Professional Documents
Culture Documents
Ship Security Officer: COMPASS Training Center Inc. Compass BLDG 1913 Taft Ave Cor Remedios Street, Malate, Manila, 1004
Ship Security Officer: COMPASS Training Center Inc. Compass BLDG 1913 Taft Ave Cor Remedios Street, Malate, Manila, 1004
Ship Security Officer: COMPASS Training Center Inc. Compass BLDG 1913 Taft Ave Cor Remedios Street, Malate, Manila, 1004
OFFICER
DAY
1
Ship Security Officer
The STCW Code, Table A-VI/5 (Specification of minimum standard of competence for ship security
officers) covers all requirements from STCW Code
SECURITY DEFINITIONS
1) advising the level of threats likely to be encountered by the ship, using appropriate security
assessments and other relevant information;
2) ensuring that ship security assessments are carried out;
3) ensuring the development, the submission for approval, and thereafter the implementation and
maintenance of the ship security plan;
4) ensuring that the ship security plan is modified, as appropriate, to correct deficiencies and satisfy
the security requirements of the individual ship;
5) arranging for internal audits and reviews of security activities;
6) arranging for the initial and subsequent verifications of the ship by the Administration or the
recognized
7) security organization;
8) ensuring that deficiencies and non-conformities identified during internal audits, periodic reviews,
security inspections and verifications of compliance are promptly addressed and dealt with;
9) enhancing security awareness and vigilance;
10) ensuring adequate training for personnel responsible for the security of the ship;
Ship Security Officer
11) ensuring effective communication and co-operation between the ship security officer and the
relevant port facility security officers;
12) ensuring consistency between security requirements and safety requirements;
13) ensuring that, if sister-ship or fleet security plans are used, the plan for each ship reflects the ship-
specific information accurately; and
14) ensuring that any alternative or equivalent arrangements approved for a particular ship or group of
ships are implemented and maintained.
DECLARATION OF SECURITY
ADMINISTRATION
Who is he?
What are his responsibilities?
SEAFARERS WITH DESIGNATED SECURITY DUTIES
means every seafarer who is designated to perform
security duties, including anti-piracy and anti-armed-
robbery-related activities.
Ship Security Officer
Seafarers with designated security duties engaged or employed on a seagoing ship shall, before being
assigned such duties, receive security-related familiarization training in their assigned duties and
responsibilities, taking into account the guidance given in part B.
OTHER PERSONNEL
Other personnel – refers to the personnel other than the officers and crew of the vessel who are
designated to assist in protecting the vessel and its personnel (ex. security escorts).
PORT FACILITY
A port facility is required to act upon the security levels set by the Contracting Government within whose
territory it is located. Security measures and procedures shall be applied at the port facility in such a
Ship Security Officer
manner as to cause a minimum of interference with, or delay to, passengers, ship, ship’s personnel and
visitors, goods and services.
At security level 1, the following activities shall be carried out through appropriate measures in all port
facilities, taking into account the guidance given in part B of this Code, in order to identify and take
preventive measures against security incidents:
.4 monitoring restricted areas to ensure that only authorized persons have access;
At security level 2, the additional protective measures, specified in the port facility security plan, shall be
implemented for each activity detailed in section 14.2, taking into account the guidance given in part B of
this Code.
At security level 3, further specific protective measures, specified in the port facility security plan, shall be
implemented for each activity detailed in section 14.2, taking into account the guidance given in part B of
this Code.
In addition, at security level 3, port facilities are required to respond to and implement any security
instructions given by the Contracting Government within whose territory the port facility is located.
Who is he?
What are his responsibilities?
When a port facility security officer is advised that a ship
encounters difficulties in complying with the requirements of
Ship Security Officer
chapter XI-2 or this part or in implementing the appropriate measures and procedures as detailed in the
ship security plan, and in the case of security level 3 following any security instructions given by the
Contracting Government within whose territory the port facility is located, the port facility security officer a
nd ship security officer shall liaise and co-ordinate appropriate actions.
