purposeful observation with the intention of collecting
information to inform the planning of a hostile attack
against a specific target.
Official
Objectives of Hostile Reconnaissance
Identify a target
Discover vulnerabilities
Assess the level and type of security
Consider the best method of attack
Inform the best time to conduct the attack
Assess the likelihood of success
Official
In Person
Lewis Ludlow travelled to London in March 2018 to carry out
hostile reconnaissance of landmarks and crowded areas,
including Oxford Street, ahead of a planned attack.
Official
In Person
David Headley
made nine trips to
India in two years to
carry out hostile
reconnaissance of
targets ahead of the
2008 attacks.
Official
Online
Computers seized
by police from Ian
Forman showed
evidence of internet
research into a
number of mosques
in Merseyside
ahead of a planned
attack.
Official
Insider
As a software engineer working at British Airways, Rajib Karim
was told by a member of Al Qaeda in the Arabian Peninsula
“you might be able to provide us with critical and urgent
information."
Official
Unmanned Aerial Systems
Brendon Tarrant used a drone to carry out hostile
reconnaissance of Masjid an-Nur in Christchurch, New Zealand,
before carrying out an attack in which 51 people were killed.
Official
Disrupting Hostile Reconnaissance
DENY DETECT DETER
Official
Identifying Suspicious Activity
People with hostile intent
may behave in a way that is
contrary to the norm.
Behaviour Indicators
Identifying Suspicious Activity
What is Behavioural Detection?
Capability for trained practitioners to use scientifically proven
behavioural indicators, to identify individuals who may pose a risk
to the environment in which they are operating.
To engage with anyone they have identified in a process known as
the resolution conversation, in which behaviours of the individual
are monitored throughout the conversation for indications of ill
intent.
Official
Identifying Suspicious Activity
Remember…
• Behavioural detection should
only be deployed as part of an
integrated security system
• Not all hostile actors will
exhibit the same cues
• It is important to understand the
baseline of what is “normal”
• Behavioural detection can lead
to “false alarms”
• Suspicions should be resolved
effectively and rapidly in a short
and friendly conversation
Official
Official
Identifying Suspicious Activity: Stade de
France, 2015
Official
Identifying Suspicious Items
Hidden
Obvious
Typical
Official
Dealing with Suspicious Items
Official
Minimum Safe Distances
100 METRES
200 METRES
400 METRES
Official
Dealing with Bomb Threats
Checklist
1. Where exactly is the bomb right now?
2. When is it going to explode?
3. What does it look like?
4. What does the bomb contain?
5. How will it be detonated?
6. Did you place the bomb? If not you,
who did?
7. What is your name?
8. What is your address?
9. What is your telephone number?
10.Do you represent a group or are you
acting alone?
11.Why have you placed the bomb?
12.Record time completed.
Official
Gunshot Detection Systems
Optical Sensors
Detect muzzle flash
Dual Technology
Systems
Acoustic Sensors
Detect muzzle blast
and/or projectile
shockwave
Official
Gunshot Detection Systems
Official
Reacting to a Marauding Terrorist Attack
Official
Raising the alarm
ISPS Code, Part A
Functional requirements
include
…1.3.5: providing means for
raising the alarm in reaction
to security threats or security
incidents.
• It is 1900hrs
• The EURORO, a car
transporter, has just
come alongside
• A security guard has
noticed a large fire has
broken out on the vessel
• The security guard saw
two individuals dressed
in hoodies running away
from the vessel
Official
Discussion: Raising the alarm
What information would the Security
Guard send from the incident?
How would the Security Guard
communicate this information?
To whom would the Security Guard communicate
this information?
What further communication would take
place?
10 minutes
Official
