SHIP SECURITY OFFICER
SHIP SECURITY
OFFICER
SHIP SECURITY OFFICER
SHIP SECURITY OFFICER
1
SHIP SECURITY OFFICER
TOPIC 1
Maritime Security Terms and Definitions
STCW Section B-VI/5 of Chapter VI (STCW 2010)
On completion of training, a ship security officer should have adequate knowledge of the English
language to correctly interpret and communicate messages relevant to ship or port facility security.
The STCW Code, Table A-VI/5 (Specification of minimum standard of competence for ship security
officers) covers all requirements from STCW Code.
SHIP SECURITY OFFICER
SECURITY DEFINITIONS
COMPANY SECURITY OFFICER (CSO)
Who is he?
What are his responsibilities?
Declaration of Security
A ship can request completion of a DoS when:
1. the ship is operating at a higher security level than the port facility or
another ship with which it interfaces;
2. There is an agreement on DoS between Contracting Governments
covering certain international voyages or specific ships on those voyages.
Designated Authority means the organization(s) or the administration(s)
identified, within the Contracting Government, as responsible for ensuring
the implementation of the provisions of this chapter pertaining to port
facility security and ship/port interface, from the point of view of the port
facility.
ADMINISTRATION
What does it mean?
Means the Government of the State whose flag the ship is
entitled to fly. In the Maritime Security Measures and the
Maritime Security Manual, “Administration” is used to describe
the organization within Government responsible for ship
security.
SHIP SECURITY OFFICER
SEAFARERS WITH DESIGNATED SECURITY DUTIES
Piracy and armed attacks
PORT FACILITY
SHIP SECURITY OFFICER (SSO)
Who is he?
Who designated the SSO?
What are his responsibilities?
SHIP SECURITY OFFICER
A ship security officer shall be designated on each
ship.
In addition to those specified elsewhere in this Part of
the Code, the duties and responsibilities of the ship
security officer shall include, but are not limited to:
.1 undertaking regular security inspections of the ship
to ensure that appropriate security measures are
maintained;
.2 maintaining and supervising the implementation of
the ship security plan, including any amendments to
the plan;
.3 coordinating the security aspects of the handling of cargo and ship’s stores
with other shipboard personnel and with the relevant port facility security officers;
.4 proposing modifications to the ship security plan;
SHIP SECURITY OFFICER
.5 reporting to the company security officer any deficiencies and non-conformities
identified during internal audits, periodic reviews, security inspections and
verifications of compliance and implementing any corrective actions;
.6 enhancing security awareness and vigilance on board;
.7 ensuring that adequate training has been provided to shipboard personnel, as
appropriate;
.8 reporting all security incidents;
.9 coordinating implementation of the ship security plan with the company
security officer and the relevant port facility security officer; and
.10 ensuring that security equipment is properly operated, tested, calibrated and
maintained, if any.
CONTRACTING GOVERNMENT
Contracting Government generally means a Government that
has agreed to be bound by any IMO Convention, e.g. the
SOLAS Convention, or other binding instrument adopted by
the IMO. In the Maritime Security Manual the simpler term
Government is generally used in place of Contracting
Government unless there is a direct quotation from SOLAS
Chapter XI-2 or from the ISPS Code Part A or Part B.
Depending on the context Government can also be used in
the IMO Maritime Security Measures with either the term
Administration or Designated Authority, or with both, or in
place of either or both.
They are the ones declaring the level of security in port
facilities under their authority.
Recognized Security Organization (RSO)
“Recognized Security Organization (RSO)” means an organization with appropriate
expertise in security matters and with appropriate knowledge of ship and port operations
authorized to carry out an assessment, or a certification activity, required by this chapter
or by part A of the ISPS Code. And onboard the vessel the ones authorized by the Flag
States are the Classification Societies like but not limited to the following:
• DNV – Det Norske Veritas
• GL – Germanischer Lloyd
• RINA – Registro Italiano Navale
• ABS – American Bureau of Shipping
• BV – Bureau Veritas
• NK – Nippon Kaiji Kyokai
• RS – Russian Maritime Register of Shippingdnv
• LR - Lloyd’s Register
• HR – Hellenic Register of Shipping
SHIP SECURITY OFFICER
Current Security Threats & Pattern
SECURITY INCIDENT
HIJACKING OF MV ACHILLE LAURO
• Mention to the participants that in 1985 (month of August) an
Italian Cruise Liner, MV Archille Lauro was hijacked by
Palestinian terrorists leaving with one casualty, Mr. Leon
Klinghoffer (a wheelchaired pax). Then mention that as a
result of that attack, advice on anti-piracy and hijack was
issued by the IMO. The advice was implemented by some
parts of the Maritime Industry (mainly on cruise ships) but
was largely ignored by the rest of the industry.
The World will never be the same again
Then play the video “world trade 12-02-08.
