Professional Documents
Culture Documents
Introduction
Security for Seafarers came into focus because of three factors:
1. The impact of the 9/11 terrorist attacks (notably the launch of counter-terrorist
operations at sea),
2. The occurrence of three high visibility terrorist acts against ships (USS Cole in
2001, French tanker Limburg in 2002 and Filipino passenger ship Super Ferry 14
in 2004), and
3. The rise of piratical attacks in the Strait of Malacca at the beginning of the
century.
Following that, the surge of piracy at the Horn of Africa between 2007 and 2012 largely
contributed to generating debates on the legal, criminal, cultural, economic, military,
environmental and energy dimensions of piracy in particular and maritime security in
general. The maritime security geo-strategies in 2014 demonstrate that states’ and
international institutions’ maritime security objectives and interests are indirectly and
directly influenced by geographical and geopolitical considerations. The expression
‘maritime security’ is recent. Since the end of the 1990's and the beginning of the
2000's, maritime security was increasingly used to describe preventive measures set up
to respond to illegal activities at sea or from the sea (including the protection of shipping
and ports).
Terrorism (post 9/11) and piracy (especially after 2007 and the rise of attacks at the
Horn of Africa) attracted most of the media’s attention. However, arms and drug
trafficking, people smuggling, illegal, unregulated and unreported fishing, and deliberate
pollution still represent the bulk of illegal and disruptive activities at sea.
The maritime domain is a space within which human actors operate, either to perform
illegal, disruptive and damaging activities or to police and secure the sea in order to fight
criminal actors. Maritime security refers to a geographical space, that is to say the sea,
which has different characteristics compared to the land. States’ maritime security
interests result in a practice consisting in projecting security beyond their external
boundary into the global maritime domain. Thus, zones of interests are defined, which
extend beyond one’s legal zone. In security narratives, those maritime zones are
represented as vital for one’s security, which justifies power projection activities.
The need to enhance maritime security came with the rise of piracy off the coast of
Somalia between 2008 and 2011. The dangers of piracy for international trade brought
the maritime dimension of security to the global consciousness and lifted it high on
policy agendas. Moreover, the inter-state tensions in regions, such as the Arctic, the
South China Sea, or the East China Sea and the significant investments in blue water
navies of emerging powers, such as India and China, have increased attention for the
oceans as a security space.
Safety concerns are core to maritime security given that it may involve environmental
and cultural interests. Marine safety has also been increasingly linked to maritime
security given that the maritime industry, shipping companies and their employees are
simultaneously potential targets (e.g. of pirates, terrorists, or criminals) as well as
potential perpetrators (by engaging in maritime crimes such as trafficking of persons,
illicit goods or weapons or in collaborating with violent actors).
Maritime security is also linked to economic development. Throughout history the oceans
were always of vital economic importance. The majority of trade is conducted via the sea
. Both global shipping and fisheries have developed into multi-billion industries. The
commercial value of the oceans has moreover been increasingly re-evaluated due to the
economic potential of offshore resources, centrally fossil energy but also seabed mining,
as well as the economic promises of coastal tourism. The concept of blue economy is
linked to maritime security since sustainable management strategies not only require the
enforcement and monitoring of laws and regulations, but a secure maritime environment
provides the precondition for managing marine resources.
The major concern and scope for this course is limited to marine safety, under the
regime of the IMO that oversees the interest of the shipping industry and the individual
interests of the seafarer.
For almost two decades, maritime security has largely been framed by the
implementation of the International Ship and Port Facility Security (ISPS) Code, which
focuses on detecting and preventing security threats against ports and ships. But due to
increasing concern for the safe and secure movement of cargo, as well as the maturity of
the implementation of the ISPS Code over the last 15 years, maritime security has
begun to focus on treating ports and ships as conduits within the supply chain—not just
targets.
This shift from port and vessel security to broader cargo and supply chain security is
driven by the evolution of both global trade and threats to the supply chain—issues that
the ISPS Code does not adequately address. While the code has well-established security
requirements for ports and ships, it views these assets as targets of nefarious activities—
specifically terrorism—and not as broader conduits of illicit activity or movement of
contraband or theft of cargo.
