SlideShare a Scribd company logo
Oil terminals, refineries and pipelines appear to be ideal targets for terrorists, with guaranteed media attention and high resonance. In the sensitive markets another aspect that has made refineries more vulnerable is their potential target value for terrorism- for-profit, rather than terrorism- for- political ends, as the majority of the world would like to believe. DocomUSA is prepared to meet these threats on Land and Sea with the most comprehensive refinery security system ever conceived. Proprietary and Confidential 1
Proprietary and Confidential 2 The oil and gas industry is a major component of the national critical infrastructure and as such represents an attractive target for terrorists.  Globally terrorists have attacked every segment of the oil and gas fuel cycle, ranging from attacks on exploration and development sites, to maritime shipment, land-based distribution via pipelines, to retail and distribution networks, such as filling stations.  In addition to international terrorism, two major oil producing countries have also indicated a resort to the use of force in connection with the oil and gas industry:
Proprietary and Confidential 3 DocomUSA Security has three major objectives: Integrated Threat Identification: DocomUSA Security identifies multiple man-made threats for corporation and members of the management team. Comprehensive Risk Assessment: DocomUSA Security enables corporate decision makers to assess the specific risk at the corporate and personal level. Optimal Risk Management: DocomUSA Security assists in the cost-efficient management of risks from internal and external threats.
Proprietary and Confidential 4 DocomUSA Security has a modular structure, with each of the three modules representing a self-contained unit.  By implementing a coherent Security Policy within all management levels of the organization a corporate culture of security will be achieved. Our Goal:   The most secure oil refinery operation in the world.                     ....Profitable, Green, Safe………Secure.
Proprietary and Confidential 5 DocomUSA Anti Piracy and Maritime Security  We live in a dangerous world, therefore DocomUSA is implementing new dynamic training and operational strategies and solutions to the commercial shipping segment of our business responsible for delivering crude oil to our refineries.  All of our operational maritime security professionals are dedicated in delivering an effective security plan for all DocomUSAowned or contract vessels while at sea or in dock.
Proprietary and Confidential 6 Our maritime security and investigative personnel derive from elements of the U.S. Army Green Berets, Navy Seal Teams, Royal Military Police, Royal Marine Commandos and other specialist units of the American, British & other International Armed Forces, bringing a wealth of knowledge and diverse languages together.
Proprietary and Confidential 7 DocomUSA Security anti piracy and maritime services include, but are not exhaustive to the following; Maritime Security Officers (MSO) Specifically trained security guard teams will escort, advise and gain real time intelligence and threat assessments to mitigate the risk to Master and crew onboard vessels that will be transiting through high risk areas, like the Gulf of Aden and West Africa. Our security team will utilize the latest Anti Piracy passive security procedures and training so that the security team and crew can work together to deter and defend the vessel from any potential attack by pirates. Port Security Officers (PSO)  Gate and sentry security personnel to control all assess and guarding elements of the port or installation, including; CCTV, intruder and fire monitoring , screening of work based and visiting personnel, vehicles and equipment of contractors, freight, containers and port buildings. In addition we have highly trained dog and handler patrol teams that specialize in guarding or search of explosives, weapons and drugs.
Proprietary and Confidential 8 Security Search Dive Teams.  Some tankers could be targeted by terrorists or activists; DocomUSA Security has at its disposal experienced security dive search personnel. The diver can search the water line and underside of the hull in order to ascertain if any explosive device(s) have been planted. If an explosive device is discovered, our teams will evacuate the vessel and the immediate area and set up a cordon, they will then inform the local police and continue to liaise with them until the device has been made safe. Maritime Security Liaison Officers (MSLO)  Docom USA Security specialist personnel can also be utilised on a more permanent basis, either on a tanker vessel, or shore based installations and will implement the best practice and business continuity with up to date changes in security policies, Local intelligence, planning, procedures, threat assessments and lock down procedures.
