SDSDF Handout
SDSDF Handout
04
Table Of Contents
Page
No. Topics
No.
Course Introduction 3
Competences
Maintain the conditions set out in a ship security plan (Table A-VI/6-2)
Contribute to the enhancement of maritime security through heightened
awareness (Tables A-VI/6-1)
1 Maritime security terms and definitions 4
Page 1 of 59
Revision No. 04
List of References 57
List of Figures 58
Page 2 of 58
Revision No. 04
Course Introduction
STCW Requirement
Regulation VI/6 and Section A-VI/6
Training Outcome
STCW Competence Requirement
Page 3 of 58
Revision No. 04
COMPETENCES
Maintain the conditions set out in a ship security plan (Table A-VI/6-2)
Contribute to the enhancement of maritime security through heightened
awareness (Tables A-VI/6-1)
Topic 1
Maritime security terms and definitions
1. Cargo Theft- The criminal taking of any cargo including, but not limited to, goods,
chattels, money, or baggage that constitutes, in whole or in part, a commercial
shipment of freight moving in commerce.
2. Company Security Officer (CSO) - The person designated by the Company for
ensuring that a ship security assessment is carried out; that a ship security plan
is developed, submitted for approval and thereafter implemented and
maintained and for liaison with port facility security officers and the ship security
officer.
3. Competent Authority - means an organization designated by an Administration to
receive and act on a ship-to-shore security alert.
4. Company - means the owner of the ship or any other organization or person such
as the manager, or the bareboat charterer, who has assumed the responsibility for
operation of the ship from the owner of the ship covered under requirements of the
International Safety Management (ISM) Code.
5. Contingency Plan- Contingency Plan provides guidelines and instructions that
assist in making an efficient response to (security related) emergency situations
onboard ships.
6. Contraband Smuggling- is the illegal transportation of any item that, relating to
its nature, is illegal to be possessed or sold.
7. Contracting Government - generally means a Government that has agreed to be
bound by any IMO Convention, e.g. the SOLAS Convention, or other binding
instrument adopted by the IMO the simpler term Government is generally used in
place of Contracting Government unless there is a direct quotation from SOLAS
Chapter XI-2 or from the ISPS Code Part A or Part B. Depending on the context
Government can also be used in the IMO Maritime Security Measures with either
the term Administration or Designated Authority, or with both, or in place of either
or both.
8. Declaration of Security (DOS) - means an agreement reached between a ship
and either a port facility or another ship with which it interfaces specifying the
security measures each will implement.
Page 4 of 58
Revision No. 04
20. Seafarers with Designated Security Duties- Refer to the shipboard personnel
having specific security duties and responsibilities and able to understand their
responsibilities for ship security as described in the SSP and shall have sufficient
knowledge and ability to perform their assigned duties.
21. Security incident - means any suspicious act or circumstance threatening the
security of a ship, including a mobile offshore drilling unit and a high speed craft,
or of a port facility or of any ship/port interface or any ship to ship activity.
22. Security level - means the qualification of the degree of risk that a security
incident will be attempted or will occur.
23. Security Reporting Procedure- Merchant vessel voluntary reporting schemes
are established to increase security and provide anti-piracy support to maintain the
freedom of navigation to all vessels. Reporting guidelines and procedures were
established depending on the area of concerns.
24. Ship Security Officer (SSO) - The person on board the ship, accountable to the
master, designated by the Company as responsible for the security of the ship,
including implementation and maintenance of the ship security plan and for
liaison with the company security officer and port facility security officers.
25. Ship Security Plan (SSP) - means a plan developed to ensure the application of
measures on board the ship designed to protect persons on board, cargo, cargo
transport units, ship’s stores or the ship from the risks of a security incident.
26. Ship to ship activity - means any activity not related to a port facility that involves
the transfer of goods or persons from one ship to another.
27. Ship/port interface - means the interactions that occur when a ship is directly and
immediately affected by actions involving the movement of persons, goods or the
provisions of port services to or from the ship.
28. Stowaways and refugees- A ‘stowaway’ is ”a person who, at any port or place in
the vicinity thereof, hides himself in a ship without the consent of the shipowner or
the Master or any other person in charge of the ship and who is on board after the
ship has left that port or place”, whereas a ‘refugee’ is ”someone who, due to fear
of persecution for reasons of race, nationality, political beliefs or other similar
factors, is unable or does not want to stay in the country where he is and wishes to
move to a new country
29. Terrorism- Maritime terrorism is the undertaking of terrorist acts and activities
within the maritime environment, using or against vessels or fixed platforms at sea
or in port, or against any one of their passengers or personnel, against coastal
facilities or settlements, including tourist resorts, port areas and port towns or
cities.
30. Threat - is the likelihood that an unlawful act will be committed against a particular
target, based on a perpetrator’s intent and capability.