Raising the alarm
Mass notification systems Push-to-talk Audible warning devices
Visual warning devices Body worn cameras Personal safety apps
Official
Public Announcement – Voice Alarm
(PAVA) Systems
Live
Intelligent
Automated
PAVA
Pre-
R ed
ecord
Hybrid
Official
Raising the alarm: Public Announcements
The type of
threat
The attack
location
The
number of
attackers
Action to be
taken
Police
messages Repetition
Official
A very low pitched voice is
difficult to understand when
transmitted by radio
Raising the alarm
Rhythm
Speed
Volume
Pitch
Speak in a consistent rhythm
Speak slowly enough to be
clearly understood
Normal conversational volume
is required
Official
Raising the alarm
C Clarity
A Accuracy
B Brevity
Official
Additional security measures
ISPS Code, Part B
At security level 3, the port facility
/ ship should comply with the
instructions issued by those
responding to the security
incident or threat thereof.
The PFSP / SSP should detail the
security measures which could be
taken by the port facility / ship in
close cooperation with those
responding.
The alarm has been raised by
the security guard and the
security control room is now
aware of the incident
The ship has 4000 vehicles on
board, including 300 electric or
hybrid cars
There are 21 crew members on
board
Official
Discussion: Initial actions
What initial actions would the security
control room take?
What actions would be taken relating to
the port?
What actions would be taken relating to
ships?
10 minutes
Official
Additional security measures - Port
Increased
surveillance
Evacuation
Limiting
access
Additional
restricted
areas
Increasing
security
patrols
Altering
port
operations
Direction of
vessel
movements
Enhanced
screening
Full
illumination
Official
Additional security measures - Ship
Limiting access to
a single,
controlled access
point
Granting access
only to those
responding to the
security incident
Directions of
persons on board
Suspension of
embarkation or
disembarkation
Suspension of
cargo handling
operations,
deliveries etc
Evacuation of the
ship
Movement of the
ship
Preparing for a full
or partial search of
the ship
Official
Active Delay Systems
Official
Active Delay Systems
Lockdown at facilities
Official
Manchester Arena Bombing, 2017 Consider
opportunities to prevent or disrupt the attack
Official
Manchester Arena Bombing, 2017
18/05/17 18:36:06
Attacker
Official
Manchester Arena Bombing, 2017
21/05/17 18:57:46
Attacker
Official
Manchester Arena Bombing, 2017
22/05/17 18:30:28
Attacker
Official
Manchester Arena Bombing, 2017
20:51:35 22/05/17
Attacker
Security
Official
Manchester Arena Bombing, 2017
Official
Manchester Arena Bombing, 2017
22:14:49, 22/05/17
Security
Witness
Manchester Arena Bombing, 2017
22:30:39 22/05/17
Official
Security
Attacker
Official
Manchester Arena Bombing, 2017
Discuss opportunities to prevent or
disrupt the attack
Official
Manchester Arena Bombing, 2017
Opportunities to Prevent or Disrupt the Attack
• Identifying hostile reconnaissance – See, Check and Notify
• Positioning of the security perimeter further from the concert hall
• Establishing CCTV coverage to remove blind spots
• Identifying and investigating suspicious behaviour (e.g. repeat visits, heavy
backpack, loitering in a CCTV blind spot)
• Maintaining a security presence in accordance with operational plans
• Performing security patrols in accordance with operational plans
• Ensuring procedures and equipment for reporting security incidents are in place
• Providing security training for all security personnel
• Implementing additional security measures in response to attack indicators
Official
Conclusion
• Maintain vigilance for hostile reconnaissance
• Implement protocols and equipment to deal
with suspicious behaviour, suspicious items
and bomb threats
• Act early during terrorist attacks to
—Communicate with the public
—Communicate with the emergency services
—Instigate additional security measures
➢Save Lives
OFFICIAL
crisis managment 5.pdf