As global trade continues to increase at a rapid rate, there is more cargo in the system,
as well as an increasing reliance on just-in-time delivery, which makes cargo and supply
chain security more sensitive to disruption, with greater potential impacts. The
movement of cargo is also increasingly dependent on electronic data streams, which
increase the risks of converged cyber, physical, and operational security challenges.
Maritime security is no longer just about protecting vessels and ports—it goes hand-in-
hand with cargo and supply chain security. Updated codes, regulations, and best
practices should reflect this evolution of the industry. This shift should emphasize a
broader focus on maritime security as an integrated system of physical assets, cargo,
and data that needs to be secure and resilient, rather than simply a collection of ports
and ships that need to be protected.
IntroductionCourse overview
Course overview
Course Objective
The course is designed to provide seafarers with the knowledge required to perform
designated security duties in connection with the Ship Security Plan (SSP). These duties
are as required as per Chapter XI -2 of SOLAS 74 and Section A-VI/6 of the STCW Code
as amended.
IntroductionCompetences to be achieved
Competences to be achieved
Competences that will be achieved through completion of the course
After completing the course a trainee will be competent in the following matters related
to ship security
The Year 2018 Reports and trend - The IMB Piracy Reporting Centre has released its
global piracy report for 2018, and it warns that the maritime industry experienced a net
increase in attacks year-over-year. In particular, the agency recorded a "marked rise in
attacks against ships and crews around West Africa." Worldwide, the IMB recorded 201
incidents of maritime piracy and armed robbery in 2018, up from 180 in 2017. The Gulf
of Guinea is particularly dangerous for seafarers: reports of attacks in waters between
the Ivory Coast and the Congo more than doubled in 2018, and these incidents
accounted for the overwhelming majority of serious acts of piracy worldwide. The Gulf of
Guinea accounted for all six hijackings, 13 of the 18 ships fired upon, 130 of the 141
hostages held, and 78 of 83 seafarers kidnapped for ransom worldwide.
In a worrisome trend, this violence accelerated in the last quarter of the year. 41
kidnappings were recorded off Nigeria between October and December, more than half
the annual total. Some of these attacks occurred up to 100 nm offshore, well outside of
the territorial waters of West African states.
There is an urgent need for increased cooperation and sharing of intelligence between
the Gulf of Guinea’s littoral states so that effective action can be taken against pirates,
both at sea and on shore where their operations originate and end.
The International Maritime Bureau (IMB) is aware of the escalating level of this
criminal activity, and provides a free service to the seafarer by establishing the 24 hour
IMB Piracy Reporting Center (PRC) in Kuala Lumpur, Malaysia.
● A piracy map
● A live piracy report
● Piracy prone areas and warnings
● Piracy news
● A piracy report
● A contact point to report piracy incidents
Terrorism
Terrorism is covertly planned but dramatic action, by clandestinely organised, often
unrepresentative groups, to spread fear by extreme violence in order to coerce, or
provoke a government or populace to take a particular course of political action desired
by the terrorists.
Example of terrorists use of shipping - In October 2001 in the Italian port of Gioia Taurio
an Egyptian Al Qaeda suspect was found in a container bound for Nova Scotia.
The Container was fitted with bed and toilet and had a laptop, US airport maps, forged
security passes and Canadian passports.
Some of the terrorist incidents at sea include the following:
● The passenger vessel Achille Lauro was boarded and hijacked in 1985.
● Attack on the USS Cole in 2000.
● Attack on the French VLCC Limburg in 2002
● Transportation of terrorist weapons on the Karine A in 2002 and the Baltic Sky in
2003.
This hijacking incident happened on October 7, 1985, when the Italian ship MS
‘Achille Lauro’ was hijacked by four men representing the Palestine Liberation
Front off the coast of Egypt, as she was sailing from Alexandria to Ashdod,
Israel. A 69-year-old Jewish American man in a wheelchair, Leon Klinghoffer,
was murdered by the hijackers and thrown overboard. The hijacking sparked the
"Sigonella Crisis".
Sigonella in Italy is the airbase where the hijackers landed after being given safe
passage from Egypt, after freeing the vessel’s hostages and disembarking from the
vessel.
