This document provides an overview of an advanced cruise ship security course that exceeds the requirements of the Cruise Vessel Security and Safety Act of 2010. The 5-day course teaches skills related to crime prevention, detection, evidence preservation, and reporting. It was developed by Vincent McNally, who has experience in law enforcement, security, and academia. The course aims to provide knowledge for vessel security personnel to perform their duties according to the CVSSA through lectures, exercises, and practical scenario training.
This document provides an overview of training topics for a shore-based ship security team course. The course covers requirements for ship security plans, current security threats and patterns, emergency procedures, recognition of security risks, security equipment operations, and inspection techniques. It also reviews US Coast Guard and IMO regulations regarding ship identification numbers, automatic identification systems, continuous synopsis records, and ship security alert systems. Designated foreign terrorist organizations that pose threats to maritime security are also listed and described.
This document outlines regulations related to maritime transport security in Fiji according to the International Ship and Port Facility Security (ISPS) Code. It defines key terms and sets responsibilities for various entities. The regulations apply to passenger and cargo ships engaged in international voyages as well as certain port facilities. It establishes security levels and requirements for ship and facility security plans, training, audits, and more. Responsibilities are defined for shipping companies, ships, port facilities, and the Maritime Safety Authority of Fiji.
This document provides an overview of a training course on ship and port facility security based on the International Ship and Port Facility Security Code (ISPS Code).
The training course covers: 1) the background and origins of the ISPS Code following terrorist attacks, 2) the key requirements and principles of the ISPS Code for ships and port facilities, and 3) the roles and responsibilities of different parties including contracting governments, administrations, companies, port facilities, ships, and recognized security organizations in implementing and overseeing compliance with the ISPS Code.
The International Ship and Port Facility Security (ISPS) Code is an amendment to the SOLAS Convention that establishes minimum security standards and procedures for ships and port facilities to detect and deter threats. It prescribes responsibilities for governments, shipping companies, shipboard personnel, and port/facility personnel. The Code outlines a standardized framework for evaluating risk at facilities of varying types and sizes, and identifies key security measures including vessel and facility security plans, ship and facility security officers, access controls, and monitoring of people and cargo. It aims to enable information collection and sharing to ensure adequate security measures are in place internationally.
This document provides guidelines for ship and port facility security assessments and plans in compliance with the International Ship and Port Facility Security Code adopted in 2002. It was prepared by the Office for Transportation Security in the Philippines. The guidelines ensure compliance with the new International Maritime Organization security framework and require all covered Philippine ships, ports and facilities to have approved security assessments and plans by June 30, 2004. The document defines key terms, outlines objectives, and provides detailed chapters on security assessments, plans, and other procedures for ships and port facilities.
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Danladi Caleb
Maritime security comes out as one of the essential issue in the modern society because of the social and political implication towards the achievement of growth and development
This document discusses piracy at sea and the potential role of mediation. It begins by defining key terms like piracy, kidnap for ransom, and the impact on seafarers. Case studies of specific ship hijackings are provided. The consequences of piracy are outlined, including ransom payments and insurance implications. Views from the shipping industry call for increased protection of seafarers and prosecution of financiers. While mediation could help resolve some hijackings, its applicability is unclear given the criminal nature and multiple parties involved in piracy.
This document provides an overview of training on anti-piracy best practices for ship crews transiting high-risk areas. It covers definitions of piracy, common pirate tactics, recommended defensive measures before and during transit, procedures if attacked, and post-incident reporting. The training aims to educate crews on avoiding, deterring and handling piracy incidents through practices such as increased vigilance when off Somalia, using evasive maneuvers, locking down the ship, and contacting authorities after any attack. Contact details are also provided for organizations that can provide assistance in the event of pirate activity.
This document provides an overview of training topics for a shore-based ship security team course. The course covers requirements for ship security plans, current security threats and patterns, emergency procedures, recognition of security risks, security equipment operations, and inspection techniques. It also reviews US Coast Guard and IMO regulations regarding ship identification numbers, automatic identification systems, continuous synopsis records, and ship security alert systems. Designated foreign terrorist organizations that pose threats to maritime security are also listed and described.
This document outlines regulations related to maritime transport security in Fiji according to the International Ship and Port Facility Security (ISPS) Code. It defines key terms and sets responsibilities for various entities. The regulations apply to passenger and cargo ships engaged in international voyages as well as certain port facilities. It establishes security levels and requirements for ship and facility security plans, training, audits, and more. Responsibilities are defined for shipping companies, ships, port facilities, and the Maritime Safety Authority of Fiji.
This document provides an overview of a training course on ship and port facility security based on the International Ship and Port Facility Security Code (ISPS Code).
The training course covers: 1) the background and origins of the ISPS Code following terrorist attacks, 2) the key requirements and principles of the ISPS Code for ships and port facilities, and 3) the roles and responsibilities of different parties including contracting governments, administrations, companies, port facilities, ships, and recognized security organizations in implementing and overseeing compliance with the ISPS Code.
The International Ship and Port Facility Security (ISPS) Code is an amendment to the SOLAS Convention that establishes minimum security standards and procedures for ships and port facilities to detect and deter threats. It prescribes responsibilities for governments, shipping companies, shipboard personnel, and port/facility personnel. The Code outlines a standardized framework for evaluating risk at facilities of varying types and sizes, and identifies key security measures including vessel and facility security plans, ship and facility security officers, access controls, and monitoring of people and cargo. It aims to enable information collection and sharing to ensure adequate security measures are in place internationally.
This document provides guidelines for ship and port facility security assessments and plans in compliance with the International Ship and Port Facility Security Code adopted in 2002. It was prepared by the Office for Transportation Security in the Philippines. The guidelines ensure compliance with the new International Maritime Organization security framework and require all covered Philippine ships, ports and facilities to have approved security assessments and plans by June 30, 2004. The document defines key terms, outlines objectives, and provides detailed chapters on security assessments, plans, and other procedures for ships and port facilities.
