Sat SDSD
Sat SDSD
Sat SDSD
A: Content Approved By : DG
Page 1 of 1
CONTENT
Section Details Pages Revision Date
A Content 1 00 01-Feb-2018
B Revision Record 1 00 01-Feb-2018
C Course Outline 1-3 00 01-Feb-2018
D Introduction 1 00 01-Feb-2018
01 Introduction to STSDSD 1-3 00 01-Feb-2018
02 Maritime Security Policy 1-6 00 01-Feb-2018
03 Security Responsibilities 1-3 00 01-Feb-2018
04 Ship Security Assessment 1-4 00 01-Feb-2018
05 Security Equipment 1 00 01-Feb-2018
06 Threat Identification, Recognition, and
1-8 00 01-Feb-2018
Response
07 Ship Security Actions 1-14 00 01-Feb-2018
08 Emergency Preparedness, Drills & Exercises 1-10 00 01-Feb-2018
09 Security Administration 1 00 01-Feb-2018
10 Anti- Piracy 1-4 00 01-Feb-2018
11 Pirate Attack 1-8 00 01-Feb-2018
12 The Release Process 1 00 01-Feb-2018
13 Sea Farers Family 1 00 01-Feb-2018
Page 1 of 1
Page 1 of 3
Page 2 of 3
5 Security equipment
5.1 Security equipment and systems 1.0 0.25
5.2 Operational limitations of security
equipment and systems
5.3 Testing, calibration and maintenance
of security equipment and systems
9 Security Administration
Document & Records 0.5
Page 3 of 3
10 Anti – Piracy
Risk Awareness:- Prior to entering area of
risk 1.5
10.1 Appraise the strength and
vulnerabilities of crew and ships
10.2 Know the anti-piracy measure
10.3 Understanding the content of the
best management practices
10.4 Pirates business module
11 Pirate attack
11.1 Examine the implication of piracy 2.0
attack
11.2 Assess how to defend the crew and
the ship
11.3 Coping in hostage situation
12 The release process
12.1 Discuss the additional danger 0.5
associated with the release process
Page 1 of 1
1. Aim
This model course is intended to provide the knowledge required for seafarers with
designated security duties in connection with a Ship Security Plan (SSP) to perform
their duties in accordance with the requirements of Chapter XI-2 of SOLAS 74 as
amended, the ISPS Code, and section A-VI/6 of the STCW Code, as amended.
2. Objectives
Those who successfully complete the course should be able to demonstrate
sufficient knowledge to undertake the duties assigned under the SSP. This
knowledge shall include, but is not limited to:
1. Knowledge of current security threats and patterns;
2. Recognition and detection of weapons, dangerous substances and devices;
3. Recognition, on a non-discriminatory basis of characteristics and behavioral
patterns of persons who are likely to threaten security;
4. Techniques used to circumvent security measures;
5. Crowd management and control techniques;
6. Security related communications;
7. Knowledge of emergency procedures and contingency plans;
8. Operation of security equipment and systems;
9. Testing, calibration and at-sea maintenance of security equipment and
systems;
10. Inspection, control, and monitoring techniques; and
11. Methods of physical searches of persons, personal effects, baggage, cargo,
and ship stores.
3. Entry Standards
It is assumed that those attending this course will be serving seafarers or other
shipboard personnel and are likely to have designated security duties in
connection with the Ship Security Plan.
4. Required Attendance
Page 1 of 3
1 .Introduction
1.1 This course deals with
Maritime Security Policy
Security Responsibilities
Vessel Security Assessment
Security Equipment
Threat Identification, Recognition and Response
Vessel Security Actions
Emergency Preparedness, Drills and Exercises and
Security Administration.
1.2 At the end of this course the seafarer will have an understanding of and be
able to deal with the topics indicated above.
1.3 Presently the maritime transportation industry faces threats from piracy and
armed attacks, terrorism, contraband smuggling, stowaways and refugees, cargo
theft and collateral damage.
Piracy and Armed Attacks consist of any illegal acts of violence or detention
committed for private ends by the crew or the passengers of a private ship on the
high seas, against another ship or aircraft, or against persons or property on board
such ships. Today, the deteriorating security situation in the seas off war- torn
Somalia and the Gulf of Aden are at the heart of the problem,.
Page 2 of 3
Refugees are persons who are outside their country of origin or habitual residence
because they have suffered persecution on account of race, religion, nationality,
political opinion, or because they are a member of a persecuted ‘social group’.
Such person may be referred to as asylum seekers.
Cargo theft- Frauds that occur most commonly in marine world are thefts on
ships and other ocean going vessels. Stealing of cargo, especially during times of
high fuel cost is common. Such thefts can be appropriated by the owner or the
client either way, as frauds and thefts continue to get more technical and
treacherous the good thing is that the vigilance for these has also been increasing
immensely.
Cargo theft- can be mediated by the owners, crew and sometimes by persons
outsides the ambit of both. There have even been cases where the entire ship with
its crew and cargo has been diverted to a third country for monetary gain and
thereafter disappeared completely.
1.4 Vessels, port operations and conditions in connection with the intermodal
nature of transport and the interfaces between vessels and other modes.
Seaports and maritime transportation infrastructure face myriad threats from the
vessels, people, and cargo that move through them.
Shipping is perhaps the most international of all the world’s industries. Every year
more than 20Q million sea cargo containers move among the world’s major
seaports.
Page 3 of 3
The September 11th attacks in USA were horrific in terms of the loss of human life
and financial damage inflicted, yet they were not the worst-case scenario that
many security experts, believe could befall us in future, either in terms of the
numbers of casualties or specifically in the use of new weapons of Mass
Destruction.
With the formation of extensive global terrorist infrastructures and the increased
reach of fundamentalist terrorist groups, the spectra of Suicide Terrorism now
threatens Europe and North America and India.
Page 1 of 6
2.2.2 The Post -9/11 Response of the Maritime Community to 4 Piracy One of the
first responses was The Model National Law on Acts of Piracy and Maritime
Violence.
