STSDSD (1 - 5)
STSDSD (1 - 5)
STSDSD (1 - 5)
1. Introduction
Security for Seafarers came into focus because of three factors:
1. The impact of the 9/11 terrorist attacks (notably the launch of counter-terrorist
operations at sea),
2. The occurrence of three high visibility terrorist acts against ships (USS Cole in
2001, French tanker Limburg in 2002 and Filipino passenger ship Super Ferry 14
in 2004), and
3. The rise of piratical attacks in the Strait of Malacca at the beginning of the
century.
Following that, the surge of piracy at the Horn of Africa between 2007 and 2012 largely
contributed to generating debates on the legal, criminal, cultural, economic, military,
environmental and energy dimensions of piracy in particular and maritime security in
general. The maritime security geo-strategies in 2014 demonstrate that states’ and
international institutions’ maritime security objectives and interests are indirectly and
directly influenced by geographical and geopolitical considerations. The expression
‘maritime security’ is recent. Since the end of the 1990's and the beginning of the
2000's, maritime security was increasingly used to describe preventive measures set up
to respond to illegal activities at sea or from the sea (including the protection of shipping
and ports).
Terrorism (post 9/11) and piracy (especially after 2007 and the rise of attacks at the
Horn of Africa) attracted most of the media’s attention. However, arms and drug
trafficking, people smuggling, illegal, unregulated and unreported fishing, and deliberate
pollution still represent the bulk of illegal and disruptive activities at sea.
The maritime domain is a space within which human actors operate, either to perform
illegal, disruptive and damaging activities or to police and secure the sea in order to fight
criminal actors. Maritime security refers to a geographical space, that is to say the sea,
which has different characteristics compared to the land. States’ maritime security
interests result in a practice consisting in projecting security beyond their external
boundary into the global maritime domain. Thus, zones of interests are defined, which
extend beyond one’s legal zone. In security narratives, those maritime zones are
represented as vital for one’s security, which justifies power projection activities.
The need to enhance maritime security came with the rise of piracy off the coast of
Somalia between 2008 and 2011. The dangers of piracy for international trade brought
the maritime dimension of security to the global consciousness and lifted it high on
policy agendas. Moreover, the inter-state tensions in regions, such as the Arctic, the
South China Sea, or the East China Sea and the significant investments in blue water
navies of emerging powers, such as India and China, have increased attention for the
oceans as a security space.
Safety concerns are core to maritime security given that it may involve environmental
and cultural interests. Marine safety has also been increasingly linked to maritime
security given that the maritime industry, shipping companies and their employees are
simultaneously potential targets (e.g. of pirates, terrorists, or criminals) as well as
potential perpetrators (by engaging in maritime crimes such as trafficking of persons,
illicit goods or weapons or in collaborating with violent actors).
Maritime security is also linked to economic development. Throughout history the oceans
were always of vital economic importance. The majority of trade is conducted via the sea
. Both global shipping and fisheries have developed into multi-billion industries. The
commercial value of the oceans has moreover been increasingly re-evaluated due to the
economic potential of offshore resources, centrally fossil energy but also seabed mining,
as well as the economic promises of coastal tourism. The concept of blue economy is
linked to maritime security since sustainable management strategies not only require the
enforcement and monitoring of laws and regulations, but a secure maritime environment
provides the precondition for managing marine resources.
The major concern and scope for this course is limited to marine safety, under the
regime of the IMO that oversees the interest of the shipping industry and the individual
interests of the seafarer.
For almost two decades, maritime security has largely been framed by the
implementation of the International Ship and Port Facility Security (ISPS) Code, which
focuses on detecting and preventing security threats against ports and ships. But due to
increasing concern for the safe and secure movement of cargo, as well as the maturity of
the implementation of the ISPS Code over the last 15 years, maritime security has
begun to focus on treating ports and ships as conduits within the supply chain—not just
targets.
This shift from port and vessel security to broader cargo and supply chain security is
driven by the evolution of both global trade and threats to the supply chain—issues that
the ISPS Code does not adequately address. While the code has well-established security
requirements for ports and ships, it views these assets as targets of nefarious activities—
specifically terrorism—and not as broader conduits of illicit activity or movement of
contraband or theft of cargo.
As global trade continues to increase at a rapid rate, there is more cargo in the system,
as well as an increasing reliance on just-in-time delivery, which makes cargo and supply
chain security more sensitive to disruption, with greater potential impacts. The
movement of cargo is also increasingly dependent on electronic data streams, which
increase the risks of converged cyber, physical, and operational security challenges.
Maritime security is no longer just about protecting vessels and ports—it goes hand-in-
hand with cargo and supply chain security. Updated codes, regulations, and best
practices should reflect this evolution of the industry. This shift should emphasize a
broader focus on maritime security as an integrated system of physical assets, cargo,
and data that needs to be secure and resilient, rather than simply a collection of ports
and ships that need to be protected.
The course is designed to provide seafarers with the knowledge required to perform
designated security duties in connection with the Ship Security Plan (SSP). These duties
are as required as per Chapter XI -2 of SOLAS 74 and Section A-VI/6 of the STCW Code
as amended.
