Security Awareness Rev. 5 - 2018
Security Awareness Rev. 5 - 2018
Security Awareness Rev. 5 - 2018
PY
O
C
ED
LL
SECURITY AWARENESS
O
SEAFARERS
O
C
In accordance to International
Convention on Standards of Training,
Certification and Watchkeeping for
Seafarers (STCW), 1978, as amended.
Page 1 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
SCOPE
This course is intended to provide knowledge required to enable personnel without
designated security duties in connection with a Ship Security Plan (SSP) to enhanced ship
security in accordance with the requirements of chapter XI-2 of SOLAS 74 as amended, the
ISPS Code, and section A-VI/6-1 of the STCW Code.
OBJECTIVES
Those who successfully complete this course should achieve the required standard of
competence enabling them to contribute to the enhancement of maritime security
through heightened awareness and the ability to recognize security.
ENTRY STANDARD
PY
It is assumed that those attending this course will be serving seafarers or other shipboard
personnel who will not be assigned specific security duties in connection with the Ship
O
Security Plan.
STAFF REQUIEMENTS
TR
The instructor in charge of the course should have adequate experience in maritime
security matters and should have knowledge of the requirements of chapter XL-2 of SOLAS
N
74 as amended, the ISPS code, and security-related provisions of the STCW Code.
O
C
BIBLIOGRAPHY
International Convention for the Safety of Life at Sea, 1974 (SOLAS 1974), as amended.
International Ship and Port Facility Security (ISPS) Code
Page 2 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
TIMETABLE
COURSE OUTLINE
PY
2.2. Awareness of relevant government legislation and regulations
2.3. Definitions
O
2.4. Handling sensitive-related information and communications
3. SECURITY RESPONSIBILITIES
3.1. Contracting governments
C 0.5
3.2. The company
ED
1.0
4.1. Recognition and detection of weapons, dangerous substances
O
and devices
4.2. Recognition, on a non-discriminatory basis, of persons posing
C
security risks
4.3. Techniques used to circumvent security measures
5. SECURITY ACTIONS 0.5
5.1. Action requires by different security levels
5.2. Reporting security incidents
6. EMERGENCY PREPAREDNESS, DRILLS AND EXERCISES
6.1. Awareness of contingency plans 0.5
6.2. Security drills and exercises
7. Theorical Exam 1.0
TOTAL 5.0
Page 3 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
COURSE TIMETABLE
PY
conditions discriminatory basis, of persons
2. MARITIME SECURITY POLICY posing security risks
2.1. Awareness of relevant 4.3. Techniques used to circumvent
O
international conventions, codes security measures
and recommendations
2.2. Awareness of relevant government
C
5. SECURITY ACTIONS
5.1. Action requires by different
ED
legislation and regulations security levels
2.3. Definitions 5.2. Reporting security incidents
2.4. Handling sensitive-related 6. EMERGENCY PREPAREDNESS,
LL
Page 4 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
MANUAL
1. Introduction
PY
understand the security regulations and your security responsibilities and duties.
O
The trained will acquire the following competences:
C
Contribute to the enhancement of maritime security through heightened
awareness ,
ED
TERRORISM: Looking at the past the main danger to merchant ships was due to
war between states. However, today’s maritime challenges go beyond the
N
September 2001, the threat posed by international terrorism has gained a new
C
dimension. Incidents such as the USS Cole and Limburg attacks have
demonstrated that terrorists are interested in and capable of using the maritime
domain to achieve their objectives. Preventing terrorists from attacking at or
from the sea and from crossing maritime borders has thus become a major
preoccupation for European and North American governments. Particular
attention has been given to addressing the vulnerability to terrorist attacks of
sea-based critical energy infrastructure and of maritime flows of energy
resources. One should also mention the threat that “terror mining” in large
harbors such as Rotterdam, Antwerp or New York, could pose to maritime trade.
A second and related threat is the use of maritime routes by terrorists or state
actors for the proliferation of weapons of mass destruction material and
technology. Third, the increase in the illegal movement of drugs, human beings
and arms as well as the growing flow of illegal immigrants, particularly from
Africa to Europe, has raised the problem of effective maritime governance and
border control, in particular on the porous maritime borders.
PIRACY AND ARMED ROBBERY.
Page 5 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
Historically the sea has been the hunting ground for armed robbers or pirates as
they came to be called for as long as merchant ships have been sailing in them.
After the second half of the last century the world saw modern day pirates using
powered craft and automatic weapons hijacking and robbing ships. The Far
Eastern waters like Malacca and China Sea were very much in the news for a
considerable period of time. Incidents also took place in other areas worldwide.