More Related Content

Similar to crisis managment 5.pdf

Chapter 9 Standing Order Procedure (sop) on Safety and Security(FASS)
Chapter 9   Standing Order Procedure (sop) on Safety and Security(FASS)Chapter 9   Standing Order Procedure (sop) on Safety and Security(FASS)
Chapter 9 Standing Order Procedure (sop) on Safety and Security(FASS)Md Shaifullar Rabbi
 
Everything You Need to Know about Special Event Security.pdf
Everything You Need to Know about Special Event Security.pdfEverything You Need to Know about Special Event Security.pdf
Everything You Need to Know about Special Event Security.pdfETS Risk Management
 
Aviation Security and the Active Shooter
Aviation Security and the Active ShooterAviation Security and the Active Shooter
Aviation Security and the Active ShooterErin Planting
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threatspattcom
 
Securing the Crime Scene
Securing the Crime SceneSecuring the Crime Scene
Securing the Crime SceneDon Caeiro
 
MELODY_2.4.1_Arriving_at_the_scene_V2.1_20220322.pptx
MELODY_2.4.1_Arriving_at_the_scene_V2.1_20220322.pptxMELODY_2.4.1_Arriving_at_the_scene_V2.1_20220322.pptx
MELODY_2.4.1_Arriving_at_the_scene_V2.1_20220322.pptxMelody116794
 
Introducing the Securitas Security & Safety Risk Assessment
Introducing the Securitas Security & Safety Risk AssessmentIntroducing the Securitas Security & Safety Risk Assessment
Introducing the Securitas Security & Safety Risk AssessmentCollections Trust
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom responseMartijn Bakker
 
MELODY 5.1.1 En-route and arrival_RA_V2.0_210726.pptx
MELODY 5.1.1  En-route and arrival_RA_V2.0_210726.pptxMELODY 5.1.1  En-route and arrival_RA_V2.0_210726.pptx
MELODY 5.1.1 En-route and arrival_RA_V2.0_210726.pptxMelody116794
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-TerrorismChallenge:Future
 
Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsNovoQuad
 
Chapter 4 health, safety and security procedures
Chapter 4 health, safety and security proceduresChapter 4 health, safety and security procedures
Chapter 4 health, safety and security proceduresPat Cabangis
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training fSamuel I. Michuki
 
loss prevention presentation1.pdf
loss prevention presentation1.pdfloss prevention presentation1.pdf
loss prevention presentation1.pdfRakeshSharma435761
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE360 BSI
 
Making Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxMaking Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxDenaLigo
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 

Similar to crisis managment 5.pdf (20)

Chapter 9 Standing Order Procedure (sop) on Safety and Security(FASS)
Chapter 9   Standing Order Procedure (sop) on Safety and Security(FASS)Chapter 9   Standing Order Procedure (sop) on Safety and Security(FASS)
Chapter 9 Standing Order Procedure (sop) on Safety and Security(FASS)
 
Everything You Need to Know about Special Event Security.pdf
Everything You Need to Know about Special Event Security.pdfEverything You Need to Know about Special Event Security.pdf
Everything You Need to Know about Special Event Security.pdf
 
Aviation Security and the Active Shooter
Aviation Security and the Active ShooterAviation Security and the Active Shooter
Aviation Security and the Active Shooter
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
 
Securing the Crime Scene
Securing the Crime SceneSecuring the Crime Scene
Securing the Crime Scene
 
MELODY_2.4.1_Arriving_at_the_scene_V2.1_20220322.pptx
MELODY_2.4.1_Arriving_at_the_scene_V2.1_20220322.pptxMELODY_2.4.1_Arriving_at_the_scene_V2.1_20220322.pptx
MELODY_2.4.1_Arriving_at_the_scene_V2.1_20220322.pptx
 
Introducing the Securitas Security & Safety Risk Assessment
Introducing the Securitas Security & Safety Risk AssessmentIntroducing the Securitas Security & Safety Risk Assessment
Introducing the Securitas Security & Safety Risk Assessment
 
PATROLLING
PATROLLINGPATROLLING
PATROLLING
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom response
 
MELODY 5.1.1 En-route and arrival_RA_V2.0_210726.pptx
MELODY 5.1.1  En-route and arrival_RA_V2.0_210726.pptxMELODY 5.1.1  En-route and arrival_RA_V2.0_210726.pptx
MELODY 5.1.1 En-route and arrival_RA_V2.0_210726.pptx
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism
 
Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big Events
 
Chapter 4 health, safety and security procedures
Chapter 4 health, safety and security proceduresChapter 4 health, safety and security procedures
Chapter 4 health, safety and security procedures
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training f
 
loss prevention presentation1.pdf
loss prevention presentation1.pdfloss prevention presentation1.pdf
loss prevention presentation1.pdf
 
Security_Guard
Security_GuardSecurity_Guard
Security_Guard
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
 