The threat of marine piracy and its detrimental impact upon maritime trade
become the collective focus of the Comite Maritime International (“CMI”), the Baltic
and International Maritime Counsel (“BIMCO”), the International Chamber of
Shipping (“ICS”), Interpol, the International Group of P &I Clubs (“IGP&I”), the
ICCC International Maritime Bureau(“IMB”), the International Maritime
Organization (“IMO”) and the United Nations (Office of Legal Affairs/Division for
Ocean Affairs and the Law of the Sea.)
Page 2 of 6
2.1.3 SOLAS Chapter XI and the contents of the ISPS Code SOLAS Chapter XI
deals with special measures to enhance maritime safety. New regulations have
come into force; The existing SOLAS Chapter XI ( Special measures to enhance
maritime safety) has been re- numbered as Chapter XI-1.
Regulation XI-1/3 is modified to require Ships’ identification numbers to be
permanently marked in a visible place either on the ship’s hull or superstructure.
Passenger ships should carry the marking on a horizontal surface visible from the
air. Ships should also be marked with their ID numbers internally.
Page 3 of 6
history of the ship. A brand new Chapter XI-2 . Special measures to enhance
maritime security is after the renumbered Chapter XI-1 .This chapter applies to
passenger ships and cargo ships of 569 gross tonnage and upwards, including
high speed craft, mobile offshore drilling units and port facilities serving such
ships engaged on international voyages.
Regulation XI-2/2 of the new chapter enshrines the International Ship and Port
Facilities Security Code (ISPS Code). Part A of this Code is mandatory and part B
contains guidance as to how best to comply with the mandatory requirements.
Regulation XI-2/8 confirms the role of the Master in exercising his professional
judgment over decisions necessary to maintain the security of the ship. It says he
shall not be constrained by the Company, the charterer or any other person in this
respect.
Regulation XI-2/6 requires all ships to be provided with a ship security alert
system, according to a strict timetable that will see most vessels fitted by 2004 and
the remainder by 2006. When activated the ship security alert system shall initiate
and transmit a ship to shore security alert to a competent authority designated by
the Administration, identifying the ship, its location and indicating that the
security of the ship is under threat or it has been compromised. The system will
not raise any alarm on-board the ship. The ship security alert system shall be
capable of being activated from the navigation bridge and in at least one other
location.
Regulation XI-2/10 covers requirements for port facilities, providing among other
things for Contracting Governments to ensure that port facility security
assessments are carried out and that port facility security plans are developed,
implemented and reviewed in accordance with the ISPS Code. The ISPS Code is
implemented through chapter XI-2 Special measures to enhance maritime security
in the International Convention for the minimum requirements for security of
ships and ports. Part A provides mandatory requirements. Pat B provides guidance
of implementation.
Page 4 of 6
governments, local administrations, ship and port industries at the national and
international level.
To collate and promulgate security-related information.
To provide a methodology for security assessments so as to have in place plans
and procedures to react to changing security levels
2.2 Familiarity with the Indian Government legislation and regulations Bill No 108
of 2004 introduced in the Indian Parliament amends the relevant section of the
Merchant Shipping Act 1958 such that the insertion of the word security mean
maritime security and includes any measure to protect ports or ships or any
person or thing relating directly or indirectly to maritime organization.
2.3.1 Accordingly as per the Indian Merchant Shipping Act, and in order to comply
with SOLAS Chapter YI and the ISPS Code it is mandatory for every vessel to
develop implement and maintain a Vessel Security Plan.
A Vessel Security Plan is one which addresses, the requirements laid down in
paragraph 9.4 of the Code.
Port facility means a location within a port at which commercial maritime activities
occur ships covered by these measures.
Page 5 of 6
As soon as the security level has been decided as per the ISPS code, it is displayed
prominently on board vessel at the entrance of the ship.
The Three different Security Levels
LEVEL 1- Normal Level
- In normal level, both ships and port operations are carried out in general way.
- Minimum security measures are always maintained on board and in port.
- Ship and port operation are carried out as per ship and port facility security plan.
- Port facility ensures to keep the ' no access' areas under surveillance at all times.
- Ship and port authority mutually supervise loading and unloading operation of
cargo and stores, ensuring access control and other minimum security criteria.
- Minimum access in the ship is maintained at all times
Page 6 of 6
- In Level 3, all ship and port operations are stopped and frequent security rounds
and duties are carried out by both ship staff and port authorities. Boat petrol are
done by port state on the water side.
- Main propulsion plant is always kept ready for moving the ship out of port if
require.
- No personal is allowed to access the ship without the authorization of port state
official.
- Only one access point is maintained on board at all time.
- Preparing a full search operation of ship or under water hull search operation
with port facility.
- Preparation for evacuation of ship by its staff.
A declaration of security is undertaken between port state and ships
administration
Page 1 of 3
3. Security Responsibilities
Security Responsibilities The International Ship and Port Facility Security (ISPS)
Code is an amendment to the Safety of Life at Sea ( SOLAS) Convention (1974/
1988) on minimum security arrangements for ships, ports and government
agencies.
The Company shall ensure that the Ship Security Plan contains a clear statement
emphasizing the master's authority.
3.4 The Vessel or ship means a passenger ship including high- speed passenger
craft regardless of size; cargo ship including high- speed cargo craft of at least 500
gross tons; and mobile offshore drilling units engaged in international voyages.
Every vessel must have a Ship Security Plan which indicates the minimum
operational and physical security measures the ship shall take at all times.
SSO means the person on board the ship, accountable to the master, designated
by the Company as responsible for the security of the ship, including
implementation and maintenance of the ship security plan, and for liaison with the
company security officer and port facility security officers.
The duties and responsibilities of the SSO shall include- Maintaining and
supervising the implementation of the SSP on- board ( including any amendments
to the plan)
Page 2 of 3
3.8 Port Facility Security Officer, (PFSO) is responsible for the development
implementation, revision and maintenance of the port facility security plan and for
liaison with the ship security officers and company security officers.
