Ship Security Officer: COMPASS Training Center Inc. Compass BLDG 1913 Taft Ave Cor Remedios Street, Malate, Manila, 1004

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 49

SHIP SECURITY

OFFICER

COMPASS Training Center Inc.


COMPASS Bldg
1913 Taft Ave cor Remedios Street,
Malate, Manila, 1004
www.compass.ph
Ship Security Officer

DAY
1
Ship Security Officer

INTENDED LEARNING OUTCOME


Explain the requirements in Regulation VI/5 and Section A-VI/5;
Explain and define the following Maritime Security terms:
- Company Security Officer
- Declaration of Security
- Designated Authority
Explain and define the following Maritime Security terms:
- Piracy and armed robbery
- Port Facility
- Security Officer
- Recognized Security Organization
- Security Incident
Explain and define the following Maritime Security terms:
- Security Levels
- Ship Security Office
- Ship Security Plan
- Ship to Ship Activity
- Ship/Port Interface
Identify the international maritime security policies and guidelines
Explain the provisions in international security policies and guidelines
Explain the responsibilities of the Government, companies and designated persons based on
international maritime security policies and guidelines
Explain the purpose of a ship security plan
Explain the required elements of the Ship Security Plan, including those that relate to the
prevention and suppression of piracy and armed robbery
Cite circumstances under which certain sections of the ship security plan may be shown to Port
State Control Authorities
Explain procedures to be employed in implementing the Ship Security Plan
Explain the requirements in coordinating the implementation of the Ship Security Plan to the
company security officer and the port facility security officer
Explain the effects to security measures of shipboard personnel who may remain on board for long
periods.
Explain mechanisms for ensuring the continuing effectiveness of the Ship Security Plan
Explain the procedures for modifying and implementing any changes in the Ship Security Plan
Explain requirements in implementing modifications of the Ship Security Plan
Explain the three (3) security levels and the actions required for each level
Explain recommended actions on board and in port facility environment in response to attacks and
attempted attacks and armed robbers
Explain the requirements in conducting internal audits, on=scene inspections, control and
monitoring of security activities in accordance with the Ship Security Plan
Explain the procedures in conducting internal audits, on-scene inspections, control and monitoring
of security activities in accordance with the Ship Security Plan
Ship Security Officer

Maritime Security Terms and Definitions


STCW Section B-VI/5 of Chapter VI (STCW 2010)
On completion of training, a ship security officer should have adequate knowledge of the English language
to correctly interpret and communicate messages relevant to ship or port facility security.

The STCW Code, Table A-VI/5 (Specification of minimum standard of competence for ship security
officers) covers all requirements from STCW Code
SECURITY DEFINITIONS

COMPANY SECURITY OFFICER


(CSO)
Who is he?
What are his responsibilities?

A person designated as the COMPANY


SECURITY OFFICER may act as the
company security officer for one or more
ships, depending on the number or types of
ships the Company operates provided it is
clearly identified for which ships this person is responsible. A Company may, depending on the number or
types of ships they operate designate several persons as company security officers provided it is clearly
identified for which ships each person is responsible.
In addition to those specified elsewhere in this Part of the Code, the duties and responsibilities of the
company security officer shall include, but are not limited to:

1) advising the level of threats likely to be encountered by the ship, using appropriate security
assessments and other relevant information;
2) ensuring that ship security assessments are carried out;
3) ensuring the development, the submission for approval, and thereafter the implementation and
maintenance of the ship security plan;
4) ensuring that the ship security plan is modified, as appropriate, to correct deficiencies and satisfy
the security requirements of the individual ship;
5) arranging for internal audits and reviews of security activities;
6) arranging for the initial and subsequent verifications of the ship by the Administration or the
recognized
7) security organization;
8) ensuring that deficiencies and non-conformities identified during internal audits, periodic reviews,
security inspections and verifications of compliance are promptly addressed and dealt with;
9) enhancing security awareness and vigilance;
10) ensuring adequate training for personnel responsible for the security of the ship;
Ship Security Officer

11) ensuring effective communication and co-operation between the ship security officer and the
relevant port facility security officers;
12) ensuring consistency between security requirements and safety requirements;
13) ensuring that, if sister-ship or fleet security plans are used, the plan for each ship reflects the ship-
specific information accurately; and
14) ensuring that any alternative or equivalent arrangements approved for a particular ship or group of
ships are implemented and maintained.

DECLARATION OF SECURITY

A ship can request completion of a DoS when:


1. the ship is operating at a higher security level than the port facility or another ship with which it
interfaces;
2. there is an agreement on a DoS between Contracting Governments covering certain
international voyages or specific ships on those voyages
 Designated Authority means the organization(s) or the administration(s) identified, within the
Contracting Government, as responsible for ensuring the implementation of the provisions of
this chapter pertaining to port facility security and ship/port interface, from the point of view of
the port facility.

ADMINISTRATION

What does it mean?

Administration means the Government of the State whose


flag the ship is entitled to fly. In the Maritime Security
Measures and the Maritime Security Manual,
“Administration” is used to describe the organization within
Government responsible for ship security.

SEAFARERS WITH DESIGNATED SECURITY DUTIES

Who is he?
What are his responsibilities?
SEAFARERS WITH DESIGNATED SECURITY DUTIES
means every seafarer who is designated to perform
security duties, including anti-piracy and anti-armed-
robbery-related activities.
Ship Security Officer

Seafarers with designated security duties engaged or employed on a seagoing ship shall, before being
assigned such duties, receive security-related familiarization training in their assigned duties and
responsibilities, taking into account the guidance given in part B.

OTHER PERSONNEL

Who are they?


What are their responsibilities?

 Other personnel – refers to the personnel other than the officers and crew of the vessel who are
designated to assist in protecting the vessel and its personnel (ex. security escorts).

PIRACY AND ARMED ATTACKS

 Piracy and armed attacks


continue to occur on an increasingly
frequent basis. Armed robbery occurs
mostly in port areas, whereas piracy, by
definition, usually occurs on ships at
sea. In fact, the United Nations
Convention on the Law of the Sea,
Article 101, defines piracy as any of the
following acts: illegal acts of violence or
detention or any act of depredation committed for private ends by the crew or the passengers of a
private ship or private aircraft and directed on the high seas against another ship or aircraft or against
persons or property on board such ship or aircraft. It also includes such acts against a ship, aircraft,
person or property in a place outside of the jurisdiction of any State. The summarizing of statistics
concerning piracyand armed robbery may provide motivation to trainees to acquire knowledge and
skills that would enable them to counter these threats where possible.
 Terrorism usually involves violence, or the threat of violence, by extremist groups seeking to gain
political objectives by malicious means. A terrorist group may hope to make a statement by using
various types of bombs, making bomb threats or hijacking a ship. Increasingly, terrorists are acting in
connection with extremist religious sects that promote suicidal behaviour.

