Professional Documents
Culture Documents
7 Ship Security Assessment
7 Ship Security Assessment
Security
Assessment
Aim
• Assessment Methodology.
• Assessment Tools.
• An On Scene Survey.
• Assessment Documentation
Ship Security Assessment
Part A Para 8
• Physical security.
• Structural integrity.
• Personnel protection systems.
• Procedural policies.
• Radio and telecommunication systems
including computers.
• Other areas that pose a risk.
Those involved in SSA
Part B Para 8.4
• People.
• Safe navigation and emergency
• Response.
• Cargo.
• Stores.
• Security communications.
• Security surveillance
• Equipment.
Threats
Part B Para 8.9
• Damage or Destruction.
• Hijacking or seizure.
• Tampering.
• Unauthorized access.
• Smuggling weapons or equipment.
• Use of the ship to carry.
• Use of the ship as a weapon.
• Attacks at berth.
• Attacks at sea.
Vulnerabilities
Part B Para 8.10
Conflicts between:
Report showing:
• How the assessment was conducted.
• Description of each vulnerability.
• Description of counter measures.
• Protected from unauthorised access or
disclosure.
• Reviewed and accepted by the CSO.
On-scene Security Survey
Part B Para 8.14
LEAVE PORT
The SSA Process
(Based on the NSO Guide)
• Identify Motives.
• Identify critical operations, people.
• Identify existing security measures.
• Identify scenarios.
• Assess likelihood and consequences.
• Develop a survey checklist.
• Carry out survey.
• Identify needs.
• Write Ship Security Plan.
Step One
Potential Threats
External factors:
• Political.
• Economic.
• Fear.
• Symbolic.
• Regional.
• Other.
Step Two:
Key Shipboard Operations
• Access to the ship.
• Safe navigation.
• Cargo handling.
• Ships stores handling.
• Security monitoring.
• Emergency response.
• Bunkering.
Step Three:
Existing Security Measures
Desktop assessment.
Use your key shipboard operations list to
identify existing security measures.
Step Four:
Threat Scenarios
Accessibility
• Accessibility of the vessel to the attack
scenario.
• Physical and geographic barriers that
• Deter the threat without organic security.
Organic security
• The ability to deter the attack. Includes
security plans, communication capabilities,
guard force, intrusion detection systems and
outside law enforcement.
Vulnerability Score
Category Accessibility Organic
Security
3 No deterrence No deterrence
capability
1 Excellent Excellent
Deterrence Deterrence
Capability
MITIGATION
PRODUCE
SHIP SECURITY ASSESSMENT
STAGE 4. FORMALITY
s
STAGE 3. CREDIBILITY
s
STAGE 2. TECHNICALITY
A
STAGE 1. PRACTICALITY
Any Questions ?