1.2 Competences to be achieved
Competences that will be achieved through completion of the course
After completing the course a trainee will be competent in the following matters related
to ship security
The Year 2018 Reports and trend - The IMB Piracy Reporting Centre has released its
global piracy report for 2018, and it warns that the maritime industry experienced a net
increase in attacks year-over-year. In particular, the agency recorded a "marked rise in
attacks against ships and crews around West Africa." Worldwide, the IMB recorded 201
incidents of maritime piracy and armed robbery in 2018, up from 180 in 2017. The Gulf
of Guinea is particularly dangerous for seafarers: reports of attacks in waters between
the Ivory Coast and the Congo more than doubled in 2018, and these incidents
accounted for the overwhelming majority of serious acts of piracy worldwide. The Gulf of
Guinea accounted for all six hijackings, 13 of the 18 ships fired upon, 130 of the 141
hostages held, and 78 of 83 seafarers kidnapped for ransom worldwide.
In a worrisome trend, this violence accelerated in the last quarter of the year. 41
kidnappings were recorded off Nigeria between October and December, more than half
the annual total. Some of these attacks occurred up to 100 nm offshore, well outside of
the territorial waters of West African states.
There is an urgent need for increased cooperation and sharing of intelligence between
the Gulf of Guinea’s littoral states so that effective action can be taken against pirates,
both at sea and on shore where their operations originate and end.
The International Maritime Bureau (IMB) is aware of the escalating level of this
criminal activity, and provides a free service to the seafarer by establishing the 24 hour
IMB Piracy Reporting Center (PRC) in Kuala Lumpur, Malaysia.
The reporting center provides:
A piracy map
A live piracy report
Piracy prone areas and warnings
Piracy news
A piracy report
A contact point to report piracy incidents
Terrorism
Terrorism is covertly planned but dramatic action, by clandestinely organised, often
unrepresentative groups, to spread fear by extreme violence in order to coerce, or
provoke a government or populace to take a particular course of political action desired
by the terrorists.
Example of terrorists use of shipping - In October 2001 in the Italian port of Gioia Taurio
an Egyptian Al Qaeda suspect was found in a container bound for Nova Scotia.
The Container was fitted with bed and toilet and had a laptop, US airport maps, forged
security passes and Canadian passports.
The passenger vessel Achille Lauro was boarded and hijacked in 1985.
Attack on the USS Cole in 2000.
Attack on the French VLCC Limburg in 2002
Transportation of terrorist weapons on the Karine A in 2002 and the Baltic Sky in
2003.
Sigonella in Italy is the airbase where the hijackers landed after being given safe
passage from Egypt, after freeing the vessel’s hostages and disembarking from the
vessel.
The ‘Sigonella’ incident is the standoff that occurred between US Navy Seals and Italian
defence forces. In the incident the Italians prevented the US Seals from arresting the
hijackers. The hijackers were finally arrested by the Italians and tried in Italy, for
hijacking and murder.
The attack was organized and directed by the terrorist organization al-Qaeda.
USS Cole
Contraband Smuggling
Contraband smuggling is a criminal activity, that may result in huge financial loss to the
ship owner whose ship is used by smugglers. Often drugs may be smuggled. Drugs are
brought on board the vessel in a number of ways and are normally brought in through,
luggage, stores, in a person’s body or in electronic equipment. Weapons could also be
smuggled, and normally come on board through cargo containers.
Example – On August 6th 2018, Colombian authorities seized more than one ton of
cocaine that was discovered inside a container on a ship bound for Europe.
The drugs were found following raid of the Singapore-flagged ship Cap San Tainaro in
the waters off Barranquilla, Colombia shortly after the vessel departed Cartegena,
Colombia bound for Antwerp, Belgium.
During the raid, authorities found 1,144 packages containing 1 kilogram of cocaine
apiece, worth an estimated street value of about $66 million.
The drugs are believed to have been smuggled by an organised crime group known for
its drug trafficking activities to Europe.
Drug routes
Cargo Theft
Cargo theft is an age old problem, that results in great financial loss to
the ship owner. Prevention is the best method to prevent cargo theft.
Example - Note that containers offer little security even when locked/ sealed
Therefore, container storage areas must be marshalled and protected, an
interim solution as smart seals and containers (using radio-frequency
identification) could prevent container pilferage in the future.
Break up of cargo theft
Example - A stowaway was discovered in the rudder trunk after a voyage from West
Africa to South America
Human trafficking
According to the UK P&I club checklist, the following steps are recommended:
Prior to and during a ship’s call at any port, it will be necessary to ensure all
relevant sections of the ISPS Code are implemented particularly regarding the
ship’s gangway and dock areas. All access points should be secured.
Ensure there is always a member of the ship’s crew manning the gangway who is
closely monitoring all persons embarking and disembarking. Additional
precautions such as CCTV should also be used where available.
On ro-ro vessels the ramp should be monitored at all times and any access points
on deck should be locked so that the vessel cannot be penetrated.
Agents should obtain and provide the ship with a list from the stevedore company
that clearly identifies the number of stevedores working on the ship. It is
essential that stevedores only embark and disembark by the ship’s gangway and
their movements are constantly monitored whilst onboard.
All visitors that are expected on the ship should be known to the ship’s master,
the crew member assigned to gangway watch duty and the agents, with their
expected time of arrival and clear details of their intended business onboard. All
visitors should be instructed to report to the crew member assigned to gangway
watch duties in the first instance.
