maritime safety2 master

106
ANNEX 1 SHIP SECURITY PLANNING GUIDE Prepared by ROYAL ASSOCIATION of NEDERLANDS SHIPOWNERS

Upload: violeta-toma

Post on 24-Oct-2014

46 views

Category:

Documents


2 download

TRANSCRIPT

ANNEX 1

SHIP SECURITY PLANNING GUIDE

Prepared by

ROYAL ASSOCIATION of NEDERLANDS SHIPOWNERS

Edition 05 (April 2003)

To meet the requirements of SOLAS 1974 Chapter XI-2

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 2 of 33

MASTERS OVERRIDING AUTHORITY

The Master has the overriding authority and responsibility to make decisions, which, in

the professional judgment of the master, is necessary to maintain the safety and security

of the ship. If, in the professional judgment of the master, a conflict between any safety

and security requirements applicable to the ship arises during its operations, the master

shall give effect to those requirements necessary to maintain the safety of the ship. In

such cases, the master will implement temporary security measures and shall forthwith

inform the Administration and, if appropriate, the Contracting Government in whose port

the ship is operating or intends to enter. Any such temporary security measures under

this regulation shall, to the highest possible degree, be commensurate with the prevailing

security level.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 3 of 33

CONTENTS

Subject Page Masters overriding authority 2

1 Introduction 4

2 Definitions 5

3 Company and Ship Details including Continuous Synopsis Record 7

4 Company Security Officer (CSO) 9

5 Ship Security Officer (SSO) 10

6 Plan Documentation 11

7 Ship Security Assessment 12

8 Security Actions 13

9 Ensuring the Performance of all Ship Security Duties 15

10 Restricted Areas 16

11 Controlling Access to the Ship 18

12 Monitoring Deck Areas and Areas surrounding the Ship 20

13 Controlling the embarkation of Persons and their Effects 22

14 Supervising the handling of cargo 23

15 Supervising the handling of ships stores 25

16 Port Specific Security Communication 26

17 Ship/Port Facility Interface 27

18 Training 28

19 Drills and Exercises 30

20 Contingency Plans and Standard Operating Procedures 31

Example: Security Continuous Record 32

Example: Ports of Call List 33

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 4 of 33

1. INTRODUCTION

1. This plan is written in accordance with the requirements of SOLAS Annex XI-2 and

part A of the International Ship and Port Facility Security (ISPS) Code.

Requirements of US regulations NVIC 10-02 are taken into account.

2. The purpose of the plan is to provide guidance to the master and ship security

officer with respect to awareness, prevention and response with regard to security.

3. The plan contains all information and operational instructions required by the

Guidelines*.

4. This plan has been approved by the Administration and, except as provided below,

no alteration or revision shall be made to any part of it without the prior approval of

the Administration.

5. Changes to chapter 3 will not be required to be approved by the Administration. The

appendices shall be maintained up to date by the owners, operators and managers.

6. This plan will be regularly reviewed and updated.

Review, other than those referred to in 5 above will be submitted to the

Administration for approval. Review will be the responsibility of the Company and

will be carried out at intervals not exceeding 12 months.

7. Following an incident in which the plan has been activated, there will be a thorough

review of its effectiveness.

* "Guidance regarding the provisions of Chapter XI-2 of the Annex to the International

Convention for the Safety of Life at Sea, 1974 as amended and Part A of the ISPS Code”

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 5 of 33

2. DEFINITIONS

Security Assessment is a risk-based decision making tool. It is a systematic and

analytical process to consider the likelihood that a security breach will endanger an

asset, individual or function and, based on that, to identify actions to reduce the

vulnerability and mitigate the consequences of a security breach. The Ship Security Plan

is based on the results of the Security Assessment.

Ship security plan means a plan developed to ensure the application of measures on

board the ship designed to protect persons on board, cargo, cargo transport units, ship’s

stores or the ship from the risks of a security incident.

Security Survey means an inspection, check and/or audit to control and improve the

mitigation strategy, protective measures and actions in the Ship Security Plan.

Company security officer means the person designated by the Company for ensuring

that a ship security assessment is carried out; that a ship security plan is developed,

submitted for approval, and thereafter implemented and maintained and for liaison with

port facility security officers and the ship security officer.

Ship security officer means the person on board the ship, accountable to the master,

designated by the Company as responsible for the security of the ship, including

implementation and maintenance of the ship security plan and for liaison with the

company security officer and port facility security officers.

Port facility is a location, as determined by the Contracting Government or by the

Designated Authority, where the ship / port interface takes place. This includes areas

such as anchorages, waiting berths and approaches from seaward, as appropriate.

Ship/port interface means the interactions that occur when a ship is directly and

immediately affected by actions involving the movement of persons, goods or the

provisions of port services to or from the ship.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 6 of 33

Port facility security officer means the person designated as responsible for the

development, implementation, revision and maintenance of the port facility security plan

and for liaison with the ship security officers and company security officers.

Designated Authority means the organization(s) or the administration(s) identified,

within the Contracting Government, as responsible for ensuring the implementation of the

provisions of this chapter pertaining to port facility security and ship/port interface, from

the point of view of the port facility.

Declaration of security means an agreement reached between a ship and either a port

facility or another ship with which it interfaces specifying the security measures each will

implement.

Security Level I means the new maritime security normalcy. This is the level of threat

potential for which protective measures will be maintained for an indefinite period of time;

in other words, these are the normal, every day security measures.

Security Level 2 means there is a heightened threat of an unlawful act against a port,

waterfront facility, or ship and intelligence indicates that terrorists are likely to be active

within a specific area or against a specific class of target. This risk level indicates that a

particular segment of the industry may be in jeopardy, but that no specific target has

been identified. Additional protective measures will be expected to be sustained for

substantial periods of time.

Security Level 3 means the threat of an unlawful act against a port, waterfront facility, or

ship is probable or imminent. Intelligence may indicate that terrorists have chosen

specific targets, though it may not be possible to identify such targets. Additional

protective measures are not intended to be sustained for substantial periods of time.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 7 of 33

3. COMPANY AND SHIP DETAILS

INCLUDING CONTINUOUS SYNOPSIS RECORD

3.1 Company details

As required by the IMO, the name of the person or organization who appoints the

members of the crew or other persons employed or engaged on board the ship in any

capacity on the business of the ship is:

..........................................................……………………………………….

Ship’s Owner (Name and Address):

Company Security Officer:

Ship’s Manager / Operator: (Name and Address):

Company Responsible for Employment of Ship (including Sub-charterer if any) (Name and Address):

Company Responsible for Manning: (Name and Address):

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 8 of 33

3.2 Ship details Name of ship: International call sign: Official number: IMO number: Flag state: Continuous Synopsis Record to be inserted here.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 9 of 33

4. COMPANY SECURITY OFFICER (CSO)

4.1 Designation

The Company has designated a company security officer.

See for further details chapter 3.

4.2 Duties and Responsibilities

The duties and responsibilities of the company security officer include, but are not limited

to:

.1 advising the level of threats likely to be encountered by the ship, using appropriate

security assessments and other relevant information;

.2 ensuring that ship security assessments are carried out;

.3 ensuring the development, the submission for approval, and thereafter the

implementation and maintenance of the ship security plan;

.4 ensuring that the ship security plan is modified, as appropriate, to correct

deficiencies and satisfy the security requirements of the individual ship;

.5 arranging for internal audits and reviews of security activities;

.6 arranging for the initial and subsequent verifications of the ship by the

Administration or the recognised security organisation;

.7 ensuring that deficiencies and non-conformities identified during internal audits,

periodic reviews, security inspections and verifications of compliance are promptly

addressed and dealt with;

.8 enhancing security awareness and vigilance;

.9 ensuring adequate training for personnel responsible for the security of the ship;

.10 ensuring effective communication and co-operation between the ship security

officer and the relevant port facility security officers;

.11 ensuring consistency between security requirements and safety requirement;

.12 ensuring that, if sister-ship or fleet security plans are used, the plan for each ship

reflects the ship-specific information accurately; and

.13 ensuring that any alternative or equivalent arrangements approved for a particular

ship or group of ships are implemented and maintained.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 10 of 33

5. SHIP SECURITY OFFICER (SSO)

5.1 Designation

The ship security officer is designated by the company.

5.2 Duties and Responsibilities

The duties and responsibilities of the ship security officer include, but are not limited to:

.1 undertaking regular security inspections of the ship to ensure that appropriate

security measures are maintained;

.2 maintaining and supervising the implementation of the ship security plan, including

any amendments to the plan;

.3 co-ordinating the security aspects of the handling of cargo and ship’s stores with

other shipboard personnel and with the relevant port facility security officers;

.4 proposing modifications to the ship security plan;

.5 reporting to the Company Security Officer any deficiencies and non-conformities

identified during internal audits, periodic reviews, security inspections and

verifications of compliance and implementing any corrective actions;

.6 enhancing security awareness and vigilance on board;

.7 ensuring that adequate training has been provided to shipboard personnel, as

appropriate;

.8 reporting all security incidents;

.9 co-ordinating implementation of the ship security plan with the company security

officer and the relevant port facility security officer; and

.10 ensuring that security equipment is properly operated, tested, and maintained, if

any.

5.3 Liaison with Port Facility Security Officers and other Security Officers

The Ship Security Officer is responsible for liasing and communication with the Port

Facility Security Officer and Ship Security Officers of other ships in case of ship-to-ship

operations.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 11 of 33

6. PLAN DOCUMENTATION

6.1 Periodic Review Procedures

The Company Security Officer is responsible for ensuring a Ship Security Assessment

is carried out. The Ship Security Officer must review the Ship Security Plan [at least

twice within five years]. In addition, internal audits shall be arranged by the Company Security Officer to review the effectiveness of the Ship Security Plan.

The Ship Security Plan is reviewed to ensure its efficiency, continuing suitability and

effectiveness, with a view to consider the need for improvements.

The aim is to re-examine all the procedures in use to see whether any improvements can

be done and whether the procedures are still relevant. Procedures may need to be

amended due to instructions from owners or due to fitting of new equipment.

When the plan has been put to use as a response to a Security Level 2 or 3, or in a drill,

all parties directly involved shall comment on the effectiveness of the plan and its content

to the Ship Security Officer.

6.2 Records

According to the ISPS-code part A 9.8.1 reports and evaluations on security activities are confidential and cannot be inspected by third parties other than Flag state authorities. Records shall therefore only contain the kind of activity and time and date of occurrence.

Records of the following activities addressed in the ship security plan shall be kept on

board for at least the last 10 calls at port facilities:

.1 training, drills and exercises;

.2 security threats and security incidents (relevant to the ship);

.3 breaches of security;

.4 changes in security level;

.5 communications relating to the direct security of the ship such as specific threats to the ship or to port facilities the ship is, or has been;

.6 internal audits and reviews of security activities;

.7 periodic review of the ship security assessment;

.8 periodic review of the ship security plan;

.9 implementation of any amendments to the plan; and

.10 maintenance and testing of security equipment, if any, including testing of the ship security alert system.

Records may be kept in any format but shall be protected from unauthorized access or disclosure.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 12 of 33

7. SHIP SECURITY ASSESSMENT

The ship security assessment is an essential and integral part of the process of

developing and updating the ship security plan.

The company security officer shall ensure that the ship security assessment is carried out

by persons with appropriate skills to evaluate the security of a ship,

The ship security assessment shall include an on-scene security survey and, at least, the

following elements:

.1 identification of existing security measures, procedures and operations;

.2 identification and evaluation of key shipboard operations that it is important to

protect;

.3 identification of possible threats to the key ship board operations and the

likelihood of their occurrence, in order to establish and prioritise security

measures; and

.4 identification of weaknesses, including human factors in the infrastructure, policies

and procedures.

The ship security assessment shall be documented, reviewed, accepted and retained by

the Company.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 13 of 33

8. SECURITY ACTIONS

The Security Plan provides guidance to determine whether higher readiness conditions

are required.

Threats to Ships

Threats to a ship can rapidly change. A ship’s location, the time of day, and international

events can dramatically alter the threat to a ship. As a consequence, it is critical for the

SSO to regularly monitor events to determine potential threats in the path of the ship at it

travels to its next destination.

Information about potential threats is available from a variety of sources. These include

port authorities, Captains of the Port, port security officers, local law enforcement officers,

and local consular or diplomatic representatives. A variety of government, industry, and

international business organizations also provide information on potential threats. For

example, governments issue warnings for areas with high security risks. Internet sites are

also available that compile data on piracy and other threats.

Issues to consider when making an assessment are:

Location: A ship’s location can be important in determining a potential threat. For

instance, ships are most vulnerable to attack by pirates at sea when near

land, and when sailing through narrow channels where speed and

manoeuvrability may be restricted. Government / general warnings are

announced for specific countries or regions of high pirate activity.

Time of day: Ships are most vulnerable under cover of darkness when there is

inadequate light to detect or protect against an unauthorized boarding at sea,

while moored, or at anchor.

Type of Ship: Cargo ships are generally more vulnerable to theft and drug smuggling

than other types of ships. If terrorists are seeking to smuggle weapons into a

country, they may also choose a cargo ship. But if terrorists want to block a

channel, a bulk / ore ship may be targeted. If terrorists are seeking to use a

ship as a weapon, they may seek to gain control of a ship transporting

hazardous cargo.

Type of Cargo: the presence or absence of cargo, its nature and properties and

stowage may cause a threat.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 14 of 33

Port Facility Assessment

The Port Facility Assessment provides information to assess the strengths and

weaknesses of security systems and procedures at a port facility. If security measures

are found to be inadequate, steps can be taken by a SSO to compensate for the

deficiencies.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 15 of 33

9. ENSURING THE PERFORMANCE OF ALL SHIP SECURITY DUTIES

The Master is responsible for the safety and security of the crew, passengers, and cargo.

The development of general security policies and procedures is the responsibility of the

Company Security Officer. The Ship Security Officer is responsible for implementing,

maintaining, and supervising the Ship Security Plan.

9.1 Duties and responsibilities of security watch

The security watch must be aware of the security level the ship is operating in. A sharp

lookout shall be maintained. Suspicious persons, objects and activities and

malfunctioning of security equipment shall be reported to the duty officer.

9.2 Communication

To summon assistance, the security watch shall be provided with means of

communication to keep in touch with the duty officer.

9.3 Briefings

All officers and crewmembers are to be briefed about their duties and the security level

the ship is in at every change of security level, on possible threats, the procedures for

reporting suspicious persons, objects or activities and the need for vigilance.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 16 of 33

10. RESTRICTED AREAS

Restricted Areas on the Ship

The SSP shall identify the restricted areas to be established on the ship, specify their

extent, times of application, the security measures to be taken to control access to them

and those to be taken to control activities within them.

The purpose of restricted areas is to:

.1 prevent unauthorised access;

.2 protect passengers, ship's personnel, and personnel from port facilities or other

agencies authorised to be on board the ship;

.3 protect sensitive security areas within the ship; and

.4 protect cargo and ship's stores from tampering.

The SSP shall ensure that there are clearly established policies and practices to control

access to all restricted areas.

The SSP shall identify all restricted areas. According to ISPS-code part A, 9.8.1 this

information is confidential and therefore contained in Annex B.

Restricted areas include:

.i navigation bridge, machinery spaces of category A and other control stations;

.ii spaces containing security and surveillance equipment and systems and their

controls and lighting system controls;

.iii ventilation and air-conditioning systems and other similar spaces;

.iv spaces with access to potable water tanks, pumps, or manifolds;

.v spaces containing dangerous goods or hazardous substances;

.vi spaces containing cargo pumps and their controls;

.vii cargo spaces and spaces containing ship’s stores;

.viii crew accommodation; and

.ix any other areas as determined by the CSO, through the SSA to which access

must be restricted to maintain the security of the ship.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 17 of 33

Security Level 1

At security level 1, the SSP shall establish the security measures to be applied to

restricted areas, which may include:

− locking or securing access points;

− using surveillance equipment to monitor the areas;

− using guards or patrols; and

− using automatic intrusion detection devices to alert the ship’s personnel of

unauthorized access.