The dramatic upsurge in incidents of piracy and armed robbery off the coast of
Somalia and the Arabian Sea in recent years have shown that this “old” threat is
far from extinct. Especially where one finds extreme state weakness and attacks
take place along vital maritime trade routes, piracy can pose a threat not only in
terms of local or regional security, but also international security. The situation in
Somalia has also raised the specter of a possible collusion of interests between
terrorists and pirates. Other unstable regions, such as the Niger Delta, also
PY
continue to face significant piracy problems.
COLLATERAL DAMAGE.
O
Collateral damage is damage to things that are incidental to the intended target. It
is frequently used as a military term where it can refer to the incidental
C
destruction of civilian property and non-combatant casualties. The use of military
means to free hijacked ships in the Gulf of Aden off the Somalia coast, though
ED
action has been lauded by the media, but there has been collateral damage. For
instance, the master of “MV Samho Jewelry” was shot in the process of rescue and
the deaths of the American civilians onboard the yacht “Quest” was also caught up
O
in a military response.
TR
CONTRABAND SMUGGLING.
N
In the past the ships were usually carrying narcotics as part of the criminal
activities of organized crime. Now also these drugs are carried by maritime
O
transport units but with increased sophisticated methods, except that now
C
weapons and explosives can also be included. The financial gains can be
astronomical and so there is now an increase of organized crime gangs linked
with terrorists, who use these finances. The links between pirates and
terrorists/organized crime gangs is also suspected.
CARGO THEFT.
This has been a problem for the maritime industry since the ships evolved. It can
be small scale pilferage to stealing the whole cargo. Even though
containerization has reduced the quantity yet it occurs in all segments of the
marine cargo carriage trade. Thieves can range from the corporate type using
modern day information technology to the poorly clad fisherman turned robber
climbing up from the anchor cable in some third world port.
Page 6 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
Extreme economic disparity between the rich and poor states and the hope of a
better life force the people to migrate and many will resort to illegal ways like
stowing away on board a ship. The others are who fear for their life due to
conflict or persecution and want to get away from their country. This is a
worldwide phenomenon and no particular region can be singled out.
PY
journey from the shipper to consignee can use all modes of transport. Ships will
interface with the sea/river port and usually the land transport truck or rail will also
interface with them, as well as with the airport. Sometime you will also have an
O
intervening Dry Port. Therefore, this inter-modal nature of transportation makes the
security solution much more complex, due to the many more vulnerable entry points.
C
ED
The mariner must be aware that IMO has making efforts towards maritime security
TR
USA incident), the IMO Assembly adopted Resolution A.924(22), on the review of
O
measures and procedures to prevent acts of terrorism, which threaten the security of
passengers and crew and the safety of ships.
C
Then IMO´s Maritime Safety Committee (MSC) and its Maritime Security Working Group
did intensive work for ONE YEAR and came out with the ISPS CODE. The International
Maritime Organization´s (IMO) Diplomatic Conference of December 2002 adopted new
Regulations to enhance maritime security through amendments to SOLAS Chapters V
and XI. Chapter XI, previously covering ship safety has been split into two new chapters,
XI-1 andXI-2. Chapter XI-1, Special Measures to Enhance Maritime Safety, has been
enhanced to include additional requirements covering ship identification numbers and
carriage of a Continuous Synopsis Record. Chapter XI-2, Special Measures to Enhance
Maritime Security, has been created and includes a requirement for ships and
companies to comply with the International Ship and Port Facility Security (ISPS) Code.
The ISPS Code contains two parts. Part A is mandatory, while Part B is recommendatory
and contains guidance for implementation of the Code.
Page 7 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
The USCG has decreed that sections of Part B of the Code will also be taken into
consideration. Chapter XI-2 also sets out requirements for ship security alert systems
and control and compliance measures for port states and contracting governments. As
well as the new Regulations in SOLAS Chapter XI-2, the Diplomatic Conference has
adopted amendments to extant SOLAS Regulations accelerating the implementation of
the requirement to fit automatic identification systems (AIS) (Chapter V). The Diplomatic
Conference has also adopted a number of Conference Resolutions including technical
co-operation, and the co-operative work with the International Labor Organization and
World Customs Organization. Review and amendment of certain of the new provisions
regarding maritime security may be required on completion of the work of these two
organizations. These requirements form a framework through which ships and port
facilities can co-operate to detect and deter acts which pose a threat to maritime
security. The regulatory provisions do not extend to the actual response to security
PY
incidents or to any necessary clear-up activities after such an incident.
In summary the ISPS Code:
O
Enables the detection and deterrence of security threats within an international
Framework
Establishes roles and responsibilities
C
Enables collection and exchange of security information
ED
Put in place vessel and port security plans; and ensure training and drills are conducted.
The STCW Code has also added security related provisions wherein all persons employed
C
on ships as well as persons on ship having designated security duties are to undergo
training and attain competencies as per regulation VI/6 and section A-VI/6.