Proprietary and Confidential 9 Specialist Maritime Security Consultants: Our consultants can be deployed to initiate and implement emergency planning and crisis management surveys and manual written assessments for DocomUSA owned or contract  vessels,  or oil & gas installations. A minimum qualification of a Masters degree in risk and crisis management and emergency planning is required of all personnel. Port Freight & Equipment Tracking: Asset Surveillance Protection: Freight and transportation leaving a port or secure distribution compound can be targeted by criminal gangs intent on hijacking and theft from the vehicle. Quite often the gangs have received inside information from within the distribution warehouse about the vehicles valued freight, planned stops, routes and final destination. Effective measures can be utilized by placing hidden trackers within the shipment, specialist surveillance teams can also be deployed to follow and report any planned or attempted attacks to a dedicated control center and the police.
Proprietary and Confidential 10 Investigation & Infiltration Teams: It  could be discovered that shipments of refined products have been reported as missing and it is suspected that employees are involved in theft from within the company.  Theft can occur from within organizations; bonded warehouses or other cargo storage facilities within the port, these factors can have a big impact on production and profit. Individuals who is specialize in investigation and infiltration techniques can be deployed on the pretext of becoming a regular employee, and then placed within the problematic work area.  Over time the undercover investigator can reveal the identity of the perpetrators and how and where the theft is taking place. Evidence in the form of covert photographic imagery can be produced to company officials to be processed at their discretion.Alternatively management may prefer to investigate the theft in a more overt capacity, utilizing an experienced investigation team.
Proprietary and Confidential 11 Maritime Penetration Testing: It is a good idea to test our own security for vulnerability and possible areas of bad security practice from our own employees using outside sources.  This could be a vessel which is docked in a port, bonded (high value freight) warehouses, port security guard teams etc.; Experienced and specialist operators will test their security, this could be by means of simply gaining entry into a building or vessel or sending a package with a fake bomb inside, and many more.  If the specialist operator has successfully succeeded with their mission, they will then write a full vulnerability assessment report so that the client can assess their most vulnerable areas for the future.
Proprietary and Confidential 12 Port CCTV Installation:  A full risk assessment of the port and any buildings within shall be given, suggesting where best to place CCTV cameras. Covert cameras can also be installed to detect theft of freight or equipment occurring by criminals gaining access into the port or by its own employees.
Proprietary and Confidential 13 Port Security Survey (PSS)  A detailed Port security survey is conducted either before the new key security personnel are implemented or if other security personnel are already in place.  The security survey outlines any changes in; current policy, local threat analysis, vulnerabilities and a recommended security action plan and control measures to be implemented.
Proprietary and Confidential 14 Ship Security Survey (SSS) A detailed independent ship security survey will be conducted on a regular basis to outline the vulnerabilities and recommend security control measures, our action plan lists key priorities to be implemented.  Ship Security Design Plan Common ship design has revealed many critical physical and technical security vulnerabilities and features. An increase in piracy attacks against commercial and private shipping in some cases has shown that the structural design of the ship has allowed the attackers a more successful rate in hijacking and theft. A more secure design on a new build will provide vital resilience in structure and decrease the possibility of successful attacks in the future. Our team is playing a vital role by providing security advice in the early stages of architectural planning as in the case of  both the DocomUSA Solar Hybrid Oil Tanker and DocomUSAHarth Superfast Tanker designs.
Proprietary and Confidential 15 Leadership: The DocomUSA Security team is lead by Captain Bruce Little.  Little is a former US Army Green Beret who saw action in Vietnam at a time when the mortality rate for Green berets was over 80 percent.  Little recently retired from a 34 year career in the New Orleans Police Department and was the commander of the special investigations division.  Little has consulted and trained special forces in several countries friendly to the U.S. and is an expert in port and maritime security.