Mention also that in response to the events of
Sept. 11th, IMO and U.S. Coast Guard have
developed that advice and introduced a
methodology for the implementing the measures
by making contracting Governments and
Companies responsible for the implementation.
CURRENT SECURITY THREATS & PATTERNS
Identifies threats to the maritime transport
Industry, such as:
Piracy and armed attacks
Terrorism
SHIP SECURITY OFFICER
CURRENT SECURITY THREATS & PATTERNS
Contraband smuggling, a criminal activity,
may result in large financial loss to the ship-
owner whose ship is being used by the
smugglers. Often, drugs are the commodity
being smuggled and they may be brought on
board in a number of creative ways such as
in luggage, stores, on or in a person's body,
or in electronic equipment. Weapons are
also a frequent item associated with
smuggling. Like drugs, weapons, too, find
their way on board in creative ways, such as
Stowaways & refugees Contra smuggling in cargo containers.
CURRENT SECURITY THREATS & PATTERNS
Cargo theft, an age-old problem, continues to plague
the maritime industry and causes financial losses
in staggering amounts. Prevention is normally the
most effective method of dealing with this security
threat. Although there may not be violence or
political issues involved in most cargo theft cases,
this matter remains high on the list of security
threats and requires solutions discussed in this
course. Instructors should convey that cargo theft
is only one of the various threats to the security of
cargo. Other such security threats should be
discussed during this section of the course.
Collateral damage occurs when a nearby fire, explosion, or attack results in damage to a ship or
facility. While the damage is sometimes unintended, the costs are nevertheless real. There are
measures that may minimize the consequences of this type of damage.
CURRENT SECURITY THREATS & PATTERNS
Current threats to maritime security should be summarized in order to:
To provide a basis for understanding of the recent conventions & legislation in this
area and;
CURRENT SECURITY THREATS & PATTERNS
To fully grasp the importance of the training provided by this course.
SHIP SECURITY PLAN (SSP)
“Ship Security Plan (SSP)” means a plan developed to ensure the
application of measures designed to protect the persons on board,
cargo, cargo transport units, ship’s stores or the ship from the risks of a
security incident.
SHIP SECURITY OFFICER
Topic 2
International Maritime Security Policies and Responsibilities
CONTRACTING GOVERNMENT
Contracting Government generally means a Government that has
agreed to be bound by any IMO Convention, e.g. the SOLAS
Convention, or other binding instrument adopted by the IMO. In the
Maritime Security Manual the simpler term Government is generally
used in place of Contracting Government unless there is a direct
quotation from SOLAS Chapter XI-2 or from the ISPS Code Part A or
Part B. Depending on the context Government can also be used in
the IMO Maritime Security Measures with either the term
Administration or Designated Authority, or with both, or in place of
either or both.
They are the ones declaring the level of security in port facilities
under their authority.
COMPANY
Companies shall comply with the relevant requirements of this
chapter and of part A of the ISPS Code, taking into account the
guidance given in part B of the ISPS Code.
Specific responsibility of Companies
The Company shall ensure that the master has available on
board, at all times, information through which
officers duly authorized by a Contracting Government can
establish:
.1 who is responsible for appointing the members of the crew
or other persons currently employed or engaged on board the
ship in any capacity on the business of that ship;
.2 who is responsible for deciding the employment of the ship;
and
.3 in cases where the ship is employed under the terms of
charter party(ies),who are the parties to such charter parties.
DESIGNATED AUTHORITY
Designated Authority means the organization(s) or the
administration(s) identified, within the Contracting Government, as
responsible for ensuring the implementation of the provisions of this
chapter pertaining to port facility security and ship/port interface, from
the point of view of the port facility.
Contracting Governments may identify a Designated Authority within
Government to
undertake their security duties relating to port facilities
SHIP SECURITY OFFICER
Topic 3
SHIP SECURITY PLAN
Only the SSO and the Master can access the Ship Security Plan on board the vessel
Circumstances under which certain sections of the ship security plan may be shown to Port State
Control Authorities Purpose of ship security plan
SSP’s are not subject to inspection by duly authorized officers of contracting government, except
with some limited exceptions like:
Clear grounds to believe the ship is non-compliant;
Inspection is the only way to verify or rectify compliance;
Limited access to the specific sections of the plan;
Consent of the ship’s master or contracting government.
