Beruflich Dokumente
Kultur Dokumente
PRESENTED BY:
rev. 09/03
rev. 09/03
Introduction
In response to the growing threat of terrorism, the International Maritime Organization (IMO) has adopted
new security measures and procedures for ships and port facilities. Among the new security initiatives,
each ship will have to develop a comprehensive Ship Security Plan. Fixed and floating platforms are not
covered by this template and instruction as the security needs for these marine facilities and the
implementation of their plans will be very different from that of seagoing ships and ships that are engaged
in international trade.
To help ship owners and operators implement the new security requirements, the Commonwealth of
Dominica Maritime Registry (DMRI) developed this Ship Security Plan Template. The template offers
step-by-step directions, based on guidance from the IMO, to develop a Ship Security Plan.
Every ship security plan must describe actions the crew will take to:
Prevent terrorist or criminal activities happening on board or to the ship,
Identify the potential for criminal or terrorist activities happening on board or to the ship,
Deter terrorist or criminal activities, and
React when terrorist or criminal activities are encountered.
By answering a series of questions in the following guides and completing the template that follows, users
will be able to conduct a survey to assess ship security, determine vulnerabilities, and develop specific
recommendations to improve security and mitigate risks. This book also includes guidance to develop a
threat assessment and to continue to evaluate security at sea and in ports. Some of print in the template
will be in green. This green print will include further guidance and instruction for the user.
The following guides were developed to assist the Company Security Officer in developing a Ship
Security Plan for each of the ships for which he is responsible:
Guide 1 Developing Threat Assessments,
Guide 2 Ship Security Assessment (Survey)
Guide 3 How to Identify and Mitigate Security Vulnerabilities, and
Guide 4 Establishing Protective Measures
Guide 5 Performing Verification Security Assessments
The end product of the ship survey and security assessment is a Ship Security Plan. The plan includes a
decision trees for Company and Ship Security Officers to determine when it is advisable to elevate
Security Levels or readiness conditions in response to a threat(s).
Users of the Security Plan Template will be able to answer questions and supply information on specific
issues, required to generate a complete Ship Security Plan. The template greatly facilitates the
development of threat assessments between each port-to-port call, allowing Ship Security Officers to best
respond to potential threats, from piracy attacks to terrorist stowaways.
By understanding threats, knowing a ships vulnerabilities, and implementing appropriate security
measures and procedures, Company and Ship Security Officers can reduce security risks and safeguard
the ship, crew, and cargo.
The company security Officer should keep the list of who was issued a copy of each security plan. To
assist him in this effort, we have attached Appendix A titled Distribution of Security Plans a Controlled
Document. One of these should be completed for each vessel.
-1-
rev. 09/03
DCISPS3001
TABLE OF CONTENTS
International Ship and Port Security Division............................................................................................... 1
Introduction.................................................................................................................................................. 2
Guide 1: Developing Threat Assessments................................................................................................... 8
1 Introduction........................................................................................................................................... 8
2 Threats to Ships................................................................................................................................... 8
3 Threat Assessment Criteria.................................................................................................................. 9
4 Worksheet........................................................................................................................................... 11
5 Threat Assessment............................................................................................................................. 12
Guide 2: Ship Initial Security Assessment (Survey)...................................................................................13
1 Survey: Introduction........................................................................................................................... 13
3 On-scene Security Survey.................................................................................................................. 14
5 Ship Access Control........................................................................................................................... 15
5.1 Ship Interior................................................................................................................................. 15
5.2 Identification Systems................................................................................................................. 16
6 Restricted Areas................................................................................................................................ 19
7 Security Alarm, Surveillance and Communications Systems............................................................20
8
Emergency Plans and Equipment................................................................................................. 22
Guide 3: How to Identify and Mitigate Security Vulnerabilities...................................................................23
1 Introduction....................................................................................................................................... 23
2 Security Observations & Recommendations....................................................................................23
2.1 Deck and ship side Lighting....................................................................................................... 23
2.2. Interior Ship Access Control....................................................................................................... 24
2.3 Identification Systems................................................................................................................ 24
2.4 Key Control................................................................................................................................ 25