IMO has issued from time to time Guidance to Ship-owners, Companies, Ship Operators,
Shipmasters and Crews on Preventing and Suppressing Acts of Piracy and Armed
Robbery against Ships.
2.3. Definitions
Ship Security Plan
Page 8 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
Means a plan developed to ensure the application of measures on board the ship
designed to protect persons on board, cargo, cargo transport units, ship's stores
or the ship from the risks of a security incident.
Company Security Officer
Means the person designated by the Company for ensuring that a ship security
assessment is carried out; that a ship security plan is developed, submitted for
approval, and thereafter implemented and maintained, and for liaison with port
facility security officers and the ship security officer.
Ship Security Officer
Means the person on board the ship, accountable to the master, designated by
the Company as responsible for the security of the ship, including
implementation and maintenance of the ship security plan, and for liaison with
the company security officer and port facility security officers.
PY
Port Facility
Is a location, as determined by the Contracting Government or by the Designated
Authority, where the ship/ port interface takes place? This includes areas such as
O
anchorages, awaiting berths and approaches from seaward, as appropriate.
Ship/Port Interface C
Means the interactions that occur when a ship is directly and immediately
ED
affected by actions involving the movement of persons, goods or the provisions
of port services to or from the ship
Ship-To-Ship Activity
LL
Means any activity not related to a port facility that involves the transfer of
goods or persons from one to another ship.
O
Designated Authority
O
Means the qualification of the degree of risk that a security incident will be
attempted or will occur.
Security level 1
Means the level for which minimum appropriate protective security measures
shall be maintained at all times.
Security level 2
Means the level for which appropriate additional protective security measures
shall be maintained for a period of time as a result of heightened risk of a
security incident.
Security level 3
Means the level for which further specific protective security measures shall be
maintained for a limited period of time when a security incident is probable or
imminent, although it may not be possible to identify the specific target.
PY
Terms relating to Piracy and Armed robbery.
This consists of any of the following acts:
(a) Any illegal acts of violence or detention, or any act of depredation,
O
committed for private ends by the crew or the passengers of a private ship or a
private aircraft, and directed: C
(i) On the high seas, against another ship or aircraft, or against persons or
ED
property on board such ship or aircraft;
(ii) Against a ship, aircraft, persons or property in a place outside the
jurisdiction of any State;
LL
protect the port facility and ships, persons, cargo, cargo transport units and
O
ship's stores within the port facility from the risks of a security incident.
International Ship and Port Facility Security (ISPS) Code
C
Means the International Code for the Security of Ships and of Port Facilities
consisting of part A (the provisions of which shall be treated as mandatory) and
part B (the provisions of which shall be treated as recommendatory), as adopted,
on 12 December 2002, by resolution 2 of the Conference of Contracting
Governments to the International Convention for the Safety of Life at Sea, 1974
as may be amended by the Organization.
Page 10 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
information and must be protected to prevent unauthorized people and groups from
accessing it. Hence the importance of keeping it confidential. Threats to Information
Security Before you can maintain the security of the Information on board your ship, you
need to be aware of the numerous threats to information security! These threats come
under four main categories subversion, espionage, sabotage and terrorism.
Subversion: -The threat of subversion can come from hostile intelligence services or
extremist groups. These groups will often try to persuade you to help them in their
cause and divulge classified information. They may also try to exploit your weaknesses
and change your beliefs so that you become sympathetic to their cause.
Espionage: -Attempts by groups to acquire information covertly or illegally in order to
assist foreign power or a political or commercial competitor are forms of espionage.
Information is considered compromised if any or all of it gets into the hands of someone
not authorized to have it. Communication systems are particularly vulnerable to
PY
espionage from eavesdropping or phone taps. Some intelligence agencies also recruit
individuals to obtain information for them through spying or undercover surveillance.
O
Sabotage: -An act or a failure to act that has the intent to cause physical damage with
the goal of assisting a foreign power, furthering a subversive aim, or reducing or
C
destroying a commercial operation is characterized as sabotage. Communication
systems are always at high risk when sabotage is used to further a political cause. Green
ED
They are unlawful uses of force against individuals or property to achieve political,
religious or ideological goals. Unlawful threats of force are also considered acts of
O
terrorism.
There are many other threats to information security, such as the ones listed below!
TR
Computer viruses that damage computer systems and information. The most
C
Personnel Security.
Page 11 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
Your ship's personnel include the crew, officers, subcontractors, shore personnel,
suppliers, inspectors and others working or visiting your ship at any given time.