Page 6 of 58
Revision No. 04
Topic 2
International maritime security policy and responsibilities
Figure 3: 9/11
Attacks
Page 7 of 58
Revision No. 04
Figure 5: SOLAS
Consolidated Edition
Page 8 of 58
Revision No. 04
c) ISPS Code: “International Ship and Port Facility Security Code”. Formed the
basis for a comprehensive mandatory security regime for international shipping
and entered into force on 1 July 2004. The Code is divided into two sections, Part
A and Part B.
a. Part A: Mandatory. Outlines detailed maritime and port security-related
requirements which SOLAS contracting governments, port authorities and
shipping companies must adhere to, in order to be in compliance with the
Code.
b. Part B. Provides a series of recommendatory guidelines on how to meet the
requirements and obligations set out within the provisions of Part A.
Page 9 of 58
Revision No. 04
The IMO Maritime Safety Committee (MSC) shall consider any matter within the
scope of the Organization concerned with matters directly affecting maritime safety.
The MSC has developed a code for the management of ships which will ensure that
agreed operational procedures are in place and followed by the ship and shore-side
staff. The MSC release the resolutions and circulars used for clarification,
interpretation or guidance on its various codes and conventions.
Unlawful Acts
Measures to prevent unlawful acts which threaten the safety
Res. A. 584 (14) of ships and the security of their passengers and crews.
(1985)
Measures to prevent unlawful acts against passengers and
MSC/Circ.443
crews on board ships. (1986)
MSC/Circ.754 Passenger ferry security. (1996)
Maritime Terrorism
Review of measures and procedures to prevent acts of
Res. A.924 (22) terrorism which threaten the security of passengers and
crews and the safety of ships. (2002)
Piracy and Armed Robbery
Measures to prevent acts of piracy and armed robbery
Res. A.545 (13) against ships. (1983) (Note: with additional guidelines in
A.683 (17) & A.738 (18))
Guidance to ship owners and ship operators, shipmasters
MSC.1/ Circ.1334 and crews on preventing and suppressing acts of piracy and
armed robbery against ships. (2009)
Revised interim guidance to ship owners, ship operators
MSC.1/ Circ.1405 and shipmasters on the use of privately contracted armed
(Rev.2) security personnel on board ships in the high risk
area.(2012)
Best Management Practices for Protection against Somalia
MSC.1/Circ.1339
Based Piracy. (2011)
Piracy and armed robbery against ships in waters off the
Res. A.1044 (27)
coast of Somalia. (2011)
Figure 7: IMO Resolution and Circulars related to maritime security
Page 10 of 58
Revision No. 04
The Guide to Maritime Security and the ISPS Code provides consolidated
guidance on the implementation of the security-related amendments to the SOLAS
Convention Chapter XI-2 and the International Ship and Port Facility Security (ISPS)
Code. The guidance in the Manual is addressed primarily to all:
b) Port facility. Port facility employees who exercise the responsibilities that the
Maritime Security Measures place on port facilities; and
Contracting Governments have, under the provisions of chapter XI-2 and part A of
this Code, various responsibilities, which, amongst others, include:
a) Setting the applicable security level;
b) Approving the ship security plan and relevant amendments to a previously
approved plan;
c) Verifying the compliance of ships with the provisions of chapter xi-2 and part a of
this code and issuing to ships the international ship security certificate;
d) Determining which of the port facilities located within their territory are required to
designate a port facility security officer who will be responsible for the
preparation of the port facility security plan;
e) Ensuring completion and approval of the port facility security assessment and of
any subsequent amendments to a previously approved assessment;
f) Approving the port facility security plan and any subsequent amendments to a
previously approved plan; and
g) Exercising control and compliance measures;
h) Testing approved plans; and
i) Communicating information to the international maritime organization and to the
shipping and port industries.
Page 11 of 58
Revision No. 04
Any Company operating ships to which chapter XI-2 and part A of this Code apply
has to designate a Company Security Officer for the Company and a Ship Security
Officer for each of its ships. The duties, responsibilities and training requirements of
these officers and requirements for drills and exercises are defined in part A of this
Code. The Company shall:
a) Ensure that the Ship Security Plan (SSP) contains a clear statement
emphasizing the Master’s authority.
b) Establish in the ship security plan that the Master has the overriding authority
and responsibility to make decisions with respect to the safety and security of the
ship and to request the assistance of the Company or of any Contracting
Government as may be necessary.
c) Ensure that the Company Security Officer (CSO), the Master and the Ship
Security Officer (SSO) are given the necessary support to fulfill their duties and
responsibilities in accordance with chapter XI-2 and this Part of the Code.
Page 12 of 58
Revision No. 04
Page 13 of 58
Revision No. 04
Page 14 of 58
Revision No. 04
Page 15 of 58
Revision No. 04
Topic 3
Maritime Security Levels and their impact on security measures and
procedures
Maritime Security (Marsec) Level refers to the degree of risk that a security
incident will occur or be attempted. The ISPS Code identifies three levels of risk which
are now used internationally.
1. Security Level 1: means the level for which minimum appropriate protective
security measures shall be implemented at all times. Normal; the level at which
ships and port facilities normally operate.