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Danladi Caleb
Maritime security comes out as one of the essential issue in the modern society because of the social and political implication towards the achievement of growth and development
This document discusses piracy at sea and the potential role of mediation. It begins by defining key terms like piracy, kidnap for ransom, and the impact on seafarers. Case studies of specific ship hijackings are provided. The consequences of piracy are outlined, including ransom payments and insurance implications. Views from the shipping industry call for increased protection of seafarers and prosecution of financiers. While mediation could help resolve some hijackings, its applicability is unclear given the criminal nature and multiple parties involved in piracy.
This document provides an overview of training on anti-piracy best practices for ship crews transiting high-risk areas. It covers definitions of piracy, common pirate tactics, recommended defensive measures before and during transit, procedures if attacked, and post-incident reporting. The training aims to educate crews on avoiding, deterring and handling piracy incidents through practices such as increased vigilance when off Somalia, using evasive maneuvers, locking down the ship, and contacting authorities after any attack. Contact details are also provided for organizations that can provide assistance in the event of pirate activity.
IONS Seminar 2014 - Session 4 - Implementation of the ISPS Code in the Indian...Navy Webmaster
The document discusses the implementation of the ISPS Code in the Indian Ocean Region. It provides an overview of the ISPS Code, which establishes an international framework of minimum security requirements for ships and port facilities to detect and deter threats to maritime security. It also mentions the role of regional cooperation mechanisms like the Indian Ocean Memorandum of Understanding on Port State Control and the importance of civil-military cooperation to enhance maritime security.
Piracy off the coast of Somalia has increased dramatically in recent years, with pirates capturing cargo ships and demanding large ransoms. The pirates are believed to be mostly former fishermen who now operate speedboats launched from larger "mother ships." There is ongoing debate about the pirates' links to terrorist groups in Somalia and whether measures like armed private security guards or military intervention can effectively address the problem. The piracy is damaging to the shipping industry and some experts warn it could spread instability across East Africa if not contained.
YRM is a service of Main Raise Yachting designed for Yacht Owner, Captain and Yacht Operator Manager.
Is valid also for shore protection .
This is the Start of a series of solution for security and support during the navigation .
If Interested in All service of Main Raise with aims to improve the Yachting Life, please contact info@main-raise.com
YRM is a Maritime Security Service and Training Program for Yacht Owner, Captain &Company.
This new Service is the the start for other future Solution in Collaboration with Coast Guard, authority and private service.
If interested in all the service of Main Raise with the aims to improve the yachting life, please contact at macri@main-raise.com.
Piracy as a Transnational Threat in the Horn of AfricaMartino Sacchi
Somali piracy emerged as a transnational threat in the 2000s as attacks spread across the key shipping lanes in the Gulf of Aden and Indian Ocean. In response, numerous countries launched counter-piracy operations individually at first, including Italy, France, Russia, China, India, and others. The turning point came with the 2008 hijacking of the Faina, leading major Western nations like the EU and NATO to coordinate the Atalanta and Ocean Shield missions. While Somali pirates were motivated by money rather than ideology, the counter-piracy efforts marked an important transnational cooperation between Western and non-Western navies against this shared threat on the high seas.
Mitigating Ship Piracy Through Crisis (Hostage) NegotiationsVincent McNally
This document outlines a crisis preparedness and response program for cruise lines consisting of two parts:
1. Training cruise line officers and management in crisis negotiation techniques and acute traumatic stress management through a half-day seminar. This prepares them to respond to escalating crises involving passengers or crew.
2. Providing on-ship assistance after a critical incident or accident through acute traumatic stress management, psychoeducational presentations, critical incident stress debriefing, and follow-up seminars. This aims to mitigate trauma for crew and passengers in the aftermath.
The program teaches techniques from the FBI crisis negotiation course to give cruise line staff an effective response protocol until law enforcement arrives. Its primary goals are to ease
IONS Seminar 2014 - Comments in the MarginNavy Webmaster
1) The document discusses Iran's navy taking responsibility for security building at sea in the Persian Gulf, Strait of Hormuz, and Oman Sea through continuous patrols and cooperation with regional countries.
2) It also discusses Iran's navy participating in efforts to ensure security in the north Indian Ocean and Gulf of Aden through naval exercises, training, and developing partnerships.
3) The document argues that optimal global maritime security can be achieved through regional cooperation rather than relying on forces from outside the region.
DocomUSA provides comprehensive security systems and services to protect oil refineries and related infrastructure from terrorist threats. This includes security for land-based refineries and pipelines as well as maritime operations to secure oil tankers and ports from piracy and other threats. DocomUSA's security experts have military and law enforcement backgrounds and can provide services such as threat assessments, risk management, armed security teams, undercover investigations, and security system installations and testing to help clients achieve the most secure operations.
How IUU fishing impacts small-scale fishers' livesSWAIMSProject
By Prof Stella Williams, Vice-President, Mundus Maris; and lead Researcher for the Nigerian Association of Fish Farmers and Aqua-culturists (NAFFA)
SWAIMS Webinar on Curbing Maritime Insecurity in the Niger Delta, 31st March 31, 2021
The document discusses asymmetric threats to ships and maritime assets. It summarizes the MARSS Group's security systems, including NiDAR for maritime security, which uses integrated sensors and open-source intelligence to detect surface, underwater and drone threats. The system is designed to provide early detection through automated classification and tracking of threats, and includes non-lethal deterrent options to escalate response based on rules of engagement. Asymmetric threats are real and increasing, demonstrated through examples of terrorist and criminal attacks on ships, but traditional ship design still focuses on inter-state warfare. New technical solutions are needed to address this changing threat environment.