The ‘Sigonella’ incident is the standoff that occurred between US Navy Seals and Italian
defence forces. In the incident the Italians prevented the US Seals from arresting the
hijackers. The hijackers were finally arrested by the Italians and tried in Italy, for
hijacking and murder.
The attack was organized and directed by the terrorist organization al-Qaeda.
USS Cole
Contraband Smuggling
Contraband smuggling is a criminal activity, that may result in huge financial loss to the
ship owner whose ship is used by smugglers. Often drugs may be smuggled. Drugs are
brought on board the vessel in a number of ways and are normally brought in through,
luggage, stores, in a person’s body or in electronic equipment. Weapons could also be
smuggled, and normally come on board through cargo containers.
Example – On August 6th 2018, Colombian authorities seized more than one ton of
cocaine that was discovered inside a container on a ship bound for Europe.
The drugs were found following raid of the Singapore-flagged ship Cap San Tainaro in
the waters off Barranquilla, Colombia shortly after the vessel departed Cartegena,
Colombia bound for Antwerp, Belgium.
During the raid, authorities found 1,144 packages containing 1 kilogram of cocaine
apiece, worth an estimated street value of about $66 million.
The drugs are believed to have been smuggled by an organised crime group known for
its drug trafficking activities to Europe.
Drug routes
Cargo Theft
Cargo theft is an age old problem, that results in great financial loss to the ship
owner. Prevention is the best method to prevent cargo theft.
Example - Note that containers offer little security even when locked/ sealed
Example - A stowaway was discovered in the rudder trunk after a voyage from West
Africa to South America
Human trafficking
Maritime fraud, where seamen employed on board could have counterfeit passport and
other official documents.
Collateral Damage
Ships could be sabotaged by hoax calls of saying that a bomb is on board. In this regard
the 'Queen Mary' received a hoax call of a bomb on board.
Example – A deckhand was jailed for two years for setting fire to an offshore supply
vessel by pouring petrol onto her gangway as the crew slept on board, because he was
ordered off the ship after a drunken row with the captain.
Cyber crime
● Phishing: using fake email messages to get personal information from internet
users;
● Misusing personal information (identity theft);
● Hacking: shutting down or misusing websites or computer networks;
● Spreading hate and inciting terrorism;
● Distributing child pornography;
Cyber crime
IntroductionShip and port operations and conditions
In late June of 2017, AP Moeller-Maersk shut down its container operations at the Port of
Los Angeles. It was a cyber-attack. For the maritime industry and its extended supply
chains, the threat is real and looming. Ports are the economic engines of this country
and the world, meaning any downtime caused by a breach could have a catastrophic
impact on global supply chains.
New technology is likely to shape the risk equation for all links in transportation supply
chains. Investments in securing maritime operations are increasing in parallel to the
security vulnerabilities of the marine supply chain infrastructure.
Access control can limit access to sensitive area and CCTV systems can help identify
suspicious activity. When linked together with other systems such as intrusion detection,
fire and public address systems the integrated solution can become a powerful command
and control application allowing users to detect, monitor and respond to events in the
most safe and effective way. Access control is an important part of the security
environment in the Port and Maritime sector and provides the ability to control and
monitor movement of staff in restricted areas. This helps the port authority to meet the
requirements of the ISPS Security code. The ability to run CCTV and access control
system over the IT infrastructure is particularly beneficial in a port where the
geographical area can be large and having to run cable for individual systems can
involve significant expense.
Thermal cameras for ports are a must-have technology for maritime security, especially
for perimeters. There are currently solutions available that can work with thermal
cameras to allow for the detection of moving objects and long ranges with only a couple
of pixels on targets needed. Intelligent software applications can take what is captured
by a thermal camera and optimize it by connecting with a neighboring Pan-Tilt-Zoom
(PTZ) color camera, which can automatically track the object detected by the thermal
camera.
Tools and technology as well as a dedicated task force to bolster security are crucial. The
message for proper cyber hygiene must be circulated over and over again to employees
at all levels within a company and protocols need to be enforced regarding the use of
external devices. As attacks - both physical and cyber - continue to rise, maritime
infrastructure must be riveted on reliable security measures.