Be vigilant for any persons who may be trying to board the ship by mooring ropes
or small boats at the waters edge. This is particularly important when the ship is
berthed at night.
It is essential that the ship is searched prior to departure, including all dark and
difficult to access areas. This should include areas that are thought to be
locked/secured. Empty bays on container vessels and empty holds on
bulk/general cargo vessels should be searched. In some circumstances it may be
prudent to engage an external search company to assist with a search prior to
the ship’s departure.
In case a stowaway is found onboard, The Club recommends briefly to take the following
measures:
Once the presence of a stowaway has been detected it is important to inform the
owners and the port agents.
It is the responsibility of the agent to advise the local authorities of the
stowaway’s presence
It can be very useful to search the area where the stowaway was found
Ensure that the stowaway’s clothing has been searched
The stowaway must be photographed and interviewed
Once the above information has been obtained, it should be reported to the Club
and/or the local correspondent
While the stowaway remains onboard, he should be fed and allowed access to
basic items such as bed and toilet
It will be necessary for the stowaway to be kept secure at all times
Please click here to see the stow away check list by UK P&I Club
Please click hereto see the stow away guidance by GARD
Maritime fraud, where seamen employed on board could have counterfeit passport and
other official documents.
Collateral Damage
Collateral damage occurs when a nearby fire, explosion, or attack results
in damage to a ship or facility.
Ships could be sabotaged by hoax calls of saying that a bomb is on board. In this regard
the 'Queen Mary' received a hoax call of a bomb on board.
Example – A deckhand was jailed for two years for setting fire to an offshore supply
vessel by pouring petrol onto her gangway as the crew slept on board, because he was
ordered off the ship after a drunken row with the captain.
Cyber crime
With the advent of IT in shipping there are possibilities of cyber-crime on
vessels.
Phishing: using fake email messages to get personal information from internet
users;
Misusing personal information (identity theft);
Hacking: shutting down or misusing websites or computer networks;
Spreading hate and inciting terrorism;
Distributing child pornography;
Cyber crime
In Transportation, the size of the industry leads to challenges in both the range of
vulnerabilities and the volume of passengers and freight to be protected, creating a need
for systems that can be scaled to meet requirements. Safety of passengers and the
protection of freight are paramount and the ability to create co-ordinate responses to
incidents is becoming increasingly critical.
In late June of 2017, AP Moeller-Maersk shut down its container operations at the Port of
Los Angeles. It was a cyber-attack. For the maritime industry and its extended supply
chains, the threat is real and looming. Ports are the economic engines of this country
and the world, meaning any downtime caused by a breach could have a catastrophic
impact on global supply chains.
New technology is likely to shape the risk equation for all links in transportation supply
chains. Investments in securing maritime operations are increasing in parallel to the
security vulnerabilities of the marine supply chain infrastructure.
Access control can limit access to sensitive area and CCTV systems can help identify
suspicious activity. When linked together with other systems such as intrusion detection,
fire and public address systems the integrated solution can become a powerful command
and control application allowing users to detect, monitor and respond to events in the
most safe and effective way. Access control is an important part of the security
environment in the Port and Maritime sector and provides the ability to control and
monitor movement of staff in restricted areas. This helps the port authority to meet the
requirements of the ISPS Security code. The ability to run CCTV and access control
system over the IT infrastructure is particularly beneficial in a port where the
geographical area can be large and having to run cable for individual systems can
involve significant expense.
Thermal cameras for ports are a must-have technology for maritime security, especially
for perimeters. There are currently solutions available that can work with thermal
cameras to allow for the detection of moving objects and long ranges with only a couple
of pixels on targets needed. Intelligent software applications can take what is captured
by a thermal camera and optimize it by connecting with a neighboring Pan-Tilt-Zoom
(PTZ) color camera, which can automatically track the object detected by the thermal
camera.
Tools and technology as well as a dedicated task force to bolster security are crucial. The
message for proper cyber hygiene must be circulated over and over again to employees
at all levels within a company and protocols need to be enforced regarding the use of
external devices. As attacks - both physical and cyber - continue to rise, maritime
infrastructure must be riveted on reliable security measures.
The diagram shown below illustrates interaction of a vessel with other modes of
transport:
Intermodal transport involves the use of at least two different modes in a trip from an
origin to a destination through an intermodal transport chain, which permit the
integration of several transportation networks.
In today’s market, a shipping agent acts like as an intermediary between the shipper
and the consignee.
Intermodality enhances the economic performance of a transport chain by using modes
in the most productive manner. Thus, the line-haul economies of rail may be exploited
for long distances, with the efficiency of trucks providing flexible local pick up and
deliveries.
The key is that the entire trip is seen as a whole, rather than as a series of legs, each
marked by an individual operation with separate sets of documentation and rates.
As the container is a common instrument used in the intermodal transport chain they
can be used in the illicit trade of counterfeit goods, drugs and weapons and for
terrorism.
Because of these concerns, all containers are electronically scanned at the port of
loading, prior to departure.
2. Maritime Security Policy
International conventions are treaties or agreements between states the primary actors
in international law.