More Related Content

What's hot

Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)
Pawanexh Kohli
 
ISPS Code
ISPS CodeISPS Code
Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelines
nwvirus
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Danladi Caleb
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
Noel Tan
 
Beluga sea piracy training
Beluga sea piracy trainingBeluga sea piracy training
Beluga sea piracy training
Noel Tan
 
Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014
captlouis
 
isps code pp
isps code ppisps code pp
isps code pp
Sharone Francis
 
Maritime security operative isps
Maritime security operative ispsMaritime security operative isps
Maritime security operative isps
Miguel Diaz Medina
 
Crowd Management
Crowd ManagementCrowd Management
Crowd Management
Pat Cabangis
 
Wareho~1
Wareho~1Wareho~1
Wareho~1
PKBajaj
 
Risks and Marine Insurance of Oil Tanker
Risks and Marine Insurance of Oil TankerRisks and Marine Insurance of Oil Tanker
Risks and Marine Insurance of Oil Tanker
m7ammmedx
 
Piracy, Mediation & seafarers
Piracy, Mediation & seafarersPiracy, Mediation & seafarers
Piracy, Mediation & seafarers
Helen Tung
 
Guerreirus Intro
Guerreirus IntroGuerreirus Intro
Guerreirus Intro
guerreirusgroup
 
SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016
Dale Butler
 
AFM RAPID DEPLOYMENT TEAM
AFM RAPID DEPLOYMENT TEAMAFM RAPID DEPLOYMENT TEAM
AFM RAPID DEPLOYMENT TEAM
Ivan Consiglio
 
Hull & Machinery Insurance and Claims
Hull & Machinery Insurance and ClaimsHull & Machinery Insurance and Claims
Hull & Machinery Insurance and Claims
rockporshe
 
Somalia Piracy Brief2008
Somalia Piracy Brief2008Somalia Piracy Brief2008
Somalia Piracy Brief2008
Emergency Response & Research Institute
 
Import and Export cargo insurance solutions
Import and Export cargo insurance solutionsImport and Export cargo insurance solutions
Import and Export cargo insurance solutions
loud_and_clear_insurance
 
Africor Risk Management 111001
Africor Risk Management 111001Africor Risk Management 111001
Africor Risk Management 111001
bdsafricor
 

What's hot (20)

Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)
 
ISPS Code
ISPS CodeISPS Code
ISPS Code
 
Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelines
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
Beluga sea piracy training
Beluga sea piracy trainingBeluga sea piracy training
Beluga sea piracy training
 
Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014Maritime (isps code) regulations 2014
Maritime (isps code) regulations 2014
 
isps code pp
isps code ppisps code pp
isps code pp
 
Maritime security operative isps
Maritime security operative ispsMaritime security operative isps
Maritime security operative isps
 
Crowd Management
Crowd ManagementCrowd Management
Crowd Management
 
Wareho~1
Wareho~1Wareho~1
Wareho~1
 
Risks and Marine Insurance of Oil Tanker
Risks and Marine Insurance of Oil TankerRisks and Marine Insurance of Oil Tanker
Risks and Marine Insurance of Oil Tanker
 
Piracy, Mediation & seafarers
Piracy, Mediation & seafarersPiracy, Mediation & seafarers
Piracy, Mediation & seafarers
 
Guerreirus Intro
Guerreirus IntroGuerreirus Intro
Guerreirus Intro
 
SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016
 
AFM RAPID DEPLOYMENT TEAM
AFM RAPID DEPLOYMENT TEAMAFM RAPID DEPLOYMENT TEAM
AFM RAPID DEPLOYMENT TEAM
 
Hull & Machinery Insurance and Claims
Hull & Machinery Insurance and ClaimsHull & Machinery Insurance and Claims
Hull & Machinery Insurance and Claims
 
Somalia Piracy Brief2008
Somalia Piracy Brief2008Somalia Piracy Brief2008
Somalia Piracy Brief2008
 
Import and Export cargo insurance solutions
Import and Export cargo insurance solutionsImport and Export cargo insurance solutions
Import and Export cargo insurance solutions
 
Africor Risk Management 111001
Africor Risk Management 111001Africor Risk Management 111001
Africor Risk Management 111001
 

Viewers also liked

DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
docomusa
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
TI Safe
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-ppt
Mohit Rampal
 
The DocomUSA Advantage - Delivery Truck of the Future
The DocomUSA Advantage - Delivery Truck of the FutureThe DocomUSA Advantage - Delivery Truck of the Future
The DocomUSA Advantage - Delivery Truck of the Future
docomusa
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
Jack Whitsitt
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Positive Hack Days
 