2.5. Restricted Areas......................................................................................................................... 25
2.6 Security Alarm, Surveillance, and Communications Systems.....................................................26
2.7 Emergency Plans and Equipment...............................................................................................26
Guide 4: Guidance for Establishing Protective Measures..........................................................................28
1
Introduction................................................................................................................................... 28
2
Ensuring the performance of all vessel security duties:................................................................28
3 Monitoring Restricted areas to ensure that only authorized persons have access.............................29
4 Controlling Access to the Ship........................................................................................................... 30
5 Monitoring deck areas and areas surrounding the ship......................................................................31
6 Controlling the embarkation of persons and their effects....................................................................32
7
Controlling the embarkation of persons and their effects..............................................................33
8 Ensuring that port-specific security communication is readily available.............................................34
Guide 5:
Developing Final Security Assessment................................................................................35
1
Introduction................................................................................................................................... 35
2
Risk Based Security Assessment Simplified.................................................................................35
2.1 Potential Threats......................................................................................................................... 35
Table 1: Notional List of Scenarios........................................................................................................ 36
Typical Types of Scenarios.................................................................................................................... 36
2.2 Consequence assessment.......................................................................................................... 36
Table 2: Consequence Score................................................................................................................ 37
2.3 Vulnerability Assessment............................................................................................................ 37
2.4 Mitigation.................................................................................................................................... 38
Table 5.............................................................................................................................................. 39
2.5 Implementation Methods............................................................................................................ 39
Table 6.............................................................................................................................................. 40
Appendix A: Distribution List Of Security Plans.........................................................................................42
A Controlled Document.............................................................................................................................. 42
-2-
rev. 09/03
DCISPS3001
-3-
rev. 09/03
DCISPS3001
1. Definitions
Bulk carrier Single-deck ships designed to transport dry cargo, such as grain or coal. See SOLAS
regulation IX/1.6.
Chemical tanker A tanker constructed or adapted and used for the carriage in bulk of any liquid
product. Chemical tankers usually have large numbers of very small capacity tanks. See SOLAS
regulation IX/1.6.
Company Security Officer (CSO) A security expert designated by the ships company to develop
and maintain a Ship Security Plan and coordinate security measures and procedures with Port
Facility Security Officers to protect ships, crew, passengers, and cargo.
Declaration of Security A written record of understanding(s) between a Ship Security Officer and
a Port Facility Security Officer to indicate security measures implemented to respond to a designated
security level.
Designated Authority An organization(s) or administration(s) identified by or within the Contracting
Government as responsible for the implementation of the security measures and procedures.
Gas carrier A tanker constructed or adapted and used for the carriage in bulk of any liquefied gas
or other substance of a flammable nature. See definition in SOLAS regulation VII/8.2.
High-speed Craft A craft capable of traveling at high speeds as defined in SOLAS regulation
X/1.2.
Oil Tanker A tanker carrying crude oil, fuel oil, heavy diesel oil or lubricating oil as cargo. See
definition in SOLAS regulation II-1/2.12.
Port Facility Security Plan A plan to ensure the application of measures designed to protect the
port facility and ships, their cargoes and persons on board from the risks of a security accident.
Recognized Security Organization An organization with expertise in security and anti-terrorism
matters, which is recognized by the Administration or the designated authority and authorized by it to
conduct survey, assessment, verification, and certification activities, as required by IMO regulations.
Security Incident Any act threatening the security of a ship or a port facility.
Security Level A description of the degree of risk associated with the threat of an unlawful act
against a ship or port.
Non-specific Threat A threat based on a high probability or likelihood that an attack or incident
may occur in a particular area (e.g., an attack has occurred in the recent past in the area and there
is a likelihood of a future attack or a government has issued a warning about possible attacks in the
region).
Piracy Any illegal acts of violence, detention, or depredation committed for private ends on the
high seas against another ship or against persons or property on board the ship. Piracy occurs
outside the jurisdiction of any state.
Dominica Maritime Registry
Model Ship Security Plan Guidance
-1-
rev. 09/03
DCISPS3001
Port Facility A separate location within a port at which commercial maritime activities occur.
Port Facility Security Officer (PFSO) The person appointed as responsible for the development,
implementation, revision, and maintenance of the Port Facility Security Plan and for liaison with the
ship security officers and company security officers.