PORT FACILITY

PORT FACILITY SECURITY

A port facility is required to act upon the security levels set by the Contracting Government within whose
territory it is located. Security measures and procedures shall be applied at the port facility in such a
Ship Security Officer

manner as to cause a minimum of interference with, or delay to, passengers, ship, ship’s personnel and
visitors, goods and services.

At security level 1, the following activities shall be carried out through appropriate measures in all port
facilities, taking into account the guidance given in part B of this Code, in order to identify and take
preventive measures against security incidents:

.1 ensuring the performance of all port facility security duties;

.2 controlling access to the port facility;

.3 monitoring of the port facility, including anchoring and berthing area(s);

.4 monitoring restricted areas to ensure that only authorized persons have access;

.5 supervising the handling of cargo;

.6 supervising the handling of ship's stores; and

.7 ensuring that security communication is readily available.

At security level 2, the additional protective measures, specified in the port facility security plan, shall be
implemented for each activity detailed in section 14.2, taking into account the guidance given in part B of
this Code.

At security level 3, further specific protective measures, specified in the port facility security plan, shall be
implemented for each activity detailed in section 14.2, taking into account the guidance given in part B of
this Code.

In addition, at security level 3, port facilities are required to respond to and implement any security
instructions given by the Contracting Government within whose territory the port facility is located.

PORT FACILITY SECURITY OFFICER (PFSO)

Who is he?
What are his responsibilities?
When a port facility security officer is advised that a ship
encounters difficulties in complying with the requirements of
Ship Security Officer

chapter XI-2 or this part or in implementing the appropriate measures and procedures as detailed in the
ship security plan, and in the case of security level 3 following any security instructions given by the
Contracting Government within whose territory the port facility is located, the port facility security officer a
nd ship security officer shall liaise and co-ordinate appropriate actions.

When a port facility security officer is advised that a ship is at a security level, which is higher than that
of the port facility, the port facility security officer shall report the matter to the competent authority and
shall liaise with the ship security officer and co-ordinate appropriate actions, if necessary.

SHIP SECURITY OFFICER (SSO)

Who is he?
Who designated the SSO?
What are his responsibilities?

A ship security officer shall be designated on each ship.


In addition to those specified elsewhere in this Part of the Code, the duties and responsibilities of the
ship security officer shall include, but are not limited to:
1. undertaking regular security inspections of the ship to ensure that appropriate security measures
are maintained;
2. maintaining and supervising the implementation of the ship security plan, including any
amendments to the plan;
3. coordinating the security aspects of the handling of cargo and ship’s stores with other shipboard
personnel and with the relevant port facility security officers;
4. proposing modifications to the ship security plan;
5. reporting to the company security officer any deficiencies and non-conformities identified during
internal audits, periodic reviews, security inspections and verifications of compliance and
implementing any corrective actions;
6. enhancing security awareness and vigilance on board;
7. ensuring that adequate training has been provided to shipboard personnel, as appropriate;
8. reporting all security incidents;
9. coordinating implementation of the ship security plan with the company security officer and the
relevant port facility security officer; and
10. ensuring that security equipment is properly operated, tested, calibrated and maintained, if any.

CONTRACTING GOVERNMENT

What are their responsibilities?


Contracting Government generally means a Government that has
agreed to be bound by any IMO Convention, e.g. the SOLAS
Convention, or other binding instrument adopted by the IMO. In the
Maritime Security Manual the simpler term Government is generally
Ship Security Officer

used in place of Contracting Government unless there is a direct quotation from SOLAS Chapter XI-2 or
from the ISPS Code Part A or Part B. Depending on the context Government can also be used in the IMO
Maritime Security Measures with either the term Administration or Designated Authority, or with both, or in
place of either or both.

They are the ones declaring the level of security in port facilities under their authority.

Recognized Security Organization (RSO)

What are their responsibilities?

“Recognized Security Organization (RSO)” means an organization with


appropriate expertise in security matters and with appropriate knowledge of
ship and port operations authorized to carry out an assessment, or a
certification activity, required by this chapter or by part A of the ISPS
Code. And onboard the vessel the ones authorized by the Flag States
are the Classification Societies like but not limited to the following:
• DNV – Det Norske Veritas
• GL – Germanischer Lloyd
• RINA – Registro Italiano Navale
• ABS – American Bureau of Shipping
• BV – Bureau Veritas
• NK – Nippon Kaiji Kyokai
• RS – Russian Maritime Register of Shippingdnv
• LR - Lloyd’s Register
• HR – Hellenic Register of Shipping

CURRENT SECURITY THREATS &


PATTERNS

HIJACKING OF MV ACHILLE LAURO


1985
Ship Security Officer

Mention to the participants that in 1985 (month of August) an Italian Cruise Liner, MV Archille Lauro was
hijacked by Palestinian terrorists leaving with
one casualty, Mr. Leon Klinghoffer (a
wheelchaired pax). Then mention that as a
result of that attack, advice on anti-piracy and
hijack was issued by the IMO. The advice was
implemented by some parts of the Maritime
Industry (mainly on cruise ships) but was
largely ignored by the rest of the industry.

Identifies threats to the maritime transport industry, such as:


 Piracy and armed attacks
 Terrorism

 Piracy and armed attacks continue to occur on an


increasingly frequent basis. Armed robbery occurs
mostly in port areas, whereas piracy, by definition,
usually occurs on ships at sea. In fact, the United
Nations Convention on the Law of the Sea, Article 101,
defines piracy as any of the following acts: illegal acts of
violence or detention or any act of depredation
committed for private ends by the crew or the
passengers of a private ship or private aircraft and
directed on the high seas against another ship or aircraft
or against persons or property on board such ship or
aircraft. It also includes such acts against a ship, aircraft, person or property in a place outside of
the jurisdiction of any State. The summarizing of statistics concerning piracyand armed robbery
may provide motivation to trainees to acquire knowledge and skills that would enable them to
counter these threats where possible.
Ship Security Officer

 Terrorism usually involves violence, or the threat of violence, by extremist groups seeking to gain
political objectives by malicious means. A terrorist group may hope to make a statement by using
various types of bombs, making bomb threats or hijacking a ship. Increasingly, terrorists are acting
in connection with extremist religious sects that promote suicidal behaviour.

Stowaways & refugees Contraband smuggling

Contraband smuggling, a criminal activity, may result in large financial loss to the shipowner whose ship is
being used by the smugglers. Often, drugs are the commodity being smuggled and they may be brought on
board in a number of creative ways such as in luggage, stores, on or in a person's body, or in electronic
equipment. Weapons are also a frequent item associated with smuggling. Like drugs, weapons, too, find
their way on board in creative ways, suchas in cargo containers.