This document discusses domestic ferry safety, particularly in the developing world. It notes that while international ferry safety has improved, domestic ferry safety in parts of the developing world remains poor, with frequent accidents resulting in large loss of life. Reasons for this include lack of regulations, weak regulatory enforcement, unsafe vessels, overloading of passengers and cargo, and poor rescue responses during accidents. The document calls for greater efforts to improve domestic ferry safety standards and enforcement in the developing world in order to reduce accidents and save lives.
Maritime piracy a sustainable global solutionSanuraDeAlwis
A proposal for a sustainable global solution for a pressing social issue common in the world. By Paul R. Williams and Lowry Pressly from the Case Western Reserve University, School of Law
The document summarizes information about piracy off the coast of Somalia, including statistics on pirate attacks in 2008, the organization and profit structure of Somali piracy rings, effects on global shipping, and examples of specific ship hijacking incidents.
This document discusses the Office of Naval Intelligence's (ONI) role in combating piracy. ONI's primary role is providing threat warnings to the merchant maritime community through reports like the Worldwide Threat to Shipping Message. ONI also helps military and policymakers understand the nature of piracy threats. ONI monitors piracy incidents to identify real threats and understand reporting limitations. Additionally, the document provides a case study of a piracy incident involving the Safina Al Bisarat cargo dhow hijacking to demonstrate the complex international response challenges piracy can present.
1. Beluga ships traveling through the Gulf of Aden follow a 4 stage routine to prepare for and conduct safe passage. This includes crew training, communication with naval forces, preparing the ship for potential pirate attacks, and conducting a guarded group transit.
2. During transit, ships report hourly to naval forces and Beluga, remain on high alert with fire pumps and lookouts ready, and are prepared to take evasive maneuvers.
3. After passage, ships return to normal security levels and debrief crew on the transit experience. Beluga also communicates any sightings or incidents to other ships in transit.
Naval participation in counter-piracy operations around the Horn of Africa has been a success, but does this mean a long-term commitment from governments, or will a change in priorities mean that they leave before the situation is solved? IHS Jane's Defence Weekly Naval Editor Dr Lee Willett examines the issues.
When safety comes last; A short synopisis of events in Nigeria aviation (Pam,...Dung Rwang Pam
After over 40 years of aviation we have the following to show.
1. A national carrier that cost us over $3billion to run and
ruin. Finally, it generated so much embarrassment and
national shame we could not bear to rescue or redeem
it. Two cancers, gross mismanagement and persistent
adverse government interference
2. About 42 indigenous airlines mostly famous for being
infamous; none of which is a world class airline. The
current acid test is the IATA (international air transport
association) operational safety audit (IOSA). Not a single
maintenance facility capable of C checks for any
commercial jet. Thus, most of the aeroplanes that arrive
in Nigeria have an average lifespan of 5 years, after
which they become cadavers defacing our airports or of
late they are being put to good use by aluminium
kitchen utensil makers. Not a single commercial
simulator facility to cater for recurrent pilot training
locally. The Nigeria College of aviation technology
(NCAT) Zaria is currently in critical condition.
3. 0ver 21 Airports with infra structure we’re unable to
maintain. How many of them have the required ICAO
ARFF (international civil aviation organisation Airport
4
Rescue and Fire Fighting) capability to support the
aircraft their runways were designed for? Of course only
five of them have proven economically viability, though
cows have attempted to take over Port Harcourt and Jos
airports at some point in time. The Nigeria
meteorological agency (NIMET) is still unable to provide
our operational airports with 24 hour reliable weather
reports and forecasts.
4. A regulatory system shackled with bureaucracy and
devoid of international credibility; it’s only hope being
Nigeria’s strategic location, large population and the
potential of being the hub in the West African subregion.
Any aircraft registered in Nigeria if at all allowed
to fly even to outside the continent is often subjected to
humiliating detailed spot checks. For these and other
reasons, most leasors will not allow their aircraft to be
registered in Nigeria even if operated in Nigeria.
5. A history of fatal accidents with attendant loss of lives
has earned us a place as the runner up (coming behind
the DR of Congo) on the continent with the worst safety
record globally. Within the last one year, our score
amounts to nearly one casualty every day.
This document provides an agenda for the 12th Annual Border Security Conference taking place on February 12-13, 2019 in Rome, Italy. The conference will bring together border security experts from around the world to discuss strategies and technologies for managing borders effectively in response to issues like migration crises and terrorism. Over the two-day event, speakers from organizations like Frontex, Europol, and various government agencies will provide perspectives on topics such as maritime security, airport security, biometrics and data management, and international cooperation. Attendees will learn about next-generation technologies being implemented at borders as well as political and policy implications for the future of border security.
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...AnirbanMarine
BASED ON IMO MODEL COURSE 3.26 AN ATTEMPT TO EDUCATE OUR SEAFARERS ABOUT THE GROWING NEED TO LOOK AT THE SECURITY ENVIRONMENT IN WHICH TODAY'S SHIPS OPERATE.
Security Training for Seafarers with designated Security dutiesAnirbanMarine
This document provides information on ship and port security training (STSDSD) for seafarers with designated security duties. It discusses the history and development of the International Ship and Port Facility Security (ISPS) Code in response to terrorist attacks. It outlines the structure and purpose of the ISPS Code, current security threats, and definitions of security levels. It then details the security responsibilities of contracting governments, ship owners, ships, ports, and security officers. It provides an overview of key security documents, assessments, equipment, and actions required at different security levels.
IONS Seminar 2014 - Session 4 - Implementation of the ISPS Code in the Indian...Navy Webmaster
The document discusses the implementation of the ISPS Code in the Indian Ocean Region. It provides an overview of the ISPS Code, which establishes an international framework of minimum security requirements for ships and port facilities to detect and deter threats to maritime security. It also mentions the role of regional cooperation mechanisms like the Indian Ocean Memorandum of Understanding on Port State Control and the importance of civil-military cooperation to enhance maritime security.
