jump to navigation

Somali pirates release vessel after 10 months in captivity August 30, 2011

Posted by Chris Mark in Uncategorized.
Tags: , , , , , ,
add a comment

A Greece based shipping company has spoken of its distress during a piracy experience following the release of its hijacked tanker after 10 months in captivity.While Paradise Navigation, operators and managers of the 72,825 dwt product tanker MV Polar said it was “delighted” with the freeing, they were frustrated that owners and operators have been unaided against piracy.

While faced with many decisions on how to deal with piracy, ultimately shipping companies need to remain proactive in protecting their interests.  The community can’t afford to wait for intervention by international governments.  The message is loud and clear, this is an industry problem and needs to be dealt with by the industry.

Security 101; Defense in Depth August 26, 2011

Posted by Chris Mark in Risk & Risk Management, Uncategorized.
Tags: , , , ,
1 comment so far

This post is a complement to the post Risk101.  In reading a number of articles and positions on maritime security strategies it appears that some of the authors, while well intended, misunderstand or misstate the basics of security.   While this particular post is not a dissertation on security, it will discuss one of the more important concepts- Defense in Depth.

While defense in depth has been widely promoted as an information assurance concept developed by the NSA, it originates from military strategy. To understand how DID works, it is important to understand that security is not, and cannot be absolute.  It is not a binary concept- “secure” or “not secure”.  The appropriateness of a security strategy is relative to the identified risk.  One cannot say: “my house is secure”.  You can say: “My house has been secured in a manner that is commensurate with the identified risks”.  Security should be viewed as a function of time & effort.  Given the skills/tools, a person with sufficient time and effort can theoretically circumvent any control.  As skills/tools improve security controls must also adapt.  Safes are good examples of this concept.  The Safe Source provides US safe ratings.  Safes are rated from B1- simple theft resistant to B6 which is an underwriters certification which includes TRTL-30.  This rating means that a particular safe has been shown to 30 minutes of net working time with a torch and a range of tools including high-speed drills with carbide bits, saws and prybars.  While safe ratings are not the focus of this post, it is a good example of the security continuum.  Notice that none of the safes provide a ‘guarantee’ that it can never be breached.  With tools, and effort it is simply a matter of time.  The goal of any security strategy is to increase the risk/reward calculation to the point where the attackers give up on the effort.

The basic concept behind defense in depth is to give up space to buy time.  By implementing multiple layers of controls with each layer designed to delay the attacker it is possible to move modify the risk/reward calculation to the point where it is simply not a wise investment of time to continue the effort. Remember that security must be implemented commensurate with the identified risk.  As the risk increases the controls must increase proportionally.  Until this past year, many shipping companies were content with using less than lethal technologies to deter pirates.  As ransoms have exceeded $3million US the pirates have greater incentive to assume risk and spend the time/effort on an attack and therefore shipping companies need to increase their security controls.

Defense in Depth strategies require that companies evaluate and implement a number of controls.  In general, security controls can be categorized into detection, prevention,  and responsive controls. There is often a temptation to spend money and effort on preventive controls alone.  This is a dangerous strategy.  A complete defense in depth strategy will employ a number of overlapping controls to include best practices in ship speed, maneuvering, and routes, as well as more dynamic controls such as the use of armed guards, and citadels.  The controls should be included in a force continuum.  In short, the use of force should be the last control employed…not the first.

By ensuring that you evaluate your security needs and controls in the context of the identified risks to which your vessels are exposed you are better able to make decisions regarding the types of controls required.  By implementing the controls using a defense in depth strategy ensuring that you address detective, preventative, and responsive controls you will ensure that you have a comprehensive security strategy designed to provide the maximum defensive value at the lowest possible cost.

Somali gets life in prison for hijacking U.S. yacht that left four Americans dead! August 22, 2011

Posted by Chris Mark in Uncategorized.
Tags: , , , , ,
add a comment

NORFOLK, Va. –  A Somali man was sentenced to life in prison on Monday for his role in the hijacking of yacht off the coast of Africa that left all four Americans on board dead, telling a federal judge that he never meant for anyone to get hurt.

“I’d like to express my regret and sorrow to the victims’ families,” Ali Abdi Mohamed said through an interpreter.

Mohamed is the first of 11 men who have pleaded guilty to piracy in the case to be sentenced. Each of the men face mandatory life sentences, although that could eventually be reduced as part of a plea deal with federal prosecutors. A second Somali was expected to be sentenced later in the day.

The owners of the Quest, Jean and Scott Adam of Marina del Rey, Calif., along with friends Bob Riggle and Phyllis Macay of Seattle, were shot to death in February several days after being taken hostage several hundred miles south of Oman. They were the first Americans to be killed in a wave of piracy that has plagued the Indian Ocean in recent years.

The pirates said they intended to bring the Americans back to Somalia so that they could be ransomed, but that plan fell apart when four U.S. Navy warships began shadowing them. The Navy offered to let the pirates take the yacht in exchange for the hostages, but the pirates said they wouldn’t get the kind of money they wanted for it. Hostages are typically ransomed for millions of dollars.

Mohamed told prosecutors he was ordered to fire a rocket propelled grenade at the American warships to keep them away from the Quest. Court documents say that in doing so, he inadvertently killed one of the pirates who was standing too close behind him. Shortly after the RPG was fired, gun fire erupted aboard the yacht.

Somali Pirates attack another tanker in port of Salalah August 22, 2011

Posted by Chris Mark in Uncategorized.
Tags: , , , ,
add a comment

A day after pirate hijacked a ship while it was anchored in the port of Salalah a group attacked another chemical tanker in the same location.  This ship was able to avoid capture however.  As stated by the IMB:

“Pirates in a skiff chased and fired upon a chemical tanker,”…”The pirates made several attempts to board the tanker and finally aborted the attack due to the evasive maneuvers made by the tanker.”

 

Somali Pirates hijack vessel while at anchor! August 21, 2011

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , ,
1 comment so far

In what is being described as the first attack of its kind and the most brazen attack yet, Somali pirates hijacked the chemical tanker MV Fairchem Bogey with a crew of 20 Indians and flagged in the Marshall Islands.

She was taken at anchor off Port Salalah, Oman.  Boarded at 0530 and forced to heave up and steam toward Somalia.  An Omani warship fired across the bow but the Master was forced to call the managers and tell them that the pirates were prepared to kill the crew, all lined up on the bridge, if the pursuit was not called off.  The warship shadowed the vessel until out of Omani territorial waters.

This brazen attack demonstrates the tactics used by pirates will evolve and become more sophisticated over time.  This year alone there have been many firsts; attacks in the Red Sea, vessels hijacked during Monsoon season, not releasing crews after ransoms were paid and now hijacking vessels while anchored at port.