2. Security Level 2: means the level for which appropriate additional protective
security measures shall be maintained for a period of time as a result of the
heightened risk of a security incident.
3. Security Level 3: means the level for which further specific protective security
measures shall be maintained for a limited period of time when a security
incident is probable or imminent, although it may not be possible to identify a
specific target.
A ship is required to act upon the security levels set by Contracting Governments as
set out below as established by the SSP.
1. Security Level 1 the following activities shall be carried out, through
appropriate measures, on all ships in order to identify and take preventive
measures against security incidents.
a) Ensuring the performance of all ship security duties;
b) Controlling access to the ship;
c) Controlling the embarkation of persons and their effects;
d) Monitoring restricted areas to ensure that only authorized persons have
access;
e) Monitoring of deck areas and areas surrounding the ship;
f) Supervising the handling of cargo and ship’s stores; and
g) Ensuring that security communication is readily available.
Figure 9: Security Measures and Procedures; Gangway watch & receiving of ships stores
Page 17 of 58
Revision No. 04
Topic 4
Security Reporting Procedures
*** Note: See Topic 2.3.C. Responsibilities of Persons with Respect to Security;
SSO and Shipboard Personnel Having Specific Security
SSPs are required to document the procedures for reporting security incidents and
threats to Administrations and other government organizations.
Shipboard personnel having specific security duties need to report to the SSO or
Officer of the watch (OOW) security incidents observed onboard. Security incidents
generally can fall into two categories:
1. Require reporting to, and investigation, by the SSO. Those of a less serious
nature but require reporting to, and investigation, by the SSO can include:
a. Unauthorized access to the ship caused by breaches of access control points
or inappropriate uses of passes;
b. Damage to equipment through sabotage or vandalism;
c. Unauthorized disclosure of a SSP;
d. Suspicious behavior near the ship when at a port facility;
e. Suspicious packages near the ship when at a port facility; and
f. Unsecured access points to the ship.
SOLAS regulation XI-2/9.2.2 requires every ship to which SOLAS chapter XI-2
applies intending to enter the port of another Contracting Government:
a. To provide the information described in SOLAS regulation XI-2/9.2.1 on the
request of the officers duly authorized by that Government.
b. The master may decline to provide such information on the understanding
that failure to do so may result in denial of entry into port.
Topic 5
Procedures and requirements for drills and exercises
Prior to entry into the High Risk Area (Piracy) it is recommended that the crew
should be fully briefed on the preparations and a drill conducted.
a) The Ship Security Plan (SSP) should be reviewed;
b) All personnel briefed on their duties;
c) Familiarity with the alarm signifying a piracy attack;
d) An all-clear and the appropriate response;
e) Testing the vessel’s Ship Protection Measures, including testing of the security of
all access points.
Note: See Topic 2.2 IMO Resolutions and Circulars related to Piracy and Armed
robbery.
Page 19 of 58
Revision No. 04
Page 20 of 58
Revision No. 04
Topic 6
Procedures for conducting inspections and surveys
A) An SSA should address the following elements on board or within the ship:
a) Physical security;
b) Structural integrity;
c) Personnel protection systems;
d) Procedural policies;
e) Radio and telecommunication systems, including computer systems and
networks; and
f) Other areas that may, if damaged or used for illicit observation, pose a risk to
persons, property, or operations on board the ship or within a port facility.
B) Conducting and Documenting SSAs. The SSA is required to include the following
elements:
a) An on-scene security survey;
b) Identification of existing security measures, procedures and operations;
c) Identification and evaluation of important shipboard operations;
d) Identification of possible threats to important shipboard operations and the
likelihood of their occurrence;
e) Identification of weaknesses including human factors in the infrastructure,
policies and procedures.
Page 21 of 58
Revision No. 04
f) Supervising the handling of cargo and the delivery of ship’s stores; and
g) Ensuring that ship security communication, information, and equipment are
readily available.
1. Assessment tools
a) Risk-based decision-making is one of the best tools to complete a security
assessment and to determine appropriate security measures for a vessel. Risk
based decision-making is a systematic and analytical process to consider the
likelihood that a security breach will endanger an asset, individual, or function
and to identify actions to reduce the vulnerability and mitigate the consequences
of a security breach. The focus of the Ship Security Officer will be more
operational and less detailed than that of the Company Security Officer.
b) Ship security survey checklist. Develop a ship security survey checklist that
reflects the prioritized scenarios, existing measures assumed to be in place and
critical operations. The use of checklists to perform assessments of security in
day-to-day operations should include categories such as the following:
a. General layout of the ship.
b. Location and function of each actual or potential access point to the ship.
c. Location of areas that should have restricted access, such as the bridge,
engine room, radio room, etc.
d. Open deck arrangement including the height of the deck above water.
e. Emergency and stand-by equipment available to maintain essential
services.
f. Numerical strength, reliability, and security duties of the ship’s crew.
g. Existing security and safety equipment for protecting the
passengers and crew.
h. Existing arrangements with private security companies for
providing ship and waterside security services.
i. Existing protective measures and procedures in practice, including
inspection, control and monitoring equipment, personnel
identification documents and communication, alarm, lighting, access
control and other appropriate systems.