Cargo Theft Collateral Damage

Cargo theft, an age-old problem, continues to plague the maritime industry and causes financial losses in
staggering amounts. Prevention is normally the most effective method of dealing with this security threat.
Although there may not be violence or political issues involved in most cargo theft cases, this matter
remains high on the list of security threats and requires solutions discussed in this course. Instructors
Ship Security Officer

should convey that cargo theft is only one of the various threats to the security of cargo. Other such
security threats should be discussed during this section of the course.
Collateral damage occurs when a nearby fire, explosion, or attack results in damage to a ship or facility.
While the damage is sometimes unintended, the costs are
nevertheless real. There are measures that may minimize
the consequences of this type of damage.

Current threats to maritime security should be


summarized in order to:
 to provide a basis for understanding of the recent
conventions & legislation in this area and;
 to fully grasp the importance of the training
provided by this course.

SHIP SECURITY PLAN (SSP)

“A ship-specific plan that


will ensure the application of measures on board the ship to provide
protection from the risks of a security incident”.

“Ship Security Plan (SSP)” means a plan developed to ensure the


application of measures designed to protect the persons on board, cargo,
cargo transport units, ship’s stores or the ship from the risks of a security
incident.

International Maritime Security Policies and Responsibilities

CONTRACTING GOVERNMENT
COMPANY - Companies shall comply with the relevant
requirements of this chapter and of part A of the ISPS Code,taking
into account the guidance given in part B of the ISPS Code.
Specific responsibility of Companies
The Company shall ensure that the master has available on
board,at all times,information through which
officers duly authorized by a Contracting Government can
establish:
.1 who is responsible for appointing the members of the
crew or other persons currently employed or engaged on board the ship in any capacity on the
business of that ship;
.2 who is responsible for deciding the employment of the ship; and
.3 in cases where the ship is employed under the terms of charter party(ies),who are the parties to
such charter party(ies).
Ship Security Officer

DESIGNATED AUTHORITY
 Designated Authority means the organization(s) or the
administration(s) identified, within the Contracting Government,
as responsible for ensuring the implementation of the provisions
of this chapter pertaining to port facility security and ship/port
interface, from the point of view of the port facility.
 Contracting Governments may identify a Designated Authority
within Government to
 undertake their security duties relating to port facilities

SHIP SECURITY PLAN (SSP)


Who has access to view it?
 Only the SSO and the Master can access the
Ship Security Plan on board the vessel

PURPOSE OF SECURITY PLAN

 Vessel should develop & maintain an appropriate SSP


 Plan should be sufficiently flexible to take into account the level of security plan for each port at
which the vessel intends to call

CONTENTS OF THE SHIP SECURITY PLAN

 The contents of the Ship Security Plan are most clearly established in the ISPS Code Part A
section 9.4 with additional information provided in Section 9 of Part B of the Code. Trainees should
Ship Security Officer

be familiar with the contents of the plan in a generic fashion thus knowing what to expect as they
are assigned to various ships and experience various Ship Security Plans.
 They should understand the elements of the plan as it relates to specific threats such as explosive
devices, piracy, and armed robbery.
 Provide a completed sample plan. to give trainees a better opportunity to understand the document
to which they must be responsive aboard each ship to which they are assigned as Ship Security
Officer.

What are the 3 levels of maritime security as defined in the ISPS Code?

SECURITY LEVEL 1: NORMAL


SECURITY LEVEL 2: HEIGHTENED
SECURITY LEVEL 3: EXCEPTIONAL

Normal – the level at which ships and port facilities normally operate in accordance to the Ship or
Port facility Security Plan

AUDIT COMPARISON

INTERNATIONAL SHIP & PORT FACILITY SECURITY CODE

ISPS stands for International Ship and Port Facility Security Code.
Date of implementation is 1st July 2004
ISPS is composed of 2 sections which are the following:
Part A is mandatory
Part B is Guidance but may become mandatory, it may become
mandatory if the company would want to impose it in all its vessels.
Requirement to implement the ISPS Code is clearly stated in Chapter
XI-2 of the International Convention of the Safety of Life at Sea
(SOLAS)
Date of implementation: 1st July 2004
• This work has resulted in an amendment to SOLAS, Chapter
XI, called the International Ship and Port Facility Security Code (ISPS). Mention also that the code
has a mandatory section (Part A) and a section with guidelines (Part B). This requirements became
Ship Security Officer

mandatory on July 2004 for all ships of 500 gross


tonnage and upwards engaged on international
voyages, including high speed crafts and Mobile
Offshore Drilling Units. It requires the vessel to have
an approved Ship Security Plan and in the U.S.,
parallel legislation was enacted through the U.S.
Maritime Security Bill.

SHIP SECURITY ASSESSMENT

Participants must be encouraged to adopt systematic and consistent approaches to the evaluation of
security conditions and vulnerabilities. Seafarers with designated security duties may be called upon to
assist in these evaluations. The use of checklists to perform assessments of security in day-to-day
operations should therefore be discussed.

What is Security?

The conditions achieved when designated information, materials,


personnel, activities, and installation are protected against espionage,
sabotage, subversion, terrorism, as well as against loss and unauthorized
disclosures.

ISPS Code Part “A” requires mandatory SSA including on-site vessel visit and the following:
Identify existing security measures, procedures / operations.
Identify important shipboard operations requiring protection.
Identify possible threats, and prioritize security measures.
Identify weaknesses, related to “human factors”, infrastructure, security policies / procedures.

TECHNIQUES USED TO CIRCUMVENT SECURITY MEASURES

They should be appraised of the known techniques that can be employed to evade security systems &
controls, such as the disabling of alarm systems, picking of locks, jamming of radio signals
• No security equipment or measure is infallible. They should be apprised of the known techniques that
can be employed to evade security systems and controls, such as the disabling of alarm systems,
picking of locks, jamming of radio signals, etc.

SECURITY LEVEL 1: NORMAL


the level at which ships and port facilities normally operate in accordance to the Ship or Port facility
Security Plan
Ship Security Officer

SECURITY LEVEL 2: HEIGHTENED


the level applying for as long as there is a heightened risk of a security incident

SECURITY LEVEL 3: EXCEPTIONAL


the level applying for the period of time there is the probable or imminent risk of a security incident
Ship Security Officer

DAY
2
Ship Security Officer

INTENDED LEARNING OUTCOME

Explain the requirements and procedures for reporting non-conformities and deficiencies identified
during internal audits, on scene inspections, periodic review, and security inspections
Explain actions to be taken in case of breach of security based on the security-related contingency
plan
Respond to security threats or breaches of security
Explain the basic principles and procedures of risk assessment
Explain the information required in conducting risk assessment as contained in the checklist
Conduct risk assessment using checklist
Explain the proper form and practice for recording day-to-day security assessment results
Explain the purpose and content of Declaration of Security
Explain the process in completing the information contained in the Declaration of security
Explain techniques used by pirates and armed robbers to circumvent security measures
Explain the methods used by pirates and armed robbers to undertake attacks against ships
Explain the general characteristics and behavioral patterns who are likely to threaten security on a
non-discriminatory basis
Explain the importance of planning for implementing and coordinating searches
Explain the procedures to be followed for an efficient search
Explain the methods and devices used in conducting physical searches and non-intrusive
inspections
Conduct physical searches and non-intrusive inspections

DEFICIENCY
Deficiency means a failure to comply with the requirements of the Maritime Security
Measures.