Piracy off the coast of Somalia has increased dramatically in recent years, with pirates capturing cargo ships and demanding large ransoms. The pirates are believed to be mostly former fishermen who now operate speedboats launched from larger "mother ships." There is ongoing debate about the pirates' links to terrorist groups in Somalia and whether measures like armed private security guards or military intervention can effectively address the problem. The piracy is damaging to the shipping industry and some experts warn it could spread instability across East Africa if not contained.
YRM is a service of Main Raise Yachting designed for Yacht Owner, Captain and Yacht Operator Manager.
Is valid also for shore protection .
This is the Start of a series of solution for security and support during the navigation .
If Interested in All service of Main Raise with aims to improve the Yachting Life, please contact info@main-raise.com
YRM is a Maritime Security Service and Training Program for Yacht Owner, Captain &Company.
This new Service is the the start for other future Solution in Collaboration with Coast Guard, authority and private service.
If interested in all the service of Main Raise with the aims to improve the yachting life, please contact at macri@main-raise.com.
Piracy as a Transnational Threat in the Horn of AfricaMartino Sacchi
Somali piracy emerged as a transnational threat in the 2000s as attacks spread across the key shipping lanes in the Gulf of Aden and Indian Ocean. In response, numerous countries launched counter-piracy operations individually at first, including Italy, France, Russia, China, India, and others. The turning point came with the 2008 hijacking of the Faina, leading major Western nations like the EU and NATO to coordinate the Atalanta and Ocean Shield missions. While Somali pirates were motivated by money rather than ideology, the counter-piracy efforts marked an important transnational cooperation between Western and non-Western navies against this shared threat on the high seas.
Mitigating Ship Piracy Through Crisis (Hostage) NegotiationsVincent McNally
This document outlines a crisis preparedness and response program for cruise lines consisting of two parts:
1. Training cruise line officers and management in crisis negotiation techniques and acute traumatic stress management through a half-day seminar. This prepares them to respond to escalating crises involving passengers or crew.
2. Providing on-ship assistance after a critical incident or accident through acute traumatic stress management, psychoeducational presentations, critical incident stress debriefing, and follow-up seminars. This aims to mitigate trauma for crew and passengers in the aftermath.
The program teaches techniques from the FBI crisis negotiation course to give cruise line staff an effective response protocol until law enforcement arrives. Its primary goals are to ease
IONS Seminar 2014 - Comments in the MarginNavy Webmaster
1) The document discusses Iran's navy taking responsibility for security building at sea in the Persian Gulf, Strait of Hormuz, and Oman Sea through continuous patrols and cooperation with regional countries.
2) It also discusses Iran's navy participating in efforts to ensure security in the north Indian Ocean and Gulf of Aden through naval exercises, training, and developing partnerships.
3) The document argues that optimal global maritime security can be achieved through regional cooperation rather than relying on forces from outside the region.
DocomUSA provides comprehensive security systems and services to protect oil refineries and related infrastructure from terrorist threats. This includes security for land-based refineries and pipelines as well as maritime operations to secure oil tankers and ports from piracy and other threats. DocomUSA's security experts have military and law enforcement backgrounds and can provide services such as threat assessments, risk management, armed security teams, undercover investigations, and security system installations and testing to help clients achieve the most secure operations.
How IUU fishing impacts small-scale fishers' livesSWAIMSProject
By Prof Stella Williams, Vice-President, Mundus Maris; and lead Researcher for the Nigerian Association of Fish Farmers and Aqua-culturists (NAFFA)
SWAIMS Webinar on Curbing Maritime Insecurity in the Niger Delta, 31st March 31, 2021
The document discusses asymmetric threats to ships and maritime assets. It summarizes the MARSS Group's security systems, including NiDAR for maritime security, which uses integrated sensors and open-source intelligence to detect surface, underwater and drone threats. The system is designed to provide early detection through automated classification and tracking of threats, and includes non-lethal deterrent options to escalate response based on rules of engagement. Asymmetric threats are real and increasing, demonstrated through examples of terrorist and criminal attacks on ships, but traditional ship design still focuses on inter-state warfare. New technical solutions are needed to address this changing threat environment.
This document discusses domestic ferry safety, particularly in the developing world. It notes that while international ferry safety has improved, domestic ferry safety in parts of the developing world remains poor, with frequent accidents resulting in large loss of life. Reasons for this include lack of regulations, weak regulatory enforcement, unsafe vessels, overloading of passengers and cargo, and poor rescue responses during accidents. The document calls for greater efforts to improve domestic ferry safety standards and enforcement in the developing world in order to reduce accidents and save lives.
Maritime piracy a sustainable global solutionSanuraDeAlwis
A proposal for a sustainable global solution for a pressing social issue common in the world. By Paul R. Williams and Lowry Pressly from the Case Western Reserve University, School of Law
The document summarizes information about piracy off the coast of Somalia, including statistics on pirate attacks in 2008, the organization and profit structure of Somali piracy rings, effects on global shipping, and examples of specific ship hijacking incidents.
This document discusses the Office of Naval Intelligence's (ONI) role in combating piracy. ONI's primary role is providing threat warnings to the merchant maritime community through reports like the Worldwide Threat to Shipping Message. ONI also helps military and policymakers understand the nature of piracy threats. ONI monitors piracy incidents to identify real threats and understand reporting limitations. Additionally, the document provides a case study of a piracy incident involving the Safina Al Bisarat cargo dhow hijacking to demonstrate the complex international response challenges piracy can present.
1. Beluga ships traveling through the Gulf of Aden follow a 4 stage routine to prepare for and conduct safe passage. This includes crew training, communication with naval forces, preparing the ship for potential pirate attacks, and conducting a guarded group transit.
2. During transit, ships report hourly to naval forces and Beluga, remain on high alert with fire pumps and lookouts ready, and are prepared to take evasive maneuvers.
3. After passage, ships return to normal security levels and debrief crew on the transit experience. Beluga also communicates any sightings or incidents to other ships in transit.
