P. 1
Eagle ISS Presentation

Eagle ISS Presentation

|Views: 2|Likes:
Published by Tsiggos Alexandros
Providing International Security Services
Providing International Security Services

More info:

Categories:Types, Business/Law
Published by: Tsiggos Alexandros on May 16, 2013
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PPTX, PDF, TXT or read online from Scribd
See more
See less





Company Presentation 2013

Eagle International Security Services SA is a newly formed company founded by professionals with combine extensive experience both in management and in the operational field , ready to address in the security issues which arising in our modern world either offshore or onshore. Eagle ISS, through its expertise and trained personnel can provide solutions to a wide variety of clients and in co operation with them, solutions according to their needs and giving them the confidence that they have choose a company with professional attitude, knowhow, ability to implement and to deliver what undertakes. Eagle ISS head quarters are based at Kolokotroni 2 A P Faliro Athens Greece

We provide best trained and with a long experience qualified both unarmed and armed personnel, depending the type of security our client needs to address, from maritime escorting and security operations or VIP protection in high risk areas to intelligent and surveillance services.

Security Supervising and Training .

Riot Control and Crowd Management/Crowd Control Policy .

Pedestrian and Motorbike and Vehicle Patrol .

Sensitive Installations Protocol of Entrance and Exit Control .

Deter and mitigate terrorist attack .

Resolving Crisis Situations .

Sensitive Installations Security and Protection Zones .

Escort security services VIP / High Value Objects / Vehicles .

Private crime organizations and other interests . Local warlords that taking advanced of weak uncontrolled and unstable political environment or failed states 5. Mercenaries and hustlers exploiting a given opportunity 7. Extensive abuse of fishing areas by foreigner fleets 6. Geopolitical conflicts 8. Rogue and corrupted regimes 4. Financial instability 3. Poverty 2.PIRACY IN MODERN TIMES The reasons of modern piracy are: 1.

Attempts and successful hijacks in 2012 .

Trade routs and piracy occurrences .

Piracy at the Africa Horn 2012 .

Piracy activity 2008 – 2013 Aden-Somalia 2008 suspicious events 8 2009 59 2010 99 2011 166 2012 73 2013 6 total attacks 24 pirated 14 disruptions3 0 163 46 14 174 47 65 176 25 28 36 5 16 1 0 0 .

27 member nations on voluntary base: Australia. Belgium. Italy. Portugal.Combine Maritime Forces patrol 2. Seychelles. Spain. Turkey. Greece. Jordan. the Netherlands.K. UAE. Japan. and U. Denmark. •CTF-151 (counter piracy) •CTF-152 (Arabian Gulf security and cooperation). Bahrain. Thailand. U.5 million sq miles Comprised of three principle task forces: •CTF-150 (maritime security and counter-terrorism). New Zealand. Republic of Korea. Germany. Canada. Malaysia.S. Saudi Arabia. Singapore. France. Pakistan. Kuwait. .

. wait for a  Low freeboard target of opportunity.Pirates target selection rules and practicies  Vessels attacked off Somalia are randomly selected  Not specifically targeted for any reason  Low speed other than how easily the vessel can be boarded  Lack of vigilance  Higher risk vessel as one that travels at a speed of less than 15 knots with low  Lack of self-protection measures hook points  Pirates simply patrol an area.

sustaining attack teams on the high seas. small arms and assault ladders  Use of mother craft. committees. attack teams and community support .Pirates Modus Operandi  Limited technology. local dhows and now pirated mother ships  Limited assessment capability. basic communications. GPS. Somali Basin less so  Limitations. GoA is target rich. operating in high winds/intense swells  Sound business model based on a hierarchy of. skiffs.

 They have been active in the Gulf of Aden and the Somali Basin in the Indian Ocean.  The tactic employed is to set out from the Somali Coast into the Somali Basin. Before 2008 attacks were only along the coast but since then there is a trend for pirates to venture over 200 nautical miles using bigger vessels. .Piracy Modus Operandi With increase international naval presence in 2008. the different band of pirates adapted their tactics and employed larger vessel s including those hijacked enabling them to expand their reach further into the Indian Ocean  The pirates since then have used different sets of tactics or way to operate.

compared with 2 in 2012 (9x decrease) . compared with 11 in 2012 (2x increase) There were 19 attacks off the coast of Benin. compared with 21 in 2012 (3x increase) There were 5 attacks off the coast of Togo.Piracy at West Africa (an increasing threat) There were 6 attacks off the coast of Nigeria.

70 took place off the coast of Somalia (to include the Gulf of Aden. down from 352 for the corresponding time period in 2011. However. and Oman) and 34 took place in the vicinity of Nigeria (to include the area off the coasts of Benin and Togo). 131 of these occurred in Africa.Piracy at West Africa According to the International Maritime Bureau report. Indian Ocean. global piracy incidents are decreasing – with 233 attacks worldwide. Red Sea. Of the 131 attacks that occurred in Africa. of the 233 attacks that took place between January and September 2012. . Arabian Sea.

Analysts believe the hijackings of tanker ships likely is the work of sophisticated criminal gangs with knowledge of the oil industry and oil tankers (possibly with the cooperation of low level governmental Officers. .Piracy at West Africa Past and current armed conflicts in the area provide different character of the pirates in the area and much easier access and be equipped with heavy armor.

Piracy at West Africa Oil export countries in Wet Africa .

Piracy at West Africa Current and past armed conflicts in the area .

Piracy at West Africa Attempts and attacks of piracy in the Gulf of Guinea .

Reassess SSOs and company crisis management procedures and update 3. lock down doors and hatches leaving one controlled access point into accommodation  Observe vulnerable points. CCTV and watches  Practice evasive maneuvers at speed  Key men on the bridge to report early and make appropriate decisions . Review vulnerability assessments 2. Harden the ship to deter. delay and defend:  Introduce barriers to boarding: razor wire and electric fences  Control access: remove ladders.Ways to avoid piracy Understand the threat first 1. Brief the crew on the threat and their roles 4.

What should you expect from our armed security team? Safe vessel’s route avoiding or deterrent threats as passing by the High Risk Areas. vast experience. Who is in command of the vessel? The Captain of the ship No vessel has ever been hijacked with armed security on board . actions and practices. Which laws are they bound by? IMO. ICOC 5. Capabilities and limitations? Best trained. 3. Why to choose Eagle ISS? You choose the provider capable to deliver what undertakes 2. knowledge of International sea law and rules 4. professional discipline manners and attitude. What happens if lethal force is used? Lethal force is the last option and knowing how to avoid with other measures . 6.Selecting the appropriate Armed Security Services Provider 1.

Eagle’s People .

Thank You .Eagle ISS is ready with your cooperation. together to decide and implement the security procedures. measures and Eagle’ s Action Plan on case by case base.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->