The diagram shown below illustrates interaction of a vessel with other modes of
transport:
Intermodal transport involves the use of at least two different modes in a trip from an
origin to a destination through an intermodal transport chain, which permit the
integration of several transportation networks.
In today’s market, a shipping agent acts like as an intermediary between the shipper
and the consignee.
Intermodality enhances the economic performance of a transport chain by using modes
in the most productive manner. Thus, the line-haul economies of rail may be exploited
for long distances, with the efficiency of trucks providing flexible local pick up and
deliveries.
The key is that the entire trip is seen as a whole, rather than as a series of legs, each
marked by an individual operation with separate sets of documentation and rates.
As the container is a common instrument used in the intermodal transport chain they
can be used in the illicit trade of counterfeit goods, drugs and weapons and for
terrorism.
Because of these concerns, all containers are electronically scanned at the port of
loading, prior to departure.
An International Convention is enforced through state law after the State ratifies
(agrees) the Convention and enacts it as the law of the state through a bill introduced
and then passed in parliament.
A code is a set of standards set forth and enforced, through regular checks and
certification.
After the so-called 9/11 incident IMO worked vigorously to improve security at sea.
● IMO Resolution A.545 (13) – measures to prevent acts of piracy and armed
robbery against ships (1983)
● IMO Resolution A.545 (14) – measures to prevent unlawful acts which threaten
the safety of ships and the security of their passengers and crews (1985)
● IMO MSC/Circ.443 – measures to prevent unlawful acts against passengers and
crews aboard ships (1986)
● IMO Suppression of Unlawful Acts Against the Safety of Maritime Navigation
(SUA) Convention – for the suppression of unlawful acts against the safety of
maritime navigation (in force 1992)
● IMO MSC/Circ.754 – Passenger ferry security (consideration primarily in respect
of passenger ferries operating on international routes and ports serving those
routes) (1996)
Though there were conventions, circulars and resolutions (as listed above) related to
maritime security at sea before September 11, 2001, none of them was mandatory.
Summarizes the rapidity with which IMO acted to enhance maritime security
following 9/11
After the ‘9/11’ incident IMO worked very swiftly to improve security on board ships, this
ultimately resulted in amendments to SOLAS to enhance maritime security and the
development of the International Ship and Port Facility Security Code (ISPS Code).
The initiatives to develop the ISPS Code and to amend SOLAS were done as illustrated in
the flow chart below:
Flow Chart on work flow used to improve maritime security
Summarizes the amendments to SOLAS Chapter XI and the contents of the ISPS
Code
The ISPS Code was adopted by a resolution on 12 December 2002 by the conference of
Contracting Governments to the SOLAS convention.
The existing Chapter XI (Special measures to enhance maritime safety) of SOLAS was
amended and re-identified as chapter XI–1 and a new chapter, XI-2 (Special measures
to enhance maritime security) was adopted.
Another problem for the maritime industry is piracy on the high seas.
In order to achieve its objectives, the ISPS Code embodies a number of functional
requirements. These include but are not limited to:
● The provision of a ship identification number for all ships – the IMO number,
permanently marked on the vessel; (Chapter XI – I of SOLAS)
● The maintenance of a continuous synopsis record (CSR), this records the history
of the ship; (Chapter XI – I of SOLAS)
● The provision of a ship security alert system; (Chapter XI – II of SOLAS)
● Fitting of Automatic identification system (AIS) and Long Range Identification and
Tracking of ships (LRIT) on all vessels as per chapter V of SOLAS;
● Every company that operates a merchant vessel must be have a company and
registered owner identification number (C&ROIN). (Chapter XI – I of SOLAS)
The Port State must set security levels, the security level in place must be informed to
all visiting vessels, all flag state vessels must comply with the requirements of the ISPS
Code Part A.
It is important to note that security on vessels operates in tandem with port facility
security.
It outlines steps to be taken to reduce the risk of such attacks, possible responses to
them and the vital need to report attacks, both successful and unsuccessful to the
relevant authorities.
In addition to prevent terrorism in Somalia and the Gulf of Aden the Ship Security
Reporting System and a Best Management Practice guide have been implemented and
developed.
Making port, harbour craft and home trade vessels secure is done through flag state
legislation that are normally similar to measures prescribed by the ISPS Code.