Security Level 2

At security level 2, the frequency and intensity of the monitoring of, and control of access

to restricted areas shall be increased to ensure that only authorized persons have

access. The SSP shall establish the additional security measures to be applied, which

may include:

− establishing restricted areas adjacent to access points;

− continuously monitoring surveillance equipment; and

− dedicating personnel to guard and patrol restricted areas.

Security Level 3

At security level 3, the ship shall comply with the instructions issued by those responding

to the security incident or threat thereof. The SSP shall detail the security measures,

which are to be taken by the ship, in close co-operation with those responding and the

port facility, which will include:

− setting up of additional restricted areas on the ship in proximity to the security

incident, or the believed location of the security threat, to which access is denied;

and

− searching of restricted areas as part of a search of the ship.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 18 of 33

11. CONTROLLING ACCESS TO THE SHIP

11.1 Security Level 1

At security level 1, the SSP shall establish the security measures to control access to the

ship, where the following may be applied:

.1 checking the identity of all persons seeking to board the ship and confirming their

reasons for doing so by checking, for example, joining instructions, passenger

tickets, boarding passes, work orders etc;

.2 in liaison with the port facility the ship shall ensure that designated secure areas

are established in which inspections and searching of people, baggage (including

carry on items), personal effects, vehicles and their contents can take place;

.3 in liaison with the port facility the ship shall ensure that vehicles destined to be

loaded on board car carriers, ro-ro and other passenger ships are subjected to

search prior to loading, in accordance with the frequency required in the SSP;

.4 segregating checked persons and their personal effects from unchecked persons

and their personal effects;

.5 segregating embarking from disembarking passengers;

.6 identification of access points that shall be secured or attended to prevent

unauthorized access;

.7 securing, by locking or other means, access to unattended spaces adjoining areas

to which passengers and visitors have access; and

.8 providing security briefings to all ship personnel on possible threats, the

procedures for reporting suspicious persons, objects or activities and the need for

vigilance.

At security level 1, all those seeking to board a ship shall be liable to search. The

frequency of such searches, including random searches, shall be specified in the

approved SSP and shall be specifically approved by the Administration. Such searches

may best be undertaken by the port facility in close co-operation with the ship and in

close proximity to it.

Unless there are clear security grounds for doing so, members of the ship’s personnel

shall not be required to search their colleagues or their personal effects. Any such search

shall be undertaken in a manner, which fully takes into account the human rights of the

individual and preserves their basic human dignity.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 19 of 33

11.2 Security Level 2

At security level 2, the SSP shall establish the security measures to be applied to protect

against a heightened risk of a security incident to ensure higher vigilance and tighter

control, which may include:

.1 assigning personnel to patrol deck areas during silent hours to deter unauthorised

access;

.2 limiting the number of access points to the ship, identifying those to be closed and

the means of adequately securing them;

.3 deterring waterside access to the ship, including, for example, in liaison with the

port facility, provision of boat patrols;

.4 establishing a restricted area on the shore-side of the ship, in close co-operation

with the port facility;

.5 increasing the frequency and detail of searches of people, personal effects, and

vehicles being embarked or loaded onto the ship;

.6 escorting visitors on the ship;

.7 providing additional specific security briefings to all ship personnel on any

identified threats, re-emphasising the procedures for reporting suspicious persons,

objects, or activities and stressing the need for increased vigilance; and

.8 carrying out a full or partial search of the ship.

11.3 Security Level 3

At security level 3, the ship shall comply with the instructions issued by those responding

to the security incident or threat thereof, i.e. the PFSO. The SSP shall detail the security

measures, which could be taken by the ship, in close co-operation with those responding

and the port facility, which may include:

.1 limiting access to a single, controlled, access point;

.2 granting access only to those responding to the security incident or threat thereof;

.3 directions of persons on board;

.4 suspension of embarkation or disembarkation;

.5 suspension of cargo handling operations, deliveries etc;

.6 evacuation of the ship;

.7 movement of the ship; and

.8 preparing for a full or partial search of the ship.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 20 of 33

12. MONITORING DECK AREAS AND AREAS SURROUNDING THE SHIP

Monitoring the Security of the Ship

The ship shall have the capability to monitor the ship, the restricted areas on board and

areas surrounding the ship. Such monitoring capabilities may include use of:

.1 lighting;

.2 watch-keepers, security guards and deck watches including patrols, and

.3 automatic intrusion detection devices and surveillance equipment.

When used, automatic intrusion detection devices shall activate an audible and/or visual

alarm at a location that is continuously attended or monitored.

The SSP shall establish the procedures and equipment needed at each security level

and the means of ensuring that monitoring equipment will be able to perform continually,

including consideration of the possible effects of weather conditions or of power

disruptions.

12.1 Security Level 1

At security level 1, the SSP shall establish the security measures to be applied, which

may be a combination of lighting, watch keepers, security guards or use of security and

surveillance equipment to allow ship’s security personnel to observe the ship in general,

and barriers and restricted areas in particular.

The ship's deck and access points to the ship shall be illuminated during hours of

darkness and periods of low visibility while conducting ship/port interface activities or at a

port facility or anchorage when necessary. While underway, when necessary, ships

should use the maximum lighting available consistent with safe navigation, having regard

to the provisions of the International Regulation for the Prevention of Collisions at Sea in

force.

The following shall be considered when establishing the appropriate level and location of

lighting:

.1 the ship’s personnel should be able to detect activities beyond the ship, on both

the shore side and the waterside;

.2 coverage should include the area on and around the ship;

.3 coverage should facilitate personnel identification at access points; and

.4 coverage may be provided through coordination with the port facility.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 21 of 33

12.2 Security Level 2

At security level 2, the SSP shall establish the additional security measures to be applied

to enhance the monitoring and surveillance capabilities, which may include:

.1 increasing the frequency and detail of security patrols;

.2 increasing the coverage and intensity of lighting or the use of security and

surveillance and equipment;

.3 assigning additional personnel as security lookouts; and

.4 ensuring coordination with waterside boat patrols, and foot or vehicle patrols on

the shore-side, when provided.

Additional lighting may be necessary to protect against a heightened risk of a security

incidents. When necessary, the additional lighting requirements may be accomplished by

co-ordinating with the port facility to provide additional shore side lighting.

12.3 Security Level 3

At security level 3, the ship shall comply with the instructions issued by those responding

to the security incident or threat thereof. The SSP shall detail the security measures,

which could be taken by the ship, in close co-operation with those responding and the

port facility, which may include:

.1 switching on of all lighting on, or illuminating the vicinity of, the ship;

.2 switching on of all on board surveillance equipment capable of recording activities

on, or in the vicinity of, the ship;

.3 maximising the length of time such surveillance equipment can continue to record;

.4 preparation for underwater inspection of the hull of the ship; and

.5 initiation of measures, including the slow revolution of the ship’s propellers, if

practicable, to deter underwater access to the hull of the ship.

Differing Security Levels

The SSP shall establish details of the procedures and security measures the ship could

adopt if the ship is at a higher security level than that applying to a port facility.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 22 of 33

13. CONTROLLING THE EMBARKATION OF PERSONS AND THEIR EFFECTS

13.0 Handling Unaccompanied Baggage

The SSP shall establish the security measures to be applied to ensure that

unaccompanied baggage (i.e. any baggage, including personal effects, which is not with

the passenger or member of ship’s personnel at the point of inspection or search) is

identified and subjected to appropriate screening, including searching, before it is

accepted on board the ship. It is not envisaged that such baggage will be subjected to

screening by both the ship and the port facility, and in cases where both are suitably

equipped, the responsibility for screening shall rest with the port facility. Close co-

operation with the port facility is essential and steps shall be taken to ensure that

unaccompanied baggage is handled securely after screening.

13.1 Security Level 1

At security level 1, the SSP shall establish the security measures to be applied when

handling unaccompanied baggage to ensure that unaccompanied baggage is screened

or searched up to and including 100 percent, which may include use of x-ray screening.

13.2 Security Level 2

At security level 2, the SSP shall establish the additional security measures to be applied

when handling unaccompanied baggage, which shall include 100 percent x-ray

screening of all unaccompanied baggage.

13.3 Security Level 3

At security level 3, the ship shall comply with the instructions issued by those responding

to the security incident or threat thereof. The SSP shall detail the security measures,

which could be taken by the ship, in close co-operation with those responding and the

port facility, which may include:

.1 subjecting such baggage to more extensive screening, for example x-raying it

from at least two different angles;

.2 preparation for restriction or suspension of handling of unaccompanied baggage;

and

.3 refusal to accept unaccompanied baggage on board the ship.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 23 of 33

14 SUPERVISING THE HANDLING OF CARGO

14.0 Handling of Cargo

The security measures relating to cargo handling shall:

.1 prevent tampering, and

.2 prevent cargo that is not meant for carriage from being accepted and stored on

board the ship.

The security measures, some of which may have to be applied in liaison with the port

facility, shall include inventory control procedures at access points to the ship. Once on

board the ship, cargo shall be capable of being identified as having been approved for

loading onto the ship. In addition, security measures shall be developed to ensure that

cargo, once on board, is not tampered with.

14.1 Security Level 1

At security level 1, the SSP shall establish the security measures to be applied during

cargo handling, which may include:

.1 routine checking of cargo, cargo transport units and cargo spaces prior to, and

during, cargo handling operations;

.2 checks to ensure that cargo being loaded matches the cargo documentation;

.3 ensuring, in liaison with the port facility, that vehicles to be loaded on board car-

carriers, ro-ro and passenger ships are subjected to search prior to loading, in

accordance with the frequency required in the SSP; and

.4 checking of seals or other methods used to prevent tampering.

Checking of cargo will be accomplished by the following means:

visual and physical examination; and

using scanning/detection equipment, mechanical devices, or dogs.

When there are regular, or repeated, cargo movement the CSO or SSO will, in

consultation with the port facility, agree arrangements with shippers or others responsible

for such cargo covering off-site checking, sealing, scheduling, supporting documentation,

etc. Such arrangements shall be communicated to and agreed with the PFSO

concerned.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 24 of 33

14.2 Security Level 2

At security level 2, the SSP shall establish the additional security measures to be applied

during cargo handling, which may include:

.1 detailed checking of cargo, cargo transport units and cargo spaces;

.2 intensified checks to ensure that only the intended cargo is loaded;

.3 intensified searching of vehicles to be loaded on car-carriers, ro-ro and

passenger ships; and

.4 increased frequency and detail in checking of seals or other methods used to

prevent tampering.

Detailed checking of cargo may be accomplished by the following means:

.5 increasing the frequency and detail of visual and physical examination;

.6 increasing the frequency of the use of scanning/detection equipment, mechanical

devices, or dogs; and

.7 co-ordinating enhanced security measures with the shipper or other responsible

party in accordance with an established agreement and procedures.

14.3 Security Level 3

At security level 3, the ship shall comply with the instructions issued by those responding

to the security incident or threat thereof. The SSP shall detail the security measures,

which could be taken by the ship, in close co-operation with those responding and the

port facility, which may include:

.1 suspension of the loading or unloading of cargo; and

.2 verify the inventory of dangerous goods and hazardous substances carried on

board, if any, and their location.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 25 of 33

15 SUPERVISING THE HANDLING OF SHIP’S STORES

The security measures relating to the delivery of ship’s stores shall:

.1 ensure checking of ship’s stores and package integrity;

.2 prevent ship’s stores from being accepted without inspection;

.3 prevent tampering; and

.4 prevent ship’s stores from being accepted unless ordered.

For ships regularly using the port facility it will be appropriate to establish procedures

involving the ship, its suppliers and the port facility covering notification and timing of

deliveries and their documentation. There shall always be some way of confirming that

stores presented for delivery are accompanied by evidence that they have been ordered

by the ship.

15.1 Security Level 1

At security level 1, the SSP shall establish the security measures to be applied during

delivery of ship’s stores, which may include:

.1 checking to ensure stores match the order prior to being loaded on board; and

.2 ensuring immediate secure stowage of ship’s stores.

15.2 Security Level 2

At security level 2, the SSP shall establish the additional security measures to be applied

during delivery of ship’s stores by exercising checks prior to receiving stores on board

and intensifying inspections.

15.3 Security Level 3

At security level 3, the ship shall comply with the instructions issued by those responding

to the security incident or threat thereof. The SSP shall detail the security measures,

which could be taken by the ship, in close co-operation with those responding and the

port facility, which may include:

.1 subjecting ship’s stores to more extensive checking;

.2 preparation for restriction or suspension of handling of ship’s stores; and

.3 refusal to accept ship’s stores on board the ship.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 26 of 33

16 PORT SPECIFIC SECURITY COMMUNICATION

Prior to entering a port, the Ship shall provide the following information to the Port Facility

Security Officer with the aim of avoiding the need to impose control measures or steps:

.1 Confirmation that the ship possesses a valid International Ship Security

Certificate and its issuing authority

.2 Confirmation of the security level at which the ship is currently operating;

.3 Confirmation of the security level at which the ship operated in any previous port

where it has conducted a relevant ship / port interface;

.4 Confirmation of any special or additional security measures that were taken by

the ship in any previous port where it has conducted a relevant ship / port

interface;

.5 Confirmation that the appropriate ship security procedures were maintained

during any previous relevant ship to ship activity; or

.6 Other practical security related information (but not details of the ship security

plan).

The Ship Security Officer (SSO) shall liase at the earliest opportunity with the Port

Facility Security Officer (PFSO) of the port facility the ship is intended to visit to establish

the security level applying for that ship at the port facility. Having established contact with

a ship, the PFSO shall advise the ship of any subsequent change in the port facility’s

security level and shall provide the ship with any relevant security information.

While there will be circumstances when an individual ship may be operating at a higher

security level than the port facility it is visiting, there will be no circumstances when a ship

can have a lower security level than the port facility it is visiting. If a ship has a higher

security level than the port facility it intends to use, the SSO shall advise the PFSO

without delay. The PFSO shall undertake an assessment of the particular situation in

consultation with the SSO and agree on appropriate security measures with the ship.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 27 of 33

17 SHIP/PORT FACILITY INTERFACE

17.1 Declaration of Security

Contracting Governments shall determine when a Declaration of Security is required by

assessing the risk the ship/port interface or ship-to-ship activity poses to people, property

or the environment.

A ship can request completion of a Declaration of Security (Annex C) when:

.1 the ship is operating at a higher security level than the port facility or another ship

it is interfacing with;

.2 there is an agreement on Declaration of Security between Contracting

Governments covering certain international voyages or specific ships on those

voyages;

.3 there has been a security threat or a security incident involving the ship or

involving the port facility, as applicable;

.4 the ship is at a port which is not required to have and implement an approved port

facility security plan; or

.5 the ship is conducting ship-to-ship activities with another ship not required to

have and implement an approved ship security plan.

Requests by the Ship for the completion of a Declaration of Security shall be

acknowledged by the applicable port facility or ship.