Topic 4
PROCEDURE IN IMPLEMENTING A SHIP SECURITY PLAN AND REPORTING
PURPOSE OF SECURITY PLAN
• Security Officer need to ensure :
• Maintain and Supervise
• Developed
• Implemented
PURPOSE
Vessel should develop & maintain an appropriate SSP
Plan should be sufficiently flexible to take into account the level of security plan for each port at
which the vessel intends to call
PURPOSE OF SHIP SECURITY PLAN
Ships entering port of another contract government may be required to provide the following :
o Any additional or special security measures in those ports;
o Appropriate security measures used during ship to ship activities;
o Other practical security related information (not details of the SSP)
CONTENT OF SHIP SECURITY PLAN
Established in the ISPS Code Part A section 9.4
Additional information provided in Section 9 of Part B of the Code
The contents of the Ship Security Plan are most clearly established in the ISPS Code Part A
section 9.4 with additional information provided in Section 9 of Part B of the Code. Trainees should
be familiar with the contents of the plan in a generic fashion thus knowing what to expect as they
are assigned to various ships and experience various Ship Security Plans.
They should understand the elements of the plan as it relates to specific threats such as explosive
devices, piracy, and armed robbery.
SHIP SECURITY OFFICER
Provide a completed sample plan. to give trainees a better opportunity to understand the document
to which they must be responsive aboard each ship to which they are assigned as Ship Security
Officer.
Topic 5
METHODS AND PROCEDURES USED TO MODIFY THE SHIP SECURITY PLAN
PROCEDURES FOR MODIFYING AND IMPLEMENTING ANY CHANGES IN THE SHIP
SECURITY PLAN
Identify the need for changes
Conduct a risk assessment: Obtain approval:
Draft the changes: Implement the changes:
Consult with stakeholders: Monitor and evaluate:
REQUIREMENTS IN IMPLEMENTING MODIFICATIONS OF THE SHIP SECURITY PLAN
Approval: Compliance:
Documentation: Testing:
Communication: Continuous Improvement:
Risk assessment:
Topic 6
MARITIME SECURITY LEVELS
QUESTION…
What the 3 levels of maritime security are as defined in the ISPS Code?
Security Levels 1, 2 and 3
Level 1 – Normal
Level 2 – Heightened
Level 3 – Exceptional
AUDIT COMPARISON
• SAFETY MANAGEMENT SYSTEM • SHIPS SECURITY PLAN
• INTERNAL AUDIT • On Scene Security Survey
(By company rep) (Internal Audit by company rep)
• EXTERNAL AUDIT • SHIP SECURITY ASSESSMENT
(By Classification societies or RO) (By Experts or RSO)
• ENDORSEMENT/ RENEWAL OF SMC • ENDORSEMENT OF THE SSA AND
(By the same Classification society) • APPROVAL OF AMENDMENTS
• ISSUANCE/RENEWAL OF SMC • OF THE SSP (By another RSO)
(by the same Classification society) • ISSUANCE/RENEWAL OF THE ISSC
(By latter RSO)
SHIP SECURITY OFFICER
INTERNATIONAL SHIP & PORT FACILITY SECURITY CODE
ISPS stands for International Ship and Port Facility Security Code.
Date of implementation is 1st July 2004
ISPS is composed of 2 sections which are the following:
Part A is mandatory
Part B is Guidance but may become mandatory, it may
become mandatory if the company would want to impose
it in all its vessels.
Requirement to implement the ISPS Code is clearly
stated in Chapter XI-2 of the International Convention of
the Safety of Life at Sea (SOLAS)
INTERNATIONAL SHIP & PORT FACILITY
SECURITY CODE
Date of implementation: 1st July 2004
This work has resulted in an amendment to SOLAS,
Chapter XI, called the International Ship and Port
Facility Security Code (ISPS). Mention also that the
code has a mandatory section (Part A) and a section
with guidelines (Part B). This requirement became
mandatory on July 2004 for all ships of 500 gross
tonnages and upwards engaged on international
voyages, including high speed crafts and Mobile
Offshore Drilling Units. It requires the vessel to have
an approved Ship Security Plan and in the U.S., parallel
legislation was enacted through the U.S. Maritime Security Bill.
SHIP SECURITY OFFICER
SHIP SECURITY ASSESSMENT
Participants must be encouraged to adopt systematic and consistent
approaches to the evaluation of security conditions and vulnerabilities.
Seafarers with designated security duties may be called upon to assist in
these evaluations. The use of checklists to perform assessments of security in
day-to-day operations should therefore be discussed.
SHIP SECURITY ASSESSMENT
What is Security?
The conditions achieved when designated information, materials, personnel,
activities, and installation are protected against espionage, sabotage,
subversion, terrorism, as well as against loss and unauthorized disclosures.
SHIP SECURITY OFFICER
SHIP SECURITY ASSESSMENT
ISPS Code Part “A” requires mandatory SSA including on-site vessel visit and the following:
• Identify existing security measures, procedures / operations.
• Identify important shipboard operations requiring protection.
• Identify possible threats, and prioritize security measures.
• Identify weaknesses, related to “human factors”, infrastructure, security policies / procedures.