Personnel security aims to ensure that only those, whose reliability, trustworthiness and
circumstances that are not in doubt have access to sensitive material. And, that the
necessary permission or clearance needed to access information is limited to those who
require it to do their jobs. This need to know approach makes it harder for subversive
individuals to obtain information about your ship's operations. There are many methods
of personnel security. There are different levels of security checks from basic checks to
counter terrorist checks.
The level of security check required depends on the individual’s responsibilities and the
extent to which he or she has access to sensitive information-individuals in a higher
position of trust should be checked to a higher standard. Individuals' circumstances can
change - they may get into debt, befriend criminals or move to a high-risk area - and this
PY
may make them more susceptible to criminal activities. It's a good idea to maintain close
and continuous supervision and to conduct periodic reassessments of security
O
clearances.
Physical Security.
C
ED
The physical measures that need to be in place to protect your ship's information will
vary according to the threat, the value of the information to be protected and the
sensitivity or value of the information to terrorist, subversive, or criminal groups. The
LL
measures may also vary according to your ship's location and the level of detail and
strategic importance of the information. Cryptographic and Computer Security
O
and the exposure and analysis of information useful to terrorists. There are various
methods of cryptographic and computer security.
N
O
Check documentation;
Pose questions in a discreet manner; and
Observe body language and behavior.
Checking Documentation
Checking documentation may seem obvious, but it is important. All documents related
to the purpose of a shipboard visit should be examined and the ID of all visitors and crew
verified.
Tips on Questioning.
Use a combination of open-ended and closed-ended questions.
Open questions
Are usually preceded with "what, when, who, where, how and why" and that require a
person to give more than a “yes" or "no" answer. Examples include:
Where have you travelled from?
Page 12 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
PY
Is this the item you were asked to carry? Check to see that the answers to your
questions match up with what you already know about a crewmember or the
O
purpose of a shipboard visit. And, ensure that the answers tie in with any items
being carried or transported. C
Asking Good Questions
ED
Questioning is an important part of profiling. Questions draw out important information
and should be asked in such a manner as to not arouse the suspicion of the person
selected. There are many questions you could ask! Remember, your goal is to ask
LL
questions and get answers that will help you determine whether an individual poses a
potential risk to your ship's security.
O
Are you coming directly from another ship or were you on _leave?
Where did you travel to while on leave?
Did you bring any mementos from your travels?
N
Were you on another service call before joining us today? Recognizing Suspicious
Behavior
When asking questions, paying attention to the body language and behavior of
individuals being questioned is just as important as listening to their answers. Are they
nervous? Do they react when you go near their equipment or baggage? Are they
sweating or restless? Are they becoming aggressive? Are they overly happy or trying to
be overly friendly? Are they trying to avoid eye contact? If you are suspicious of a
person's behavior, stay calm and inform someone else of your suspicions. Do some
additional checks or perform a search of the individual's belongings or equipment. Allow
them onboard only after you are satisfied they do not pose a security risk.
Dealing with Suspicious Items
If during profiling, you suspect that an individual is carrying a suspicious object or
package - such as drugs or an explosive device - be careful that you don't let the person
know that you suspect something. You never know how he or she will react! Never
touch or pick anything up. If a suspicious object is an explosive it may be fitted with an
Page 13 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
anti-handling device. Inform someone of your suspicions, discreetly, so that they can
summon assistance. Never use a radio within 25 meters of a suspicious object. If it is an
explosive with a radio-controlled device, a transmission by your radio may activate it. If
you suspect that the package is a bomb, take these additional steps: Confirm that a
device actually exists; Clear the immediate area; Cordon off the area around the
suspicious object and Control the area so that only authorized persons have access.
3. Security Responsibilities
As per the requirements of SOLAS, the ISPS code and STCW code (ships personnel
training) there are defined requirements for compliance by ships and the ports that
service them. Below we give them as set out in the above mentioned documents
PY
O
3.1. Contracting governments
Administrations shall set security levels and ensure the provision of security level
C
information to ships entitled to fly their flag. When changes in security level occur,
security-level information shall be updated as the circumstance dictates.
ED
Contracting Governments shall set security levels and ensure the provision of security-
level information to port facilities within their territory, and to ships prior to entering a
LL
circumstance dictates. With regards to STCW Code the States must ensure that
compliance with the new requirements of Security Familiarization training for persons
TR
working on ships as well as Security Awareness Training for All Seafarers and Security
Training for Seafarers with Designated Security Duties plus the upgrading of Ship
N
Companies shall comply with the relevant requirements of SOLAS chapter XI and of part
A of the ISPS Code, taking into account the guidance given in part B of the ISPS Code.
The Company shall ensure that the Master has available on board, at all times,
information through which officers duly authorized by a Contracting Government can
establish:
Who is responsible for appointing the members of the crew or other
persons currently employed or engaged on board the ship in any capacity
on the business of that ship?