Page 22 of 58
Revision No. 04
Note: See Competence: Undertake regular inspections of the ship; Topic 15 & 16
for detailed procedures for control and monitoring of the ship activities
specified in the SSP.
Topic 7
Security-related contingency plans and the procedures for
responding to security threats or breaches of security
For each Security Level, the ship owner or operator will ensure the SSO and ship
security personnel are able to respond to security threats or breaches of security and
maintain critical ship and ship-to-facility interface operations, including:
a) Prohibiting entry into affected area;
b) Denying access to the ship, except to those responding to the emergency;
c) Implementing Security Level 3 security measures throughout the ship;
d) Stopping cargo-handling operations; and
e) Notifying shore side authorities or other ships of the emergency;
f) Evacuating the ship in case of security threats or breaches of security;
g) Reporting security incidents including: Notification of suspicious activities and
notification of breaches of security
h) Briefing all ship personnel on possible threats and the need for vigilance,
soliciting their assistance in reporting suspicious persons, objects, or activities;
i) Securing non-critical operations in order to focus response on critical operations.
Page 23 of 58
Revision No. 04
1. Damage to, or destruction of, the ship or of a port facility, e.g. by explosives
devices arsons, sabotage or vandalism
2. Hijacking or seizure of the ship or of persons on board
3. Attacks by armed robbers
4. Tampering with cargo, essential ship equipment or systems or ship’s store
5. Unauthorized access or use including presence of stowaways
6. Smuggling weapons or equipment, including weapons of mass destruction
7. Use of the ship to carry persons intending to cause security incident or their
equipment
8. Use of the ship itself as a weapon or as a means to cause damage or destruction
9. Attacks from seaward while at berth or at anchor
10. Attacks while at sea.
COMPETENCES
Recognition of security risks and threats (Table A-VI/6-2)
Recognition of security threats (Table A-VI/6-1)
Topic 8
Security documentation, including the Declaration of Security (DoS)
Page 24 of 58
Revision No. 04
1. Verification is conducted to ensure that the ship’s security system and any
security equipment required and the approved SSP are in satisfactory
condition, maintained and fit for the service for which the ship is intended.
2. Security Records
Administrations should specify the security records that a ship is required to keep
and be available for inspection including the period for which they should be kept.
Page 26 of 58
Revision No. 04
A Security Daily Occurrence Log is maintained by the SSO and is made available
to the Master as required. Upon completion, all Daily Occurrence Logs are to be
retained onboard for one year, after which they are to be forwarded to the CSO.
1. Training - For each security training session, the date of each session, duration
of session, a description of the training, and a list of attendees;
2. Drills and exercises - For each drill or exercise, the date held, description of drill
or exercise, list of participants; and any best practices or lessons learned which
may improve the SSP;
3. Incidents and breaches of security - Date and time of occurrence, location
within the port, location within the ship, description of incident or breaches, to
whom it was reported, and description of the response;
4. Changes in Security Levels - Date and time of notification received, and time of
compliance with additional requirements;
5. Maintenance, calibration, and testing of security equipment - For each
occurrence of maintenance, calibration, and testing, the date and time, and the
specific security equipment involved;
6. Security threats - Date and time of occurrence, how the threat was
communicated, who received or identified the threat, description of threat, to
whom it was reported, and description of the response;
7. Declaration of Security (DoS) - Manned ships must keep on board a copy of
the last 10 DoS and a copy of each continuing DoS for at least 90 days after the
end of its effective period; and
8. Annual audit of the SSP - For each annual audit, a letter certified by the SSO
stating the date the audit was completed.
Topic 9
Techniques used to circumvent security measures
Page 27 of 58
Revision No. 04
b) Use long lightweight ladders and ropes. Pirates frequently use long
lightweight ladders and ropes, or a long hooked pole with a knotted climbing rope
to climb up the side of the vessel being attacked. Once onboard the pirate (or
pirates) will generally make their way to the bridge to try to take control of the
vessel.
c) Boarding the lowest part of the vessel. It is likely that pirates will try to board
the ship being attacked at the lowest point above the waterline, making it easier
for them to climb onboard. Ships with slower speed e.g. 17 knots and below are
target for attacks.
d) Use of fire arms. Pirates use small arms fire and Rocket Propelled Grenades
(RPGs) in an effort to intimidate Masters of ships to reduce speed and stop to
allow the pirates to board. The use of these weapons is generally focused on the
bridge and accommodation area.
Topic 10
Recognition of potential security threats
Page 29 of 58
Revision No. 04
Page 30 of 58
Revision No. 04
1. Crew responsibilities
The ships security lies with the crew responsibilities on board. To be able to
recognize the potential security threats it is important that the crew shall be
observant to recognize such persons suspicious patterns of behavior. It
requires the crew to be:
a. Proactive and to adopt a level of controlled curiosity or suspicion in the way they
observe their work environment.
b. To have the knowledge and motivation to react appropriately by bringing their
concerns to the attention of the OOW, master or the SSO.