Page 3 of 3
Page 1 of 4
- The location of areas which should have restricted access, such as navigation
bridge, machinery spaces and other control stations
- The location and function of each actual or potential access point to the ship;
- Cargo spaces and stowage arrangements;
- The locations of the ships stores and where essential maintenance equipment is
stored;
- The locations where unaccompanied baggage is stored;
- Location of the emergency and stand-by equipment to maintain essential
services;
- Existing security and safety equipment for the protection of passengers and ships
personnel;
- Escape and evacuation routes and assembly stations which have to be
maintained to ensure the orderly and safe emergency evacuation of the ship ;
lighting, access control and other appropriate systems.
Page 2 of 4
In order to protect ships personnel and the vessel from attack it is necessary to
keep a watch for and prevent the bringing of instruments of destruction on board.
Further, it is likely that the attacker will try to smuggle his weapons on board. If,
for instance, a gun is smuggled on board in a dismantled condition it is unlikely
that normal crew on board will be able to recognize it. It is therefore important that
the ship's personnel have a basic knowledge of these weapons and what they look
like.
Page 3 of 4
The requirement for a ship security alert system may be complied with by using
the radio installation fitted for compliance with the requirements of SOLAS
provided all requirements of the ISPS Code are complied with. When an
Administration receives notification of a ship security alert, that Administration
shall immediately notify the State (s) in the vicinity of which the ship is presently
operating.
10 Areas that may, if damaged or used for illicit observation, pose a risk to
persons, property, or operations aboard the vessel or within a port facility. If a ship
is at a port of a State which this Code does not apply or, is interfacing with fixed or
floating platforms or a mobile drilling units on locations outside the purview of this
code or, is interfacing with a port or port facility which is not required to comply
with chapter XI-2 and part A of this Code, the ship can come across areas that
may, if damaged or used for illicit observation, pose a risk to persons, property, or
Page 4 of 4
Page 1 of 1
5. Security Equipment
The SSO is responsible for the storage, testing, calibration, maintenance of and
control of all shipboard security equipment.
AK 47 ASSAULT RIFLE
6.2 Physical searches and non- intrusive inspections Physical Searches are best
carried out in booths as privacy minimizes embarrassment and increased
effectiveness. People being searched should not be given the opportunity of
selecting a particular searcher. One person (a supervisor) should observe people
waiting and note suspicious behavior and allocate passengers to available
searchers to ensure no over- loading.
Baggage Screening. Metal detectors are of little use for screening baggage and
personal belongings since most bags and brief-cases have locks, hinges and other
metal components which would result in a very high alarm rate. Moreover, hand-
held detectors have a limited depth of effective penetration.
AK 47
AK 56
HAND GRENADES
CARBINE
DETONATORS
EXPLOSIVE POWDER
6.3 Execution and coordination of searches
1. The importance of planning a search and the practice of carrying out searches
as a drill.
A ship’s security plan should incorporate a search procedure aimed at ensuring
that the vessel can be searched quickly and effectively when this is considered
necessary. The master of each ship, together with the ship’s security officer, should
be responsible for establishing search procedures.
In the interests of good security, as well as good ship husbandry as much gear as
possible should be stowed away.
3 Equipment the search team should carry for conducting a search.
The search team should be familiar with the list of basic equipment that may be
employed in conducting searches. This list includes
Flashlights and batteries;
Screwdrivers, wrenches and crowbars;
Mirrors and probes;
Gloves, hard hats, overalls and non-slip footwear;
Plastic bags and envelopes for collection of evidence;
Forms on which to record activities and discoveries.
2. In order that the points above are noticed and suspicious persons recognized
as such it is of utmost importance that the ship’s personnel be observant
continuously.
6.5 Techniques used to circumvent security measures
1. Summarizes the techniques that may be used to circumvent security
measure Ship’s personnel must be made aware that no security equipment or
measure is infallible. They should also know that there are techniques that can
be employed to evade, security systems and controls, and circumvent security
They must talk slowly and clearly and inform without being talkative.
Technical language must be avoided.
The messages must agree with what the passengers themselves are
experiencing.
Report everything that the passengers can perceive or understand themselves.
Do not make light of real risks. Passengers may suspect that the truth is being
kept from them. Therefore, tell what has happened
Give them an appraisal of the situation
Give details about what measures have been taken
State the expected outcome
State whether the situation has been reported ashore
Point out that the crew is trained for the task and that the passengers must
follow their instructions
Give information frequently
- Every 10 to 15 minutes during an active phase.
- Every half hour or hour during a more stable phase.
- Restrict yourself to instructions and information only.
- Specify the precise time for the next announcement and keep the time
punctually.
- Repeating previous information is also informative.
- Uncertainly is the worst state.
- Help passengers find their relatives and travel companions.
Page 1 of 14
Page 2 of 14
ship authorities.
Access control is maintained all the time with escorting the visitors and use of
security equipment like metal detector etc.
Communication between port authority and ship administration is always
maintained in case of increase in security level.
Preparing a full or partial search operation of ship.
A declaration of security is undertaken between port, state and ship
administration.
LEVEL 3 – Imminent danger
Level 3 is imposed when the probability of a security threat to the ship or port
authority is at the highest or imminent and specific protective measures are to be
maintained.
In level 3 all ship and port operations are stopped and frequent security rounds
and duties are carried out by both ship staff and port authorities. Boat patrols are
done by port state on the water side.
Main propulsion plant is always kept ready for moving the ship out of port if
required.
No personnel is allowed to access the ship without the authorization of port state
official.
Only one access point is maintained on board at all times.
Preparing a full search operation of ship or under water hull search operation with
port facility.
Preparation for evacuation of ship by its staff.
A declaration of security is undertaken between port state and ships
administration.
7.2 maintaining security of the vessel/port interface
1 Prior to entering a port, the ship shall confirm that the port is subject to the IPS
code and hold the Port Facility Security Plan. When the port has a Port Facility
Security Plan, the CSO or SSO shall liaise with the PFSO and confirm the security
level of both side. When a Declaration of Security is required by Contraction
Page 3 of 14
Government or PFSO, the master shall instruct SSO to prepare this Declaration of
Security. When the ship has a higher security level than that of the port facility,
the master shall inform this fact * Contraction Government and PFSO, and require
him to prepare a Declaration of Security to coordinate the appropriate Security
actions. When the port does not hold Port Facility Security Plan the ship shall
liaise with Contracting Government, inform them the ship’s Security level, and
require appropriate security measures. The ship shall request the port to prepare a
Declaration of Security.