An International Convention is enforced through state law after the State ratifies
(agrees) the Convention and enacts it as the law of the state through a bill introduced
and then passed in parliament.
A code is a set of standards set forth and enforced, through regular checks and
certification.
After the so-called 9/11 incident IMO worked vigorously to improve security at sea.
IMO Resolution A.545 (13) – measures to prevent acts of piracy and armed
robbery against ships (1983)
IMO Resolution A.545 (14) – measures to prevent unlawful acts which threaten
the safety of ships and the security of their passengers and crews (1985)
IMO MSC/Circ.443 – measures to prevent unlawful acts against passengers and
crews aboard ships (1986)
IMO Suppression of Unlawful Acts Against the Safety of Maritime Navigation
(SUA) Convention – for the suppression of unlawful acts against the safety of
maritime navigation (in force 1992)
IMO MSC/Circ.754 – Passenger ferry security (consideration primarily in respect
of passenger ferries operating on international routes and ports serving those
routes) (1996)
Though there were conventions, circulars and resolutions (as listed above) related to
maritime security at sea before September 11, 2001, none of them was mandatory.
Summarizes the rapidity with which IMO acted to enhance maritime security
following 9/11
After the ‘9/11’ incident IMO worked very swiftly to improve security on board ships, this
ultimately resulted in amendments to SOLAS to enhance maritime security and the
development of the International Ship and Port Facility Security Code (ISPS Code).
The initiatives to develop the ISPS Code and to amend SOLAS were done as illustrated in
the flow chart below:
Summarizes the amendments to SOLAS Chapter XI and the contents of the ISPS
Code
The ISPS Code was adopted by a resolution on 12 December 2002 by the conference of
Contracting Governments to the SOLAS convention.
The existing Chapter XI (Special measures to enhance maritime safety) of SOLAS was
amended and re-identified as chapter XI–1 and a new chapter, XI-2 (Special measures
to enhance maritime security) was adopted.
Another problem for the maritime industry is piracy on the high seas.
Part B
Details guidance regarding the provisions of Chapter XI-2 of SOLAS as amended, and
Part A.
The ISPS Code
The objectives of the ISPS Code are to establish an international framework, involving
co-operation between Contracting Governments, Government agencies, local
administrations and the shipping and port industries to:
In order to achieve its objectives, the ISPS Code embodies a number of functional
requirements. These include but are not limited to:
The provision of a ship identification number for all ships – the IMO number,
permanently marked on the vessel; (Chapter XI – I of SOLAS)
The maintenance of a continuous synopsis record (CSR), this records the history
of the ship; (Chapter XI – I of SOLAS)
The provision of a ship security alert system; (Chapter XI – II of SOLAS)
Fitting of Automatic identification system (AIS) and Long Range Identification and
Tracking of ships (LRIT) on all vessels as per chapter V of SOLAS;
Every company that operates a merchant vessel must be have a company and
registered owner identification number (C&ROIN). (Chapter XI – I of SOLAS)
Legal instruments on maritime security
The Port State must set security levels, the security level in place must be informed to
all visiting vessels, all flag state vessels must comply with the requirements of the ISPS
Code Part A.
It is important to note that security on vessels operates in tandem with port facility
security.
In addition to prevent terrorism in Somalia and the Gulf of Aden the Ship Security
Reporting System and a Best Management Practice guide have been implemented and
developed.
Making port, harbour craft and home trade vessels secure is done through flag state
legislation that are normally similar to measures prescribed by the ISPS Code.
Several governments have passed legislation to tighten maritime security, some of them
are as follows:
European Union – Has made selected parts of the ISPS Code Part B, mandatory (for
ships engaged on home trade voyages)
The UK – Has the Aviation and Maritime Security Act 1990, The Anti – Terrorism, Crime
and Security Act, mandated the EC regulation 725/2005 & 65/2005, and has regulations
that govern Ship and Port Facilities
The US – has the Maritime Transportation Act 2002 and the Navigation and Vessel
Inspection Circular 1996.
2.3 Definitions
Ship (Vessel) Security Plan – A plan to ensure the application of measures on board
the ship, designed to protect persons on board, cargo, cargo transport units, ship’s
stores or the ship from the risk of a security incident.
Port Facility Security Plan – A plan to ensure the application of measures designed to
protect the port facility and ships, persons, cargo, cargo transport units and ship’s stores
within the port facility from the risks of a security incident.
Security incident – means any suspicious act or circumstance threatening the ship
Ship (Vessel) Security Officer – The person on board the ship who is accountable to
the master, and designated by the company as responsible for the security of the ship,
including implantation and maintenance of the ship security plan, and for liaison with the
company security officer and port facility security officers.
Ship - to - Ship Activity – means any activity not related to a port facility that involves
the transfer of goods or persons from one ship to another
Company Security officer – The person designated by the company for ensuring that a
ship security assessment is carried out; that a ship security plan is developed, submitted
for approval, and thereafter implemented and maintained; and for liaison with port
facility security officers and ship security officer.
Port Facility Security Officer – The person designated as responsible for the
development, implementation, revision and maintenance of the port facility security
plan, and for liaison with ship security officers and company security officers.
Ship/port interface – The interaction that occurs when a ship is directly and
immediately affected by actions involving the movement of persons, goods or provisions
of port services to or from the ship.