The Declaration of Security shall be completed by:

.6 the master or the ship security officer on behalf of the ship(s); and, if appropriate,

.7 the port facility security officer or, if the Contracting Government determines

otherwise, by any other body responsible for shore-side security, on behalf of the

port facility.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 28 of 33

18 TRAINING, DRILLS AND EXERCISES

18.1 TRAINING The Company Security Officer (CSO) and appropriate shore based Company personnel,

and the Ship Security Officer (SSO), should have knowledge of, and receive training, in

some or all of the following, as appropriate:

.1 security administration;

.2 relevant international conventions, codes and recommendations;

.3 relevant Government legislation and regulations;

.4 responsibilities and functions of other security organisations;

.5 methodology of ship security assessment;

.6 methods of ship security surveys and inspections;

.7 ship and port operations and conditions;

.8 ship and port facility security measures;

.9 emergency preparedness and response and contingency planning;

.10 instruction techniques for security training and education, including security

measures and procedures;

.11 handling sensitive security related information and security related

communications;

.12 knowledge of current security threats and patterns;

.13 recognition and detection of weapons, dangerous substances and devices;

.14 recognition, on a non-discriminatory basis, of characteristics and behavioural

patterns of persons who are likely to threaten security;

.15 techniques used to circumvent security measures;

.16 security equipment and systems and their operational limitations;

.17 methods of conducting audits, inspection, control and monitoring;

.18 methods of physical searches and non-intrusive inspections;

.19 security drills and exercises, including drills and exercises with port facilities;

.20 assessments of security drills and exercises.

18.2 In addition the Ship Security Officer should have adequate knowledge of, and

receive training, in some or all of the following, as appropriate:

.1 the layout of the ship;

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 29 of 33

.2 the ship security plan and related procedures (including scenario-based training

on how to respond);

.3 crowd management and control techniques;

.4 operations of security equipment and systems; and

.5 testing, calibration and whilst at sea maintenance of security equipment and

systems.

18.3 Shipboard personnel having specific security duties should have sufficient

knowledge and ability to perform their assigned duties, including, as appropriate:

.1 knowledge of current security threats and patterns;

.2 recognition and detection of weapons, dangerous substances and devices;

.3 recognition of characteristics and behavioural patterns of persons who are likely

to threaten security;

.4 techniques used to circumvent security measures;

.5 crowd management and control techniques;

.6 security related communications;

.7 knowledge of the emergency procedures and contingency plans;

.8 operations of security equipment and systems;

.9 testing, calibration and whilst at sea maintenance of security equipment and

systems,

.10 inspection, control, and monitoring techniques; and

.11 methods of physical searches of persons, personal effects, baggage, cargo, and

ship’s stores.

18.4 All other shipboard personnel should have sufficient knowledge of and be

familiar with relevant provisions of the SSP, including:

.1 the meaning and the consequential requirements of the different security levels;

.2 knowledge of the emergency procedures and contingency plans;

.3 recognition and detection of weapons, dangerous substances and devices;

.4 recognition, on a non discriminatory basis, of characteristics and behavioural

patterns of persons who are likely to threaten security; and

.5 techniques used to circumvent security measures.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 30 of 33

19 Drills and exercises

According to the ISPS-code part A 9.8.1 security drills and exercises are confidential and cannot be witnessed by third parties other than flag state authorities.

The objective of drills and exercises is to ensure that shipboard personnel are proficient

in all assigned security duties at all security levels and the identification of any security

related deficiencies, which need to be addressed.

To ensure the effective implementation of the provisions of the ship security plan, drills

shall be conducted at least once every three months. In addition, in cases where more

than 25 percent of the ship’s personnel have been changed, at any one time, with

personnel that have not previously participated in any drill on that ship, within the last 3

months, a drill shall be conducted within one week of the change. These drills shall test

individual elements of the plan.

Various types of exercises which may include participation of company security officers,

port facility security officers, relevant authorities of Contracting Governments as well as

ship security officers, if available, shall be carried out at least once each calendar year

with no more than 18 months between the exercises. These exercises shall test

communications, coordination, resource availability, and response. These exercises may

be:

.1 full scale or live;

.2 tabletop simulation or seminar; or

.3 combined with other exercises held such as search and rescue or emergency

response exercises.

Company participation in an exercise with another Contracting Government shall be

recognised by the Administration.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 31 of 33

20 CONTINGENCY PLANS AND STANDARD OPERATING PROCEDURES

20.1 Security Threats

If there is a security threat, the ship will be at Security Level 2 or 3 as advised by the Flag

State or by the Contracting Government of the Port Facility. The Security Measures to be

taken are as laid down in the Ship Security Plan.

If the ship is a Security Level 1 and the Master or SSO considers that a security threat

exists, he shall take appropriate actions to reduce the threat. He shall also inform the

company, the Flag State and the Contracting Government of the Port Facility about the

threat.

20.2 Breaches of Security

When security is breached, the Master / SSO shall consider doing the following:

.1 Activate the Ship Security Alert System

.2 Call Emergency Stations

.3 Inform the Contracting Government of the Port Facility

.4 Prepare to evacuate the ship

.5 Prepare to leave the port

.6 Act on Instructions given by the contracting governments.

.7 Use the appropriate Contingency Plans (see annex D)

See Annex D for further details.

SHIP SECURITY PLAN

Edition 05 (April 2003) Page 32 of 33

Security Continuous Record (example) Training, drills and exercises

date place Type of exercise Security level

Details, remarks

Maintenance and testing of security equipment

date place equipment Action taken Remarks

Periodic review of ship’s Security Assessment and Plan

date Place review nr. Remarks, indicate if plan has been amended

Internal audits and reviews of security activities

date place Auditor name Remarks

ANNEX 2

FACILITY SECURITY PLANNING GUIDE

Prepared by

U.S. COAST GUARD

i

U.S. COAST GUARD

FACILITY SECURITYPLANNING GUIDE

ii

iii

TABLE OF CONTENTS

I. FACILITY SECURITY..........................................................................1

II. FACILITY SECURITY PLAN OUTLINE........................................3

III. MARITIME SECURITY LEVELS AND SECURITY

MEASURES......................................................................................8

IV. FACILITY VULNERABILITY/RISK SELF- ASSESSMENT....11

V. APPENDIXES .......................................................................................22

A. FACILITY SECURITY SURVEY CHECKLIST .................22

B. COAST GUARD ROLES AND RESPONSIBILITIES........34

C. FACILITY SECURITY MEASURES.....................................37

D. SUGGESTED READING........................................................45

ebhome
Rectangle

iv

1

FACILITY SECURITY

Facility Security can be defined as those measures employed to protect against seizure, sabotage,piracy, pilferage, annoyance, or terrorism. It can also be considered as embracing all measurestaken to prevent interference within lawful operations. It also must include measures to prepareto respond to breeches of security. To this end, port security personnel must adequately plan forparticipation in multi-agency maritime response operations. Agencies that may be involved inFacility Security may include state and local law enforcement agencies, local fire departments,private facilities, federal agencies, etc. These personnel must receive sufficient training to supportthese operations. In addition, all personnel should be familiar with the National InteragencyIncident Management System (NIIMS) Incident Command System (ICS) for use during multi-contingency response operations and planned events.

COAST GUARD SECURITY MEASURES

The Coast Guard Captain of the Port (COTP), in conjunction with other agencies, conducts portsafety and security activities to safeguard waterfront facilities from accidents, negligence, illegalacts, terrorism and sabotage. “Waterfront facilities” include but are not limited to piers, wharves,docks, and similar structures to which vessels may be secured; areas of land, water, or land andwater under and in immediate proximity to them; buildings on such structures or contiguous tothem and equipment and materials on such structures or in such buildings.

The Captain of the Port is responsible for ensuring the safety and security of assets within ageographic region, and has the authority to use available resources and manpower to protect allassets from maritime incidents. The COTP has a range of tools available to help ensure thesecurity of the port. Additionally, the Coast Guard has identified three maritime security(MARSEC) levels that may be established in a port. These levels aid in determining the resourcesand manpower that will be needed to be proactive in various situations. The MARSEC level isdetermined by the COTP, and are as follows:

MARSEC 1 Normal Operations. Facilities should be aware and vigilant of suspiciousactivities and possible threats. Facilities should employ the necessarymeasures to reduce the vulnerability and risk of their waterfront facility froma marine incident. This is the baseline level of security.

MARSEC 2 This security level is an enhanced security posture and will be the result of anincreased risk either due to specific intelligence or increased vulnerabilitythat heightens risk. Facilities can expect the need for additional personneland material resources to reach this level. At this level, facilities will employthose additional measures identified in their security plan to reduce thevulnerability of and risk to their facility from an incident.

MARSEC 3 This security level is a fully enhanced security posture and will be the resultof higher risk that a specific threat exists to the maritime domain or marinetransportation system. At this level, facilities will employ the full measuresidentified in their security plan.

2

Within each MARSEC level, the COTP has the authority to establish security and safety zones,reduce personnel access to facilities, and control operations at a facility. These actions shouldsupport measures identified in the Maritime Security Levels and Security Measures section of thisguide. The following are tactics that the COTP employs to insure the overall waterside safety andsecurity of the port.

a. Safety Zones-Safety Zones protect structures, vessels, and water and shore areas bycontrolling access and activities within the zone. Most safety zones limit access duringresponse to an emergency and can be set for an indefinite time period. Any person mayrequest a security, safety, or regulated navigation area be established. Each requestmust be submitted in writing to either the COTP or appropriate Commander havingjurisdiction over the location. The data that is required on the written request is specifiedin detail in 33 CFR 165.5.

b. OCS Safety Zones-The Outer Continental Shelf Safety Zone is limited to an area within500 meters of artificial islands and fixed structures on the shelf. These features are usedfor the removal of minerals from the ocean bottom (i.e. offshore oil drilling platforms).

c. Deepwater Port Safety Zones-Deepwater Port Safety Zones are specific to deepwaterports but provide the same protection as safety zones. A deep-water port consists of anyfixed or man-made structure, other than a vessel, located beyond the territorial sea andoff the coast of the United States. These ports are normally used for the loading andoffloading of oil.

d. Security Zones-Security Zones are designated areas of land, water, or land and water,which are established to prevent damage to any vessel or waterfront facility. These zonessafeguard ports, harbors, territories, or waters of the United States from accidents orsubversive acts by controlling access or movement of persons, vessels, and objects. Theseare used for national security interests rather than strictly safety considerations.Security Zones are established for each condition.

e. Harbor Patrols-Harbor Patrols are used to detect suspicious activity and to determine ifthe level of security measures taken by vessel and facility owners and operators areadequate and sufficient to meet the existing threat level.

CONCLUSION

The following sections include a facility plan outline, maritime security levels and securitymeasures, and a facility vulnerability/risk self-assessment. These additional sections are providedas tools for facilities to use in order to minimize the threat of a maritime incident occurring attheir facility.

3

FACILITY SECURITY PLAN OUTLINE

This section provides an outline of a complete facility security plan. In developing this plan, afacility should be sure to fully address physical security identified and the measures to be taken ateach MARSEC Level. If a particular section does not apply to a facility, it should be so stated inthe plan and the appropriate reason why that section does not apply.

OUTLINE:

1. Purpose and Scope. State purpose and scope of plan.

2. Area Security. Define the areas, buildings, and other structures considered critical andestablish priorities for their protection.

3. Control Measures. Define and establish restrictions on access and movement into criticalareas. These restrictions can be categorized as to personnel, material and vehicles.

a. Personnel Access

(1) Establish controls pertinent to each area or structure.

(a) Authority for access.

(b) Access criteria for:

1. Unit personnel.

2. Visitors.

(2) Identification and Control.

(a) Describe the system to be used in each area. If a badge system is used,include display requirements, identification and control procedures,standards for passes and badges, etc.

(b) Describe who the system applies to.

1. Unit personnel.

2. Visitors to restricted areas.

3. Visitors to non-restricted areas.

4. Vendors, tradesmen, etc.

5. Contractor personnel.

6. Maintenance or support personnel.

4

7. Emergency response personnel.

b. Material Control.

(1) Incoming.

(a) Requirements for admission of material and supplies.

(b) Search and inspection of material for possible sabotage hazards.

(c) Special controls on delivery of supplies and/or personal shipments inrestricted areas.

(2) Outgoing.

(a) Documentation required, e.g., property pass.

(b) Controls, as outlined in (1) (a), (b) and (c), above.

c. Vehicle Control.

(1) Policy on search of government and privately owned vehicles.

(2) Parking regulations/restrictions.

(3) Controls for entrance into restricted and non-restricted areas.

(a) Privately owned vehicles.

(b) Government vehicles.

(c) Emergency vehicles.

(d) Commercial vehicles.

d. Vehicle Registration.

4. Aids to Security. Indicate the manner in which the following listed aids to security will beimplemented on the unit.

a. Protective barriers.

(1) Definition.

(2) Clear zones.

(2) Criteria.

b. Signs.

5

(1) Maintenance.

(2) Types.

(3) Posting.

c. Gates.

(1) Hours of Operation.

(2) Security requirements.

(3) Lock security.

d. Protective Lighting System.

(1) Use and control.

(2) Inspection.

(3) Action to be taken in the event of commercial power failure.

(4) Action to be taken in the event of a failure of alternate source of power.

(5) Emergency lighting systems.

(a) Stationary.

(b) Portable.

e. Intrusion Detection Systems.

(1) Testing.

(2) Inspection.

(3) Use and monitoring.

(4) Action to be taken in event of "alarm" conditions.

(5) Maintenance.

(6) Alarm logs or registers.

(7) Sensitivity settings.

(8) Fail-safe and tamper-proof provisions.

(9) Monitor panel location.

(10) Areas protected.

6

f. Communications. (primary and alternate sources).

(1) Locations.

(2) Use.

(3) Tests.

(4) Authentication

(5) Emergency communications.

5. Security Forces. Include general instructions that would apply to all security force personnel.Detailed instructions such as Special Orders and Standard Operating Procedures (SOP)should be attached as annexes. An SOP should be written for each post.

a. Composition and organization.

b. Authority and jurisdiction.

c. Tour of duty.

d. Essential posts and routes.

e. Weapons and equipment.

f. Training.

g. Use of sentry/patrol dogs.

h. Emergency Response Force.

(1) Composition.

(2) Mission.

(3) Weapons and equipment.

(4) Location.

(5) Deployment concept.

6. Contingency Plans. Indicate required actions in response to various emergency situations.Detailed plans such as Facility specific Threatcon Measures, bomb threats, hostagenegotiation, natural disaster, fire, hurricanes, earthquakes, mass casualties etc., should beattached as annexes.

a. Individual actions.

b. Emergency Response Force actions including casualty evacuation.

7

c. Security Force actions.

7. Use of Air Surveillance.

8. Coordinating Instructions. Indicate matters which require coordination with other agenciesincluding any MOU/MOA's in place.

a. Integration with plans of host or nearby military installations.

b. Liaison and coordination.

(1) Local and state authorities.

(2) Federal agencies.

(3) Military organizations.

9. Employee Education. Provide employee training in: general security, crime prevention, portsecurity and antiterrorism.

8

MARITIME SECURITY LEVELS AND SECURITY MEASURES

Note: Once Facility has attained the required MARSEC level Facility Managers should informCOTP.

MARSEC 1

Normal Operations. Facilities should be aware and vigilant of suspicious activities and possiblethreats. Facilities should employ the necessary measures to reduce the vulnerability and risk oftheir waterfront facility from a marine incident. This is the baseline level of security. “Facilitymanagers should implement the following measures when MARSEC ONE is designated at alltimes:”

a. MEASURE 1. At regular intervals, remind all personnel to be suspicious andinquisitive about strangers, particularly those carrying suitcases or other containers.Watch for unidentified vehicles on or in the vicinity of installations. Watch forabandoned parcels or suitcases and any unusual activity.

b. MEASURE 2. Secure buildings, rooms, and storage areas not in regular use.

c. MEASURE 3. Conduct security spot checks of vehicles and persons entering theFacility grounds.

d. MEASURE 4. Limit access points for vehicles and personnel commensurate with areasonable flow of traffic.

e. MEASURE 5. Maintain contact with local authorities on the threat and localantiterrorism activities.

