Sie sind auf Seite 1von 28

SECURITY TRAINING FOR SEAFARERS

CHAPTER 1

INTRODUCTION

1.1 COMPETENCES TO BE ACHIEVED


After completion of the course the trainee shall be able to achieve

 The knowledge of government legislation and regulation


 The knowledge of current security threat and piracy
 Operation of security equipment
 Detect the weapons, dangerous substances and devices
 Assessment of ship security
 Execute contingency plan
 Maintenance of security equipment
 Physical searches and non-intrusive inspections

1.2 CURRENT SECURITY THREATS AND PATTERNS


PIRACY PRONED AREAS AND WARNINGS

S E Asia and the Indian Sub Continent


Chittagong and mongla at berth and anchorage. Ships have reported theft of
Bangladesh zinc anodes welded to ship's sides and stern.

India Chennai, Cochin, Haldia, Hoogly, River, Kakinada anchorages

Indonesia Adang Bay, Anyer, , Balikpapan, Banjarmasin, Belawan, Bontang,


Cigading,Dumai,Gaspar (Gelasa) straits, Lawi Lawi, Panjang, Pulau Laut,
Samarinda, Santan, Sebuku, Semarang,Tarahan, Tanjong priok (Jakarta)
Malacca straits Indonesian coast of the straits. Coast near Aceh is particularly risky for
hijackings
Malaysia Bintulu, Sandakan

Philippines Batangas, Davao, Manila, Zamboanga

Singapore Singapore Straits

Thailand Koh Si Chang


Vietnam Haipong, Ho Chi Minh City, Vung Tau

Africa and Red Sea

Abidjan, Bonny River, Conakry, Dakar, Dar Es Salaam, Douala, Gentil, Lagos, Owendo,
Tema,Warri.
Gulf of Aden

SeaSkills Maritime Academy, Coimbatore


1
SECURITY TRAINING FOR SEAFARERS

Somalian waters-high-risk area for hijackings. Ships not making scheduled cells at Somali ports
should keep at least 75miles and if possible 100miles from the Somalia coast. Use of radio
communications including VHF in these waters should be kept to a minimum. The northern and
north-eastern Somalia coast is particularly risky.
South and central America and the Caribbean
Brazil Parangua, rio grande, santos
Colombia Barranquilla, Buena ventura, Cartagena
Dominican republic Rio haina
Ecuador Guayaquil, manta
Guyana Georgetown
Jamaica Kingston
Peru Callao
Venezuela Guanta, Puerto la cruz

1.3 SHIPS AND PORT OPERATIONS AND CONDITIONS


Each Ship and port facility is responsible for determining the security measures necessary to
respond to potential threats. Ship operations , crew , port authorities and facility operators are
required to conduct threat assessments, security surveys, vulnerability assessments, and then
develop Security plan to mitigate unacceptable risks. Personnel responsible for the security of ship
and ports are also required to provide training and drills to ensure a familiarity with security plans
and procedures.

These security requirements for Ships must be approved by the "Administration,'" that is
responsible for ensuring the enforcement of international conventions. Port security measures
must be approved by the "Contracting Government" which is signatory to the International
Convention for the Safety of Life at Sea (SOLAS). Ships will be required to carry an International
Ship Security Certificate onboard similar to the Safety Management Certificate, indicating they
have an approved Ship Security Plan and the crew understands their security responsibilities. The
certificate and parts of the plan are subject to a port state control inspection.

SeaSkills Maritime Academy, Coimbatore


2
SECURITY TRAINING FOR SEAFARERS

CHAPTER 2
MARITIME SECURITY POLICY

2.1 FAMILIARITY WITH RELEVANT INTERNATIONAL CONVENTIONS,


CODES AND RECOMMENDATIONS
SOLAS chapter XI has been amended to include special measures for maritime security.
Specifically, SOLAS Chapter XI has been divided into two parts: Chapter XI-1: Special Measures
to Enhance Maritime Safety; and Chapter XI-2: Special Measures to Enhance Maritime Security.
In principle chapter XI-2 incorporates new regulations regarding definitions and the
requirements for ships and port facilities. These regulations are supported by the International
Ship and Port Facility Security Code (ISPS Code) which has a mandatory section (Part A) and a
recommendatory section (Part B). The guidance given in Part B of the ISPS Code is to be taken
into account when implementing the SOLAS XI-2 regulations and the provisions of Part A.
However, it is recognized that the extent to which the guidance on ships applies depends on the
type of ship, its cargoes and/or passengers, its trading pattern and the characteristics of the
Port Facilities visited by the ship. Similarly, in relation to the guidance on Port Facilities, the
extent to which this guidance applies depends on the types off cargoes and/or passengers and
the trading patterns of visiting vessels

New security measures and procedures adopted by the International Maritime Organization
established an international marine security framework to enhance the protection of ships,
personnel, cargo, and ports. The initiative called the international ship and of port facility
security code (ISPS), responds to an increased threat of terrorist attacks.

CONCEPT OF THE ISPS CODE

Security level shall be set by the government of the port state, or by the Flag state if higher, as
one of the following
Minimum protective measures must be maintaine at all times
Appropriate additional measures must be maintained as a result of heightened probability of
security incident.
Further specific measures must be maintained when a security incident to probable or inminent.

ISPS CODE –SECTIONS

1. General
2. Definitions
3. Applications
4. Responsibilities of contracting government
5. Obligations of the company
6. Ship security
7. Ship security assessment
8. Ship security plan
9. Records
10. Company security officer
11. Ship security officer
12. Training, drills and exercises on ship security
13. Port facility security
14. Port facility security assessment
15. Port facility security plan
16. Port facility security officer
17. Training, drills and exercises on port facility security

SeaSkills Maritime Academy, Coimbatore


3
SECURITY TRAINING FOR SEAFARERS

18. Verification and certification of ships

2.2 FAMILIARITY WITH RELAVANT GOVERNMENT LEGISLATION AND


REGULATION

Contracting Governments may require few items from a ship as a condition of entry into port. One
item of information listed is confirmation of any special or additional measures taken by the ship
during its last ten calls at a port facility. Examples could include:

 Records of the measures taken while visiting a port facility located in the territory of a State
which is not a Contracting Government especially those measures that would normally
have been provided by port facilities located in the territories of Contracting Governments
 Any Declarations of Security that were entered into with port facilities or other ships.