A ship has to give her security level (SL 1,2 or 3) 24 hours before arrival in port. It
is the designated authority of the government of the flag state that decides about
the SL of its ships. The master of the ship can take extra security measures if he
wants, but he cannot put his SL on a higher level. Only emergency safety
measures can overrule he security measures provided in the SSP (ship Security
Plan). If the SL of the port facility is higher than that of the ship, then the SSO
(Ship Security Officer) has the obligation to equalize the security level of the ship
when the ship has a higher security level than that of the port facility, the SSO
together with the PFSO (Port Facility Security Officer) have to make up a DOS
(Declaration of Security).
It is the designated authority of the government f the port that decides about the
SL of the port facilities in the port area. The Security measures for each SL are
written in the PFSP (Port Facility Security Plan).
The security measures are more severe when the SL is higher and also depend on
the risk that can be encountered at the port facility. For instance a dangerous
goods terminal, a passenger terminal or a container terminal will be fenced and
guarded. An open bulk terminal, with no dangerous commodities, will only be
fenced and guarded on the ship/shore interface when we have an SL 2 or 3. At
security level 1 we have business as usual, without any economic constraints.
Requirements Unique to the United States
In THE United States, the Coast Guard requires that each vessel and port facility
owner or operator ensure procedures are established for requesting a DoS and for
handling DoS requests from the interfacing entity. A DoS must be completed with
regard to any interface involving a cruise ship or a manned vessel carrying Certain
Dangerous Cargoes in bulk. For interfaces involving a cruise ship or a manned
vessel carrying Certain Dangerous Cargoes in bulk , the security needs and
procedures are to be coordinated and agreed prior to arrival and the DoS is to be
signed by both the ship and the port facility or another vessel prior to
Page 4 of 14
Denial of entry into port or expulsion from port may only be imposed where the
port state control officials have clear grounds to believe that the ship poses an
immediate threat to the security or safety of personas or of ships or other
Page 5 of 14
property and there are no other appropriate means for removing that threat.
Summary
Proper use of the DoS is important, not only as a means of coordinating
security arrangements between ships and port facilities, but also as a method
of documenting appropriate implementation of the ISPS code and related
maritime security requirements. This becomes crucial when a ship calls at a
port facility that is not in full compliance with the ISPS Code and does not have
and an approved security plan. A ship calling at such a port facility must not
only institute additional security measures (as provided for in the ISPS Code
and its ship security plan), but it must also to demonstrate to port state control
officials at subsequent , port call that it took the appropriate steps. The way to
demonstrate this full compliance with the ISPS code is to complete and retain
on board a DoS fully documenting the ship’s security measures while at this
non-compliant port facility. Welcome to the new world of security through
paperwork.
7.4 Execution of security procedures
1 Vessel Security Officer to carry out regular security Inspections which shall
include, but are not limited to:
Maintaining and supervising the implementation of the Ship Security
plan, including any amendments to the plan; (Sample of Ship Security
Plan conform to ISPS Code).
Co-coordination the security aspects of the handling of cargo and ship’s
stores with other shipboard personnel and with the relevant PFSO;
Proposing modifications to the Ship Security Plan;
Reporting to the CSO any deficiencies and non-conformities identified
during internal audits, periodic reviews, security inspections and
verifications of compliance and implementing any corrective actions;
The SSO should address the following elements on board or within the ship:
- Physical Security;
- Structural Integrity;
- Personnel Protection Systems;
- Procedural Policies;
- Radio and telecommunication system, including computer system and
Page 6 of 14
networks; and
- Other areas that may, if damaged or used for illicit observation, pose a risk
to
- Persons, property, or operations on board the ship or within a port facility.
Page 7 of 14
Page 8 of 14
Page 9 of 14
Page 10 of 14
navigation, having regards to the provisions of the International Regulations for the
Prevention of Collisions at Sea in force. The following should be considered when
establishing the appropriate level and location of lighting:
The ship’s personnel should be able to detect activities beyond the ship, on
both the shore side and the waterside;
Coverage should include the area on and around the ship;
Coverage should facilitate personnel identification at access points; and
Coverage may be provided through coordination with the port facility.
Security Level 2
At security level 2, the SSP should establish the additional security measures to be
applied to enhance the monitoring and surveillance capabilities, which may
include:
Increasing the frequency an detail of security patrols;
Increasing the coverage and intensity of lighting or the use of security and
surveillance and equipment;
Assigning additional personnel as security lookouts; and
Ensuring coordination with waterside boat patrols, and foot or vehicle
patrols on the shore-side, when provided.
Page 11 of 14
Preparation for underwater inspection of the hull of the ship; and initiation
of measures, including the slow revolution of the ship’s propellers, if
practicable, to deter underwater access to the hull of the ship.
The security measures, some of which may have to be applied in liaison with the
port facility, should include inventory control procedures at access points to the
ship. Once on board the ship, cargo should be capable of being identified as having
been approved for loading onto the ship. In addition, security measures should be
developed to ensure that cargo, once on board, is not tampered with.
Security Level 1
At security level 1, the SSP should establish the security measures to be applied
during cargo handling, which may include
Routine checking of cargo, cargo transport units and cargo spaces prior to,
and during, cargo operations;
Checks to ensure that cargo being loaded matches the cargo documentation;
ensuring, in liaison with the port facility, that vehicles to be loaded on board
car carriers, ro—ro and passenger ships are subjected to search prior to
loading, in accordance with the frequency required in the SSP; and
checking of seals or other methods used to prevent tampering Checking of
cargo may be accomplished by the following means:
visual and physical examination; and
using scanning/detection equipment, mechanical device, or
dogs.
When there are regular, or repeated, cargo movements the CSO or SSO may, in
consultation with the port facility, agree arrangements with shippers or others
responsible for such cargoes covering off- site checking, sealing , scheduling,
supporting documentation, etc. Such arrangements should be communicated to
the agreed with the PFSO concerned.