Who is responsible for deciding the employment of the ship; and
In cases where the ship is employed under the terms of charter party,
who are the parties touch charter party.
Page 14 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
Ships shall comply with the relevant requirements of SOLAS chapter XI-2 and of part A
of the ISPS Code, taking into account the guidance given in part B of the ISPS Code, and
such compliance shall be verified and certified as provided for in part A of the ISPS Code.
PY
authority prior to conducting any ship/port interface or prior to entry into port,
whichever occurs earlier.
O
3.4. The port facility Port C
Facilities will comply with the relevant requirements of SOLAS chapter XI-2 and the ISPS
ED
Code.
A port facility is required to act upon the security levels set by the Contracting
Government within whose territory it is located. Security measures and procedures shall
LL
the ship security officer shall include, but are not limited to:
Undertaking regular security inspections of the ship to ensure that appropriate
O
Page 15 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
PY
implementation and maintenance of the ship security plan;
Ensuring that the ship security plan is modified, as appropriate, to correct
O
deficiencies and satisfy the security requirements of the individual ship;
Arranging for internal audits and reviews of security activities;
C
Arranging for the initial and subsequent verifications of the ship by the
Administration or the recognized security organization;
ED
Page 16 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
PY
Ensuring that security equipment is properly operated, tested, calibrated and
maintained, if any; and
O
Assisting ship security officers in confirming the identify of those seeking to
board the ship when requested.
C
ED
3.8. Seafarers with Designated Security Duties.
In addition to the Ship Security Officer other members of the crew on a ship may have
Designated Security Duties in support of the Ship Security Plan. These security duties
LL
include anti-piracy and anti-armed-robbery activities. These seafarers will have received
training as per regulation VI/6 -4and to attain competency to the level as given in section
O
having designated security duties in support of the Port facility security plan.
O
C
Page 17 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
used and basically it is a very fast chemical reaction of substances producing gas at high
temperature and pressure with such velocity to cause damage. They kill by pressure
blast, high temperature and shrapnel used to fill the device in which it is used. Some
explosives examples are black powder, nitro glycerin, ammonium nitrate, C4, etc.
The device is consisting of the explosive, the detonator and the triggering mechanism.
Some of the very common devices are improvised from ordinary everyday use things
and are called I.E.D (improvised explosive device).These will always be in disguise. Few
other criminal acts raise as much fear and concern as bombings, so it's no coincidence
that crime and terrorist groups routinely use them as a means to achieve their goals
whether they are loss of life, intimidation, extortion or government or commercial
disruption. Most terrorist and crime groups use Improvised Explosive Devices or IED's.
Detonated onboard a ship, an IED can create a serious hull break or start a dangerous
PY
fire, both of which can lead to injury and loss of life. So what does an IED look like?
During the lecture have a look at some images shown to you. Let’s see if you can
recognize one! Pictured on the screen are various images.
O
C
All of these images are clever disguises of IED's! IED's are homemade weapons that are
easily manufactured and limited in their form only by the imagination of their creator!
ED
Because they often take the shape of everyday items, it's critical to always be on the
look-out for objects that seem out of place or out of context and to be able to recognize
the components of and IED.
LL
Common Components
O
Despite their differences in appearance, all IED's have four components in common - a
TR
timer, a power source, a detonator and an explosive. Sometimes a timer power unit
(TPU) is used and consists of a homemade unit that contains the timer and a power
source and is connected to a detonator and an explosive. Power sources are usually
N
detonators that contain very small quantities of a very sensitive explosive. Industrial
explosives may be commercial or military grade. Commercial explosives are readily
C
available to license holders and are commonly used in the quarrying and construction
industries. High power military explosives are available from eastern bloc countries and
states supporting terrorism. Liquid explosives are available, but difficult to find. Terrorist
and criminal groups have devised ways to make homemade explosives because other
types of explosives are not always readily available. These explosives are usually derived
from chemicals found in fertilizer or other industrial products.
Incendiary Devices
Incendiary Devices are a commonly used type of IED. They consist of a small amount of
explosive supplemented by a flammable liquid. These small, but effective devices use
the destructive power of fire to cause massive damage.
Vehicle Borne Devices
Car bombs are another common type if IED. They are designed to carry large quantities
of explosives and use vehicles as weapons. Under car booby traps are another common
IED designed to kill or maim the occupants of a vehicle. Used as assassination weapons,
Page 18 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
they usually contain small amounts of a high grade explosive and may be triggered by a
timer, a remote control device or a mercury tilt switch.
PY
is left in a confined space ensure all doors and windows are left open. Clear the area.