Topic 11
Recognition of weapons, dangerous substances and devices
*** Note: See Topic 14: Methods for physical searches and non-intrusive
inspections
1. Firearms
A firearm is a portable gun (a barreled ranged weapon) that inflicts damage on
targets by launching one or more projectiles driven by rapidly expanding high-
pressure gas produced chemically by exothermic combustion (deflagration) of
propellant within an ammunition cartridge.
machined into the rear of the barrel, and a magazine so they can be used to fire
more than one round.
b) Long guns. A long gun is generally any firearm
that is larger than a handgun and is designed to
be held and fired with both hands, either from
the hip or the shoulder. Long guns typically have
a barrel between 10 and 30 inches.
c) Rifles, shotguns and machine guns. Most modern long guns are either rifles or
shotguns. A rifle is a portable, long-barreled firearm designed for long-range
precision shooting and with a barrel that
has a helical pattern of grooves ("rifling")
cut into the bore walls. A shotgun (also
known as a scattergun) is a firearm that is
usually designed to be fired from the
shoulder, which uses the energy of a fixed
shell to fire a number of small spherical
pellets called shot, or a solid projectile
called a slug. A machine gun is a fully
automatic emplaceable weapon, most
often separated from other classes of Figure 14: Rifles and shotguns
automatic weapon by the use of belt-fed
ammunition.
Page 32 of 58
Revision No. 04
2. Explosives
An explosive (or explosive material) is a reactive substance that contains a great
amount of potential energy that can produce an explosion if released suddenly,
usually accompanied by the production of light, heat, sound, and pressure.
Explosive devices are the most common terrorist weapons because their materials
and technology are more readily available than those of biological, chemical,
nuclear, or radiological weapons. Terrorists can use either manufactured or
improvised explosive devices (IED).
Page 33 of 58
Revision No. 04
Topic 12
Crowd management and control techniques
One of the most difficult aspects of developing effective security, emergency, risk
and crisis management policies, plans, procedures and exercises, is accurately
anticipating human behavior under extreme or threatening circumstances.
Ship Security Officers and crew members should be familiar with the basic
patterns of behavior of people in groups during time of crisis. Demonstrate to learners
the proper way to control the crowd on board in case there is a bomb threat.
Categories of human behavioral response during evacuation are as follows:
a) Denial: The first reaction will probably be: “This can’t be happening!” But an
emergency or accident happen anytime, and it can result in a situation where
your life is at risk.
b) Panic: Once you get past denial, there is a strong chance you may panic. This
is when judgment and reasoning deteriorate to the point where it can result in
self-destructive behavior.
c) Stereotypical behavior: This is a form of denial in which victims fall back on
learned behavior patterns, no matter how inappropriate they are. The leader
may decide to continue in that role, even though he/she has no idea of what to
do. Sadly, the underling may also revert to that subordinate role, even though
he/she may be better prepared mentally.
Page 35 of 58
Revision No. 04
Topic 13
Handling security-related information and security related
communication
Page 36 of 58
Revision No. 04
Topic 14
Methods for physical searches and non-intrusive inspections
a) Physical searching
Persons. Physical searching is best carried out in a screened off area, as
privacy minimizes embarrassment and increases effectiveness. A physical
search involves using touch to feel for possible concealed items hidden under
a person’s clothes. One officer should be delegated to observe people
waiting and note suspicious behavior and allocate persons to available
searchers to ensure no over-loading.
Baggage. A physical search of baggage, using a gloves and a stick, should
include a check for false compartments, often used for the smuggling of
weapons and devices. Attention should be paid to any tampering or repair to
a case, non-standard or unmatched case components, and also to greasy
stains or small holes in the case exterior.
b) Metal Detection
Persons. People can be screened by passing through an archway pre-set to
trigger an alarm if a certain amount of metal is carried through. Hand-held
Page 37 of 58
Revision No. 04
COMPETENCES
Undertake Regular Security Inspections of the Ship (Table A-VI/6-2)
Understanding of the need for and methods of maintaining security awareness
and vigilance (Table A-VI/6-1)
Topic 15
Techniques for monitoring Restricted Areas (RA)
Page 39 of 58
Revision No. 04
Remarks:
a = Increasing the frequency and intensity of monitoring and access controls on existing restricted
areas.
b = Providing continuous monitoring of each area, using surveillance equipment
c = Dedicating additional personnel to guarding or patrolling restricted areas
d = Posting personnel to continuously guard restricted areas and/or assigning personnel to
continuously patrol restricted areas and areas adjacent to restricted areas.
e = Restricting access to additional areas
** = Doors in escape routes must be capable of being opened without keys from the direction
for which escape is required.
Topic 16
Controlling access to the ship and to restricted areas onboard
Restricted areas mean locations identified in a vessel that require limited access
and a higher degree of security protection. The SSP should identify the restricted
areas to be established on the ship and the security measures to be taken.