Security Level 3 – Further specific protective security measures shall be maintained for
a limited period of time when a security incident is probable or imminent.
Some terms related to piracy – skiff – a small boat with an outboard motor through
which pirates board a merchant vessel, mother vessel – from where pirates launch their
skiffs
The following definitions to term and categorise attacks and suspicious incidents that are
reported from shipping inside the VRA may help. This ensures the consistent
identification of patterns and trends.
Armed robbery The Code of Practice for the Investigation of the Crimes of Piracy and
Armed Robbery against Ships, highlights armed robbery against ships consists of:
Hijack A hijack is where attackers have illegally boarded and taken control of a ship
against the crew’s will. Hijackers will not always have the same objective (armed
robbery, cargo theft or kidnapping).
Illegal boarding An illegal boarding is where attackers have boarded a ship but HAVE
NOT taken control. Command remains with the Master. The most obvious example of
this is the citadel scenario.
Piracy Piracy is defined in the 1982 United Nations Convention on the Law of the Sea
(UNCLOS) (article 101). However, for the purposes of these BMP, it is important to
provide clear, practical, working guidance to the industry to enable accurate and
consistent assessment of suspicious activity and piracy attacks.
The following may assist in assessing what is a piracy attack. A piracy attack may
include but is not limited to:
The use of violence against the ship or its personnel, or any attempt to use
violence.
Attempt(s) to illegally board the ship where the Master suspects the persons are
pirates.
An actual boarding whether successful in gaining control of the ship or not.
Attempts to overcome the SPM by the use of:
1. Ladders.
2. Grappling Hooks
3. Weapons deliberately used against or at the ship.
SSI was created to help share transportation-related information deemed too revealing
for public disclosure between Federal government agencies; State, local, tribal, and
foreign governments; and others.
When a risk is identified, inform ships and their current administrations of:
Passenger and cargo ships solely engaged on domestic voyages (coastal vessels)
Vessels involved in domestic voyages with significant distances to overseas
territories (e.g. US flagged vessel sailing from US to say Hawaii, domestic voyage
is not required to comply to ISPS requirement, US flag state security
requirements will apply)
Harbour craft and other craft that interact with ship-to-ship activities with ships
covered by maritime security measures
Offshore and supply support vessels
GISIS
Ensuring that the master has documents on board relating to the crewing of the
ship and its employment, crew screened before being appointed
Ensuring that the Ship Security Plan contains a clear statement emphasizing the
master’s authority
Designating a Company Security Officer (CSO) and a Ship Security Officer (SSO)
and ensuring that they are given the necessary support to fulfil their duties and
responsibilities
The company must ensure (can be put as a Security procedure in the ships safety
management manual) that the ship complies with the requirements of the Ship Security
Plan as per the security level set.
The company must ensure that the Master has on board the following information in
writing:
The company must provide for Master’s discretion in relation to actions to preserve ship
safety and security (safety overrides security).
The Master has the authority to deny access to any person on board, and reject cargo of
suspicious nature.
Company responsibilities
A Port facility is required to act upon the security levels set by its Government within
whose territory it is located.
The company is responsible for designating a Ship Security Officer on each of its vessels.
The duties of a SSO are of an operational nature and is as below:
It should be noted that there is a PFSO for each facility; however a PFSO can be in
charge of several Port Facilities if required.
Other personnel
It is important to note that the following also have a role to play in the
enhancement of security, as ensuring a ship’s security is everyone’s
business:
The inspector should critique the drill with the SSO and discuss corrective action if
necessary to address any deficiencies noted. Any deficiencies with the SSP detected
during the drill may be corrected by directing the owner in writing to submit an
amendment per the regulations. Such a requirement should be allowed at least 60
days.
A de-brief after the drill, conducted by the Master and / or the SSO must highlight:
Whether the objectives of the drill were achieved, stating what was performed
well
Whether the communication between the team members was proper and
effective
Whether there was synergy and co-operation between the crew members
Whether the resources were adequate
Whether the response to the emergency was proper and as per the SSP and
agreed procedures
What was clarified by the drill
What take-away of significant value was derived
What should have been done differently
Note: Crew members participating in the de-brief must be allowed to give constructive
comments for the good of ship security.
Identifying key shipboard operations that are a threat to ship security (e.g.
access control, cargo operations, embarking passengers on passenger ships)
Identifying existing shipboard security measures and procedures (e.g. methods of
access control, identifying restricted areas for controlled access, etc.)
Identifying potential security threat scenarios (e.g. piracy in W Africa, drug
smuggling in S America, etc.)
Performing an on-scene security survey, this is done to check if ship personnel
are doing their security duties properly when controlling access and during cargo
loading & stores handling operations, etc.
Identifying weakness in both the infrastructure and in ship security procedures
(so that new security measures can be implemented, to plug a presumed
weakness)
Risk-based decision-making checklists will rate the criticality of the security risk, and will
indicate if steps taken to mitigate the security risk are satisfactory.
It allows comments to make on security weaknesses if any, and actions required to plug
them.