Several governments have passed legislation to tighten maritime security, some of them
are as follows:
European Union – Has made selected parts of the ISPS Code Part B, mandatory (for
ships engaged on home trade voyages)
The UK – Has the Aviation and Maritime Security Act 1990, The Anti – Terrorism, Crime
and Security Act, mandated the EC regulation 725/2005 & 65/2005, and has regulations
that govern Ship and Port Facilities
The US – has the Maritime Transportation Act 2002 and the Navigation and Vessel
Inspection Circular 1996.
Definitions
Ship (Vessel) Security Plan – A plan to ensure the application of measures on board
the ship, designed to protect persons on board, cargo, cargo transport units, ship’s
stores or the ship from the risk of a security incident.
Port Facility Security Plan – A plan to ensure the application of measures designed to
protect the port facility and ships, persons, cargo, cargo transport units and ship’s stores
within the port facility from the risks of a security incident.
Security incident – means any suspicious act or circumstance threatening the ship
Ship (Vessel) Security Officer – The person on board the ship who is accountable to
the master, and designated by the company as responsible for the security of the ship,
including implantation and maintenance of the ship security plan, and for liaison with the
company security officer and port facility security officers.
Ship - to - Ship Activity – means any activity not related to a port facility that involves
the transfer of goods or persons from one ship to another
Company Security officer – The person designated by the company for ensuring that a
ship security assessment is carried out; that a ship security plan is developed, submitted
for approval, and thereafter implemented and maintained; and for liaison with port
facility security officers and ship security officer.
Port Facility Security Officer – The person designated as responsible for the
development, implementation, revision and maintenance of the port facility security
plan, and for liaison with ship security officers and company security officers.
Ship/port interface – The interaction that occurs when a ship is directly and
immediately affected by actions involving the movement of persons, goods or provisions
of port services to or from the ship.
On-Scene Security Survey (OSSS) – An integral part of the ship security assessment
to examine and evaluate existing shipboard protective measures, procedures and
operations.
Security Level 3 – Further specific protective security measures shall be maintained for
a limited period of time when a security incident is probable or imminent.
Some terms related to piracy – skiff – a small boat with an outboard motor through
which pirates board a merchant vessel, mother vessel – from where pirates launch their
skiffs
Armed robbery The Code of Practice for the Investigation of the Crimes of Piracy and
Armed Robbery against Ships, highlights armed robbery against ships consists of:
Hijack A hijack is where attackers have illegally boarded and taken control of a ship
against the crew’s will. Hijackers will not always have the same objective (armed
robbery, cargo theft or kidnapping).
Illegal boarding An illegal boarding is where attackers have boarded a ship but HAVE
NOT taken control. Command remains with the Master. The most obvious example of
this is the citadel scenario.
Piracy Piracy is defined in the 1982 United Nations Convention on the Law of the Sea
(UNCLOS) (article 101). However, for the purposes of these BMP, it is important to
provide clear, practical, working guidance to the industry to enable accurate and
consistent assessment of suspicious activity and piracy attacks.
The following may assist in assessing what is a piracy attack. A piracy attack may
include but is not limited to:
● The use of violence against the ship or its personnel, or any attempt to use
violence.
● Attempt(s) to illegally board the ship where the Master suspects the persons are
pirates.
● An actual boarding whether successful in gaining control of the ship or not.
● Attempts to overcome the SPM by the use of:
1. Ladders.
2. Grappling hooks.
3. Weapons deliberately used against or at the ship.
SSI was created to help share transportation-related information deemed too revealing
for public disclosure between Federal government agencies; State, local, tribal, and
foreign governments; and others.
● Travel arrangements
Security Responsibilities
Security Responsibilities
Contracting governments have specific responsibilities with respect to SOLAS Chapter
XI-2 ,the ISPS Code and the STCW code.