Another item of information is, that may be required as a condition of entry into port, is
confirmation that appropriate ship security procedures were maintained during ship-to-ship
activity conducted within the period of the last 10 calls at a port facility. It would not normally be
required to include records of transfers of pilots, customs, immigration, security officials nor
bunkering, lightering, loading of supplies and unloading of waste by ship within port facilities as
these would normally fall within the auspices of the Port Facility Security Plan. Examples of
information that might be given include

 Records of the measures taken while engaged in a ship to ship activity with a ship flying
the flag of a State which is not a Contracting Government especially those measures that
would normally have been provided by ships flying the flag of Contracting Governments
 Records of the measures taken while engaged in a ship to ship activity with a ship that is
flying the flag of a Contracting Government but is not required to comply with the
provisions of chapter XI-2 and part A of this Code such as a copy of any security certificate
issued to that ship under other provisions
 In the event that persons or goods rescued at sea are on board, all known information
about such persons or goods, including their identities when known and the results of any
checks run on behalf of the ship to establish the security status of those rescued.

Examples of other practical security related information that may be required as a condition of
entry into port in order to assist with ensuring the safety and security of persons, port facilities,
ships and other property include

 information contained in the Continuous Synopsis Record;


 location of the ship at the time the report is made;
 expected time of arrival of the ship in port;
 crew list;
 general description of cargo aboard the ship;
 passenger list

SeaSkills Maritime Academy, Coimbatore


4
SECURITY TRAINING FOR SEAFARERS

2.3 DEFINITIONS

Ship/port The interactions that occur when a ship is directly and immediately affected
interface by actions involving the movement of persons, goods or the provisions of port
services to or from the ship.
Port facility It is a location, as determined by the contracting government or by the
designated authority, where the ship/port interface takes place. This includes
areas such as anchorages, awaiting berths and approaches from seaward, as
appropriate
Ship to ship It means any activity not related to a port facility that involves the goods or
activity persons from one ship to another
Designated It is the organization(s) or the administration(s) identified, within the
Authority contracting government, as responsible for ensuring the implementation of
the provisions of this chapter pertaining to port facility security and ship/port
interface, from the point of the port facility
International Code means the international code for the security of ships and of port
Ship and Port facilities consisting of part a (the provisions of which shall be treated as
Facility mandatory) and part b (the provisions of which shall be treated as
Security recommendatory), as adopted, on 12 December 2002, by resolution 2 of the
(ISPS) Code conference of contracting governments to the international convention for the
safety of life at sea. 1974 as may be amended by the organization provided
that satisfying some condition
Security It is any suspicious act or circumstance threatening the security of a ship,
incident including a mobile offshore drilling unit and a high-speed craft, or of a port
facility or of any ship/port interface or any ship to ship activity.
Security level The qualification of the degree of risk that a security incident will be
attempted or will occur.
Declaration of An agreement reached between a ship and either a port facility or another
security ship with which it interface specifying the security measures each will
implement.
Recognized An organization with appropriate expertise in security matters and with
security appropriate knowledge of ship and port operations authorized to carry out an
organization assessment, or a verifications, or an approval or a certification activity,
required by this chapter or by part a of the isps code.
Ship security A plan developed to ensure the application of measures on board the ship
plan designed to protect persons on board, cargo, cargo transport units, ship's
stores or the ship from the risks of a security incident.
Port facility A plan developed to ensure the application of measures designed to protect
security plan the port facility and ships, persons, cargo, cargo transport units and ship's
stores within the port facility from the risks of a security incident.
Ship security The person on board the ship, accountable to the master, designated by the
officer company as responsible for the security of the ship, including implementation
and maintenance of the ship security plan and for liaison with the company
security officer and port facility security officers.
Company The person designated by the company for ensuring that a ship security
security assessment is carried out that a ship security plan is developed, submitted for
officer approval, and thereafter implemented and maintained and for liaison with
port facility security officers and the ship security officer
Port facility The person designated as responsible for the development implementation
security revision and maintenance of the port facility security plan and for liaison with
officer the ship security officers and company security officers.

SeaSkills Maritime Academy, Coimbatore


5
SECURITY TRAINING FOR SEAFARERS

2.4 HANDLING SENSITIVE SECURITY–RELATED INFORMATION AND


COMMUNICATIONS

The sensitive security related information related to suspicious movements which result in
imminent attack, piracy, armed robbery and terrorist attacks are handled by master or senior
officer available.

If the master believes the other ships movement constitutes a threat to his ship or a danger to
navigation in general, he shall consider sending an ‘all stations danger message’ as well as
advising the appropriate RCC. A danger message should be transmitted in plain language on a
VHF working frequency following an announcement on VHF channel 16 and or transmission of a
DSC call on VHF channel 70 using the ‘safety’ priority. All such messages shall be preceded by
the safety signal

When the master has concluded that the safety of the ship is threatened, he shall

 Activate the security alert, and


 Notify the cognizant rescue coordination center and if considered appropriate authorize
broadcast of an “all stations” “urgency message” on VHF channel 16, 2182 KHZ or any
other radio communications he considers appropriate (INMARSAT). Such messages shall be
preceded by the appropriate urgency signal 9 (PAN PAN) and or DSC call on VHF channel
70 and/or 2187.5KHZ.

SeaSkills Maritime Academy, Coimbatore


6
SECURITY TRAINING FOR SEAFARERS

CHAPTER 3
SECURITY RESPONSIBILITIES

3.1 CONTRACTING GOVERNMENTS


1. Administration shall set security levels and ensure the provision of security level
information to ships entitled to fly their flag when changes in security level occur,
security level information shall be updated as the circumstance dictates.
2. Contracting Governments shall set security levels and ensure the provision of security
level information to port facilities within their territory, and to ships prior to entering a
port or whilst in a port within their territory. When changes in security level occur,
security level information shall be updated as the circumstance dictates.
3. Contracting Governments shall set security levels and ensure the provision of security
level information to ships operating in their territorial sea or having communicated an
intention enters their territorial sea.
4. Contracting Governments shall provide a point of contact through which such ships can
request advice or assistance and to which such ships can report any security concerns
about other ships movements or communications.
5. Where a risk of attack has been identified, the Contracting Government concerned shall
advise the ships concerned and their Administrations of:

a. The current security level


b. Approving Port Facility Security Plan and subsequent amendments to an
c. Any security measures that should be put in place by the ships concerned to protect
themselves from attack, in accordance with the provisions of part A of the ISPS Code;
and security measures that the coastal State has decided to put in place, as
appropriate.

6. Contracting governments may, when implementing this chapter and part A of the ISPS
Code, conclude in writing bilateral or multilateral agreements with other Contracting
Governments on alternative security arrangements covering
Short voyages on fixed routes between port facilities - located within their territories
Any such agreement shall not compromise the level of security of other ships or of port
facilities not covered by the agreement.
No ships covered by such an agreement shall conduct any ship-to-ship activities with any
ship not covered by the agreement.
Such agreement shall be reviewed periodically, taking into account the experience gained
as well as in the particular circumstances or the assessment threats to the security of
ships the port facilities or the routes covered by the agreement.
7. Contracting governments will communicate necessary information to IMO and to
shipping and port industries.