Port Facility Security Survey A survey that examines the strengths and weaknesses of security
systems and procedures at a port facility.
Security Readiness Conditions Security Levels or operating procedures that are modified to help
a ship and crew respond to variations in threats.
Ship Security Assessment includes a Ship security survey, threat assessment, and vulnerability
assessment.
Ship Security Officer (SSO) A person on board the Ship accountable to the master for the
security of the Ship, including the implementation and maintenance of the Ship Security Plan and for
liaison with the Company Security Officer and the Port Facility Security Officer.
Ship Security Plan A plan developed to ensure the application of security measures on board a
Ship. The plan provides measures and procedures to protect persons, cargo, and the ship from the
risks of a security incident.
Ship Security Survey A Security Survey is an evaluation of the Ships security systems,
measures, and procedures. The survey allows the SSO to determine potential strengths and
weaknesses in security and a ships ability to counter potential threats at port, anchor, and sea.
Specific Threat A threat in which specific information is available about a pending/potential attack
in a specific region/location.
Threat Assessment The process of identifying and analyzing credible threats of danger, damage,
or loss to a ship, its crew, and cargo.
Vulnerability Assessment An examination of potential shortfalls in the ships existing security
systems and procedures.
-2-
rev. 09/03
DCISPS3001
2 Threats to Ships
There is a wide range of potential threats to a ship. Threats to a ship can quickly change. A ships
location, the time of day, and international events can dramatically alter the threat to a ship. As a
consequence, it is critical for the SSO to regularly monitor events to determine potential threats in
the path of the ship as it travels to its next destination. Following is information on potential threats to
a ship:
Piracy and Armed Attacks Raiders pose a serious threat to ships in many parts of the
world. Most attacks occur while in port. While at sea, ships are most vulnerable when
passing close to land or when transiting narrow channels. Almost any item of value on a
ship may be of interest to robbers. Pirate attacks are often organized by crime syndicates.
In nearly a third of reported cases, there is reported violence or a threat of violence to the
crew.
Terrorism Historically few ships have been attacked by terrorists. One of the most
notable incidents occurred in 1985 when terrorists took control of a cruise ship and held
the passengers hostage to secure the release of terrorists in prison. In October 2002, the
oil tanker Limburg was attacked by terrorists. Terrorists are targeting ships and they are
becoming increasingly violent. Authorities are concerned that a ship could be used as a
weapon; an explosive device in the cargo area could be detonated while in port. Terrorists
may seek to use a ship to smuggle weapons or mount an attack using chemical,
biological, radiological, or nuclear materials (weapons of mass destruction). Terrorists
may attempt to use cargo containers to smuggle personnel to another country.
Cargo Tampering Billions of dollars in high-value cargo, such as furs, alcohol, and
electronics, is stolen annually while ships are in port. Crewmembers have also been
known to steal items from cargo containers, ships stores, and equipment or to assist
thieves.
-3-
rev. 09/03
DCISPS3001
drugs/weapons in cargo containers. The ships at greatest risk for this type of criminal
activity are container ships transporting cargo to or from areas of civil unrest and known
drug producing nations.
Sabotage While cargos have been destroyed and/or ships sunk to collect insurance,
the number of reported cases in the maritime industry is small.
Natural Disasters Natural disasters have always posed serious threats to ships at sea
and in port. All ships should have crisis management plans to deal with such
emergencies.
Labor Strife Labor groups protesting in port can disrupt operations. Often additional
security measures are warranted to protect crewmembers and prevent unauthorized
access to a ship.
Labor Unrest A host of crew complaints, including excessively long shifts, poor
food/water, cramped and dirty conditions, and failing to pay wages have precipitated
protests by crewmembers. In some cases, they have walked off ships, while others have
held a ship hostage until their demands are met.
Crew Violence Crew violence is best deterred through continued vigilance by the
Mutiny Crews can threaten to mutiny as a last resort when their complaints about
financial, working and living conditions are not remedied by the ships officers or
operators. Most reported mutinies, although rare in recent times, involve fishing boats
with small crews.
Location A ships location can be important in determining a potential threat. For instance,
ships are most vulnerable to attack by pirates at sea when near land and when sailing
through narrow channels where speed and maneuverability may be restricted.