MARSEC 2

This security level is an enhanced security posture and will be the result of an increased riskeither due to specific intelligence or increased vulnerability that heightens risk. Facilities canexpect the need for additional personnel and material resources to reach this level. At this level,facilities will employ those additional measures identified in their security plan to reduce thevulnerability of and risk to their facility from an incident. Facility managers should implementthe following measures when MARSEC TWO is designated:

a. MEASURE 6. Continue MARSEC 1 measures and warn personnel of any otherpotential form of terrorist attack.

b. MEASURE 7. The Facility Manager, Shift Leader or other appointed personnel withaccess to building plans as well as the plans for area evacuations must be available atall times. Key personnel should be able to seal off an area immediately.

c. MEASURE 8. Make personnel aware of the general situation in order to stop rumorsand prevent unnecessary alarm.

9

d. MEASURE 9. Keep all personnel involved in implementing anti-terrorist contingencyplans and other applicable contingency plans on immediate recall.

e. MEASURE 10. Review all plans, orders, personnel details and logistic requirementsrelated to the implementation of the measures contained in the next higher MARSEC.

f. MEASURE 11. Where possible, cars and such objects as crates, trash containers, etc.are to be moved at least 100 feet from buildings, particularly those buildings of asensitive or prestigious nature. Consider the application of centralized parking.

g. MEASURE 12. Secure and regularly inspect all buildings, rooms, and storage areas notin regular use.

h. MEASURE 13. At the beginning and end of each workday, as well as at other regularand frequent intervals, inspect the interior and exterior of buildings in regular use forsuspicious packages.

i. MEASURE 14. Examine all mail for letter or parcel bombs. This examination isincreased above normal.

j. MEASURE 15. At an early stage, inform security personnel of any action being takenand why.

k. MEASURE 16. Operate random patrols to check vehicles, personnel, and buildings.Increase security surveillance of waterfront areas including wharves, piers, caissons,critical communications facilities/assets, etc.

l. MEASURE 17. Remind drivers to lock parked vehicles and to institute a positivesystem of checking before they enter and drive a vehicle.

MARSEC 3

This security level is a fully enhanced security posture and will be the result of higher risk that aspecific threat exists to the maritime domain or marine transportation system. At this level,facilities will employ the full measures identified in their security plan. Facility managers shouldimplement the following measures when MARSEC THREE is designated:

a. MEASURE 20. Continue all MARSEC ONE and MARSEC TWO measures andintroduce those that remain outstanding. Review all plans, orders, personnel detailsand logistic requirements related to the introduction of the next higher MARSEC.

b. MEASURE 21. Keep all personnel responsible for implementing antiterrorist plans attheir places of duty.

c. MEASURE 22. Limit access points to the absolute minimum.

d. MEASURE 23. Strictly enforce control of entry and randomly search vehicles.

e. MEASURE 24. Enforce centralized parking of vehicles away from sensitive buildings.

f. MEASURE 25. Introduce increased patrolling of the facility grounds.

10

g. MEASURE 26. Erect barriers and obstacles to control traffic flow.

11

FACILITY VULNERABILITY/RISK SELF-ASSESSMENT This form is a tool to assist field personnel in developing information about individual facilitieswithin their jurisdiction. It must be completed annually for any facilities (dedicated or non-dedicated) within the COTP zone. Data will be compiled and maintained by facilities, as requiredby 33 CFR 126. To determine facility vulnerability, 10 major factors are considered: -- Facility Characteristics -- Type of Security Force -- Physical Security Measures -- Routes of Access/Egress -- Communications -- Availability of Additional Port Security Resources -- Response Time/Distance for Security Personnel -- Proximity to Urban Areas -- Geographic Location -- Proximity to International Borders A computation sheet is provided at the end of this section to record the answers to the followingsurvey areas. 1. Facility Characteristics and Sensitivity. Select the description which best represents your

facility.

a. Current Threat Analysis.

(1) Threat analysis available.

(2) Threat analysis unavailable. b. Facility Accessibility. Access controls would include but are not limited to the following:

Perimeter security fences and/or barriers; permit/ID systems for access by authorizedpersons and vehicles; security forces and/or equipment to secure gates or openings insecurity barriers when not in use; designated restricted areas; roving guards/patrolswithin controlled access areas.

(1) Facility has uncontrolled access.

12

(2) Facility has limited access controls, i.e., at least two of the above listed access controls.

(3) Facility has controlled access i.e., four or more access controls, examples of which arelisted above.

c. Facility Volume (measured in Vessels) per year moved.

(1) High (over 300).

(2) Medium (100-300).

(3) Low (under 100). d. DOD Assets in close proximity to the facility location.

(1) Yes.

(2) No. 2. Facility Security Force Characteristics. a. Select the description which best represents the security force of the facility being

assessed.

(1) No security guard force.

(2) A facility security manager, but no security guard force.

(3) A facility security manager, a security guard force in place but with little or nosecurity training.

(4) A facility security manager with trained* facility security personnel, but not fullyequipped.

(5) A facility security manager with fully trained and equipped security personnel.

(6) A facility security manager with trained and fully equip security personnel andsecurity exercises being conducted on a regular basis.

*Trained facility security personnel may include sworn law enforcement officers (e.g., state partauthority police). Safe assumption can be made that sworn law enforcement officers havenecessary security training. For other port security personnel, training should include, but neednot be limited to: Communications, control of access, patrol procedures, response to emergencies,reporting, characteristics and behavior of persons who may commit unlawful acts, review of SOP'sfor the terminal. Records of the date and type of training for security should be maintained at thefacility. 3. Physical Security Characteristics.

13

a. Landside. Select the description which best represents the landside physical security

measures in place at the facility being assessed. This should include items such asbarriers, fencing, lighting, access/entry control, ID systems, electronic surveillance orother intrusion detection systems, alarm systems, etc.

(1) None of the above listed physical security measures in place.

(2) Perimeter fencing, landside lighting only in place.

(3) Fencing, lighting and live surveillance/patrol systems in place.

(4) Fencing, lighting and electronic surveillance systems in place.

(5) Fencing, lighting, electronic and live surveillance systems in place.

b. Waterside. Select the description which best represents the waterside security measures

in place at the facility assessed. This should include items such as patrol craft, live orelectronic surveillance systems (e.g.,surface radar, anti-swimmer sonar, barriers/nets anddetectors or sensors for submerged delivery vehicles).

(1) No waterside security measures in place.

(2) Waterside lighting only.

(3) Live surveillance only.

(4) Single electronic surveillance system.

(5) Multiple electronic surveillance systems.

(6) Electronic surveillance systems and live surveillance/patrols.

(7) Electronic and live surveillance systems with waterside lighting.

4. Physical characteristics of the facility a. Terrain. Analyze the terrain within approximately a one mile radius of the facility and

select the description which best represents it.

(1) Built up, commercial.

(2) Mountainous, forested, undeveloped.

(3) Open clear area or undeveloped farm land.

14

b. Routes of Access and Egress. Select the description which best represents the roadwaysadjacent to the facility being assessed.

(1) Expressways.

(2) Major highways.

(3) City streets.

(4) Less frequently traveled roads. c. Rail Accessibility. Select the description which best represents the railway system on the

facility being assessed.

(1) Rail gates open at all times.

(2) Rail gates open only when in use.

(3) Unused rail access.

(4) No rail access on facility.

d. Water Channels. Select the description which best represents the water channel used for

access to the facility being assessed.

(1) More than 3 choke points*.

(2) 1 - 3 choke points.

(3) No choke points. *Choke Point - That specific portion of a waterway within the port which due to hydrographic,geological or other limited characteristics is easily capable of blockage or obstruction.Thedetermination of what constitutes "choke point" must be a subjective one. However, dueconsideration should be given to the width and depth of the navigable channel, vessel trafficdensity, alternative vessel traffic routing schemes and any object (e.g., bridge, high voltage towers)damage to which would impede vessel traffic. 5. Communications on or readily available to the facility. Select the best description of the

communications available at the facility being assessed. a. No communications on or readily available to the facility.

b. Communications Interoperability between facility and only local law enforcement

agencies.

(1) Non-secure.

(2) Secure.

15

c. Communications Interoperability between facility and federal, state and local law

enforcement agencies.

(1) Non-secure.

(2) Secure. 6. Sustainability of additional security resources. Select the number of days local security/law

enforcement resources could be sustained without calling in outside forces to assist under thethreat levels indicated.

a. High threat. Intelligence indicating an imminent attack of some type within the facility

area.

(1) 1 day.

(2) 3 days.

(3) 7 days.

(4) Indefinite. b. Medium threat. Intelligence indicating an attack of some type is likely to occur within

the facility area.

(1) 1 day.

(2) 3 days.

(3) 7 days.

(4) Indefinite. c. Low threat. Intelligence indicating the possibility of terrorist/subversive activity.

(1) 1 day.

(2) 3 days.

(3) 7 days.

(4) Indefinite. 7. Response time for specialized security personnel. Estimate the length of time it would take

specialized security personnel (as identified below) to arrive at the facility being assessed inresponse to an attack, if the attack took place without prior warning/intelligence.

16

a. Police patrol.

(1) 30 minutes or less.

(2) 30-60 minutes.

(3) 60 minutes or more.

b. Bomb squad.

(1) 30 minutes or less.

(2) 30-60 minutes.

(3) 60 minutes or more. c. SWAT.

(1) 30 minutes or less.

(2) 30-60 minutes.

(3) 60 minutes or more. 8. Response time for specialized emergency personnel. Estimate the length of time it would take

emergency personnel (as identified below) to arrive at the facility being assessed in response toaccidents/fire.

a. Fire department.

(1) 15 minutes or less.

(2) 15-45 minutes.

(3) 45 minutes or more. b. Pollution response team.

(1) 15 minutes or less.

(2) 15-45 minutes.

(3) 45 minutes or more.

9. Proximity to urban areas. a. Select the description which best represents the area surrounding the facility being

assessed.

(1) Heavily populated urban area of over 100,000 people.

17

(2) Area populated by 50,000 to 100,000 people.

(3) Area of less than 50,000 people, where nearest city of greater than 100,000 people isless than 20 miles away.

(4) Area of less than 50,000 people, where nearest city of greater than 100,000 people is20 to 50 miles away.

(5) Area of less than 50,000 people, where nearest city of greater than 100,000 people is50 to 100 miles away.

(6) Area of less than 50,000 people, where nearest city of greater than 100,000 people ismore than 100 miles away.

(7) Area is isolated and surrounded by rural undeveloped countryside.

10. Geographic location. a. Select description which best represents the geographic location of the facility being

assessed.

(1) OCONUS (under USCG jurisdiction).

(2) East/West coast.

(3) Gulf coast.

(4) Alaska, Hawaii, Northwest, Central or New England. 11. Proximity to international borders. Select the description which best represents the facility

being assessed under the current threat level as determined in question 1.A. a. High threat.

(1) 0-100 miles.

(2) 101-500 miles.

(3) +500 miles.

(4) Islands. b. Medium threat.

(1) 0-100 miles.

(2) 101-500 miles.

(3) +500 miles.

18

(4) Islands. c. Low threat.

(1) 0-100 miles.

(2) 101-500 miles.

(3) +500 miles.

(4) Islands.

19

FACILITY RISK/VULNERABILITY SELF-ASSESSMENT

COMPUTATION SHEET Numbers in parenthesis denote point values 1. Facility characteristics and sensitivity a. Current threat analysis 1._______ (3) 2._______ (0) b. Facility accessibility 1._______ (2) 2._______ (1) 3._______ (0) c. Facility 1._______ (2) 2._______ (1) 3._______ (0) d. DOD assets 1._______ (1) 2._______ (0) 1. TOTAL________ 2. Facility security force characteristics a. Description of force 1._______ (12) 2._______ (9) 3._______ (6) 4._______ (3) 5._______ (1) 6._______ (0)

2. TOTAL________ 3. Physical security characteristics a. Landside 1._______ (4) 2._______ (3) 3._______ (2) 4._______(1) 5._______ (0)

b. Waterside 1._______ (6) 2._______ (5) 3._______ (4) 4._______ (3) 5._______ (2) 6._______ (1) 7._______

(0) 3. TOTAL________ 4. Physical characteristics of facility a. Terrain 1._______ (2) 2._______ (1) 3._______ (0) b. Routes of access and egress 1._______ (3) 2._______ (2) 3._______ (1) 4._______ (0) c. Rail accessibility 1._______ (3) 2._______ (2) 3._______ (1) 4._______ (0)

20

d. Water channels 1._______ (3) 2._______ (2) 3._______ (1) 4. TOTAL _________ 5. Communications a. None 1._______ (4) b. Local 1._______ (3) 2.________ (2) c. State, federal and local 1._______ (1) 2.________ (0)

5. TOTAL _________ 6. Sustainability a. High threat 1._______ (8) 2.________ (6) 3._______ (4) 4._______ (2) b. Medium threat 1._______ (7) 2.________ (5) 3._______ (3) 4._______ (1) c. Low threat 1._______ (6) 2.________ (4) 3._______ (2) 4._______ (0) 6. TOTAL _________

7. Response time - security personnel a. Police patrol 1._______ (2) 2.________ (3) 3._______ (4) b. Bomb squad 1._______ (1) 2.________ (2) 3._______ (3) c. SWAT 1._______ (0) 2.________ (1) 3._______ (2) 7. TOTAL _________ 8. Response time - emergency personnel a. Fire department 1.________ (1) 2.________ (2) 3.________ (3)

21

b. Pollution response team 1.________ (0) 2.________( 1) 3.________ (2) 8. TOTAL_________ 9. Proximity to urban areas a. Description

1.________ (7) 2.________ (6) 3.________ (5) 4.________ (4) 5.________ (3) 6.________ (2) 7.________ (1)

9. TOTAL_________ 10. Geographic location a. Description 1.________ (8) 2.________ (6) 3.________ (4) 4.________ (2) 10. TOTAL_________ 11. Proximity to international borders. a. High threat b. Medium threat c. Low threat 1._________(3) 1.__________(1) 1._________(1) 2._________(2) 2.__________(1) 2._________(0) 3._________(1) 3.__________(0) 3._________(0) 4._________(0) 4.__________(0) 4._________(0) 11. TOTAL_________

TOTALS 1.__________ 7.__________

2.__________ 8.__________ 3.__________ 9.__________ 4.__________ 10.__________ 5.__________ 11.__________ 6.__________ TOTAL POINT VALUE OF ALL ANSWERS_______________

RANGE OF VULNERABILITY VERY LOW LOW MEDIUM HIGH VERY HIGH 0-10 PTS 11-25 PTS 26-50 PTS 51-70 PTS 71-85 PTS

22

APPENDIX A: FACILITY SECURITY SURVEY CHECKLIST FACILITY SECURITY SURVEY CHECKLIST. On routine basis COTP will use this checklist toaccess an existing facility’s security measures and to aid in identifying vulnerabilities and areasneeding improvement.

GENERAL INFORMATION Unit/Activity being surveyed: _____________________________________________________ ________________________________________________________________________________Country: ________________________________________________________________________

1. Is a Security Officer designated in writing? YES NO

2. Security Officer: NAME:_______________________________________________________ OFFICE ADDRESS:___________________________________________ PHONE: _____________________________________________________ 3. Is the Security Officer included in all initial construction review processes?