3.2 RECOGNIZED SECURITY ORGANIZATIONS


The master is responsible for the safety and security of the crew passengers, and cargo. The
development of general security policies and procedures is the responsibility of the company
security officer. Unless the master is the ship’s security officer, the ship security officer shall
report to the master and is responsible for implementing, maintaining and supervising the
security plan.

 The security organization has the following responsibility


 Identifying restricted areas and measures for the prevention of unauthorized access

SeaSkills Maritime Academy, Coimbatore


7
SECURITY TRAINING FOR SEAFARERS

 Responding to security threats or breaches of security, including provision for maintain


critical operations of the ship or ship/port interface
 Responding to any security instructions of contracting governments
 Inspection, testing, calibration and maintenance of the security equipments
 Use of the security alert system including testing, activation, deactivation and resetting
and limit to false alerts

3.3 THE COMPANY


1. The Company shall ensure that the master has available on board, at all times, in
formations through which officers duly authorized by a Contracting Government can
establish:

A. Who is responsible for appointing the members of the crew or other persons currently
employed or engaged on board the ship in any capacity on the business of that ship;
B. Who is responsible for deciding the employment of the ship; and
C. In cases where the ship is employed under the terms of charter party(ies), who are the
parties to such charter party(ies), contact details of these parties, including. Time and
voyage charterers

2. The Company shall ensure that the ship security plan contains a clear statement
emphasizing the master's authority. The Company shall establish in the ship security
plan that the master has the overriding authority and responsibility to make decisions
with respect to the security of the ship and to request the assistance of the Company or
of any Contracting Government as may be necessary.

3. The Company shall ensure that the company security officer, the master and the ship
security officer are given the necessary support to fulfill their duties and responsibilities

4. Any Company operating ships to which chapters XI-2 and part A of the ISPS Code apply
has to designate a Company Security Officer for the Company and a Ship Security Officer
for each of its ships.

3.4 THE SHIP


A Ship's general arrangement drawing should also be used to identify access points, and layers of
protection to prevent unauthorized access to certain areas of a ship. Sections of this plan will
contain controlled information (Such as the location or button or switch which activates the Alert
system). We recommend the development of two plans, one with the information of general
concern, and a second stored in a secure location which contains information, which must be
controlled.

The plan may also include photographs of the vessel which are marked to identify access points
and secure locations, again this information should be controlled.

Identify locations that need access control and should be restricted based upon:

 Ship control bridge, chart room, engine room, cargo control room, ventilation and air
conditioning systems potable water tanks, cargo pump rooms, after steering, emergency
escape alley, lifeboats, cargo transfer equipment, crew accommodations, oil transfer
facilities, etc..

SeaSkills Maritime Academy, Coimbatore


8
SECURITY TRAINING FOR SEAFARERS

 Hazard potential: Places where a person could gain access to a bulk hazardous cargo,
packaged hazardous cargo , and ship's stores that could pose a threat, (compressed gases,
dangerous solvents, flares, line throwing gun), etc...
 Identify Location of Security Equipment:
 Lighting Controls,
 CTV and other surveillance equipment installed.
 Intruder alert devices.
 Etc.
 The placement and operation of the Security Alert System. This information will be kept in
very' strict confidential place. The Master will determine who in the crew will have access to
this information.

3.5 THE PORT FACILITY


A port facility is required to act upon the security levels set by the Contracting Government within
whose territory it is located. Security measures and procedures shall be applied at the port facility
in such a manner as to cause a minimum of interference with, or delay to, passengers, ship, ship's
personnel and visitors, goods and services.

At security level 1, the following activities shall be carried out through appropriate measures in all
port facilities, taking into account the guidance given in part B of this Code, in order to identify
and take preventive measures against security incidents:

1. Ensuring the performance of all port facility security duties;


2. Controlling access to the port facility;
3. Monitoring of the port facility, including anchoring and berthing area(s);
4. Monitoring restricted areas to ensure that only authorized persons have ac<
5. Supervising the handling of cargo;
6. Supervising the handling of ship's stores; and
7. Ensuring that security communication is readily available.

At security level 2 , the additional protective measures, specified in the port facility security plan,
shall be implemented for each activity detailed in ISPS code taking into account the guidance
given.

At security level 3, further specific protect! specified in the port facility security plan, shall be
implemented for each activity detailed in ISPS code taking into account the guidance given .

In addition, at security level 3, port facilities are required to respond to and implement any
security instructions given by-the contracting government within whose territory the port facility
is located.

When a port facility security 'officer is advised that a ship encounters difficulties in complying
with the requirements or in implementing the appropriate measures and procedures as detailed
in the ship security plan, and in the case of security level 3 following any security instructions
given by the Contracting Government within whose territory the port facility is located, the port
facility security officer and ship security officer shall liase and co-ordinate appropriate actions.

When a port facility security officer is advised that a ship is at a security level, which is higher
than that of the port facility, shall report the matter to the competent authority and shall liase
with the ship security officer and co-ordinate appropriate actions, if necessary.

SeaSkills Maritime Academy, Coimbatore


9
SECURITY TRAINING FOR SEAFARERS

3.6 SHIP SECURITY OFFICER

A ship security officer shall be designated on each ship. In addition to those specified elsewhere
in this part of the Code, the duties and responsibilities of the ship security officer shall include,
but are not limited to:

1. Undertaking regular security-inspections of the ship to ensure that appropriate security


measure are maintained;
2. Maintaining and supervising the implementation of the ship security plan, including
amendment to the plan
3. Coordinating the security aspect of the handling of cargo, and ship's stores with other
shipboard personnel and with relevant port, facility security officers
4. Proposing modifications to the ship security plan
5. Reporting to the Company Security Officer any deficiencies and non-conformities
identified during internal audits, periodic reviews, security inspections and verifications
Compliance and implementing any corrective actions;
6. Enhancing security awareness and vigilance on board;
7. Ensuring that adequate training has been provided to shipboard personnel, as
appropriate:
8. Reporting all security incidents;
9. Coordinating implementation of the ship security plan with the company security officer
and the relevant port facility security officer; and
10. Ensuring that security equipment is properly operated, tested, calibrated a maintained, if
any.

