Best Management Practices Maritime Security
Best Management Practices Maritime Security
BMP
Maritime
Security
Taken from Regs4ships on 03/04/2025 17:25 by Captain Vasileios Nikitas
Redistributed on behalf of the publisher by Regs4ships
To ensure viewing the latest version, refer to Regs4ships at r4s.oneocean.com
Version control
Edition Published date Change
First March 2025
BMP Maritime Security replaces any existing global or regional guidance issued or supported by
the signatories.
Background and supporting information are available at: www.maritimeglobalsecurity.org
Design: Phil McAllister Design
Contents
1 Introduction........................................................................................................................06
2 Maritime security threats...............................................................................................10
3 Threat and risk assessment...........................................................................................16
4 Planning...............................................................................................................................21
5 Mitigation measures........................................................................................................ 25
6 Incident response............................................................................................................. 37
7 Post-incident procedures..............................................................................................43
Annex A Reporting and information centres.............................................................................46
Annex B Seafarer welfare support...............................................................................................55
Annex C Maritime lexicon and abbreviations........................................................................... 57
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Section 1
Introduction
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
3. Reporting
Voluntary registration and reporting: register 4. Cooperation
and report to regional centres as appropriate. Shipping and military forces: cooperate with
collaborate with welfare
Incident reporting: report incidents and other ships and military forces as necessary. providers to provide
suspicious activities to recognised reporting Law enforcement: work with relevant psychological and/or
centres and the Flag State Administration. law enforcement and authorities to
Distress signals: send distress signals when preserve evidence.
logistical support
under attack. Welfare providers: collaborate with welfare
providers to provide psychological and/or
logistical support (annex B).
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Section 2
Maritime
Security
Threats
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Specific threats
Water-Borne Improvised Explosive Devices
(WBIEDs): These have been used against
merchant ships in conflict regions. WBIEDs
can be crewed or uncrewed surface vessels.
Incidents have occurred where a WBIED
has been controlled from a distance or from
an accompanying mothership or operates
autonomously. Mitigation measures to prevent
contact with the ship’s hull are limited. Masters
should recognise the intent of these attacks is
to cause damage and not necessarily to board
the ship. Mines are designed
Sea mines: a sea mine is an explosive device
to deny access
laid in the water with the intention of damaging to ports and sea
or sinking ships or of deterring shipping from lanes and can
entering an area. The term does not include be classified as
devices attached to the bottom of ships or to
harbour installations by personnel operating
moored, bottom,
underwater, nor devices which explode or moving mines
immediately on expiration of a predetermined
time after laying. Mines are designed to deny
access to ports and sea lanes and can be
classified as moored, bottom, or moving mines.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
mines’ use extremely strong moorings (usually confirmed explosion from a sea mine, then a Mine
small gauge wire) to permit use in water depth Threat Area (MTA) or a Mine Danger Area (MDA)
down to 1,000 metres. If the mooring cable would be established and broadcast to maritime
breaks, then the moored mine becomes a traffic via navigational area (NAVAREA) warnings.
moving (floating) mine.
Anti-Ship Missiles
b. Bottom/ground mines: bottom/ground mines are Anti-Ship Missiles (ASM) are long range,
negatively buoyant devices that rest on, or can accurate and powerful weapons and have
become buried in, the seabed and are held there been used against merchant ships in the
by their own mass. The firing system is usually of Red Sea. Other ships may be hit if the missile
the influence type. They can be triggered by any controller targets the wrong ship or the missile
influence (acoustic, magnetic, seismic, pressure), homes in on an unintended target. They pose a
or a combination of these influences. These types Anti-Ship Missiles (ASM) are significant threat due to their destructive power
can be laid up to maximum water depths of 120m, causing fatalities and catastrophic damage.
depending on the target and/or the amount of
long range, accurate and
explosive charge, but water depths up to 60m are powerful weapons and have ASMs can be launched from a variety of ships,
more suitable. been used against merchant submarines and aircraft as well as from land.
They can be launched from short range to
c. Moving mines: this is a collective description of
ships in the Red Sea hundreds of miles. These missiles can be of a
mine types that are not stationary. All floating, cruise or ballistic nature:
oscillating, rising or homing mines belong to Cruise missiles are jet-propelled and
this category. As an example, rising mines can travel at subsonic speeds. Their sensors
be laid at a depth of 500m (mine case) and are very accurate.
2,400m (anchor). Ballistic missiles are rocket-powered to
get into flight, after which they follow an
d. Limpet mines: these are commonly manually arching trajectory to the target.
attached by a swimmer or diver on the
underside of a ship’s hull, usually with magnets. The launch of an ASM may be detected
Unlike larger mines, limpet mines are not through a visible flash and smoke. Missiles
intended to sink a ship but immobilise it. will normally hit above the waterline. The main
hazard is likely to come from fire, caused either
If there is intelligence suggesting the presence by the warhead explosion or by the unspent
of sea mines in an area, visual sightings, or a fuel from the missile motor.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Missiles can be fired in a straight line or follow Virtual security threats Regional maritime threats
a predetermined course to a target or dead
reckoning (DR) position. They can have an active Virtual threats primarily involve cyber-attacks Maritime security threats vary globally and within
or passive seeker head using optical, electronic or on electronic systems, which can impact ship geographical regions. A variety of threats may
heat signature homing to locate targets. navigational systems, disrupt Global Navigation be present in any one area at varying intensities
Satellite System (GNSS) or spoof Automatic depending on the intent and capability of
Loitering Munitions Identification System (AIS) services. These threats attackers. Recognising this, reporting centres
Loitering Munitions (LM) are a form of UAV with are harder to detect and require comprehensive and industry associations produce information
a built-in weapon and the capability to loiter procedures such as: on regional threat actors, their intent and
(wait passively) in the target area until the target Backup systems and processes. capability to attack merchant shipping, and link
is located. The number of LM attacks against Situational awareness training. these to applicable BMP measures to mitigate
both civilian and military ships, especially in the threat. The industry website is at
the Red Sea and Middle East, has risen. The General guidance for cyber security onboard ships www.maritimeglobalsecurity.org and a list of
global proliferation of these rapidly advancing can be found at www.maritimeglobalsecurity.org global reporting centres at annex A.