When a port facility security officer is advised that a ship is at a security level, which is higher than that
of the port facility, the port facility security officer shall report the matter to the competent authority and
shall liaise with the ship security officer and co-ordinate appropriate actions, if necessary.
Who is he?
Who designated the SSO?
What are his responsibilities?
CONTRACTING GOVERNMENT
used in place of Contracting Government unless there is a direct quotation from SOLAS Chapter XI-2 or
from the ISPS Code Part A or Part B. Depending on the context Government can also be used in the IMO
Maritime Security Measures with either the term Administration or Designated Authority, or with both, or in
place of either or both.
They are the ones declaring the level of security in port facilities under their authority.
Mention to the participants that in 1985 (month of August) an Italian Cruise Liner, MV Archille Lauro was
hijacked by Palestinian terrorists leaving with
one casualty, Mr. Leon Klinghoffer (a
wheelchaired pax). Then mention that as a
result of that attack, advice on anti-piracy and
hijack was issued by the IMO. The advice was
implemented by some parts of the Maritime
Industry (mainly on cruise ships) but was
largely ignored by the rest of the industry.
Terrorism usually involves violence, or the threat of violence, by extremist groups seeking to gain
political objectives by malicious means. A terrorist group may hope to make a statement by using
various types of bombs, making bomb threats or hijacking a ship. Increasingly, terrorists are acting
in connection with extremist religious sects that promote suicidal behaviour.
Contraband smuggling, a criminal activity, may result in large financial loss to the shipowner whose ship is
being used by the smugglers. Often, drugs are the commodity being smuggled and they may be brought on
board in a number of creative ways such as in luggage, stores, on or in a person's body, or in electronic
equipment. Weapons are also a frequent item associated with smuggling. Like drugs, weapons, too, find
their way on board in creative ways, suchas in cargo containers.
Cargo theft, an age-old problem, continues to plague the maritime industry and causes financial losses in
staggering amounts. Prevention is normally the most effective method of dealing with this security threat.
Although there may not be violence or political issues involved in most cargo theft cases, this matter
remains high on the list of security threats and requires solutions discussed in this course. Instructors
Ship Security Officer
should convey that cargo theft is only one of the various threats to the security of cargo. Other such
security threats should be discussed during this section of the course.
Collateral damage occurs when a nearby fire, explosion, or attack results in damage to a ship or facility.
While the damage is sometimes unintended, the costs are
nevertheless real. There are measures that may minimize
the consequences of this type of damage.
CONTRACTING GOVERNMENT
COMPANY - Companies shall comply with the relevant
requirements of this chapter and of part A of the ISPS Code,taking
into account the guidance given in part B of the ISPS Code.
Specific responsibility of Companies
The Company shall ensure that the master has available on
board,at all times,information through which
officers duly authorized by a Contracting Government can
establish:
.1 who is responsible for appointing the members of the
crew or other persons currently employed or engaged on board the ship in any capacity on the
business of that ship;
.2 who is responsible for deciding the employment of the ship; and
.3 in cases where the ship is employed under the terms of charter party(ies),who are the parties to
such charter party(ies).
Ship Security Officer
DESIGNATED AUTHORITY
Designated Authority means the organization(s) or the
administration(s) identified, within the Contracting Government,
as responsible for ensuring the implementation of the provisions
of this chapter pertaining to port facility security and ship/port
interface, from the point of view of the port facility.
Contracting Governments may identify a Designated Authority
within Government to
undertake their security duties relating to port facilities
The contents of the Ship Security Plan are most clearly established in the ISPS Code Part A
section 9.4 with additional information provided in Section 9 of Part B of the Code. Trainees should
Ship Security Officer
be familiar with the contents of the plan in a generic fashion thus knowing what to expect as they
are assigned to various ships and experience various Ship Security Plans.
They should understand the elements of the plan as it relates to specific threats such as explosive
devices, piracy, and armed robbery.
Provide a completed sample plan. to give trainees a better opportunity to understand the document
to which they must be responsive aboard each ship to which they are assigned as Ship Security
Officer.