12.2 In addition to those specified elsewhere in this part of the Code, the duties and responsibilities
of the ship security officer shall include, but are not limited to:
.5 reporting to the Company Security Officer any deficiencies and non-conformities identified during internal
audits, periodic reviews, security inspections and verifications of compliance and implementing any
corrective actions;
.8 reporting all security incidents;

16.3 Such a plan shall be developed taking into account the guidance given in Part B of this Code
and shall be in the working language of the port facility. The plan shall address, at least, the
following:
.9 procedures for reporting security incidents;

What actions must be taken in response to a security incident?


 The security incident response process is centered on the preparation, detection and analysis,
containment, investigation, eradication, recovery, and post incident activity surrounding
such an incident.
Ship Security Officer

What are the six steps of an incident response plan?


Usually, an incident response plan comprises six main steps: Preparation, Identification, Containment,
Eradication, Recovery, and Lessons Learned.

Planning for the Unexpected


There is no substitute for security breach response planning and other more overarching contingency
planning!

What are the five steps to risk assessment?


• Step 1: Identify hazards, i.e. anything that may cause harm. ...
• Step 2: Decide who may be harmed, and how. ...
• Step 3: Assess the risks and take action. ...
• Step 4: Make a record of the findings. ...
• Step 5: Review the risk assessment.
Ship Security Officer

SHIP SECURITY ASSESSMENT


 What is Security?
The conditions achieved when designated information, materials, personnel, activities, and
installation are protected against espionage, sabotage, subversion, terrorism, as well as against
loss and unauthorized disclosures.

ISPS Code Part “A” requires mandatory SSA including on-site vessel visit and the following:
Identify existing security measures, procedures / operations.
Identify important shipboard operations requiring protection.
Identify possible threats, and prioritize security measures.
Identify weaknesses, related to “human factors”, infrastructure, security policies / procedures.

DoS

The Declaration of Security is a document that may be required for a port visit when specific security
requirements exist. The Declaration address the security requirements that could be shared between
a port facility and a ship, or between ships, and states the responsibility for each

What is the purpose of the Declaration of security?


 According to the SOLAS, the Declaration of Security (DoS) is an agreement reached between a
ship and either a port facility or another ship with which it interfaces, specifying the security
measures each will implement.

What determines if a declaration of security is required?


 A DoS is required when the PFSO deems it necessary in accordance with the security level
set by OTS or when a ship deems it necessary. However, the port facility can refuse such ship
requirements for Dos.
Ship Security Officer

TECHNIQUES USED TO CIRCUMVENT SECURITY MEASURES


They should be appraised of the known techniques that can be employed to evade security
systems & controls, such as the disabling of alarm systems, picking of locks, jamming of radio
signals
No security equipment or measure is infallible. They should be apprised of the known techniques
that can be employed to evade security systems and controls, such as the disabling of alarm
systems, picking of locks, jamming of radio signals, etc.

TECHNIQUES USED BY PIRATES AND ARMED ROBBERS TO CIRCUMVENT SECURITY MEASURES


The pirates are throwing blankets and ladders over the razor wire to circumvent this security
measure. Simultaneously, pirates in skiffs shoot at the vessel to facilitate the boarding attempt.

What methods do pirates use?


Pirates try to slow the ship by firing with rocket propelled grenades (RPG). With ropes and
flexible ladders, they attempt to board the ship armed with knives, machine guns and RPG to
apprehend the crew, force the ship to a halt, and allow more pirates to climb on board to control the
ship.

RECOGNITION, ON A NON-DISCRIMINATORY BASIS, OF PERSONS POSING POTENTIAL SECURITY


RISKS

Example of suspicious behaviors are:


Unknown persons photographing vessels or facilities
Unknown persons attempting to gain access to vessels or facilities
Suspicious individuals establishing businesses or roadside food stands either adjacent or in
proximity to facilities
Unknown persons loitering in the vicinity of ships or port facilities
Unknown persons telephoning facilities to ascertain security, personnel, or standard operating
procedures
Vehicles with personnel in them loitering & perhaps taking photographs or creating diagrams of
vessels or facilities
Suspicious general aviation aircraft operating in proximity to vessels or facilities
Small boats with personnel on board loitering or perhaps taking photographs or creating diagrams
or facilities
Suspicious persons who may be carrying bombs or participating in suicide squad activities
Unknown persons attempting to gain information about vessels or facilities by walking up to
personnel or their families & engaging them in conversation
Suspicious vendors attempting to sell merchandise
Unknown or suspicious workmen trying to gain access to facilities to repair, replace, service, or
install equipment
Suspicious emails on Internet, public affairs attempting to obtain information regarding the facility,
personnel, or standard operating procedures
Suspicious package drop-offs/attempted drop-offs
Anti-national bents being expressed by employees or vendors
Anti-national pamphlets or flyers distributed to employees or placed on windshields in parking lots
Repeated or suspicious out-of-ordinary phone calls
Ship Security Officer

Recreational boaters posing as mariners in distress to attract assistance from other vessels
Inappropriate clothing for weather
Conscious & unconscious “re-adjusting” of clothing
Unconscious “checking” for weapon
Suspicious “bulges” in clothing
Any “out of the normal” activity
Selling souvenirs, usual motive for boarding

PURPOSE
Vessel should develop & maintain an appropriate SSP
Plan should be sufficiently flexible to take into account the level of security plan for each port at
which the vessel intends to call

THREAT IDENTIFICATION, RECOGNITION, & RESPONSE

PROFILING A PERSON

Which one is the suicide bomber?

Sri Lankan suicide bomber “Dhanu,” moments before killing former Indian PM Rajiv Gandhi, herself, and 17
others
Ship Security Officer

AFTER THE INCIDENT

ASSESSING SUSPICIOUS PERSON


Ship Security Officer

BODY LANGUAGE
A complex science but common sense will lead you to understand a few pointers:

Non-Verbal
Vocal – manner and Communication (NVC) -
Verbal – words are 7% of the body language is 55%
expression is 38% of
communication of communication
communication

Sign of Nervousness
Sweating
Jerky nervous movements
Restlessness
Stuttered speech
Loud rapid speech
Nail biting
Adjustment of clothing
Physical appearance
Eye Contact

Seeking information
Invite or control interaction
Show interest or attention
Wish to dominate, threaten or influence
Wish to reveal or check attitudes

Eye contact will normally be avoided by someone lying or


with something to hide

THEIR LEFT IS RIGHT…


THEIR RIGHT IS WRONG
Ship Security Officer

IMPLEMENTING & COORDINATING SEARCHES

Examples of equipment that may be employed in conducting searches:


 Flashlight & batteries; Mirrors & probes
 Screwdrivers, wrenches & crowbars;
 Gloves, hard hats, overalls & non-slip footwear
 Plastic bags & envelopes for collection of evidence
 Forms on which to record activities and discoveries

Procedures to be followed so as to ensure effective and efficient searches. Examples are the
following:
 Crew members and facility personnel should not be allowed to search their own areas in
recognition of the

IMPLEMENTING & COORDINATING SEARCHES


possibility that they may have concealed packages or devices in their own work or personal areas
Search should be conducted according to a specific plan or schedule & must be carefully controlled
Special consideration should be given to search parties working in pairs with one searching “high”
& one searching “low”
Searchers should be able to recognize suspicious items
There should be a system for marking or recording “clean” areas
Searchers should maintain contact with the search controllers, perhaps by UHF/VHF radio
Searchers should have clear guidance on what to do if a suspected package, device or situation is
found
Searchers should bear in mind that weapons & other dangerous devices may be intentionally
placed to match its content as a means of disguise, such as a toolbox in an engine room

CABINS

Beneath bunks, e.g. taped to bunk frame under mattress


Under wash basin
Behind removable medicine chest
Inside radios, recorders, etc.
Inside wooden clothes hangers
Inside rolled socks, spare socks
Hollowed-out molding
Ship Security Officer

Ventilator ducts
Inside heater units
Above or behind light fixtures
Above ceiling and wall panels
Cutouts behind bulkheads, pictures, etc.
False bottom clothes closets-hanging clothes

COMPANION WAYS
Ducts
Wire harnesses
Railings
Fire extinguishers
Fire hoses and compartments
Access panels in floors, walls, ceilings
Behind or inside water coolers, igloos

TOILET AND SHOWERS

Behind and under washbasins


Behind toilets
In ventilation ducts & heaters
Toilet tissue rollers, towel dispensers, supply lockers
Taped to shower curtains, exposed piping, & light fixtures
Access panels in floors, walls, ceiling

DECK

Ledges on deck housing, electrical switch rooms, winch


control panels
Lifeboat storage compartments, under coiled rope, in deck
storage rooms
Paint cans, cargo holds, battery rooms, chain lockers

ENGINE ROOM
Under deck plates
Cofferdams, machinery pedestals, bilges
Journal-bearing shrouds and sumps on propeller shaft
Under catwalk, in bilges, in shaft alley
Escape ladders and ascending area
Ship Security Officer

Ventilation ducts, attached to piping or in tanks with false gauges


Equipment boxes, emergency steering rooms, storage spaces.

METHODS OF PHYSICAL SEARCHES & NON-INTRUSIVE INSPECTIONS

SCREENING PROCESS
Visitor’s/ Passengers Rights:
They may refuse a certain type of screening
Be sensitive to screening requests
Visitors & passengers who refuse all screening must be denied access to the ship and should be
detailed for the SSO and local law enforcement authorities

CONDUCTING A BODY SEARCH

4 points to remember (CCTV)


C - ourtesy
C - aution
T - act
V - igilance

PHYSICAL BODY SEARCH

2 TYPES OF SEARCH
1. Limited Physical Search
2. Whole Body Physical Search

PRE-SEARCH REQUIREMENTS
Long stick
Table
Transceiver Radio
Logbook
Gate pass
Gloves
Flashlight
Stepboard
Hand Metal detector
Ship Security Officer

REMINDER
Very important the body search is done with care and must not be by any means of obstructive to the
person being search
If when personal belongings has to be searched, i.e., wallets, bags, coats/jackets/ sweater, etc. these
items should not be touched and be opened only by the person searched.

The Authority Principle Of Body Search

SECURITY POLICY NOTICE


(Legally authorized ship staff to conduct body
search)

SECURITY POLICY NOTICE


All persons boarding are required to show a Boarding Pass

All persons and baggage are liable to be searched

No drugs are allowed on board

No weapons are allowed on board

Only Authorized Visitors are allowed

ELEMENTS OF A BODY SEARCH


a. Courtesy (Greetings)
Sir/Ma’am; thank you sir/ma’am; please
b. Verification (Purpose of visit)
c. Identification (Ask for ID or Passport)
d. Permission (Show Security Policy Notice, and ask permission to the visitor for conducting body
search.
e. Demonstration of body search position (Show the proper position to the visitor)
Ship Security Officer

SEQUENCE OF A BODY SEARCH

Permission to
Hair Arms search the
lower parts

Crutch, socks,
Collar Belt
shoes
If you have any doubts
at any stage call your
Front sides
Wallet, cell
supervisor or SSO.
Back center (back of the
phone (on/off)
palm)

Front center
Back sides (back of the Mouth Final courtesy
palm)

BODY SEARCH

Ask the visitor to face forward and ask


him/her to adopt the position with arms
outstretched – or demonstrate

When conducting a physical search,


particular attention should be paid to:
The armpits
The curve of the spine near the
waist
The foot and ankle areas
Between the legs
Ship Security Officer

POSTURE SHOES & SOCKS


ELEMENTS OF A BODY SEARCH
a. Courtesy (Greetings)
(Sir/Ma’am; thank you sir/ma’am; please)
b. Verification (Purpose of visit)
c. Identification (Ask for ID or Passport)
d. Permission (Show Security Policy Notice, and ask permission to the visitor for conducting body
search.
e. Demonstration of body search position (Show the proper position to the visitor)

Methods
1. Archway metal detector
2. Handheld metal detector
Both types of electronic search requires: Good guest relation and caution

ELECTRONIC BODY SEARCH


Systematic approach
Clockwise scan of body outline followed by front and back.
Wand alarm is followed by limited physical search of alarm area.
All alarms must be resolved before the guest is allowed to process on board the ship.

USING HAND-HELD METAL DETECTOR

SCREENING
Screening is designed to safeguard the lives of people travelling by sea
Carry out your task with
 Courtesy
 Caution
 Tact
 Vigilance

VISITORS SHALL ALWAYS:
wear a ship-issued ID
Ship Security Officer

be escorted
METHODS OF PHYSICAL SEARCHES & NON-INTRUSIVE INSPECTIONS
members of the ship’s crew should not be required to search their colleagues or their personal
effects.
human rights of the individual
preservation his or her basic human dignity.

TYPES OF SEARCHES
REACTIVE (carried out in reaction to a specific threat)
 Searchers should be familiar with the area to be searched
 Search conducted according to a specific plan
 Searchers must be able to recognize items being searched
 Establish central reporting point for searchers

REACTIVE
 Searchers should be able to communicate with the command post
 Searchers must know exactly what to do if item/person is found (Master’s discretion)

PREVENTIVE (aim is to deter unlawful acts – terrorists, smugglers, etc.)