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack WhitsittNIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
Jack Whitsitt
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Ship Construction (Structure Part)
Ship Construction (Structure Part)Ship Construction (Structure Part)
Ship Construction (Structure Part)
Marine Study
 

Viewers also liked (9)

DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-ppt
 
The DocomUSA Advantage - Delivery Truck of the Future
The DocomUSA Advantage - Delivery Truck of the FutureThe DocomUSA Advantage - Delivery Truck of the Future
The DocomUSA Advantage - Delivery Truck of the Future
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack WhitsittNIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Ship Construction (Structure Part)
Ship Construction (Structure Part)Ship Construction (Structure Part)
Ship Construction (Structure Part)
 

Similar to DocomUSA Security

SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
AnirbanMarine
 
Security Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security dutiesSecurity Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security duties
AnirbanMarine
 
Maritime Security
Maritime SecurityMaritime Security
Maritime Security
ijtsrd
 
Brochure original - PDF
Brochure original - PDFBrochure original - PDF
Brochure original - PDF
Joe Park
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docx
simonithomas47935
 
Group CSC Brochure English 2015
Group CSC Brochure English 2015Group CSC Brochure English 2015
Group CSC Brochure English 2015
Bill Strobel
 
2013 Basic Presentation-A
2013 Basic Presentation-A2013 Basic Presentation-A
2013 Basic Presentation-A
Jim Stockstill
 
International Armour Co.
International Armour Co.International Armour Co.
International Armour Co.
Dimitris Chalambalis
 
one week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSEone week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSE
Vincent McNally
 
Please respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docxPlease respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docx
leahlegrand
 
Respond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime TransportatRespond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime Transportat
mickietanger
 
FMASP_ShowAudio_short
FMASP_ShowAudio_shortFMASP_ShowAudio_short
FMASP_ShowAudio_short
Jim Stockstill
 
Marine Insurance
Marine InsuranceMarine Insurance
Marine Insurance
Felicia N
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docx
oreo10
 
Management of shipping (1)
Management of shipping (1)Management of shipping (1)
Management of shipping (1)
Fredrick Olali
 
June 2014 Kickoff A
June 2014 Kickoff AJune 2014 Kickoff A
June 2014 Kickoff A
Jim Stockstill
 
Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...
Scott Bernat
 
PurpleTRAC brochure
PurpleTRAC brochurePurpleTRAC brochure
PurpleTRAC brochure
Pole Star Space Applications
 
PurpleTRAC Brochure
PurpleTRAC BrochurePurpleTRAC Brochure
PurpleTRAC Brochure
Amanda Northey
 
Safety at Sea April 2012
Safety at Sea April 2012Safety at Sea April 2012
Safety at Sea April 2012
CLIA UK & Ireland
 

Similar to DocomUSA Security (20)

SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...
 
Security Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security dutiesSecurity Training for Seafarers with designated Security duties
Security Training for Seafarers with designated Security duties
 
Maritime Security
Maritime SecurityMaritime Security
Maritime Security
 
Brochure original - PDF
Brochure original - PDFBrochure original - PDF
Brochure original - PDF
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docx
 
Group CSC Brochure English 2015
Group CSC Brochure English 2015Group CSC Brochure English 2015
Group CSC Brochure English 2015
 
2013 Basic Presentation-A
2013 Basic Presentation-A2013 Basic Presentation-A
2013 Basic Presentation-A
 
International Armour Co.
International Armour Co.International Armour Co.
International Armour Co.
 
one week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSEone week ADVANCED SHIP SECURITY COURSE
one week ADVANCED SHIP SECURITY COURSE
 
Please respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docxPlease respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docx
 
Respond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime TransportatRespond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime Transportat
 
FMASP_ShowAudio_short
FMASP_ShowAudio_shortFMASP_ShowAudio_short
FMASP_ShowAudio_short
 
Marine Insurance
Marine InsuranceMarine Insurance
Marine Insurance
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docx
 
Management of shipping (1)
Management of shipping (1)Management of shipping (1)
Management of shipping (1)
 
June 2014 Kickoff A
June 2014 Kickoff AJune 2014 Kickoff A
June 2014 Kickoff A
 
Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...
 