What are the 3 levels of maritime security as defined in the ISPS Code?
Normal – the level at which ships and port facilities normally operate in accordance to the Ship or
Port facility Security Plan
AUDIT COMPARISON
ISPS stands for International Ship and Port Facility Security Code.
Date of implementation is 1st July 2004
ISPS is composed of 2 sections which are the following:
Part A is mandatory
Part B is Guidance but may become mandatory, it may become
mandatory if the company would want to impose it in all its vessels.
Requirement to implement the ISPS Code is clearly stated in Chapter
XI-2 of the International Convention of the Safety of Life at Sea
(SOLAS)
Date of implementation: 1st July 2004
• This work has resulted in an amendment to SOLAS, Chapter
XI, called the International Ship and Port Facility Security Code (ISPS). Mention also that the code
has a mandatory section (Part A) and a section with guidelines (Part B). This requirements became
Ship Security Officer
Participants must be encouraged to adopt systematic and consistent approaches to the evaluation of
security conditions and vulnerabilities. Seafarers with designated security duties may be called upon to
assist in these evaluations. The use of checklists to perform assessments of security in day-to-day
operations should therefore be discussed.
What is Security?
ISPS Code Part “A” requires mandatory SSA including on-site vessel visit and the following:
Identify existing security measures, procedures / operations.
Identify important shipboard operations requiring protection.
Identify possible threats, and prioritize security measures.
Identify weaknesses, related to “human factors”, infrastructure, security policies / procedures.
They should be appraised of the known techniques that can be employed to evade security systems &
controls, such as the disabling of alarm systems, picking of locks, jamming of radio signals
• No security equipment or measure is infallible. They should be apprised of the known techniques that
can be employed to evade security systems and controls, such as the disabling of alarm systems,
picking of locks, jamming of radio signals, etc.
DAY
2
Ship Security Officer
Explain the requirements and procedures for reporting non-conformities and deficiencies identified
during internal audits, on scene inspections, periodic review, and security inspections
Explain actions to be taken in case of breach of security based on the security-related contingency
plan
Respond to security threats or breaches of security
Explain the basic principles and procedures of risk assessment
Explain the information required in conducting risk assessment as contained in the checklist
Conduct risk assessment using checklist
Explain the proper form and practice for recording day-to-day security assessment results
Explain the purpose and content of Declaration of Security
Explain the process in completing the information contained in the Declaration of security
Explain techniques used by pirates and armed robbers to circumvent security measures
Explain the methods used by pirates and armed robbers to undertake attacks against ships
Explain the general characteristics and behavioral patterns who are likely to threaten security on a
non-discriminatory basis
Explain the importance of planning for implementing and coordinating searches
Explain the procedures to be followed for an efficient search
Explain the methods and devices used in conducting physical searches and non-intrusive
inspections
Conduct physical searches and non-intrusive inspections
DEFICIENCY
Deficiency means a failure to comply with the requirements of the Maritime Security
Measures.
12.2 In addition to those specified elsewhere in this part of the Code, the duties and responsibilities
of the ship security officer shall include, but are not limited to:
.5 reporting to the Company Security Officer any deficiencies and non-conformities identified during internal
audits, periodic reviews, security inspections and verifications of compliance and implementing any
corrective actions;
.8 reporting all security incidents;
16.3 Such a plan shall be developed taking into account the guidance given in Part B of this Code
and shall be in the working language of the port facility. The plan shall address, at least, the
following:
.9 procedures for reporting security incidents;
ISPS Code Part “A” requires mandatory SSA including on-site vessel visit and the following:
Identify existing security measures, procedures / operations.
Identify important shipboard operations requiring protection.
Identify possible threats, and prioritize security measures.
Identify weaknesses, related to “human factors”, infrastructure, security policies / procedures.