Contracting governments
The main responsibilities of the contracting Governments in relation to threats to ships
are as follows:
When a risk is identified, inform ships and their current administrations of:
● Any security level that has been put in place by the ships concerned to protect
themselves from attack, in accordance with provisions of Part A of the ISPS Code
● Security measures that he coastal state has decided to put in place as
appropriate Roles of Flag Administrations (Flag state, state of vessel registry)
Role of Flag State
● Providing the means for reporting security incidents – using standard reporting
formats
● Designating RSOs
● Passenger and cargo ships solely engaged on domestic voyages (coastal vessels)
● Who has been designated for receiving at all times communication concerning
ships control measures
● Who has been designated to provide advice or assistance to and to whom ships
can report
● Names and contact details of any RSOs authorized to act on their behalf and the
condition of authority
● Locations within their territory covered by the approved PFSPs
Note: The ‘Global Integrated Shipping Information System’ (GISIS) developed by IMO
provides access to maritime security information and other matters concerning shipping
to all end users. Access is through a user ID and password.
GISIS
The company
The responsibilities of the company are with respect to:
● Ensuring that the master has documents on board relating to the crewing of the
ship and its employment, crew screened before being appointed
● Ensuring that the Ship Security Plan contains a clear statement emphasizing the
master’s authority
● Designating a Company Security Officer (CSO) and a Ship Security Officer (SSO)
and ensuring that they are given the necessary support to fulfil their duties and
responsibilities
The company must ensure (can be put as a Security procedure in the ships safety
management manual) that the ship complies with the requirements of the Ship Security
Plan as per the security level set.
The company must ensure that the Master has on board the following information in
writing:
The Master has the authority to deny access to any person on board, and reject cargo of
suspicious nature.
Company responsibilities
The Ship
The vessel shall comply with the requirements of the Ship Security Plan as per
the security level set
This is done by ensuring that Port Facility Security Assessments are carried out,
reviewed and approved and Port Facility Security Plans are developed, reviewed and
approved.
A Port facility is required to act upon the security levels set by its Government within
whose territory it is located.
Notes
Security ResponsibilitiesShip Security Officer
● Co-ordinating the implementation of the ship security plan with the company
security officer and relevant port facility security officer; and
● Ensuring that security equipment is properly operated, tested, calibrated and
maintained if any.
● Arranging for the initial and subsequent verifications of the ship by the
Administration or the recognized security organization;
● Ensuring that deficiencies and non-conformities identified during internal audits,
periodic reviews, security inspections and verifications of compliance are promptly
addressed and dealt with;
● Enhancing security awareness and vigilance;
● Ensuring adequate training for personnel responsible for the security of the ship;
● Ensuring that, if sister-ship or fleet security plans are used, the plans for each
ship reflects the ship-specific information accurately; and
● Ensuring that any alternative or equivalent arrangements approved for a
particular ship or group of ships are implemented and maintained.
Security ResponsibilitiesPort Facility Security Officer
It should be noted that there is a PFSO for each facility; however a PFSO can be in
charge of several Port Facilities if required.
Other personnel
It is important to note that the following also have a role to play in the
enhancement of security, as ensuring a ship’s security is everyone’s business:
The inspector should critique the drill with the SSO and discuss corrective action if
necessary to address any deficiencies noted. Any deficiencies with the SSP detected
during the drill may be corrected by directing the owner in writing to submit an
amendment per the regulations. Such a requirement should be allowed at least 60 days.
A de-brief after the drill, conducted by the Master and / or the SSO must highlight:
● Whether the objectives of the drill were achieved, stating what was performed
well
● Whether the communication between the team members was proper and
effective
● Whether there was synergy and co-operation between the crew members
● Whether the response to the emergency was proper and as per the SSP and
agreed procedures
● What was clarified by the drill
Note: Crew members participating in the de-brief must be allowed to give constructive
comments for the good of ship security.
● Significant events
● Lessons learnt
Assessment tools
The ship security assessment (SSA) is an essential part of the process of developing a
ship security plan. SSA is carried out by persons who are competent in this matter.
When doing an SSA assessment it is recommended that they follow the guidance notes
given in part B of the ISPS Code.
● Identifying key shipboard operations that are a threat to ship security (e.g.
access control, cargo operations, embarking passengers on passenger ships)
● Identifying existing shipboard security measures and procedures (e.g. methods of
access control, identifying restricted areas for controlled access, etc.)
● Identifying potential security threat scenarios (e.g. piracy in W Africa, drug
smuggling in S America, etc.)
● Performing an on-scene security survey, this is done to check if ship personnel
are doing their security duties properly when controlling access and during cargo
loading & stores handling operations, etc.