autonomous technologies, to both state and
private actors, poses a significant security To mitigate these threats, continuous improvement
threat to commercial shipping. ATTENTION through regular security drills and exercises,
capturing lessons observed, and adapting to new
More information regarding the threat from LM Navigators should use all available technologies is essential. Merchant ships should
can be found here. methods and not rely on GNSS alone. maintain close coordination with military forces and
leverage commercial intelligence and open-source
services for threat updates.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Section 3
Threat and
risk assessment
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Components of a threat organisations listed in annex A. Removing any one Military contributions: in specific areas,
side of the threat triangle minimises the threat. militaries provide additional threat information.
A threat is composed of three elements: capability, For example, in the Middle East:
intent, and opportunity. The Joint Maritime Information Centre
Determining the threat (JMIC) offers incident analysis.
EUNAVFOR and CMF produce Industry
All available information sources should be Releasable Threat Assessments (IRTAs) and
considered to determine the threat and may Industry Releasable Threat Bulletins (IRTBs)
TY
!
include but are not limited to: to aid risk management.
INT
ILI
Flag State: guidance and advisories provided UKMTO issues warnings and advisories.
B
EN
PA
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
When assessing risk, the following should Background factors such as owner/operator Regular review of the Ship Security Assessment
be considered: affiliations, traffic patterns and local patterns of (SSA) and voyage risk assessment is
Requirements of the Flag State, company, life, including fishing vessel activity. recommended to ensure:
charterers and insurers. Impact on crewing of International Bargaining New threats are identified, and existing risks are
The ship’s characteristics, vulnerabilities, and Forum (IBF) warlike operations areas. confirmed or removed.
inherent capabilities, including citadel/safe Cooperation with military authorities should Mitigations remain robust, practical and realistic.
muster points and secondary muster points be considered, but mitigations should not be Post-incident lessons are captured.
(freeboard, speed, general arrangement, etc.). based on the availability of naval assets unless Updates to industry best practice.
The ship’s and company’s standard operating direct military support has been agreed.
procedures (drills, watch rosters, chain of The use of Private Maritime Security
command, decision-making processes, etc.). Companies (PMSC).
The use of Security Escort Vessels (SEV).
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Section 4
Planning
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Planning
Company planning The following should be considered by companies 6. Review crewing requirements
when planning: Review and adjust personnel
This section details the procedures that should be requirements; consider additional
undertaken by the company prior to a ship entering 1. Regular review of threat and risk assessments personnel for security duties or
an area of increased risk identified through the risk Continuously update plans based on the disembarking non-essential persons.
assessment to mitigate against the risk of attack. It latest threat and risk assessments.
should be noted that risks will vary across regions. 7. Guidance and crew training for security threats
2. Security documentation Provide guidance, training and exercises
Review Flag State requirements, SSP, VHP, for the crew on identifying and reacting
company mandated mitigation measures to security threats. Support for seafarers’
and local military advice. wellbeing should always be considered,
especially if an incident has occurred.
3. Insurance and liabilities
Consider possible additional insurance and 8. Placement of hidden position
other commercial liabilities that may be transmitting devices
necessary when transiting threat areas. Consider installing hidden position
transmitting devices to locate the ship if
4. Guidance to the Master usual transmitting devices are disabled.
Prepare recommended route, updated
plans, and requirements for group transits
and national convoys.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Prior to entering an area of increased threat Other considerations In an area of increased threat
1. Implement security measures in accordance 1. Emergency communication plan: 1. Report to centres per annex A and if stipulated
with the mitigations described in the risk Prepare and test an emergency in any charter agreement.
assessment. communication plan with essential 2. Monitor the latest threat information.
2. Brief the crew and conduct drills: contact numbers (see annex A) and 3. Regular check of all mitigations and especially
Brief the crew on preparations. prepared messages. control of all access points.
Conduct drills with mitigations in place. Display communication plans near all 4. Identify a safe area for drifting, loitering,
Review the emergency plan and ensure all external communication stations, including anchoring and slow steaming whenever possible.
crew are aware of their duties. the safe muster point and/or the citadel. 5. Minimise use of VHF; prefer email or secure
Ensure familiarity with the alarm signals for Test communication devices and the Ship satellite phone communications. Only respond
an attack and an all-clear situation. Security Alert System (SSAS). to known or legitimate callers on VHF,
Check: Consider the provision of a ‘safe word’ considering the possibility of imposters.