3.7 COMPANY SECURITY OFFICER

The Company shall designate a company security officer. A person designated as the company
security officer may act as the company security officer for one or more ships, depending on the
number or types of ships the Company' operates provided it is clearly identified for which ships
this person is responsible. A Company may, depending on the number or types of ships they
operate designate several persons as company security officers provided it is clearly identified for
which ships each person is

The duties and responsibilities of the company security officer shall include, but are not limited
to:

1. Advising the level of threats likely to be encountered by the ship, using appropriate
security assessments and other relevant information;
2. Ensuring that ship security assessments are carried out;
3. Ensuring the development, the submission for approval, and thereafter the
implementation and maintenance of the ship security plan;
4. Ensuring that the ship security plan is modified, as appropriate, to correct efficiencies
and satisfy the security requirements of the individual ship;
5. Arranging for internal audits and reviews of security activities;
6. Arranging for the initial and subsequent verifications of the ship by the administration or
the recognized security Organization;
7. Ensuring that deficiencies and non-conformities identified during internal audits,
periodic reviews, security inspections and verifications of compliance are promptly
addressed and dealt with:
8. Enhancing security awareness and vigilance;
9. Ensuring adequate training for personnel responsible for the security of the ship;

SeaSkills Maritime Academy, Coimbatore


10
SECURITY TRAINING FOR SEAFARERS

10. Ensuring effective communication and co-operation between the ship security officer and
the relevant port facility security officers;
11. Ensuring consistency between security requirements and safety requirement;
12. Ensuring that, if sister-ship or fleet security plans are used, the plan for each ship
reflects ship-specific information accurately; and
13. Ensuring that any alternative or equivalent arrangements approved for a particular ship
group of ships are implemented and maintained.

3.8 PORT FACILITY SECURITY OFFICER


A port facility is required to act upon the security levels set by the Contracting Government
within whose territory it is located. Security measures and procedures shall be applied at the
port facility: such a manner as to cause a minimum of interference with, or delay to, passengers,
ship, ships: personnel and visitors, goods and services.

AT SECURITY LEVEL 1

The following activities shall be carried out through appropriate measures in all port facilities,
taking into account the guidance given in part B of this Code, in order to identify and take
preventive measures against security incidents:

1. Ensuring the performance of all port facility security duties;


2. Controlling access to the port facility;
3. Monitoring of the port facility, including anchoring and berthing area(s);
4. Monitoring restricted areas to ensure that only authorized persons have access;
5. Supervising the handling of cargo
6. Supervising the handling ship’s stores; and
7. Ensuring that security communication is readily available.

AT SECURITY LEVEL 2

The additional protective measures, specified in the port facility security plan, shall be
implemented for each activity.

AT SECURITY LEVEL 3

Further specific protective measures, specified in the port facility security plan, shall be
implemented for each activity
In addition, at security level 3, port facilities are required to respond to and implement any
security instructions given by the Contracting Government within whose territory the port
facility is located.
HIM

3.9 SEAFARERS WITH DESIGNATED SECURITY DUTIES

 The master shall not be constrained by the Company, the charterer or any other person
from taking or executing any decision, which, in the professional judgment of the master, is
necessary to maintain the safely and security of the ship. This includes denial of access to
persons (except those identified as duly authorized by a Contracting Government) or their
effects and refusal to. Load cargo, including containers or other closed cargo transport
units.

SeaSkills Maritime Academy, Coimbatore


11
SECURITY TRAINING FOR SEAFARERS

 If, in the professional judgment of the master, a conflict between any safety and security
requirements applicable to the ship arises during its operations the master shall give effect
to those requirements necessary to maintain the safety of the ship. In such cases, the
master may implement temporary security measures and shall forthwith inform the
Administration if appropriate; the Contracting Government in Whose port the ship is
operating or intends to enter. Any such temporary security measures under this regulation
shall, to the highest possible degree, be commensurate with the prevailing, security level.
When such cases are identified, the Administration shall ensure that such conflict are
resolved and that the possibility recurrence is minimized.

3.10 PORT FACILITY PERSONNEL WITH DESIGNATED SECURITY DUTIES


A port facility security plan shall be developed and maintained, on the basis of a port facility
security assessment, for each port facility, adequate for the ship/port interface. The plan shall
make provisions for the three security levels, as defined in this part of the Code.

The port facility security plan shall be approved by the Contracting Government in whose territory
the port facility is located.

Such a plan shall be developed taking into account the guidance given in Part B of the Code and
shall be in the working language of the port facility. The plan shall address, at least, the following:

1. Measures designed to prevent weapons or any other dangerous substances and Devices
intended for use against people, ships or ports and the carriage of which is not authorized,
from being introduced into the port facility or on board a ship
2. Measures designed to prevent unauthorized access to the port facility, to ships moored at
the facility, and to restricted areas of the facility
3. Procedures for responding to security threat or breaches of security including provisions for
maintaining critical operations of the port facility or ship/port interface
4. Procedures for responding to any security instructions the contracting Government, in
whose territory the port facility is located, may give at security level 3.
5. Procedures for evacuation in case of security threats or breaches of security; duties of port
facility personnel assigned security responsibilities and of other facility personnel on
security aspects;
6. Procedures for interfacing with ship security activities
7. Procedures for the periodic review of the plan and updating
8. Procedures for reporting security incidents
9. Identification of the port facility security officer including 24-hour contact details
10. Measures to ensure the security of the information contained in the plan
11. Measures designed to ensure effective security of-cargo and the cargo handling equipment
at the port facility;
12. Procedures for auditing the port facility security plan;
13. Procedures for responding in case the ship security alert system of a ship at the port facility
has been activated; and
14. Procedures for facilitating shore leave for ship's personnel or personnel changes, as well as
access of visitors to the ship including representatives of seafarers' welfare and labour
organizations.

SeaSkills Maritime Academy, Coimbatore


12
SECURITY TRAINING FOR SEAFARERS

15. Personnel conducting internal audits of the security activities specified in the plan or
evaluating its implementation shall be independent of the activities being audited unless
this is impracticable due to the size and the nature of the port facility.

The port facility security plan may be combined with, or be part of, the port security plan or any
other ports emergency plan or plans.

3.11 OTHER PERSONNEL

All other ship personnel are responsible to

 Assist the ship security officer


 Report security violations
 Assist the SSO with the implementation of ship security bills
 Reporting discrepancies in those bills

SeaSkills Maritime Academy, Coimbatore


13
SECURITY TRAINING FOR SEAFARERS

CHAPTER 4
SHIP SECURITY ASSESSMENT

4.1 ASSESSMENT TOOLS


SHIP SECURITY ASSESSMENT

A ship security assessment is a mandatory and essential part of the process to develop a ship
security plan. Company security officers are responsible for ensuring that a ship security
assessment carried out for each ship they are responsible for.

THE SHIP SECURITY ASSESSMENT

 Is to be carried out by persons with the appropriate skills and knowledge to evaluate the
security the ship and must contain an on-scene security survey for that specific ship
 Must be documented, reviewed, accepted and retained by the company
 Must accompany the ship security plan when put forward for approval Upon completion of
the ship security assessment, a
report shall be prepared, consisting
of:
 A summary of how the
assessment was conducted
 A description of each
vulnerability found during
the assessment
 A description of counter
measures that could be
used to address each
vulnerability

It is not a requirement to keep the


ship security assessment with the
ship security plan, however it is
highly recommended to do so for
ease of review, amendment and
access in the event of a security
incident.

