This action might not be possible to undo. Are you sure you want to continue?
WHO WE ARE
Eagle International Security Services SA is a newly formed company founded by professionals with combine extensive experience both in management and in the operational field , ready to address in the security issues which arising in our modern world either offshore or onshore. Eagle ISS, through its expertise and trained personnel can provide solutions to a wide variety of clients and in co operation with them, solutions according to their needs and giving them the confidence that they have choose a company with professional attitude, knowhow, ability to implement and to deliver what undertakes. Eagle ISS head quarters are based at Kolokotroni 2 A P Faliro Athens Greece
WHAT WE DO
We provide best trained and with a long experience qualified both unarmed and armed personnel, depending the type of security our client needs to address, from maritime escorting and security operations or VIP protection in high risk areas to intelligent and surveillance services.
Security Supervising and Training .
Riot Control and Crowd Management/Crowd Control Policy .
Pedestrian and Motorbike and Vehicle Patrol .
Sensitive Installations Protocol of Entrance and Exit Control .
Deter and mitigate terrorist attack .
Resolving Crisis Situations .
Sensitive Installations Security and Protection Zones .
Escort security services VIP / High Value Objects / Vehicles .
Poverty 2. Geopolitical conflicts 8. Rogue and corrupted regimes 4. Local warlords that taking advanced of weak uncontrolled and unstable political environment or failed states 5.PIRACY IN MODERN TIMES The reasons of modern piracy are: 1. Private crime organizations and other interests . Extensive abuse of fishing areas by foreigner fleets 6. Mercenaries and hustlers exploiting a given opportunity 7. Financial instability 3.
Attempts and successful hijacks in 2012 .
Trade routs and piracy occurrences .
Piracy at the Africa Horn 2012 .
Piracy activity 2008 – 2013 Aden-Somalia 2008 suspicious events 8 2009 59 2010 99 2011 166 2012 73 2013 6 total attacks 24 pirated 14 disruptions3 0 163 46 14 174 47 65 176 25 28 36 5 16 1 0 0 .
Saudi Arabia.S. Kuwait. Jordan.K. UAE. Denmark. Portugal. Pakistan. Turkey. 27 member nations on voluntary base: Australia. Greece. Malaysia. Italy. Seychelles. Canada.5 million sq miles Comprised of three principle task forces: •CTF-150 (maritime security and counter-terrorism). the Netherlands.Combine Maritime Forces patrol 2. New Zealand. •CTF-151 (counter piracy) •CTF-152 (Arabian Gulf security and cooperation). Spain. Japan. Thailand. . Singapore. Republic of Korea. U. Bahrain. Germany. France. and U. Belgium.
wait for a Low freeboard target of opportunity.Pirates target selection rules and practicies Vessels attacked off Somalia are randomly selected Not specifically targeted for any reason Low speed other than how easily the vessel can be boarded Lack of vigilance Higher risk vessel as one that travels at a speed of less than 15 knots with low Lack of self-protection measures hook points Pirates simply patrol an area. .
committees. operating in high winds/intense swells Sound business model based on a hierarchy of. Somali Basin less so Limitations. local dhows and now pirated mother ships Limited assessment capability. GPS. sustaining attack teams on the high seas. basic communications. GoA is target rich. attack teams and community support . skiffs. small arms and assault ladders Use of mother craft.Pirates Modus Operandi Limited technology.
The tactic employed is to set out from the Somali Coast into the Somali Basin. the different band of pirates adapted their tactics and employed larger vessel s including those hijacked enabling them to expand their reach further into the Indian Ocean The pirates since then have used different sets of tactics or way to operate. Before 2008 attacks were only along the coast but since then there is a trend for pirates to venture over 200 nautical miles using bigger vessels.Piracy Modus Operandi With increase international naval presence in 2008. . They have been active in the Gulf of Aden and the Somali Basin in the Indian Ocean.
compared with 21 in 2012 (3x increase) There were 5 attacks off the coast of Togo. compared with 11 in 2012 (2x increase) There were 19 attacks off the coast of Benin.Piracy at West Africa (an increasing threat) There were 6 attacks off the coast of Nigeria. compared with 2 in 2012 (9x decrease) .
However. 131 of these occurred in Africa. global piracy incidents are decreasing – with 233 attacks worldwide. 70 took place off the coast of Somalia (to include the Gulf of Aden. Indian Ocean. Red Sea. and Oman) and 34 took place in the vicinity of Nigeria (to include the area off the coasts of Benin and Togo).Piracy at West Africa According to the International Maritime Bureau report. Of the 131 attacks that occurred in Africa. of the 233 attacks that took place between January and September 2012. down from 352 for the corresponding time period in 2011. Arabian Sea. .
Analysts believe the hijackings of tanker ships likely is the work of sophisticated criminal gangs with knowledge of the oil industry and oil tankers (possibly with the cooperation of low level governmental Officers. .Piracy at West Africa Past and current armed conflicts in the area provide different character of the pirates in the area and much easier access and be equipped with heavy armor.
Piracy at West Africa Oil export countries in Wet Africa .
Piracy at West Africa Current and past armed conflicts in the area .
Piracy at West Africa Attempts and attacks of piracy in the Gulf of Guinea .
Ways to avoid piracy Understand the threat first 1. Review vulnerability assessments 2. lock down doors and hatches leaving one controlled access point into accommodation Observe vulnerable points. Harden the ship to deter. CCTV and watches Practice evasive maneuvers at speed Key men on the bridge to report early and make appropriate decisions . Reassess SSOs and company crisis management procedures and update 3. Brief the crew on the threat and their roles 4. delay and defend: Introduce barriers to boarding: razor wire and electric fences Control access: remove ladders.
Why to choose Eagle ISS? You choose the provider capable to deliver what undertakes 2. 6. vast experience.Selecting the appropriate Armed Security Services Provider 1. What should you expect from our armed security team? Safe vessel’s route avoiding or deterrent threats as passing by the High Risk Areas. Capabilities and limitations? Best trained. 3. Who is in command of the vessel? The Captain of the ship No vessel has ever been hijacked with armed security on board . professional discipline manners and attitude. knowledge of International sea law and rules 4. ICOC 5. Which laws are they bound by? IMO. What happens if lethal force is used? Lethal force is the last option and knowing how to avoid with other measures . actions and practices.
Eagle’s People .
Eagle ISS is ready with your cooperation. Thank You . measures and Eagle’ s Action Plan on case by case base. together to decide and implement the security procedures.