Beruflich Dokumente
Kultur Dokumente
Introduction
Section 1
Welcome
Please tell us a little about yourself
Where are you from?
What part of the Maritime industry do
you work in?
How long have you been working in
this industry?
Course Overview
Provide Knowledge required for both CSO
(Company Security Officer) & VSO (Vessel
Security Officer) to perform their duties in
accordance with;
Amendment to the Annex to the International
Convention for the Safety of Life at Sea
(SOLAS), 1974 as amended and;
IMOs (International Maritime Organization)
ISPS Code parts A & B
Maritime Transportation Security Act (MTSA)
and 33 CFR, Subchapter HMaritime Security
Competencies to be achieved
See Handout (1)
Company Security Officer
Vessel Security Officer
Historical Prospective
Terrorism and the
Maritime Domain
Maritime Terrorism
Any person or group, acting outside
the jurisdiction of a sovereign state,
for a political motive, who (i)
executes or plots to execute an
attack against a ship, port facility or
offshore facility or (ii) attempts to
further their political motives by
utilizing elements in the maritime
environment to execute an act of
terrorism.
Guerrilla Warfare
Purposeful targeting of
Military personnel and
installations in order to
achieve a political goal
Revolutionaries
Anarchists
Freedom Fighters
Terrorism
Purposeful targeting of
Civilians in order to achieve a
political goal
The Seaborne
Spirit
5 Nov - 05
F.A.R.C.
Established in 1964 as a ruralbased, pro-Soviet guerrilla army.
Has been anti-United States since
its inception.
Located in Columba
Attacks of 9-11
Current security
threats & patterns
Whats going on today
Oil Tankers
Cargo ships
OSC Platforms
Piracy
Could it be terrorism?
Piracy defined:
Shipping robbery on the high seas,
especially the stealing of a ships
cargo
Air the hijacking of an aircraft or
another form of transportation
transport robbery committed on
board any form of transportation,
especially an aircraft.
Murder on the high seas
Piracy is worldwide
Straits of Malacca
Piracy
Reporting Piracy
The Regional Piracy Centre
Receives and distributes information
Collates and analyzes information and
issues consolidated reporting to relevant
bodies.
Gives guidance on what ship owners and
ships operators can do to
prevent/suppress acts of piracy
Assists owners and crews of ships that
have been attacked
Locates vessels that have been seized by
pirates and recovers stolen cargoes
Check out www.iccwbo.org
Terrorist Patterns
Use military type of development
and deployment:
Terrorist will pick a target to attack that
they feel has a good chance of
success
Reconnaissance of the planned target.
Funding and recruiting.
Planning and testing.
Execution and hopeful success.
Intermodal scenario
Container is loaded in
Taiwan
It has your cargo and the
cargo of 10 others inside
of it.
It is placed on a truck
and sent to a port facility
It is loaded into a ship
Ship crosses ocean and
lands in Long Beach,
California, U.S.A.
It is off loaded and placed
in a holding area
Maritime Security
Policy
Section 2
Chapter XI
Regs. 3&5
Chapter XI-2
Regs. 1-13
Part B
Guidance given for Part A
MTSA Regulations
33 CFRNavigation and Navigable
Waters
Parts 101-106 Maritime Security
Part 101General
Part 103--Area Maritime Security
Part104Vessels
Part 105Facilities
Part 106Outer Continental Shelf
(OCS) Facilities
Definitions
SOLAS Chapter XI-2, Reg. 1
ISPS Code A/2 and B/2
33 CFR 101.105
Legal Implications
Action/non-action by security
personnel
33 CFR 101.400-420
ISPS Code A/4, 6
SOLAS Chapter XI-2
Legal Implications
Law Enforcement
Vessel, Facility & OCS owners and operators
must permit law enforcement personal, in the
performance of official duties, who show
proper ID to enter/board without delay or
obstruction.
Upon boarding or entering, will as soon as
possible explain their mission to the master,
operator, owner or designated agent.