PRODUCING A SHIP SECURITY


ASSESSMENT

A ship security assessment can be


produced in two ways.

INDIVIDUAL

A ship security assessment


including the required on scene
security survey compiled for a
single specific ship.

GENERIC

SeaSkills Maritime Academy, Coimbatore


14
SECURITY TRAINING FOR SEAFARERS

A company may produce a generic ship security assessment that covers the assessment of security
risk across a part of their fleet, or their entire fleet, provided that an "on-scene security survey" has
been carried out on each individual ship and the ship security assessment reflects all relevant
“ship specific" aspects.

4.2 ON-SCENE SECURITY SURVEYS

Phase 2 of the ship security assessment recommended here is the on-scene security survey. The
on-scene security survey should examine and evaluate existing shipboard protective measures,
procedures and operations for:

 Ensuring the performance of all ship security duties


 Monitoring restricted areas to ensure that only authorized persons have access
Controlling access to the ship, including any identification systems;
 Monitoring of deck areas and areas surrounding the ship;
 Controlling the embarkation of persons and their effects (accompanied and
unaccompanied baggage and ship's personnel personal effects);
 Supervising the handling of cargo and the delivery of ship's stores:
 Ensuring that ship security communication, information, and equipment are readily
available.

SeaSkills Maritime Academy, Coimbatore


15
SECURITY TRAINING FOR SEAFARERS

CHAPTER 5
SECURITY EQUIPMENT
5.1 SECURITY EQUIPMENT AND SYSTEMS
Mandatory requirement regarding carriage of Ship Security alarm system
 All ships shall be provided with a ship security alert system, as follows:
 Ships constructed on or after 1 July 2004;
 Passenger ships, including high-speed passenger craft, constructed before 1 July
2004, not later than the first survey of the radio installation after 1 July 2004;
 Oil tankers, chemical tankers, gas carriers, bulk carriers and cargo high speed craft,
of 500 gross tonnage and upwards constructed before 1 July 2004, not later than the
first survey of the radio installation after 1 July 2004; and
 Other cargo ships of 500 gross tonnage and upward and mobile offshore drilling units
constructed before ' July 2004, not later than the first survey' of the "radio
installation after 1july 2006.

The ship security alert system, when activated, shall:

Initiate and transmit a ship-to-shore security to. a competent authority designated by the
Administration, which in these circumstances may include the company, identifying the ship, its
location and indicating that the .security of the ship is under threat or it has been compromised;
 Not send the ship security alert to any other ships
 Not raise and alarm on-board the Ship; and
 Continue The ship security alert until deactivated and/or reset.

The ship security alert system shall:

 Be capable of being activated from the navigation bridge and in at least one other
location:
 Conform to performance standards not inferior to those adopted by the Organization.
 The ship security alert system activation points shall be designed so as to prevent the
inadvertent initiation of the ship security alert.
 The requirement for a ship security alert system may be complied with by using the
radio installation fitted for compliance with the requirements of chapter IV, provided
all requirements of this regulation are complied with.
 When an Administration receives notification of a ship security alert, that
Administration shall immediately notify the State(s) in the vicinity of which the ship is
presently operating.
 When Contracting Government receives notification of a ship security alert from a
ship which is no: entitled to fly its flag, that Contracting Government shall
immediately notify the relevant: Administration and, if appropriate, the State(s) in the
vicinity of which the ship is presently operating.

SeaSkills Maritime Academy, Coimbatore


16
SECURITY TRAINING FOR SEAFARERS

5.3 TESTING, CALIBRATION AND MAINTENANCE OF SECURITY


EQUIPMENT AND SYSTEMS

MAINTENANCE OF SECURITY EQUIPMENT


The company security officer shall develop a plan for maintenance, calibration and testing of
security equipment of security related equipment based upon the ship design, structure and
equipment available this section of the plan should

 Identify the security related equipment


 Describe intervals between inspection or examination of specific equipment
 Define who will conduct the maintenance (crewman r an outside contractor) and
 Describe communications relating to the availability of equipment due to failure or
maintenance

SeaSkills Maritime Academy, Coimbatore


17
SECURITY TRAINING FOR SEAFARERS

CHAPTER 6
THREAT IDENTIFICATION, RECOGNITION, AND RESPONSE

6.1 RECOGNITION AND DETECTION OF WEAPONS, DANGEROUS


SUBSTANCES AND DEVICES
A dangerous substance can be disguised in many ways. It can be placed or delivered in a
number of ways.

 In accompanied passenger cars, freight vehicles or coaches.


 In mis-declared cargo.
 Carried on board by current passengers,or those from a previous sailing leaving a timed
device.
 In luggage placed in a baggage trolley
 In the ship ‘s stores
 In the post.
 Carried onboard by shore workers in port by contractor’s personnel.

The SSP should establish the security measures to be applied to ensure that Dangerous
substances (i.e. any baggage, including personal effects, which is not with the passenger or
member of ship’s personnel at the point of inspection or search) is identified and subjected to
appropriate screening, including searching, before it is accepted on board the ship. It is not
envisaged that baggage will be subjected to screening by both the ship and the port facility, and in
cases where both are suitably equipped, the responsibility for screening should rest with the port
facility. Close co-operation with the port facility is essential and steps should be taken to ensure
that unaccompanied baggage is handled securely after screening.

SECURITY LEVEL 1

At security level 1, the SSP should establish the security measures to be applied when handling
baggage to ensure that baggage is screened or searched up to and including 100 percent, which
may include use of x-ray screening and physical search of passenger or person entering the areas.

SECURITY LEVEL 2

At security level 2, the SSP should establish the additional security measures to be applied when
handling with dangerous substances which should include 100 percent x-ray screening of all
baggage.

SECURITY LEVEL 3

At security level 3, the ship should comply with the instructions issued by those responding to the
security incident or threat thereof. The SSP should detail the security measures which could be
taken by the ship, in close co-operation with those responding and the port facility, which may
include:

 subjecting such baggage to more extensive screening, for example x-raying it from at least
two different angles;
 preparation for restriction or suspension of handling of unaccompanied baggage ;and
 refusal to accept unaccompanied baggage on board the ship.