YES NO NOTES: _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ SECURITY PLANNING 1. Does the Port facility have a current Port Security Plan (PSP)? YES NO 2. Date of plan: _________________________________________________________________ 3. Does the PSP include: a. Preventive measures to reduce opportunities for introduction of bombs? YES NO b. Procedures for evaluating and handling bomb threats? YES NO c. Policy for evacuation and safety of personnel? YES NO d. Procedures to be used to search for bombs? YES NO e. Procedures in the event a bomb or suspected bomb is found on the Port? YES NO f. Procedures for obtaining assistance and support of law enforcement and explosive ordnance

disposal units? YES NO

23

g. Procedures to be taken in the event of a bomb explosion or detonation? YES NO 4. Does the Port have a Counter Sabotage Program? YES NO 5. Does the Security Officer ensure that Physical Security Surveys are conducted at least

annually? YES NO

6. How often does the Port request a threat assessment? ______________________________________________________________________________ NOTES: ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ SECURITY MEASURES 1. Does the Port have a Loss Prevention Plan? YES NO 2. What is the date of the Port facilities most recent risk and threat

analysis?______________________________________________________________________ 3. Have areas been designated in writing by the Port Operator as restricted areas as necessary?

YES NO 4. Are the basic security measures for restricted areas in effect? YES NO

5. Are all restricted area points appropriately posted? YES NO 6. Are security measures in effect to protect: a. Electrical power supplies and transmission facilities? YES NO b. Communication centers/equipment? YES NO c. Arms, Ammunition and Dangerous Cargoes? YES NO 7. Are Physical Security Surveys of the Port conducted at least annually under the auspices of the

Security Officer? YES NO 8. What is the date of the most recent physical security inspection, audit, or review by an

immediate supervisor in Port?_________________________________________________________________________

9. Does the Port have an effective after hours or weekend restricted area security check by thesecurity force? YES NO

a. Are results of security checks promptly reported to the Port Security Officer? YES NO

24

10. Does the Port have a POV parking plan including: a. Restriction of POV parking in exclusive and limited areas? YES NO b. Fenced/enclave parking in controlled areas? YES NO

11. Does the Port have a Traffic Control Program? YES NO NOTES: ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________

SECURITY FORCE 1. Is the present security force strength and composition commensurate with the degree of

security protection required? YES NO 2. Are all security posts, fixed and mobile, provided with security force orders?

YES NO 3. Are security force orders reviewed by the Security Officer for currency at least monthly? YES

NO 4. Are security force personnel inspected by a supervisor prior to being posted?

YES NO 5. Do supervisors inspect each post/patrol/activity at least twice per shift? YES NO 6. Does Port or local community maintain an organized and equipped Crisis Response Force?

YES NO 7. Does the Crisis Response Force receive adequate training? YES NO

8. How many personnel are available within the Port? ______________________________ 9. Outside the Port, how many additional security forces could be brought in with:

a. One hour notice.________________ b. Four hour notice._______________ c. Any pertinent comments. ___________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________

25

10. Has liaison been established with Local, State, and Federal Law Enforcement Agencieswhereby early warning of threat situation will be provided? YES NO

11. Do security force personnel record or report their presence at key points in the Port by means

of: a. Portable watch clocks, YES NO b. General watch clock stations, YES NO c. Telephones, YES NO d. Two-way radio communications equipment, or YES NO e. Other_____________________________________________________ 12. Are guard assignments, times and patrol routes varied at frequent intervals to avoid

establishing routines? YES NO NOTES: _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ PERSONNEL AND VEHICLE MOVEMENT CONTROL 1. Is a pass or badge identification system used to identify all Personnel within the confines of

restricted areas in effect? YES NO

2. Does the identification medium in use provide the desired degree of security? YES NO

3. Are personnel who require infrequent access to a restricted area or have not been issued apermanent pass or badge for such, treated as "visitors", and issued a visitors badge or pass?

YES NO

4. Do guards at control points compare badges to bearers, both upon entry and exit? YES NO

a. If no, upon entry only? YES NO b. Upon exit only? YES NO 5. Is supervision of the personnel identification and control system adequate at all levels? YES

NO 6. Are badges and serial numbers recorded and controlled by rigid accountability procedures?

YES NO 7. Are lost badges replaced with badges bearing different serial numbers? YES NO

26

8. Have procedures been established that provide for issuance of temporary badges forindividuals who have forgotten their permanent badges? YES NO

9. Are badges of such design and appearance as to enable guards, and other personnel torecognize quickly and positively the authorizations and limitations applicable to the bearer?

YES NO 10. Are procedures in existence to ensure the return of identification upon termination of

employment or assignment ? YES NO

11. Have effective visitor escort procedures been established when necessary? YES NO 12. Are visitors properly escorted within restricted areas when necessary? YES NO 13. Are permanent records of visits maintained? YES NO By whom?____________________________________________________________________ 14. Are Privately Owned Vehicles (POV) and contractor vehicles which are allowed routine access

to the installation registered with the security office? YES NO 15. Are random administrative inspections made of automobiles? YES NO 16. Are administrative inspection procedures issued by the Port Authority and are they concise

and specific? YES NO

NOTES: _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ BARRIERS AND OPENINGS 1. Does the fenced portion of the Port area barrier meet the minimum specifications for security

fencing? YES NO a. Is it of chain link (cyclone) composition? YES NO b. Is it constructed of 9-gauge or heavier wire? YES NO c. Is the mesh opening no larger than two inches? YES NO d. Is selvage twisted and barbed at top and bottom? YES NO e. Is the bottom of the fence within two inches of solid ground? YES NO (1) In areas where the fence exceeds two inches from solid ground, have compensatory

measures been taken? YES NO f. Is the top guard strung with barbed wire (or barbed tape/razor edge) and angled outward

away from protected site and upward at 45 degree angle? YES NO

27

g. Is the fence at least eight feet in height (including outrigger) in all required areas?

YES NO 2. Does the Port facility provide for security force inspection of the security barrier, including

clear zones, at least once per month? YES NO a. Are deficiencies noted and are remedial actions promptly effected? YES NO 3. If masonry wall is used, does it meet minimum specifications for security fencing? YES NO

4. If building walls, floors and roofs form a part of the barrier, do they provide security equivalentto that provided by the security barrier? YES NO

5. Are all openings properly secured? YES NO 6. If a building forms a part of the barrier, does it present a potential penetration hazard at the

point of juncture with the perimeter security fence? YES NO 7. If a body of water forms any part of the barrier, are additional security measures provided?

YES NO

8. Are openings such as culverts, tunnels, manholes for sewers and utility access, and sidewalkelevators which permit access to the port and restricted area properly secured? YES NO

9. Are all portals in perimeter barriers guarded or secured? YES NO 10. Do the gates and/or other entrances in perimeter barriers exceed the number required for safe

and efficient operations? YES NO 11. Are all perimeter barrier portals equipped with secure locking devices? YES NO a. Are they locked when not in use? YES NO 12. Do all gates provide protection equivalent to that provided by the barrier of which they are

part? YES NO 13. Are prescribed clear zones maintained on both sides of the restricted area barriers? YES NO

14. If clear zone requirements cannot be met, have compensatory security measures beenimplemented? YES NO

15. Are any perimeters protected by Intrusion Detection Systems (IDS)? YES NO NOTES: ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________

28

________________________________________________________________________ PROTECTIVE LIGHTING 1. Is the perimeter of the installation and restricted area fencing provided adequate lighting?

YES NO 2. Does the protective lighting meet adequate intensity requirements: YES NO 3. Are the zones of illumination from lamps directed downward and away from guard personnel?

YES NO 4. Is perimeter protective lighting utilized so that security force patrol personnel remain in

comparative darkness? YES NO 5. Are lights checked for proper operation prior to darkness at least weekly? YES NO 6. Are repairs to lights and replacement of inoperative lamps effected immediately or in a

reasonable time? YES NO 7. Is additional lighting provided at active portals and points of possible intrusion? YES NO 8. Are gate guard houses provided with proper illumination? YES NO 9. Does the Port facility have a dependable source of power for its protective lighting system?

YES NO

10. Does the Port facility have a dependable auxiliary (emergency) source of power for protectivelighting? YES NO

11. Is the power supply for the Protective Lighting System protected? YES NO 12. Are there provisions for standby or emergency protective lighting? YES NO 13. Is the standby or the emergency equipment tested at least monthly? YES NO 14. Can the emergency backup power supply be rapidly switched into operation when needed?

YES NO 15. Is the emergency backup power supply self-started? YES NO

16. Is the protective lighting/emergency or stand by power source located within a restricted area? YES NO

17. Is parallel circuitry used in the wiring? YES NO 18. Are multiple circuits used? YES NO a. If yes, are proper switching arrangements provided? YES NO

29

19. Are switches and controls properly located controlled and protected? YES NO a. Are they weatherproof and tamper resistant? YES NO b. Are they readily accessible to security personnel? YES NO c. Are they located so that they are inaccessible from outside the perimeter barrier? YES NO d. Is there a centrally located switch to control protective lighting? YES NO 20. Is the Protective Lighting System designed and locations recorded so that repairs can be made

rapidly in an emergency? YES NO 21. Are materials and equipment in shipping and storage areas properly arranged to provide

adequate lighting? YES NO 22. If bodies of water form a part of the perimeter, is adequate lighting provided where deemed

appropriate? YES NO NOTES: ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ INTRUSION DETECTION SYSTEMS 1. Does the Port facility employ any Intrusion Detection Systems (IDS)? YES NO 2. Does the IDS, where utilized, meet the following requirements? YES NO a. Are IDS signals monitored at one central point and is the security response initiated from

that point? YES NO b. Are all sensor equipment, doors, drawers and removable panels secured with key locks or

screws and equipped with tamper switches? YES NO c. Have power supplies been protected against overload by fuses or circuit breakers? YES NO d. Are annunciator, control and display subsystems located in a separate area or closed off from

public view? YES NO e. Are zone numbers assigned to IDS sensor locations instead of building/room numbers?

YES NO 3. Is the system backed up by adequate security alert teams? YES NO 4. Is the alarm system for active areas or structures placed in access mode during normal

working hours? YES NO 5. Is the system tested prior to activation? YES NO

30

6. Is the system inspected at least monthly? YES NO 7. Is the exterior IDS system weather proof? YES NO 8. Is there an alternate or independent power source available for use on the system in the event

of power failure? YES NO 9. Is the emergency power source designed to cut in and operate automatically when AC power

goes down? YES NO 10. Is the IDS system properly maintained by trained and properly cleared personnel? YES NO

11. Are frequent tests conducted to determine the adequacy and promptness of response to alarmsystems? YES NO

NOTES: ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ EMPLOYEE SECURITY EDUCATION PROGRAM 1. Does the activity have a current employee security education program addressing port security

matters? YES NO 2. Are all assigned personnel provided port security indoctrination? YES NO 3. Is formal security education training conducted for all personnel at least annually? YES NO

4. Are all personnel indoctrinated in security procedures which apply in the performance of theirduties? YES NO

5. Does the program cover such topics as: a. Pass and badge systems? YES NO b. Privately owned vehicle identification and control? YES NO c. Random package and vehicle inspections? YES NO d. Procedures for prompt reporting of security breaches? YES NO e. Layout of the waterfront facility to which the security force is assigned? YES NO f. Means/avenues by which the waterfront facility may be accessed from waterside and

landside? YES NO g. Types of cargo operations, on the facility and on a vessel moored to the facility, that are to be

expected? YES NO

31

h. General security topics? YES NO 6. Are local law enforcement agencies asked to actively participate in pertinent portions of the

program? YES NO NOTES: ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ SECURITY FORCE TRAINING 1. Does the Port facility provide prescribed security force training? YES NO 2. Does the Port facility provide adequate lesson plans to cover all facets of security and law

enforcement? YES NO 3. Is "outside" law enforcement/security training provided? YES NO If yes, name of school(s) _______________________________________________________ _____________________________________________________________________________ 4. Are individual training records adequately maintained for security force personnel?

YES NO 5. Do all security force personnel, who are required to bear firearms, receive training?

YES NO 6. Do all security force personnel receive adequate indoctrination in the use of force? YES NO NOTES: ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ SECURITY FORCE COMMUNICATIONS 1. Does the activity security force have its own communications system with direct

communications between Security Headquarters and security elements? YES NO 2. Is there an auxiliary power supply for the communications systems? YES NO 3. Is there sufficient equipment to maintain continuous communications with each element of the

security force? YES NO 4. Is there adequate alternate means of communication available to the security force? YES NO

32

5. What is the primary means of communication for the security force?______________________________________________________________________________

The alternate means?__________________________________________________________ 6. Radio communications: a. Are proper radio procedures practiced? YES NO b. Is all communications equipment properly maintained? YES NO c. Are there at least two dedicated radio frequencies security force use? YES NO

d. Are portable radios equipped with multiple-frequency capability? YES NO e. Are portable radios equipped with an automatic-tilt or switch activated duress frequency?

YES NO 7. Does the security force use a duress code for emergency situations? YES NO a. Is the duress code changed at least monthly? YES NO 8. Is the communications center afforded adequate physical security against armed intrusion?

YES NO 9. Are communication systems capable of being used to transmit instructions to all key posts

simultaneously in a rapid and timely manner? YES NO

SECURITY EQUIPMENT 1. Does the security force have sufficient, adequately equipped vehicles to maintain patrols,

respond to alarms and emergencies and maintain supervision? YES NO

a. Are security force vehicles equipped with: (1) Signs conspicuously identifying the vehicle as a security police vehicle?

YES NO

(2) Emergency exterior overhead lights? YES NO (3) Electronic siren? YES NO b. Do security force vehicles have relatively low mileage? YES NO

2. How often do the Security Officers and supervisory personnel review the firearms andammunition requirements to ensure their adequacy? YES NO

33

3. Do observation Towers provide security personnel with adequate observations of securityareas? YES NO

4. What type of ammunition is used by armed security force personnel? YES NO

5. Is ammunition properly secured and issued only for authorized purposes? YES NO 6. Are weapons adequately stored and secured when not in use? YES NO 7. Are duties other than those related to security performed by security personnel? YES NO 8. Does the Port facility provide devices and specialized equipment for use by the security force?