● Identifying weakness in both the infrastructure and in ship security procedures
(so that new security measures can be implemented, to plug a presumed
weakness)
Risk-based decision-making checklists will rate the criticality of the security risk, and will
indicate if steps taken to mitigate the security risk are satisfactory.
It allows comments to make on security weaknesses if any, and actions required to plug
them.
An example of a ‘risk based decision making’ checklist for key shipboard operations is as
below:
● Areas of the world where there are potential security threats for vessels
Operations to be evaluated
During the on-scene security survey the following should be considered and evaluated:
● The existing duties and responsibilities of all shipboard personnel, the designation
of additional security duties and its affect to the safe operation of the vessel;
● The existing procedures or safeguards for communications and measures
necessary to maintain continuous communications at all times in the case of a
security threat;
● The existing procedures for the assessment of safety procedures and equipment
and systems and additional procedures needed to assess the continuing
effectiveness of security procedures and any security and surveillance equipment
and systems, including procedures for identifying and responding to equipment or
systems failure or malfunction;
● Additional procedures and practices required to protect security sensitive
information held in paper or electronic format;
● Any additional and maintenance requirements, or inclusion of security and
surveillance equipment and systems, if any, into the existing maintenance
programs;
● Existing procedures to ensure the timely submission, and assessment, of reports
relating to possible breaches of or security concerns;
● Procedures required to establish, maintain and up-date an inventory of any
dangerous goods or hazardous substances carried on board, including their
location.
Survey Sections
The security of a vessel can be divided into
● Physical security
● Structural security
● Procedural policies
● Other areas
On vessels physical security ensures personnel coming on board are not armed and
dangerous, it also ensures that no arms and other dangerous devices come on board the
vessel through other means e.g. – cargo or stores.
This is done by access control both onto and into the vessel and by monitoring cargo
loading operations and the delivery of stores.
Physical security:
Physical security also prevents unauthorised access to the ships computer. Prevent
unauthorised computer access by having secure passwords, changing passwords
regularly and using firewalls for the vessel’s computer network, among others.
SOLAS Convention vessels have several mandatory communication equipment for both
safety and security related communications.
● LRIT (Long Range Identification and Tracking) - In this this system the
vessel’s satellite terminal is configured to sending ship information (voyage,
position etc.) transparent to the user to a database, that is accessed by coastal,
port and national administrations for actions to be taken to help in safety and
security incidents.
● AIS (Automatic Identification System), a Very High frequency
communication system where a vessel sends both static (Vessels name and call
sign etc.) and dynamic information (speed, course etc.), that is received by other
AIS equipped ships and shore authorities (Vessel Traffic Information System
(VTIS)) – helps track and monitor vessels
● SSAS (Ship Security Alert System) – a communication system that alerts the
flag state and the CSO immediately when the vessel is involved in a security
incident, is a button on the vessel that is activated by the Master.
There are other communication methods used for getting information or alerting, some
of these are given below:
Before transiting Somali pirate invested waters BMP5 recommends that vessels register
with United Kingdom Maritime Trade Operations (UKMTO). Vessels transiting these
waters are recommended to check Maritime Security Centre - Horn of Africa’s (MSCHOA)
website for updates and advice.
BMP5 provides useful contact details in Annex A, use these to communicate directly for
help in a pirate attack.
Security equipment and systems will depend upon the type of ships, its sea passage
routes and potential threat that it faces and the regulatory items that all ships must have
to abide by the international and local laws. The equipment listing may include, as a
minimal, the following:
● AIS
● Ship Security Alert System
● Locks
● Lighting
● Handheld radios
● GMDSS equipment
● Closed Circuit Televisions
● Automatic Intrusion Detection Device (Burglar Alarm)
● Metal detectors
● Explosive detectors
● Baggage screening equipment
● Container X-ray devices
● General Alarm
Various types of security equipment and systems that can be used aboard
vessels and in facilities
There are several equipment that are used to strengthen security on a vessel, they are
as below:
Alarms
CCTVs – Can be used to cover vulnerable and restricted areas on a vessel, the
positioning of the camera is important, camera to be positioned in such a way so that all
blind spots are covered.