Security Level-2
At security level 2, the SSP should establish the additional security measures to be
applied during cargo handling, which may include:
Page 12 of 14
Security Level 3
At security level3 , the ship should comply with the instructions issued by those
responding to the security incident or threat thereof. The SSP should detail the
security measures which could be taken by the ship, in close co-operation with
those responding and the port facility, which may include:
suspension of the loading or unloading of cargo; and
verifying the inventory of dangerous goods and hazardous substances
carried on board, if any, and their location.
The security measures relating to the delivery of ship’s stores should:
ensure checking of ship’s stores and package integrity;
prevent ship’s stores from being accepted without inspection;
prevent tampering ; and
prevent ship’s stores form being accepted unless ordered. For ships
regularly using the port facility it may be appropriate to establish
procedures involving the ship, its suppliers and the port facility covering
notification and timing of deliveries and their documentation. There
should always be some way of confirming that stores presented for
delivery are accompanied by evidence that they have been ordered by
the ship.
Security Level 1
At security level1 , the SSP should establish the security measures to be
applied during delivery of ship’s stores, which may include:
checking to ensure stores match the order prior to being loaded on board;
and
ensuring immediate secure stowage of ship’s stores.
Page 13 of 14
Security Level 2
At security level 2, the SSP should establish the additional security measures
To be applied during delivery of ships stores by exercising checks
Security Level 3
At security level 3, the ship should comply with the instructions issued by those
responding to the security incident or threat thereof. The SSP should detail the
security measures which could be taken by the ship, in close co-operation with
those responding and the port facility, which may include:
Page 14 of 14
unlawful act.
Nature and extent of severity of injuries sustained ,if any.
VHF radios are employed as the primary means of communication, with ship
intercom/phone used as a backup
Privately owned, hand held radio communication devices are not authorized for
use on board this ship. Failure to comply will result in confiscation and retention
of radio.
Distress and Duress: Procedures for indicating that the SSO or Security Officer is
in distress, or is communicating under duress are the responsibility of the SSO.
Appropriate ship’s personnel are trained in these procedures.
Communications with terminal operator’s personnel will be coordinated through
the ship’s agent with preference given to VHF radio and/or telephone. For security
purposes, direct communications links are established between ship personnel
and the security personnel in the port facility.
Those links are subject to periodic testing and failure to maintain communication
is to be reported to the SSO.
SSOs communicate directly with the CSO, via telephone or e-mail as necessary to
co-ordinate shipboard security operations and support requirements, and provide
updated port contact information.
General----- Drills and exercises must test the proficiency of vessel personnel in
assigned security duties at all Security Levels and the effective implementation of
the Ship Security (SSP). They must enable the Ship Security Officer( SSO) to
identify any related security deficiencies that need to be addressed.
The SSO must ensure that at least one/ security drill is conducted at least
every 3 months, except when a vessel is out of service due to repairs or
seasonal suspension of operation, provided that in such cases a drill must
be conducted within one week of the vessel’s reactivation. Security drills may
be held in conjunction with non-security drills where appropriate.
their escape or even using the ship itself, and/or its cargo, as a threat or as
weapon. Aircraft have been hijacked by a single person armed only with
imitation weapons and, in the right place one armed person could be enough on
a ship. However, a planned terrorist hijack of a vessel is much more likely to
involve a group with real weapons. The major task facing the would—be
hijackers is to board the vessel with their weapons, and security measures
aimed at preventing this should be introduced when the threat level warrants it.
Measures devised in respect of threats from piracy or armed robbery should be
appropriate.
In port, if the threat warrants it, access points should be manned, in certain
circumstances by two persons, who should be fully briefed on their duties, the
action to take in the event of an incident or emergency and the planned
response to an alarm. They need to be provided with a torch, a whistle to
summon assistance and communications to remain to touch with the Duty
Officer. They need to hold a full list of all crew members, shore officials and
expected visitors. All visitors should be asked to identify. Strangers should be
challenged. Vessels at anchor should regularly check anchor cables and hawse
pipe covers. At sea, hijackers may try to gain access to the vessel, particularly
close to land or in narrow waters where maneuverability is limited. Attempts
Could be mounted from small boats, dhows, junks, fishing , boats that appear
to have broken down or by any means that relies on the traditional assistance
which seafarers offer each other. The best protection against this sort of ruse is
an awareness of the possibilities and keeping a sharp look-out for small
behaving suspiciously or approaching. Should a master decide to allow people
to board, this should be one at a time , each one searched if necessary, while a
good look-out is maintained on the other side of the ship. Particular care needs
to be exercised during the hours of darkness when a surreptitious approach
could be carried out more easily. When underway. If there is any doubt about
the identity or motive of craft attempting to attract attention, their actions
should be ignored. If it is safe to do so, and circumstances warrant it, speed
Increase speed and alter course if sage to do so: give no opportunity for
the other vessel to come alongside and make no response to messages by
radio, light or loud hailer.
Keep personnel clear of the upper deck.
Note details of the other vessel and photograph it if possible.
At night, direct searchlights at the approaching vessel and switch off
upper deck lighting: if safe to do so, navigation lights should also be
switched off.
If despite all efforts at deterrence and prevention a vessel is hijacked, the master
and crew should try, wherever possible, to prevent any loss of life.
Bomb threat
Ships are vulnerable to explosive or incendiary devices:
In accompanied passenger cars, freight vehicles or coaches
In unaccompanied vehicles, export cars or semi- trailers
In misdeclared cargo
Carried on board by current passengers, or by those from a previous sailing
leaving a timed device
In luggage placed in a baggage trolley
In ship's stores
In the post
Carried on board by shore workers in port
Carried on board by contractor's personnel.
Travelling as a foot passenger, the saboteur has to contend with customs and
Sabotage attacks of this sort are likely to be directed at the ship of a particular
nationality, against the shipping company's policies, or the justification may be
entirely local. Since saboteurs on this type of mission need to board and leave the
ship without being detected, access control arrangements may not always deter
them. To guard against this type of attack, vulnerable compartments should be
locked and watch-keeping personnel should make random visits to look for signs of
tampering. A saboteur need not only use explosive or incendiary devices, he may
try to damage the vessel's machinery. Extra vigilance is needed immediately, prior
to sailing, or following a bomb warning. Crew members should immediately be
suspicious of unexpected objects in unusual places.