YES NO 9. Does the Port provide security force personnel with individual equipment?YES NO NOTES: _________________________________________________________________________

___________________________________________________________________________________________________________________________________________________________________________________________________________________________

ANNEX 3

Guidance for Shipowners, Ship Operators & Masters on the Protection of Ships

from Terrorism & Sabotage

Prepared by

INTERNATIONAL CHAMBER of SHIPPING

GUIDANCE FOR SHIPOWNERS, SHIP OPERATORS AND MASTERS

ON THE PROTECTION OF SHIPS FROM

TERRORISM AND SABOTAGE

This document has been issued to provide guidance to operators and managers of ships and ships’ masters in dealing with security threats to vessels, passengers and crew. It identifies some of the ways in which ships can protect themselves from attacks by terrorists or saboteurs. The guidance is aimed at encouraging companies to lay down their own policy and should not be interpreted as limiting a master's traditional freedom to take any steps necessary to secure the safety or security of his ship. It identifies measures against which a company’s own plans can be compared. The guidance is based on advice promulgated by IMO (MSC/Circ.443, MSC/Circ.754) and certain national administrations and offers recommendations to shipping companies on company and ship security planning and the identification of responsibilities of individuals designated under such a plan. The guidance will be kept under review in the light of developments and in consultation with other organisations or national authorities and revised as and when necessary. 21 November 2001

International Chamber of Shipping 12 Carthusian Street London EC1M 6EZ Telephone +44 20 7417 8844 Fax +44 20 7417 8877 e-mail: [email protected] International Chamber of Shipping Ltd. Registered in England No. 2532887 at the above address

CONTENTS 1. INTRODUCTION 2. SHIPPING COMPANY SECURITY POLICY, RESPONSIBILITIES AND ACTIONS 3. THE SHIP OPERATOR’S SECURITY OFFICER 3.1 Shipping Company Security Surveys 3.2 Ship Security Surveys 3.3 Security Staff Training 3.4 Contingency Planning 4. LEVEL OF THREAT AND THREAT ASSESSMENT 5. THE SHIP SECURITY OFFICER 5.1 Responsibilities 5.2 Ship Security Measures and Procedures 6. HIJACKS 7. BOMB THREATS TO SHIPS 8. SEARCH PLANNING AND PRACTICE 8.1 Search Planning 8.2 Ship Search Decision 8.3 The Search System 9. FINDING A SUSPECT DEVICE 10. REPORTS OF UNLAWFUL ACTS 11. SUMMARY GUIDANCE FOR MASTERS 12. CONCLUSION ANNEXES 1. Security Surveys 2. Security Staff Training 3. Threat Levels and Potential Responses 4. Guidance for Masters in the Event of a Hijack 5. Potential Bomb Threats and Countermeasures 6. Ship Search Planning 7. Search System and Search Methods

2

1. INTRODUCTION 1.1 Terrorists and saboteurs can broadly be grouped under the following headings:

• those whose grievance is essentially territorial, nationalist, separatist, ethnic or religious

• those whose political ideology is extreme left, right or fundamentalist • extremist groups supporting trade protection, animal rights or environmental

issues • those promoting criminal activities (e.g. drug trafficking or organised illegal

immigration). 1.2 Terrorist acts may be aimed at :

• attracting publicity, advertising a cause and pressurising Governments to change policy

• making the public apprehensive • discrediting Governments by exposing their inability to protect their citizens • provoking repressive counter measures which impinge upon citizens’ civil rights

such as travel restrictions, curfews or special legislation, thus alienating public opinion

• extorting money or equipment from Governments, major companies or rich individuals

• freeing imprisoned colleagues in return for the release of hostages • promoting other illegal activity.

1.3 Although most of the major terrorist incidents involving transport activities have

involved aircraft, there have been incidents on board vessels and there is no doubt that certain categories of ships and shore installations present a theoretically attractive, although often difficult, target for terrorist activities. • Cruise Liners could be targetted because of their high profile, their flag,

ownership, particular destination or nationality of their passengers. Cruise passengers may be perceived as a high income group and this alone could make them a target.

• Tankers, with the political sensitivity of their cargo and the potential environmental impact and resulting wide publicity given to tanker mishaps, are potentially attractive targets, although their size, complexity and the terminals where they call may make boarding difficult. Gas tankers, with their potentially volatile cargoes, might be considered to offer a particularly high profile.

• RoRo Passenger Ferries may be vulnerable to the use of a car bomb attack, aimed at damaging, disabling or sinking the vessel, causing fire on board and/or harm to the passengers and the crew.

• Other Ships with Special Cargoes such as those transporting hazardous goods, nuclear materials or waste or livestock could be potentially conspicuous targets.

• Terminals, such as those handling oil or gas, might present attractive targets to terrorists or saboteurs.

1.4 Terrorists and saboteurs will generally carry out a reconnaissance of potential

targets for whatever type of operation they are planning. An unprotected target is more likely to be attacked than an obviously protected one and terrorist groups will be deterred by visible security arrangements which are known to be effective. A ship whose crew is obviously vigilant is less likely to be selected as a target for a terrorist attack than one with a crew whose security procedures are neither comprehensive nor diligently enforced. Likewise, a company with efficient cargo acceptance procedures is less likely to attract unwelcome cargoes.

3

2. SHIPPING COMPANY SECURITY POLICY, RESPONSIBILITIES AND ACTIONS 2.1 Until a company has decided its own responsibility with regard to security, it is

difficult to determine the actions which should be taken. Each company needs to develop a statement of its own security policy for its vessels which should incorporate the following primary objective: -

Safeguarding their crew, passengers, visitors, other employees, ships and cargoes from the activities of terrorist or other criminal organisations.

2.2 To accomplish this, various steps need to be taken, such as

• to appoint and empower a suitably senior staff member to have overall responsibility for security on board all company controlled ships;

• to assess the security risk, taking account of the type of ship, the type of cargo it carries, the nationality of any passengers, the ports it serves and any other relevant factors;

• to co-operate with the responsible authorities in any country the ship visits and to act on any advice from those authorities;

• to promote security awareness amongst all employees with a view to making acts of terrorism against ships more difficult to achieve;

• to appoint and empower a responsible officer as ship security officer on each ship;

• to provide guidance and advice to masters and crews on responses to terrorist threats and keeping such guidance up to date;

• to recognize that additional security requirements may impose additional burdens on masters and crews which charter parties might need to take into account;

• to establish a reporting and recording system for incidents. 2.3 A company's plans will need to take into account a wide variety of scenarios in the

different parts of the world in which they operate. In some potential incidents national governments will plan to take a leading role, in others the company may plan to direct its own negotiations. However, in all cases, the company needs to consider:-

• responsibility for handling the incident • passing information to authorities, trade associations, other ship owners • instructions to masters and crew • liaison with overseas authorities • methods of communication • plans for handling the media • plans for informing and supporting the relatives/next of kin of those involved.

2.4 Arming crews in reaction to a potential terrorist threat is not recommended.

4

3. THE SHIP OPERATOR’S SECURITY OFFICER

IMO recommends that each ship operator should allocate responsibility for the security of the ships of that operator to a particular senior person in the organisation (the operator’s security officer) and provide resources to: • conduct security surveys and subsequent inspections of each ship in the fleet • develop and maintain company, fleet and individual ships' security and

contingency plans and procedures • encourage security awareness and vigilance amongst crews • ensure adequate training for personnel responsible for security • assess the potential threat in ports, terminals and sea areas on ships’ voyages • encourage security awareness in ports and terminals visited by the company’s

vessels • co-ordinate company and ships’ security plans with port security officers in each

port that might be visited by ships of that fleet. 3.1 Shipping Company Security Surveys

In order to prepare security plans, an initial comprehensive security survey should be undertaken of each ship to assess the vulnerability of the ship to terrorist acts. The results of this security survey should be used to determine the security measures necessary to counter the threat. The level of security deemed necessary for each ship may vary from port to port, from ship to ship and from time to time. Liaison between the port and shipping company/ship security officers is important to ensure the best use of ship and shore resources. The survey should determine what needs to be protected, what security measures are already in effect, and what additional measures and procedures are required. These issues should be periodically reviewed and the security plans updated as necessary.

3.2 Ship Security Surveys

A ship security survey should consist of a preliminary assessment and an on-site survey. Further details are given in Annex 1.

3.3 Security Staff Training

A continuous and thorough programme should support measures taken to safeguard the security of passengers and crews. Although all employees, ashore and afloat, have responsibilities for security in one way or another, there are three categories of personnel who may be specifically involved and who may benefit from specialised training: • The ship operator’s security officer and his central support staff • The ship security officer • Inspection, control and monitoring personnel. A more detailed examination of security staff training is outlined in Annex 2.

3.4 Contingency Planning

An essential part of security is the preparation of contingency plans in response to incidents which could occur and the planning of measures introduced in response to any increase in the level of threat. These plans need to cover different levels of response from the company (operator/owner) and the master, officers and crew. They might also encompass the establishment of a “Threat Level” procedure, identifying various measures which might be adopted by vessels in response to the perceived level of threat to the vessel in a particular place, at a particular time.

5

4. LEVEL OF THREAT AND THREAT ASSESSMENT 4.1 The security arrangements in place at any particular time or location or for any

particular vessel will depend, of course, on the perceived level of threat. In this regard it is useful to consider establishing a series of threat levels against which various actions might be taken, tightening security at each higher level. A universally recognised “threat level” indicator does not exist although a widely used and simple threat level table is as follows:

• Level 1 - background level of threat; • Level 2 - heightened threat due to type of ship, port, current events etc., but with

no defined target; • Level 3 - high level of threat against a specific target.

4.2 Notification of the appropriate threat level will generally be from national authorities

through a shipping company’s organisation structure responsible for security (i.e. national authority to ship operator's security officer to ship security officer). In a particular port, notification of the threat level, or a change in it, may come from the national authority, via the port security officer, to the vessel and its person responsible for security. In any event the incremental measures to be taken at each of the threat levels should be laid down. Those outlined in Annex 3 might be considered.

4.3 A threat level system such as this enables actions to be established for various

responsible people in the event of a threat level change. A message indicating a move from "level 1 to level 2" will, in the event that such a system is established, immediately indicate the additional actions that people responsible for security, both ashore and at sea, need to take.

4.4 Although individual companies can develop a threat assessment for themselves, it

is the responsibility of Governments to study the capabilities and intentions of any terrorist group which may threaten ships visiting, flagged or owned in a country, and to issue, where necessary, assessments of likely threats. It is for the shipping industry to act on such assessments. Specific advice as to what the shipping industry might do in response to any threat might also be obtained from Government departments. All advice must be kept up to date so information needs to pass in both directions. The prompt and continuing dissemination and exchange of information will assist the maintenance of effective port and ship security procedures and will enable states, port facilities, operators and shipmasters to adjust their procedures in response to changing conditions and specific or general threats.

6

5. THE SHIP SECURITY OFFICER 5.1 Responsibilities 5.1.1 Although directed at passenger ships, IMO recommends that ship operators appoint

an officer (who could be the master) to be responsible for the security of each individual vessel (the ship security officer). This recommendation should be considered in respect of all vessels. The ship security officer has responsibility for:-

• advising the master on the threat assessment for the voyage and agreeing the

ship’s response • regular security inspections of the ship • detailed contingency planning • implementing/maintaining the ship's security plan designed by the operator’s

security officer at the appropriate threat level • proposing modifications to the plan • encouraging security awareness and vigilance on board the ship • liaising with port security officers during the ship's visit and with the ship operator • reporting, as appropriate, all occurrences and suspected occurrences of unlawful

acts • co-ordinating the implementation of the ship security plan with the appropriate port

security. 5.1.2 Good security involves a readiness to accept that a threat exists and that

arrangements might be necessary to counter it. The ship security officer, together with the master, should consider:- • Security education - all crew members will be more security conscious and

vigilant if the principles of good security are explained. It should be clear within each company who has responsibility for company policy in relation to security and each person's role in respect of the vessels.

• Awareness - the threat of terrorist attacks in different ports of the world varies depending on the national and international politics of the day and the grievances, real or imagined, of any of the potential groups that might be involved. The threat needs to be assessed in relation to each planned port of call, on the best information available, taking action as necessary.

• Liaison - good liaison with local police and port authorities will provide local "intelligence", and may give advance warning of any incident and lead to a more rapid reaction by local security forces. Where such liaison with local police or port authorities is difficult, advice might be sought from local consular or diplomatic representatives.

5.2 Ship Security Measures and Procedures

Although the master's traditional authority in matters of ship security remains paramount, ship security should be continually monitored and supervised by the ship security officer. It is also important to establish and maintain communication and co-operation with individual port facilities in security matters. Additional security measures, such as those suggested in Annex 3, should be implemented to counter increased risk when warranted.

7

6. HIJACKS 6.1 "Hijack" is used to define the forcible seizure of a means of transport by terrorist or

criminal groups as a way of furthering their cause, reaching their objective, making good their escape or even using the ship itself, and/or its cargo, as a threat or as a weapon. Aircraft have been hijacked by a single person armed only with imitation weapons and, in the right place, one armed person could be enough on a ship. However, a planned terrorist hijack of a vessel is much more likely to involve a group with real weapons. The major task facing the would-be hijackers is to board the vessel with their weapons, and security measures aimed at preventing this should be introduced when the threat level warrants it. Measures devised in respect of threats from piracy and/or armed robbery are appropriate. The key objective must be to prevent unauthorised access to the vessel.

6.2 Although in most parts of the world the threat of this kind of action is low, shipping

companies and masters need to have a range of measures available to introduce as and when the threat level warrants it.

6.3 Terrorists may seek to board a vessel by infiltration, ruse or assault. In each case

the best defences for both the deterrence and prevention of unauthorised access are crew awareness and control of access to the vessel and to key points on the vessel such as the bridge, engine room and communication facilities.

6.4 In port, if the threat warrants it, access points should be manned, in certain

circumstances by two persons, who should be fully briefed on their duties, the action to take in the event of an incident or emergency and the planned response to an alarm. They need to be provided with a torch, a whistle to summon assistance and communications to remain in touch with the Duty Officer. They need to hold a full list of all crew members, shore officials and expected visitors. All visitors should be asked to identify themselves and, if necessary, a responsible officer should confirm their identity. Strangers should be challenged. Vessels at anchor should regularly check anchor cables and hawsepipe covers.

6.5 At sea, hijackers may try to gain access to the vessel, particularly close to land or in

narrow waters where manoeuvrability is limited. Attempts could be mounted from small boats, dhows, junks, fishing boats that appear to have broken down or by any means that relies on the traditional assistance which seafarers offer each other. The best protection against this sort of ruse is an awareness of the possibilities and keeping a sharp look-out for small craft behaving suspiciously or approaching. Should a master decide to allow people to board, this should be one at a time, each one searched if necessary, while a good look-out is maintained on the other side of the ship. Particular care needs to be exercised during the hours of darkness when a surreptitious approach could be carried out more easily. When underway, if there is any doubt about the identity or motive of craft attempting to attract attention, their actions should be ignored. If it is safe to do so, and circumstances warrant it, speed should be increased and/or navigation lights and upper deck lighting extinguished. Attempts should be made to identify or photograph any craft behaving strangely and details reported ashore by the speediest means available. If another vessel approaches the ship at sea in a suspicious or threatening manner: • increase speed and alter course if safe to do so: give no opportunity for the other

vessel to come alongside and make no response to messages by radio, light or loud hailer.

• keep personnel clear of the upper deck. • note details of the other vessel and photograph it if possible.

8

• at night, direct searchlights at the approaching vessel and switch off upper deck lighting: if safe to do so, navigation lights should also be switched off.

• report details of any harassment to the company and, if appropriate, to a representative of the government claiming authority over the area.

6.6 A terrorist assault is more likely to occur in harbour than at sea. If the measures

recommended for controlling access are in force and prove inadequate, it will demonstrate the determination and ruthlessness of the terrorists involved. Unless the terrorists are very poorly armed and equipped, no attempt should be made to resist an armed terrorist assault.

6.7 If despite all efforts at deterrence and prevention a vessel is hijacked, the master

and crew should try, wherever possible, bearing in mind the overwhelming priority to prevent any loss of life, to follow the guidance outlined in Annex 4.

9

7. BOMB THREATS TO SHIPS 7.1 Ships are vulnerable to explosive or incendiary devices:

• in accompanied passenger cars, freight vehicles or coaches • in unaccompanied vehicles, export cars or semi-trailers • in misdeclared cargo • carried on board by current passengers, or by those from a previous sailing

leaving a timed device • in luggage placed in a baggage trolley • in ship’s stores • in the post • carried on board by shore workers in port • carried on board by contractors’ personnel.

7.2 Travelling as a foot passenger, the saboteur has to contend with customs and

immigration authorities, and with being challenged by ship's staff if he attempts to disembark prior to sailing. There is also the possibility that a determined terrorist may plant a device and remain on board.

7.3 Further details on potential bomb threats and possible counter measures are given

in Annex 5. 7.4 In addition to bomb threats, the potential use of radiological, biological and chemical

weapons against ships and the people on them, although unlikely, should also be considered.