TECHNIQUES USED TO CIRCUMVENT SECURITY MEASURES
They should be appraised of the known techniques that can be employed to evade security
systems & controls, such as the disabling of alarm systems, picking of locks, jamming of radio
signals
SECURITY LEVEL 1: NORMAL
the level at which ships and port facilities normally operate in accordance to the Ship or Port facility
Security Plan
SECURITY LEVEL 2: HEIGHTENED
the level applying for as long as there is a heightened risk of a security incident
SECURITY LEVEL 3: EXCEPTIONAL
the level applying for the period of time there is the probable or imminent risk of a security incident
QUESTION…
Who sets the security level on board?
o The Company Security Officer
Upon receipt of a security level instruction, what should the vessel do?
o The vessel immediately implements the advised security level by the CSO
Can a ship set a security level higher than the port facility?
o The vessel can have a higher security level than the port but never lower than it. But it can
also adopt the port’s security level.
AUDIT COMPARISON
SHIP SECURITY OFFICER
TOPIC 7
Requirements and procedures for conducting internal audits, on-scene inspections,
control and monitoring of security activities.
REQUIREMENTS IN CONDUCTING INTERNAL AUDITS, ON-SCENE INSPECTIONS
1. Establish a Plan:
2. Define Audit Criteria:
3. Document Findings:
4. Analyze and Evaluate:
5. Develop Corrective Action Plan:
6. Monitor Corrective Actions:
7. Conduct On-scene Inspections:
8. Control and Monitor Security Activities:
9. Maintain Documentation:
PROCEDURES IN CONDUCTING ON-SCENE INSPECTIONS
a. Establish an audit schedule based on the requirements of the Ship Security Plan and other relevant
regulations and standards.
b. Select and train the audit team members to ensure they have the appropriate knowledge, skills, and
experience to conduct the audit.
c. Provide the audit team with the audit plan, criteria, and relevant documentation to be reviewed.
d. Conduct the audit and document all findings, including observations, non-conformities, and
recommendations for corrective actions.
e. Analyze and evaluate the audit findings to determine the effectiveness of the security measures in place.
f. Develop a corrective action plan to address any non-conformities or deficiencies identified during the
audit process.
g. Monitor and track the implementation of corrective actions to ensure they are effective in addressing the
non-conformities or deficiencies identified during the audit process.
h. Document all audit activities, including findings, recommendations, and corrective actions.
PROCEDURES IN CONTROL AND MONITORING OF SECURITY ACTIVITIES
a. Develop and implement procedures for controlling and monitoring all security activities in accordance
with the Ship Security Plan.
b. Establish appropriate controls and procedures for access control, security screening, and security
patrols.
c. Train the security personnel to ensure they understand their roles and responsibilities and can effectively
implement security measures.
d. Monitor and evaluate the effectiveness of security measures on an ongoing basis.
e. Document all security activities, including observations, non-conformities, and recommendations for
corrective actions.
f. Develop a corrective action plan to address any non-conformities or deficiencies identified during the
control and monitoring process.
SHIP SECURITY OFFICER
g. Monitor and track the implementation of corrective actions to ensure they are effective in addressing the
non-conformities or deficiencies identified during the control and monitoring process.
TOPIC 8
Requirements and procedures for reporting to company security officer
NON-CONFORMITY VS. DEFICIENCY
Non-conformity is an event or situation that does not meet the established requirements,
standards, or procedures.
Deficiency is a shortcoming or gap in the system or process.
Reporting non-conformities and deficiencies
1. Define Non-conformity:
2. Assign Responsibilities:
3. Documentation:
4. Classification of Non-conformity:
5. Corrective Action:
6. Reporting:
7. Follow-up:
8. Continuous Improvement:
TOPIC 9
Security-related contingency plans and the procedures for responding to security
threats or breaches of security
ACTIONS TO BE TAKEN IN CASE OF BREACH OF SECURITY
1. Alert
2. Assess
3. Activate
4. Communicate
5. Report
6. Investigate
7. Improve
SHIP SECURITY OFFICER
SHIP SECURITY OFFICER
2
SHIP SECURITY OFFICER
TOPIC 10
RISK ASSESSMENT AND ASSESSMENT TOOLS
Respond to security threat or breaches of security
Where a risk of attack has been identified, the Contracting
Government concerned shall advise the ships concerned and their
Administrations of:
1. The current security level;
2. Any security measures that should be put in place by the
ships
Concerned to protect them from attack, in accordance
With the provisions of part A of the ISPS Code; and
3. security measures that the coastal State has decided to put in
Place, as appropriate.
What are the five steps to risk assessment?
Step 1: Identify hazards, i.e. anything that may cause harm. ...
Step 2: Decide who may be harmed, and how. ...
Step 3: Assess the risks and take action. ...
Step 4: Make a record of the findings. ...
Step 5: Review the risk assessment.