-4-
rev. 09/03
DCISPS3001
Government/general warnings are announced for specific countries or regions of high pirate
activity.
Ship Owners Nationality Nationality of the ships owners, and operators may increase
the profile of the ship as a target, to terrorists.
Crew
Nationality of the crew may increase the profile of the ship as a target, to terrorists.
Nationality of the crew should be also considered when evaluating potential internal
threats.
Neighboring ships Nationality - should be considered as certain flags, for one reason or
another, will be more likely to harbor terrorists or support other criminal activities.
Time of day Ships are most vulnerable undercover of darkness when there is inadequate
light to detect or protect against an unauthorized boarding at sea, while moored, or at
anchor.
Type of ship General Cargo Ships, Reefers, Bulk Carriers Container Ships, Ro.Ros are
more vulnerable to theft and drug smuggling than other types of ships. If terrorists are
seeking to smuggle weapons into a country, they may choose a low profile cargo ship. But if
terrorists want to block a channel, a larger ship like a bulk/ore carrier may be targeted. If
terrorists are seeking to use a ship as a weapon, they may seek to gain control of a ship
transporting hazardous materials.
-5-
rev. 09/03
DCISPS3001
4 Worksheet
Contracting Governments are responsible for assessing threats at ports and setting the Security
Level. For best practices, a Ship Security Officer may independently assess the quality of the
security measures at port using this worksheet.
The worksheet also provides a tool to assess potential threats for each port-to-port segment of a
ships itinerary. Information about potential threats is available from a variety of sources. These
include port authorities, Captains of the Port, Port Security Officers, local law enforcement officers,
and local consular or diplomatic representatives. A variety of government, industry, and international
business organizations offer information on potential threats. Data is also available from Internet
sites on piracy and other threats.
Below are potential threats ships can face while at sea or while in port. Check the appropriate box if:
1) a current warning has been issued by a government official or organization about the threat;
2) a previous official warning was issued; and/or
3) there have been previous reported incidents.
Threats
Current Warning
Previous Warning
Reported Incidents
Criminal Activity
Piracy and armed attacks
Terrorism
Theft
Drug/weapons smuggling
Stowaways, refuges, &
asylum seekers
Sabotage
Environmental Extremists
Natural Disasters
Labor Unrest
Collateral Damage
Crew Violence
Mutiny
-6-
rev. 09/03
DCISPS3001
5 Threat Assessment
Based on intelligence gathered from official sources and the information above, make a
determination whether a potential threat meets either of the following definitions:
Non-specific threat An attack(s) has occurred in the recent past in the area and there is a
likelihood of a future attack or a government has issued a warning about a region.
Alternatively, there have been recent civil/internal problems, such as cargo theft, piracy, or
smuggling, and they are likely to re-occur in the future.
Using information gathered from intelligence sources and the above criteria, determine if there are
non-specific or specific threats of:
Type of Threat
Threat Status
No
Threat
Non
Specific
Specific
Threat
No
Threat to
Human
Life
Weather
Conditions
Transiting
At Night
Moonlight
While
At Sea
Threat
To
Human
Life
Piracy &
Armed Attacks
Terrorism
Drug/Weapons
Smuggling
Stowaways,
Refugees, and
Asylum
Seekers
Sabotage
Environmental
Extremists
Labor Strife
Labor Unrest
Crew Violence
Mutiny
-7-
rev. 09/03
DCISPS3001
-8-
rev. 09/03
DCISPS3001
personal gear).
Supervise the handling of cargo and ships stores.
Ensure that port-specific security communication, information, and equipment are readily
available.
The CSO should also identify potential weaknesses, including factors in the infrastructure, which
may include:
Conflicting policies between safety and security measure.
Conflicting shipboard and security duty assignments.
Watchkeeping and manning constraints.
Training deficiencies.
This security survey was completed by:
Date completed:
Manual
Automatic
Yes
Yes
Yes
No: Does the system include multiple circuits to prevent the entire system from failing if
one light malfunctions?
Yes
-9-
rev. 09/03
DCISPS3001
Yes
Yes
Yes
Automatic
Describe the types of locks that secure the hatches and openings:
Yes
Who is responsible for making sure hatches and doors are secured?
