Professional Documents
Culture Documents
Ship Security
Assessment
according to the International Code for the Security of
Ships and Port Facilities (The ISPS Code)
Vessel: ……………………………………………………….….………..
Operator: …………………………………………………………….……
……………………………………………………………………….………
This Ship Security Assessment (SSA) Guideline is made to assist owners and operators of
ships to carry out security assessments in a rational, standardised and systematic way. It is
prepared in accordance with the requirements of Part A of International Ship and Port Facility
Code (“the ISPS Code”, or, “the Code”), and taking into account the guidance in Part B. The
next Section 2 provides further background on the ISPS Code.
This SSA Guideline is prepared by also considering the requirements in the USCG Navigation
and Vessel Inspection Circular (NVIC) 10-02 Security Guidelines for Vessels. Even though
the ISPS Code (IMO - world-wide) and NVIC (USCG - US water) are two different, security
regimes, NVIC 10-02 has been developed to assist vessel operators and owners to align with
the security requirements under development in IMO at time of publication (October 2002).
We are therefore of the opinion that this Guideline meets the NVIC requirements to ship
security assessment. (Further, it should be noted that the USCG expects foreign flag vessels
to verify compliance with Part B of the ISPS Code, and not merely Part A. Eg, the USCG
requires that, “Verification of compliance could be established by flag administration
documents or endorsements that indicate that the Ship Security Certificate was issued based
upon full compliance with Part B” (from the Federal Register/Vol. 6, No 250/Dec 30, 2002.
This Guideline is primarily designed as a self assessment tool for Company and Ship Security
Officers and other people responsible for security ashore or onboard. It is divided into 4
Sections, plus appendices (A-E) which are provided in a format such that companies can use
them for their own vessels:
LIST OF CONTENT
The vessel owner and operator have the primary responsibility for ensuring the physical
security and safety of their vessels. Therefore, in addition to meeting the requirements of the
ISPS Code, this SSA Guideline is also prepared as a means to promote sound security
practices. The Guideline does not, relieve owners or operators of their legal responsibilities
neither with respect to the ISPS Code nor to any other parties, such as P&I clubs, crew, etc.
The SSA is an essential and integral part of the process of developing and updating the Ship
Security Plan (SSP). The relation between this SSA and the SSP can be illustrated in the
following way (see also Section 4):
Threat
information from
Background port
material required assessments
to conduct SSA
SSA SSP
Identify key Decide on corrective
shipboard operations security measures
It should further be noted that this Guideline does not provide any guarantee for the approval
of the SSP by the Contracting Government or the recognised security organization to which
this work has been delegated; it is up to the owner or operator to demonstrate that the
proposed security process described in this Guideline is duly documented and meets the
requirements of the ISPS Code.
Appreciating that every ship is unique – in design, operations, cargo, voyage pattern, etc. – a
ship owner/operator may wish to demonstrate that specific recommended security measures
are/are not appropriate for his specific ships. For the same reason of uniqueness, this
Guideline provides a method for owners/operators to balance the appropriate security
measures by evaluating his ship’s:
1. Key shipboard operations
2. Existing security measures.
3. Assessed threats, and,
4. Consequences and/or vulnerabilities (risk).
Finally, it should be recalled that achieved security is highly dependent on the human
element. Vigilance, prevention and response can only be as good as the crew’s skills,
knowledge, experience and attitude related to security. In addition to guiding you with carrying
out a SSA, we hope that this Guideline will promote good and sustainable security culture.
Against a background of potential threat to maritime shipping and ports, IMO’s Diplomatic
Conference on Marine Security in December 2002 adopted new regulations to enhance
maritime security through amendments to SOLAS Chapter XI. Chapter XI has been split into
two chapters, where Chapter XI-1, “Special measures to enhance maritime safety” has been
expanded to include additional requirements to Ship Identification Numbers and the carriage
of a Continuous Synopsis Record. Chapter XI-2, ”Special measures to enhance maritime
security”, addresses the mandatory requirements such as the provision of Ship Alert System
and refers to the ISPS Code., Only the ISPS Code, and its application for ships (not ports), is
dealt with in this document.
2.2 THE INTERNATIONAL SHIP AND PORT FACILITY SECURITY (ISPS) CODE
Owners and operators of ships have the primary responsibility for ensuring the physical
security – and safety, indeed – of their ships, and the new security measures are centred
around a proposed ISPS Code. Part A of the ISPS Code will be mandatory , whereas Part B
of the ISPS Code has been drafted as a guidance and is recommendatory. The regulations
and the ISPS Code will apply to the following ships on international voyages:
- All passenger ships including HSLC ships
- All cargo ships and HSLC above 500 gt
- MOU in transit.
In addition, the ISPS Code will apply to port facilities serving such ships engaged on
international voyages. The Code will take effect from July 1, 2004.
An important part of the Code is the way risk is treated: because each ship and each port
facility is different, the Contracting Government shall determine and set the appropriate
security level (see section 2.1 and 7 of Part A, and 1.8 and 4.8 of Part B):
The security levels create a link between the ship and the port facility since it triggers the
implementation of appropriate security measures for the ship and the port facility. Further, it
presents a methodology for performing security assessments so that plans and procedures to
react to changing security levels can be established. This SSA Guideline provides such a
methodology.