10

8. SEARCH PLANNING AND PRACTICE 8.1 Search Planning 8.1.1 A ship’s security plan should incorporate a search procedure aimed at ensuring that

the vessel can be searched quickly and effectively when this is considered necessary. Search plans should be prepared in advance, to help ensure the maximum effectiveness of the search. They should be practised from time to time to build up confidence on the part of the crew and remind them that good security is everyone's business. In areas or periods of high risk or if information on specific threat has been received, searches might be made after leaving each port. Compartments which are tidily stowed are more easily, quickly and effectively searched. In the interests of good security, as well as good ship husbandry, as much gear as possible should be stowed away.

8.1.2 The operator's security officer and the master of each ship, together with the ship's

security officer, should be responsible for establishing search procedures. Drills should be held to ensure that such plans are efficient, effective, workable and well understood.

Search planning and organisation is covered in Annex 6.

8.2 Ship Search Decision 8.2.1 If a decision is taken to search the ship while it is alongside, the master should

consider whether to disembark any persons/ passengers who do not have search responsibilities. If so, a reception facility should be established to ensure that a terrorist has not planted a device and then been allowed back ashore. Vehicle drivers should facilitate the search or discharge of their vehicles.

8.2.2 If the ship is to be searched on passage the master should advise passengers of a

"security alert" and ask them to remain with their baggage whilst the search is carried out. There should be no reference to the word "BOMB". On passenger ships there may be members of national security services with considerable anti-terrorist experience on board.

8.2.3 Having decided to search the vessel, the master should brief his heads of

departments accordingly. They, in turn, should brief their own search group leaders who should organise their teams to search their allocated spaces using the search plans to ensure no spaces are missed.

8.3 The Search System Details of a recommended search system and methods of search are outlined in Annex 7. Some of these measures may only be applicable to passenger vessels.

11

9. FINDING A SUSPECT DEVICE 9.1 Remember - the disposal of any device is the responsibility of the security services

and no attempt should be made to deal with any discovered device. 9.2 If a device is discovered the person responsible for security should be notified of the

size and description of the device and its location and report any immediate action being taken. No action should be taken which affects or changes the environment near the device, e.g. lighting, temperature, noise etc.

• Do not put it in water or play water on it as this could short a control circuit and

detonate it • Do not run in the vicinity of the device • Do not use VHF/UHF radios in the vicinity of the device • Do not handle, touch, shake, open or move suspected explosives or suspected

devices • Do not cut, pull or touch wires, switches, fuses or fastenings • Do not pass metallic tools near the suspected device • Do not smoke nearby • Do not move the device away from people - move people away from the device • Do not direct people past the suspect device • Do not get near bombs.

9.3 If a device is found on board a ship in port the master or responsible officer should

evacuate the ship in accordance with an emergency plan, retaining only sufficient staff to provide technical support to the security services.

9.4 If a device is found while a vessel is at sea, the master's response will be based on

the size and location of the device, the ship’s location and the time until the security services and other assistance becomes available.

9.5 The master's response should include consideration of the following measures:-

• the need to proceed to General Emergency Stations • the need to evacuate the area by routeing everyone well clear of the suspect

device • instructing all on board to keep clear of all doors, trunks and hatches leading from

the space containing the device to avoid possible blast injuries • the possibility of seeking assistance from any members of the security services

travelling as passengers • the likely damage stability state of the vessel if the device were to detonate • the need to man the drencher room if a device is found on a vehicle deck • the need to build a containment wall around the device to absorb a blast.

9.6 If a bomb explodes without warning, onboard or near the ship, the master should:-

• ensure water-tight integrity and stability • render first aid where/if necessary • take fire-fighting precautions • muster personnel to establish number and names of casualties • inform company, local authorities (in port), and make distress call (at sea) if

necessary • if in port, be prepared to handle enquiries from press and next-of-kin.

12

9.7 If a bomb warning is received:

• the master will need to decide whether the warning is real or a hoax and pass detailed information on any bomb warning, and his reaction to it, back to his company. If the warning comes via the police or local authorities, they may be able to give an opinion on its authenticity. The master's decision will determine whether searches should be made although, unless there is clear evidence that a bomb threat is false, at least a low-key search of vulnerable or public areas should be carried out.

• if the warning is given by telephone, the recipient of the call may be able to give further information which can contribute to a sound decision: the caller's manner; accent and language used; whether made from a call box, through an operator or privately; background noise; precise wording; time of call (e.g. after the bars close).

• a bomb warning may be received by the ship's radio operator who should be briefed as to the policy on responding.

• any search should be carried out as soon as possible, by personnel familiar with the area to be searched. Searchers need to be carefully briefed on what they are looking for. Particular attention should be paid to machinery compartments, sensitive areas, etc.

• if a suspicious object is found, further decisions need to be taken - on isolating it, reporting details, and issuing instructions to personnel in the vicinity. Movement of personnel about the ship needs to be carefully controlled. Even if practicable (e.g. when the ship is alongside) total evacuation is not invariably the best solution as more than one device might have been planted and the warning may be a "come-on" tactic aimed at drawing people into the vicinity of a second device.

13

10. REPORTS OF UNLAWFUL ACTS To safeguard maritime interests against unlawful acts which threaten the security of passengers and crews on board ships, reports on incidents and the measures taken to prevent their recurrence should be provided to the authorities as soon as possible. This information will be used in updating or revising these agreed measures, as necessary. The individual circumstances of any particular incident may require a departure from this guidance to achieve the overall primary objective of personnel safety. Mention of the difference should be contained in any incident report in order to ensure that guidance can be continually improved and kept up to date.

14

11. SUMMARY GUIDANCE FOR MASTERS

This two-page summary document has been included to provide a brief outline of the measures described elsewhere in this guidance. 11.1 Each shipping company must decide its own responsibility with regard to security.

Otherwise it is difficult for a master to determine the actions which should be taken. Company policy should seek to fulfill the following primary objective: -

Safeguarding their crew, passengers, visitors, other employees, ships and cargoes from the activities of terrorist or other organisations.

11.2 IMO recommends that ship operators appoint an officer to be responsible for the

security of each individual vessel (the ship security officer) with responsibilities for:-

• advising the master on the threat assessment for the voyage and agreeing the ship’s response

• regular security inspections of the ship • detailed contingency planning • implementing/maintaining the ship's security plan designed by the operator’s

security officer • proposing modifications to the plan • encouraging security awareness and vigilance on board the ship • liaising with port security officers during the ship's visit and with the ship operator • reporting, as appropriate, all occurrences and suspected occurrences of unlawful

acts • co-ordinating the implementation of the ship security plan with the appropriate port

security plans. 11.3 Companies and masters should establish a threat level indicator and incremental

measures to be taken at each of the threat levels should be laid down. The following might be considered:-

Level 1 access on and off the vessel controlled and all persons identified;

embarked passengers not be allowed to disembark without authority; access to sensitive areas of the vessel limited; control access to cargo spaces; unused rooms or spaces kept locked; spot checks to ensure that access points to the vessel are adequately controlled; ship security officer advised to contact port security at each port of call.

Level 2 closer scrutiny paid to deliveries of stores;

passengers advised not to leave their baggage unattended; occasional bomb searches carried out at random intervals; checks made of seals on containers and other cargo; crew advised to be vigilant and checks made on Level 1 procedures; close liaison established and maintained with onshore security authorities; more frequent random checks of passengers, their baggage and vehicles; patrols introduced on board the vessel; no persons other than the crew allowed on the bridge or in the engine room; in port, inspections of the hull of the vessel made from the quay and outboard; access of all visitors to the vessel strictly controlled.

15

Level 3 regular and thorough bomb searches conducted; all stores checked prior to acceptance and a check made on recent deliveries; all spaces, including off-duty crew lockers and storage locations, searched; crew briefed on the seriousness of the situation and the requirement for vigilance; patrols of the vessel, especially on deck, intensified.

11.4 If despite all efforts at deterrence and prevention a vessel is hijacked, the master

should

• keep calm and advise all others to keep calm; • ensure the safety of the ship in accordance with maritime practice; • broadcast a distress message if possible; • offer reasonable co-operation.; • try to establish what group of terrorists is involved; • try, without risk, to increase the number of access points to the vessel; • encourage the establishment of a secure, direct negotiation channel with the

authorities.

In the event or in anticipation of military action: Do not react to strangely dressed newcomers. Do not attract attention to any unusual activity. If shooting is heard or the loud command "GET DOWN", obey it. If the loud command "STAND STILL" is heard then freeze immediately. Inform a member of the military assault force of the location of terrorist bombs or weapons. Do not take photographs of the military assault force.

11.5 Search plans should be prepared in advance, to help ensure the maximum effectiveness of the search, and should be practised from time to time to build up confidence on the part of the crew.

11.6 The disposal of any device is the responsibility of the security services and no

attempt should be made to deal with any discovered device.

16

12. CONCLUSION Threats from terrorism and sabotage are part of the risks faced by the shipping industry. It is sound sense and good seamanship to reduce possible risks and those imposed by terrorists or saboteurs are no exception. The industry is conscious of the dangers that can arise. But in many parts of the world ships will be obliged to rely on the co-operation of shore authorities over whose security arrangements they will have no influence. It is therefore essential that, at both company and ship level, security measures are maintained at a level commensurate with the threat. Always remember that good security is as much an attitude of mind as the application of physical protective measures.

17

ANNEX 1

Security Surveys Preliminary assessment Prior to commencing the ship security survey, the operator’s security officer should take advantage of all available information on the threat assessment for the ports at which the ship will call or at which passengers embark or disembark, and about the port facilities and their security measures. Previous reports on similar security needs should be studied and appropriate persons on the ship and in port facilities should meet to discuss the purpose and methodology of the survey. The operator’s security officer should conduct an initial vulnerability assessment, considering: • the general layout of the ship; • the location of restricted access areas, such as bridge, engine-room, communications

facilities etc.; • the location and function of each actual or potential access point to the ship; • the open deck arrangement including the height of the deck above water; • the emergency and stand-by equipment available to maintain essential services; • the numerical strength, reliability and security duties of the ship's crew; • existing security and safety equipment for the protection of passengers and crew; and • existing security measures and procedures in effect, including inspection, control and

monitoring equipment, personnel identification documents and communication, alarms, lighting, access control and other appropriate systems.

On-scene security survey The operator’s security officer should examine and evaluate the methods and procedures used to control access to ships, including the inspection, control and monitoring of persons, carry-on articles, baggage, cargo and ship's stores. Each identified point of access should be examined, including open weather decks, to assess its potential for use by persons seeking unauthorised access for themselves or for terrorist materials. The operator’s security officer should examine and evaluate existing security measures, procedures and operations, under both emergency and routine conditions, including: • established security procedures; • response procedures to fire or other emergency conditions; • the level of supervision of the crew, vendors, repair technicians, dock workers, etc.; • the frequency and effectiveness of security patrols; • the security key control system; • security communications systems and procedures; • security doors, barriers and lighting; and • authentication procedures for communications, to alert shore authorities and the

company to the possibility that communications are being sent under distress or duress.

18

ANNEX 2

Security Staff Training 1 Operator’s security staff The operator’s security officer and his staff should have knowledge and, as necessary, receive training in some or all of the following, as appropriate: • security administration; • relevant national legislation, international conventions and recommendations; • responsibilities and functions of other involved organisations; • risk, threat and vulnerability assessments; • security surveys and inspections; • ship security measures; • security training and education; • recognition of profiles of persons who are likely to commit unlawful acts; • ship and local port operations and conditions; • dangerous substances and devices and how to recognise them; • inspection, control and monitoring techniques and techniques used to circumvent them;

and • security devices and systems and techniques used to circumvent them. 2 Ship security officer The ship security officer should have adequate knowledge of and, if necessary, training in, the following, as appropriate: • company policy, the ship security plan and related emergency procedures; • the layout of the ship; • assessment of risk, threat and vulnerability; • methods of conducting security inspections; • techniques used to circumvent security measures; • operation and value of technical aids to security, if used; • recognition of profiles of persons who may be likely to commit unlawful acts; • the detection and recognition of dangerous substances and devices; • port and ship operations; and • methods of physical searches of persons, their baggage and other goods. 3 Inspection, control and monitoring personnel Instruction and training, as appropriate, for persons assigned to conduct inspection, control and monitoring on board ships should take into consideration, as appropriate, the following: • responsibilities under the ship security plan; • inspection, control and monitoring regulations or policies and pertinent laws; • detection and identification of firearms, weapons and other illicit substances and

devices; • operation and testing of security equipment, if used; • physical search methods of persons, baggage, cargo and ship's stores; • emergency procedures; • recognition of profiles of persons who are likely to commit unlawful acts; • human relations techniques; and • techniques used to circumvent security measures. 19

4 Ship's crew Crew members having specific security duties should know their responsibilities for ship security as described in the ship security plan and ship’s security procedures and should have sufficient knowledge and ability to perform their assigned duties.

20

ANNEX 3

Threat Levels and Potential Responses Level 1 - background level of threat This represents the background level of likelihood of terrorist activity which, unfortunately, applies everywhere in the world today. Clearly some locations, types of ships or trades may be assessed at a higher level. Even “Level 1”, however, requires that all organisations give some thought to the possibility of a terrorist incident and make contingency plans accordingly. At this background level, therefore, it is suggested that: - • ports establish security committees to liaise regularly with other port users; • all shipping operators produce clear statements of security policy; • an appropriately senior ship's officer be appointed on each ship to be responsible for

protective security matters on that ship, the implementation of the company's security policy and procedures and liaison with local port security arrangements;

• written bomb alert procedures be prepared for all vessels, and any crew or other staff involved informed of these procedures;

• contingency plans be formulated and agreed for action in the event of a threat being received, and the appropriate staff informed;

• plans be made for the implementation of additional security measures in response to an increased level of threat;

• adequate deck and overside lighting be provided to vessels; • crew should be issued with photo identification; • access on and off the vessel should be controlled, with all persons identified; • security alarms and communication systems should be established for restricted areas

and at access points to the ship to complement guards and patrols with a response plan;

• embarked passengers should not be allowed to disembark without the authority of an appropriate ship's officer and only when the shore authorities have been contacted;

• access to certain areas of the vessel (e.g. bridge, engine room, radio room, steering gear) should be limited to ship’s staff and other authorised personnel with a key control system established;

• at sea, access to cargo spaces should be controlled; • where practicable, unused rooms or spaces should be kept locked; • spot checks should be made to ensure that access points to the vessel are adequately

controlled and that doors to unused spaces are locked; • the ship security officer is advised to contact port security at each port of call. Level 2 - heightened threat due to type of ship, port, current events etc. but with no defined target In addition to the measures described at Level 1, it is recommended that:- • closer scrutiny should be paid to deliveries of stores; • passengers should be advised not to leave their baggage unattended; • occasional bomb searches should be carried out at random intervals; • checks should be made of seals on containers and other cargo; • all staff should be advised to be vigilant and checks made on the procedures outlined at

Level 1; • close liaison should be established and maintained with onshore security authorities; • all crew should be reminded of bomb alert procedures for their vessels; • passenger carrying vessels should consider establishing more frequent random checks

of passengers, their baggage and vehicles;

21

• patrols should be introduced on board the vessel; • deck and overside lighting should be utilised; • bomb searches should be undertaken and repeated as often as the master deems

necessary; • no persons other than the crew should be allowed on the bridge or in the engine room; • in port, routine inspections of the hull of the vessel should be made from both the quay

and outboard; • access of all visitors to the vessel should be strictly controlled with a positive

authorisation, or pre-clearance, being obtained from a responsible ship’s officer with all visitors accompanied;

• shore authorities should be informed if persons seeking access to the vessel are refused or decline to be subject to security measures.