Essential equipment tested and held by selected crew for communication 6. Maintain social media hygiene. Photographs and
available. authentication with officials. information on social media can provide details
Hardening in place, including the on the ship’s location, intent and operations.
security of all access points. 2. AIS policy:
Lockdown conditions, considering Carefully consider AIS policy in threat areas. Seafarer wellbeing
crew safety. Consider the safety and security Seafarers face unprecedented maritime threats
Bridge team’s security knowledge and implications of broadcasting AIS: which may affect their welfare and mental
crew awareness. If AIS is turned off, alter course and speed wellbeing. Planning should consider crew support
Crew’s response to different threats. to minimise tracking by dead reckoning. such as the provision of a ‘welfare ambassador’
If AIS is used, restrict data to ship’s identity, and regular discussion regarding the helplines and
3. Determine reporting requirements as position, course, speed, navigational status, services available to them. Details can be found in
outlined in annex A. and safety-related information. annex B.
3. Planned maintenance:
Reschedule maintenance of voyage-critical
equipment for transit through areas of
increased threat.
Consider cargo management duties
to reduce risk of crew working on
exposed decks.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Section 5
Mitigation
measures
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Mitigation measures
To effectively mitigate against attacks, ship crews 3. Layered defence: implementing a layered Alarms
should implement well-planned and rehearsed defence system increases the complexity Ship’s alarms serve to inform the crew of an attack
measures as part of a comprehensive Vessel for would-be attackers, thus enhancing the and warn the attackers the ship is aware and
Hardening Plan. This plan should detail the rigging ship’s security integrity. Each layer adds to the reacting. Continuous sounding of the ship’s whistle
of physical barriers and include regular drills and overall resilience and unpredictability of the may also distract attackers. It is crucial that:
exercises for the crew to practice responses to security measures.
various threats. Alarms are distinctive to avoid confusion.
4. Customising measures: companies should Crew members are familiar with each alarm,
The guidance provided is informed by global have detailed guidance on vessel hardening especially those warning of an attack and
experiences of attacks to date. It is important to based on their specific risk assessments. They indicating ‘all clear’.
note that not all methods will be applicable to every may also consider further alterations to the ship, All alarms are supplemented by information
region or ship type. The specific measures adopted obtaining additional equipment, or increasing over the accommodation and deck PA system,
should be based on a thorough threat and risk manpower to further reduce the risk of attack. relating to the type of attack. This ensures the
assessment for each ship or offshore activity. crew muster at the appropriate location.
Routing Drills are conducted to ensure the alarm and PA
Key considerations for vessel hardening Vessel routing can play a key role in reducing risk. broadcast can be heard throughout the ship,
1. Compliance with safety regulations: any During the risk assessment process, the routing and the crew are familiar in moving to a position
vessel hardening measures must comply with should be considered in view of the following: of safety.
the International Convention for the Safety of All PA systems and speakers are checked
Life at Sea (SOLAS) regulations. This means Locations of recent attacks. regularly to ensure they are in working order.
ensuring escape routes remain accessible and Intelligence reports of threats (e.g. Pirate Action
the crew’s ability to respond to non-security Group activity).
emergencies is not compromised. Sailing in territorial waters.
Routing through areas where the weather may
2. Attacks: ships can be attacked while underway assist in mitigating the risk.
or stationary (e.g., at anchor, during ship-to-ship Industry routing guidance – Maritime Security
or single buoy mooring operations, or while Transit Corridors.
drifting). Therefore, vessel hardening measures Avoidance of the area.
must be effective in all scenarios.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Watch keeping and enhanced vigilance Manoeuvring wire with coil diameters of 730mm or 980mm
The Master should implement the following actions Experience has shown evasive or counter action is recommended. Use a double roll or a
to enhance vigilance on board: manoeuvres for some vessel types, while avoiding high-quality single roll outboard of the ship’s
Provide additional, fully briefed lookouts. reduction in speed, makes boarding and targeting structure, ensuring it is properly secured to
Maintain an all-round lookout from an more difficult. prevent attackers from pulling it off.
elevated position.
Consider shorter rotation of the watch period to Spikes: these consist of several sharp points
maximise the alertness of the lookouts. WARNING attached to a bar and mounted outside the
Ensure sufficient binoculars are available for the ship’s handrails. They can be made of steel or
enhanced bridge team, preferably anti-glare. voidance manoeuvres should
A GRP. While effective, they require storage space
Consider using thermal imagery optics and only take place when it is safe when not in use and time to rig and de-rig.
night vision aids, as these provide reliable all- to do so.
weather, day and night surveillance capability. Plastic or GRP barriers: these fit over the
Maintain a careful radar watch and monitor all ship’s rails and make it difficult for ladders or
navigational warnings and communications, grapples to hook on. They are rigid and usually
ay e r of d e f e
particularly VHF and GMDSS alerts. st l nc ‘P’ shaped in profile. However, they require
Fir e
If applicable, consider placing well-constructed considerable storage space when not in use
dummies at strategic locations around the ship and can be damaged in heavy weather.
to give the impression of a larger crew on watch.
Use CCTV and fixed searchlights for better Chain link fencing: a double layer of chain link
monitoring; fixed searchlights can deter Preventing access at sea primarily involves fencing is effective against aggressive tactics
approaches from the stern. installing physical barriers. such as RPG attacks. It is typically fitted around
Physical barriers are designed to make it as difficult the outer perimeter of the bridge deck using
as possible for attackers to board the ship by scaffolding poles and clamps. However, it is
ATTENTION increasing the difficulty of the climb. When planning time-consuming to rig and de-rig, and clamps
barrier placement, special consideration should can damage the paintwork, causing corrosion.
good lookout is one of the most
A be given to ships with sunken poop decks. Typical It is not effective if placed close to or against
effective methods of ship protection. physical barriers include: bridge windows.