A Ship Security Plan (SSP) shall address the appropriate measures for the ship to move from
security level 1 to 2 and from 2 to 3. Security level 1 is the level to which the SSA Guideline
should be based, but the SSP must specify the additional protective measures to be
implemented for the heightened security levels (2 and 3).
Further, prior to commencing the SSA, the Company Security Officer (CSO) shall ensure that
advantage is taken of information available on threat assessment for the voyage pattern and
the ports at which the ship is calling. For ships trading between two (or more) fixed ports,
these ports must be taken into account in the SSA. For ships on the spot market, however,
ports of call may be difficult to envisage, and for such situations your company should select
typical and representative voyage pattern and ports you want to use in the SSA (and the
related SSP).
This Guideline deals with the part of the ISPS Code which is relevant to the SSA process
only. Therefore, other requirements and guidance set forth in the Code are not further
described here, and we refer to the Code for details about other ship security measures, port
facilities and the responsibilities of the Contracting Governments.
The SSA is an essential part of the process of developing and updating the SSP, and the
Company Security Officer (CSO) shall ensure that the SSA gives answers to the following
questions:
1. Does a particular
motive exist to 5. What are the
attack my ship? likelihood and
consequences?
Security Officer
In the ISPS Code language, Part A of the Code stipulates that the SSA shall include an on-
scene security survey where, at least, the following elements are included (see also figure,
previous Section 1.1):
Part B of the ISPS Code, gives further guidance as to how a SSA shall be carried out. The
CSO shall also ensure that the assessment is carried out by competent persons with skills to
evaluate the security of the ship. Importantly, the SSA shall be documented (electronic format
is accepted too), reviewed, accepted, and retained by the Company.
2.4 GLOSSARY
To provide a more precise understanding of the ISPS Code and this SSA Guideline, the
following definitions from Part A should be noted (see section 2 of Part A):
• Ship Security Plan (SSP) means a plan developed to ensure the application of measures
onboard the ship designed to protect persons onboard, cargo, cargo transport units, ship’s
stores, or the ship from the risks of a security incident.
• Port Facility Security Plan (PFSP) means a plan developed to ensure the application of
measures designed to protect the port facility and ships, persons, cargo, cargo transport
units, and ship’s stores within the port facility from the risk of a security incident.
• Ship Security Officer (SSO) means the person onboard the ship, accountable to the
Master, designated by the Company as responsible for the security of the ship, including
implementation and maintenance of the SSP and for liaison with the CSO and the PFSO.
• Company Security Officer (CSO) means the person designated by the Company for
ensuring that a Ship Security Assessment (SSA) is carried our; that a ship security plan
(SSP) is developed, submitted for approval, and thereafter implemented and maintained,
and for liaison with the Port Facility Security Officers (PFSO) and the Ship Security Officer
(SSO).
• Port Facility Security Officer (PFSO) means the person designated as responsible for the
development, implementation, revision, and maintenance of the PFSP and for liaison with
the SSO and the CSO.
• Declaration of Security (DOS) is an agreement reached between a ship, and either a port
facility or another ship with which it interfaces, which provides a means for ensuring that
the critical security concerns are properly addressed and security will remain in place
throughout the ships’s interface with the port facility or the other ship.. Security for the ship
is properly addressed by delineating the responsibilities for security arrangements and
procedures between a ship and waterfront facility.
• Security incident means any deliberate suspicious act threatening the security of the ship
(incl. a mobile offshore drilling unit), its crew, passengers, stores and cargo, or a port
facility.
• Security level means the qualification of the degree of risk that a security incident will be
attempted or will occur.
It is the responsibility of the user of this Guideline to review the SSA process in the light of the
current development in maritime security, and to revise the SSA, and the SSP, as and when
necessary.
2.6 REFERENCES
This document is based on the outcome of the Diplomatic Conference on Maritime Security
held in London in December 2002 where amendments to the SOLAS 74 were adopted. The
ISPS Code is included in the two documents SOLAS/CONF.5/DC/2 dated 11 December 2002
(Part A) and SOLAS/CONF.5/DC/2/Add.1 dated 12 December 2002.
It is also based on the USCG’s circular, Security Guidelines for Vessels (NVIC 10-02), see
Section 1 of this paper. It is further based on the experience and work of people with
considerable experience in maritime operations in general and security in particular.
The ship security assessment (SSA) process is divided into 8 steps as described below:
Initial screening, Step 1-3:
Step 1: Identify any particular motives that may exist to threat or harm your ship, persons,
cargo, or operations.
Step 2: Identify critical operations, activities, and persons that are important to protect.
Step 3: Get an overview of security measures in place. This is an in-office screening and not a
comprehensive review. Prioritise
operations, areas, systems, and
Step 1: Step 2: Step 3:
personnel for threat assessment, focus Motives Key ship Existing security
board measures Initial
operations
on those found most critical and with a screening
Identification
prioritization can be made, use a of needs
standard list of possible threat scenarios.