Level 3 - high level of threat against a specific target In addition to the measures described at Levels 1 and 2:- • regular and thorough bomb searches should be conducted; • all stores should be checked prior to acceptance and a check made on recent

deliveries; • a search should be made of all spaces including off-duty crew lockers and storage

locations; • ship’s staff should be briefed on the seriousness of the situation and the requirement for

vigilance; • patrols of the vessel, especially on deck, should be intensified.

22

ANNEX 4

Guidance for Masters in the Event of a Hijack • Keep calm and advise all others to keep calm. • Do not try to resist armed terrorists unless as a last resort in a clear life threatening

situation. • Ensure the safety of the ship in accordance with maritime practice. • Broadcast a distress message if possible. • Offer reasonable co-operation. • Abuse or aggression should not be returned. • Be aware that hijackers are unlikely to understand fully how a particular ship works, its

capabilities and limitations and may be suspicious about routine operations. They are also unlikely to be familiar in detail with the safety requirements associated with the cargo.

• Try to establish what group of terrorists is involved. • Try, without risk, to increase the number of access points to the vessel. • Without suggesting what they may be, seek to establish the hijackers’ demands and

what deadlines have been set for meeting them. • Assume that the incident will be prolonged. The longer incidents drag on, the more

likely they are to end without injury to the hostages. • Recognise that hostages will feel isolated during the incident, as they will be unaware of

steps being taken by the company and/or government authorities on their behalf. This can lead to antagonism against the authorities and sympathy for the terrorists. Every effort will be being made to end the incident with the utmost emphasis on the preservation of life and personal safety of all innocent parties involved.

• Understand that establishment of a reasonable rapport between hostages and captors is likely to reduce the chances of the terrorists acting violently against their hostages.

• Be aware that at some stage in the incident a confrontation between the terrorists and outside authorities may occur. Before this confrontation, an opportunity may arise or may be created to pass information about the hijackers, such as their number, descriptions, sex, how they are armed, how they deploy themselves, how they communicate with each other, their cause, nationality, language(s) spoken and understood, their standard of competence and their level of vigilance, and whether any of the hostages have been separately identified as to nationality, religion or occupation (e.g. forces personnel).

• Encourage the establishment of a secure, direct negotiation channel with the authorities.

• Avoid crew members becoming directly involved in the negotiations. If crew members are forced to take part they should simply relate the dialogue back and forth.

• Wherever and whenever possible, the hijackers should be encouraged to surrender peacefully and should be discouraged from mistreating either passengers or crew.

• Military action may, in the last resort, be taken in order to save life and recapture the vessel.

In the event or in anticipation of military action: • Do not react to strangely dressed newcomers. • Do not attract attention to any unusual activity. • If shooting, or the loud command "GET DOWN", is heard immediately lie face down,

cover ears, close eyes and slightly open mouth. Do not move until an "all clear" is given. • If the loud command "STAND STILL" is heard then freeze immediately. • If the location of terrorist bombs or weapons is known, inform a member of the military

assault force as soon as possible.

23

• Do not shelter or hide terrorists. • Do not take photographs of the military assault force. Following the incident, the master and his crew should avoid talking to the press and other media persons about the methods used to resolve the incidents.

24

ANNEX 5

Potential Bomb Threats and Countermeasures a) Covert entry and quick-plant device - The saboteur wishing to attack a ship

alongside to cause specific damage or immobilise particular equipment may wish to board the ship undetected, plant an explosive or incendiary device and disembark before it detonates. Sabotage attacks differ from hostage-taking attacks in that there are no negotiations over demands. If publicity is the saboteurs' aim, it is likely that the incident will be "claimed" after the event. Sabotage attacks of this sort are likely to be directed at a ship of a particular nationality, against the shipping company's policies, or the justification may be entirely local. Since saboteurs on this type of mission need to board and leave the ship without being detected, access control arrangements may not always deter them. To guard against this type of attack, vulnerable compartments should be locked and watchkeeping personnel should make random visits to look for signs of tampering. A saboteur need not only use explosive or incendiary devices, he may try to damage the vessel's machinery. Extra vigilance is needed immediately prior to sailing, or following a bomb warning. Crew members should immediately be suspicious of unexpected objects in unusual places.

b) Sabotage by remotely controlled or delayed action device - The saboteur may

use some convenient means of concealing and smuggling on board delayed-action bombs or incendiary devices in passengers' or crews' baggage, in deliveries of ship’s stores or as misdeclared cargo. Crew members should be warned not to accept packages from strangers and made aware that devices could be introduced in seemingly innocent receptacles. Gas cylinders or oxygen bottles, for example, make ideal containers for explosive devices. Deliveries which have been cleared could be bound with coloured tape for departmental identification, or automatically strapped using polypropylene strapping tape.

c) External sabotage - Major damage to a ship can also be caused by a saboteur

reaching the hull, either from another vessel or underwater, and placing an explosive device in a vulnerable area. The saboteurs' objectives in mounting such attacks can be to block berths or narrow channels, or to immobilise a particular vessel. Such attacks require considerable knowledge and technical skill and lie within the capability of only fairly sophisticated terrorist groups: to be effective, some precision is required in placing the charges and this requires trained swimmers. Measures to provide protection include:- • over-the-side lighting giving an even distribution of light on the whole hull and

waterline; • keeping a good watch from the deck, to look out for bubbles (divers), floating

refuse (which may hide swimmers) or small boats. All approaching boats should be challenged. If unidentified, they should be prevented from coming alongside;

• a boat patrol, carried out at frequent but irregular intervals and towing barbed wire or fish hooks, is an effective defence against frogmen or swimmers;

• if the ship is known to be under attack from swimmers, turning propellers ahead and astern creates turbulence in the water and makes swimming more difficult;

• if it is thought likely that a device has been fixed to the outside of the hull below the water-line, the assistance of local authorities should be sought.

Some of the above measures may seem fanciful or far-fetched, but they have all been used in the past with some success and are included to show the sort of protective measures which are needed when the threat demands it.

25

Annex 6

Ship Search Planning In order to ensure that a thorough and efficient search can be completed in the shortest possible time, search plans, specific to each ship, should be prepared in advance. This plan should be reviewed from time to time and modified in the light of experience. It should be comprehensive and detail the routes searchers should follow and all the places on the route that a device could be secreted. The plan should be presented in a logical manner to cover all options and to ensure no overlap or omission. Such a plan allows a searcher to concentrate on the actual searching without worrying about missing something. The preparation of a system of check cards for individual vessels is a useful contingency, one being issued to each searcher which specifies the precise route to be followed and the areas to be searched. The cards can be colour coded for different areas of responsibility, e.g. blue for deck areas, red for engine room etc. On completion of an individual search task the card is returned to a central control point, so that when all cards are in the search is known to be complete. In addition to a comprehensive search plan a plan for a fast search or 'quick look' of the more vulnerable and accessible areas should be drawn up. Using the card system, selected cards only would be issued to cover the vulnerable and accessible areas. It must, however, be emphasised that all bomb threats must be treated as real unless judged or proven otherwise. Searchers should be instructed to bear in mind that the terrorist may try to match the device to the background such as a tool box in an engine room. At higher levels of threat, searches of people and goods may need to be carried out. Such a fast search might be carried out where • there is a short warning time before a potential bomb detonation; • security management judges that a received bomb threat needs checking out; • an opportunity occurs to conduct a quick search. Types of Search There are two types of search: - Reactive Search - This type of search is normally carried out in reaction to a specific threat or piece of hard intelligence indicating that bomb or weapons have been placed. It can also be used as a precaution during times of heightened threat. Whenever a reactive search is ordered it should comply with the following principles: • the searchers should be familiar with the area being searched so that out of the

ordinary items are noticed. • the search should be conducted according to a specific search plan or schedule and

must be carefully controlled by officers and management. • searchers must be able to recognise a bomb or incendiary device. • there must be a system of marking or recording searched or 'clean' areas. • a central control point should be established to which the searchers report. • searchers should be able to communicate with the search controllers. • searchers must know precisely what to do if a suspect device is found. Preventive Search – This aims to deter terrorists from smuggling bombs or arms onboard a ship or into a terminal or restricted area, and to find these devices if the terrorist tries to smuggle them in. The following principles apply to all preventive searching:- • places need to be established where people and goods are checked or searched

before they pass into the restricted or sterile zone. Once through the point, segregation 26

is essential and no contact must be allowed with unchecked persons or goods. The percentage of persons/goods searched will, of course, depend on the threat level.

• no person or vehicle should be allowed to 'break back' from a sterile area or land from a ship without the knowledge of the person controlling the search.

• car, baggage and freight reconciliation with owners/drivers is a paramount objective. • restricted or sterile areas and the access to them should be searched. The frequency

of such searches will be dictated by the threat level.

27

Annex 7

Search System and Search Methods The search system should be based on the crew searching their own area of work under their normal officer or senior rating. In this way, an unusual object is more likely to be identified. Consideration should be given to search parties working in pairs with one searching "high" and one searching "low". If a suspicious object is found, one of the pair can remain on sentry while the other reports the find. To manage any search efficiently ship’s staff may need to use UHF/VHF radios but operating channels should be limited to those previously worked during the voyage. The search controller should keep a record of all reports from the search groups to ensure all spaces are checked and that the master always has an up to date search status. During the search routine any lifts should be turned off. The search system can be divided into two stages: A search of unlocked spaces - Since most unused spaces should be locked a rapid search of vulnerable areas can be achieved by: • checking all locked doors to ensure they have remained locked; • searching all unlocked spaces, lifts and rubbish bins; • search group leaders advising the bridge on completion of searches of their allocated

spaces; • the bridge staff keeping a record of all reports from search group leaders to ensure that

the master has an up to date status report. A search of locked spaces - If warranted, a full search of locked spaces and lift shafts can follow with: • all locked spaces and lift shafts being thoroughly searched using the necessary pass

keys; • all crew accommodation, lockers, wardrobes and drawers being thoroughly searched; • search group leaders advising the bridge on completing the search of their allocated

spaces; • bridge staff keeping a record of all reports from search group leaders to ensure the

master has an up to date status report. The discovery of one device should not be the end of a search as there is always the possibility that more than one has been planted. The owners of any unattended baggage, unclaimed luggage or abandoned packages found during a search should be sought while clearing the area adjacent to the suspect item. Personnel Search Locations A centralised search point ashore is generally most economical in terms of equipment, personnel and space and it allows control services such as police, customs and immigration to integrate more easily. However, keeping the "clean passengers" segregated after search may present problems of organisation and surveillance. A search at the gangway head has the disadvantage of allowing potential terrorists to get close to their target. Also space in ships is at a premium compared with ashore, and long queues of passengers, or other visitors to the ship, waiting on an open gangway to pass the search control may cause irritation. However, this option may be necessary when there is no onshore screening or when, during a high level of threat, a double check is necessary.

28

Methods of Search - Persons Physical Searching - Physical searching is best carried out in booths as privacy minimises embarrassment and increased effectiveness. People being searched should not be given the opportunity of selecting a particular searcher. One person, a supervisor, should observe people waiting and note suspicious behaviour and allocate passengers to available searchers to ensure no over-loading. Metal Detection – People can be screened by passing through an archway pre-set to alarm if a certain amount of metal is carried through. Hand-held metal detectors can be used for screening individuals. However, metal detectors will not pick up explosives, plastic weapons or inflammable liquids carried in glass or plastic containers. Metal detection should be augmented by a physical search of a proportion of those being screened, including some who do not alarm the detector. This would increase the chances of detection and acts as a powerful deterrent. Baggage Screening • Metal Detectors - Metal detectors are of little use for screening baggage and personal

belongings since most bags and brief-cases have locks, hinges and other metal components which would result in a very high alarm rate. Moreover, hand-held detectors have a limited depth of effective penetration.

• Vapour Detection - Air sampling systems, either static or hand-held, can be used to detect high concentrations of some explosives. However, currently no commercial system is capable of detecting all forms of explosives.

• X-Ray Systems - The most usual method is to use X-ray equipment. Modern equipment is capable of producing images of good definition and penetration. However, X-ray examination may not detect explosives and plastic weapons nor will it allow identification of the actual liquid in bottles or other containers. Moreover, it is possible to camouflage the image of weapons and devices by the use of other dense materials, such as lead crystal glass. The use of X-ray equipment must therefore also be accompanied by a percentage physical check of baggage, including a proportion that do not arouse suspicion. Operator efficiency decreases significantly after only a relatively short time, particularly at peak screening periods, so individual operators should only scan X-ray images for a maximum of 20 minutes and then be employed on other duties, such as a physical search, for 40 minutes before returning to the console. Each image should be presented for a minimum of 5 seconds to permit proper examination. Any baggage whose image arouses suspicion, or contains a dark area which could conceal a weapon or device, should be physically searched.

• Physical Search – A physical search of baggage should include a check for false compartments, often used for the smuggling of weapons and devices. Although false "bottoms" are most usual, devices have been incorporated around the sides of cases, in the lids and in the compartments of holdalls. A smell of glue, or a heavy odour to mask the smell of glue or explosives, may be an indication that a lining may have been stuck back in position. Attention should be paid to any tampering or repair to a case, non-standard or unmatched case components, and also to greasy stains or small holes in the case exterior. If the baggage weight seems disproportionate, or the bag is unbalanced for no obvious reason, then a further check for a false compartment would be justified. Particular attention should be paid to electrical and electronic apparatus, such as radios, which have often been used as containers for devices to avoid detection under X-ray examination. Passengers should be questioned on the origins of the equipment and whether it has been out of their possession for any period of time. Equipment may be examined for unusual characteristics; signs of tampering, excessive weight, loose objects inside (rotate, not shake). X-ray the equipment if suspicions are aroused. Treat all new, packaged equipment in the same manner as used models.

29

• Use of Dogs - Specially trained dogs can be very effective in searching cars, baggage and freight. Dogs can also be used for searching in ships but will need to be trained for the seagoing environment to achieve results.

Heavy Baggage - The screening of heavy baggage could be done by a central X-ray machine supported by physical search. It is another area where the use of dogs trained to sniff out explosives may well be beneficial. Like passenger screening, once heavy baggage has been screened it is essential it should be marked and kept under surveillance. Rules related to reconciling passengers to their baggage should be established and adhered to. Vehicles - At high threat levels, a high proportion of vehicles might need to be searched. The deterrent effect of this is considerable. As with baggage, dogs trained to sniff explosives can be used, but physical search is the most reliable method. Where random searching or percentage screening is in force, the advice of security services should be sought in selecting which vehicles to search. If possible, a covered shed with nearby X-ray equipment should be chosen so that suspect packages can be subjected to X-ray examination. If shore screening is non-existent, ships might spot search vehicles on board if they are unable to do this before boarding. Although difficult, this may be necessary at high threats levels and should be practised. Vehicle owners/drivers should accompany all such searches and should not be allowed to land once their vehicle is on board without the express authority of a responsible ship's officer and the notification to shore authorities. The searching of freight trailers before boarding is notoriously difficult, but measures may need to be taken to meet this problem. This will involve co-operation from shore staff. Careful examination of paperwork and screening of drivers, coupled with reaction to good intelligence, goes some way to solving this problem. Customs are closely concerned with freight and should be consulted. For the future, developments in air sampling systems may improve the ability to check freight. In the final event, trailers can be 'unstuffed' and physically searched using all methods mentioned above, including sniffer dogs. Other Freight – Checking freight, especially bulk aggregates and liquids, is extremely difficult and costly but might need to be done on a random basis in response to a specific threat. Deliveries to Ships - Terrorists may well use innocent miscellaneous vehicles and people delivering stores to a ship. Good access control, personnel identification and random search will help to counter this risk.

___________________

30