They can help identify a suspicious
approach or attack early, allowing for Razor wire: also known as barbed tape, it
defences to be deployed. creates an effective barrier if properly rigged
and secured. High tensile concertina razor
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
ATTENTION
ecurity measures to control access
S
must not compromise the crew’s
ability to abandon the ship or manage
other emergencies.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Ballast overflow
Ballast overflow involves intentionally overflowing
ballast tanks to create a large volume of water
flowing across the deck and over the ship’s side,
hampering intruders trying to board. Care should
be taken to prevent excessive pressure buildup in
any compartment for example, opening the tank
lids rather than overflowing through vents.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
ayer of def
nd l en
co ce
Se
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Bars: install a minimum of three bars on large Escape routes Security muster points and citadels
windows and ensure escape windows are Where the door or hatch is located on an escape The company risk assessment and planning
easily opened in emergencies. route from a manned compartment, it is essential process should identify the location of security
it can be opened from the inside. Where the door muster points within a ship and ensure crew are
Staircases, hatches, vents, and ladders or hatch is locked it is essential a means of opening familiar. These will vary depending on the threat, i.e.
Hinged metal plates: fit plates on outside the door from the inside is available. threat from piracy (citadel), threat from WBIED/UAV
staircases and ladders to obstruct climbing, (above waterline). Crew should always muster with
without compromising crew safety. appropriate PPE; additional PPE should be available.
Pipework protection: install spikes or angled
layer of defen
baffle plates on scupper pipes, fire mains, or Th
ird ce Security muster points
external cable runs to prevent them from being Definition: a designated area providing
used as climbing aids. maximum physical protection for the crew.
Location: should be above the waterline if there’s a
Enhanced bridge protection risk of hull breach. The central stairway, protected
Window protection: apply approved blast- Internal smoke cannons, strobe lights and by the accommodation block and above the
resistant film to bridge windows. noise makers waterline, is often suitable as multiple escape
Metal plates: installation of fabricated metal Purpose: these devices serve as a barrier routes are available. Avoid spaces with windows.
plates on bridge windows and wing doors within the accommodation block. Explosion risk: consider potential blast paths from
for quick deployment during an attack can Installation: fit smoke cannons, strobe lights and explosive devices when selecting the location,
be considered. noise makers in compartments or alleyways. i.e. an armour-plated door at the bottom of the
Chain link fencing: use to mitigate RPG Activation: can be activated remotely central stairwell will reduce the effect of a blast
effects. Not effective if placed close to the or automatically. from a WBIED. All loose items at muster points
bridge windows. Effect: smoke cannons fill spaces with non-toxic should be secured to prevent additional hazards.
Sandbags/water drums/steel plate: place on smoke to disorient intruders, while strobe lights
bridge wings for additional ballistic protection, and loud horns further increase disorientation.
checking regularly for degradation. ATTENTION
Lift shafts
Control of access to accommodation and Security measure: prevent intruders from using lift If a crew member is unable to reach the
machinery spaces trunking to access the engine room by stopping security muster location, they should
It is important to control access routes to the and isolating the lift at the ship’s upper deck. find a protected location and adopt the
accommodation and machinery spaces to deter Emergency escapes: ensure that personnel brace position against a bulkhead.
or delay entry. Effort must be directed at denying can escape from lift trunking in emergencies
access to these spaces. but prevent intruders from entering.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Citadels Drills and criteria: conduct regular drills and Closed Circuit Television (CCTV)
Purpose: a secure location where the crew can ensure the SSP defines conditions for citadel Installation: provide all-round visibility with CCTV,
retreat if intruders board the ship. use. Military forces may require all crew to be including thermal imaging, extended memory for
Size and facilities: should accommodate the accounted for and in the citadel, with two-way recording, and multiple monitor locations.
entire crew and any extra staff for 3-5 days. communication, before boarding. Discreet placement: use discreet or disguised
Must include communication systems (VHF and cameras and dummy units to mislead intruders.
SATCOM), independent power supplies, bottled Remote monitoring: allow remote monitoring
water, food and sanitation. ATTENTION from the company HQ while balancing
Communication: two-way communication cybersecurity and privacy concerns.
with company HQ and naval/law enforcement he Master should decide when to use
T Recording capability: ensure the system can
forces is essential. VHF for local and SATCOM the citadel. record and store footage for several days,
for global communication. Satellite antennae aiding law enforcement in identifying intruders.
must be independent from bridge systems. Audio integration: supplement CCTV with
Control from citadel: ability to control audio devices to alert the OOW to covert
propulsion and steering from the citadel could intrusion attempts.
trol and sa
be critical under specific circumstances. If ip con fet Install software: to enable the transmission of
Sh y
additional navigation equipment including CCTV images to the Company HQ if the system
GNSS, radar display, ECDIS and engine controls is disconnected.
are provided in the citadel it should only be Link: the activation of the SSAS to the CCTV to
used for sailing away from imminent danger. If allow remote monitoring from company HQ.
this is not available, the ship should be stopped Blackout: electrical isolation of specific areas can
prior to entering the citadel. disorient intruders. Electrical switchboards can
Awareness: CCTV monitoring from the create sectional blackouts without affecting the
citadel will provide situational awareness and citadel/safe area.
may provide footage direct to shore ship
management. Consider placing the CCTV Fire suppression systems
recording unit in the citadel to prevent damage Protection: Secure remote activation
by intruders. controls to prevent intruders from misusing
Sustainability: ensure the citadel has enough fixed fire suppression systems against the
food, water, sanitary and medical supplies to crew in the citadel.
sustain the crew, especially in hot climates. A
clear smoking policy should be agreed and
firefighting equipment available.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Motion sensors To comply with international regulations If a UAV is identified it is recommended the
Purpose: serve as an extra layer of hardening to and avoid collision risks, never switch off following actions are implemented:
warn crews of attempted or actual intrusions. navigation lights at night. Sound alarm.