This is found in 33 CFR 101.515(c)
Security
Responsibilities
Section 3
Security Responsibilities
Contracting Governments
Recognized Security Organizations
The Company
The Ship
The Facility
Vessel Security Officer
Company Security Officer
Facility Security Officer
Vessel and Facility personnel with specific
security duties
All other personnel
Contracting Governments
Specific Responsibilities
ISPS Code A/4, B/1.6-1.8, B/4
SOLAS , Chapter XI-2, Reg. 3
33 CFR, Part 101, 102
U.S. Coast Guard
Captain of the Port (COTP)
Federal Maritime Security Coordinator
(FMSC)
Area Maritime Security (AMS)
Recognized Security
Organizations
Specific Responsibilities
ISPS Code B/4.3-4.6
The Company
The Company shall ensure that the
VSP contains a clear statement
emphasizing the masters authority
The Company shall designate a
CSO and a VSO and ensure they
are given the necessary support to
fulfill their duties and responsibilities
33 CFR 104.200-205
The Vessel
The Vessel shall comply with the
requirements of the VSP as per the
security level setISPS Part A/7.1
Compliance documentation
33 CFR 104.120
The Facility
The facility shall comply with the
relevant requirements of Chapter
XI-2 of SOLAS and the ISPS Code
ISPS Code Part A/14.1
Compliance documentation
33 CFR 105.105-150
Security Requirements
33 CFR 105.200
Security Personnel
Vessel Security
Assessment
Section 4
On-Scene Survey
Vessel owner/operator must ensure
that an on-scene survey is
conducted for each vessel
Verify and collect background
information
Examines and evaluates existing
vessel protective measures,
procedures, and operations
On-scene Survey
On Scene Survey
Supervising the handling of cargo and the
delivery of ships stores; and
Ensuring that vessel security
communication, information, and
equipment are readily available.
Using the ships GAs to do the OSS
should be done to make sure that parts of
the vessel have not been changed and
door ways turned into bulk heads.
Table 2
Table 3
Table 4
Table 5
Mitigation definitions
Mitigate:
Mitigation strategies, such as security
protective measures and/or procedures,
may be developed to reduce risk for that
scenario. An appendix to the VSP may
contain the scenario(s) evaluated, the
results of the evaluation, a description of
the mitigation measures evaluated, and
the reason mitigation measures were or
were not chosen.
Mitigation definitions
Consider:
The scenario should be considered
and mitigation strategies should be
developed on a case-by-case basis.
The VSP may contain the
scenario(s) evaluated, the results of
the evaluation, and the reason
mitigation measures were or were
not chosen.
Mitigation definitions
Document:
The scenario may not need a mitigation
measure at this time and therefore needs
only to be documented. However,
mitigation measures having little cost
may still merit consideration. The
security plan may contain the scenario
evaluated and the results. This will be
beneficial in further revisions of the VSP,
to know if the underlying assumptions
have changed since the last edition of
the security assessment.
Security Assessment
Documentation
Use of Assessment checklists
NVIC 10-02
VSA Reportsee 33 CFR
104.305(d)
Security Equipment
Section 5
Security Equipment
Personal Identification (ID Badges)
Laminated or secured against tampering
Contain:
Individuals full 1st name and last names with
middle initial
An accurate passport type photo that is
current
Bear the name of the issuing authority
A government authority or organization
The persons employer, union or trade
association must also be on the card
Watermark
Security Equipment
ID scanners
Security Equipment
Key pad entries
Security Equipment
Screening equipment
Hand Held
Scanners
Body
Scanner
Shoe scanner
Letter scanner
Security Equipment
Use of dogs not only works, but is a good deterrent
to the would-be attackers that might be doing
reconnaissance
Security Equipment
Adequate lighting
is one of the best
ways to put up the
air of security.
Remember that
bad guys dont like
light
Also a very good
counter swimmer
device.
Security Equipment
Good fencing and gates
Security Equipment
Waterside Perimeter
security
Security Equipment
Testing, Calibration,
and Maintenance
It is the duty of the VSO to ensure that the
security equipment is properly working,
operated, tested, maintained, and calibrated
Records of all maintenance, calibration and
testing of security equipment
See 33 CFR 104.235(b)(5)
This record must be protected from
unauthorized access or disclosure
These records must be keep for a minimum of 2
years and must be made available to the USCG
upon request
Confidentiality Issues
The VSP must be protected from
unauthorized access or disclosure!