TOPIC 11
SECURITY ASSESSMENT DOCUMENTATION
SHIP SECURITY OFFICER
SHIP SECURITY OFFICER
SHIP SECURITY ASSESSMENT
The conditions achieved when designated information, materials,
personnel, activities, and installation are protected against
espionage, sabotage, subversion, terrorism, as well as against
loss and unauthorized disclosures.
SHIP SECURITY ASSESSMENT
ISPS Code Part “A” requires mandatory SSA including on-site vessel
visit and the following:
• Identify existing security measures, procedures / operations.
• Identify important shipboard operations requiring protection.
• Identify possible threats, and prioritize security measures.
• Identify weaknesses, related to “human factors”, infrastructure, security policies / procedures.
DoS
What is the purpose of the Declaration of security?
According to the SOLAS, the Declaration of Security (DoS) is an agreement reached between a
ship and either a port facility or another ship with which it interfaces, specifying the security
measures each will implement.
The Declaration of Security is a document that may be required for a port visit when specific
security requirements exist. The Declaration address the security requirements that could be
shared between a port facility and a ship, or between ships, and states the responsibility for each.
What determines if a declaration of security is required?
A DoS is required when the PFSO deems it necessary in accordance with the security level set by
OTS or when a ship deems it necessary. However, the port facility can refuse such ship
requirements for Dos.
TOPIC12
Techniques Used to Circumvent Security Measures
TECHNIQUES USED TO CIRCUMVENT SECURITY MEASURES
They should be apprised of the known techniques that can be employed to evade security systems
& controls, such as the disabling of alarm systems, picking of locks, jamming of radio signals.
Techniques used by pirates and armed robbers to circumvent
security measures.
The pirates are throwing blankets and ladders over the razor wire to circumvent this security
measure. Simultaneously, pirates in skiffs shoot at the vessel to facilitate the boarding attempt.
What methods do pirates use?
Pirates try to slow the ship by firing with rocket propelled grenades (RPG).
SHIP SECURITY OFFICER
TOPIC 13
RECOGNITION OF PERSONS POSING POTENTIAL SECURITY RISKS
Example of suspicious behaviors are:
Unknown persons photographing vessels or facilities
Unknown persons attempting to gain access to vessels or facilities
Suspicious individuals establishing businesses or roadside food stands either
adjacent or in proximity to facilities.
CASE STUDY
PROFILING A PERSON
Which one is the suicide bomber?
Sri Lankan suicide bomber “Dhanu,” moments before
killing former Indian PM Rajiv Gandhi, herself, and 17
others
PROFILING
Bomb concealed under her dress,
smuggled through security at an election
rally
Detonated the bomb while bending down to
touch Gandhi’s feet
AFTER THE INCIDENT
SHIP SECURITY OFFICER
ASSESSING SUSPICIOUS PERSON
Clothing
3 POINTS
IN
PROFILING
Body
Speech
Language
BODY LANGUAGE
A complex science but common sense will lead you to understand a few pointers:
Non-Verbal
Vocal – manner and
Verbal – words are 7% Communication (NVC) -
expression is 38% of
of communication the body language is
communication
55% of communication
BODY LANGUAGE
Eye Contact
Seeking information
Invite or control interaction
Show interest or attention
Wish to dominate, threaten or influence
Wish to reveal or check attitudes
BODY LANGUAGE
THEIR LEFT IS RIGHT…
THEIR RIGHT IS WRONG
SHIP SECURITY OFFICER
TOPIC 14
IMPLEMENTING & COORDINATING SEARCHES
Examples of equipment that may be employed in conducting searches:
o Flashlight & batteries; Mirrors & probes
o Screwdrivers, wrenches & crowbars;
o Gloves, hard hats, overalls & non-slip footwear
o Plastic bags & envelopes for collection of evidence
o Forms on which to record activities and discoveries
Procedures are to be followed so as to ensure effective and efficient searches.
Examples are the following:
Crew members and facility personnel should not be allowed to search their own areas in
recognition of the
Possibility that they may have concealed packages or devices in their own work or personal
areas.
Search should be conducted according to a specific plan or schedule & must be carefully
controlled.
Special consideration should be given to search parties working in pairs with one searching
“high” & one searching “low”
Searchers should be able to recognize suspicious items
There should be a system for marking or recording “clean” areas.
Searchers should maintain contact with the search controllers, perhaps by UHF/VHF radio
Searchers should have clear guidance on what to do if a suspected package, device or
situation is found
Searchers should bear in mind that weapons & other dangerous devices may be intentionally
placed to match its content as a means of disguise, such as a toolbox in an engine room
There are many places on board a ship where weapons, dangerous substances, and devices can
be concealed. Some of these are:
STAGE 1: Areas along evacuation routes.
STAGE 2: All other areas on the check lists.
TOPIC 15
METHODS OF PHYSICAL SEARCHES & NON-INTRUSIVE INSPECTIONS:
PHYSICAL BODY SEARCH
2 TYPES OF SEARCH
1. Limited Physical Search
2. Whole Body Physical Search
QUESTIONS TO ASK YOURSELF
Why am I doing this?