SeaSkills Maritime Academy, Coimbatore


18
SECURITY TRAINING FOR SEAFARERS

6.2 METHODS OF PHYSICAL SEARCHES AND NON-INTRUSIVE


INSPECTIONS
 Physical searches of persons, personal effects, baggage, cargo, and ship’s stores are carried
by the ship security officer.
 Checking the identity of all persons seeking to board the ship and confirming their reasons
for doing so by checking, for example, joining instructions, passenger tickets, boarding
passes, work orders etc
 In liaison with the port facility the ship should ensure that designated secure areas are
established in which inspections and searching of persons, baggage (including carry on
items), personal effects, vehicles and their contents can take place
 In liaison with the port facility the ship should ensure that vehicles destined to be loaded
on board car carriers, RO-RO and other passenger ships are subjected to search prior to
loading, in accordance with the frequency required in the SSP
 Segregating checked persons and their personal effects from unchecked persons and their
personal effects;
 Segregating embarking from disembarking passengers
 Identification of access points that should be secured or attended to prevent unauthorized
access;
 Securing, by locking or other means, access to unattended spaces adjoining areas to which
passengers and visitors have access
 Providing security briefings to all ship personnel on possible threats, the procedures for
reporting suspicious persons, objects or activities and the need for vigilance.

In security level 1 all those seeking to board a ship should be liable to search. The frequency of
such searches, including random searches, should be specified in the approved SSP and should be
specifically approved by the Administration. Such searches may best be undertaken by the port
facility in close co-operation with the ship and in close proximity to it. Unless there are clear
security grounds for doing so, members of the ship’s personnel should not be required to search
their colleagues or their personal effects. Any such search shall be undertaken in a manner which
fully takes into account the human rights of the individual and preserves their basic human
dignity.

6.3 EXECUTION AND COORDINATION OF SEARCHES

The master and SSO are responsible for establishing search procedures. Drills should be held to
ensure that such plans are efficient, workable and understood.

The search should be conducted according to a specific plan and must be carefully controlled to
ensure a complete search is conducted.

The plan should cover all options and ensure no overlap or omission. There must be a system for
marking or recording searched or clean areas. Ideally, deck and areas to be searched should be
numbered. This enables searched areas, spaces and decks to be checked off when searched and
clean.

The search should be familiar with the areas to be searched. This will help suspicious articles
being noticed. A central point should be established to which searchers report.

Plans should be drawn up for a quick search and a comprehensive search. A quick search could
be used when a short warning time is give before a potential bomb detonation.

SeaSkills Maritime Academy, Coimbatore


19
SECURITY TRAINING FOR SEAFARERS

The search plan should be established to ensure, when necessary the procedure can be
implemented quickly and effectively. It should be practiced regularly to ensure all crew members
are familiar with its operation.

 Nominate incident controller (SSO)


 Nominate the incident control plan
 Using GA's establish priority and direction of areas to be searched.
 Method of marking and reporting areas that have been cleared. An approach would be to
code all areas of the ship to be searched by deck and room/space number.
 Search team leaders, should be designated from each of the areas to be searched.
 Search teams should be one or two persons.
 UHF or VHF radios should not be used during the search.
 Do not assume that only one device is present. Continue search until entire ship has been
searched.
 Centralize all personnel not involved, if possible close to evacuation points.
 Searches should be divided into heights for multiple sweeps.
 The first sweep should cover all items from the floor to the waist.
 The second sweep should cover items from the waist to shoulder height.
 The third sweep should cover shoulder height to the ceiling.
 Final sweep should cover light fittings, vents and piping running across the ceiling.
 After the room has been divided horizontally it should be divided vertically in to two parts.
 An imaginary line is drawn through the centre of the room to a reference point at the far
wall. The search team split up and sweep everything on opposite sides of the room, up to
that point, then back through the centre of the room to the start point.

6.4 RECOGNITION, ON A NON-DISCRIMINATORY BASIS, OF PERSONS


POSING POTENTIAL SECURITY RISKS
Possible acts that could threaten the security of assets and the methods of carrying out those acts,
should be identified to evaluate the vulnerability of a given asset or location to a security incident,
and to establish and priorities security requirements to enable planning and resource allocations.
Identification and evaluation of each potential act and its method should be based on various
factors, including threat assessments by Government agencies. By identifying and assessing
threats, those conducting the assessment do not have to rely on worst-case scenarios to guide
planning and resource allocations.

The safety arrangement should include an assessment undertaken in consultation with the
relevant national security organizations to determine

 Any particular aspects of the port facility, including the vessel traffic using the facility,
which make it likely to be the target of an attack
 The likely consequences in terms of loss of life, damage to property, economic disruption,
including disruption to transport systems, of an attack on, or at, the port facility
 The capability and intent of those likely to mount such an attack
 The possible type, or types, of attack

Producing an overall assessment of the level of risk against which security measures have to be
developed.

SeaSkills Maritime Academy, Coimbatore


20
SECURITY TRAINING FOR SEAFARERS

6.6 CROWD MANAGEMENT AND CONTROL TECHNIQUES

Security level 1
 Segregate embarking and disembarking passengers
 Verify the reason personnel are embarking from the ship by using tickets, boarding
passes, and work orders, company security officer to describe procedures to be used by
the ship
 Positively identify crewmembers prior to boarding using their seafarer’s identification
record, passport or other positive means of identification and verify their authority to
serve aboard the ship

Security level 2
 Provide security briefings to all crew and passengers prior to departing on any specific
threats and the need for vigilance and reporting suspicious persons, objects, or activities.
 Increase the frequency and detail of inspecting persons, carryon item for prohibited
weapons, explosives, etc.
 Positively identify personnel prior to each embarkation

Security level 3
 Inspect all persons, carryon items for prohibited weapons, explosives, etc.,
 Provide security briefing to all crew and passengers, prior to each embarkation and
disembarkation, on any specific threats and the need for vigilance and reporting
suspicious persons, objects or activities
 Escort all service providers or other personnel who need to board
 Assign additional personnel to guard designated areas
 Assign personnel to continuously patrol designated areas
 Increase the detail and frequency of controls used for people boarding the ship

SeaSkills Maritime Academy, Coimbatore


21
SECURITY TRAINING FOR SEAFARERS

CHAPTER 7
SHIP SECURITY ACTIONS

7.1 ACTIONS REQUIRED BY DIFFERENT SECURITY LEVELS


SECURITY LEVEL 1

 Brief crewmembers on watch on any special security conditions.


 Deploy a 24-hour deck watch/roving patrol.
 Issue a Ship security bill designating personnel assignments.
 Equip the Watch Officer and Engine Room Watch Officer with portable hand-held
communication devices.
 Secure all identified access points.
 Strictly control access on and off the ship; verify the identity of all persons.
 Search the baggage and all carry-on items before embarkation.
 Limit and/or restrict access to critical ship areas to authorized personnel.
 Raise and/or secure all ladders, ramps, and gangways when not in use.
 Illuminate the main deck, all active access points, and the inboard/outboard sides during
periods of darkness.
 Verify the cargo and the ship's stores against a manifest.
 Verify the integrity of the cargo and ship's stores to ensure there has been no tampering.
 Restrict access to the cargo area at sea.
 Keep unmanned areas, such as storerooms, locked
 Secure all hatchways in controlled areas
 Ensure rat guards are used alongside the pier.
 Conduct spot checks to ensure security at access points.
 Activate security equipment, such as alarms, automatic intrusion detection devices, and
surveillance cameras.

