Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 89

National University «Odessa Maritime

Academy»
English Language Department

Professional English in
Navigation

Prof. Ivasiuk N.A.


Piracy at sea
What is the piracy?
 Piracy is an act of robbery or criminal
violence by ship or boat-borne attackers
upon another ship or a coastal area,
typically with the goal of stealing cargo
and other valuable items or properties.

 Those who engage in acts of piracy are


called pirates.
UNCLOS definition
Types of piracy

• Parasitic mode Piracy grows with flourishing trade, revolves


around points where trade routes converge…
(Aegean Sea, Japanese Wako, Spanish Main, Barbary
Coast)

• Episodic mode Piracy occasioned by disruption or disturbance


of normal trading patterns during times of
weakened state mechanisms…
( Koxinga and the Qing Dynasty, Opium
Wars)

• Intrinsic mode Piracy is a part of the fiscal and commercial


fabric of the society, part of the nation building
process…
(Elizabethan seadogs, colonial buccaneers, Dutch
“sea beggars”)
Who are they ?
Pirate-infested waters: South China Sea
Indian Ocean
East and West African coast
South American coast
Caribbean Sea
Strait of Malacca

Most attacks are the work of small bands (5-10


individuals) armed with knives or guns, in territorial
waters while ships are anchored
The International Maritime Organization (IMO)

• established in Geneva 1948; first meeting in 1959


• develops comprehensive regulatory framework for shipping
• forum for sponsoring a host of anti-piracy measures
• began tracking piracy in 1984
• issues monthly and quarterly IMO circulars
• has initiated responses from the UN Security Council
• advice often ignored by shippers
Piracy on the increase?

• Recent downward trend follows a period when


attacks tripled between 1993 and 2003. The first
half of 2003 was the worst 6-month period on
record
• Ships reported 239 incidents to the IMB during
the year 2006, down from 276 in 2005, and 329 in
2004
• Government involvement currently increasing
• Yet hotspots develop quickly. Reported attacks
rose by 14% in the first nine months of 2007. 35%
increase on reported attacks involving guns
• Episodic and parasitic piracy never wiped out,
never went away
Modern piracy is violent , bloody and ruthless.

Somalian waters are a high-risk area for


hijackings. Armed pirates in speedboats and
gunboats open fire on ships or yachts and rob or
hijack them.

Some crew have been injured or killed.


The northern and north-eastern
Somali coast is particulary risky
Somali Pirate Activity- The High Risk Area

Somali based pirate attacks have taken place


throughout the Gulf of Aden, Arabian Sea and
Northen Indian Ocean, affecting all shipping in
the region.

The recent increasing use of hijacked merchant ships,


fishing vessels and dhows as “ Motherships” enables
pirates to operate at extreme range from Somalia,
carrying attack craft ( skiffs) and weapons.
Somalia: (parasitic and episodic piracy)
• Ancient location for piracy, the “Babs” (Babs-al-Mandab) and Socotra
• Somali fishermen powerless against foreign poachers learn the trade of
piracy…patriots or pirates?
• 1991 functioning government dissolves in Somalia
• 2005 rise in piracy leads IMO to request action from UN member states
• 2006 UN Security Council urges states to use naval vessels and aircraft to
fight piracy and armed robbery
• 2007 IMO requests Transitional Federal Government of Somalia (TFG)
to allow incursions into territorial state waters
• 2008 TFG allows foreign forces to use all means necessary to stop piracy,
including deploying naval vessels and military aircraft, as well as seizing
and disposing of boats, vessels, arms and related equipment, etc.
Somali pirates
What is the real threat?