Naval participation in counter-piracy operations around the Horn of Africa has been a success, but does this mean a long-term commitment from governments, or will a change in priorities mean that they leave before the situation is solved? IHS Jane's Defence Weekly Naval Editor Dr Lee Willett examines the issues.
When safety comes last; A short synopisis of events in Nigeria aviation (Pam,...Dung Rwang Pam
After over 40 years of aviation we have the following to show.
1. A national carrier that cost us over $3billion to run and
ruin. Finally, it generated so much embarrassment and
national shame we could not bear to rescue or redeem
it. Two cancers, gross mismanagement and persistent
adverse government interference
2. About 42 indigenous airlines mostly famous for being
infamous; none of which is a world class airline. The
current acid test is the IATA (international air transport
association) operational safety audit (IOSA). Not a single
maintenance facility capable of C checks for any
commercial jet. Thus, most of the aeroplanes that arrive
in Nigeria have an average lifespan of 5 years, after
which they become cadavers defacing our airports or of
late they are being put to good use by aluminium
kitchen utensil makers. Not a single commercial
simulator facility to cater for recurrent pilot training
locally. The Nigeria College of aviation technology
(NCAT) Zaria is currently in critical condition.
3. 0ver 21 Airports with infra structure we’re unable to
maintain. How many of them have the required ICAO
ARFF (international civil aviation organisation Airport
4
Rescue and Fire Fighting) capability to support the
aircraft their runways were designed for? Of course only
five of them have proven economically viability, though
cows have attempted to take over Port Harcourt and Jos
airports at some point in time. The Nigeria
meteorological agency (NIMET) is still unable to provide
our operational airports with 24 hour reliable weather
reports and forecasts.
4. A regulatory system shackled with bureaucracy and
devoid of international credibility; it’s only hope being
Nigeria’s strategic location, large population and the
potential of being the hub in the West African subregion.
Any aircraft registered in Nigeria if at all allowed
to fly even to outside the continent is often subjected to
humiliating detailed spot checks. For these and other
reasons, most leasors will not allow their aircraft to be
registered in Nigeria even if operated in Nigeria.
5. A history of fatal accidents with attendant loss of lives
has earned us a place as the runner up (coming behind
the DR of Congo) on the continent with the worst safety
record globally. Within the last one year, our score
amounts to nearly one casualty every day.
This document provides an agenda for the 12th Annual Border Security Conference taking place on February 12-13, 2019 in Rome, Italy. The conference will bring together border security experts from around the world to discuss strategies and technologies for managing borders effectively in response to issues like migration crises and terrorism. Over the two-day event, speakers from organizations like Frontex, Europol, and various government agencies will provide perspectives on topics such as maritime security, airport security, biometrics and data management, and international cooperation. Attendees will learn about next-generation technologies being implemented at borders as well as political and policy implications for the future of border security.
SECURITY TRAINING FOR SEAFARERS WITH DESIGNATED SECURITY DUTIES IMO MODEL COU...AnirbanMarine
BASED ON IMO MODEL COURSE 3.26 AN ATTEMPT TO EDUCATE OUR SEAFARERS ABOUT THE GROWING NEED TO LOOK AT THE SECURITY ENVIRONMENT IN WHICH TODAY'S SHIPS OPERATE.
Security Training for Seafarers with designated Security dutiesAnirbanMarine
This document provides information on ship and port security training (STSDSD) for seafarers with designated security duties. It discusses the history and development of the International Ship and Port Facility Security (ISPS) Code in response to terrorist attacks. It outlines the structure and purpose of the ISPS Code, current security threats, and definitions of security levels. It then details the security responsibilities of contracting governments, ship owners, ships, ports, and security officers. It provides an overview of key security documents, assessments, equipment, and actions required at different security levels.
At Leesfield & Partners, a law firm based in Miami, they represent many passengers who have been injured on cruise ships through no fault of their own. With nearly 10 million passengers taking cruises from North America each year, safety is a growing concern among lawmakers and cruise travelers. In response, the Cruise Vessel Security and Safety Act was passed, establishing new safety regulations for cruise ships and protocols for handling incidents. As experienced cruise ship litigation attorneys, Leesfield & Partners provides counsel to injured passengers and is familiar with how cruise lines aim to discredit legitimate claims.
Respond with 250 wordsThe enactment of the Maritime Transportatmickietanger
Respond with 250 words:
The enactment of the Maritime Transportation Security Act (MTSA) and the Security and Accountability For Every Port Act (SAFE Port Act) changed the United States maritime industry. Port facilities and shipping companies were tasked to conduct security assessments and develop comprehensive security plans. Protecting American ports are a priority as they provide economic stability and growth to not only the United States, but the world. The safe movement of cargo is made possible through port facilities and operations, connecting the land with the sea.
There are hundreds of ports across the country serving all modes of maritime shipping, whether it’s containers, passengers, petroleum products, or dried goods. According to the United Nations Conference on Trade and Development, “most ports are characterized by a mixed ownership between private terminal operations and public port authorities” (2016, p. 63). Although there may be a variety of companies operating at a port, they are leasing the property or terminal, in which the port maintains ownership. Therefore, the port is responsible for creating and implementing a security plan, approved by the U.S. Coast Guard. This plan will identify access control, security, and response measures to a variety of threats, which could include chemical, biological, radiological, or nuclear weapons.
If a weapon of mass destruction (WMD) were to be used at a port, the results would be devastating; thousands of lives would be lost and damage and trade losses would cost billions. According to Nincic, “maritime attacks have tended to be fairly small in nature, consisting largely of bombings near port facilities” (2012, para. 2). Despite the fact that attacks have been “small”, it is quite important to note that they have occurred at port facilities, not on ships. With an increase in terrorist activities over the years, and the desire to cause physical and economic harm to the United States, a WMD attack must be taken seriously.
