Company Presentation 2013

WHO WE ARE
Eagle International Security Services SA is a newly formed company founded by professionals with combine extensive experience both in management and in the operational field , ready to address in the security issues which arising in our modern world either offshore or onshore. Eagle ISS, through its expertise and trained personnel can provide solutions to a wide variety of clients and in co operation with them, solutions according to their needs and giving them the confidence that they have choose a company with professional attitude, knowhow, ability to implement and to deliver what undertakes. Eagle ISS head quarters are based at Kolokotroni 2 A P Faliro Athens Greece

WHAT WE DO
We provide best trained and with a long experience qualified both unarmed and armed personnel, depending the type of security our client needs to address, from maritime escorting and security operations or VIP protection in high risk areas to intelligent and surveillance services.

Security Supervising and Training .

Riot Control and Crowd Management/Crowd Control Policy .

Pedestrian and Motorbike and Vehicle Patrol .

Sensitive Installations Protocol of Entrance and Exit Control .

Deter and mitigate terrorist attack .

Resolving Crisis Situations .

Sensitive Installations Security and Protection Zones .

Escort security services VIP / High Value Objects / Vehicles .

Poverty 2. Rogue and corrupted regimes 4. Financial instability 3.PIRACY IN MODERN TIMES The reasons of modern piracy are: 1. Private crime organizations and other interests . Extensive abuse of fishing areas by foreigner fleets 6. Geopolitical conflicts 8. Local warlords that taking advanced of weak uncontrolled and unstable political environment or failed states 5. Mercenaries and hustlers exploiting a given opportunity 7.

Attempts and successful hijacks in 2012 .

Trade routs and piracy occurrences .

Piracy at the Africa Horn 2012 .

Piracy activity 2008 – 2013 Aden-Somalia 2008 suspicious events 8 2009 59 2010 99 2011 166 2012 73 2013 6 total attacks 24 pirated 14 disruptions3 0 163 46 14 174 47 65 176 25 28 36 5 16 1 0 0 .

UAE. and U. Thailand. Italy. Saudi Arabia. Pakistan.K. Germany. 27 member nations on voluntary base: Australia.Combine Maritime Forces patrol 2. •CTF-151 (counter piracy) •CTF-152 (Arabian Gulf security and cooperation). Seychelles. France. Denmark. Malaysia.S.5 million sq miles Comprised of three principle task forces: •CTF-150 (maritime security and counter-terrorism). Japan. New Zealand. Singapore. Turkey. Spain. . Republic of Korea. Greece. U. the Netherlands. Belgium. Bahrain. Portugal. Jordan. Kuwait. Canada.

wait for a  Low freeboard target of opportunity. .Pirates target selection rules and practicies  Vessels attacked off Somalia are randomly selected  Not specifically targeted for any reason  Low speed other than how easily the vessel can be boarded  Lack of vigilance  Higher risk vessel as one that travels at a speed of less than 15 knots with low  Lack of self-protection measures hook points  Pirates simply patrol an area.

committees. local dhows and now pirated mother ships  Limited assessment capability. basic communications. GoA is target rich. operating in high winds/intense swells  Sound business model based on a hierarchy of.Pirates Modus Operandi  Limited technology. GPS. Somali Basin less so  Limitations. sustaining attack teams on the high seas. small arms and assault ladders  Use of mother craft. attack teams and community support . skiffs.

.  The tactic employed is to set out from the Somali Coast into the Somali Basin. Before 2008 attacks were only along the coast but since then there is a trend for pirates to venture over 200 nautical miles using bigger vessels.Piracy Modus Operandi With increase international naval presence in 2008.  They have been active in the Gulf of Aden and the Somali Basin in the Indian Ocean. the different band of pirates adapted their tactics and employed larger vessel s including those hijacked enabling them to expand their reach further into the Indian Ocean  The pirates since then have used different sets of tactics or way to operate.

compared with 2 in 2012 (9x decrease) .Piracy at West Africa (an increasing threat) There were 6 attacks off the coast of Nigeria. compared with 21 in 2012 (3x increase) There were 5 attacks off the coast of Togo. compared with 11 in 2012 (2x increase) There were 19 attacks off the coast of Benin.

131 of these occurred in Africa. However. Red Sea.Piracy at West Africa According to the International Maritime Bureau report. Of the 131 attacks that occurred in Africa. of the 233 attacks that took place between January and September 2012. and Oman) and 34 took place in the vicinity of Nigeria (to include the area off the coasts of Benin and Togo). global piracy incidents are decreasing – with 233 attacks worldwide. Indian Ocean. down from 352 for the corresponding time period in 2011. 70 took place off the coast of Somalia (to include the Gulf of Aden. Arabian Sea. .

Analysts believe the hijackings of tanker ships likely is the work of sophisticated criminal gangs with knowledge of the oil industry and oil tankers (possibly with the cooperation of low level governmental Officers. .Piracy at West Africa Past and current armed conflicts in the area provide different character of the pirates in the area and much easier access and be equipped with heavy armor.

Piracy at West Africa Oil export countries in Wet Africa .

Piracy at West Africa Current and past armed conflicts in the area .

Piracy at West Africa Attempts and attacks of piracy in the Gulf of Guinea .

Harden the ship to deter. Brief the crew on the threat and their roles 4. delay and defend:  Introduce barriers to boarding: razor wire and electric fences  Control access: remove ladders. CCTV and watches  Practice evasive maneuvers at speed  Key men on the bridge to report early and make appropriate decisions . Review vulnerability assessments 2. lock down doors and hatches leaving one controlled access point into accommodation  Observe vulnerable points. Reassess SSOs and company crisis management procedures and update 3.Ways to avoid piracy Understand the threat first 1.

vast experience. What happens if lethal force is used? Lethal force is the last option and knowing how to avoid with other measures . professional discipline manners and attitude. 3. Why to choose Eagle ISS? You choose the provider capable to deliver what undertakes 2. What should you expect from our armed security team? Safe vessel’s route avoiding or deterrent threats as passing by the High Risk Areas. Capabilities and limitations? Best trained. knowledge of International sea law and rules 4. Who is in command of the vessel? The Captain of the ship No vessel has ever been hijacked with armed security on board . ICOC 5. actions and practices. Which laws are they bound by? IMO.Selecting the appropriate Armed Security Services Provider 1. 6.

Eagle’s People .

together to decide and implement the security procedures. measures and Eagle’ s Action Plan on case by case base.Eagle ISS is ready with your cooperation. Thank You .

Sign up to vote on this title
UsefulNot useful