What am I looking for?
Where would I choose to
Hide something?
SHIP SECURITY OFFICER
PRE-SEARCH REQUIREMENTS
Long stick
Table
Transceiver Radio
Logbook
Gate pass
Gloves
Flashlight
Step board
Hand Metal detector
REMINDER
Very important the body search is done with care and must not be by any means of obstructive
to the person being search
If when personal belongings has to be searched, i.e., wallets, bags, coats/jackets/ sweater, etc.
these items should not be touched and be opened only by the person searched.
The Authority Principle Of Body Search
SECURITY POLICY NOTICE
(Legally authorized ship staff to
conduct body search)
SECURITY POLICY NOTICE
• All persons boarding are required to show a
Boarding Pass
• All persons and baggage are liable to be searched
• No drugs are allowed on board
• No weapons are allowed on board
• Only Authorized Visitors are allowed
ELEMENTS OF A BODY SEARCH
Courtesy (Greetings)
Sir/Ma’am; thank you sir/ma’am; please
Verification (Purpose of visit)
Identification (Ask for ID or Passport)
Permission (Show Security Policy Notice, and ask permission to the visitor for conducting body
search.
Demonstration of body search position (Show the proper position to the visitor)
SHIP SECURITY OFFICER
SEQUENCE OF A BODY SEARCH
Permission to
Hair Arms search the
lower parts
If you have any doubts at any
Crutch, socks,
Collar Belt
shoes stage call your supervisor or
SSO.
Front sides
Wallet, cell
Back center (back of the
phone (on/off)
palm)
Front center
Back sides (back of the Mouth Final courtesy
palm)
BODY SEARCH
Ask the visitor to face forward and ask him/her to adopt the position with arms
outstretched – or demonstrate
When conducting a physical search, particular attention should be paid to:
The armpits
The curve of the spine near the waist
The foot and ankle areas
Between the legs
SHIP SECURITY OFFICER
ELEMENTS OF A BODY SEARCH
a. Courtesy (Greetings) (Sir/Ma’am; thank you sir/ma’am; please)
a. Verification (Purpose of visit)
b. Identification (Ask for ID or Passport)
d. Permission (Show Security Policy Notice, and ask permission to the visitor for conducting body
search.
e. Demonstration of body search position (Show the proper position to the visitor)
Methods
1. Archway metal detector
2. Handheld metal detector
Both types of electronic search require: Good guest relation and caution
ELECTRONIC BODY SEARCH
Systematic approach
Clockwise scan of body outline followed by front and back.
Wand alarm is followed by limited physical search of alarm area.
All alarms must be resolved before the guest is allowed to process on board the ship.
USING HAND-HELD METAL DETECTOR
SCREENING
SHIP SECURITY OFFICER
VISITORS SHALL ALWAYS:
wear a ship-issued ID
be escorted
METHODS OF PHYSICAL SEARCHES & NON-INTRUSIVE
INSPECTIONS
Members of the ship’s crew should not be required to search their colleagues or their personal
effects.
human rights of the individual
Preservation his or her basic human dignity.
TYPES OF SEARCHES
REACTIVE (carried out in reaction to a specific threat)
o Searchers should be familiar with the area to be searched
o Search conducted according to a specific plan
o Searchers must be able to recognize items being searched
o Establish central reporting point for searchers
REACTIVE
o Searchers should be able to communicate with the command post
o Searchers must know exactly what to do if item/person is found (Master’s discretion)
TYPES OF SEARCHES
PREVENTIVE (aim is to deter unlawful acts – terrorists, smugglers, etc.)
o Establish location for search before people, baggage & cargo enter restricted or “sterile”
zone
o Reconcile people with vehicles, baggage, etc.
o Frequently search sterile zones and access points
WHEN TO SEARCH:
Decision by Master, based on: Security Plan
Situation (current information, observations, etc.)
Intelligence information
WHEN TO SEARCH:
• Searching Individuals (effectiveness of search based on the skill of the searchers)
• Physical searches
• Metal detectors
• X-ray devices
• Vapor detection for explosives
SHIP SECURITY OFFICER
BAGGAGE SEARCHES:
Check for false compartments (often used for smuggling drugs, explosives or weapons)
Heavy baggage (X-ray supported by physical searches, sniffing dogs may be used to screen
baggage)
TOPIC 16
Recognition of weapons, dangerous substances and devices and
awareness of the damage they can cause
Recognition of weapons, dangerous substances and devices
TOPIC 17
Crowd management and control techniques
Why do people panic in an emergency?