Types: can be active or passive. Professional At anchor, keep deck lights on, as well-lit Muster crew in appropriate PPE including
advice is recommended to determine the best ships are less vulnerable to attacks. hard hats in appropriate location (avoid below
type for each ship. Have the capability to turn off all internal waterline and large amounts of glass).
Integration: consider location, type, coverage accommodation lights to deter or Brace for impact.
area, and alarm outputs when designing or disorient intruders. Consider switching off AIS or other tracking
retrofitting an integrated intruder detection and Regularly maintain lighting equipment to communications followed by a major course
alert system. ensure functionality. alteration if safe to do so.
Evasive manoeuvring.
Searchlights and lighting Securing ship’s tools and equipment
Lighting: minimise external lighting, except Prevent unauthorised use: secure all tools and In many cases multiple UAVs have been deployed
for mandatory navigation lights, to prevent equipment that could aid intruders in gaining against a single target ship. Repeated attacks over
attackers from establishing reference points. entry. Store such items in a secure location. a period of time have also occurred.
Use searchlights to probe for suspect craft and Ballistic protection: provide ballistic protection
illuminate radar contacts. from small arms fire for gas cylinders or WBIED mitigations
High-power searchlights: utilise xenon light flammable liquid containers stored on the WBIED can take many forms, the type of craft, control
sources to fully illuminate and identify suspect upper deck. Store excess gas cylinders of the craft, and intent will vary. In all cases mitigations
craft quickly. High-power beams can disorient securely or land them prior to transit. are limited however a PCASP team, if onboard, could
attackers temporarily. consider use of force to try and disable the craft
Recommended lighting practices: Ship-to-ship and other static operations within their Rules of Use of Force (RUF).
Weather deck lighting around the These should be conducted outside increased
accommodation block and rear-facing threat areas. Missile mitigations
lighting on the poop deck to The primary mitigation for preventing missile attacks
demonstrate awareness. UAV mitigations is to avoid the area completely. However, for ships
Keep searchlights ready for immediate use. The increasing use of UAVs to cause damage to transiting a missile threat area where no warning is
Switch on over-side lighting when attackers ships presents a difficult challenge for the maritime received the ship will have to implement emergency
are identified or an attack commences to industry. An attack by UAV cannot currently be response actions after impact. Seek military advice
dazzle them and aid crew visibility. mitigated by measures deployed onboard the on the use of electronic emissions, especially AIS, if
Exhibit only navigation lights at night. ship, however the effects of a UAV attack can be operating in areas with a missile threat.
responded to by the crew following its emergency
response procedures.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Ensure the PMSC has current and compliant Existing protection levels: review the levels of The PCASP must act in accordance with the
insurance policies. protection provided by navies, coastguards and agreed RUF, which should provide for a graduated,
Clearly identify the procedure for the use of force. maritime police in the operating area. reasonable, proportionate and demonstrably
Confirm the Master’s overriding authority. necessary escalation in the application of force in
Include a medical clause in case a team Documentation requirements for PCASP defence of the crew and ship.
member provides first aid to a crew member. If the decision is made to deploy a PCASP, the
following documents will be required: PCASP should be used only as an additional layer
Privately Contracted Armed Security Letter of authorisation: obtain a letter from the of mitigation and protection, not as an alternative to
Personnel (PCASP) Flag State confirming that the use of armed other measures. The decision to carry PCASP is an
PMSCs may offer both armed and unarmed guards is permitted. output of the risk assessment.
services. While it is acknowledged that the P&I Club letter: secure a letter from the
presence of PCASP has been effective, their Protection and Indemnity (P&I) Club stating that
presence could increase HSSE risks due to the employment of PCASP does not prejudice ATTENTION
there being weapons onboard. This should be the P&I cover.
considered in the risk assessment. The decision to War risk assurance letter: acquire a letter from he ship’s crew must not
T
engage a PMSC is left to individual ship operators, war risk insurance broker confirming that armed handle or use firearms.
subject to the permissions of the ship’s Flag State guards are permitted with no change in cover.
and any littoral states.
Master’s overriding authority
Considerations for engaging a PMSC If private security contractors are embarked, there
Current threat and risk environment: evaluate must be a clear understanding of the Master’s
the prevailing security threats and risks in the overriding authority. The Rules for the Use of Force
area of operation. (RUF) under which the PCASP operates must be
Company risk assessment: use the output acceptable to the Flag State and the company. The
of the company’s risk assessment to inform Master and PCASP should:
the decision. Clearly understand and acknowledge the RUF
Voyage plan requirements: assess the specific as outlined in the contract.
needs of the voyage, including route, duration, Have documentation authorising the carriage of
PCASP transfer and their logistics onboard. weapons and ammunition.
Ship characteristics: consider ship speed, Ensure all incidents involving the use of
freeboard, and type of operations (e.g., seismic weapons and armed force are reported at the
survey, cable laying). earliest instance to the Flag State and the CSO.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
These considerations and documentation 5. MoU and Service Agreement: where required
requirements ensure that the engagement of PMSCs request a copy of the Memorandum of
is conducted within legal frameworks and does not Understanding between the Navy and the
compromise the ship’s insurance coverage. SEV operator under which the SEV operates,
along with the PMSC’s Joint Venture Service
Refer to the PMSC guidance paper at Agreement with the SEV owner/provider.
www.maritimeglobalsecurity.org. 6. National Navy approval: request a copy of the
appropriate Navy approval letter or email for
Security Escort Vessels Navy personnel to operate on the SEV.