An example of a ‘risk based decision making’ checklist for key shipboard operations is as
below:
‘Risk based decision making’ check list
Operations to be evaluated
During the on-scene security survey the following should be considered and evaluated:
The existing duties and responsibilities of all shipboard personnel, the designation
of additional security duties and its affect to the safe operation of the vessel;
The existing procedures or safeguards for communications and measures
necessary to maintain continuous communications at all times in the case of a
security threat;
The existing procedures for the assessment of safety procedures and equipment
and systems and additional procedures needed to assess the continuing
effectiveness of security procedures and any security and surveillance equipment
and systems, including procedures for identifying and responding to equipment or
systems failure or malfunction;
Additional procedures and practices required to protect security sensitive
information held in paper or electronic format;
Any additional and maintenance requirements, or inclusion of security and
surveillance equipment and systems, if any, into the existing maintenance
programs;
Existing procedures to ensure the timely submission, and assessment, of reports
relating to possible breaches of or security concerns;
Procedures required to establish, maintain and up-date an inventory of any
dangerous goods or hazardous substances carried on board, including their
location.
The location where ships stores and essential maintenance equipment is stored,
so that they can be protected from unauthorised access.
The number of ships personnel, any existing security measures and any existing
training
The location and the capabilities of existing security and safety equipment for the
protection of passengers and ship’s personnel, to ensure they can be protected
from unauthorised access
The general layout of cargo spaces and stowage arrangements
The location and availability of emergency and stand-by equipment available to
maintain essential services, to ensure protection from unauthorised access
The location of escape and evacuation routes, assembly stations which have to be
maintained to ensure the orderly and safe evacuation of the ship
All access points to the ship, these will include, access ladders, ramps,
sidescuttles (port holes just below the freeboard deck), etc., as they must be
monitored or must have measures to prevent unauthorised access, e.g. lift all
overboard ladders etc. if not required
Survey Sections
The security of a vessel can be divided into
Physical security
Structural security
Personnel protection systems
Procedural policies
Radio and Telecommunication systems
Other areas
On vessels physical security ensures personnel coming on board are not armed and
dangerous, it also ensures that no arms and other dangerous devices come on board the
vessel through other means e.g. – cargo or stores.
This is done by access control both onto and into the vessel and by monitoring cargo
loading operations and the delivery of stores.
Physical security:
Physical security also prevents unauthorised access to the ships computer. Prevent
unauthorised computer access by having secure passwords, changing passwords
regularly and using firewalls for the vessel’s computer network, among others.
SOLAS Convention vessels have several mandatory communication equipment for both
safety and security related communications.
LRIT (Long Range Identification and Tracking) - In this this system the
vessel’s satellite terminal is configured to sending ship information (voyage,
position etc.) transparent to the user to a database, that is accessed by coastal,
port and national administrations for actions to be taken to help in safety and
security incidents.
AIS (Automatic Identification System), a Very High frequency
communication system where a vessel sends both static (Vessels name and call
sign etc.) and dynamic information (speed, course etc.), that is received by other
AIS equipped ships and shore authorities (Vessel Traffic Information System
(VTIS)) – helps track and monitor vessels
SSAS (Ship Security Alert System) – a communication system that alerts the
flag state and the CSO immediately when the vessel is involved in a security
incident, is a button on the vessel that is activated by the Master.
There are other communication methods used for getting information or alerting, some
of these are given below:
Before transiting Somali pirate invested waters BMP5 recommends that vessels register
with United Kingdom Maritime Trade Operations (UKMTO). Vessels transiting these
waters are recommended to check Maritime Security Centre - Horn of Africa’s (MSCHOA)
website for updates and advice.
BMP5 provides useful contact details in Annex A, use these to communicate directly for
help in a pirate attack.
5. Security Equipment and Systems
Security Layers
Security equipment and systems will depend upon the type of ships, its sea passage
routes and potential threat that it faces and the regulatory items that all ships must have
to abide by the international and local laws. The equipment listing may include, as a
minimal, the following:
AIS
Ship Security Alert System
Locks
Lighting
Handheld radios
GMDSS equipment
Closed Circuit Televisions
Automatic Intrusion Detection Device (Burglar Alarm)
Metal detectors
Explosive detectors
Baggage screening equipment
Container X-ray devices
General Alarm
Various types of security equipment and systems that can be used aboard
vessels and in facilities
There are several equipment that are used to strengthen security on a vessel, they are
as below:
CCTVs – Can be used to cover vulnerable and restricted areas on a vessel, the
positioning of the camera is important, camera to be positioned in such a way so that all
blind spots are covered.
Once an attack is underway it may be difficult to assess whether the attackers have
gained access to the ship. The use of CCTV coverage allows a degree of monitoring of
the progress of the attack from a less exposed position. Some companies can monitor
and record the CCTV from ashore,
which will be of value when provided to the military. The following should be considered:
CCTV cameras for coverage of vulnerable areas, particularly the poop deck and
bridge.
CCTV monitors located on the bridge and at the safe muster point/citadel.
CCTV footage may provide useful evidence after an attack and should be
retained.
CCTV Camera
CCTVs can monitor access points. They provide 24 hour cover irrespective of weather,
information is recorded and can be retrieved if required.
CCTVs require good monitoring, therefore do not have too many viewing screens as then
monitoring becomes difficult.
CCTVs
Weather deck lighting around the accommodation block and rear facing lighting
on the poop deck to demonstrate awareness.