External sabotage- Major damage to a ship and facility can also be caused by a
saboteur reaching the hull, either from another vessel or underwater and placing
an explosive device in a vulnerable area. The saboteur's objectives in mounting
such attacks can be block berths or narrow channels, or to immobilize a particular
vessel or damage a facility. Such attacks require considerable knowledge and
technical skill and lie within the capability of only fairly sophisticated terrorist
groups. To be effective, some precision is required in placing the charges and this
requires trained swimmers..
Over-the- side lighting giving an even distribution of light on the whole hull and
waterline;
Keeping a good watch from the deck, to look out for bubbles (divers), floating
refuse ( which may hide swimmers) or small boats. All approaching boats
should be challenged. If unidentified, they should be prevented from coming
alongside;
A boat patrol, carried out at frequent but irregular intervals and towing barbed
wire or fish hooks, is an effective defense against frogmen or swimmers;
If the ship is known to be under attack from swimmers, turning propellers
ahead and astern turbulence in the water and makes swimming more difficult;
If it is thought likely that a device has been fixed to the outside of the hull below
the water-line, the assistance of local authorities should be sought.
Some of the above measures may seem fanciful or far-fetched, but they have all
been used in the past with some success and are included to show the sort of
protective measures which are needed when the threat demands it.
Piracy and other depredations
The International Ship and Port Facility Security Code (ISPS) requires ships
security assessments (SSA) and ships security plans (SSP) to be periodically
reviewed, audited, and amended in response to experience or changing
circumstances.
Vessels in those areas operate at their fastest speeds ( those operating under 16
knots with a low freeboard (less than six meters) should consider themselves at
extremely high risk.
Vessels that are unable to out run pirate vessels should change course
repeatedly (consistent with safe navigation) and conduct night time transits.
Vessels should take measures including, where necessary, changing their
operational procedures to make it more difficult for pirates to board their
vessels while underway.
Obstacles should be placed in the way to prevent or delay the pirates gaining
vessel control in the event that pirates board the vessel.
Examples may include safe- areas for crews to muster and physical barriers to
control areas.
Vessels to use appropriate non- lethal measures such as netting, wire, electric
fencing, long- range acoustical devices, and fire hoses to prevent boarding.
Vessels should take on properly certified unarmed security consultants on
vessels transiting the region. Such consultants should be encouraged to provide
security measures, including intelligence reports for vessels in transit, on-board
training and non- lethal use of force capabilities, and night vision equipment.
Vessels, in appropriate circumstances take on properly screened and certified
third- party security providers with firearms, operating in compliance with
applicable coastal, port, and flag State laws to provide an effective deterrent to
pirate attacks off the Horn of Africa. Other self- protection measures to avoid
detection, attack, boarding and hijack by pirates can be to:
Stay outside high threat area, Navigate in rough seas, Continuous area- wide
threat awareness, Circumnavigation, AIS and LRIT switched on, Military
Convoy, Massive water Curtain, Speed > 18 knots, Razor wire/ Spikes Group
transit, Ejectable obstacles (e.g. timber)
Extra lookouts, Freeboard > 8 m Towed obstacles ( alongside/ aft of ship), water
HOSES Night Vision Goggles, Evasive Maneuvers, Laser guns, Sound blasters,
Dummy lookouts, Restrict access, CCTV' Restrict movements inside, Personal
Protection Gear Deny use of ship's tools, Deploy smokescreen inside Report
movements to authorities Stowaways Ship owners and Masters face the
problem of identifying the presence of stowaways before a ship leaves port or
preventing their boarding the vessel in the first place.
However, most stowaways are only discovered once a vessel has sailed. Dealing
with an incident involves the Master and owner in time consuming negotiations
with club, agents and authorities. The cost alone from disruptions to the ship's
schedule alone can be considerable.
There are a number of preventive measures the Master and crew can take before
the ship enters port, during the stay in port and after departure. Therefore a
thorough risk assessment should be considered; identifying the potential hazards
present in the ship's area of operation, the physical surroundings of the ship upon
loading! Discharging and potential hazards present on board the ship Vessel's
surroundings and port areas Normally the ship owner has little or no influence on
port security and has to concentrate on preventing stowaways from gaining access
to the ship. Stowaways are typically able to gain access to the ship due to
inadequate security and watch keeping, or, are hidden in containers which are
subsequently loaded on board, while these are at the terminal.
Obviously not every container or car can be checked. Whilst soft top containers
can be inspected quite easily, this is not the case with standard steel top
containers.
Port security- Many ports have adequate security; whilst at others security is
non- existent. Whatever the circumstances, it is not recommended to rely solely
on port security. The stowaway business is so financially attractive that to rely on
local security staff merely offers an easy path for a potential stowaway. It is
sensible, however, to ensure that the agent knows of your full intention not to sail
with stowaways on board, and that he is repeatedly asked to ensure that all safety
measures available at the port are mare to work in the interest of the ship.
The crew has little or no influence on port security and has to focus on preventing
stowaways from gaining access to the ship. The high risk threat is from ports and
terminals where the ISPS Code is not being implemented in a thorough manner.
The task of preventing the stowaways from coming on board in these ports is more
difficult and it is here that Masters and ship owners must focus their efforts.
Crews should be issued the correct instructions and A procedures to enable the
ship to provide a determined deterrent, and stopping stowaways from boarding.
Given the myriad of people who often surge on board when a ship arrives in
port, a pass system can be of valuable assistance.
Ask the agent if the port is capable of providing adequate security. If not, the
agent can be asked to arrange additional protection.
If there are doubts as to the efficiency of locally supplied guards in ports where
a large number/ of stowaways are known to board vessels, the short- term
employment of a professional maritime security officer should be considered.
If stowaways are discovered during the search, the immigration authorities should
be notified immediately in order that the stowaways can be removed from the ship.
Different harbors and ports have different access points that are commonly used.