Yes
No: Are all portholes and windows that are not used permanently closed?
Yes
Yes
Yes
No: If yes, are the mesh coverings fastened from the inside or secured with locks?
-10-
rev. 09/03
DCISPS3001
Yes
Yes
No: If portholes and windows can be opened and are locked, are they protected by
ordinary window level locks or key locks?
Yes
No: Are there ladders (permanent or nonpermanent) that should be removed, secured, or
blocked from unauthorized usage?
List gangways, ramps, side ports, etc. and current security measures:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Access Point
1.
2.
3.
4.
5.
6.
7.
8.
Describe:
Badge
Other
Describe:
Describe:
How are vendors, visitors, and repairman controlled? (check appropriate box)
Log
Describe:
Escorted
Describe:
-11-
rev. 09/03
DCISPS3001
Badge
Describe:
Yes
No: Are vendors and visitors escorted throughout the ship at all times?
Yes
Yes
No: Is the personnel egress/ingress control points the same as for visitors?
-12-
rev. 09/03
DCISPS3001
Following are the main access points to the ship and other potential access points, including open
weather decks (each access point should be examined and evaluated to determine the potential for
use by persons engaged in unlawful actions):
Yes
Yes
Name:
Position:
-13-
rev. 09/03
DCISPS3001
Name:
Position:
Yes
transferred?
No: Are there procedures for returning keys when personnel are terminated or
6 Restricted Areas
Yes
No: Has the SSO established restricted areas throughout the ship?
Yes
No: Do all staff know the proper procedures when an unauthorized person is detected in
a restricted area?
Following are the ships restricted areas, such as the bridge, control station, machinery spaces, radio
room, etc.:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Yes
-14-
rev. 09/03
DCISPS3001
Testing:
Activation:
Deactivation:
Resetting:
Yes
No: Are other security alarms used on board?
Date of installation:
-15-
rev. 09/03
DCISPS3001
Following is a description of the Ships communication equipment and backup systems to ensure
effective continuous communication between shipboard security personnel, port facilities, other
Ships, and when appropriate, with national or local authorities with security responsibilities:
Yes
-16-
rev. 09/03
DCISPS3001
Yes
Yes
No: Collision
Yes
No: Grounding
Yes
Yes
Yes
Yes
No: Piracy
Yes
Yes
No: Terrorism
Yes
No: Other
Yes
Yes
-17-
rev. 09/03
DCISPS3001
devices intended for use against people, ships, or ports and the carriage of which is not
authorized, from being introduced by any means on board a ship.
center of the ship. If intruders penetrate the perimeter, they should face more stringent
security measures as they move inward.
Maximize human surveillance and the visibility of people and security measures. The better
protected a ship appears to be, the less chance an intruder will attempt to board.
Clearly mark all restricted areas and access points with signs. Marked boundaries create a
sense of control and increase the probability that an intruder will be deterred from attempting
to board the ship.
-18-
rev. 09/03
DCISPS3001
-19-
rev. 09/03
DCISPS3001
-20-
rev. 09/03
DCISPS3001
-21-
rev. 09/03
DCISPS3001
-22-
rev. 09/03
DCISPS3001
Introduction
The Vulnerability Assessment previously completed determines potential shortfalls in the ships
existing security systems and procedures. We have taken information from the USCGs Guidance on
Establishing Protective Measures found in Appendix A to enclosure (1) of NVIC 10-02 to provide the
vessel Owners and operators with additional guidance which may help to select the appropriate
protective measures allowing the ship to achieve an acceptable level of protection for each activity. A
ship may consider implementing those protective measures that are indicated by a yes in a table.
For example, found in Table2. While locking or securing a restricted area may be more protective
and reliable, using a combination of roving patrols and security alarms may provide and acceptable
level of protection for a specific security level.
Security measures and initiatives may be incorporated into existing duties for specific crewmembers.
For example, fire patrols and roving engineering watches make rounds and may perform security
patrol duties during the performance of their current duties.