DoS
The Declaration of Security is a document that may be required for a port visit when specific security
requirements exist. The Declaration address the security requirements that could be shared between
a port facility and a ship, or between ships, and states the responsibility for each
Recreational boaters posing as mariners in distress to attract assistance from other vessels
Inappropriate clothing for weather
Conscious & unconscious “re-adjusting” of clothing
Unconscious “checking” for weapon
Suspicious “bulges” in clothing
Any “out of the normal” activity
Selling souvenirs, usual motive for boarding
PURPOSE
Vessel should develop & maintain an appropriate SSP
Plan should be sufficiently flexible to take into account the level of security plan for each port at
which the vessel intends to call
PROFILING A PERSON
Sri Lankan suicide bomber “Dhanu,” moments before killing former Indian PM Rajiv Gandhi, herself, and 17
others
Ship Security Officer
BODY LANGUAGE
A complex science but common sense will lead you to understand a few pointers:
Non-Verbal
Vocal – manner and Communication (NVC) -
Verbal – words are 7% of the body language is 55%
expression is 38% of
communication of communication
communication
Sign of Nervousness
Sweating
Jerky nervous movements
Restlessness
Stuttered speech
Loud rapid speech
Nail biting
Adjustment of clothing
Physical appearance
Eye Contact
Seeking information
Invite or control interaction
Show interest or attention
Wish to dominate, threaten or influence
Wish to reveal or check attitudes
Procedures to be followed so as to ensure effective and efficient searches. Examples are the
following:
Crew members and facility personnel should not be allowed to search their own areas in
recognition of the
CABINS
Ventilator ducts
Inside heater units
Above or behind light fixtures
Above ceiling and wall panels
Cutouts behind bulkheads, pictures, etc.
False bottom clothes closets-hanging clothes
COMPANION WAYS
Ducts
Wire harnesses
Railings
Fire extinguishers
Fire hoses and compartments
Access panels in floors, walls, ceilings
Behind or inside water coolers, igloos
DECK
ENGINE ROOM
Under deck plates
Cofferdams, machinery pedestals, bilges
Journal-bearing shrouds and sumps on propeller shaft
Under catwalk, in bilges, in shaft alley
Escape ladders and ascending area
Ship Security Officer
SCREENING PROCESS
Visitor’s/ Passengers Rights:
They may refuse a certain type of screening
Be sensitive to screening requests
Visitors & passengers who refuse all screening must be denied access to the ship and should be
detailed for the SSO and local law enforcement authorities
2 TYPES OF SEARCH
1. Limited Physical Search
2. Whole Body Physical Search
PRE-SEARCH REQUIREMENTS
Long stick
Table
Transceiver Radio
Logbook
Gate pass
Gloves
Flashlight
Stepboard
Hand Metal detector
Ship Security Officer
REMINDER
Very important the body search is done with care and must not be by any means of obstructive to the
person being search
If when personal belongings has to be searched, i.e., wallets, bags, coats/jackets/ sweater, etc. these
items should not be touched and be opened only by the person searched.
Permission to
Hair Arms search the
lower parts
Crutch, socks,
Collar Belt
shoes
If you have any doubts
at any stage call your
Front sides
Wallet, cell
supervisor or SSO.
Back center (back of the
phone (on/off)
palm)
Front center
Back sides (back of the Mouth Final courtesy
palm)
BODY SEARCH
Methods
1. Archway metal detector
2. Handheld metal detector
Both types of electronic search requires: Good guest relation and caution
SCREENING
Screening is designed to safeguard the lives of people travelling by sea
Carry out your task with
Courtesy
Caution
Tact
Vigilance
VISITORS SHALL ALWAYS:
wear a ship-issued ID
Ship Security Officer
be escorted
METHODS OF PHYSICAL SEARCHES & NON-INTRUSIVE INSPECTIONS
members of the ship’s crew should not be required to search their colleagues or their personal
effects.
human rights of the individual
preservation his or her basic human dignity.
TYPES OF SEARCHES
REACTIVE (carried out in reaction to a specific threat)
Searchers should be familiar with the area to be searched
Search conducted according to a specific plan
Searchers must be able to recognize items being searched
Establish central reporting point for searchers
REACTIVE
Searchers should be able to communicate with the command post
Searchers must know exactly what to do if item/person is found (Master’s discretion)
WHEN TO SEARCH:
Decision by Master, based on: Security Plan
Situation (current information, observations, etc.)