7. Insurance documents: obtain a copy of both
West Africa – Security Escort Vessel the SEV’s hull insurance and the PMSC’s liability
(SEV) considerations insurance.
SEVs are privately contracted vessels used to 8. Master’s feedback: request recent feedback
escort/protect ships usually within the EEZ and on the SEV’s last escort performance.
territorial waters of a coastal state. The intent is for 9. OVID certificate or CMID: obtain an Offshore
the presence of embarked military and security Vessel Inspection Database certificate or
personnel onboard an SEV to discourage piracy Common Marine Inspection Document.
and criminal attacks. 10. Routing: the PMSC should provide a
threat assessment for the route and SEV
When selecting an SEV, compliance and assurance rendezvous point.
checks with the PMSC/SEV provider should include:
It should be noted that the use of onboard private
1. SEV classification details: obtain recent dated armed security teams may be prohibited within
photographs of the SEV. some jurisdictions.
2. Certificate of Ownership and Registry: request
the SEV’s official documents.
3. Maintenance report: request the SEV’s latest
maintenance report or, if sub-chartered, the
PMSC’s due diligence audit report.
4. Evidence of recent sea trial: obtain an AIS
screenshot of a recent escort showing the
SEV’s speed, date and coordinates.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Section 6
Incident
response
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Incident response
There are a variety of security incidents a ship while others such as military or paramilitary
could encounter when transiting a threat area, and personnel may seek to hijack ship and crew for
a proportionate and dynamic response is critical political gain. Despite these differing motivations,
in mitigating their potential impacts. The following the characteristics of such attacks are similar, as
sections explain the measures that should be are the recommended mitigation measures.
applied by shipboard personnel in the event of
specific maritime security incidents. The threats Attackers from sea typically open fire as they
described have all been encountered by ships in approach the ship to induce fear and get the ship to
recent years. slow down or stop. Use any available time to activate
additional protective measures and plans. This
signals to the attackers that the ship is prepared.
General guidance
Approach stage
Ships should have well practiced plans for Effective and properly equipped lookouts are the
emergency response to security incidents. Ships best aid in identifying the nature of an attack. The the emergency alarm, and make an attack
should refer to the bridge cards for initial actions. threat profile of attacks may initially look similar, and announcement per the ship’s emergency
it may not be until the attacking ship is close that communication plan.
When operating in an area of conflict, emergency the nature of the attack becomes apparent. In all 6. Mayday call: make a mayday call on VHF
response should be conducted using normal cases, the following steps should be taken: Channel 16. Send a distress message via the
response processes with military or private 1. Increase speed: if not already at full speed, Digital Selective Calling (DSC) system and
security incorporated into the response to provide increase to maximum to open the distance. recognised mobile satellite service, as applicable.
appropriate support. 2. Steer straight: maintain a straight course to 7. Activate SSAS: ensure the Ship Security Alert
sustain maximum speed. System is activated.
3. Initiate emergency procedures: activate the 8. Report the attack: immediately report the
Illegal boarding ship’s emergency procedures. attack to relevant authorities.
4. AIS considerations: implement the Automatic 9. Security Escort Vessel: if accompanied by an
Attackers will approach the ship with an intent Identification System policy. SEV, consider its speed capabilities and ability
to board from the sea. The intent of such attacks 5. Emergency communication: activate the to keep up. A decision to stay or leave, with the
varies; pirates will typically seek to kidnap seafarers, emergency communication plan, sound SEV should be considered.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
10. Water spray: activate water spray systems. skiffs from lying alongside the ship in preparation 2. Decline boarding: if security forces seek to
11. Secure doors: ensure all external doors and, for a boarding attempt. Large amounts of helm board, the Master should decline permission if it
where possible, internal public rooms and alterations are not recommended as they may does not compromise the safety of the ship and
cabins are fully secured. significantly reduce the ship’s speed. crew, noting adherence to international law.
12. Crew muster: all crew not required on the 3. Non-resistance: if security forces illegally board
bridge or in the engine room should muster Actions on illegal boarding the ship, the crew should not forcibly resist.
at the security muster point or citadel as If the ship is illegally boarded, the following actions 4. Immediate reporting: in the event of
instructed by the Master. should be taken: suspicious activity or doubt, call the relevant
13. Course alteration: when sea conditions Stop the ship: take all way off the ship and stop authorities immediately.
allow, consider altering course to increase an the engines.
approaching skiff’s exposure to wind/waves. Muster crew: all remaining crew members
14. Sound whistle/foghorn: sound the ship’s should proceed to the citadel or security DO:
whistle or foghorn continuously to demonstrate muster point; the last crew member should lock
to potential attackers that the ship is aware of all internal doors on route. Prepare the ship’s crew to cooperate fully
the attack and is reacting to it. PCASP procedures: PCASP, if present, will follow during any state or military action onboard:
15. VDR recording: save the Vessel Data Recorder procedures agreed with the company and Master. Keep low to the deck and cover your
(VDR) recording. Ensure crew presence: prior to securing doors, head with both hands.
16. PCASP actions: PCASP, if present, will take ensure all crew are present in the citadel or Keep hands visible.
agreed actions to warn off attackers according security muster point, including the Master, bridge Be prepared to be challenged on
to the RUF. team, and PCASP. Implement agreed actions if a your identity.
crew member is unable to reach the citadel. Be prepared to be separated based
Attack stage on identity/nationality.
