Pilot: 24 Hours
Linesmen: Arranged with Agent
Tugs: 7:30am to 4:00pm
After hours upon request & vessel arrival schedule

VHF Channel: 16
Telephone: +1 (684) 633-4251
Extension: 1108, 1129, 1130, and 1131.
96 Hours Notice Required

Services

Services

A port is vulnerable to organized crime and also has to be protected against the risk of international terrorism. Security and safety is a top priority of the Port of Pago Pago. Many agencies, from the U.S. Coast Guard to U.S. Customs to the Port Authority’s own security personnel work closely together to protect our Port and our Pacific Region.

ACCESSING THE PORT

Port workers must now have a Transportation Worker Identification Credential (TWIC) to access the marine terminals. The Transportation Worker Identification Credential (TWIC) is required by federal law for all workers, including drayage and truck drivers, that need access to secure orSP_Check_Point.JPG restricted areas of maritime facilities. TWIC is administered by the U.S. Transportation Security Administration (TSA) and the U.S. Coast Guard.

Please visit the TWIC site for further information. Security standards surrounding the TWIC can be confusing, so if you do not yet have a TWIC, or if you don't know how it works, please read through the tab "Notice to all Truckers" before visiting the official TWIC site.

Truck drivers serving the Port must also have a valid commercial driver’s license to access and drive within our Port. Other aspects of our security is to provide background checks for drivers who enter our Port.

CUSTOMS EXAMINATIONS

ASG Customs may stop your shipment at the Port for inspection.

The Port of Pago Pago has for many years put considerable efforts into meeting international standards, and continues to ensure close compliance. The many requests from international partners to share in its expertise and to make working visits testify to the port's outstanding reputation in this area. Raising the level of safety and security remains a challenge to which the Port Authority devotes unremitting effort. The Port Authority seeks to play a coordinating role in matters of port security and participates in numerous projects.

Responsible for coordinating with Homeland Security, Department of Public Safety, Marine Patrol, ASG Fire Fighters and Aircraft Rescue Fire Fighters, along with the United States Coast Guard (USCG) in establishing operational practices and procedures; ability to investigates and corrects the complaints concerning the operation and maintenance of both SEAPORT and AIRPORT; maintaining and conducting effective procedure in cases of unforeseen circumstances; responsible for the preservation of the peace, prevention of crime, detection and arrest of offenders against the law, protection of the rights of persons and property, enforcement of and prevention from violations of all laws in American Samoa; conduct scheduled and random security inspections SEAPORT Operation Restricted Area, its perimeter fencing, including all access points and checkpoints to prevent unauthorized access.  

SUSPICIOUS ACTIVITY – SEE SOMETHING, SAY SOMETHING

What To Do If You Spot Suspicious Terrorist Activity If you see suspicious behavior; do not confront the individuals involved. Take note of the details:

 

– Size (Jot down the number of people, gender, ages, and physical descriptions)

– Activity (Describe exactly what they are doing)

L – Location (Provide exact location)

U – Uniform (Describe what they are wearing, including shoes)

T – Time (Provide date, time, and duration of activity)

E – Equipment (Describe vehicle, make, color etc., license plate, camera, guns, etc)

 

Suspicious activity is often recalled after an event. We must train ourselves to be on the lookout for things that are out of the ordinary and arouse suspicions.

 

Keep in mind, those who commit terrorist acts:

  • Usually live among us without appearing suspicious while planning and preparing for their attack. They may be your neighbor, student or friend.
  • Often they will need training or equipment that will arouse suspicion.
  • Need to conduct surveillance on possible targets and gather information on the planned attcak location.
  • All of these things make terrorists vulnerable to detection, by those watching for certain characteristics.

Learn to recognize the difference between normal and abnormal behavior. It can be a fine line. Stay alert in your daily travels and routines and get to know:

  • Who your neighbors are.
  • What cars are normally in your neighborhood.
  • Who regularly makes deliveries at work and in your neighborhood.

Staying alert is NOT about becoming paranoid. Staying alert is being aware of one’s surroundings. Be alert to indications of possible trouble. They may include:

  • A local activity that could indicate problems in your community.
  • One of the clues that led to the recent break-up of a terrorist plot was that several of the cell members were spotted celebrating in an apartment complex on the anniversary of 911.
  • Previous activity or crimes.
  • Controversial issues being debated.
  • Suspicious thefts.

It is impossible to identify a terrorist by:

  • Appearance
  • Nationality
  • Language

You CAN only identify a terrorist threat by observing or hearing about suspicious activity that may lead to a criminal act.

