Tanker pirated while conducting STS operations off West Africa! September 14, 2011
Posted by Chris Mark in Uncategorized.Tags: Chris Mark, InfoSec, maritime piracy, Maritime Security, Piracy & Maritime Security, risk management, security, somali pirates, West Coast of Africa piracy
add a comment
The IMB has reported that a tanker was pirated off the West coast of Africa and 23 of her crew taken hostage. The attack occurred Wednesday about 62 nautical miles from Benin’s capital of Cotonou. The bureau said the pirates took over the vessel, kidnapped its crew and sailed to an unknown location.
Updated reports indicate that the master sent SSAS alert, the crew locked themselves in engine room and contacted their companies CSO. Sometime later the pirates left the vessel. The crew came out of the engine room and conducted a search for the pirates and found the vessel to be safe. The crew regained control of the vessel.
Attacks off West Africa are becoming more and more common and brazen. Companies are urged to take proactive measures to ensure that events such as this have less of a chance of occurring. While the outcome was positive and the pirates ended up leaving the ship, the situation could have been far worse.
Private Yacht hijacked off Yemen then rescued same day as Danish family release! September 11, 2011
Posted by Chris Mark in Uncategorized.Tags: Armed escort, gulf of aden, gulf of aden security, InfoSec, maritime piracy, Maritime Security, Piracy & Maritime Security, risk management, somali pirates, Somalia
add a comment
On the day that a Danish family was released after months in captivity, an unidentified sailing yacht was taken by pirates on September 08, 2011 off the coast of Yemen: Latitude 15 27 N Longitude 052 14 E.
The yacht has now been identified as the catamaran TRIBAL KAT, heading west to east and crewed by the owners, a French couple Christian and Evelyne Colombo. The pirates’ vessel was sunk by a Spanish warship the SPS GALICIA and Evelyne Colombo recovered unharmed and 7 pirates arrested, however, her husband Christian is missing and is reported to have been killed during the initial hijack.
Owners of private vessels are urged to seriously consider avoiding High Risk Waters, as we’re seeing an increase in the numbers of private vessels attacked. As is the tragic case here, pirates are becoming far more violent with killing of hostages during violent takeovers becoming routine.
Danish family held by Somali pirates since February released! September 7, 2011
Posted by Chris Mark in Uncategorized.Tags: gulf of aden, InfoSec, maritime piracy, Maritime Security, Piracy & Maritime Security, risk management, somali pirates, Somalia
add a comment
COPENHAGEN, Denmark – Seven Danish hostages, including a family with teenage children, have been released by Somali pirates after more than six months in captivity, Denmark’s Foreign Ministry said Wednesday.
The Danes — a couple with three children ages 12-16 and two crew members — were captured in the Indian Ocean on Feb. 24 while sailing around the world in a yacht.
“The seven Danes are doing well under the circumstances. They are expected back in Denmark in a short time,” the ministry said in a brief statement.
It gave no details of how they were released and made no mention of a ransom being paid. No one at the Foreign Ministry was immediately available for comment.
Prime Minister Lars Loekke Rasmussen told public broadcaster DR that the Danes were on their way back in a chartered airplane paid for by their insurance company. Loekke Rasmussen said their release came after “a long period of negotiations.”
Hostages are held in hot, austere conditions in Somalia — typically for many months — before a ransom is agreed on and paid, and the hijacked ships and crew are released. Last year, a British sailing couple were released after 388 days in captivity. Reports indicated
Piracy and the Armed Detterent- Lloyds List… & dogs… September 1, 2011
Posted by Chris Mark in Laws and Leglslation, Piracy & Maritime Security.Tags: Chris Mark, gulf of aden security, InfoSec, Maritime Security, Piracy & Maritime Security, risk management
add a comment
There is a very well written piece on the use of armed guards. Without rehashing the entire article, the author disputes those who claim that armed guards are resulting in an increasing level of violence from pirates. It is a great piece and worth the read. In contradiction to the naysayers and in support of the piece mentioned above, I would go so far as to say that it is the increasing violence of pirates that is necessitating the use of armed guards on ships. Security companies would love nothing more than to flash a big toothy grin and the international sign of friendship at pirates to make them scamper away. The unfortunate reality is that the pirates are escalating their attacks and ships are being forced to use armed guards.