As attackers get closer, the following steps should Actions on illegal boarding by state Cooperate fully with state or military
be taken: representatives/paramilitary forces forces.
1. Reconfirm crew location: ensure all crew Ships operating in the Persian Gulf, Strait of Hormuz,
members are at the security muster point Gulf of Oman, Arabian Sea and Red Sea have
or citadel as instructed by the Master. In the been boarded by state security forces. If hailed by DON’T:
case of piracy, the crew should NOT leave security forces, ships should provide their name
the citadel until they have confirmed pirates and Flag State and affirm they are proceeding Make movements that could be
have left the ship or the military provide a ‘safe under international law and consider the following: interpreted as aggressive.
word’ – this could take days. 1. Maintain distance: ships should stay as far Take photographs.
2. Helm alterations: commence small helm as possible from territorial waters without Engage in ship activities unless
alterations while maintaining speed to deter compromising navigational safety. instructed by military personnel.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
,s
ec
en
Attack phase
det
sor
(top attack)
l
Visua
s etc)
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
25 knots 15 knots
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Section 7
Post-incident
procedures
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Post-incident procedures
A comprehensive plan to account for personnel, Post-attack recovery Take photographs of the crime scene from
assess damage and collect evidence is crucial. The The period following an attack will be challenging multiple viewpoints.
wellbeing of seafarers must be prioritised. Once all as the company, Master and crew recover from the Protect the VDR for future evidence.
attacks are confirmed as complete, it is important ordeal. It is essential that seafarers receive timely Seek military advice for the disposal of debris.
to follow these guidelines: and proper medical assessments, both physical
and mental, and care. Companies should have
Actions post-attack emergency management plans in place to manage WARNING
Send distress signal: immediately send a the effects of an attack, including handling long,
distress signal if not already sent. drawn-out hostage negotiation situations and ny radio emissions in proximity
A
Account for personnel: ensure all crew and supporting the families of those affected by a threat may trigger UXO.
PCASP are accounted for. incident, including piracy or armed robbery.
Administer first aid: provide medical support to
any injured crew members. Unexploded ordnance and projectile materials
Notify stakeholders: call the CSO and If a ship is attacked by a UAV, missile or similar
relevant authorities. projectile it is possible the munition may not
Implement damage control: take necessary explode leaving Unexploded Ordnance (UXO). If a
actions to control and mitigate damage projectile impacts a ship but does not explode the
following ship’s emergency procedures. crew should:
Survey damage area: inspect the area where Secure the impact area and maintain a
the blast or attack occurred. safe distance.
Save VDR: save and transmit (if possible) VDR Avoid the use of UHF/VHF and other
data to managing office. transmitting devices in the vicinity.
Preserve evidence: restrict access to area Preserve the area of impact and all evidence
and control scene in preparation for evidence without touching or dismantling debris.
collection by authority. Avoid contaminating the evidence and do not
Media: prepared guidelines on how to interact clean the area.
with media post-incident may help prevent Take initial statements or observations from
misinformation. the crew.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Annex A
Reporting and
information
centres
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Maritime Trade Operations Team 1 The Djibouti Code of Conduct (DCOC) Contact:
Role: Protecting Australia’s seaborne trade DCOC is a network to exchange information Email: [email protected]
through support to military commanders and on piracy incidents across the region and Tel: +91-124-2208385, +91-7428963733 (c)
the maritime industry. other relevant information to help shipping and Fax: +91-124-2209385
signatory states. Website: indiannavy.nic.in/ifc-ior
Contact:
Address: Maritime Operations c/o HMAS Moreton Role: Maritime centres monitor the maritime Regional Centre for Operational
Apollo Road Bulimba QLD 4171, domain for situational awareness and Coordination (RCOC)
Attention: MTO Duty Officer potential threats. Location: Seychelles
Telephone: +61 (0) 431 764 980
Email: [email protected] Services: 24/7 service to respond and provide Contact:
timely reports on incidents at sea to all Address: Sohna Road, Sector 33,
seafarers and signatory states. Gurugram 122001, India
Mobile: +91 85275 99898
Tel: +91-124-2208385
Fax: +91-124-2209385
Email: [email protected]
Website: x.com/IFC_IOR
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Contact:
Address: Bâtiment CFIM au rez-de-chaussée,
Ankaditoho, Soanierana , Antananarivo,
Madagascar
Tel: (+261) 020 22 24 393 / (+261) 33 14 028 89 /
(+261) 34 90 338 12
Email: [email protected] LATIN AMERICA MIDDLE EAST
X: https://x.com/
rmifcenter?s=11&t=5zxfXC6pSWf8MDSEoNic2g
International Fusion Center (IFC) Peru EU Maritime Security Center – Indian Ocean
Role: The IFC-Peru Maritime Information Fusion (EU MSC-IO)
Center for Latin America collects and analyses Role: Supports maritime safety and security
timely, accurate and useful maritime information for through incident reporting and information
Latin American countries, countries with scope in exchange, working closely with the MSC(IO)
the IFC-Peru’s area of interest and the international and JMIC and acting as a key liaison between
maritime community, with the purpose of issuing merchant ships and military forces in the Middle
periodic reports, focused on increasing safety and East region.
security in the aquatic environment; and integrating
capabilities to face common threats, through Services: 24/7 assistance through the Voluntary
interoperability and information exchange with Reporting Scheme, issues verified and
other similar centres worldwide. corroborated warning and advisories. Administers
Voluntary Reporting Scheme.