Intelligence information
BAGGAGE SEARCHES:
Check for false compartments (often used for smuggling drugs,
explosives or weapons)
Heavy baggage (X-ray supported by physical searches, sniffing dogs
may be used to screen baggage)
Ship Security Officer
DAY
3
Ship Security Officer
Explain the methods of recognizing presence of weapons, dangerous substances and devices
Explain the hazards of the presence of weapons, dangerous substances and devices
Explain the common reactions of crowd in a crisis situation
Explain the importance of clear communication with crew and passengers during emergency
Explain different crowd management control techniques
Identify security-related sensitive information and security-related communications on board
Explain the manner of handling such information and the importance of maintaining its
confidentiality
Identify the commonly designated restricted areas on board ships
Explain the requirements in designating restricted areas
Identify the commonly designated restricted areas on board ships
Explain the requirements in designating restricted areas
Explain the methods and identification system to control access to the ship and its restricted areas
Explain the methods for effective monitoring of deck areas and areas surrounding the ship
Carry out monitoring of deck areas and areas surrounding the ship
Explain the security aspects of handling cargoes and ship’s stores with other personnel and
relevant port facility security officers
Explain the methods in inspecting cargo and ship’s stores
Explain the methods of controlling the embarkation, disembarkation and access of persons and
their effects while on board
Carry out inspection of person’s embarkation and disembarkation including their personal effects
Identify the various types of security equipment and systems used on board
Explain the limitation of security equipment and systems
Explain the operation and function of ship security alert system
Explain the procedures, instructions and guidance on the use of ship security alert systems
Explain the procedure in testing, calibrating and maintaining security systems and equipment
based on instruction manual
Explain the importance of training, drills and exercises
Explain the requirements in conducting drills and exercises under relevant conventions, codes and
IMO circulars, including those relating to prevention and suppression of piracy and armed robbery
against ships
Explain the responsibility of the SSO during drills and exercises
Explain the methods on enhancing security awareness and vigilance on board based on IMO
circulars, industry guidelines and company policy
Explain the importance of assessing the effectiveness of drills and exercises
Explain the methods in assessing the effectiveness of drills and exercises
Ship Security Officer
PROHIBITED WEAPONS
BOMB
Power Supply
Switches
Initiators
Main Charger
Container
Ship Security Officer
BOMB SWITCHES
Mechanical
Electronic
Chemical
TIMER
Mechanical
Electronic
IGNITERS
Ship Security Officer
MAIN CHARGER
INCENDIARY
DYNAMITES
GRENADES
Ship Security Officer
ROCKET-PROPELLED GRENADE
BANNED SUBSTANCES
CONCEALER
Ship Security Officer
UNUSUAL PACKAGE
EMERGENCY PLANS:
General framework of assigned duties & tasks
Disseminated, practical & critiqued
Incorporate ship’s general layout
Incorporate safety regulations
UNDERSTANDING CRISIS:
Response to crisis & normal versus abnormal behavior
Behavioral response to crisis (denial, panic)
Communication (sender, receiver, message, feedback, interference)
RESPONSE TO WARNING
Acceptance (acceptance of inherent risks)
Denial (delays total reaction time)
Slow response (10% immediately accept danger & prepare to take action, 30% doubtful or curious
& will investigate further, 60% ignore or neglect even most obvious warning signs)
Ship Security Officer
AIDS TO DECISION-MAKING
How others behave
What others say
Presence of specialized staff
Changes in environment
Instructions by staff
Rumors
AIDS TO DECISION-MAKING
How others behave
What others say
Presence of specialized staff
Changes in environment
Instructions by staff
Rumors
Acknowledge
Here I acknowledge the present reality, that I'm afraid and starting to panic. I won't try to ignore it, or
pretend it's not there. I won't struggle to distract myself, tell myself to "stop thinking about it!", or snap any
rubber bands on my wrist. I'm acknowledging simply that I am afraid, not that I am in danger. The thought
that I am in danger is just another symptom of panic, not an important or useful thought.