Cordon off the area and, if possible, allow nobody to within 50m or 2 bulkheads of the
line of sight of the package. Notify the Duty Watch Officer. Other dangerous substances
O
can be gases of explosive /flammable or toxic nature which can be in liquefied form or
C
compressed. Some flammable gases are natural gas (methane/ethane), LPG (propane
/butane), hydrogen and acetylene. Toxic gases are Ammonia, H2S, SO2, Cyanide,
ED
Phosgene etc.
Dangerous liquids, solids, can be so due to being flammable, toxic or having properties
LL
Profiling.
C
Profiling helps us get beneath the outer shell of an individual to obtain a more complete
picture. It has many applications. In the context of ship security, profiling will help you
identify whether and to what extent the crew and visitors to your ship pose a security
risk. Profiling techniques like document checks, questioning and observation ensure that
judgments are based on more than just appearances. Random selection of individuals
for profiling ensures that patterns are not established. It also prevents allegations that
individuals are being picked on? Whenever behaviors or items arouse suspicion, action
should always be taken to respond to the perceived threat whether that means
additional checks, searches or the cordoning off and containing of an explosive device.
Averting a security incident is worth the extra time and effort!
The Many Uses of Profiling.
It's easy to see how appearances can be deceiving. And yet, we commonly make
judgments about people based on how they look. Profiling is a method used to get
beneath the outer shell of an individual to obtain a more complete picture. It has many
applications.
Page 19 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
Criminal
Criminal profiling is used to obtain information about an individual or an offender.
Matching DNA samples and reviewing past offenders' files to establish trends and
patterns during investigations are two common profiling techniques.
Industrial
Industrial profiling is used to obtain information about rival companies and their
employees. It might include examining internet sites or employing specially trained
personnel to build up the profiles.
Commercial
Commercial profiling is used to obtain information about customers or employees.
Many organizations use focus groups, surveys and purchase information to track and
target the needs and preferences of their customers.
PY
General
Profiling information is widely available. You can obtain a multitude of information on
O
the internet including the profile of a potential vacation destination, a residential area,
or even a Doctor that you may be thinking of using!
Using Profiling Onboard Your Ship
C
ED
Onboard your ship, you can profile both crew and visitors at all access points to identify
their level of security risk and what, if any, additional checks or measures need to be
implemented before they are allowed to board. Detection equipment can also be used,
LL
but only in tandem with profiling. It cannot select for itself and only works on facts. You
may spot things that the equipment won't and it's important to not ignore these gut
O
feelings or hunches. They're an essential part of profiling! When establishing your ship's
profiling program, it's vital that you maintain a random selection process. This ensures
TR
that a pattern is not established and prevents allegations that individuals are being
picked on. This is especially important when checking or searching crew. One approach
N
you can use with crew is to take a number at random between 5 and 9, say for this
example 8, and search every 8th crewmember coming onboard.
O
PY
statements that may be used in evidence later. Some examples are:
Is this your bag?
Is this your passport?
O
Are you the person named in this document?
Did you apply for this visa in person? C
Has anyone asked you to carry any thing for _.him or her?
ED
Is this the item you were asked to carry? Check to see that the answers to your
questions match up with what you already know about a crewmember or the
purpose of a shipboard visit. And, ensure that the answers tie in with any items
LL
and should be asked in such a manner as to not arouse the suspicion of the person
selected. There are many questions you could ask! Remember, your goal is to ask
questions and get answers that will help you determine whether an individual poses a
N
•Are you coming directly from another ship or were you on _leave?
•Where did you travel to while on leave?
•Did you bring any mementos from your travels?
Examples of questions to visitors
•What is the purpose of your visit?
•Are you bringing onboard any tools or equipment?
•Were you on another service call before joining us today? Recognizing Suspicious
Behavior
When asking questions, paying attention to the body language and behavior of
individuals being questioned is just as important as listening to their answers. Are they
nervous? Do they react when you go near their equipment or baggage? Are they
sweating or restless? Are they becoming aggressive? Are they overly happy or trying to
Page 21 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
be overly friendly? Are they trying to avoid eye contact? If you are suspicious of a
person's behavior, stay calm and inform someone else of your suspicions. Do some
additional checks or perform a search of the individual's belongings or equipment. Allow
them onboard only after you are satisfied they do not pose a security risk.
PY
explosive with a radio-controlled device, a transmission by your radio may activate it. If
you suspect that the package is a bomb, take these additional steps: Confirm that a
device actually exists; Clear the immediate area; Cordon off the area around the
O
suspicious object and Control the area so that only authorized persons have access
C
ED
4.3. Techniques used to circumvent security measures
4.3.1. Having a good plan is essential to your ship´s security, but a plan alone is not
LL
enough! Diligence on the part of crew in implementing the plan is just as important.