Step 5: Assess likelihood and potential Focused Ship Develop
Security Plan SSP
consequences of the scenarios. Do it
roughly and qualitatively. Likelihood may
be classified as “unlikely” and “not
unlikely”, and consequences as “moderate”, “high” and “extreme”. Prioritise scenarios
found “not unlikely” in combination with consequence severity “high” or “extreme”.
Onboard audit, Step 6-7:
Step 6: Develop a ship security survey checklist that reflects the prioritised scenarios, existing
measures assumed to be in place, and critical operations.
Step 7: Survey your ship with the checklist. Identify measures in place and comment on
deficiencies, training needs, safety conflicts, manning constraints, security equipment
Identification of needs, Step 8:
Step 8: Evaluate identified improvement needs through the ship security survey in terms of
required security measures and weaknesses of existing measures.( and of possible
remedial actions?)
After these 8 steps, the SSA is complete. The steps should be documented and is a basis for
the development of a SSP. Remember also to document the limitations/assumptions of the
SSA (trading area, onboard systems, etc.) The remainder of this SSA Guideline gives detailed
descriptions for each step (1-8) including related checklists and other tools.
Application: The identified motives form a basis for the identification of possible threat
scenarios (Step 4).
What to do: Use proposed worksheet (Appendix A). The worksheet is not complete and it
should be used as a guideline only. Add your own questions – be creative!
Political
Economical
11.september
Symbolic
Fear
Keep the outcome from this evaluation of motives fresh in mind when you later on go through
Step 4, “Identification of possible threat scenarios”. But first you should identify key shipboard
operations (Step 2) and your existing security measures (Step 3).
Application: To prioritise the most critical operations, systems, areas, and personnel to
protect with respect to a security incidents.
What to do:
1. Obtain and record the information required to conduct the ship security assessment, such
as general layout of ship, stowage arrangement plans, etc (ref. Part B, 8.5)
2. Identify critical ship operations where security incidents may take place (e.g., cargo
operations, bunkering, repair work, change of crew/passengers, etc.).
3. List systems, physical areas, and personnel that may be targeted and used in security
incidents. Which are important to protect? The attached worksheet (Appendix B) gives
some initial ideas as to how to structure this activity. The worksheet includes all elements
that is recommended to be covered by the ship security plan (Part B, 9.1-9.6). The SFI
Group System may also be used to further trigger some ideas.
4. Go through the list, discuss and identify the critical operations, systems, areas, and
personnel that may be important to protect to prevent threats or security incidents.
The figure below illustrates the main critical operations (as in Appendix B) and systems,
areas, operations, and personnel that may be relevant for your vessel (list is not exhaustive –
your list may look different).
Navigation
Security capacity
CRITICAL OPERATIONS communication
system
Security
1 People accessing the ship communication
system
2 Ship navigation and operation
Emergency
• Loading Ship stores
3 Cargo handling response
• Voyage
4 Ship stores handling Crew,
• Discharging/ passengers,
5 Security monitoring embarkation visitors
6 Emergency response
The ship (hull,
propellers, …)
Cargo
OPERATIONS
What to do: This is an office screening of your existing security measures rather than an
onboard survey (this you will do later on!). Use Appendix B to help you through:
1. Identify security measures in place for each critical operation, and give some key words
for what kind of measures that do exist.
2. Refer to the list for critical operations (Step 2), and prioritise those operations, systems,
areas, and personnel found critical with limited/weak security measures in place (the
upper-right corner of the right-hand box, see below).
The figure illustrates the described process: From identifying key shipboard operations (Step
2), to assessing existing security measures (this Step 3).
5 ……..……. ……..…….
Security measures in place?
6 ……..……. ……..……. Yes No
Application: To assess relevant threats of the ship to prioritise the vital few for planning of
security measures. The threat scenarios will further be evaluated with respect
to vulnerability (Step 5).
At berth
At anchor
At sea
Application: To give guidance with respect to operations, areas, systems and personnel
that should be evaluated and surveyed to identify whether additional security
measures are required.
What to do: Use the list of threat scenarios developed (Step 4/Appendix C). Do not try to
quantify consequences and likelihood, but indicate if they are “low” or “high”:
1. Assess whether some scenarios are more likely than others. Take into account motives,
existing measures and critical operations when assessing the likelihood. Likelihood may
be categorised in terms of “unlikely” and “not unlikely”.
2. Assess potential outcome of the scenarios. A consequence categorisation (“moderate”,
“high” and “extreme”) is provided in Appendix C.
3. Prioritise the scenarios that are “not unlikely” in combination with consequence severity
“high” and “extreme” (the two upper-right squares in the right-hand figure, below).
Scenarios
Consequences Likelihood
1 …...………
1
unlikely
6 4
Not
2 …..……….
3
3 ……..…….
4 ……..…….
Unlikely
5 ……..……. 2 5
6 ……..…….
Application: The checklist shall be used to perform, and document, an onboard ship
security survey.
What to do: Build your ship specific checklist by using Appendix D, the information
gathered so far and, most importantly, your own experience related to your ship and your
trading area(s). Appendix D is not meant to be a comprehensive checklist but rather a generic
guide which will assist you in the work to build a specific checklist for your ship:
Generic checklist
1. Identify operations, areas, systems, and personnel related to the threat scenarios developed
in Step 5.