Accept
Here I accept the fact that I'm afraid at this moment. I don't fight the feeling; ask God to take it away; blame
myself, or anybody else. I accept, as best I can, that I'm afraid in the same way I would accept a headache.
I don't like headaches, but I don't bang my head against the wall in an effort to get rid of them, because that
makes them worse. Overcoming panic attacks begins with working with, not against, my panic and anxiety
symptoms.
Wait
What "Wait“ means is this: don't just do something, stand there. It's similar to the suggestion "count to ten
before you get mad".
One of the hallmarks of a panic attack is that it temporarily robs you of your ability to think, remember, and
concentrate. This step will buy you a little time to regain those abilities before you take any action.
Actions (to make myself more comfortable)
At this point, you've already gone through the two most important steps to overcoming panic attacks.
Repeat
This step is here because you might start feeling better, then feel another wave of panic. Your first reaction
might then be to think "Oh No, it didn't work!". The Repeat step is here to remind you that it's OK if that
happens. Just take it from the top again. It's not unusual or dangerous. You may go through several
cycles, and you just need to repeat the AWARE steps again, as often as you need.
End
This is here to remind you that your panic attack will end; that all panic attacks end; that they end
regardless of how you respond; that it's not your job to make the attack end; and that your only job is to
make yourself as comfortable as possible
Ship Security Officer
CONFIDENTIALITY ISSUES
In addition, the SSP should establish the following, which relate to all Security Levels (Part B 9.7
ISPS Code);
4. Procedures and practices to protect security sensitive information held in paper or electronic format;
6. In addition, the SSP should establish the following, which relate to all Security Levels (Part B 9.7 ISPS
Code);
1. Duties and responsibilities of all shipboard personnel with a security role; 15
2. Procedures of safeguards necessary to allow continuous communications to be maintained at all times;
3. Procedures needed to assess the continuing effectiveness of security procedures and any security and
surveillance equipment and systems, including procedures for identifying and responding to equipment
systems failure or malfunction;
4. Procedures and practices to protect security sensitive information held in paper or electronic format;
5. The type and maintenance requirements of security and surveillance equipment and systems, if any;
6. Procedures to ensure the timely submission, and assessment, 0of reports relating to possible breaches
of security or security concerns;
7. Procedures to establish, maintain and update an inventory of any dangerous goods or hazardous
substances carried on board, including their location.
Cyber Security
Some aspects of cyber risk management may include commercially sensitive or confidential information.
Companies should, therefore, consider protecting this information appropriately, and as far as possible, not
include sensitive information in their Safety Management System (SMS).
Ship Security Officer
Phishing
Sending emails to a large number of potential targets asking for particular pieces of sensitive or
confidential information. Such an email may also request that a person visits a fake website using a
hyperlink included in the email.
The restricted areas may include the navigation bridge, machinery spaces, spaces with security-
related equipment, ventilation spaces, spaces containing IMDG cargo, accommodation, any other
areas specified as per the SSP
ISPS CODE
The ISPS Code makes it mandatory for a vessel to have such a plan in place. The SSP must lay out the
protective measures for each security level vis a vis ship related activities, access control onboard,
monitoring of the restricted areas, cargo handling, receiving of stores/baggage etc.
It is very important to control access routes to deter any unknown individual from accessing the vessel
illegally
All doors and hatches providing access to the bridge, accommodation and machinery spaces
should be properly secured to prevent them being opened by unauthorized personnel
Consideration should be given to the means of securing doors & hatches in order to afford the ship
the maximum protection possible
Ship Security Officer
Door or hatch that is located on an escape route from a manned compartment, it is essential that it
can be opened by a seafarer trying to exit by that route.