Terrorists and criminals will constantly search for ways to circumvent your security
O
measures, procedures and equipment. They will often be extremely clever and may
TR
take many months to observe you and research your equipment in order to find a way
to successfully attack you. The best defense is good security awareness and observation
on the part of all crew and passengers. If you get the sense that something is not right?
N
Investigate until you are satisfied that all is well! Some other indicators to watch out for
are:
C
4.3.2. Methods used by pirates and armed robbers to undertake attacks against ships
Page 22 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
.1 Commonly, two small high speed (up to 25 knots) open boats or „skiffs‟ are used in
attacks, often approaching from either quarter or the stern. Skiffs are frequently fitted
with 2 outboard engines or a larger single 60hp engine.
.2 Pirate Action Groups operate in a number of different boat configurations. To date
whatever the configuration the attack phase is carried out by skiffs. Pirate Action Group
boat configurations include:
●Skiffs only – usually two.
●Open whalers carrying significant quantities of fuel often towing 2 or more attack
skiffs.
● Mother ships which have included the very largest of merchant ships, fishing vessels
and dhows. These Mother ships have been taken by the pirates and usually have their
own crew onboard as hostages. Mother ships are used to carry pirates, stores, fuel and
attack skiffs to enable pirates to operate over a much larger area and are significantly
PY
less affected by the weather. Attack skiffs are often towed behind the Mother ships.
Where the size of the Mother ship allows it, skiffs are increasingly being carried
onboard and camouflaged to reduce chances of interdiction by Naval/ Military forces.
O
.3 Increasingly, pirates use small arms fire and Rocket Propelled Grenades (RPGs) in an
C
effort to intimidate Masters of ships to reduce speed and stop to allow the pirates to
board. The use of these weapons is generally focused on the bridge and
ED
accommodation area. In what are difficult circumstances, it is very important to
maintain Full Sea Speed, increasing speed where possible, and using careful
maneuvering to resist the attack.
LL
.4 Pirates seek to place their skiffs alongside the ship being attacked to enable one or
more armed pirates to climb onboard. Pirates frequently use long lightweight ladders
O
and ropes, or a long hooked pole with a knotted climbing rope to climb up the side of
TR
the vessel being attacked. Once onboard the pirate (or pirates) will generally make their
way to the bridge to try to take control of the vessel. Once on the bridge the
pirate/pirates will demand that the ship slows/stops to enable further pirates to board.
N
.5 Attacks have taken place at most times of the day. However, many pirate attacks
O
have taken place early in the morning, at first light. Attacks have occurred at night,
particularly clear moonlit nights, but night time attacks are less common.
C
.6 The majority of piracy attacks have been repelled by ship’s crew who have planned
and trained in advance of the passage and applied the Best Management Practices
contained within the various guidance books published by various concerned sources
Security level 1
At security level 1, the SSP should establish the security measures to control access to
the ship, where the following may be applied:
Page 23 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
●checking the identity of all persons seeking to board the ship and confirming their
reasons for doing so by checking, for example, joining instructions, passenger tickets,
boarding passes, work orders, etc.;
●in liaison with the port facility, the ship should ensure that designated secure areas are
established in which inspections and searching of persons, baggage (including carry-on
items), personal effects, vehicles and their contents can take place;
●in liaison with the port Facility, the ship should ensure that vehicles destined to be
loaded onboard car carriers, ro-ro and other passenger ships are subjected to search
prior to loading, in accordance with the frequency required in the SSP.
●segregating checked persons and their personal effects from unchecked persons and
their personal effects;
● segregating embarking from disembarking passengers;
PY
● identifying access points that should be secured or attended to prevent unauthorized
access;
● securing, by locking or other means, access to unattended spaces adjoining areas to
O
which passenger and visitors have access and
C
●providing security briefings to all ship personnel on possible threats, the procedures for
reporting suspicious persons, objects or activities and the need for vigilance. At security
ED
level 1, all those seeking to board a ship should be liable to search. The frequency of
such searches including random searches should be specified in the approved SSP and
should be specifically approved by the Administration. Such searches may best be under
LL
taken by the port facility in close cooperation with the ship and in close proximity to it.
Unless there are clear security grounds for doing so, members of the ship's personnel
O
should not be required to search their colleagues or their personal effects. Any such
TR
search shal1 be undertaken in a manner which fully takes into account the human rights
of the individual and preserves their basic human dignity.
N
Security level 2
O
At security level 2, the SSP should establish the security measures to be applied to
C
protect against a heightened risk of a security incident to ensure higher vigilance and
tighter control, which may include:
●assigning additional personnel to patrol deck areas during silent
● limiting the number of access points to the ship, identifying those to be closed and the
means of adequately securing them;
●deterring waterside access to the ship, including, for example, in liaison with the port
facility, provision of boat patrols;
●establishing a restricted area on the shore side of the ship, in close co-operation with
the port facility;
● increasing the frequency and detail of searches of persons, personal effects, and
vehicles being embarked or loaded onto the ship;
●escorting visitors on the ship;
●providing additional specific security briefings to all ship personnel on any identified
threats, re-emphasizing the procedures for reporting suspicious persons, objects, or
activities and stressing the need for increased vigilance; and
Page 24 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
Security level 3.