2. Select the most relevant security areas from Appendix D.
3. Add the existing security measures – and the gaps – identified in Step 3.
4. Identify any additional items to verify onboard according to your own experience.
Importantly, Appendix E provides you with an overview over measures recommended by the
ISPS Code related to security level 1, 2, and 3. You should also consider this according to
what security level you are currently evaluating for.
What to do:
1. Perform an onboard assessment of the ship security by using your checklist developed
in Step 6.
2. Go through each item on the checklist and make remarks about the weaknesses, such
as:
a. Conflict between security and safety measures
b. Conflicts between shipboard duties and security assignments
c. Watch keeping and manning constraints with implications on crew fatigue,
alertness, and performance
d. Security training deficiencies
e. Insufficient, poorly maintained, sub-standard security equipment/systems.
1…...……..
2………….
5………….
6………….
7………….
8………….
Application: The identified needs form the basis for the Ship Security Plan by having
identified what to plan for.
What to do:
1. Go through the checklist from the ship security survey and evaluate the areas where
remarks have been made.
2. Identify improvement needs per area.
3. Propose remedial actions for the same “security gaps”.
1…...……..
2………….
5………….
6………….
7………….
8………….
This section provides an overview of some important requirements of the ISPS Code to the
Ship Security Plan (SSP) and some recommendations as to how to structure the SSP.
The SSA is, as stated earlier, and essential an integral part of the process of developing and
updating the ship security plan (SSP). The SSA shall be documented, reviewed, accepted
and retained by the Company, and the submission of a SSP, or amendments, for approval
shall be accompanied by the documented SSA on the basis of which the SSP, or the
amendments, has been developed. The ISPS Code, Part A and B, section 9, provides
detailed requirements to the SSP.
There is not only one right way to structure and prepare a good SSP. Based on experience
already done with the making and review of SSP’s, a few general recommendations should
be noted:
1. Start with the SSP requirements in the ISPS Code, Part B in particular. The
Code provides comprehensive information to the content of the SSP.
2. Keep it simple and practical (and remember, what’s in the SSP, you must
follow)!
3. Use a structured, systematic approach.
4. The documented SSA process is a very important basis for the SSP – the
output from the SSA process has provided you with a huge amount of
information and knowledge, and has significantly raised your security
awareness, making it easier to prepare the SSP.
So, how should a good SSP look like? As mentioned, every SSP will look different, and the
SSP that fits your ship is not necessarily the right one for another ship. This SSA Guideline
will not go into detail in the making of a high-quality SSP, but a good guidance as to how to
structure the SSP can be found by looking at a few external sources. One such guideline can
be found in the recommendations to the SSP from the USCG (NVIC 10-02), “Vessel Security
Plan Outline””:
1. Introduction
2. Ship data, drawings
3. Ship organisation/ ship security organisation
3. Company Security Officer (CSO)
4. Ship Security Officer (SSO)
5. Plan documentation
6. Communication and co-ordination with port, waterfront facility, law enforcement,
company, the CSO and the SSO
7. Ship Security Assessment
Another source of information can be found by looking at the (preliminary) checklist to a SSP
prepared by an RSO (Det Norske Veritas). Remember, it is the RSO who is going to approve
your SSP. The following checklist – based on the ISPS Code, indeed – will most likely be
modified in the coming weeks and months as more SSP’s are approved, yet it provides a
good idea to the required content & structure of an SSP:
1 General
1.1 Introduction
1.2 Ship, port, and trade specific data
1.3 Ship data
2 Ship Security Assessment
2.1 General
2.2 Qualifications
2.3 Expert assistance
2.4 Prerequisites
2.5 Information required
2.6 Threats and vulnerabilities
2.7 Identification of measures
2.8 Examination of access
2.9 Existing security measures
2.10 Potential vulnerabilities
2.11 On-scene security survey
3 SSP Details
3.1 General
3.2 Company statement
3.3 Master’s discretion
3.4 Ship organization and communication
3.5 Company Security Officer
Relevant report forms, e.g. on reporting of unlawful acts, should also be included in the SSP.
Other RSO’s have their own, and probably alternative, checklists to the content of an SSP.
It should also be mentioned that the Company is obligated to ensure that the SSP contains a
clear statement emphasising the Master’s authority. The Master has the overriding authority
and responsibility to make decisions with respect to the security of his ship, and to request the
assistance of the Company, or of any Contracting Government, as may be necessary. The
Company shall ensure that the Company Security Officer, the Master and the Ship Security
Officer are given the necessary support to fulfil their duties and responsibilities in accordance
with the Code.
Motivating factors?
Motive: Questions to be asked: Example: Comment:
Not likely Probable Likely
1. POLITICAL:
1.1 Does it exist political (incl. religious, ideological, Cargo (e.g. weapon parts, Norwegian whale, nuclear
ethnical, nationalistic) motives related to your ship cargo) and trade area/port (Middle East, US)
(flag, owner, crew) or trade (cargo, passengers, trade
area or port)?