Emergency management plans, including the prevention, preparation, and response to a WMD attack must be detailed. The United States Department of Transportation (USDOT) recognizes “the opening of a domestic port or waterway after a natural or human caused disaster is a complex challenge with a wide range of variables and coordination needs” (2015, para. 1). Due to the power and nature of a WMD attack, it is most likely that areas outside port facilities will be affected, but this discussion will focus on the port area. The U.S. Coast Guard Captain of the Port would be responsible for implementing the Area Maritime Security Plan as required by the Security and Accountability For Every Port Act, which would aid in the recovery of the maritime transportation system.
Such safety and emergency management plans would include information on the type of traffic the port typically handles, whether it’s commercial, pleas ...
The document discusses the International Ship and Port Facility Security (ISPS) Code. It was created by the International Maritime Organization to detect security threats and enhance maritime security. The code establishes requirements for ships and port facilities to implement security plans, appoint security officers, and follow protocols to manage risks like piracy, terrorism, and smuggling. It requires facilities and ships to control access, monitor activities, and ensure secure communications through measures specified in their plans. The ISPS Code aims to set an international framework for maritime security.
This chapter discusses security challenges across various transportation sectors and efforts to address them. It covers difficulties hardening airports, rail stations, ports and securing cargo. Mass transit poses unique risks given accessibility needs. The Transportation Security Administration took over after 9/11 but screeners still miss threats and more funding is needed. Pipeline and trucking industries expanded monitoring but more coordinated security strategies are still needed across sectors. Risk assessment and management best practices can help but bureaucracy has slowed comprehensive security progress.
Indonesia Port Security - International Standards for Success - The Maritime ...Scott Bernat
Indonesia depends on its ports and maritime industry for economic growth. Adhering to international security standards like the International Ship and Port Facility Security (ISPS) Code and ISO 28000 supply chain standards increases safety, security and confidence in maritime trade. The ISPS Code and ISO 28000 were established to enhance protection against criminal and terrorist threats to ships, ports and supply chains. Implementing these standards highlights Indonesia's commitment to security excellence and supports its role in world trade.
The maritime industry is one of the largest on the planet, and ensuring operations at sea continue safely takes determined effort. The implementation of maritime security takes both knowledge and vigilance, and is essential to enhance security enforcement without slowing down the timely flow of international commerce. Maritime security is a specialized field in the marine sector, and safety officers must employ best practices to defend their vessel against both internal and external threats. These threats come in various forms, and each requires a different strategy for a proper defense. Security risks are not always malicious, but maintaining vessel safety is a constant priority. Maritime security is a general term for the protection of vessels both internally and externally. The areas from which ships and maritime operations need protecting include terrorism, piracy, robbery, illegal trafficking of goods and people, illegal fishing and pollution.Through supervision, inspection and proactive procedures, the marine industry does its best to minimize threats to maritime security, both malicious and accidental. And as the industry evolves and the marine sector grows, vigilance, enforcement and training will have to keep up with technology and increased opportunity for threats.Since 9 11, there’s been an increased focus on protecting the marine sector from terrorism and other similar attacks, both in port and at sea. Several state and international organizations have formed to help set standards for bettering maritime security. Since the marine sector is so vast and the massive amount of goods entering the country is difficult to screen, every precaution possible to minimizing malicious exploitation is critical.Security is not only the job of vessel safety officers, but the job of the crew as a whole, which is why it’s so crucial for companies to educate and train their employees so their vessels have a better chance of stopping security threats. Dr. Manoj Kumar "Maritime Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49714.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/49714/maritime-security/dr-manoj-kumar
MARITIME CRITICAL
INFRASTRUCTURE
PROTECTION
DHS Needs to Better
Address Port
Cybersecurity
Report to the Chairman, Committee on
Commerce, Science, and
Transportation, U.S. Senate
June 2014
GAO-14-459
United States Government Accountability Office
United States Government Accountability Office
Highlights of GAO-14-459, a report to the
Chairman, Committee on Commerce, Science,
and Transportation, U.S. Senate
June 2014
MARITIME CRITICAL INFRASTRUCTURE
PROTECTION
DHS Needs to Better Address Port Cybersecurity
Why GAO Did This Study
U.S. maritime ports handle more than
$1.3 trillion in cargo annually. The
operations of these ports are
supported by information and
communication systems, which are
susceptible to cyber-related threats.
Failures in these systems could
degrade or interrupt operations at
ports, including the flow of commerce.
Federal agencies—in particular DHS—
and industry stakeholders have
specific roles in protecting maritime
facilities and ports from physical and
cyber threats.
GAO’s objective was to identify the
extent to which DHS and other
stakeholders have taken steps to
address cybersecurity in the maritime
port environment. GAO examined
relevant laws and regulations;
analyzed federal cybersecurity-related
policies and plans; observed
operations at three U.S. ports selected
based on being a high-risk port and a
leader in calls by vessel type, e.g.
container; and interviewed federal and
nonfederal officials.
What GAO Recommends
GAO recommends that DHS direct the
Coast Guard to (1) assess cyber-
related risks, (2) use this assessment
to inform maritime security guidance,
and (3) determine whether the sector
coordinating council should be
reestablished. DHS should also direct
FEMA to (1) develop procedures to
consult DHS cybersecurity experts for
assistance in reviewing grant
proposals and (2) use the results of the
cyber-risk assessment to inform its
grant guidance. DHS concurred with
GAO’s recommendations.
What GAO Found
Actions taken by the Department of Homeland Security (DHS) and two of its
component agencies, the U.S. Coast Guard and Federal Emergency
Management Agency (FEMA), as well as other federal agencies, to address
cybersecurity in the maritime port environment have been limited.
• While the Coast Guard initiated a number of activities and coordinating
strategies to improve physical security in specific ports, it has not conducted
a risk assessment that fully addresses cyber-related threats, vulnerabilities,
and consequences. Coast Guard officials stated that they intend to conduct
such an assessment in the future, but did not provide details to show how it
would address cybersecurity. Until the Coast Guard completes a thorough
assessment of cyber risks in the maritime environment, the ability of
stakeholders to appropriately plan and allocate resources to protect ports
and other maritime facilities will be lim.