 Establish location for search before people, baggage & cargo enter restricted or “sterile”
zone
 Reconcile people with vehicles, baggage, etc.
 Frequently search sterile zones and access points

WHEN TO SEARCH:
Decision by Master, based on: Security Plan
Situation (current information, observations, etc.)
Intelligence information

Searching Individuals (effectiveness of search based on the skill of the


searchers)
• Physical searches
• Metal detectors
• X-ray devices
• Vapor detection for explosives

BAGGAGE SEARCHES:
Check for false compartments (often used for smuggling drugs,
explosives or weapons)
Heavy baggage (X-ray supported by physical searches, sniffing dogs
may be used to screen baggage)
Ship Security Officer

DAY
3
Ship Security Officer

INTENDED LEARNING OUTCOME

Explain the methods of recognizing presence of weapons, dangerous substances and devices
Explain the hazards of the presence of weapons, dangerous substances and devices
Explain the common reactions of crowd in a crisis situation
Explain the importance of clear communication with crew and passengers during emergency
Explain different crowd management control techniques
Identify security-related sensitive information and security-related communications on board
Explain the manner of handling such information and the importance of maintaining its
confidentiality
Identify the commonly designated restricted areas on board ships
Explain the requirements in designating restricted areas
Identify the commonly designated restricted areas on board ships
Explain the requirements in designating restricted areas
Explain the methods and identification system to control access to the ship and its restricted areas
Explain the methods for effective monitoring of deck areas and areas surrounding the ship
Carry out monitoring of deck areas and areas surrounding the ship
Explain the security aspects of handling cargoes and ship’s stores with other personnel and
relevant port facility security officers
Explain the methods in inspecting cargo and ship’s stores
Explain the methods of controlling the embarkation, disembarkation and access of persons and
their effects while on board
Carry out inspection of person’s embarkation and disembarkation including their personal effects
Identify the various types of security equipment and systems used on board
Explain the limitation of security equipment and systems
Explain the operation and function of ship security alert system
Explain the procedures, instructions and guidance on the use of ship security alert systems
Explain the procedure in testing, calibrating and maintaining security systems and equipment
based on instruction manual
Explain the importance of training, drills and exercises
Explain the requirements in conducting drills and exercises under relevant conventions, codes and
IMO circulars, including those relating to prevention and suppression of piracy and armed robbery
against ships
Explain the responsibility of the SSO during drills and exercises
Explain the methods on enhancing security awareness and vigilance on board based on IMO
circulars, industry guidelines and company policy
Explain the importance of assessing the effectiveness of drills and exercises
Explain the methods in assessing the effectiveness of drills and exercises
Ship Security Officer

RECOGNITION & DETECTION OF WEAPONS, DANGEROUS SUBSTANCES & DEVICES

PROHIBITED WEAPONS

IMPROVISED EXPLOSIVE DEVICES (IED)

BOMB
Power Supply
Switches
Initiators
Main Charger
Container
Ship Security Officer

BOMB SWITCHES

Mechanical
Electronic
Chemical

TIMER
Mechanical
Electronic

INITIATORS / BLASTING CAPS

IGNITERS
Ship Security Officer

MAIN CHARGER

INCENDIARY

DYNAMITES

GRENADES
Ship Security Officer

ROCKET-PROPELLED GRENADE

BANNED SUBSTANCES

CONCEALER
Ship Security Officer

UNUSUAL PACKAGE

CROWD MANAGEMENT & CONTROL TECHNIQUES

CROWD MANAGEMENT FRAMEWORK


Variable affecting outcome (leadership style, type of emergency, crew behavior, passenger behavior)

EMERGENCY PLANS:
General framework of assigned duties & tasks
Disseminated, practical & critiqued
Incorporate ship’s general layout
Incorporate safety regulations

UNDERSTANDING CRISIS:
Response to crisis & normal versus abnormal behavior
Behavioral response to crisis (denial, panic)
Communication (sender, receiver, message, feedback, interference)

RESPONSE TO WARNING
Acceptance (acceptance of inherent risks)
Denial (delays total reaction time)
Slow response (10% immediately accept danger & prepare to take action, 30% doubtful or curious
& will investigate further, 60% ignore or neglect even most obvious warning signs)
Ship Security Officer

FACTORS INFLUENCING INFORMATION RECEPTION:


Sender credibility
Conveyance & content of the message
Age difference of the receiver
Immediate social situation
Observations
Location
Point of time of warning
Prior experience

AIDS TO DECISION-MAKING
How others behave
What others say
Presence of specialized staff
Changes in environment
Instructions by staff
Rumors

MAXIMIZING EFFECTIVENESS OF WARNING:


Never assume that everyone heard the warning the first time
Instructions should:
 Be given by appropriate people
 Clearly define expectations
 Be in a language understandable to the recipients
 Never refer to catastrophes of the same type

AIDS TO DECISION-MAKING
How others behave
What others say
Presence of specialized staff
Changes in environment
Instructions by staff
Rumors

BEHAVIORS AFFECTING EVACUATION: (ASSUMPTIONS)


Individuals start to move as soon as they hear an alarm
The motivation to escape underpins any movements people make
Time taken to evacuate is dependent only on the time it takes to physically move towards an exit to
which they are nearest
People move as individuals, without consideration of others
Fire exit signs help ensure that people find a route of safety
People are unlikely to use a smoke filled escape route
All people are equally capable of physically moving to an exit
People’s safety cannot be guaranteed since they are likely to panic
Ship Security Officer

NEED TO PREVENT PANIC


A – Acknowledge & Accept
W – Wait
A – Actions
R – Repeat
E – End

Acknowledge
Here I acknowledge the present reality, that I'm afraid and starting to panic. I won't try to ignore it, or
pretend it's not there. I won't struggle to distract myself, tell myself to "stop thinking about it!", or snap any
rubber bands on my wrist. I'm acknowledging simply that I am afraid, not that I am in danger. The thought
that I am in danger is just another symptom of panic, not an important or useful thought.
Accept
Here I accept the fact that I'm afraid at this moment. I don't fight the feeling; ask God to take it away; blame
myself, or anybody else. I accept, as best I can, that I'm afraid in the same way I would accept a headache.
I don't like headaches, but I don't bang my head against the wall in an effort to get rid of them, because that
makes them worse. Overcoming panic attacks begins with working with, not against, my panic and anxiety
symptoms.
Wait
What "Wait“ means is this: don't just do something, stand there. It's similar to the suggestion "count to ten
before you get mad".
One of the hallmarks of a panic attack is that it temporarily robs you of your ability to think, remember, and
concentrate. This step will buy you a little time to regain those abilities before you take any action.
Actions (to make myself more comfortable)
At this point, you've already gone through the two most important steps to overcoming panic attacks.
Repeat
This step is here because you might start feeling better, then feel another wave of panic. Your first reaction
might then be to think "Oh No, it didn't work!". The Repeat step is here to remind you that it's OK if that
happens. Just take it from the top again. It's not unusual or dangerous. You may go through several
cycles, and you just need to repeat the AWARE steps again, as often as you need.
End
This is here to remind you that your panic attack will end; that all panic attacks end; that they end
regardless of how you respond; that it's not your job to make the attack end; and that your only job is to
make yourself as comfortable as possible
Ship Security Officer

CONFIDENTIALITY ISSUES

Ship Security Plan:


 confidential document
 be protected from unauthorized access.