If fitted, search lights ready for immediate use.
Once attackers have been identified or an attack commences, over side lighting,
if fitted, should be switched on. This will dazzle the attackers and help the ship’s
crew to see them.
At night, only navigation lights should be exhibited.
Navigation lights should not be switched off at night as this a contravention of
international regulations and the risk of collision is higher than that of being
attacked.
At anchor, deck lights should be left on as well-lit ships are less vulnerable to
attack.
The ability to turn off all internal accommodation lights to deter pirates from
entering or disorientate those who may already have entered.
Lighting
Locks and locking equipment may not prevent entry but they delay entry. Doors and
their locking mechanisms must afford the same protection.
Use combination locks, normal locks if used to have a spare set of keys. Tag key sets for
identification.
Locks
Access control – Allow only authorised persons to board the vessel. All visitors to board
through the gangway. Gangway to be monitored 24X7 while in port. Provide visitors with
an ID card, and record all visitor entries in a logbook.
Search visitors and their belongings on entry and escort them into the vessel.
Access Control
Search – Depending on the security level, searching, visitors may be required. Trained
staff to carry out searches. Preserve human dignity when searching. Do not search
public authority officers (e.g. Port State Control Inspectors). Use hand held scanners for
body searches.
Hand held scanners
Search, cargo, baggage and stores. The port facility does the cargo search. Use baggage
scanning equipment for stores and baggage (passenger vessels).
Ensure containers seals are intact when loaded. All cargo loaded to be according to the
manifest.
Check stores coming on board against the manifest. Store away quickly after receiving
them.
Do not load unaccompanied baggage if possible; deal with them as per the Ship Security
Plan (SSP). Isolate suspicious baggage; do make an effort to find the owner.
Baggage scanners
Using Gloves for Physical Checks
Search equipment
Security equipment and systems that may be used to prevent and suppress
attacks by pirates and armed robbers
Some navigational watch precautions to be taken when entering a high risk piracy area
are as below:
Provide additional lookouts for each Watch. Brief the additional lookouts.
Consider a shorter rotation of the Watch period in order to maximise alertness of
the lookouts.
Ensure that there are sufficient binoculars for the enhanced Bridge Team,
preferably anti-glare.
Consider the use of night vision optics.
Maintain a careful Radar Watch.
ANTI-PIRACY ‘HARDENING’
With ever increasing piracy threat from Gulf of Eden, Red Sea, North Arabian Sea and
near the coastline of India it has become important to fortify the vessels for passive
purpose (deterrence) and for active purpose (defence).
Each vessel has its own vulnerabilities, which pirates will aim to exploit in the event of
an attack, including areas of low freeboard and areas where grapples, ladders and other
tools can be attached to allow access.
Pirates typically use long lightweight hooked ladders, grappling hooks with rope attached
and long hooked poles with a climbing rope attached to board vessels underway.
Physical barriers should be used to make it as difficult as possible to gain access to
vessels by increasing the height.
Physical barriers can be put in place which will physically bar the pirates from boarding
the vessel, gaining access to the vital areas within the vessel such as the bridge, engine
room, and crew quarters. If their access is barred and their attempts to control the ship
are hampered, then many pirates will simply abandon their attempt.
Razor Wire
Also known as barbed wire. It creates an effective barrier if properly rigged and secured.
The quality of razor wire varies considerably and lower quality razor wire is less
effective. The following is recommended:
Use a high tensile concertina razor wire with coil diameters of 730 mm or 980
mm. This is difficult to cut with hand tools.
Use a double roll. If this is not possible, place a single high-quality roll outboard
of the ship’s structure.
Secure razor wire to the ship properly, to prevent attackers pulling the wire off.
For example, attach at least every third wire ring to ship’s railings and rig a steel
cable through its core.
Use personal protective equipment and wire hooks to move and install razor wire.
Obtain razor wire in short sections, e.g. 10 m, so that it is easier and safer to
move.
Keep razor wire clear of mooring fairleads when at terminals so that it does not
interfere with mooring operations.
Razor wire creates an effective barrier but only when it is carefully deployed. The barbs
on the wire are designed to have a piercing and gripping action. Care should be taken
when selecting appropriate razor wire as the quality (wire gauge and frequency of barbs)
and type will vary considerably.
Concertina razor wire (linked spirals), available in approx. 750 mm or 950 mm each coil
of 15 meter as the linked spirals make it the most effective barrier.
When deploying razor wire personal safety and protective measures are required. Using
razor wire is effective when constructed on ship structure, deployed double or treble roll
of wire, and secured the razor wire with a wire rope through the razor wire to prevent it
being dislodged.
Some measures used to harden the vessels structure against unauthorised boarding
and/or pirate attacks are:
Alarms
The ship’s alarms inform the ship’s crew that an attack is underway and warn the
attacker that the ship is aware and is reacting. In addition, continuous sounding of the
ship’s whistle may distract the attackers. It is important that:
Physical barriers
Physical barriers are intended to make it as difficult as possible for attackers to gain
access to ships by increasing the difficulty of the climb for those trying to illegally board.
When planning the placement of barriers special consideration should be given to ships
with sunken poop decks.