“Individually we are one drop. Together we are an ocean.”
- Ryunosuke Satoro
“The achievements of an organization are the results of the combined effort of each individual.”
- Vince Lombardi
“The strength of the team is each individual member. The strength of each member is the team.”
- Phil Jackson
The document discusses maritime security opportunities in the United States commercial market from 2014-2015. It outlines Cobham plc's existing partnerships and customers in areas such as ports, oil/gas operations, waterside and offshore assets, and vessels. The document proposes expanding these partnerships and pursuing new decision makers and influencers, including specific ports, airports, oil companies, and offshore drilling companies in the Gulf of Mexico region.
Robert Pottgieser has over 20 years of experience in maritime facility inspections and hazardous material handling. He currently works as a Senior Safety Coordinator at the Jacksonville Port Authority, where his responsibilities include developing safety procedures, investigating incidents, and coordinating emergency preparedness programs. Prior to this, he spent over 20 years in the Coast Guard supervising inspections of maritime facilities and containers to ensure compliance with regulations regarding hazardous materials transportation.
The ISPS Code is a comprehensive set of measures developed by the IMO to enhance maritime security. It was developed in response to terrorist attacks like 9/11 and the attack on the Limburg tanker. The ISPS Code has two parts - Part A which contains mandatory requirements for ships and port facilities, and Part B which contains guidance. Key elements of the ISPS Code include conducting vessel and facility security assessments to identify vulnerabilities, developing security plans, appointing security officers, controlling access to restricted areas, conducting drills and exercises, and setting security levels. Contracting governments are responsible for oversight of the ISPS Code and can authorize Recognized Security Organizations to assist with certain activities.
This document provides an introduction and overview of marine insurance. It discusses the history and origins of marine insurance in ancient Greece, Rome, and Italy. It defines the nature and scope of marine insurance as covering losses related to ships, cargo, and transportation by sea. The document then outlines the main types of marine insurance, including hull insurance, cargo insurance, freight insurance, and marine liability insurance. It also mentions different types of marine insurance policies like voyage policies, time policies, and mixed policies.
CBP uses multiple strategies and technologies to secure US borders while facilitating legitimate trade and travel. These include screening passengers and cargo prior to arrival through databases and risk analysis. CBP also utilizes sensors, cameras, and drones for surveillance of land and maritime borders. Future plans include further integration of these technologies into a common operating picture to improve threat detection and law enforcement response coordination.
This training course provides knowledge to those who may serve as Ship Security Officers. The course covers key responsibilities and competencies of SSOs, including maintaining and supervising ship security plans, assessing risks, and ensuring proper operation of security equipment. It also reviews historical security incidents like piracy and terrorism that led to updated regulations. Current security threats are examined, such as piracy, terrorism, contraband smuggling, stowaways, cargo theft, and collateral damage. International maritime security policies and the responsibilities of governments, companies, and designated security officers are outlined.
This training course aims to provide knowledge to ship security officers on their duties and responsibilities. The document outlines the course over six key threats: piracy and armed robbery, terrorism, contraband smuggling, stowaways and refugees, cargo theft, and collateral damage. It discusses the historical context and current security patterns for each threat, highlighting specific regions and groups that pose ongoing risks to ship security. The goal is to help security officers maintain and supervise ship security plans to address such threats.
This training course aims to provide knowledge to ship security officers on their duties and responsibilities. The document outlines the course over six key threats: piracy and armed robbery, terrorism, contraband smuggling, stowaways and refugees, cargo theft, and collateral damage. It discusses the historical context and current security patterns for each threat, highlighting specific regions and groups that pose ongoing risks to ship security. The goal is to help security officers maintain and supervise ship security plans to address such threats.
Maritime Economics: Maritime Security and Piracy by Chinazor Henry Mmeje.pptxMMEJEHENRYFORD
The protection of vessels both internally and externally. The areas from which ships and maritime operations need protecting include terrorism, piracy, cyber attacks, robbery, illegal trafficking of goods and people, illegal fishing and pollution etc.
Similar to one week ADVANCED SHIP SECURITY COURSE (20)
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
1. ADVANCED CRUISE SHIP SECURITY COURSE:
CRIME PREVENTION, DETECTION, EVIDENCE PRESERVATION AND REPORTING:
CRUISE LINE SECURITY AND SAFETY ACT OF 2010
VINCENT J. McNALLY, MPS, CEAP
SAFEATSEA@HOTMAIL.COM
813 802 8086
2. OVERVIEW
Overview: This 5 day course is a reality based seminar with exercises which exceeds
the requirements of CVSSA, and is intended to provide knowledge required for
security personnel assigned to passenger vessels.
This course has been received by the designated US Government certifying agency
(MARAD) and is awaiting final approval.
This course was developed by Vincent McNally who has six years’ experience as a
ship Security Officer for a major cruise line, police instructor in Baghdad, Iraq, over
30 years as an FBI Agent, Supervisor and Unit Chief as well as developing master
degree university courses .
Contact: safeatsea@hotmail.com
3. SCOPE
This course is intended to provide the knowledge required for personnel who are assigned
passenger vessel security responsibilities to perform their duties as mandated in the
Cruise Vessel Security and Safety Act of 2010 (CVSSA) , Pub. L. No. 111-207 (July 27, 2010)
(codified at 46 U.S.C. Sections 3507, 3508). (As MARAD, per e-mail and conversation on
8/29/2012, advised the instructor Vince McNallly on August 29, 2012 that they have not
developed the certification standards to certify a CVSSA course and when they do they will
look at my course. In the meantime it is permissible to teach the course. Also, MARAD is
the only correct certification entity for CVSSA. (Guidelines for Maritime Security Training
Course Providers: I. BACKGROUND: Section 109 of the Maritime Transportation Security Act
of 2002 (MTSA) (P.L. 107-295) charged the Secretary of Transportation with developing
“standards and curriculum to allow for the training and certification of maritime security
professionals.” The Secretary of Transportation delegated the MTSA mandate to the
Maritime Administration (MARAD) and the United States Merchant Marine Academy,
which developed the required standards and curriculum and prepared a report to
Congress.)