Human: direct confrontation minimal (hostage-taking dominating


attacks, merchant crews generally unharmed);

Economic: majority of loss through increases in vessel and cargo


insurance premiums (not direct costs); Gulf of Aden carries
some 22,000 vessels annually, around 8% of the world's trade,
including more than 12% of the total volume of oil transported
by sea

Political: potential for anti-state terrorism connection (has not really


materialized)

Environmental: potential for major environmental disaster (grounded tankers,


etc)
Currently: 16-18 ships being held, estimated 300 crew members hostages
Average length of captivity: 53 days
Vocabulary:
Pirate Activity :

- The level of pirate activity varies within the High Risk Area due to
changing weather conditions and activity by Naval/ Military forces.

- Pirate activity generally reduces in areas affected by


the South West monsoon, and increases in the period
following the monsoon.

- When piracy activity is reduced in one area of the High Risk Area it
is likely to increase in another area (e.g. the area off Kenya and
Tanzania).

- It is important that the latest information on the location of where


pirates are operating is used when planning routes through the High
Risk Are. It is also important that vessels are prepared to alter course
at short notice to avoid pirate activity when information is provided.
Answer the following questions:

1. Where do the Somali based pirate attacks


take place?
2. What vessels are used as “Motherships”?
3. How does the weather influence the pirate
activity?
4. What Somali coast is particularly risky?
5. What information is used when planning
routes through the High Risk Area?
Risk Assessment :

Prior to transiting the High Risk Area, ship


operators and Masters should carry out a
thorough Risk Assessment to assess the
likelihood and consequences of piracy attacks
to the vessel, based on the latest available
information.
Factors to be considered in the Risk Assessment
should include , but may not be limited to the
following:

Crew safety Speed

Freeboard
Crew safety

The primary consideration should be to ensure the


safety of the crew. Care should be taken, when
formulating measures to prevent illegal boarding and
external access to the accommodation, that crew
members will not be trapped inside and should be
able to escape in the event of another type of
emergency, such as, for example, fire.fire.
Freeboard

• It is likely that pirates will try to board the ship being


attacked at the lowest point above the waterline , making
it easier for them to climb onboard , these points are
often on either quarter or at the vessel’s stern.
• Experience suggests that vessels with a minimum
freeboard that is greater than 8 meters have a much
greater chance of successfully escaping a piracy attempt
than those with less.
• A large freeboard alone may not be enough to deter a
pirate attack.
Speed

• One of the most effective ways to defeat a pirate attack is


by using speed to try to outrun the attackers and/or
make it difficult to board.
• To date, there have been no reported attacks where
pirates have boarded a ship that has been proceeding at
over 18 knots.
• Ships are recommended to proceed at Full Sea Speed, or
at least 18 knots where they are capable of greater speed,
throughout their transit of the High Risk Areas.
• It is very important to increase to maximum safe speed
immediately after identifying any suspicious vessel.
Fill in the gaps with the appropriate word:

Factors to be considered in the Risk


Assessment
CHECK YOUR ANSWERS!

Factors to be considered in the Risk


Assessment

Speed
Crew Safety

Freeboard
How did we stop it then?

• Diplomacy
• Technology
• Firepower (merchants armed)
• Terror (gibbeting = public
display of executed criminals)
• Modern states evolved beyond
the need for intrinsic piracy

Punishments for pirates:

confinement
pillory
enslavement
branding
flogging
The Liburnian: Roman keel hauling
hanging
hanging in irons
How do we stop it now?
Naval response (short term):
United States
• collaborative multinational coordinated response Britain
• CTF-151 (currently 14-nation 20-vessel effort) Canada
France
• UN Resolution 1851: allowing naval force at sea and
Germany
ashore Greece
• Establish a transit corridor for merchant vessels Netherlands
• Intercept pirates before they board Spain
• prototype LCS-1 (1-4 planned) Pakistan
India
Russia
Malaysia
Maersk Alabama, April 8, 2009: China
“It was not clear what the military
crews would do when they got to the
scene…”
Direct action – escalation? American policy on anti-piracy
measures, 2007
Technology: Training:

• water canon • drills


• lights • visible deck patrols
• anti-boarding measures • evasive ship action
• citadel design • notification
• Long Range Acoustic Device • submission
LRAD (150 dB)

Range 300 m (more?)