Restricted areas may include:
MARSEC Level
Measures for Controlling Access to the Ship
1 2 3
1. Access points are secured** or continuously attended to
yes yes a yes a
prevent unauthorized access.
2. Lock or otherwise prevent access to unattended spaces
that adjoin areas to which passengers and visitors have yes yes yes
access
3. Weather-deck access vents, storage lockers, and doors
to normally unmanned spaces (such as storerooms,
yes yes yes
auxiliary machinery rooms, etc.) are locked** or
precautions taken to prevent unauthorized access.
4. Limit entry to the ship to a minimum number of access
no yes yes b
points. ***
5. Establishing a restricted area on the shore side of the
no yes yes
ship, in close cooperation with the port facility.
6. Carrying out a full or partial search of the ship no no yes c
7. Moving the ship and/or Evacuating the ship no no yes
8. Initiating measures, including the slow revolution of the
ship’s propellers, if practicable, to deter underwater no no yes
access to the hull of the ship.
Remarks:
a = Assign additional personnel at appropriate access points as designated in the security plan.
b = Limit entry to a single access point when possible.
c = Preparing for a full or partial search of the ship and searching restricted areas as part of the
search
** = Doors in escape routes must be capable of being opened without keys from the direction for
which escape is required.
***= While not restricting egress from the ship in the event of an emergency.
Page 41 of 58
Revision No. 04
Topic 17
Inspection methods for effective monitoring of deck areas and areas
surrounding the ship
The ship should have the capability to monitor the ship, including the restricted areas
on board and areas surrounding the ship. Such monitoring capabilities may include use
of:
a) Lighting;
b) Watch-keepers, security guards and deck watches including patrols;
c) Automatic intrusion detection devices and surveillance equipment.
MARSEC Level
Protective Measures
1 2 3
1. Use security lookouts and/or security patrols no yes a yes a
2. Light deck and ship access points during the period
between sunset and sunrise and periods of limited
yes yes b yes c
visibility sufficiently to allow visual identification of
persons seeking access to the ship **
3. In port – Light is provided to allow crewmembers to see
beyond the ship, both pier side and waterside; including yes yes b yes c
areas on and around the ship
4. Underway - maximum lighting available consistent with
yes yes b yes c
safe navigation and international regulation
5. In liaison with the port facility, perform waterside boat
patrols to deter waterside access to ship and foot no yes yes d
patrols or vehicle patrols on the shore side
6. Use divers to inspect the underwater pier structures
prior to the ship’s arrival, upon the ship’s arrival, and in
no no yes d
other cases deemed necessary and prepare for
underwater inspection of the hull
Remarks:
a = Increase the number and frequency of security patrols during periods of reduced ship
operations to ensure continuous monitoring and waterside boat patrols to ensure
continuous monitoring.
b = At these higher security levels, additional lighting will be coordinated with the waterfront
facility to provide additional shore side lighting. Additional lighting may include:
Using spotlights and floodlights to enhance visibility of the deck and areas
surrounding the ship and using lighting to enhance visibility of the surrounding
water and waterline.
c = Switching on all lights, illuminating the vicinity of the ship
d = If required by port facility or if in response to specific threat information.
Topic 18
Inspection methods relating to the cargo and ship’s store
b) Delivery of Ship’s Stores. The security measures relating to the delivery of ship’s
stores should:
a. Ensure checking of ship’s stores and package integrity;
b. Prevent ship’s stores from being accepted without inspection;
c. Prevent tampering; and
d. Prevent ship’s stores from being accepted unless ordered.
MARSEC Level
Protective Measures
1 2 3
1. Routinely check cargo, ship stores, and cargo spaces
yes yes a yes a
prior to and during cargo handling
2. Use of scanning/detection equipment, mechanical
yes yes b yes
devices, or canines to check cargo.
3. Coordinate security measures with the shipper or other
responsible party in accordance with an established yes yes b yes
agreement and procedures
4. Verify non-containerized cargo against the manifest yes all all
5. Verify the container identification numbers of loaded/
all all all
empty containers against the manifest
6. Inspect ship’s stores and provisions yes yes b all
7. In liaison with the facility:
Ensure a defined percentage of vehicles to be
loaded aboard car carriers, RO-RO and
yes yes b all
passenger ships are screened prior to loading
Check seals or other methods used to prevent
tampering
8. Restricting or suspending cargo and ship store
no no yes
operations
9. Refusing to accept ship stores on board no no yes
10. Being prepared to cooperate with responders and
no no yes
facilities
11. Verify the inventory and location of any hazardous
no no yes
materials carried on board
Remarks:
a = Increasing the frequency and detail of checking cargo, ship stores, and cargo spaces.
This will ensure that only the intended cargo, container, or other cargo transport units
are loaded
b = Increase the frequency ,detail, and/or enhance
Page 44 of 58
Revision No. 04
Topic 19
Methods for controlling the embarkation, disembarkation
Page 45 of 58
Revision No. 04
MARSEC Level
Protective Measures
1 2 3
1. Verify reason personnel are embarking the ship by
using joining instructions, tickets, boarding passes,
yes yes yes
work orders, pilot orders, surveyor’s orders, visitor
badges, government identification, or other means.