The use of water spray and/or foam monitors is effective in deterring or delaying
any attempt to illegally board a ship. The use of water can make it difficult for an
unauthorized boat to remain alongside and makes it significantly more difficult to
climb aboard.
It is recommended hoses and foam monitors (delivering water) are fixed in
position to cover likely access routes and are remotely operated.
Manual activation is not recommended as this may place the operator in an
exposed position.
Improved water coverage may be achieved by using fire hoses in jet mode and
using baffle plates fixed a short distance in front of the nozzle.
Water cannons deliver water in a vertical sweeping arc and protect a greater part
of the hull.
Water spray rails with spray nozzles produce a water curtain covering larger
areas.
Foam can be used, but it must be in addition to a ship’s standard fire fighting
equipment stock. Foam is disorientating and very slippery.
The use of all available fire and general service pumps may be required to ensure
all defences operate efficiently.
Additional power may be required when using pumps; the supporting systems
should be ready for immediate use.
Practice, observation and drills are required to ensure the equipment provides
effective coverage of vulnerable areas.
Bridge windows are laminated but further protection against flying glass can be
provided by the application of blast resistant film.
Fabricated metal (steel/aluminium) plates for the side and rear bridge windows
and the bridge wing door windows, which can be quickly secured in place in the
event of an attack can greatly reduce the risk of injury from fragmentation.
Chain link fencing can be used to reduce the effects of an RPG.
Sandbags can provide additional protection on the bridge wings. They should be
regularly checked to ensure that they have not degraded.
Armed Guard
Use of PMSCs onboard merchant ships is a decision taken by individual ship operators
where permitted by the ship’s Flag State and any littoral states. However, the use of
experienced and competent unarmed PMSCs can be a valuable protective measure,
particularly where there may be the requirement to interface and coordinate with local
law enforcement agencies, naval forces and coast guards. Any decision to engage the
services of a PMSC should consider:
BMP does not recommend or endorse the general use of PCASP onboard merchant ships;
this is a decision taken by individual ship operators where permitted by the ship’s Flag
State and any littoral states.
Some Flag States do not allow the deployment of PCASP or PMSC. Some Flag States
provide military Vessel Protection Detachments (VPDs) instead of PCASP. A VPD may be
provided by another State, subject to Flag State approval. In some cases, the
deployment of either PCASP or VPDs must be reported and acknowledged by the Flag
State and reported when entering the designated risk area.VRA
Risks and benefits of security equipment and systems that may be used to
prevent and suppress attacks by pirates and armed robbers
Risks and benefits of security equipment to deter pirates is as below:
Dummies deter pirates but maintain a proper lookout for pirates in high-risk
areas.
When constructing any physical barriers identify areas that are vulnerable to a
pirate attack, to protect them. Physical barriers deter and prevent pirate
boarding.
The establishing of a Citadel may be beyond the capability of ship’s staff alone,
and may well require external technical advice and support. All crew must be
inside the citadel, when pirates board. This will provide vessel with time to get
help.
Ship Security Alert Systems (SSAS) are a SOLAS XI-2 requirement, and ISPS
requires that the SSP include a description of the system. Due to the sensitive security
nature of the information, ISPS allows the owner to keep the SSAS information separate
from the other parts of the SSP. This information is essential in order for the inspector to
complete the verification. ISPS also requires the equipment to be installed after the first
“survey” of the radio equipment following the deadline. Survey in this case means either
the periodical or renewal survey, whichever occurs next after the
deadline for compliance. New vessels must have the equipment installed at the initial
survey.
Specifics details will be contained in the SSP describing test procedures for the SSAS.
The inspector should follow the test procedures indicated. If the test reveals a problem
with either the test procedure or the SSAS itself, the inspector should immediately
inform the SSO. The failure of the SSAS represents a serious security deficiency and
must be addressed as soon as possible.
Crew should be familiar with the equipment and procedures, this can be done
with the required training, and reading user manuals
Equipment must be calibrated and tested before use
Specialized equipment must only be used by trained personnel
Usage of all security related equipment must be supervised and controlled
Since there are just too many equipment and some of the equipment are part of the
LSA/FFA list of equipment e.g., fire pump, water hoses, water tight doors etc., the VSO
can use those schedule as part of his way to maintain the security equipment; the rest of
the security equipment then can be checked at scheduled intervals, while conducting
security drills and be part of a weekly checks as normally practiced on board most deep
sea vessels.
The risks and benefits of security equipment and systems that may be used to
prevent and suppress attacks by pirates and armed robbers
Risks and benefits of security equipment to deter pirates is as below:
Dummies deter pirates but maintain a proper lookout for pirates in high-risk
areas.
When constructing any physical barriers identify areas that are vulnerable to a
pirate attack, to protect them. Physical barriers deter and prevent pirate
boarding.
The establishing of a Citadel may be beyond the capability of ship’s staff alone,
and may well require external technical advice and support. All crew must be
inside the citadel, when pirates board. This will provide vessel with time to get
help.
Crew should be familiar with the equipment and procedures, this can be done
with the required training, and reading user manuals
Equipment must be calibrated and tested before use
Specialised equipment must only be used by trained personnel
Usage of all security related equipment must be supervised and controlled
Include the maintenance schedule of all security equipment in the vessels
Planned Maintenance System (PMS)