Countermeasure:
headphones
State whether the following sentences are
true or false
1) The points of pirates boarding the ship are
often on the bow.
2) The pirates usually climb on board at the
vessel’s stern.
3) The vessels with a freeboard that is greater
than 10 meters successfully escape a piracy
attempt.
4) There were no reported attacks of the vessel
proceeding with speed of 5 knots.
5) Ships are recommended to proceed at full sea
speed.
CHECK YOUR ANSWERS!

1) The points of pirates boarding the ship are often


on the bow. False
2) The pirates usually climb on board at the
vessel’s stern. True
3) The vessels with a freeboard that is greater than
10 meters successfully escape a piracy attempt.
True
4) There were no reported attacks of the vessel
proceeding with speed of 5 knots. False
5) Ships are recommended to proceed at full sea
speed. True
Typical Pirate Attacks:

Commonly , two small high speed( up to 25 knots) open


boats or “skiffs” are used in attacks , often approaching
from either quarter or the stern. Skiffs are frequently
fitted with 2 outboard engines or motherships which
have include the very largest of merchant ships, fishing
vessels and dhows

These Motherships have been taken by the pirates and


usually have their own crew onboard as hostages.
Motherships are used to carry pirates, stores , fuel and
attack skiffs to enable pirates to operate over a much larger
area and are significantly less affected by the weather.
Attack skiffs are often towed behind the Motherships.
Ship Protection
Measures

Watchkeeping and
Enhanced Vigilance

Prior to entering the High Risk Area,


A proper lookout is the signal most
it is recommended that preparations
effective method of ship protection
are made to support the requirement
where early warning of a
for increased vigilance.
suspicious approach or attack is
Well ,constructed dummies placed at
assured, and where defences can be
strategic locations around the vessel
readily deployed.
can give an impression of greater
numbers of people on watch. watch.
Ship Protection
Measures

Control of Access to Bridge,


Accommodation and Machinery
Spaces
• It is very important to control access routes to deter or delay pirates who
have managed to board a vessel and are trying to enter accommodation or
machinery spaces.
• All doors and hatches providing access to the bridge , accommodation and
machinery spaces should be properly secured to prevent them from being
opened by pirates.
• Pirates have been known to gain access through portholes and windows. The
fitting of steel bars to windows will prevent this even if they manage to
shatter the window.
• Prior to entering the High Risk Area procedures for controlling access to
accommodation , machinery space and store rooms should be set out and
practised.
Ship Protection
Measures

Physical Barriers

Pirates typically use long lightweight hooked ladders, grappling hooks


with rope attached and long hooked poles with a climbing rope attached
to board vessels underway. Physical barriers should be used to make it
as difficult as possible to gain access to vessels by increasing the height
and difficult of any climb for an attacking pirate.
Physical Barriers

Before constructing any barriers:

• it is recommended that a thorough survey is conducted to identify


areas vulnerable to pirates trying to gain access.
• Razor wire ( also known as bared tape ) creates an effective barrier.
• It is recommended that warning sings of the electrified fence or
barrier are displayed –inward facing in English / language of the
crew, outward facing in Somali.
• The use of such outward facing warning sings might also be
considered as a deterrent even if no part of the barrier is actually
electrified.
Match the beginnings of sentences in column A
with their endings in column B

1. It is very important to
control access routes to a) through portholes and
delay pirates… windows;
2. Pirates have been known b) who have managed to
to gain access… board a vessel;
3. Prior to entering the High c) gives an impression of
Risk Area procedures for greater number of people
controlling access to on watch;
accommodation… d) the most effective method
4. The dummy placed at of ship protection;
strategic locations around e) should be set out and
the vessel… practiced;
5. A proper lookout is …
CHECK YOUR ANSWERS:

1. It is very important to b) who have managed to board


control access routes to a vessel;
delay pirates…
2. Pirates have been known a) through portholes and
to gain access… windows;
3. Prior to entering the High e) should be set out and
Risk Area procedures for practiced;
controlling access to
accommodation…
4. The dummy placed at c) gives an impression of greater
strategic locations around number of people on watch;
the vessel… should be set out and practiced;
5. A proper lookout is … d) the most effective method of
ship protection;
Actions under the threat of attack by
pirates:
 - passage of hazardous areas is planned for
daylight hours;
 - the transition, if possible, is carried out for the
minimum time with the maximum speed;
 - the crew is instructed and warned in advance;
 - organized enhanced surveillance. At night,
floodlights periodically illuminate the water
space near the ship, additional observers are
exposed;
 - a continuous radio watch is established;
 - the watch on the bridge is getting stronger.
Upon detection of suspicious vessels:
 - the crew from the open
decks is removed, the doors
leading to the interior of the
vessel are closed;
 - the landing of pirates can be
prevented by abrupt
maneuvering of the vessel;
 - Alert about the attack of
pirates on VHF channel 16,
with the help of DSC
controllers, Inmarsat-S, ARB
COSPAS-SARSAT.
 - identify the “citadel” - a place where the crew
will be able to lock themselves and gain time
that may be critical in anticipation of assistance
from the military - ideally, there should not be
portholes or easily cracked doors in the
“citadel”;
Safe Muster Points/ Citadels

Any decision to navigate in waters where the vessel’s security


may be threatened requires careful consideration and
detailed planning to ensure the safety of the crew and vessel.

Consideration should be given to establishing a safe


Muster Point or secure Citadel.
Citadel

is a designated pre-planned area purpose


built into the ship where, in the event of
imminent boarding by pirates, all crew
will seek protection.

is designed and constructed to resist a


determined pirate trying to gain entry for
a fixed period of time.
Citadel

The whole concept of the Citadel approach is lost if any crew


member is left outside before it is secured.

100% of the crew must be secured in the Citadel.

The pirates must be denied access to ship propulsion.


Choose the correct answer:
1. What is a Citadel?
a) an area where to cook meal;
b) a bridge to navigate a ship;
c) an area where all crew will seek protection;
2. Could any crewmember be left outside the Citadel?
a) if he wants;
b) no, never;
c) yes, he could;
3. What percent of the crew must be secured in the
Citadel?
a) 100 %
b) 50 %
c) 10 %
CHECK YOUR ANSWERS:
1. What is a Citadel?
a) an area where to cook meal;
b) a bridge to navigate a ship;
c) an area where all crew will seek protection;
2. Could any crewmember be left outside the Citadel?
a) if he wants;
b) no, never;
c) yes, he could;
3. What percent of the crew must be secured in the Citadel?
a) 100 %
b) 50 %
c) 10 %
Pirate Attack:

If the crew of a vessel suspects that it is coming under a


pirate attack there are specific actions that are recommended
to be taken during the approach stage and the attack stage.
Approach stage :

• If not already at full speed, increase to maximum. Try to steer a


straight course to maintain a maximum speed
• Sound the emergency alarm and make a “Pirate Attack”
announcement in accordance with the Ship’s Emergency plan.
• All crew, except those required on the bridge or in the engine room,
should muster at the Safe Muster Point or Citadel if constructed, so
that the crew are given as much ballistic protection as possible should
the pirates get close enough to use weapons.
• Activate water spray and other appropriate self-defensive measures.
• Ensure that all external doors and where possible , internal public
rooms and cabins, are fully secured.
• In addition to the emergency alarms and announcements for the
benefit of the vessel’s crew should the ship’s whistle/foghorn
continuously to demonstrate to any potential attacker that the ship is
aware of the attack and is reacting to it.
Attack stage:

• Reconfirm that all ship’s personnel are in a position


of safety.
• As the pirates close in on the vessel, Masters should
commence small alterations of helm whilst
maintaining speed to deter skiffs from lying
alongside the vessel in preparation for a boarding
attempt. These manoeuvres will create additional
wash to impede the operation of the skiffs
Vocabulary:
Vocabulary:
Understanding Ship Security Plan On Board Ships

 Ship Security Plan (SSP) is a plan that is


formulated to ensure that that the measures
laid out in the plan with respect to the security
of the ship are applied onboard. This is in place
to protect the personnel, cargo, cargo transport
units, stores etc from any security related risks.
The plan specifies responsibilities and
procedures to counteract any anticipated threat
to the vessel and her cargo.
 The ISPS Code makes it mandatory for a vessel
to have such a plan in place. The SSP must lay
out the protective measures for each
security level vis a vis ship related activities,
access control onboard, monitoring of the
restricted areas, cargo handling, receiving of
stores/baggage etc. The CSO must ensure that
the ship is provided with such a plan
commensurate with the ISPS Code. The SSP is a
critical document, the information of which is
to be restricted to designated personnel
onboard and not shared deliberately; the plan
must be protected from unauthorised access or
disclosure.
Requirements

 Developed for each ship, the SSP should take


into account the security level of the port
facility
 Measures and equipment to prevent any threat
to the ship and to prevent carriage of any
unauthorised units onboard
 Ship Security Personnel (SSP) must establish
measures against unwanted access to the ship
 As per SSP, a Ship Security Officer (SSO) must
be appointed onboard to execute the SSP
 Depending upon the Code interpreted and
followed, the SSP should be formulated by an
approved Organisation
 The plan must be developed after a thorough
security assessment of the ship taking into
account the guidance laid out in the ISPS Code
Contents
The SSP must address the following aspects:

 Preventive measures against weapons, hazardous


substances, devices that may be intended for use
against the safety and security of the ship
 Specific identification of restricted areas and preventive
action against access to any such designated areas
 Action to be taken when the ship is facing a security
threat or breach taking into account the critical
operations of the ship
 Complying with instructions of the Contracting
Government with respect to the security level
 Evacuation procedures that might have to be carried
out in case of a breach that cannot be combatted
 Specific duties of the shipboard personnel with responsibilities
when security is in question
 Procedures for auditing security related activities
 Procedures for training and drills associated with the plan
 Procedures for liaising with the port facility
 Procedures for reporting security related incidents
 Designation and identification of the SSO and the CSO with duties
and contact details
 Procedures to maintain, test and calibrate equipment pertaining to
the Code. This shall include details of the frequency of the tests to
be carried out as well
 Locations where the SSAS is provided and the guidance on using
the SSAS. Usage instructions should also include details of testing
of SSAS and information regarding false alerts as well
STANDARD MARINE
COMMUNICATION PHRASES
 Armed attack / piracy
.1 I am / MV... under attack by pirates.
.1.1 1 / MV... was under attack by pirates.
.2 I require / MV... requires assistance.
.3 What kind of assistance is required?
.3.1 I require / MV... requires
- medical assistance.
- navigational assistance.
- military assistance.
- tug assistance.
-escort / ... .
 4 Report damage.
.4.1 I have / MV has
- no damage.
- damage to navigational equipment / ... .

 .4.2 I am / MV... not under command.


