You are on page 1of 30

Company Presentation 2013

WHO WE ARE
Eagle International Security Services SA is a newly formed company founded by professionals with combine extensive experience both in management and in the operational field , ready to address in the security issues which arising in our modern world either offshore or onshore. Eagle ISS, through its expertise and trained personnel can provide solutions to a wide variety of clients and in co operation with them, solutions according to their needs and giving them the confidence that they have choose a company with professional attitude, knowhow, ability to implement and to deliver what undertakes. Eagle ISS head quarters are based at Kolokotroni 2 A P Faliro Athens Greece

WHAT WE DO
We provide best trained and with a long experience qualified both unarmed and armed personnel, depending the type of security our client needs to address, from maritime escorting and security operations or VIP protection in high risk areas to intelligent and surveillance services.

Security Supervising and Training

Riot Control and Crowd Management/Crowd Control Policy

Pedestrian and Motorbike and Vehicle Patrol

Sensitive Installations Protocol of Entrance and Exit Control

Deter and mitigate terrorist attack

Resolving Crisis Situations

Sensitive Installations Security and Protection Zones

Escort security services VIP / High Value Objects / Vehicles

PIRACY IN MODERN TIMES


The reasons of modern piracy are: 1. Poverty 2. Financial instability 3. Rogue and corrupted regimes 4. Local warlords that taking advanced of weak uncontrolled and unstable political environment or failed states 5. Extensive abuse of fishing areas by foreigner fleets 6. Mercenaries and hustlers exploiting a given opportunity 7. Geopolitical conflicts 8. Private crime organizations and other interests

Attempts and successful hijacks in 2012

Trade routs and piracy occurrences

Piracy at the Africa Horn 2012

Piracy activity 2008 2013 Aden-Somalia


2008 suspicious events 8 2009 59 2010 99 2011 166 2012 73 2013 6

total attacks 24 pirated 14


disruptions3 0

163 46
14

174 47
65

176 25
28

36 5
16

1 0
0

Combine Maritime Forces patrol 2.5 million sq miles


Comprised of three principle task forces: CTF-150 (maritime security and counter-terrorism), CTF-151 (counter piracy) CTF-152 (Arabian Gulf security and cooperation). 27 member nations on voluntary base: Australia, Bahrain, Belgium, Canada, Denmark, France, Germany, Greece, Italy, Japan, Jordan, Republic of Korea, Kuwait, Malaysia, the Netherlands, New Zealand, Pakistan, Portugal, Saudi Arabia, Seychelles, Singapore, Spain, Thailand, Turkey, UAE, U.K. and U.S.

Pirates target selection rules and practicies


Vessels attacked off Somalia are randomly selected Not specifically targeted for any reason Low speed other than how easily the vessel can be boarded Lack of vigilance Higher risk vessel as one that travels at a speed of less than 15 knots with low Lack of self-protection measures hook points Pirates simply patrol an area, wait for a

Low freeboard

target of opportunity.

Pirates Modus Operandi


Limited technology; skiffs, basic communications, GPS, small arms and assault ladders Use of mother craft; local dhows and now pirated mother ships Limited assessment capability; GoA is target rich, Somali Basin less so

Limitations; sustaining attack teams on the high seas, operating in high winds/intense swells
Sound business model based on a hierarchy of; committees, attack teams and community support

Piracy Modus Operandi


With increase international naval presence in 2008, the different band of pirates adapted their tactics and employed larger vessel s including those hijacked enabling them to expand their reach further into the Indian Ocean The pirates since then have used different sets of tactics or way to operate. They have been active in the Gulf of Aden and the Somali Basin in the Indian Ocean. The tactic employed is to set out from the Somali Coast into the Somali Basin. Before 2008 attacks were only along the coast but since then there is a trend for pirates to venture over 200 nautical miles using bigger vessels.

Piracy at West Africa (an increasing threat)


There were 6 attacks off the coast of Nigeria, compared with 21 in 2012 (3x increase) There were 5 attacks off the coast of Togo, compared with 11 in 2012 (2x increase) There were 19 attacks off the coast of Benin, compared with 2 in 2012 (9x decrease)

Piracy at West Africa


According to the International Maritime Bureau report, global piracy incidents are decreasing with 233 attacks worldwide, down from 352 for the corresponding time period in 2011. However, of the 233 attacks that took place between January and September 2012, 131 of these occurred in Africa. Of the 131 attacks that occurred in Africa, 70 took place off the coast of Somalia (to include the Gulf of Aden, Red Sea, Arabian Sea, Indian Ocean, and Oman) and 34 took place in the vicinity of Nigeria (to include the area off the coasts of Benin and Togo).

Piracy at West Africa


Past and current armed conflicts in the area provide different character of the pirates in the area and much easier access and be equipped with heavy armor. Analysts believe the hijackings of tanker ships likely is the work of sophisticated criminal gangs with knowledge of the oil industry and oil tankers (possibly with the cooperation of low level governmental Officers.

Piracy at West Africa


Oil export countries in Wet Africa

Piracy at West Africa


Current and past armed conflicts in the area

Piracy at West Africa


Attempts and attacks of piracy in the Gulf of Guinea

Ways to avoid piracy


Understand the threat first 1. Review vulnerability assessments 2. Reassess SSOs and company crisis management procedures and update 3. Brief the crew on the threat and their roles 4. Harden the ship to deter, delay and defend:

Introduce barriers to boarding: razor wire and electric fences Control access: remove ladders, lock down doors and hatches leaving one controlled access point into accommodation Observe vulnerable points, CCTV and watches Practice evasive maneuvers at speed Key men on the bridge to report early and make appropriate decisions

Selecting the appropriate Armed Security Services Provider


1. Why to choose Eagle ISS? You choose the provider capable to deliver what undertakes 2. What should you expect from our armed security team? Safe vessels route avoiding or deterrent threats as passing by the High Risk Areas. 3. Capabilities and limitations? Best trained, vast experience, professional discipline manners and attitude, knowledge of International sea law and rules 4. Which laws are they bound by? IMO, ICOC 5. What happens if lethal force is used? Lethal force is the last option and knowing how to avoid with other measures , actions and practices. 6. Who is in command of the vessel? The Captain of the ship

No vessel has ever been hijacked with armed security on board

Eagles People

Eagle ISS is ready with your cooperation, together to decide and implement the security procedures, measures and Eagle s Action Plan on case by case base.

Thank You

You might also like