Essentially the Ship Security Plan is to be considered a


confidential document and must be protected from
unauthorized access or disclosure. Instructors should
place notable emphasis on this and clearly delineate
those few circumstances when and what sections of the
Ship Security Plan may be inspected by Port State
Control Officers.

In addition, the SSP should establish the following, which relate to all Security Levels (Part B 9.7
ISPS Code);

4. Procedures and practices to protect security sensitive information held in paper or electronic format;
6. In addition, the SSP should establish the following, which relate to all Security Levels (Part B 9.7 ISPS
Code);
1. Duties and responsibilities of all shipboard personnel with a security role; 15
2. Procedures of safeguards necessary to allow continuous communications to be maintained at all times;
3. Procedures needed to assess the continuing effectiveness of security procedures and any security and
surveillance equipment and systems, including procedures for identifying and responding to equipment
systems failure or malfunction;
4. Procedures and practices to protect security sensitive information held in paper or electronic format;
5. The type and maintenance requirements of security and surveillance equipment and systems, if any;
6. Procedures to ensure the timely submission, and assessment, 0of reports relating to possible breaches
of security or security concerns;
7. Procedures to establish, maintain and update an inventory of any dangerous goods or hazardous
substances carried on board, including their location.

Cyber Security

Some aspects of cyber risk management may include commercially sensitive or confidential information.
Companies should, therefore, consider protecting this information appropriately, and as far as possible, not
include sensitive information in their Safety Management System (SMS).
Ship Security Officer

CYBER RISK MANAGEMENT APPROACH


Identify threats - Understand the external cyber security threats to the ship. Understand the internal cyber
security threat posed by inappropriate use and lack of awareness.
Identify vulnerabilities - Develop inventories of onboard systems with direct and indirect communications
links. Understand the consequences of a cyber security threat on these systems. Understand the
capabilities and limitations of existing protection measures.
Assess risk exposure - Determine the likelihood of vulnerabilities being exploited by external threats.
Determine the likelihood of vulnerabilities being exposed by inappropriate use. Determine the security and
safety impact of any individual or combination of vulnerabilities being exploited.
Develop protection and detection measures - Reduce the likelihood of vulnerabilities being exploited
through protection measures. Reduce the potential impact of a vulnerability being exploited.
Establish contingency plans - Develop a prioritised contingency plan to mitigate any potential identified
cyber risk.
Respond to and recover from cyber security incidents - Respond to and recover from cyber security
incidents using the contingency plan. Assess the impact of the effectiveness of the response plan and re-
assess threats and vulnerabilities.
Ship Security Officer

Phishing
Sending emails to a large number of potential targets asking for particular pieces of sensitive or
confidential information. Such an email may also request that a person visits a fake website using a
hyperlink included in the email.

Email and web browser protection


Email communication between ship and shore is a vital part of a ship’s operation. Appropriate
email and web browser protection serves to: „
protect shoreside and onboard personnel from potential social engineering
„ prevent email being used as a method of obtaining sensitive information
„ ensure that the exchange of sensitive information via email or by voice is appropriately protected
to ensure confidentiality and integrity of data, eg encryption protection „
prevent web browsers and email clients from executing malicious scripts.
Some best practices for safe email transfer are: email as zip or encrypted file when necessary,
disable hyperlinks on email system, avoid using generic email addresses and ensure the system
has configured user accounts.

Equipment disposal, including data destruction


Obsolete equipment can contain data which is commercially sensitive or confidential. Prior to
disposal of the equipment, the company should have a procedure in place to ensure that the data
held in obsolete equipment is properly destroyed and cannot be retrieved.

COMMONLY DESIGNATED RESTRICTED AREAS ON BOARD SHIPS

What are the restricted areas onboard ship?

The restricted areas may include the navigation bridge, machinery spaces, spaces with security-
related equipment, ventilation spaces, spaces containing IMDG cargo, accommodation, any other
areas specified as per the SSP

ISPS CODE
The ISPS Code makes it mandatory for a vessel to have such a plan in place. The SSP must lay out the
protective measures for each security level vis a vis ship related activities, access control onboard,
monitoring of the restricted areas, cargo handling, receiving of stores/baggage etc.

CONTROLLING ACCESS TO THE SHIP AND TO RESTRICTED AREAS ON BOARD SHIP

It is very important to control access routes to deter any unknown individual from accessing the vessel
illegally
All doors and hatches providing access to the bridge, accommodation and machinery spaces
should be properly secured to prevent them being opened by unauthorized personnel
Consideration should be given to the means of securing doors & hatches in order to afford the ship
the maximum protection possible
Ship Security Officer

Door or hatch that is located on an escape route from a manned compartment, it is essential that it
can be opened by a seafarer trying to exit by that route.
It is recommended that once doors & hatches are secured, a designated & limited number are
used for routine access when required, their use being strictly controlled by the OOW
The Single point of access to be maintained & guarded at all times
It is recommended that once doors & hatches are secured, a designated & limited number are
used for routine access when required, their use being strictly controlled by the OOW
The Single point of access to be maintained & guarded at all times
Escort policy to be implemented on ships visitors once on board

METHODS FOR EFFECTIVE MONITORING OF DECK AREAS AND AREAS SURROUNDING THE SHIP
Establishing Security Rounds As Per SSP Requirement
Using CCTV As An Additional Monitoring Tool
Using Lock & Tag System as Per SSP
Deck Illumination Security & Deck Lights

SECURITY ASPECTS RELATING TO THE HANDLING OF CARGO AND SHIP’S STORES WITH
OTHER SHIPBOARD PERSONNEL AND RELEVANT PORT FACILITY SECURITY OFFICERS
EACH year, $12.5 trillion of merchandise is traded worldwide, using more than 200 million
intermodal containers. Ninety percent of these shipments are between seaports
Due to ships intermodal nature & fast pace movements from 1 port to another security of the ship
& its cargo became a concern

Methods Used to Maintain Security of Cargo


Container Sealing
Using Security Tags
Inspection Of Cargo By Port Prior To Loading
Inspection of Ships Crew Upon Loading Cargo
Using X-ray/ Scanners
Using K9 units
Cargo Segregation

Cargo Should Not Be Allowed to be Loaded When:


There is evidence of tampering or pilferage
Not in the cargo list to be loaded
No seals or security tag in place
When not inspected by security personnel
Suspected to contain illegal articles