Managing the fraud if fraud investigation from investigation room to court room
Managing the fraud if fraud investigation from investigation room to court roomManaging the fraud if fraud investigation from investigation room to court room
Managing the fraud if fraud investigation from investigation room to court room
 
Making Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxMaking Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptx
 
Security training module
Security training moduleSecurity training module
Security training module
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607dollysharma2066
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentationthomas851723
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentationthomas851723
 
Training Methods and Training Objectives
Training Methods and Training ObjectivesTraining Methods and Training Objectives
Training Methods and Training Objectivesmintusiprd
 
Risk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxRisk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxSaujanya Jung Pandey
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentation
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentation
 
Training Methods and Training Objectives
Training Methods and Training ObjectivesTraining Methods and Training Objectives
Training Methods and Training Objectives
 
Risk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxRisk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptx
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 

crisis managment 5.pdf

  • 1. Module 4: Disrupting, Identifying and Responding Early to Maritime Security Incidents
  • 2. Official Aim To provide an awareness of methods for disrupting, identifying and responding to maritime security incidents at an early stage. Objectives - Identify common phases of terrorist attacks - Understand methods for handling hostile reconnaissance, suspicious behaviour, suspicious items and bomb threats - Describe initial actions that can be taken in response to security incidents
  • 4. Official Hostile Reconnaissance Hostile A person who wants to attack or disrupt an organisation for profit or to make a political or ideological point. Hostile Reconnaissance A purposeful observation with the intention of collecting information to inform the planning of a hostile attack against a specific target.
  • 5. Official Objectives of Hostile Reconnaissance Identify a target Discover vulnerabilities Assess the level and type of security Consider the best method of attack Inform the best time to conduct the attack Assess the likelihood of success
  • 6. Official In Person Lewis Ludlow travelled to London in March 2018 to carry out hostile reconnaissance of landmarks and crowded areas, including Oxford Street, ahead of a planned attack.
  • 7. Official In Person David Headley made nine trips to India in two years to carry out hostile reconnaissance of targets ahead of the 2008 attacks.
  • 8. Official Online Computers seized by police from Ian Forman showed evidence of internet research into a number of mosques in Merseyside ahead of a planned attack.
  • 9. Official Insider As a software engineer working at British Airways, Rajib Karim was told by a member of Al Qaeda in the Arabian Peninsula “you might be able to provide us with critical and urgent information."
  • 10. Official Unmanned Aerial Systems Brendon Tarrant used a drone to carry out hostile reconnaissance of Masjid an-Nur in Christchurch, New Zealand, before carrying out an attack in which 51 people were killed.
  • 12. Official Identifying Suspicious Activity People with hostile intent may behave in a way that is contrary to the norm.
  • 13. Behaviour Indicators Identifying Suspicious Activity What is Behavioural Detection? Capability for trained practitioners to use scientifically proven behavioural indicators, to identify individuals who may pose a risk to the environment in which they are operating. To engage with anyone they have identified in a process known as the resolution conversation, in which behaviours of the individual are monitored throughout the conversation for indications of ill intent.
  • 14. Official Identifying Suspicious Activity Remember… • Behavioural detection should only be deployed as part of an integrated security system • Not all hostile actors will exhibit the same cues • It is important to understand the baseline of what is “normal” • Behavioural detection can lead to “false alarms” • Suspicions should be resolved effectively and rapidly in a short and friendly conversation
  • 19. Official Minimum Safe Distances 100 METRES 200 METRES 400 METRES
  • 20. Official Dealing with Bomb Threats Checklist 1. Where exactly is the bomb right now? 2. When is it going to explode? 3. What does it look like? 4. What does the bomb contain? 5. How will it be detonated? 6. Did you place the bomb? If not you, who did? 7. What is your name? 8. What is your address? 9. What is your telephone number? 10.Do you represent a group or are you acting alone? 11.Why have you placed the bomb? 12.Record time completed.