Services: Enhances safety and protection,
integrates capabilities to face common threats Contact:
in the aquatic environment. Tel: Emergencies +44 (0) 2392 222060
Tel: Info +44 (0) 2392 222065
Contact: Email: [email protected]
Email: [email protected] Website: mscio.eu
Tel: +51913862174
Website: dicapi.mil.pe/ifc-latam-peru
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Joint Maritime Information Center (JMIC) Yaoundé Architecture for Maritime Security (YAMS)
Role: Identify, fuse and distribute information YAMS is a maritime security framework, agreed by
to the global maritime community of interest West and Central African states.
with a focus on disruption to the freedom of
navigation in the Middle East region. Role: Each zone monitors the maritime domain
for situational awareness and potential threats.
Services: Provide timely and factual event driven
products and assessments, offering advice, and Services: To respond and provide timely
where prudent, military guidance only to help reports on incidents at sea to all seafarers.
inform any threat and risk assessment process.
WEST AFRICA Maritime Multinational Coordination Centre
Contact: (MMCC) Zone G
Tel: TBD Location: Cape Verde
Email: [email protected] Maritime Domain Awareness for Trade –
Website: products may be viewed at Gulf Of Guinea (MDAT-GOG) Contact:
ukmto.org/partner-products/jmic-products Role: Maintains 24/7 maritime situational Tel: +2382633622/+2382633623
awareness in the central and western African Email: [email protected]
UKMTO maritime areas, supports the Yaoundé Code Website: icc-gog.org/?page_id=1575
Role: Supports maritime safety and security of Conduct.
through incident reporting and information MMCC Zone F
exchange, working closely with the MSC(IO) and Services: The 24/7 centre administers the Location: Accra, Ghana
JMIC and acting as a key liaison between merchant GOG VRA. The centre informs and supports
ships and military forces in the Middle East region. the maritime industry by coordinating with Contact:
regional authorities. Tel: +23354796523
Services: 24/7 assistance through the Email: [email protected]
Voluntary Reporting Scheme, issues verified Contact: Website: icc-gog.org/?page_id=1575
and corroborated warning and advisories. Tel: +33 298228888
Administers Voluntary Reporting Scheme. Email: [email protected]
Website : gog-mdat.org/home
Contact:
Tel: Emergencies +44 (0) 2392 222060
Tel: Info +44 (0) 2392 222065
Email: [email protected]
Website: ukmto.org
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
MMCC Zone E
Location: Cotonou, Benin Yaoundé
Architecture
Contact:
for Maritime
Tel: +229 61 04 04 75 / +229 51 99 14 25
Email: [email protected] Security
Website: icc-gog.org/?page_id=1575 (YAMS)
MMCC Zone D
Location: Douala, Cameroon G
Contact:
Tel: +237233424001/+237233425948
Email: [email protected]
Website: icc-gog.org/?page_id=1575 F E
MMCC Zone A D
Location: Luanda, Angola ECOWAS – CEDEAO
ECCAS – CEEAC
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Er
it
Voluntary Reporting Areas (VRA) may be established el Mandeb TSS
re
a
in geographic areas where maritime threats to and a two-way
seafarers and ships is raised. Advice on their use route directly
together with reporting formats and instructions can connecting to the Djibouti
be found on the security charts or the websites of Internationally Gulf of Aden
regional reporting centres. The VRAs as shown on Recommended
the charts clearly define an area, so companies and Transit Corridor
ships transiting, trading, or operating in these regions (IRTC)
can join a trusted reporting scheme.
Ethopia
Somalia Somalia
Maritime Security Transit Corridors
Maritime Security Transit Corridors (MSTC) are
recommended routes for shipping along which Joint War Committee Reporting suspicious activity
naval forces may focus their presence and Role: Lists areas of perceived enhanced risk, Seafarers play a crucial role in maritime security
surveillance efforts. MSTCs will be shown on affecting insurance premiums. by reporting suspicious activities. Reports,
the maritime security charts and published by including photographs, videos and radar data, are
reporting centres. The MSTC example below is Listed areas: lmalloyds.com/lma/jointwar valuable to authorities.
shown on UKHO Chart Q6099 and consists of the
Traffic Separation Scheme (TSS) West of the Hanish The insurance community may list an area of Seafarers are encouraged to report any suspicious
Islands, the Bab el Mandeb TSS and a two-way perceived enhanced risk in the region. Ships activity to the relevant global reporting centres to
route directly connecting to the Internationally entering the area would need to notify their aid in improving maritime security and response.
Recognised Transit Corridor (IRTC). The industry insurers and additional insurance premiums may Typical suspicious activity is described in annex B.
website has details of all routing advice. apply. The Joint War Committee (JWC) comprises
underwriting representatives from both Lloyd’s
and the International Underwriting Association
representing the interests of those who write
marine hull war business in the London market.
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Q6110
Mediterranean
Sea
Q6111 Q6113
Persian Gulf Singapore to
Arabian Sea Papua New Guinea
Q6144
West Africa
including
Gulf of Guinea
Q6112
Q6099 Karachi to
Red Sea Hong Kong
Gulf of Aden
Arabian Sea
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Annex b
Seafarer
welfare
support
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05
Mitigations
MITIGATION
MEASURES
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Annex c
Maritime
lexicon and
abbreviations
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
Abbreviations
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION
01 Introduction 02 Maritime
Threats
Security
03 Threat and
Risk Assessment 04 Planning 05 MMEASURES
ITIGATION