.5 Can you / can MV... proceed?
.5.1 Yes, I / MV... can proceed.
.5.2 No, I / MV... cannot proceed.
Terrorism
 International terrorism
has been in the
spotlight of
international law in the
last 15 years.
Discussions have
emphasized the
intrinsic threat to
international peace and
security posed by
international terrorism.
United Nations
 Accordingly, after
examining the
nature of
international
terrorism, attention
is drawn to the
international treaty
framework and
efforts conducted
within the United
Nations (UN) to deal
with maritime
Terrorism
Then, considerations on
universal and
international criminal
jurisdiction over
maritime terrorism are
provided. International
practice safely allows to
qualify international
terrorism as a serious
threat to international
peace and security.
Terrorism
Besides traditional state
practice, e.g., national
legislation, attention is given to
the UN practice, particularly,
General Assembly (GA),
Security Council (SC)
Resolutions and
International Maritime
Organization (IMO)
documents. As for them, their
negotiation, adoption and the
voting explanation actually
constitute state practice.
Terrorism
 Concerning UN GA Resolutions, they are
intrinsically connected with the international
treaty framework on terrorism. These treaties
have thus been adopted by and/or preceded
by some of those Resolutions. UN GA
Resolutions-soft-law nature-have been
transformed into binding international
conventional law.
Terrorism
Maritime terrorism has no
internationally agreed upon
definition. Legal scholars
have agreed on an
operational definition for
maritime terrorism based on
Articles 3 and 4 of the 1988
Convention for the
Suppression of Unlawful Acts
against the Safety of Maritime
Navigation (SUA), even
though the SUA Convention
does not refer to terrorism
specifically.
Terrorism
Maritime terrorism is defined as:
 Any attempt or threat to seize control of a ship

by force;
 To damage or destroy a ship or its cargo;

 To injure or kill a person on board a ship; or

 To endanger in any way the safe navigation of

a ship that moves from the territorial waters of


one State into those of another State or into
international waters.
World Wide Co-operation
The Maritime Co-operation
Working Group of the
Council for Security and Co-
operation in the Asia-Pacific
(CSCAP) focuses its definition
on terrorism: Within the
marine environment; Used
against vessels or fixed
platforms at sea or in port, or
against any one of their
passengers or personnel and
Against coastal facilities or
settlements, including tourist
resorts.
Statistics
 During the twentieth century, incidents of
piracy and acts of armed robbery of ships were
the highest in Southeast Asia and Malacca, the
Far East, India, Bangladesh, the west and east
coasts of Africa, the Caribbean, and the US. By
1983,the problem of piracy and acts of armed
robbery of ships became alarming. Since then, a
steady increase in incidents occurred, with a
total of 1 256 incidents of armed robbery of
ships and piracy reported since the beginning
of 1994 to the end of 1999.
Terrorist attack
In October 2000, two terrorists linked to Al Qaeda used a
modified dinghy packed with approximately 230 kg) of C-
4 explosives to blow a hole in the US destroyer, USS Cole,
while in the Port of Aden, Yemen. Seventeen sailors were
killed and 40 wounded, with estimated damages of US
$250 million to the ship. Six men, all of whom fought in
Afghanistan against the Soviets, were arrested for the
attack. Intelligence gained from this arrest led to a missile
attack by the US on 5 November 2002 from a Predator
unmanned aerial vehicle (UAV) on a vehicle driven by Al
Qaeda operatives. Among them was Qaed Salim Siman al-
Harethi, a high-ranking operator who took part in the
attack on the Cole.
Ship Security
 Until 2001 , ship operations and seafarers were
often left to face these problems alone with
little help from the authorities ashore.
Terrorism was not seen as a significant
maritime threat , especially to cargo ships. The
terrorist attacks that did occur against
merchant ships were generally directed against
passenger or cruise ships, such as the attacks
on the Achille Lauro off Egypt in 1985, and the
City of Poros in Greece in 1989.
Achille Lauro
SHIP SECURITY OFFICER
(SSO)
 The SSO is responsible to the Master for: the
implementation of the ship security plan; the
maintenance and development of the ship
specific sections of this plan conducting regular
security inspections; ensuring that personnel
are aware of their responsibilities and duties
concerning security; ensuring the adequate
resources are available for maintaining watches
and/or security inspections.
OFFICERS AND CREW
 All other members of the ship’s staff and crew
are responsible to the SSO and the Master for
ensuring that they remain vigilant at all times
and report any security infractions. Then the
Ship Security Officer demonstrates IMO
requirements to Ship Security Plan and some
important recommendations concerning the
information included into it.
IMO requirements to the Ship Security
Plan
 According to the ISPS Code Part A, the SSP
shall be developed based on the SSA and shall
address among other items measures to
prevent access of unauthorized persons and to
prevent carriage of unauthorized cargo, stores
and other items not authorized to be taken
onboard.
Procedures for training