At security level 3, the ship should comply with the instructions issued by those
responding to the security incident or threat thereof, The SSP should detail the security
measures which could be taken by the ship. In close co-operation with those responding
and the port facility, which may include:
●limiting access to a single, controlled, access point;
●granting access only to those responding to the security incident or threat thereof;
●directing persons on board;
●suspension of embarkation or disembarkation;
●suspension of cargo handling operations, deliveries, etc.;
PY
●evacuation of the ship;
●movement of the ship; and
O
●preparing for a full or partial search of the ship
C
5.1.2. Recommended actions in response to attacks and attempted attacks by pirates
ED
and armed robbers. If the crew of a vessel suspects that it is coming under a pirate
attack there are specific actions that are recommended to be taken during the approach
stage and the attack stage. It should be noted that the pirates generally do not use
LL
weapons until they are within two cables of a vessel, therefore any period
O
that they have been seen and the vessel is prepared and will resist.
Approach Stage
N
If not already at full speed, increase to maximum to open the CPA. Try to steer a straight
course to maintain a maximum speed.
O
Communication Plan
●Sound the emergency alarm and make a „Pirate Attack‟ announcement in accordance
with the Ship’s Emergency Plan.
●Report the attack immediately to UKMTO (+971 505 523 215). UKMTO is the primary
point of contact during an attack but MSCHOA acts as a back-up contact point. Once
established, maintain communication with UKMTO. Please report attack to UKMTO even
if part of a national convoy so other merchant ships can be warned.
●Activate the Ship Security Alert System (SSAS), which will alert your Company Security
Officer and Flag State. Make a „Mayday‟ call on VHF Ch. 16 (and backup Ch. 08, which is
monitored by naval units).
●Send a distress message via the Digital Selective Calling system (DSC) and Inmarsat-C,
as applicable.
●Ensure that the Automatic Identification System (AIS) is switched ON. All crew, except
those required on the bridge or in the engine room, should muster at the Safe Muster
Point or Citadel if constructed; so that the crews are given as much ballistic protection as
Page 25 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
possible should the pirates get close enough to use weapons. Where possible, alter
course away from the approaching skiffs, and/or Mother ships. When sea conditions
allow, consider altering course to increase an approaching skiffs exposure to
Wind/waves. Activate water spray and other appropriate self-defensive measures
Ensure that all external doors and, where possible, internal public rooms and cabins, are
fully secured. In addition to the emergency alarms and announcements for the benefit
of the vessel’s crew sound the ship’s whistle /foghorn continuously to demonstrate to
any potential attacker that the ship is aware of the attack and is reacting to it.
Attack stage.
Reconfirm that all ship’s personnel are in a position of safety.
As the pirates close in on the vessel, Masters should commence small alterations of
helm whilst maintaining speed to deter skiffs from lying alongside the vessel in
PY
preparation for a boarding attempt. These maneuvers will create additional wash to
impede the operation of the skiffs. Substantial amounts of helm are not recommended,
as these are likely to significantly reduce a vessel’s speed.
O
If The Pirates Take Control.
●Try to remain calm.
C
ED
●Before the pirates gain access to the bridge, inform UKMTO. Ensure that the SSAS has
been activated, and ensure that the AIS is switched on.
LL
●Offer no resistance to the pirates once they reach the bridge. Once on the bridge the
pirates are likely to be aggressive, highly agitated, and possibly under the influence of
drugs, (including khat, an amphetamine like stimulant), so remaining calm and
O
●If the bridge/engine room is to be evacuated the main engine should be stopped and
all way taken off the vessel if possible, (and if navigationally safe to do so). All remaining
N
crewmembers should proceed to the designated Safe Muster Point with their hands
visible.
O
Page 26 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
PY
• any other information (e.g., language spoken)
• injuries to crew and passengers
O
• damage to ship (which part of the ship was attacked?)
• action taken by the Master and crew C
• was incident reported to the coastal authority and to whom?
ED
The drills be conducted at least once every month. In addition, in cases where more
than 25 percent of the ship’s personnel have been changed, at any one time, with
personnel that have not previously participated in any drill.
Page 27 of 28
SEAFARERS TRAINING CENTER M-SATS(I)-26
The drills and exercise will also be carried out with the company to prove that it
understands and has the competence for different cases of contingencies of security.
PY
O
C
ED
LL
O
TR
N
O
C
Page 28 of 28