1.2 Does your ship trade in an area with unstable political Countries with elections, demonstrations, civil war,
situation? riots (West Africa, Middle East)
1.3 Add other relevant questions:
2. SYMBOLIC:
2.1 Can your ship be used as a means to harm symbolic Well known buildings, statues, bridges, etc. (Golden
constructions on the trade? gate, Sidney opera, etc.)
2.2 Does your ship visit a port where international events Exhibitions, sports, political, etc. (Olympic Games,
take place? EXPO, WTO meeting, etc.)
2.3 Can your ship be used as means to harm important Areas for tourism, commercial exploitation of nature
environmental areas? (fish farming, beaches, coastal cities, etc.)
2.4 Does your ship itself represent or carry a symbolic Ship carries special cargo (e.g. weapons), support
value? operations (oil to war actions, equipment to industry
projects), represent attitudes at debate (cruise,
natural resources, etc.).
2.5 Does the visibility or the profile of your ship, company Because of your policy (exploitation of labour, political
or brand represent a motive for unlawful acts? attitudes), the operations you are involved (natural
resources, weapons, etc.).
2.6 Add other relevant questions:
3. ECONOMICAL:
3.1 Gain:
3.1.1 Does your ship carry special cargo (economical value, Plutonium, equipment for mass destruction, etc.
restricted availability)?
3.1.2 Is it likely that terror related smuggling take place from Smuggling of people/goods from Africa to Italy.
ports your ship is visiting? (Intelligence)
3.1.3 Is it likely that your crew can take part in or embrace Ethnical motives and common cause.
terror related smuggling?
3.1.4 Is your ship trading in an area known for piracy? See Annual Piracy Report (ICC)
3.1.5 Does your ship, cargo or passengers represent risk Valuable ship, cargo and passengers used for threats
for Hijacking? and barging demands.
3.1.6 Add other relevant questions:
3.2.4 Will an unlawful act against your ship or trade harm Reduced market due to reduced trust (cruise,
the state of the industry? passenger transport, etc.)
3.2.5 Add other relevant questions:
4 FEAR:
4.1 Can your ship be used as a means to escalate Explosion, collision with construction, ammonia
consequences and thus create fear in the society? discharge, etc. Because of the consequences that
result (numerous fatalities of passengers, discharge
of radio actives, etc.)
4.2 Add other relevant questions:
5 OTHER:
5.1 Are there any other motives for use of unlawful acts Unlawful acts towards your ship will result in media
against your ship? attention.
5.2 Add other relevant questions:
OVERALL ASSESSMENT OF MOTIVES - Summarise the check-offs and evaluate which one that should be considered
Security measures in
Operations with related systems, areas and personnel Criticality place Comments
Low High Yes No
2. RESTRICTED AREAS ON THE SHIP
2.1 Navigation bridge
2.2 Navigational means (radio, radar, GPS, etc.)
2.3 Machinery spaces, power supplies, steering rooms
2.4 Control rooms
2.5 Galley/pantry
2.6 Ventilation and air conditioning system
2.7 Spaces with access to potable water tanks, pumps or manifold
2.8 Hull, ballast tanks
2.9 Rudder and propeller
Add issues you find relevant
3. CARGO HANDLING
3.1 Cargo access points (hatches, ports, pipings)
3.2 Cargo storage spaces (incl. access points)
3.3 Spaces containing dangerous goods or hazardous substances
3.4 Cargo handling equipment
Add issues you find relevant:
Security measures in
Operations with related systems, areas and personnel Criticality place Comments
Low High Yes No
4. SHIP STORES HANDLING
4.1 Access points for delivery to ship
4.2 Storage spaces
4.3 Access points to storage spaces
Add issues you find relevant:
5. SECURITY MONITORING
5.1 Lighting
5.2 Watch-out (voyage)
5.3 Security guards and deck watches, including patrols
5.4 Automatic intrusion detection advice
5.5 Surveillance monitoring
5.6 Security and surveillance equipment spaces
Add issues you find relevant:
6. SAFETY OPERATIONS
6.1 Life boats and life belts
6.2 Alarms, signals and marking
6.3 Evacuation routes
6.4 Fire fighting system
Add issues you find relevant:
The SSA should consider all possible threats, which may include (ISPS Code Part B, 8.9):
Hijacking Others take Unauthorised Tampering
Means,
1. Damage to, or destruction of, the ship (bombing, arson, sabotage) methods ISPS Code, Part control over access with cargo
B, 8.9.2 ship Part B, 8.9.4 Part B, 8..3
2. Hijacking or seizure of the ship/persons onboard
3. Tampering with cargo, ship equipment, systems ship stores At berth
6. Use the ship to carry perpetrators and their personal equipment Security
Use the
ship as a
Damage to
or destruction
Damage to
cargo or
Smuggling
of
Use the
ship to carry
incidents weapon of the ship passenger weapons perpetrators
7. Use of the ship as weapon or as means to cause damage, destruction Part B, 8.9.7 Part B, 8.9.1 onboard Part B, 8.9.5 Part B, 8.9.6
This list below is not comprehensive but it provides you with a long range of scenario examples. Try to think “out of the box”, and find scenarios that are
relevant for your vessel and your trade. Make comments and evaluate consequences and likelihood on an appropriate level.