In general; some access point entries can be:
Climbing the mooring ropes,
Climbing from the sea using hooks,
Boarding the vessel as stevedores with fake dock identification papers. At some
ports stevedores are supposed to wear special clothing with branded overalls
and helmets. Bear in mind that stowaways may have access to these overalls
and helmets too.
Recent stowaway interviews have revealed that crew on board have also been
involved in the safe passage of stowaways. On A some ships stowaways have had
to pay a "ticket" to one of the crew on board. Consider offering financial rewards to
those crew members who discover and prevent stowaway incidents and ensure
that all crew members are aware of the advantages of preventing stowaways sailing
with the ship. Check security equipment, close- circuit television, alarms and
locks.
General- Drills and exercises must test the proficiency of vessel personnel in
assigned security duties at all Security Levels and the effective implementation
of the Ship Security Plan (SSP). They must enable the Ship Security Officer
(SSO) to identify any related security deficiencies that need to be addressed.
Page 1 of 1
9. Security Administration
9.1 Documentation and records
Records should be available to duly authorized officers of Contracting
Governments to verify that the provisions of the Ship Security Plans are being
implemented.
Records may be kept in any format but should be protected from unauthorized
access or disclosure. 1 documents that shall be available on board at all times
Records of the following activities addressed in the Ship Security Plan must be
kept on board at all times and be made available to the government authorities
upon request for at least the time frame covering the previous 10 ports of call.
--Training , drills and Exercises;
--security threats and security incidents;
--breaches of security
--changes in security level;
Communications relating to the direct security of the ship such as specific threats
to the ship or to port facilities the ship is in, or has been;
--internal audits and reviews of security activities;
--periodic review of the Ship Security Assessment;
--periodic review of the Ship Security Plan;
--implementation of any amendments to the plan; and
--maintenance, calibration and testing of security equipment, if any including
testing of the ship security alert system.
Annual internal audits of the SSP. For each annual audit, a letter certified by
the SSO stating the date the audit was completed
--Annual periodic reviews of the SSA and the SSP maintained.
--Required security records must be protected from unauthorized access or
disclosure.
--Records must be kept in the working language or languages of the ship or
translation in either English, French or Spanish.
--Security related records required under the international requirements and
any additional records specified by a classification society shall be kept for 5
years to allow ‘ internal audit review and to provide evidence of program
compliance for periodic verification.
Page 1 of 4
Prior to transiting the high Risk Area, ship operators and Masters should carry
out a through Risk Assessment to assess the likelihood and consequences of
piracy attacks to the vessel, based on the latest available information. The output
of the Risk Assessment should identify measures for prevention, mitigation and
recovery, which will mean combining statutory regulations with supplementary
measures to combat piracy. It is important that the Risk Assessment is ship and
voyage specific, and not generic.
The primary consideration should be to ensure the safety of the crew. Care
should be taken, when formulating measures to prevent illegal boarding and
external access to the accommodation, that crew members will not be
trapped inside and should be able to escape in the event of another type of
emergency, such as, for example fire.
Careful consideration should be given to the location of a Safe Muster Point
of Citadel. ( See Section 8.13 )
Consideration should also be given to the ballistic protection afforded to the
crew who may be required to remain on the bridge during a pirate attack,
recognizing that pirates increasingly fire at the bridge of a vessel to try to
force it to stop. ( See section 8.3)
10.2.2 – Freeboard
It is likely that pirates will try to board the ship being attacked at the lowest
point above the waterline, making it easier for them to climb onboard. These
points are often on either quarter or at the vessel’s stern.
Experience suggests that vessels with a minimum freeboard that is greater
than 8 metres have a much greater chance of successfully escaping a piracy
attempt than those with less.
A large freeboard will provide little or no protection if the construction of the
Page 2 of 4
ship provides access to pirates seeking to climb onboard, and thus further
protective measures should be considered.
10.2.3-Speed
One of the most effective ways to defeat a pirate attack is by using speed to
try to outrun the attackers and /or make it difficult to board.
To date, there have been no reported attacks where pirates have boarded a
ship that has been proceeding at over 18 knots. It is possible however that
pirate tactics and techniques may develop to enable them to board faster
moving ships.
Ships are recommended to proceed at Full Sea Speed, or at least 18 knots
where they are capable of greater speed, throughout their transit of the High
Risk Area.
It is very important to increase to maximum safe speed immediately after
identifying any suspicious vessel and as quickly as possible in order to try to
open the CPA ( Closest Point of Approach) from any possible attackers and
/or make the vessel more difficult to board.
If a vessel is part of a ‘Group Transit’( see section 7.9 for further details of
Group Transits) within the Internationally Recommended Transit Corridor(
IRTC), speed may be required to be adjusted.
It is recommended that reference should be made to the MSCHOA, NATO
Shipping Centre and MARLO websites for the latest threat guidance
regarding pirate attack speed capability.
Page 3 of 4
For the purposes of the BMP the term piracy includes all acts of violence against
ships, her crew and cargo. This includes armed robbery and attempts to board and
take control of the ship, wherever this may take place. Somali pirates have to date,
sought to hijack a vessel, her cargo and crew and hold them until a ransom
demand is paid. Not all ship Protection Measures discussed in BMP4 may be
applicable to every ship type.
The pirates always carry out surprise attacks and catch the vulnerable
vessels unaware when such vessels are under prepared to repel pirate
attacks. Commonly, two small high speed (up to 25 knots) open boats or
‘Skiffs’ are used in attacks, often approaching from either quarter or the
stern. Skiffs are frequently fitted with 2 outboard engines or a larger single
6hp engine.
Pirate Action Groups operate in a number of different boat configurations. To
date whatever the configuration the attack phase is carried out by skiffs.
Pirate Action Group boat configurations include:
Skiffs only- usually two
Open whalers carrying significant quantities of fuel often towing 2 or
more attack skiffs.
Motherships which have included the very largest of merchant ships,
fishing vessels and dhows.