  • 21. Official Gunshot Detection Systems Optical Sensors Detect muzzle flash Dual Technology Systems Acoustic Sensors Detect muzzle blast and/or projectile shockwave
  • 23. Official Reacting to a Marauding Terrorist Attack
  • 24. Official Raising the alarm ISPS Code, Part A Functional requirements include …1.3.5: providing means for raising the alarm in reaction to security threats or security incidents.
  • 25. • It is 1900hrs • The EURORO, a car transporter, has just come alongside • A security guard has noticed a large fire has broken out on the vessel • The security guard saw two individuals dressed in hoodies running away from the vessel
  • 26.
  • 27. Official Discussion: Raising the alarm What information would the Security Guard send from the incident? How would the Security Guard communicate this information? To whom would the Security Guard communicate this information? What further communication would take place? 10 minutes
  • 28. Official Raising the alarm Mass notification systems Push-to-talk Audible warning devices Visual warning devices Body worn cameras Personal safety apps
  • 29. Official Public Announcement – Voice Alarm (PAVA) Systems Live Intelligent Automated PAVA Pre- R ed ecord Hybrid
  • 30. Official Raising the alarm: Public Announcements The type of threat The attack location The number of attackers Action to be taken Police messages Repetition
  • 31. Official A very low pitched voice is difficult to understand when transmitted by radio Raising the alarm Rhythm Speed Volume Pitch Speak in a consistent rhythm Speak slowly enough to be clearly understood Normal conversational volume is required
  • 32. Official Raising the alarm C Clarity A Accuracy B Brevity
  • 33. Official Additional security measures ISPS Code, Part B At security level 3, the port facility / ship should comply with the instructions issued by those responding to the security incident or threat thereof. The PFSP / SSP should detail the security measures which could be taken by the port facility / ship in close cooperation with those responding.
  • 34. The alarm has been raised by the security guard and the security control room is now aware of the incident The ship has 4000 vehicles on board, including 300 electric or hybrid cars There are 21 crew members on board
  • 35.
  • 36. Official Discussion: Initial actions What initial actions would the security control room take? What actions would be taken relating to the port? What actions would be taken relating to ships? 10 minutes
  • 37. Official Additional security measures - Port Increased surveillance Evacuation Limiting access Additional restricted areas Increasing security patrols Altering port operations Direction of vessel movements Enhanced screening Full illumination
  • 38. Official Additional security measures - Ship Limiting access to a single, controlled access point Granting access only to those responding to the security incident Directions of persons on board Suspension of embarkation or disembarkation Suspension of cargo handling operations, deliveries etc Evacuation of the ship Movement of the ship Preparing for a full or partial search of the ship
  • 41. Official Manchester Arena Bombing, 2017 Consider opportunities to prevent or disrupt the attack
  • 42. Official Manchester Arena Bombing, 2017 18/05/17 18:36:06 Attacker
  • 43. Official Manchester Arena Bombing, 2017 21/05/17 18:57:46 Attacker
  • 44. Official Manchester Arena Bombing, 2017 22/05/17 18:30:28 Attacker
  • 45. Official Manchester Arena Bombing, 2017 20:51:35 22/05/17 Attacker Security
  • 47. Official Manchester Arena Bombing, 2017 22:14:49, 22/05/17 Security Witness
  • 48. Manchester Arena Bombing, 2017 22:30:39 22/05/17 Official Security Attacker
  • 49. Official Manchester Arena Bombing, 2017 Discuss opportunities to prevent or disrupt the attack
  • 50. Official Manchester Arena Bombing, 2017 Opportunities to Prevent or Disrupt the Attack • Identifying hostile reconnaissance – See, Check and Notify • Positioning of the security perimeter further from the concert hall • Establishing CCTV coverage to remove blind spots • Identifying and investigating suspicious behaviour (e.g. repeat visits, heavy backpack, loitering in a CCTV blind spot) • Maintaining a security presence in accordance with operational plans • Performing security patrols in accordance with operational plans • Ensuring procedures and equipment for reporting security incidents are in place • Providing security training for all security personnel • Implementing additional security measures in response to attack indicators
  • 51. Official Conclusion • Maintain vigilance for hostile reconnaissance • Implement protocols and equipment to deal with suspicious behaviour, suspicious items and bomb threats • Act early during terrorist attacks to —Communicate with the public —Communicate with the emergency services —Instigate additional security measures ➢Save Lives