Possible Consequences
Relevant: Likelihood
Threat: - Human, Material, Environment
Comment:
Not Not
Yes No Moderate High Extreme
likely unlikely
2. Hijacking or seizure of the ship or of
persons on board
• Crew takes control over ship
• Passengers take control
Possible Consequences
Relevant: Likelihood
Threat: - Human, Material, Environment
Comment:
Not Not
Yes No Moderate High Extreme
likely unlikely
3. Tampering with cargo, essential ship
equipment or systems or ship’s stores
• Block critical systems like propulsion, steering etc
• Contaminate bunker
• Damage ship systems, navigation, loading,
• False nav data/guidance (radar, VTS, pilot, chart)
• Contaminate drinking water or food
• Release gas onboard
• Contaminate cargo
• Destroy lifesaving equipment
• Destroy ship interiors
• ……other
•
Possible Consequences
Relevant: Likelihood
Threat: - Human, Material, Environment
Comment:
Not Not
Yes No Moderate High Extreme
likely unlikely
4. Unauthorised access or use including
presence of stowaways
• Stowaways sneaking onboard /hiding in cargo
• Boarding ship at port or during voyage as
“passenger” or “crew”
• Boarding ship at port or during voyage as “pilot”,
“supplier”, “surveyor”, fake castaway
• Unauthorised boarding ship at pilot entrance or STS
operations
• Unauthorised boarding of ship at voyage via
vessel/craft/helicopter
• Unauthorised boarding ship at voyage via
shipwrecked
• (Unauthorised use, see item 5)
• ……other
•
Possible Consequences
Relevant: Likelihood
Threat: - Human, Material, Environment
Comment:
Not Not
Yes No Moderate High Extreme
likely unlikely
5. Smuggling weapons or equipment,
including weapons of mass destruction
• Hide goods in cargo
• Hide goods in crews luggage
• Hide goods in passengers luggage
• Hide goods in ship supplies
• ……other
Possible Consequences
Relevant: Likelihood
Threat: - Human, Material, Environment
Comment:
Not Not
Yes No Moderate High Extreme
likely unlikely
6. Use of the ship to carry perpetrators
and their personal equipment
• Stowaways sneaking onboard /hiding in cargo
• Boarding ship at port or during voyage as
“passenger” or “crew”
• Boarding ship at port or during voyage as fake
“pilot”, “supplier”, “surveyor”, or similar
• …..other
•
Possible Consequences
Relevant: Likelihood
Threat: - Human, Material, Environment
Comment:
Not Not
Yes No Moderate High Extreme
likely unlikely
7. Use of the ship itself as a weapon or as
a means to cause damage or destruction
• Crew take control over ship
• Passengers take control
• Stowaways/boarded person take control
• Block critical systems like propulsion, steering etc in
a critical position (near terminal etc)
• Given a hijacked situation (item 4):
Take control over ship and hit another ship
• Given a hijacked situation (item 4):
Take control over ship and hit a landbased
construction / terminal / chemical plant or similar
• Given a hijacked situation (item 4):
Take control over ship and hit an offshore
installation
• Given a hijacked situation (item 4):
Take control over ship and hit a rock / provoke
grounding
• ……other
•
PURPOSE
The SSA should consider the continuing relevance of the existing security measures and
guidance, procedures and operations, under both routine and emergency conditions and
should determine security guidance.
For practical purposes, and for the design of this checklist, we assume that a Ship Security
Plan (SSP) is already in the making and/or onboard. If this is (still) not the case, please do not
put too much emphasis on the questions in this checklist that directly refers to the SSP.
ABBREVIATIONS
A Is the Master, Ship Security Officer (SSO), and crew familiar with
the company’s security objective and policy?
Page 34
Ship Security Assessment Guideline Appendix D
A Are there 24-hour contact details for the CSO available onboard?
A Has this person been acting as SSO for the last 3 months?
Page 35
Ship Security Assessment Guideline Appendix D
Is there a policy and procedures for how the SSO should handle
safety and security conflicting issues?
5. MASTER
5. SHIP’S PERSONNEL
Page 36
Ship Security Assessment Guideline Appendix D
A Are there procedures for onboard for security training and drills
(both for officers and ratings)?
• Vessel details
Page 37
Ship Security Assessment Guideline Appendix D
port facilities?
9. SECURITY RECORDS
Are records with memos from onboard security meetings are kept
onboard?
Page 38
Ship Security Assessment Guideline Appendix D
Are there procedures for advising the PFSO if the ship has a
higher security level than the port?
Page 39
Ship Security Assessment Guideline Appendix D
Are there procedures and records available for how to check this?
Are the reasons for the people boarding the ship confirmed by
checking joining instructions, passenger tickets, boarding passes,
work orders etc?
Are checked persons and their personal effects segregated from May be deleted from
unchecked persons and their personal effects? Part B in Dec.
Page 40
Ship Security Assessment Guideline Appendix D
Page 41
Ship Security Assessment Guideline Appendix D
2. RESTRICTED AREAS
Page 42
Ship Security Assessment Guideline Appendix D
3. HANDLING OF CARGO
Are any checks carried out (procedures for) to ensure that cargo
being loaded matches the cargo documentation?