SECURITY LEVEL 2

 Assign additional personnel guard access points.


 Assign personnel to guard restricted areas.
 Increase the frequency and detail of security patrols.
 Coordinate waterside boat patrols with the port facility.
 Limit the number of access points; identify and secure closed access points.
 Advise passengers and crew to not leave packages/baggage unattended.
 Check seals on containers and other cargo lockers.
 Provide security briefings to all crew and passengers on any specific threats and the need to
be vigilant.
 Maintain close communications with security authorities.
 Provide additional shore side lighting by coordinating with the port facility.
 Restrict access to the bridge, engine room, and other restricted areas to specific
crewmembers.
 Escort and strictly control all visitors.
 Advice shore authorities if a visitor declines to accept security measures.
 Augment bridge watches and lookouts.
 Increase verification and checking of cargo and ship's stores.

SECURITY LEVEL 3

 Modify crew liberty/shore leave so the Master can gel underway on short notice.
 Limit access to a single location.

SeaSkills Maritime Academy, Coimbatore


22
SECURITY TRAINING FOR SEAFARERS

 Restrict visitor access 10 official business: continuously escort all visitors.


 Post-additional personnel to ensure the ship perimeter are constantly under surveillance.
 Intensify roving patrols. Especially on deck.
 Assign a Watch Officer lo all active ladders, ramps, and gangways.
 Consider postponing the delivery of all stores.
 Prohibit all vehicles, workboats, and barges from coming alongside while at port.
 Place additional light on the main deck, access areas, and inboard/outboard sides at night.
 Lay out fire hoses at access areas and ensure they can be manned on two-minute's notice.
 Check all crew lockers and storage locations.
 Inspect the hull while in port and where practical
 lock all door/hatches from the inside to control access.
 Brief all personnel on potential threats, procedures and the necessity to remain vigilant.
 Get or stay underway, if possible.

7.2 MAINTAINING SECURITY OF THE SHIP/PORT INTERFACE

 The maintenance of communication protocols for ships and port facilities;


 Preventing unauthorized access to ships, port facilities and their restricted are
 Preventing the introduction of unauthorized weapons, incendiary devices or explosives to
ships or port facilities;
 Providing means for raising the alarm in reaction to security threats or security incidents;
 Requiring ship and port facility security plans based upon security assessments

7.3 FAMILIARITY WITH THE DECLARATION OF SECURITY

1. A ship can request completion of a Declaration of Security when:

 The ship is operating at a-higher security level than the port facility or another
ship it is interfacing with;
 There is agreement on Declaration of Security between Contracting Governments
covering certain international voyages or specific ships on those voyages; there
has been a security threat or a secure incident involving the ship or involving the
port facility as applicable
 The ship is at a port which is not required to have and implement an approved
port facility security plan
 The ship is conducting ship-to-ship activities with another ship-not required to
have and implement an approved ship security plan.

2. Requests for the completion of declaration of Security shall be acknowledged by the


applicable port facility or ship.
3. The Declaration of Security shall be completed by:

 The master or the ship security officer on behalf of the ship(s); and, if appropriate,
 The port facility security officer or, if the Contracting Government determines
 Otherwise, by art/other body responsible for shore-side security, on behalf of the
port Facility.

4. The Declaration of Security shall address the security requirements that could be shared
between a port facility and a ship (or between ships) and shall state the responsibility for
each.
5. Contracting Governments shall specify the minimum period for which Declarations of
Security shall be kept by the port facilities located within their territory.

SeaSkills Maritime Academy, Coimbatore


23
SECURITY TRAINING FOR SEAFARERS

6. Administrations shall specify the minimum period for which Declarations of Security}
shall be kept by ships entitled to fly their flag.

7.4 REPORTING SECURITY INCIDENTS


 The ship security officer has to report the company security officer about security drill,
exercise
 The execution of security plan toward any threat by ship’s security officer
 The ship’s security officer will immediately report to the company security officer when
the effectiveness of security equipment is compromised due to equipment failure or
malfunction and will implement operational measures to compensate for the loss of
equipment.

7.5 EXECUTION OF SECURITY PROCEDURES


SECURITY PROCEDURE IN PORT

 Minimize access points preferably to a single controlled gangway or ship’s side


companion way
 Keep emergency ladders clear of the water; raise and stow pilot ladders immediately after
use
 Provide two security officers at access points if a threat warrants the response
 Establish permeter security measures, such as weather deck and ship side lighting deck
and jetty patrols and secure rat guards on mooring lines
 Search all deliveries when possible; conduct frequent, random, and overt searches if all
material cannot be examined.
 Search all visitors and escort them while on board
 Keep small craft in the vicinity under constant surveillance
 Carefully control documents containing information about the cargo or ship’s itinerary
 Conduct a search of the ship before sailing and secure all doors and other access points

Security procedure at sea


When approaching or sailing through high-risk areas
 Augment bridge watches and lookouts
 Establish additional watches on the stern and where there are visual and radar blind
spots
 Equip watches with low light binoculars and/or night vision goggles
 When monitoring nearby ships, give additional attention to small craft matching the
speed of the ship or traveling parallel to the ship.

SeaSkills Maritime Academy, Coimbatore


24
SECURITY TRAINING FOR SEAFARERS

CHAPTER 8
EMERGENCY PREPAREDNESS, DRILLS, AND EXERCISES

8.1 EXECUTION OF CONTINGENCY PLANS


Ship should have the following possible contingency plans
 Action on bomb threat
 Action on finding a suspicious device or package
 Action on searching the ship
 Establishing a search plan
 Action on weapons/explosives discovered onboard
 Action on hijacking or hostile boarding
 Action on a suspect boat approaching the vessel
 Action on a breach of security

The contingency plan is created and maintained at all time by the ship security officer. The
appropriate contingency plan should be executed in case of emergency in the order described in
the plan. During the execution of plan all the person remain calm, and perform their work.
Overlapping of the work should be avoided. The plan will be continued until the emergency is
over or verbal order given by master/security officer.

8.2 SECURITY DRILLS AND EXERCISES


A properly trained crew is a strong deterrent to prevent attacks and other threats. A continuous
and thorough training program should support measures to safeguard the security of the ship,
crew, and cargo. It is important that all ship and shipboard-personnel understand their
responsibilities for ship security and shall have sufficient-knowledge and ability to perform their
assigned duties.