PurpleTRAC brochure
PurpleTRAC brochurePurpleTRAC brochure
PurpleTRAC brochure
 
PurpleTRAC Brochure
PurpleTRAC BrochurePurpleTRAC Brochure
PurpleTRAC Brochure
 
Safety at Sea April 2012
Safety at Sea April 2012Safety at Sea April 2012
Safety at Sea April 2012
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

DocomUSA Security

  • 1. Oil terminals, refineries and pipelines appear to be ideal targets for terrorists, with guaranteed media attention and high resonance. In the sensitive markets another aspect that has made refineries more vulnerable is their potential target value for terrorism- for-profit, rather than terrorism- for- political ends, as the majority of the world would like to believe. DocomUSA is prepared to meet these threats on Land and Sea with the most comprehensive refinery security system ever conceived. Proprietary and Confidential 1
  • 2. Proprietary and Confidential 2 The oil and gas industry is a major component of the national critical infrastructure and as such represents an attractive target for terrorists. Globally terrorists have attacked every segment of the oil and gas fuel cycle, ranging from attacks on exploration and development sites, to maritime shipment, land-based distribution via pipelines, to retail and distribution networks, such as filling stations. In addition to international terrorism, two major oil producing countries have also indicated a resort to the use of force in connection with the oil and gas industry:
  • 3. Proprietary and Confidential 3 DocomUSA Security has three major objectives: Integrated Threat Identification: DocomUSA Security identifies multiple man-made threats for corporation and members of the management team. Comprehensive Risk Assessment: DocomUSA Security enables corporate decision makers to assess the specific risk at the corporate and personal level. Optimal Risk Management: DocomUSA Security assists in the cost-efficient management of risks from internal and external threats.
  • 4. Proprietary and Confidential 4 DocomUSA Security has a modular structure, with each of the three modules representing a self-contained unit. By implementing a coherent Security Policy within all management levels of the organization a corporate culture of security will be achieved. Our Goal: The most secure oil refinery operation in the world. ....Profitable, Green, Safe………Secure.
  • 5. Proprietary and Confidential 5 DocomUSA Anti Piracy and Maritime Security We live in a dangerous world, therefore DocomUSA is implementing new dynamic training and operational strategies and solutions to the commercial shipping segment of our business responsible for delivering crude oil to our refineries. All of our operational maritime security professionals are dedicated in delivering an effective security plan for all DocomUSAowned or contract vessels while at sea or in dock.
  • 6. Proprietary and Confidential 6 Our maritime security and investigative personnel derive from elements of the U.S. Army Green Berets, Navy Seal Teams, Royal Military Police, Royal Marine Commandos and other specialist units of the American, British & other International Armed Forces, bringing a wealth of knowledge and diverse languages together.
  • 7. Proprietary and Confidential 7 DocomUSA Security anti piracy and maritime services include, but are not exhaustive to the following; Maritime Security Officers (MSO) Specifically trained security guard teams will escort, advise and gain real time intelligence and threat assessments to mitigate the risk to Master and crew onboard vessels that will be transiting through high risk areas, like the Gulf of Aden and West Africa. Our security team will utilize the latest Anti Piracy passive security procedures and training so that the security team and crew can work together to deter and defend the vessel from any potential attack by pirates. Port Security Officers (PSO) Gate and sentry security personnel to control all assess and guarding elements of the port or installation, including; CCTV, intruder and fire monitoring , screening of work based and visiting personnel, vehicles and equipment of contractors, freight, containers and port buildings. In addition we have highly trained dog and handler patrol teams that specialize in guarding or search of explosives, weapons and drugs.
  • 8. Proprietary and Confidential 8 Security Search Dive Teams. Some tankers could be targeted by terrorists or activists; DocomUSA Security has at its disposal experienced security dive search personnel. The diver can search the water line and underside of the hull in order to ascertain if any explosive device(s) have been planted. If an explosive device is discovered, our teams will evacuate the vessel and the immediate area and set up a cordon, they will then inform the local police and continue to liaise with them until the device has been made safe. Maritime Security Liaison Officers (MSLO) Docom USA Security specialist personnel can also be utilised on a more permanent basis, either on a tanker vessel, or shore based installations and will implement the best practice and business continuity with up to date changes in security policies, Local intelligence, planning, procedures, threat assessments and lock down procedures.