Explain the basic psychology of a crowd in a crisis situation
Studies show that at the FIRST SIGN of an emergency, the following reaction pattern could be
anticipated:
10% might accept the situation and want to do something about it
30% might investigate & look for most obvious signs before accepting the situation
60% might ignore the situation. Rather than panicking, most people have difficulty in accepting that
there is an emergency.
State the importance of clear communication with crew and passenger during an emergency.
In an emergency, information is vital:
Inform the crew (and passengers)
Give clear and reassuring orders
Do not lie
SHIP SECURITY OFFICER
TOPIC 18
Sensitive security-related information and security-related communications
Handling security-related information and security-related communications.
Risk of security leaks through communication by improper methods or to the wrong
persons.
What risks could it possibly cause to shipboard security?
Essentially the Ship Security Plan is to be considered a confidential document and must be
protected from unauthorized access or disclosure. Instructors should place notable emphasis
on this and clearly delineate those few circumstances when and what sections of the Ship
Security Plan may be inspected by Port State Control Officers.
Some aspects of cyber risk management may include commercially sensitive or confidential
information. Companies should, therefore, consider protecting this information appropriately,
and as far as possible, not include sensitive information in their Safety Management System
(SMS).
TOPIC 19
Requirements for designating and monitoring restricted areas
REQUIREMENTS IN DESIGNATING RESTRICTED AREAS
1. Conduct a security assessment 4. Limit access to authorized personnel
2. Identify restricted areas 5. Conduct regular monitoring
3. Implement access controls 6. Provide training:
COMMONLY DESIGNATED RESTRICTED AREAS ON BOARD SHIPS
1. Bridge 4. Radio room
2. Engine room 5. Security control room
3. Cargo holds 6. Crew accommodations
TOPIC 20
Controlling access to the ship and to restricted areas on board ship
Requirements for designating and monitoring restricted area.
The SSP should ensure that there are clearly established policies and practices to control
Access to all restricted areas them.
The SSP should provide that all restricted areas should be clearly marked indicating that
Access to the area is restricted and that unauthorized presence within the area constitutes a
breach of security.
SHIP SECURITY OFFICER
Controlling access to the ship and restricted areas on board ship.
o Prevent unauthorized access;
o .2 protect passengers, ship’s personnel, and
personnel from port facilities or other
o Agencies authorized to be on board the ship;
o .3 protect sensitive security areas within the
ship; and
o .4 protects cargo and ship’s stores from tampering.
o It is very important to control access routes to deter any unknown individual from
accessing the vessel illegally
o All doors and hatches providing access to the bridge, accommodation and machinery
spaces should be properly secured to prevent them being opened by unauthorized
personnel
Careful consideration should be given to the means of securing doors and hatches in order to
afford the ship the maximum protection possible.
Where the door or hatch is located on an escape route from a manned compartment, it is essential
that it can be opened by a seafarer trying to exit by that route. Where the door or hatch is locked it
is essential that a key is available, in a clearly visible position by the door or hatch.
o It is recommended that once doors & hatches are secured, a designated & limited number
are used for routine access when required, their use being strictly controlled by the OOW
o The Single point of access to be maintained & guarded at all times
o Escort policy to be implemented on ships visitors once on board
What are the restricted areas on-board ships?
The restricted areas may include the navigation bridge, machinery spaces, spaces with security-
related equipment, ventilation spaces, spaces containing IMDG cargo, accommodation, any other
areas specified as per the SSP.
SHIP SECURITY OFFICER
SHIP SECURITY OFFICER
3
SHIP SECURITY OFFICER
TOPIC 21
Methods for effective monitoring of deck areas and areas surrounding the ship
Establishing Security Rounds As Per SSP Requirement
Using CCTV As An Additional Monitoring Tool
Using Lock & Tag System as Per SSP
Deck Illumination Security & Deck Lights
TOPIC 22
Security aspects relating to the handling of cargo and ship’s stores with other
shipboard personnel and relevant port facility security officers
EACH year, $12.5 trillion of merchandise is traded worldwide, using more than 200 million
intermodal containers. Ninety percent of these shipments are between seaports.
Due to ships intermodal nature & fast pace movements from 1 port to another security of the ship &
its cargo became a concern.
Methods Used to Maintain Security of Cargo
Container Sealing
Using Security Tags
Inspection Of Cargo By Port Prior To Loading
Inspection of Ships Crew Upon Loading Cargo
Using X-ray/ Scanners
Using K9 units
Cargo Segregation
Cargo Should Not Be allowed to be Loaded When:
There is evidence of tampering or pilferage
Not in the cargo list to be loaded
No seals or security tag in place
When not inspected by security personnel
Suspected to contain illegal articles
TOPIC 23
Methods for controlling the embarkation, disembarkation & access while on board of
persons & their effects
No ID No Entry policy to be in place at all times
Ship’s crew to be provided with the list of expected victors prior to arrival port
Security Watches to be maintained at all times
Employ protective measures to prevent access of unidentified individuals.