4. Cruise ships are cities within themselves with
elaborate security measures to protect employees
and guests. Add into the equation a rogue wave,
an accident, a serious altercation, a fire, a swine
flu epidemic or even piracy … now we have a
serious problem.
COPYRIGHT 2012 TRAUMAREDUCTION INC.
5. WHAT HAPPENS IF THE WRONG
ACTION IS TAKEN TO A MINOR
INCIDENT
• Media=bad
publicity
• Loss of revenue
• Shutdown
• WHAT HAPPENS
ON A CRUISE SHIP
AFFECTS THE
ENTIRE SHIPPING
INDUSTRY.
7. CRUISE SHIP SECURITY & SAFETY ACT
OF 2010
• On July 27, 2010 President Obama signed
into law the Cruise Vessel Security and
Safety Act of 2010. The new law aims to
improve the safety and security of
American citizens sailing as passengers to
and from the United States on large cruise
vessels. The law requires large cruise
vessels carrying American citizens to
adopt basic reporting, safety, and security
measures SIMILIAR to those American
tourists have come to expect in the hotel
industry in the United States.
COPYRIGHT 2012 TRAUMAREDUCTION INC.
8. 12,000,000 passengers vacation on Cruise vessels PER YEAR
CRUISE VESSEL SECURITY AND SAFETY ACT OF 2010
REQUIRES CRUISE VESSELS TO ADOPT:
• SECURITY PEEPHOLES
• SECURITY CAMERAS
• TIME SENSITIVE LOCKS AND LATCHES
• 42 INCH HIGH GUARD RAILS
• SAFETY GUIDE TO EACH PASSENGER
• REPORT TO THE FBI ALL SERIOUS CRIME AND THEFTS OVER
$1000
• SERIOUS CRIMES AND WITH THEFTS AVOVE $10,000 TO BE
REPORTED IMMEDIATELY TO THE FBI IF AMERICAN
NATIONAL
• FBI POST STASTISTICAL INFO RE CRIMES ONTO THE
INTERNET
• ENHANCED MEDICAL REQUIREMENTS FOR SEXUAL
ASSAULT VICTIMS AND TO PROVIDE INFO AND ACCESS TO
LAW ENFORCEMENT AND COUNSEL
• CONFIDENTIALITY OF SEXUAL ASSAULT VICTIMS
• CIVIL AND CRIMINAL PENALTIES FOR VIOLATIONS
COPYRIGHT 2012 TRAUMAREDUCTION INC.
9. FBI Jurisdiction
Cruise Ship Safety and Security
• The FBI has jurisdiction over a crime
committed on a ship that has U.S. citizens on
aboard, regardless of flag and the
nationality of the perpetrator or victim.
• If the crime occurs within the territorial
waters or 12 miles of the U.S. coast, then it is
under the FBIs jurisdiction.
• If the perpetrator or victim is a U.S. national
on a ship that departed from a U.S. port, then
the FBI has jurisdiction over the crime.
• The FBI has jurisdiction over any acts of
terrorism against the U.S.
• If the crime occurs outside of U.S. territorial
waters, international laws or laws of
sovereign nations will apply.
• The FBI legal attaches assist local authorities
in evidence collection and other duties.
COPYRIGHT 2012 TRAUMAREDUCTION INC.
10. Cruise Ship Safety and Security
• The Coast Guard inspects each cruise ship's safety
and compliance to regulations.
• It covers lifesaving equipment, hull structure,
watertight integrity, firefighting and safety
navigation of the ship to name a few.
• If the ship passes cruise safety inspection, it is
issued a validation certificate. This certificate is
displayed for passengers to view. Twice a year,
the Coast Guard administers a vessel compliance
program of all international and U.S. standards
including environmental protection, cruise ship
safety and security.
• COPYRIGHT 2012 TRAUMAREDUCTION INC.
11. Objective
Those who successfully complete this course should be able to
demonstrate knowledge, understanding and proficiency in crime
prevention and detection, evidence preservation and reporting of criminal
activities in the international maritime environment as defined in CVSSA
Section 3508. This knowledge shall include, but is not limited to:
1. ability to identify protective measures for preventing and detecting
criminal activity;
2. familiarity with emergency procedures and contingency plans;
3. recognition of security and safety risks, threats, and vulnerabilities;
4. techniques used to circumvent security measures;
5. recognition, on a non-discriminatory basis, of characteristics and
behavioral patterns of persons who are likely to pose security and safety
threats;
6. understanding of the roles and responsibilities of law enforcement
officials, vessel security officers and medical staff;
7. ability to secure and maintain a crime scene until released by law
enforcement officials and;
8. understanding of reporting requirements and the ability to
document serious crimes.
12. COURSE SYLLABUS
INTRODUCTION
LEVEL 1 SECURITY TRAINING
ACTIVE LISTENING TOOLS
INTERVIEW AND INTERROGATION
EVIDENCE AND CRIME SCENE
SEXUAL ASSAULT
DEATH INVESTIGATION
REPORT WRITING AND CASE
MANAGEMENT
FIRST RESPONDER CRISIS NEGOTIATION
COPYRIGHT 2012 TRAUMAREDUCTION INC.
14. Entry Standards
Those attending this course are mariners or other
persons who are employed (or are to be
employed) by a passenger vessel owner or
operator and who are likely to be designated as
part of the vessel’s security team. If not designated
as “Vessel Security Officer”, those who take this
course should have knowledge of vessel operations
and maritime security matters. Verification that
these conditions are met will be done prior to
accepting candidates for training.