  • 9. Proprietary and Confidential 9 Specialist Maritime Security Consultants: Our consultants can be deployed to initiate and implement emergency planning and crisis management surveys and manual written assessments for DocomUSA owned or contract vessels, or oil & gas installations. A minimum qualification of a Masters degree in risk and crisis management and emergency planning is required of all personnel. Port Freight & Equipment Tracking: Asset Surveillance Protection: Freight and transportation leaving a port or secure distribution compound can be targeted by criminal gangs intent on hijacking and theft from the vehicle. Quite often the gangs have received inside information from within the distribution warehouse about the vehicles valued freight, planned stops, routes and final destination. Effective measures can be utilized by placing hidden trackers within the shipment, specialist surveillance teams can also be deployed to follow and report any planned or attempted attacks to a dedicated control center and the police.
  • 10. Proprietary and Confidential 10 Investigation & Infiltration Teams: It could be discovered that shipments of refined products have been reported as missing and it is suspected that employees are involved in theft from within the company. Theft can occur from within organizations; bonded warehouses or other cargo storage facilities within the port, these factors can have a big impact on production and profit. Individuals who is specialize in investigation and infiltration techniques can be deployed on the pretext of becoming a regular employee, and then placed within the problematic work area. Over time the undercover investigator can reveal the identity of the perpetrators and how and where the theft is taking place. Evidence in the form of covert photographic imagery can be produced to company officials to be processed at their discretion.Alternatively management may prefer to investigate the theft in a more overt capacity, utilizing an experienced investigation team.
  • 11. Proprietary and Confidential 11 Maritime Penetration Testing: It is a good idea to test our own security for vulnerability and possible areas of bad security practice from our own employees using outside sources. This could be a vessel which is docked in a port, bonded (high value freight) warehouses, port security guard teams etc.; Experienced and specialist operators will test their security, this could be by means of simply gaining entry into a building or vessel or sending a package with a fake bomb inside, and many more. If the specialist operator has successfully succeeded with their mission, they will then write a full vulnerability assessment report so that the client can assess their most vulnerable areas for the future.
  • 12. Proprietary and Confidential 12 Port CCTV Installation: A full risk assessment of the port and any buildings within shall be given, suggesting where best to place CCTV cameras. Covert cameras can also be installed to detect theft of freight or equipment occurring by criminals gaining access into the port or by its own employees.
  • 13. Proprietary and Confidential 13 Port Security Survey (PSS) A detailed Port security survey is conducted either before the new key security personnel are implemented or if other security personnel are already in place. The security survey outlines any changes in; current policy, local threat analysis, vulnerabilities and a recommended security action plan and control measures to be implemented.
  • 14. Proprietary and Confidential 14 Ship Security Survey (SSS) A detailed independent ship security survey will be conducted on a regular basis to outline the vulnerabilities and recommend security control measures, our action plan lists key priorities to be implemented. Ship Security Design Plan Common ship design has revealed many critical physical and technical security vulnerabilities and features. An increase in piracy attacks against commercial and private shipping in some cases has shown that the structural design of the ship has allowed the attackers a more successful rate in hijacking and theft. A more secure design on a new build will provide vital resilience in structure and decrease the possibility of successful attacks in the future. Our team is playing a vital role by providing security advice in the early stages of architectural planning as in the case of both the DocomUSA Solar Hybrid Oil Tanker and DocomUSAHarth Superfast Tanker designs.
  • 15. Proprietary and Confidential 15 Leadership: The DocomUSA Security team is lead by Captain Bruce Little. Little is a former US Army Green Beret who saw action in Vietnam at a time when the mortality rate for Green berets was over 80 percent. Little recently retired from a 34 year career in the New Orleans Police Department and was the commander of the special investigations division. Little has consulted and trained special forces in several countries friendly to the U.S. and is an expert in port and maritime security.