2
2.1
2.2
The following Tableprovides additional guidance on protective measures and procedures for
ensuring performance of all security duties:
TABLE 1
PROTECTIVE MEASURE
Security Level
1
2
2
Yes*
Yes*
Yes*
Optional
Yes
Yes
Yes
Yes#
Yes#
-23-
rev. 09/03
DCISPS3001
3 Monitoring Restricted areas to ensure that only authorized persons have access
3.1
Ships should establish restricted areas to control access to key areas. The following areas
may be designated as restricted areas and, if identified as restricted areas, shall be listed as
such in the Ships Security Plan
Navigation Bridge,
Any other areas as determined by the Company Security Officer to which access
may be restricted to maintain the security of the ship.
3.2
All restricted areas may be marked indicating that the area has restricted access. Markings
do not need to be conspicuous to persons other than the crew.
3.3
TABLE 2
PROTECTIVE MEASURE
Security Level
1
2
2
Optional
Yes
Yes
Optional
Yes*
Yes*
3.4
3.5
When automatic intrusion detection devices are used to monitor unauthorized access to
restricted areas, automatic intrusion devices may:
-24-
rev. 09/03
DCISPS3001
When implementing protective measures the following access points shall be evaluated:
Ladders
Gangways
Side ports
Adjacent piers and aprons, and
Other access points identified in the vessels security assessment.
4.2
Ships may implement the protective measures or combination of protective measures
provided in the Tablebelow to control access to the ship.
TABLE 3
PROTECTIVE MEASURE
Security Level
2
2
Yes
Yes#
Yes#
Yes
Yes
Yes
Optional
Optional
Yes
Yes
Yes*
Yes
4.3
Access may be denied to any person refusing to submit to security verification or inspection
at an access point. Each person denied entry for refusing should be described in a report to
the appropriate authorities.
-25-
rev. 09/03
DCISPS3001
A ships capabilities should normally include the ability to perform monitoring at all times and
under all conditions.
5.2
Monitoring of deck areas and areas surrounding the ship to identify and take preventive
measures against security incidents may be accomplished by using:
TABLE 4
PROTECTIVE MEASURE
Security Level
2
Optional
Optional
Optional
Yes
Optional
Optional
2
Yes*
Yes
Yes
*Increase the number and frequency of: Security patrols; and Waterside boat patrols to ensure continuous
monitoring.
5.3.1
Ships may consider illuminating their deck and access points to the ship while conducting
ship/water front facility interface activities. Ships may co-ordinate lighting with other entities
involved in the interface. While underway, ships shall consider using maximum lighting
available consistent with the ships safe navigation. A ship shall also consider the following in
establishing the appropriate level and location of lighting:
5.4
Crewmembers are generally able to see beyond the ship on both the pier side and
the waterside; and
Coverage normally includes the area around the ship.
At heightened security levels, additional lighting may be coordinated with the waterfront
facility to provide additional shore side lighting. Additional lighting may include:
Using spotlights and floodlights to enhance visibility of the deck and areas
surrounding the vessel; and
Using lighting to enhance visibility of the surrounding water and waterline.
-26-
rev. 09/03
DCISPS3001
Controlling the embarkation of persons and their effects to adequately identify and take
preventative measures against security incidents may include the protective measures
provided in the following table:
TABLE 5
PROTECTIVE MEASURE
Security Level
2
2
Yes
Yes#
Yes*
Yes
Yes
Yes
Yes
Yes#
Yes
Yes@
Yes
Yes
Optional
Yes
Yes*
Optional
Yes
Yes
Optional
Optional
Yes
Optional
Optional
Yes
*Security briefings are generally provided to all passengers, prior to embarkation and disembarkation.
#This may be accomplished by random inspections, such as 5-20% or some other method addressed in
the ships security plan.
@Increase the frequency, such as 25-50% and increase the scope of the inspection.
6.2
Areas should be designated to inspect baggage, carry-on items, and personal gear. Access
to and from these areas should be controlled to segregate inspected persons ands articles
form un-inspected persons and or articles.
6.3
The purpose of the inspection of private entities to secure their personal safety and the
safety of their property. Such inspections are intended to ensure that incendiary devices,
explosives or other items that pose a threat to the ship are removed. Inspections may be
limited and no more intrusive than necessary to protect against the danger of sabotage or
similar destructive acts of violence. Inspection techniques may include, but are not limited to:
magnetometers, physical examination of the person or object visually, the use of trained
animals, electronic devices or a combination of methods.