All crewmen will receive familiarization training when they report on board regarding their
specific security duties.

Drills shall be conducted at least once every three months or whenever there is crew change
involving a significant portion-of the crew in order to ensure the adequacy of the Ship Security
Plans.
This includes

 Inspection, control and monitoring duties required by pertinent regulations, policies, and
laws.
 Detection and identification of weapons and other dangerous substances and devices.
 operation, calibration, underway, maintenance and testing of security equipment;
 Physical search methods of persons, baggage, cargo, and ship stores.
 Emergency procedures
 Recognition f characteristics and behavioral patterns of persons who are likely to
threaten the security of the ship.
 Techniques that foster calming behavior.
 Techniques used by others to circumvent protective measures.
 Crews shall also be involved in an exercise involving the Company Security Officer at
least once a year.

8.3 USE OF CITADEL WHERE PROVIDED ONBOARD

SeaSkills Maritime Academy, Coimbatore


25
SECURITY TRAINING FOR SEAFARERS

The intended use of the Citadel should be considered during the Risk Assessment and planning
phase – the following points might be considered;
 The intended use of the Citadel may differ in varying geographic locations, for example, is
the Citadel intended for use in the Gulf of Aden/IRTC area, in the wider Indian
Ocean/Somali Basin, or both
 Both the Company and the vessel should have procedures regarding the use of the Citadel
in place that are fully understood by all parties. The exact time that the Citadel is to be
utilized should also be carefully considered, bearing in mind that all defensive measures
should be adopted in order to prevent the pirates from actually getting on board in the first
place. The time to utilize the Citadel could for example be; once the pirates are on board, or
once a ladder has been successfully deployed and there is no way that a boarding can be
prevented. Procedures should be absolutely specific in determining this point, since in turn;
this will determine how long it will take a vessel to secure an effective ‘lock down’.
 As the Citadel is being manned all other compartments should be locked, and all
approaches to the Citadel secured. It is recommended that whilst in the High Risk Area all
non-essential compartments remain locked at all times when not in use to prevent any
delay in securing the Citadel during an incident.
 Consideration will have to be taken as to the exact use of the Citadel should the vessel have
a Security Team on board. The Citadel will only be effective if all crew, security teams and
personnel onboard embarked for the passage are secured within the Citadel. When
determining the operating instructions for a Citadel it should be borne in mind that Military
Forces will not board a vessel unless all personnel onboard are confirmed as safely secured
within the Citadel.
 The use of a password system whereby the master will only exit the Citadel upon an agreed
verbal signal is recommended. The agreed password should only be exchanged via secure
communications, (satellite phone), and it is recommended that the password exchange is
known by both the Company and the vessel. This ensures that the Naval/Military forces
can be made aware of the password(s) and equally importantly ensures that any
misinformation by the pirates over the VHF can be ignored.
 If a citadel is to be considered, then it is essential that the pirates are denied access to the
vessel’s propulsion in order to ensure that the vessel cannot be sailed off by the pirates
themselves. While it may be impossible in the majority of existing ships, it may also be
considered advantageous to be able to safely maneuver and control the ship from inside the
citadel. In many cases involving use of a citadel, the vessel has simply stopped and
“blacked” out with the crew safely gathered inside the citadel.
 In some circumstances and following discussion with military authorities advantage may be
gained by steaming towards the nearest responding naval vessel. This option is, in some
circumstances, advocated by military authorities, but it should be preplanned and agreed
by all of the relevant stakeholders (owner/manager, master, flag, charterer etc). This
reflects the exceptional and unique circumstances the vessel would find itself in once the
pirates had boarded. A complete lighting blackout (with the exception of the citadel) has
also proven to be an effective delaying tactic.
 The importance of training if a Citadel has been utilized cannot be overestimated. The crew
will need to drill exactly what to do, when to do it, and become fully familiar with their role,
and the alarms / signals involved. The whole concept of a Citadel is lost if any member of
the crew is left outside before the Citadel is secured. Such training may also include
securing all approaches to the Citadel where applicable. In addition the training should
involve personnel locking all public rooms and cabins as a further delaying tactic.
 There have been cases where the pirates have used hostages from a mother ship and
ordered them to attempt to gain access to the Citadel of another ship. Bearing in mind that
the pirates may threaten the hostage with their life, the Company is advised to have a
specific procedure in place to allow for this eventuality, and the vessel should be instructed
in the appropriate response.

SeaSkills Maritime Academy, Coimbatore


26
SECURITY TRAINING FOR SEAFARERS

 The Company should have procedures in place detailing a scenario where the
Naval/Military forces are unable to respond, and the actions required of the crew in this
situation. These may include the following:
 If the pirates are on board, the length of time of a stand-off should be considered.
The possibility that the pirates may become increasingly desperate should be taken
into account.
 If there is reason to believe that the pirates have left the vessel, the length of time
before the Citadel is opened, the number of personnel permitted to investigate, and
further actions if it is discovered that the pirates are still on board, should all be
considered. In this respect knowledge of any forthcoming military assistance and
use of CCTV where possible may prove to be invaluable.

SeaSkills Maritime Academy, Coimbatore


27
SECURITY TRAINING FOR SEAFARERS

CHAPTER 9
SECURITY ADMINISTRATION

9.1 DOCUMENTATION AND RECORDS

The following records are required to be maintained by the ISP Code Part A Section 10. Additional
records will need to be maintained to demonstrate full compliance with the requirements of the
ISPS Code. Details of these records are included in the security procedures, which are attached to
the ship security plan.

 Security records for previous ship/port facility and ship/ship interfaces- Minimum of 10
taking account of Flag requirements, Previous Declaration of Security documents
 Security Drills
 Security Exercises
 Security Training
 Audits (internal and external)
 Previous assessments and proposed amendments
 Approved amendments
 Security reports (incidents and reports)

Each ship shall carry on board a Ship security plan (SSP) approved by the Administration.
The plan must be developed based on guidance provided by the International Maritime
Organization (IMO).

The Company Security Officer is responsible for preparing the Ship Security Plan (SSP).Each
ship's plan contents should vary depending on the type of ship and the ship's operating area.

The Ship Security plan may be combined with the safety management system. The Company
and the Administration must approve the plan. Changes to the plan which must be approved
by the Administration-include:

 Equipment Changes,
 Change in the identification of:
 Layers of protection,
 Access points and
 Unauthorized access areas
 Change of Ship contact information,
 Change of Company Contact Information, and
 Changes in security procedures on board

The Plan may be kept in an electronic form and must be protected from unauthorized access
or disclosure.

SeaSkills Maritime Academy, Coimbatore


28

Das könnte Ihnen auch gefallen