Are there procedures ensuring, in liaison with the port facility, that
vehicles to be loaded on board car-carriers, ro-ro and passenger
ships are subjected to search prior to loading, in accordance with
the frequency required in the SSP?
Page 43
Ship Security Assessment Guideline Appendix D
4. SHIP’S STORE
Page 44
Ship Security Assessment Guideline Appendix D
5. UNACCOMPANIED BAGGAGE
Page 45
Ship Security Assessment Guideline Appendix D
Are the ship's deck and access points illuminated at all times
while conducting ship/port interface activities or at a port facility or
anchorage?
6. MONITORING THE SECURITY OF THE SHIP – RECOMMENDED MEASURES FOR SECURITY LEVEL 2
6. MONITORING THE SECURITY OF THE SHIP – RECOMMENDED MEASURES FOR SECURITY LEVEL 3
Page 46
Ship Security Assessment Guideline Appendix D
OTHER
A Are there procedures for the use of the ship security alert system
A Are the locations for the activation of the alert system identified?
(Must be kept in a restricted/confidential document)
Page 47
Ship Security Assessment Guideline Appendix E
Measures
1. Access to the Ship by ship’s
personnel, passengers, visitors, Security Level 1 Security Level 2 SecuritySecurity Level 3
etc.
The SSP should establish the security At security level 1, the SSP should establish the At security level 2, the SSP should establish the At security level 3, the ship should comply with the
measures covering all means of security measures to control access to the security measures to be applied to protect against a instructions issued by those responding to the
access to the ship identified in the ship, where the following may be applied: heightened risk of a security incident to ensure security incident or threat thereof. The SSP should
SSA. This should include any: higher vigilance and tighter control, which may detail the security measures which could be taken by
1. checking the identity of all persons seeking to include: the ship, in close co-operation with those responding
1. Access ladders; board the ship and confirming their reasons for and the port facility, which may include:
2. access gangways; doing so by checking joining instructions, 1. assigning additional personnel to patrol deck
3. access ramps; passenger tickets, boarding passes, work orders areas during silent hours to deter unauthorised 1. limiting access to a single, controlled, access
4. access doors, side scuttles, etc; access; point;
windows and ports; 2. in liaison with the port facility the ship should 2. limiting the number of access points to the ship, 2. granting access only to those responding to the
5. mooring lines and anchor chains; ensure that designated secure areas are identifying those to be closed and the means of security incident or threat thereof;
6. cranes and hoisting gear, and established in which inspections and searching of adequately securing them; 3. directions of persons on board;
7. other access points identified in the people, baggage (including carry on items), 3. deterring waterside access to the ship, including, 4. suspension of embarkation or disembarkation;
SSA. personal effects, vehicles and their contents can for example, in liaison with the port facility, 5. suspension of cargo handling operations,
take place provision of boat patrols deliveries etc;
3. in liaison with the port facility the ship should 4. establishing a restricted area on the shore-side of 6. evacuation of the ship;
ensure that vehicles destined to be loaded on the ship, in close co-operation with the port 7. movement of the ship;
board car carriers, ro-ro and other passenger facility; 8. preparing for a full or partial search of the ship.
ships are subjected to search prior to loading, in 5. increasing the frequency and detail of searches of
accordance with the frequency required in the people, personal effects, and vehicles being
SSP; embarked or loaded onto the ship;
4. segregating checked persons and their personal 6. escorting visitors on the ship;
effects from unchecked persons and their 7.providing additional specific security briefings to
personal effects; all ship personnel on any identified threats, re-
6. segregating embarking from disembarking emphasising the procedures for reporting
passengers; suspicious persons, objects, or activities and the
7. identification of access points that should be stressing the need for increased vigilance; and,
secured or attended to prevent unauthorized 8. carrying out a full or partial search of the ship.
access;
8. securing, by locking or other means, access to
unattended spaces adjoining areas to which
passengers and visitors have access; and
9. providing security briefings to all ship personnel
on possible threats, the procedures for reporting
suspicious persons, objects or activities and the
need for vigilance.
2. Restricted Areas on the Ship. Security Level 1 Security Level 2 SecuritySecurity Level 3
The SSP should identify the restricted At security level 1, the SSP should establish the At security level 2, the frequency and intensity of the At security level 3, the ship should comply with the
areas to be established on the ship, security measures to be applied to restricted areas, monitoring of, and control of access to restricted instructions issued by those responding to the
specify their extent, times of which may include: areas should be increased to ensure that only security incident or threat thereof. The SSP should
application the security measures to authorized persons have access. The SSP should detail the security measures which could be taken by
be taken to control access to them 1. locking or securing access points; establish the additional security measures to be the ship, in close co-operations with those
and those to be taken to control 2. using surveillance equipment to monitor the applied, which may include: responding and the port facility, which may include:
activities within them. Restricted areas areas;
may include: 3. using guards or patrols; and 1. establishing restricted areas adjacent to access 1. the setting up of additional restricted areas on the
4. using automatic intrusion detection devices to points; ship in proximity to the security incident, or the
1. navigation bridge, mach. spaces of alert the ship’s personnel of unauthorised access. 2. continuously monitoring surveillance equipment; believed location of the security threat, to which
category A and other control and access is denied; and
stations as defined in Ch.II-2; 3. dedicating additional personnel to guard and 2. searching of restricted areas as part of a search of
2. spaces containing security and patrol restricted areas. the ship.
surveillance equipment and
systems and their controls and
lighting system controls;
3. ventilation and air-conditioning
systems and other similar spaces;
4. spaces with access to potable
water tanks, pumps, or manifolds;
5. spaces containing dangerous
goods or hazardous substances;
6. spaces containing cargo pumps
and their controls;
7. cargo spaces and spaces
containing ship’s stores;
8. crew accommodation; and
9. any other areas as determined by
the CSO, through the SSA to which
access must be restricted to
maintain the security of the ship.