The VSP shall be considered Sensitive
Security Information (SSI) and must
conform to the handling requirements
identified in NVIC 10-04
Contents of VSP are generally not
subject to inspection by Port State
Control (SOLAS vesselsISPS A/9.8.1)
Threat Identification,
Recognition, and
Response
Section 7
Beretta 9mm
9mm, Semi, Magazine Fed, Recoil
Operated
Colt 1911
.45 Cal, Semi, Magazine Fed,
Recoil Operated
MP 5
9 MM, Semi & Auto, Gas operated,
Mag Fed,
M 4 Carbine
5.56 MM, Mag Fed, Gas Operated,
AK 47
7.62 MM, Semi and Auto, Mag Fed,
Gas Operated
AK 47
P 90
5.56 MM,
Uzi
PM
PM
Real
Air Soft
Real
Air Soft
Air Soft
Real
Real
Air Soft
Air Soft
Real
Ammunitions
Chemical Bomb
Chemical bomb
IEDs
Mail bombs
Suspicious Mail
Hard or ridged
Oily marks on the
outside
The feel of wires
Lots of postage
Directed to a
specific person
Methods of physical
searches and nonintrusive inspections
Practical Exercise
Methods of Physical
Screening and Inspections
Methods of Physical
Screening and Inspections
Implementing and
coordinating searches
Implementation and
Coordinating Searches
Planning and practicing searches
Check-card system
Necessary equipment
Implementation and
Coordinating Searches
Systematic search procedures
Search teams
Dividing rooms/spaces into sections
Focused attention and clearing areas
Implementation and
Coordinating Searches
Room searching
There is a system: from the center up 90 degrees
and then up another 90 degrees
Recognition of persons
posing potential
security risks
Non-discriminatory basis
Suspicious persons/activities
(hand-out)
Techniques used to
circumvent security
measures
Monitoring/Communication
Equipment
Signage
Homeland Security
Advisory System
LOW
GUARDED
MARSEC LEVEL 1
ELEVATED
HIGH
MARSEC LEVEL 2
SEVERE
MARSEC LEVEL 3
MARSEC Level 2
Means the level for
which appropriate
additional protective
security measures
shall be maintained for
a period of time as
result of heightened
risk of a transportation
security
MARSEC Level 3
Means the level for
which further specific
protective security
measures shall be
maintained for a
limited period of time
when a transportation
security incident is
probable or imminent,
although it may not be
possible to identify the
specific target.
Implementation of Security
Measures
Security Measures to be taken at
all three MARSEC Levels
Implementation of Security
Measures
Putting it all into actionan
ongoing process
Defined security duties and
responsibilities
Training, Drills, and Exercises
Security Challenges
Regular communication of security
procedures, threats, and concerns
Emergency
Preparedness, Drills &
Exercises
Section 9
Contingency Planning
Contingency plans are based on any
security incident the vessel may
encounter and are guidelines for the
VSO to follow. Each security incident
will merit its own evaluation, and the
procedures and measures used will be
based on several factors that only the
VSO can decide at the time of the
security incident. Any such actions
taken shall always consider the safety
of the crew, passengers, and vessel as
priority.
Contingency Planning
Action to take in the event of a
security incident
All vessel personnel are familiar with the
various types of security incidents through
security training provided by the company, to
include the appropriate communication lines of
reporting;
Any personnel having knowledge of or
witnessing a security incident, of any degree,
will immediately notify the VSO or Master with
particulars;
The VSO will notify, without delay, the CSO,
National Response Center (NRC) and the local
COTP, and take instructions as are available for
responding to a given security incident;
Contingency Planning
Action to take in the event of a
security incident (cont.)
The VSO will ensure communication lines are
maintained with the above entities and any other
agencies involved in responding to a security incident;
Pilot House will immediately be secured;
The VSO will convene a meeting and brief personnel;
The VSO will sound alarms as appropriate, to include
the SSAS, depending on the immediacy and severity
of the incident.
Implement measures for various contingency plans,
as appropriate;
Prepare to evacuate all personnel and visitors from
the vessel.
Contingency Planning
Emergency Contact Information for
the following incidents:
Notification of suspicious activities,
persons, or packages;
Notification of breaches of security;
Notification of transportation security
incident (TSI)
(See enclosed contact information)
Contingency Planning
Hijacking
Bomb Threat
Unidentified objects / explosives on
vessel, in baggage, stores, or persons
Damage to / destruction of port facility
Piracy and other hostile boarding
Stowaways
Searching vessel
Assessment of
Security Drills and Exercises
Assessments of drills and exercises
helps to identify areas of proficiency
as well as areas of weakness.
Review lessons learned with
personnel participating.
Documentation
Security Challenges
Access to the vessel
Access within the vessel to
Restricted Areas
3rd party due diligence
Helps minimize or eliminate fines or
penalties for non-compliance
Security Administration
Section 10
Reporting Nonconformities
Change in the companys or vessels
ownership or operator
Modifications to the vessel, including
but not limited to physical structure,
emergency response procedures,
security measures, or operations
Require amendments of either the
VSA or VSP must be submitted to the
MSC for review and approval no later
than 30 days after completion of the
audit and a letter certifying that the
amended VSP meets the applicable
requirements.
Security Training
Section 11
Training Requirements
Instructional Techniques
Instructional
The CSO & VSO must train persons
with and with out security duties.
The method of teaching must take
into account social / cultural
background of trainees
It is important to explain, show, and
review every topic that you teach to
ensure the student fully understands
Lecture / Slide Shows
Handouts / Quizs
Group Discussions
Instructional Techniques
Practical / Hands-on
Scenario-based training and case
studies
Build scenarios with your students.
This will help keep them always
thinking about security
Screening and Searching
Vessels, Persons, Baggage and stores
Buildings, rooms
Other unique areas