 Security drills, audits, reporting of security


incidents, periodic review of the SSP and
interface with port facilities shall be addressed.
The SSP shall deal with response to security
instructions from Authorities. The SSP shall
also identify restricted areas onboard and
measures to prevent unauthorized access to
them. Procedures foe monitoring the security
of the ship shall be implemented.
ACTION ON DISCOVERING A BOMB OR
SUSPICIOUS PACKAGE

DO NOT TOUCH OR MOVE THE PACKAGE

 Advice local security forces immediately and


alert the Company. If at sea contact is to be
made with relevant authorities in order
guidance can be received from experts ashore.
 If possible, place soft cushion material (such as
mattresses) around and close to the object to
take some of the blast effect should the package
detonate.
 Evacuate the area and make consideration to
evacuate the ship completely if deemed
appropriate.
 Rig fire hoses as appropriate.
 Consideration is to be given to opening doors
and vents in the vicinity in order to vent the
force of the blast outward or overboard to
minimise damage to the ship’s structure.
 If a blast does occur then the immediate and
surrounding areas should not be disturbed
unless to treat or evacuate casualties and for
purpose of firefighting. This is in order to
protect any forensic evidence.
 Co-operate fully and obey all instructions by
trained bomb disposal experts.
 Leave any removal or disarming to the
military/bomb disposal experts.
 Stand down from emergency stations when the
device has been made safe and removed.
Please answer the following questions:
 1. Should the general alarm be sounded?
 2. Must all watertight doors & compartments
be closed?
 3. Will you use radio communication when
searching for bombs?
 4. Must you advice the Company & local
authorities about the incident?
 5. Will you touch or move a suspicious
package?
 6. Must persons searching be familiar with the
spaces being searched?
 7. Should they be looking for an item of any
description which is not usually in that .
location?
 8. Is it necessary to co-operate with any shore
or military authority?
 9. Should you obey all instructions by trained
bomb disposal experts?
Keys to the following questions:
 1. Should the general alarm be sounded? Yes
 2. Must all watertight doors & compartments
be closed? NO
 3. Will you use radio communication when
searching for bombs? NO
 4. Must you advice the Company & local
authorities about the incident? YES
 5. Will you touch or move a suspicious
package? NO
 6. Must persons searching be familiar with the
spaces being searched? YES
 7. Should they be looking for an item of any
description which is not usually in that
location? YES
 8. Is it necessary to co-operate with any shore
or military authority? YES
 9. Should you obey all instructions by trained
bomb disposal experts? YES
Security of ship’s crew

Risk of Ship’s
Crew Security

Personal
Security
Personal Security
 Before entering ports, the SSO is to
remind the crew about their own
personal security both on and off the
ship. When on board, crewmembers
must ensure that their cabins are
kept locked and that they hold onto
their own keys safely.
Risk of Ship’s Crew Security
 Occasionally a seafarer may be tempted (either
by money, threats to his person or family or
other means of extortion) to assist in the
smuggling of illegal goods or stowaways.
Masters and other officers must be vigilant in
observing the behaviour and actions of their
colleagues and advise the Company of any
suspicions that they may have about a person.
Risk of Ship’s Crew Security
 The Company may conduct security screening
of new staff by verifying applications, checking
references and carrying out personal
interviews. In addition periodic background
checks of existing staff may be conducted.
THANK YOU FOR
YOUR ATTENTION

You might also like