2. Segregate embarking passengers from disembarking
yes yes yes
passengers
3. Suspending embarkation and disembarkation no no yes
4. Positively identify crewmembers, vendors, visitors, and
yes yes yes
other personnel prior to each embarkation.
5. Denying access to visitors who do not have a verified
no yes yes
destination
6. Verify arriving crew as authorized to serve aboard the
yes yes all
ship.
7. Inspect persons, baggage, carry-on items, and
personal gear for prohibited weapons, incendiaries, yes a yes b all
and explosives. **
8. Assign personnel to guard designated inspection
no yes yes
areas.
9. Escort all service providers or other personnel needed
no c yes c yes c
aboard to provide essential services to the ship.
Remarks:
a = This may be accomplished by random inspections, such as 5-20% or some other
method addressed in the ship security plan.
b = @ Increase the frequency and detail of screening people, personal effects, and
vehicles being embarked or loaded onto the ship {The company should note what
increase is appropriate for Security Level 2}
c = Access is granted only to those responding to the security incident or threat thereof
and being prepared to cooperate with the responders and facilities.
** = See Competence 2.1.7 “Methods of Search for Persons and Baggage Screening” for
additional information.
Note:
Visitor’s Logbook. All authorized persons allowed onboard must fill and sign the
visitor’s logbook upon completing the required procedures.
Security briefings provided to all persons on board, prior to departing, on any
specific threats and the need for vigilance and reporting suspicious persons,
objects, or activities.
Page 46 of 58
Revision No. 04
COMPETENCE
Proper Usage of Security Equipment and System (Table A-VI/6-2)
Topic 20
Types of security equipment and systems
threat or has been compromised. Ship security alerts can be activated in the event
of any serious security incident including acts of piracy and armed robbery against
the ship.
a) Activation Point:
a. Be capable of being activated from the navigation bridge and in at least
one other location;
b. Have its activation points designed so as to prevent the inadvertent
initiation of an alert.
b) Note:
a. SSP must include procedures to be used including testing, activation,
deactivation and resetting to limit false alerts.
b. A Master may use a covert (or secret) alarm (i.e. one such as a VHF
broadcast which makes no attempt to deny knowledge of its activation) in
addition to a covert alarm as a means of discouraging a security threat
from becoming a security incident.
Page 48 of 58
Revision No. 04
Ships fitted with AIS are expected to maintain AIS in operation at all times except
where international agreements, rules or standards provide for the protection of
navigational information. The regulation requires that AIS shall:
a) Provide information – including the ship's identity,
type, position, course, speed, navigational status
and other safety-related information – automatically
to appropriately equipped shore stations, other
ships and aircraft;
b) Receive automatically such information from
similarly fitted ships;
c) Monitor and track ships; and
d) Exchange data with shore-based facilities.
A. Searching/Screening Equipment
a) Hand-Held Metal Detector. Hand Held Metal Detector is an active hand-held
metal detector designed to detect metallic ferrous, non-ferrous and stainless
steel weapons, contraband or other metal objects concealed or carried on a
person.
b) Explosive Vapor Detector (EVD). Explosive detection equipment able to detect
explosives of small magnitude. The detection is accomplished by sampling non-
visible "trace" amounts of particulates.
c) Archway Metal Detector. Archway Metal Detector used for security screening at
access points to detect concealed metal weapons on a person's body.
d) X-Ray Baggage Scanning Machine. Modern equipment is capable of producing
images of good definition and penetration. However, X-ray examination may not
detect explosives and plastic weapons nor will it allow identification of the actual
liquid in bottles or other containers.
Page 50 of 58
Revision No. 04
e) Wooden stick / gloves. A stick made of wood used for searching moving
objects in the hand luggage instead of actually touching them (sometimes with a
flashlight).
The Ship Protection Measures described in Best Management Practices (BMP) are
the most basic that are likely to be effective. Owners may wish to consider making
further alterations to the vessel beyond the scope of this booklet, and/or provide
additional equipment, and/or manpower as a means of further reducing the risk of piracy
attack. If pirates are unable to board a ship they cannot hijack it.
a. Watch keeping and Enhanced Vigilance. Providing additional lookouts for each
watch schedule that are fully briefed. Considering a shorter rotation of the Watch
period in order to maximize alertness of the lookouts. Maintaining a careful Radar
watch.
b. Control of access to bridge, accommodation and machinery spaces. It is very
important to control access routes to deter or delay pirates who have managed to
board a vessel and are trying to enter accommodation or machinery spaces.
c. Physical barriers (razor wires/ electrified barriers) make it as difficult as possible to
gain access to vessels by increasing the height and difficulty of any climb for an
attacking pirates.
d. Water Spray and Foam Monitors. The use of water spray and/or foam monitors
(including fire hoses and nozzles) has been found to be effective in deterring or
delaying pirates attempting to board a vessel.
e. Safe Muster Points / Citadels. A safe muster point is a designated area chosen to
provide maximum physical protection to the crew, preferably low down within the
vessel. A Citadel is designed and constructed that in the event of imminent boarding
by pirates, all crew will seek protection to resist a determined pirate trying to gain
entry for a fixed period of time.
f. Armed Private Maritime Security Contactors. The use, or not, of armed Private
Maritime Security Contractors onboard merchant vessels is a matter for individual
ship operators to decide following their own voyage risk assessment and approval of
respective Flag States.