SHIP SECURITY OFFICER
TOPIC 24
SECURITY EQUIPMENT & SYSTEMS
METAL DETECTORS
EXPLOSIVE DETECTORS
AUTOMATIC INTRUSION DETECTION DEVICE
BAGGAGE SCREENING EQUIPMENT
CONTAINER X-RAY DEVICES
GENERAL ALARM
TOPIC 25
Procedures, instruction and guidance on the use of ship security alert systems
SHIP SECURITY ALERT SYSTEM
The SOLAS Resolution XI-2/6 requires
vessels of +500 GT (Gross Tonnes)
constructed before 01 July 2004 to install
a Ship Security Alert System (SSAS) and
no later than the first radio survey after 01
July 2004. Other Cargo ships of +500 GT
and mobile offshore drilling units
constructed before 01 July 2004 must be
fitted no later than the first radio survey
after 01 July 2006.
As piracy and terrorist attacks have
increased over the years IMO has defined a set of mandatory requirements in the SOLAS Resolution XI-2/6
to improve security for ships. The new SOLAS resolution 6 states that the Ship Security Alert System shall
provide ships with two alarm buttons, which can be activated in case of a piracy or terrorist attack. The
alarm is a covert signal, which will have no sound and no flashing lights so that it is in
no way obvious to any intruders on board the ship.
PERFORMANCE STANDARDS FOR A SHIP SECURITY ALERT SYSTEM
The ship security alert system is provided to a ship for the purpose of transmitting a security alert to
the shore to indicate to a competent authority that the security of the ship is under threat or has
been compromised.
It comprises a minimum of two activation points, one of which is on the navigation bridge & one in
undisclosed area where the master & SSO knows.
The procedures for the use of the ship security alert system & the location of the activation points
are given in the ship security plan agreed by the Administration
The SSAS should have an additional appropriate power source (DC) where the main power is
supplied by the ships (AC)
Activation points should be capable of being used on the navigation bridge and in other locations.
They should be protected against inadvertent operation.
SHIP SECURITY OFFICER
The operation of the SSAS should not impair the functionality of the GMDSS installation.
In all cases, transmission initiated by SSAS activation points should include a unique
code/identifier indicating that the alert has not been generated in accordance with GMDSS distress
procedures.
The ship security alert system should be capable of being tested.
Testing intervals of SSAS shall not exceed a period of 12 Months.
TOPIC 26
TESTING, CALIBRATION & MAINTENANCE OF SECURITY EQUIPMENT & SYSTEMS
33 CFR 104.260 - Security systems and equipment maintenance.
(a) Security systems and equipment must be in good working order and inspected, tested,
calibrated and maintained according to the manufacturer's recommendation.
(b) The results of testing completed under paragraph (a) of this section must be recorded in
accordance with § 104.235. Any deficiencies must be promptly corrected.
(c) The Vessel Security Plan (VSP) must include procedures for identifying and responding
to security system and equipment failures or malfunctions.
[USCG-2003-14749, 68 FR 39302, July 1, 2003, as amended by USCG-2007-28915, 81 FR
57710, Aug. 23, 2016]
TOPIC 27
Training, drill & exercise requirements under relevant IMO circulars
Drills & exercises must test the proficiency of ships personnel in assigned security duties at all
Maritime Security Levels and the effective implementation of the SSP. They must enable
the SSO to identify any related security deficiencies that need to be addressed.
At least one security drill is conducted at least every 3 months Or within 1 week from whenever the
% of v/l personnel with no prior participation in a ship security drill on that vessel exceeds 25 %
TOPIC 28
Methods for enhancing security awareness and vigilance on board
A ship at the port and a ship at the sea have almost an equal amount of threat to its security therefore steps
has to be taken to enhance it
Be Vigilant – Always
Guard the entrance
Ask and interrogate
Know Your Duties Well
Continuous Monitoring
Supervising Cargo Operations
Equipment Availability
Update Your Knowledge
Identify the Weaknesses
Regular drills
SHIP SECURITY OFFICER
TOPIC 29
Methods for assessing the effectiveness of drills and exercises
Drill is commonly used to:
Provide training on security equipment's
Develop or test the established procedures
Practice and maintain current skills
It is narrow in scope & typically focuses on at least one part
Exercises are more far-reaching than drills and it usually focus on more than one security procedure.
Security Level changes
Security Response
Search Procedures
Exercises rehearse and test:
Communication and coordination
Resource availability and response
Participant reactions
The most important purpose of any exercise is to keep skills up-to-date and to improve them.
Conducting drills and exercises is not only a way to test preparedness; it is also required for compliance
with the ISPS Code.
Record the drill/ exercise
Carry out debriefing right after the drill/exercise
Carry out self-assessment
Check & compare the results of previous drills & exercise
Set appropriate performance indicators
SHIP SECURITY OFFICER