-27-
rev. 09/03
DCISPS3001
7
7.1
TABLE 6
PROTECTIVE MEASURE
Security Level
1
2
2
Yes*
All
All
All
All
All
Yes*
All
All
Yes*
Yes+
All
7.2
Verification and inspection of cargo and ships stores may be accomplished by:
Coordinating with the shipper or other responsible party through and established
agreement and procedures.
7.3
At heightened security levels, the detail or depth of the above methods may be increased
commensurate with the threat.
-28-
rev. 09/03
DCISPS3001
8 Ensuring
8.1 Ships normally ensure that means of communication for reporting threats to the ship are:
8.2
At heightened Security levels, ships may enhance their means of communication of reports
of threatening act as provided in the following table.
TABLE 7
PROTECTIVE MEASURE
Security Level
1
2
2
Optional
Optional
Yes
Yes
-29-
rev. 09/03
DCISPS3001
Yes
Yes*
Introduction
The Vulnerability Assessment previously completed determines potential shortfalls in the ships
existing security systems and procedures. The initial Assessment is required to develop an effective
plan. Refer to the Ship Security Survey (Guide 2) to develop specific details regarding this ships
security.
The following is a visual representation of a risk-based assessment that can be tailored to a specific
vessels:
Repeat Process until all unique scenarios have been evaluated
The number of scenarios is left to the judgment of plan developers and to the satisfaction of the
Company and ship Security Officers. An initial evaluation should at least consider those scenarios
provided in Table1 with emphasis being placed on the worst-case scenario, and the most probable
scenarios. Care should be taken to avoid unnecessarily evaluating excessive scenarios that result in
low consequences. Minor variations of the same scenarios do not need to be evaluated separately
unless there are measurable differences in the consequences.
-30-
rev. 09/03
DCISPS3001
Application Example
a. Damage and destroy
with explosives
b. Damage and destroy
through malicious
operations or acts
c. Create a hazardous
materials incident/or
pollution incident without
destroying the vessel
d. Take hostages and kill
people on board.
a. Moving explosives next
to the vessel: waterside,
shore side or subsurface.
b. Ramming a stationary
target: With your ship as a
missile.
2. External attack:
c. Launching or shooting
weapons from distance
a. Materials to be used as
weapons.
b. People into or out of a
country.
The potential number of lives that could be lost and injuries occurring
as a result of an attack scenario.
The potential economic impact of an attack scenario.
The potential environmental impact of an attack scenario.
-31-
rev. 09/03
DCISPS3001
The appropriate consequence scoring should be evaluated for each scenario. Consequence ratings
are criteria with benchmarks and are provided in the following table. These ratings are intended to
be broad relative estimates. The appropriate rating is determined by using the consequence
component that results in the highest rating. For example, if the death and injury and economic
impacts result in a moderate or 1 rating, but the environmental impact results in Significant or 2
rating, then the overall consequence score would be a 2. A precise calculation of these elements is
not necessary or possible.
ORGANIC
SECURITY
Accessibility of the ship to the attack scenario. This related to the physical and
geographic barriers that deter the threat without organic security. For example:
An attack by swimmers while anchored in a quick running river like the
Mississippi is mot improbable.
The ability of security personnel to deter attack. It includes security plans,
communications capabilities, guard force, intrusion detection systems, and
responsiveness of outside law enforcement to prevent an attack.
The vessel owner and operator should address each vulnerability element for a given scenario. The
initial evaluation of vulnerability is normally viewed with only existing strategies and protective
measures meant to lessen vulnerabilities, which are already in place. After the initial evaluation has
been performed, a comparison evaluation can be made with new strategies and protective measures
considered. Assessing the vulnerability with only the existing strategies and protective measures
provides a better understanding of the overall risk associated with the scenario and how new
strategies and protective measures will mitigate the risk.
The vulnerability score and criteria with benchmark examples are provided in the following table.
Each scenario should be evaluated to get the individual score for each element and then sum
the elements to get the total vulnerability score (Table 5 step 3). This score should be used as
the vulnerability score when evaluating each scenario in the next step of the process.