It is recommended that once doors & hatches are secured, a designated & limited number are
used for routine access when required, their use being strictly controlled by the OOW
The Single point of access to be maintained & guarded at all times
It is recommended that once doors & hatches are secured, a designated & limited number are
used for routine access when required, their use being strictly controlled by the OOW
The Single point of access to be maintained & guarded at all times
Escort policy to be implemented on ships visitors once on board
METHODS FOR EFFECTIVE MONITORING OF DECK AREAS AND AREAS SURROUNDING THE SHIP
Establishing Security Rounds As Per SSP Requirement
Using CCTV As An Additional Monitoring Tool
Using Lock & Tag System as Per SSP
Deck Illumination Security & Deck Lights
SECURITY ASPECTS RELATING TO THE HANDLING OF CARGO AND SHIP’S STORES WITH
OTHER SHIPBOARD PERSONNEL AND RELEVANT PORT FACILITY SECURITY OFFICERS
EACH year, $12.5 trillion of merchandise is traded worldwide, using more than 200 million
intermodal containers. Ninety percent of these shipments are between seaports
Due to ships intermodal nature & fast pace movements from 1 port to another security of the ship
& its cargo became a concern
SECURITY EQUIPMENT
PROCEDURES, INSTRUCTION AND GUIDANCE ON THE USE OF SHIP SECURITY ALERT SYSTEMS
alarm is a covert signal, which will have no sound and no flashing lights so that it is in
no way obvious to any intruders on board the ship.
(a) Security systems and equipment must be in good working order and inspected, tested,
calibrated and maintained according to the manufacturer's recommendation.
(b) The results of testing completed under paragraph (a) of this section must be recorded in
accordance with § 104.235. Any deficiencies must be promptly corrected.
(c) The Vessel Security Plan (VSP) must include procedures for identifying and responding
to security system and equipment failures or malfunctions.
[USCG-2003-14749, 68 FR 39302, July 1, 2003, as amended by USCG-2007-28915, 81 FR
57710, Aug. 23, 2016]
A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Be Vigilant – Always
Guard the entrance
1) Be Vigilant – Always: All the crew members (either on or off duty) must always be vigilant at all
times. An alert crew can eradicate a problem way before any emergency situation can take place.
2) Guard the entrance: It you are duty officer while the ship is at port, make sure that the gangway is
properly guarded and no one enters the ship without an ID check or authorization of ship’s captain.
Also keep a close watch on the records of entry and exit of visitors.
A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Ask and interrogate
Know Your Duties Well
3) Ask and interrogate: If you see a visitor without an ID card or find an unfamiliar person, do
not hesitate to ask and interrogate him for his identity. Ensuring that all the entries in the ship are
authorised is the first step towards enhancing ship’s security.
4) Know Your Duties Well: Each crew member onboard ships have been assigned with a
particular duty for every security level. He/She must know the duties listed on his/her part and
should perform them efficiently
A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Continuous Monitoring
Supervising Cargo Operations
5) Continuous Monitoring: Monitor the restricted areas of the ship at regular intervals of time to
ensure no person has entered without permission. Also make sure that only one entry point is
available to ship’s accommodation area and the same is manned all the time
6) Supervising Cargo Operations: It is very important for ship officers to know which cargo is
being loaded along with its whereabouts. Several cases of stowaway have been registered in the
past during cargo operation on ships. Keep a proper check on stevedores and the cargo which is
being loaded on the ships.
A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Equipment Availability
Update Your Knowledge
7) Equipment Availability: Ensure that security and communication equipment tools are readily
available and are in proper working condition
8) Update Your Knowledge: Knowledge of current issues such as various reasons of security
threats, detection of dangerous substances, unauthorized devices and their effect is an important
aspect of ship’s security system. This can be achieved by providing regular training and updates to
the ship’s crew regarding new reports or any news regarding Security of the vessel
Ship Security Officer
A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Identify the Weaknesses
Regular drills
9) Identify the Weaknesses: Every system has its weakness and if not identified in early stages, can
lead to dangerous situations. Survey your security plan, crew performance, security equipment, duties of
ship security officer etc. and phase out every loop hole out of them.
10) Regular drills: Last but not the least; seafarers should know how to tackle an emergency condition.
To ensure all the above points are followed religiously, regular security drills and safety meetings should be
organized by crew members.
-END-
Ship Security Officer