[2][3][4][5] The security of offshore installations is vital as not only may a threat result in personal, economic, and financial losses, but it also concerns the strategic aspects of the petroleum market and geopolitics.
[8][2] Offshore installations are most commonly engaged in drilling actions located in the continental shelf of a country and form a major part of the petroleum industry's upstream sector.
[2][10] There are a variety of protective mechanisms in place, and these range from international legal frameworks to specific industry planning and responses.
[18][17] Record keeping of security incidents of offshore installations dates back to the 1960s,[10] but it was not until the early 1980s that possible threats were first addressed within academic literature.
[12][19] The signing of the accompanying SUA Protocol, the Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms Located on the Continental Shelf , which prohibits and punishes behavior that may threaten the security of offshore fixed platforms is seen to present a milestone in offshore installation security.
[17] The 9/11 attacks marked a turning point in the international awareness and policy towards the comprehensive protection of offshore energy sector as political engagement with the topic increased.
[4][2][9][6] [20] The resulting overall development towards heightened awareness and recognition of the issue has affected the organization of the offshore oil and gas sector within their installations.
[21] This overall development has brought changes to the international regulatory framework; namely, the passing of the ISPS Codes and the 2005 amendments to the 1988 SUA Convention and Protocol.
This classification identifies the people and organizations behind the threats as an analysis to learn more about their motivation, intent and tactics, to develop an effective response.
Other enabling factors refer to how events such as civil wars or political unrest in the region might effect offshore security.
[10][4] A materialized security threat may result in the disruption of the functioning of the offshore installation due to the damage or harm on the operational site.
It could present a weakened position of a nation within global politics as it loses power within those factors that govern international relations.
The 1982 United Nations Convention on the Law of the Sea (UNCLOS) provides a basic legal basis for protecting offshore installations.
60 of UNCLOS' gives coastal states the right to create a 500-meter safety zone around offshore installations which designates it as an area of restricted navigation where any passing vessel or boat may be considered a potential security concern.
[14][18] The Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation (SUA Convention) and its accompanying Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms Located on the Continental Shelf (SUA Protocol) criminalized behavior of crime, violence, or behavior that may threaten the security of ships and fixed platforms.
[19] The main purpose of the Convention was to ensure that appropriate action is taken against those who have committed unlawful acts against vessels and offshore oil and gas infrastructure as it obliges contracting Governments either to extradite or prosecute alleged offenders.
[2] The 2005 amendments, moreover, addressed vulnerable elements of the maritime-based oil and gas industry and drew attention to potential acts of terrorism.
[3][14] It presents a systematized protocol to identify, analyse, evaluate, and treat possible risks to support strategies for major safety and security incident prevention, response, and recovery.
It has been developed by the American Society of Mechanical Engineers to be used by the staff and management of infrastructure facilities and is also used by the American industry to report to the US Department of Homeland Security[36][37][38][39] CRISRRAM, or critical infrastructures and systems risk and resilience assessment methodology, is a security methodology developed by the European Commission.
It addresses risks and vulnerabilities of critical infrastructure at asset, system, and societal levels which takes into account environmental and man-made security hazards.