These Motherships have been taken by the pirates and usually have their
own crew onboard as hostages. Motherships are used to carry pirates,
stores, fuel and attack skiffs to enable pirates to operate over a much
larger area and are significantly less affected by the weather. Attack skiffs
Page 4 of 4
are often towed behind the Motherships. Where the size of the Mothership
allows it, skiffs are increasingly being carried onboard and camouflaged to
reduce chances of interdiction by Naval/ Military forces.
Increasingly, pirates use small arms fire and Rocket Propelled
Grenades(RPGs) in an effort to intimidate Masters of ships to reduce speed
and stop to allow the pirates to board. The use of these weapons is
generally focused on the bridge and accommodation area. In what are
difficult circumstances, it is very important to maintain Full Sea Speed,
increasing where possible, and using careful maneuvering to resist the
attack
Somali pirates seek to place their skiffs alongside the ship being attacked
to enable one or more armed pirates to climb onboard. Pirates frequently
use long lightweight ladders and ropes, or a long hooked pole with a
knotted climbing rope to climb up the side of the vessel being attacked.
Once onboard the pirate ( or pirates) will generally make their way to the
bridge to try to take control of the vessel. Once on the bridge the
pirate/pirates will demand that the ship slows/stops to enable further
pirates to board.
Attacks have taken place at most times of the day. However, many pirate
attacks have taken place early in the morning, at first light. Attacks have
occurred at night, particularly clear moonlit nights, but night time attacks
are less common.
The majority of piracy attacks have been repelled by ship’s crew who have
planned and trained in advance of the passage and applied the BMPs.
Page 1 of 8
11 Pirate Attack
11.1 Examine the implication of piracy attack
If the crew of a vessel suspects that it is coming under a pirate attack there are
specific actions that are recommended to be taken during the approach stage
and the attack stage. It should be noted that the pirates generally do not use
weapons until they are within two cables of a vessel, therefore any period yup
until this stage can be considered as ' approach', and gives a vessel valuable
time in which to activate her defenses and make it clear to pirates that they
have been seen and the vessel is prepared and will resist. Once under pirate
attack with a fear of siege the crew may face following situation:-
Statistics have been gathered to understand how people have reacted in crisis
situation in all walks of life. There is no specific research currently available for
piracy related incidents but it is envisaged that reactions experienced are likely to
be broadly similar. It is stated that in an emergencies, human behavior may be
categorized in three groups:-
Group 1 :- 60% may do little, or may engage in appropriate behaviors,
whilst awaiting the initiatives of others.
Group 2 :- 25% may act rationally, perhaps attacking the threat, closing
doors or warning others.
Group 3 :- 15% may be almost totally paralyzed by the seriousness of the
situation.
Prior to entering the High Risk Area, it is recommended the preparations are made
to support the requirement for increased vigilance by:
Providing additional lookouts for each Watch. Additional lookouts should be
fully briefed.
Considering a shorter rotation of the Watch period in order to maximize
alertness of the lookouts.
Page 2 of 8
Ensuring that there are sufficient binoculars for the enhanced Bridge Team,
preferably anti glare.
Considering use of night vision optics.
Maintaining a careful Radar Watch.
Well constructed dummies placed at strategic locations around the vessel can give
an impression of great numbers of people on watch
Page 3 of 8
Page 4 of 8
when carefully deployed. The barbs on the wire are designed to have a
piercing and gripping action. Care should be taken when selecting
appropriate razor wire as the quality (wire gauge and frequency of barbs) and
type will vary considerably. Lower quality razor wire is unlikely to be
effective. Three main types of razor wire are commonly available:
Unclipped (straight strand)
Spiral (like a telephone cord) and
Concertina (linked spirals).
Page 5 of 8
Reinforced Plastic (GAP) water main, with spray nozzles to produce a water
curtain to cover larger areas.
A Foam can be used, but it must be in addition to a vessel’s standard Fire
Fighting Equipment (FEE) stock. Foam is effective as it is disorientating and
very slippery making it difficult to climb through.
11.2.6 Alarms
Sounding the ship’s alarms/whistle serves to inform the vessel screw that a piracy
attack has commenced and, importantly, demonstrates to any potential attacker
that the ship is aware of the attack and is reacting to it. If approached, continuous
sounding of the vessel’s foghorn/whistle distracts the pirates and as above lets
them know that they have been seen. It is important to ensure that:
The piracy alarm is distinctive to avoid confusion with other alarms,
potentially leading to the crew mustering at the wrong location outside the
accommodation.
Crew members are familiar with each alarm, Including the signal warning of
an attack and an all clear, and the appropriate response to it.
Exercises are carried out prior to entering the High Risk Area.
Page 6 of 8
speed. (Waiting until the ship is attacked before practicing this is too late!)
11.2.7. Closed Circuit Television (CCTV)
Once an attack is underway and pirates are firing weaponry at the vessel, it is
difficult and dangerous to observe whether the pirates have managed to gain
access. The use of CCTV coverage allows a degree of monitoring of the progress of
the attack from a less exposed position:
Consider the use of CCTV cameras to ensure coverage of vulnerable areas,
particularly the poop deck.
Consider positioning CCTV monitors at the rear of the bridge in a protected
position.
Further CCTV monitors could be located at the Safe Muster Point/Citadel
(see section 8.13)
Recorded CCTV footage may provide useful evidence after an attack
11.2.9. Approach Stage – If not already at full speed, increase to maximum to open
the distance. Try to steer a straight course to maintain a maximum speed. Initiate
the ship’s pre-prepared emergency procedures.
Activate the Emergency Communication plan
Sound the emergency alarm and make a ‘Pirate Attack’ announcement in
accordance with the Ship’s Emergency Plan.
Report the attack Immediately to authorities ashore.
Page 7 of 8
Activate the Ship Security Alert System (SSAS). Which will alert your
Company Security officer and Flag State. Make a ‘Mayday’ call on VHF Ch.
16.
Page 8 of 8
stimulant), so remaining calm and cooperating fully will greatly reduce the
risk of harm.
If the bridge/engine room is to be evacuated the main engine should be
stopped and all way taken off the vessel if possible (and if navigationally safe
to do so). All remaining crew members should proceed to the designated Safe
Muster Point with their hands visible.
Page 1 of 1
Page 1 of 1