3. Handling of Cargo.
Security Level 1 Security Level 2 Security Level 3
The security measures relating to At security level 1, the SSP should establish the At security level 2, the SSP should establish the At security level 3, the ship should comply with the
cargo handling should: security measures to be applied during cargo additional security measures to be applied during instructions issued by those responding to the
handling, which may include: cargo handling, which may include: security incident or threat thereof. The SSP should
1. prevent tampering, and detail the security measures which could be taken by
2. prevent cargo that is not meant for 1. routine checking of cargo, cargo transport units 1. detailed checking of cargo, cargo transport units the ship, in close co-operation with those responding
carriage from being accepted and and cargo spaces prior to, and during, cargo and cargo spaces; and the port facility, which may include:
stored on board the ship. handling operations; 2. intensified checks to ensure that only the
2. checks to ensure that cargo being loaded intended cargo is loaded; 1. suspension of the loading or unloading of cargo;
The security measures should include matches the cargo documentation; 3. intensified searching of vehicles to be loaded on and
inventory control procedures at 3. ensuring, in liaison with the port facility, that car-carriers, ro-ro and passenger ships; and 2. verify the inventory of dangerous goods and
access points to the ship. Once on vehicles to be loaded on board car-carriers, ro-ro 4. increased frequency and detail in checking of hazardous substances carried on board, if any,
board the ship, cargo should be and passenger ships are subjected to search seals or other methods used to prevent and their location.
capable of being identified as having prior to loading, in accordance with the frequency tampering.
been approved for loading onto the required in the SSP; and
ship. In addition, security measures 4. checking of seals or other methods used to Detailed checking of cargo may be accomplished by
should be developed to ensure that prevent tampering. the following means:
cargo, once on board, is not tampered 1. increasing the frequency and detail of visual and
with. Checking of cargo may be accomplished by the physical examination;
following means: 2. increasing the frequency of the use of scanning/
1. visual and physical examination; and detection equipment, mech. devices, dogs; and
2. using scanning/detection equipment, mechanical 3. co-ordinating enhanced security measures with
devices, or dogs. the shipper or other party in accordance with an
established agreement and procedures.
4. Delivery of Ship’s Stores. Security Level 1 Security Level 2 Security Level 3
The security measures relating to the At security level 1, the SSP should establish the At security level 2, the SSP should establish the At security level 3, the ship should comply with the
delivery of ship’s stores should: security measures to be applied during delivery of additional security measures to be applied during instructions issued by those responding to the
ship’s stores, which may include: delivery of ship’s stores by exercising checks prior security incident or threat thereof. The SSP should
1. ensure checking of ship’s stores to receiving stores on board and intensifying detail the security measures which could be taken by
and package integrity; 1. checking to ensure stores match the order prior to inspections. the ship, in close co-operation with those responding
2. prevent ship’s stores from being being loaded on board; and and the port facility, which may include:
accepted without inspection; 2. ensuring immediate secure stowage of ship’s
3. prevent tampering; and stores. 1. subjecting ship’s stores to more extensive
4. prevent ship’s stores from being checking;
accepted unless ordered. 2. preparation for restriction or suspension of
handling of ship’s stores; and
For ships regularly using the port 3. refusal to accept ship’s stores on board the ship.
facility it may be appropriate to
establish procedures involving the
ship, its suppliers and the port facility
covering notification and timing of
deliveries and their doc. There should
always be some way of confirming
that stores presented for delivery are
accompanied by evidence that they
have been ordered by the ship.
5. Handling Unaccompanied
Security Level 1 Security Level 2 Security Level 3
Baggage.
The SSP should establish the security At security level 1, the SSP should establish the At security level 2, the SSP should establish the At security level 3, the ship should comply with the
measures to be applied to ensure that security measures to be applied when handling additional security measures to be applied when instructions issued by those responding to the
unaccompanied baggage (i.e. any unaccompanied baggage to ensure that handling unaccompanied baggage which should security incident or threat thereof. The SSP should
baggage, including personal effects, unaccompanied baggage is screened or searched include 100 percent x-ray screening of all detail the security measures which could be taken by
which is not with the passenger or up to and including 100 percent, which may include unaccompanied baggage. the ship, in close co-operation with those responding
ship’s personnel member at the point use of x-ray screening. and the port facility, which may include:
of inspection or search) is identified
Postal address:
P.O.Box 1452 Vika, NO-0116 Oslo
Visiting address:
Rådhusgaten 25, NO-0158 Oslo