Figure 35: Control access to Bridge & Physical Barrier; Razor Wires
Page 53 of 58
Revision No. 04
Figure 36: Security Equipment & System for Pirates and Armed Robbers
Topic 21
Testing, calibrating and maintaining security systems and equipment
1. Requirements
ISPS Code Part B, 13.3.9
Page 54 of 58
Revision No. 04
For the Ship Security Officer, the focus should be on the tasks and procedures
required to support such equipment while the vessel is at sea.
The Company Security Officer shall develop a plan for maintenance, calibration
and testing of security equipment of security related equipment based upon the ship
design, structure and equipment available.
Page 55 of 58
Revision No. 04
LISTS OF REFERENCES
IMO References (R)
R1 International Convention on Standard and Training for Certification and
Watchkeeping (STCW), as amended
R2 International Convention for the Safety of life at Sea (SOLAS) Chapter XI-1 and
XI-2, as amended
R3 IMO Guide to Maritime Security and the ISPS Code (2012 edition)
R4 International Labour Organization. Seafarers’ Hours of Work and the Manning
Convention, (latest edition) (No. 180)
R5 International Labour Organization. Seafarers’ Identity Documents Convention
(Revised) (No. 185) Facility Security Code; London: ICS
R6 International Ship and Port Facility (ISPS) Code
R7 International Maritime Organization (2009) “Guidance to Shipowners, Companies
Ship Operators, Shipmasters and Crews’ on Preventing and Suppressing Acts of
Piracy and Armed Robbery Against Ships”
Bibliography (B)
B1 Best Management Practices (BMP 4) for Protection against Somalia Based Piracy
(Published by Witherby Publishing Group Ltd. Edinburgh, Scotland U.K.)
B2 ICS Guidance for Ship Owners, Ship Operators and Masters on the Protection of
Ships from Terrorism and Sabotage
B3 International Chamber of Shipping. Maritime Security: Guidance for Ship
Operators on the IMO International Ship and Port Facility Security Code.London:
ICS.(latest edition)
B4 International Chamber of Shipping. Model Ship Security Plan. London: ICS.(latest
edition)
B5 International Chamber of Shipping. International Shipping Federation. Pirates and
Armed Robbers: A Master's Guide.London: Marisec Publications. (latest edition)
B6 National Science and Technology Council. (1999). Intermodal Cargo
Transportation: Industry Best Security Practices. Washington, D.C
B7 Ship Security Assessment Guideline by Norwegian Ship Association
Page 56 of 58
Revision No. 04
List of Figures
Figure Page
Name of Figure
No. No.
1 STCW Convention and Code 2017 Edition 3
2 MS Achille Lauro hijacking 7
3 9/11 Attacks 7
4 Ship’s Identification Number 8
5 SOLAS Consolidated Edition 8
6 Guide to the Maritime Security and the ISPS Code, 2012 Edition 9
7 IMO Resolution and Circulars related to maritime security 10
8 Three Maritime security (Marsec) Levels Notices 16
Security Measures and Procedures; Gangway watch & receiving of
9 17
ships stores
10 Sample of Declaration of Security (DoS) 26
11 Group Transit; Internationally Recommended Transit Corridor (IRTC) 29
12 Handguns 32
13 Long gun 32
14 Rifles and shotguns 32
15 Rocket-Propelled Grenade (RPG) 33
16 IED 33
17 Dynamite 34
18 Grenade 34
19 Nuclear weapons 34
20 Chemical weapon 35
21 Physical searching with metal detection 39
22 Gangway security notices 39
23 Restricted Area and IMO Sign 41
24 Monitoring Deck and Areas Surrounding the Ship 43
25 Gangway Watch 46
26 Visitor’s Log 48
27 SSAS; how it works 49
28 AIS 50
Page 57 of 58
Revision No. 04
List of Figures
Figure Page
Name of Figure
No. No.
29 Intrusion Detection Systems (IDS) 50
30 Closed Circuit Television (CCTV) 50
(Top-counterclockwise) Hand-Held Metal Detector; Garrett Brand &
31 Explosive Vapor Detector (EVD), Archway Metal Detector & X-Ray 51
Baggage Scanning Machine
(from top, counterclockwise) Key code pads / door sensor locks,
32 51
Combination locks and Padlocks, & Security seals
33 Ship’s Personnel Security Equipment 52
34 Verification of visitor’s identification card 52
35 Control access to Bridge & Physical Barrier; Razor Wires 53
36 Security Equipment & System for Pirates and Armed Robbers 54
Page 58 of 58