Yesterday I was in the pet store buying some food for my new Rottweiler puppy Bo. Bo had never been on a leash and I was attempting to train him. A woman working at the store struck up a conversation and I was explaining that I had to put one of my dogs down recently when after 11 years she had become so unpredictable that we could not trust her around children, people or pets. The dog had already attacked and severely injured three dogs by the time the decision was made to put her down. While I was deeply saddened it was the only responsible option. It was simply her nature to be aggressive. What struck me was the woman’s response to the story and to the idea of leashes. She actually tried to convince me that leashes were the cause of dog bites and attacks and that if we would do away with leashes the incidence of dog bites would go down. She was an advocate for allowing all dogs to run free! I told her I felt it was irresponsible to allow a 130lb dog to run free among children and others. At the end of the day, no matter how well trained, a dog, is a dog, is a dog.
This is the same attitude that permeates the blogosphere where people claim that it is the shipping companies, which by arming their ships, are causing the violence. This is complete nonsense. The pirates are violent and it is their actions that result in the need for shipping companies to arm themselves. Not the other way around…
Security 101; Defense in Depth August 26, 2011
Posted by Chris Mark in Risk & Risk Management, Uncategorized.Tags: Chris Mark, defense in depth, InfoSec, risk management, security
1 comment so far
This post is a complement to the post Risk101. In reading a number of articles and positions on maritime security strategies it appears that some of the authors, while well intended, misunderstand or misstate the basics of security. While this particular post is not a dissertation on security, it will discuss one of the more important concepts- Defense in Depth.
While defense in depth has been widely promoted as an information assurance concept developed by the NSA, it originates from military strategy. To understand how DID works, it is important to understand that security is not, and cannot be absolute. It is not a binary concept- “secure” or “not secure”. The appropriateness of a security strategy is relative to the identified risk. One cannot say: “my house is secure”. You can say: “My house has been secured in a manner that is commensurate with the identified risks”. Security should be viewed as a function of time & effort. Given the skills/tools, a person with sufficient time and effort can theoretically circumvent any control. As skills/tools improve security controls must also adapt. Safes are good examples of this concept. The Safe Source provides US safe ratings. Safes are rated from B1- simple theft resistant to B6 which is an underwriters certification which includes TRTL-30. This rating means that a particular safe has been shown to 30 minutes of net working time with a torch and a range of tools including high-speed drills with carbide bits, saws and prybars. While safe ratings are not the focus of this post, it is a good example of the security continuum. Notice that none of the safes provide a ‘guarantee’ that it can never be breached. With tools, and effort it is simply a matter of time. The goal of any security strategy is to increase the risk/reward calculation to the point where the attackers give up on the effort.
The basic concept behind defense in depth is to give up space to buy time. By implementing multiple layers of controls with each layer designed to delay the attacker it is possible to move modify the risk/reward calculation to the point where it is simply not a wise investment of time to continue the effort. Remember that security must be implemented commensurate with the identified risk. As the risk increases the controls must increase proportionally. Until this past year, many shipping companies were content with using less than lethal technologies to deter pirates. As ransoms have exceeded $3million US the pirates have greater incentive to assume risk and spend the time/effort on an attack and therefore shipping companies need to increase their security controls.
Defense in Depth strategies require that companies evaluate and implement a number of controls. In general, security controls can be categorized into detection, prevention, and responsive controls. There is often a temptation to spend money and effort on preventive controls alone. This is a dangerous strategy. A complete defense in depth strategy will employ a number of overlapping controls to include best practices in ship speed, maneuvering, and routes, as well as more dynamic controls such as the use of armed guards, and citadels. The controls should be included in a force continuum. In short, the use of force should be the last control employed…not the first.
By ensuring that you evaluate your security needs and controls in the context of the identified risks to which your vessels are exposed you are better able to make decisions regarding the types of controls required. By implementing the controls using a defense in depth strategy ensuring that you address detective, preventative, and responsive controls you will ensure that you have a comprehensive security strategy designed to provide the maximum defensive value at the lowest possible cost.