Dominica Maritime Registry
Model Ship Security Plan Guidance
-32-
rev. 09/03
DCISPS3001
Accessibility
Organic Security
2.4 Mitigation
The vessel owner and operator should next determine which scenarios may have mitigation
strategies (protective measures) implemented. This should be accomplished by determining where
the scenario falls in Table4 based upon the consequences and vulnerability assessment scores.
Following are terms used in Table4 as mitigation categories:
MITIGATE means the mitigation strategies, such as security protective measures and/or
procedures, may be developed to reduce risk for the scenario. An appendix to the Ship Security Plan
may contain the scenario(s) evaluated, the result of the evaluation of each, a description of the
mitigation measure evaluated, and the reason measures were or were not chosen.
CONSIDER means that the scenario should be considered and mitigation strategies should be
developed on a case-by-case basis. The Ship Security Plan may contain the scenario(s) evaluates,
the results of the evaluation, and the reason mitigation measures were or were not chosen.
DOCUMENT means the scenario may not need a mitigation measure at this time and therefore
needs to be documented. However, mitigation measures having little cost may still merit
consideration. The security plan may contain the scenario evaluated and the results. This will be of
the security assessment.
-33-
rev. 09/03
DCISPS3001
2
Consequenc
e
Score
5-6
CONSIDERED
MITIGATE
MITIGATE
DOCUMENT
CONSIDER
MITIGATE
DOCUMENT
DOCUMENT
CONSIDER
To assist the ship owner and /or operator in determining which scenarios may require mitigation
methods, the ship owner and or operator may find it beneficial to use Table5 provided below. The
ship owner/operator can record the scenarios considered, the consequence score (Table (2),
outcome of each element of vulnerability (Table 3), the total vulnerability score, and the mitigation
category (Table 4).
Table 5
MITIGATION DETERMINATION WORKSHEET
Step 1
Step 2
Scenario/Description
Consequence
Score (Table 2)
Step 3
Step 4
Organic
Score
Mitigation Results
(Table 4)
= Total
Score
-34-
rev. 09/03
DCISPS3001
Table 6
1.
2.
Step 2
Scenarios
that are
affected by
Mitigation
Strategy
From Step 1
in Table 5
Step 2
Step 3
Consequence
Score (Remains
the Same)
Step 4
New
Mitigation
Results
(Table 4)
1.
2.
>>>
1.
2.
-35-
rev. 09/03
DCISPS3001
The ship owner and/or operator should keep in mind that some strategies may be deployed
commensurate with various security threat levels established. Feasibility of a mitigation strategy may
vary based on the security level, therefore some strategies may not be warranted at security level 1,
but may be at Security level 2 or 3. For example using divers to inspect the underwater pier structure
and the ship may not be warranted at security level 1, but may be necessary if there is a specific
threat or an increase in the security level. Mitigation strategies should ultimately ensure that a level
of security is maintained to achieve the security objectives discussed in the Ships Security Plan.
As an example of a possible vulnerability mitigation measure, a company may implement security
patrols by hiring additional personnel to detect and r prevent unauthorized persons from entering
spaces below the main deck on a passenger ferry. This measure would improve organic security and
may reduce the overall vulnerability score from high to a medium. This option, however, is
specific for this scenario and also carries certain costs. Another option might be to secure all access
points to spaces below the main deck. This may reduce the accessibility score from high to
medium. This option does not require additional personnel and is a passive mitigation measure.
Similarly, other scenarios can be tested to determine the most effective strategies for your ship.
The Ship Owner and/or operators should develop a process through which overall security is
continually evaluated by considering consequences and vulnerabilities, how they may change over
time, and what additional mitigation strategies can be applied.
-36-
rev. 09/03
DCISPS3001
Issue Number
Issued to:
Date:
Initials
Issued to:
Date:
Initials
Ship: _______________
Copy Number
Issue Number
-37-
rev. 09/03
DCISPS3001
Ship: _______________
Copy Number
Issue Number
Issued to:
Date:
Initials
Issued to:
Date:
Initials
Ship: _______________
Copy Number
Issue Number
-38-
rev. 09/03
DCISPS3001