Identifying suspicious activity is not a difficult science. Rely on your judgment. Your suspicion of a threat could be confirmed with only one incident or it could take a series of incidents. Your suspicions will need to be based on:

  • Experience
  • Judgment
  • Common sense

Review some possible suspicious activity.

Here is just one example: Unusual Interest in High Risk or Symbolic Targets

Maybe you are at a high profile location or, perhaps a National Monument and you notice a person nearby taking several photos. That’s not unusual. But then you notice that the person is only taking photos of the locations surveillance cameras, entrence crash barriers and access control procedures. Is that normal for a tourist? Not.

The following should cause a heightened sense of suspicion:

  • Suspicious or unusual interest.
  • Surveillance (suspicious in nature).
  • Inappropriate photographs or videos.
  • Note-taking.
  • Drawing of diagrams.
  • Annotating maps.
  • Using binoculars or night vision devices.

Unusual or suspicious activity does not necessarily mean that terrorist activity is happening, but be aware of the following suspicious behaviors:

  • Individuals acting furtively and suspiciously.
  • Individuals avoiding eye contact.
  • Individuals departing quickly when seen or approached.
  • Individuals in places they don’t belong.
  • A strong odor coming from a building or vehicle.
  • An overloaded vehicle.
  • Fluid leaking from a vehicle, other than the engine or gas tank.
  • Over dressed for the type of weather.

FRAUDULANT IDENTIFICATION

Many of the 9/11 terrorists were in the country illegally and using fraudulent IDs. Altering or using false government identification in any way and for any purpose is against the law. Fraudulent ID’s include:

  • Drivers license.
  • Social security card.
  • Passport.
  • Birth certificate.
  • INS identification.

If you believe someone is using or has altered government identification, please notify the law enforcement uthorities. Do NOT request to see another person’s ID when not appropriate. Allow law enforcements to do the investigating.

Terrorists, when not acting alone, need to meet with their conspirators and often times work within a cell. Pay attention to visitors and guests that:

  • Arrive and leave at unusual hours.
  • Try not to be noticed.
  • Act in a suspicious manner.
  • Park an unusual distance from the meeting.
  • Have an unusual number of unrelated people living together.
  • Not all people who maintain privacy are terrorists. But people intent on doing illegal acts want to be left alone.

Some signs that may raise your suspicions:

  • They only let you into the apartment or house with plenty of prior notice.
  • They change the locks often.
  • They keep certain rooms off limits.
  • They cover tables and other pieces of furniture.
  • They never allow maid service in a hotel room.
  • They only take hotel room service outside the door.
  • They only accept deliveries at the hotel’s front desk or outside a closed door.

Deliveries are a common method for terrorists to carry out their attacks. Be aware of:

  • A vehicle with hazardous material parked or driving in an inappropriate area.
  • Unusual deliveries of chemicals or fertilizer.
  • Unattended bags or boxes in a public access place.
  • Fire extinguishers that may have been moved or tampered with.
  • Unusual or unexpected mail.

UNUSUAL PURCHASES OR THEFTS

Terrorists need supplies to carry out their attacks and accomplish their goals.

Pay attention to purchases, rentals or thefts of:

  • Police, security, public utility, mail carrier, or airline uniforms and equipment.
  • Explosives
  • Weapons
  • Ammunition
  • Propane bottles
  • Toxic chemicals
  • Vehicles able to contain or haul hazardous materials.

Additional suspicious activity may include:

  • Someone bragging or talking about plans to harm citizens in violent attacks or who claims membership in a terrorist organization that espouses killing innocent people.
  • Suspicious packages, luggage, or mail that have been abandoned in a crowded place like an office building, an airport, a school, or a shopping center.
  • Suspicious letter or package that arrives in your mailbox. (Stay away from the letter or package and don’t shake, bump or sniff it; wash hands thoroughly with soap and water.
  • Someone suspiciously exiting a secured, non-public area near a train or bus depot, airport, tunnel, bridge, government building, or tourist attraction.
  • Any type of activity or circumstance that seems frightening or unusual within the normal routines of your neighborhood, community, and workplace.
  • Someone unfamiliar loitering in a parking lot, government building, or around a school or playground.
  • Anyone asking a lot of questions ‹ especially concerning routes or loads or drop-off times.
  • Recruiters should be alert for unusual employment applications. Don’t assume it couldn’t be an inside job.
  • A trucker returning to his or her vehicle from a restaurant or truck stop should make sure no one is loitering around the truck. Watch out for walk-arounds.