The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by GMLS | Global Maritime Legal Solutions (Pty) Ltd, 2021-09-14 02:27:19

Module 13 | Safety & Security Presentation - FIATA Dip 2021

FIATA Diploma

AVIATION SECURITY

• Aviation – EU Regulations – Airport Security
• R CAR – Regulated Air Cargo Agent Regime
• Screening of Cargo

51

51

SAFE 4 CORE
ELEMENTS

• Advance Electronic Information
• Consistent Risk Management
Approach
• Inspection of Outbound Cargo – N
IDE
• Enhanced Trade Facilitation
• The 3 SAFE Pillars: Customs-to
Customs & Customs-to-Business &
Customs-to-Other Governmental &
Inter-governmental Departments

5
2
52

CONTAINER SECURITY INITIATIVE (C. S. I.)

USA Initiative
Pre-Screening
Focus on Customs Administrations and Ports in the Country of Export
Risk Management
Sharing Data and Intelligence

53

53

ISO Supply Chain Security

ISO 28000 : 2007
Plan ~ Do ~ Check ~ Act
(14 Countries, IMO, WCO, ICS)

54

54

Giving Specifications

For Security Management Systems for the
Supply Chain

Management System Standards

55

55

IMPACTS OF TERRORISM

Port Closures Tourism
Channel Closures
Closure of Businesses
Relocation of Businesses
Tourism Termination

56

56

HISTORICAL HIGHLIGHTS

Zealots at Judea (Sicarii)
Nizari Isamlis – Al-Assassin
Guy Fawkes (1605)
Reign of Terror (1793 – 94)
Munich Massacre (1972)
Tokyo Subway (1995)
Oklahoma City (1995)
World Trade Centre Twin Towers
(11/09/2001 or USA Term 9/11)

57

57

TERRORISM

Brutal But Not Senseless
= MOTIVE

Terrorism = Theatre

58

58

COUNTER TERRORISM IN THE PRIVATE SECTOR
= Discuss

Contact Numbers
Location of Police
Phone call Threats
Contingency Plans
Visitors

59

59

WMD

(weapons of mass destruction)

Statutory Acts and International Laws with WTO Global Agreements
in place:

Large numbers
Chemical, Biological, Radiological, Nuclear, Explosive ....
Even Loose Nukes
Export Control arrangements
Awareness

60

60

SECURITY DESIGNS

People
Physical Safeguards
Process

Security Systems

People Physical Process
Component Safeguards Component
Component
*Security Officer * Security Policies
* Police Officer * Physical Barriers * Security Plan
* Fire Fighter * Lighting * Procedures
* All Employees
* CCTV & Sensors * Education & Training
* Access Control * Emergency Preparedness

61

61

NAME SOME…

Physical Safeguards??
Top Management & Everybody’s commitment
EOP

62

62

PERSONNEL SECURITY & SCREENING

Invisible Barrier
Background checks
Authority to Release information
Reference checks
Drug & Alcohol tests
Periodic background tests
People always moving from Job to Job

63

63

PHYSICAL DEFENCE IN DEPTH

Out Fence – clear
Rings of Security
Padlocking
Parking considerations
Lighting considerations
Sensors x 3
Intrusion Detection Systems (IDS)
Alternative Power Sources

64

64

SECURITY MANAGING

Interior

Exterior

65

65

SENSITIVE AREAS

Doors
Employee ID Cards
Materials control
Package control
Patrols & Inspections
Alarms
CCTV

66

66

SECURITY EDUCATION

Employee participation
Weakest Link
3 Goals: understand ~ meet ~ embrace
Mindset & Security Awareness
Management participation
Apathy
Harden the target

67

67

DOCUMENTATION 68

All Types of Documents must be clear
Electronic & Manual
Loss vs. Recovery
System Access
Who, What, When, Why, Where
Cargo Description must be clear

(Continued…)

68

DOCUMENTATION (cont.)