METHODS FOR CONTROLLING THE EMBARKATION, DISEMBARKATION & ACCESS WHILE ON


BOARD OF PERSONS & THEIR EFFECTS
No ID No Entry policy to be in place at all times
Ship’s crew to be provided with the list of expected victors prior to arrival port
Security Watches to be maintained at all times
Employ protective measures to prevent access of unidentified individuals.
Ship Security Officer

SECURITY EQUIPMENT

SECURITY EQUIPMENT & SYSTEMS

PROCEDURES, INSTRUCTION AND GUIDANCE ON THE USE OF SHIP SECURITY ALERT SYSTEMS

SHIP SECURITY ALERT SYSTEM

The SOLAS Resolution XI-2/6 requires vessels of +500


GT (Gross Tonnes) constructed before 01 July 2004 to
install a Ship Security Alert System (SSAS) and no
later than the first radio survey after 01 July 2004.
Other Cargo ships of +500 GT and mobile
offshore drilling units constructed before 01 July 2004
must be fitted no later than the first radio survey after
01 July 2006.
As piracy and terrorist attacks have increased over the
years IMO has defined a set of mandatory
requirements in the SOLAS Resolution XI-2/6 to
improve security for ships. The new SOLAS resolution 6 states that the Ship Security Alert System shall
provide ships with two alarm buttons, which can be activated in case of a piracy or terrorist attack. The
Ship Security Officer

alarm is a covert signal, which will have no sound and no flashing lights so that it is in
no way obvious to any intruders on board the ship.

PERFORMANCE STANDARDS FOR A SHIP SECURITY ALERT SYSTEM


The ship security alert system is provided to a ship for the purpose of transmitting a security alert to
the shore to indicate to a competent authority that the security of the ship is under threat or has
been compromised.
It comprises a minimum of two activation points, one of which is on the navigation bridge & one in
undisclosed area where the master & SSO knows.
The procedures for the use of the ship security alert system & the location of the activation points
are given in the ship security plan agreed by the Administration
The SSAS should have an additional appropriate power source (DC) where the main power is
supplied by the ships (AC)
Activation points should be capable of being used on the navigation bridge and in other locations.
They should be protected against inadvertent operation
Activation points should be capable of being used on the navigation bridge and in other locations.
They should be protected against inadvertent operation
The operation of the SSAS should not impair the functionality of the GMDSS installation.
In all cases, transmission initiated by SSAS activation points should include a unique
code/identifier indicating that the alert has not been generated in accordance with GMDSS distress
procedures.
The ship security alert system should be capable of being tested
Testing intervals of SSAS shall not exceed a period of 12 Months

TESTING, CALIBRATION & MAINTENANCE OF SECURITY EQUIPMENT & SYSTEMS

33 CFR 104.260 - Security systems and equipment maintenance.

(a) Security systems and equipment must be in good working order and inspected, tested,
calibrated and maintained according to the manufacturer's recommendation.
(b) The results of testing completed under paragraph (a) of this section must be recorded in
accordance with § 104.235. Any deficiencies must be promptly corrected.
(c) The Vessel Security Plan (VSP) must include procedures for identifying and responding
to security system and equipment failures or malfunctions.
[USCG-2003-14749, 68 FR 39302, July 1, 2003, as amended by USCG-2007-28915, 81 FR
57710, Aug. 23, 2016]

TRAINING, DRILL AND EXERCISE REQUIREMENTS UNDER RELEVANT IMO CIRCULARS


Drills & exercises must test the proficiency of ships personnel in assigned security duties at all
Maritime Security Levels and the effective implementation of the SSP. They must enable
the SSO to identify any related security deficiencies that need to be addressed.

At least one security drill is conducted at least every 3 months


Or within 1 week from whenever the % of v/l personnel with no prior participation in
a ship security drill on that vessel exceeds 25 %
Ship Security Officer

METHODS FOR ENHANCING SECURITY AWARENESS AND VIGILANCE ON BOARD

A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Be Vigilant – Always
Guard the entrance
1) Be Vigilant – Always: All the crew members (either on or off duty) must always be vigilant at all
times. An alert crew can eradicate a problem way before any emergency situation can take place.
2) Guard the entrance: It you are duty officer while the ship is at port, make sure that the gangway is
properly guarded and no one enters the ship without an ID check or authorization of ship’s captain.
Also keep a close watch on the records of entry and exit of visitors.

A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Ask and interrogate
Know Your Duties Well
3) Ask and interrogate: If you see a visitor without an ID card or find an unfamiliar person, do
not hesitate to ask and interrogate him for his identity. Ensuring that all the entries in the ship are
authorised is the first step towards enhancing ship’s security.
4) Know Your Duties Well: Each crew member onboard ships have been assigned with a
particular duty for every security level. He/She must know the duties listed on his/her part and
should perform them efficiently

A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Continuous Monitoring
Supervising Cargo Operations
5) Continuous Monitoring: Monitor the restricted areas of the ship at regular intervals of time to
ensure no person has entered without permission. Also make sure that only one entry point is
available to ship’s accommodation area and the same is manned all the time
6) Supervising Cargo Operations: It is very important for ship officers to know which cargo is
being loaded along with its whereabouts. Several cases of stowaway have been registered in the
past during cargo operation on ships. Keep a proper check on stevedores and the cargo which is
being loaded on the ships.
A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Equipment Availability
Update Your Knowledge
7) Equipment Availability: Ensure that security and communication equipment tools are readily
available and are in proper working condition
8) Update Your Knowledge: Knowledge of current issues such as various reasons of security
threats, detection of dangerous substances, unauthorized devices and their effect is an important
aspect of ship’s security system. This can be achieved by providing regular training and updates to
the ship’s crew regarding new reports or any news regarding Security of the vessel
Ship Security Officer

A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Identify the Weaknesses
Regular drills

9) Identify the Weaknesses: Every system has its weakness and if not identified in early stages, can
lead to dangerous situations. Survey your security plan, crew performance, security equipment, duties of
ship security officer etc. and phase out every loop hole out of them.
10) Regular drills: Last but not the least; seafarers should know how to tackle an emergency condition.
To ensure all the above points are followed religiously, regular security drills and safety meetings should be
organized by crew members.

METHODS FOR ASSESSING THE EFFECTIVENESS OF DRILLS AND EXERCISES


Drill is commonly used to:
Provide training on security equipment's
Develop or test the established procedures
Practice and maintain current skills
It is narrow in scope & typically focus on at least one part
Exercises are more far-reaching than drills and it usually focus on more than one security procedure.

Exercises rehearse and test:


Communication and coordination
Resource availability and response
Participant reactions
The most important purpose of any exercise is to keep skills up-to-date and to improve them
Conducting drills and exercises is not only a way to test preparedness; it is also required for compliance
with the ISPS Code.
Record the drill/ exercise
Carry out debriefing right after the drill/exercise
Carry out self assessment
Check & compare the results of previous drills & exercise
Set appropriate performance indicators

-END-
Ship Security Officer

You might also like