Packing Lists
Bills of Lading
Advance Cargo Manifests
Shipping & Receiving
Deadlines & Delays
Storage Areas Secure
Tamper Seals UCR
Pre-load Inspections
Short loading

69

69

CARGO & CONVEYANCE SECURITY

Container Inspection
Container Integrity
Container Seal Programme
Stuffing Site
Loading Ocean Terminal
Transhipment Terminal
Off-loading Ocean Terminal
Types of Seals
Smart Technology

70

70

SMART CONTAINER TECHNOLOGY

71

71

TRUCK SECURITY PROGRAMME

Gate Controls
Inspections
Dock Security
Truck Staging
Driver Guidelines
High Value Cargo!!!
Report discrepancies

72

72

IT SECURITY / INFRASTRUCTURE

Confidentiality
Integrity
Availability
Protection, Hardware, Software and Networks
Virus attacks
Hacking
Information Security Policy
Types of Information
Firewalls and Data Protection

AND DATA???

73

73

BUSINESS PARTNER SECURITY

A CHAIN
IS AS STRONG

AS ITS

WEAKEST LINK

74

74

BUSINESS PARTNER SECURITY (continued)

Extend Security Supply Chain Screening Partners
Profile checking
Sub-contracting
Reviews of Security
Monitoring
Customer Screening

75

75

MANAGE AN INVESTIGATION

Reporting
Internal Theft
25/25/50 Principle
Silent Crime
Fraud – p 201
False Billing
Bribery
Investigation & Analysis
Evidence collection
Chain of Custody

76

76

RISK AND VULNERABILITY ASSESSMENT

METHODOLOGY

Step 1 - Identify critical business functions important to protect
Step 2 - Take stock of existing security measures and procedures
Step 3 - Identify possible threat scenarios
Step 4 - Assess consequences
Step 5 - Assess vulnerability
Step 6 - Evaluate risk score and determine mitigation strategy
Step 7 - Develop countermeasures
Step 8 - Re-assess likelihood
Step 9 - Evaluate countermeasures
Step 10 - Repeat the process
Step 11 - Continue the process

77

77

INCIDENT MANAGEMENT

Logging, Recording and Reacting to Bomb & Fire, Medical, Terror,
Hijacking, Theft etc.
Discovery of a suspicious device
Type up – DO NOT LIST!!
First Aid Training

78

78

EMERGENCY MANAGEMENT & CONTINGENCY PLANNING

Contingency Planning
Emergency Response
Evacuation & Assembly
Search & Rescue
Return to work
Crisis Management
Media Relations
Business Continuity
Business Recovery

79

79

Contingency Planning is a
Continuous
PROCESS

80

80

for additional research

• ISPS (International Ship & Port Facility Code)
• Singapore’s Secure Trade Partnership
• USA’s Customs-trade Partnership Against Terrorism (C-TPAT)
• Canada’s Partners in Protection (PIP)
• Sweden’s StairSec Programme
• New Zealand’s Secure Export Partnership (SEP) Programme
• Aviation – EU Regulation 2320/2002
• Free and Secure Trade (FAST) Programme
• EU’s AEO Customs Programme
• WCO SAFE Framework of Standards
• Container Security Initiative (CSD)
• 24-Hour Advance Manifest Rule
• Technology Asset Protection Association (TAPA)
• ISO/PAS Supply Chain Security Management System Standards (28000/2007)

81

USEFUL LINKS…

WCO http://www.iata.org/
http://www.wcoomd.org/home.htm
www.lifetrons.ch
http://www.icao.int/ [email protected]

82 82

Questions & Answers

For further information on this and other Training Courses offered
by GMLS, please contact us on:-
Website: www.gmls.co.za
Email: [email protected]
Office Mobile: +27 82 852 3626
Tel: +27 44 020 0103
or +27 10 880 4342

83


Click to View FlipBook Version