Once an attack is underway it may be difficult to assess whether the attackers have
gained access to the ship. The use of CCTV coverage allows a degree of monitoring of
the progress of the attack from a less exposed position. Some companies can monitor
and record the CCTV from ashore,
which will be of value when provided to the military. The following should be considered:
● CCTV cameras for coverage of vulnerable areas, particularly the poop deck and
bridge.
● CCTV monitors located on the bridge and at the safe muster point/citadel.
● CCTV footage may provide useful evidence after an attack and should be
retained.
CCTV Camera
CCTVs can monitor access points. They provide 24 hour cover irrespective of weather,
information is recorded and can be retrieved if required.
CCTVs require good monitoring, therefore do not have too many viewing screens as then
monitoring becomes difficult.
CCTVs
Lighting is helpful in identifying persons boarding at night. Use a separate circuit for
over-side lighting.
● Weather deck lighting around the accommodation block and rear facing lighting
on the poop deck to demonstrate awareness.
● If fitted, search lights ready for immediate use.
● Once attackers have been identified or an attack commences, over side lighting,
if fitted, should be switched on. This will dazzle the attackers and help the ship’s
crew to see them.
● At night, only navigation lights should be exhibited.
Lighting
Locks and locking equipment may not prevent entry but they delay entry. Doors and
their locking mechanisms must afford the same protection.
Use combination locks, normal locks if used to have a spare set of keys. Tag key sets for
identification.
Locks
Access control – Allow only authorised persons to board the vessel. All visitors to board
through the gangway. Gangway to be monitored 24X7 while in port. Provide visitors with
an ID card, and record all visitor entries in a logbook.
Search visitors and their belongings on entry and escort them into the vessel.
Access Control
Search – Depending on the security level, searching, visitors may be required. Trained
staff to carry out searches. Preserve human dignity when searching. Do not search
public authority officers (e.g. Port State Control Inspectors). Use hand held scanners for
body searches.
Hand held scanners
Search, cargo, baggage and stores. The port facility does the cargo search. Use baggage
scanning equipment for stores and baggage (passenger vessels).
Ensure containers seals are intact when loaded. All cargo loaded to be according to the
manifest.
Check stores coming on board against the manifest. Store away quickly after receiving
them.
Do not load unaccompanied baggage if possible; deal with them as per the Ship Security
Plan (SSP). Isolate suspicious baggage; do make an effort to find the owner.
Baggage scanners
Security equipment and systems that may be used to prevent and suppress
attacks by pirates and armed robbers
Some navigational watch precautions to be taken when entering a high risk piracy area
are as below:
● Provide additional lookouts for each Watch. Brief the additional lookouts.
● Get the ship’s citadel ready, citadel to accommodate all crew in the event of
pirate boarding, note citadel is effective if all crew are accommodated, practice
citadel entry during security drills
ANTI-PIRACY ‘HARDENING’
With ever increasing piracy threat from Gulf of Eden, Red Sea, North Arabian Sea and
near the coastline of India it has become important to fortify the vessels for passive
purpose (deterrence) and for active purpose (defence).
Each vessel has its own vulnerabilities, which pirates will aim to exploit in the event of
an attack, including areas of low freeboard and areas where grapples, ladders and other
tools can be attached to allow access.
Pirates typically use long lightweight hooked ladders, grappling hooks with rope attached
and long hooked poles with a climbing rope attached to board vessels underway.
Physical barriers should be used to make it as difficult as possible to gain access to
vessels by increasing the height.
Physical barriers can be put in place which will physically bar the pirates from boarding
the vessel, gaining access to the vital areas within the vessel such as the bridge, engine
room, and crew quarters. If their access is barred and their attempts to control the ship
are hampered, then many pirates will simply abandon their attempt.
Razor Wire
Also known as barbed wire. It creates an effective barrier if properly rigged and secured.
The quality of razor wire varies considerably and lower quality razor wire is less
effective. The following is recommended:
● Use a high tensile concertina razor wire with coil diameters of 730 mm or 980
mm. This is difficult to cut with hand tools.
● Use a double roll. If this is not possible, place a single high-quality roll outboard
of the ship’s structure.
● Secure razor wire to the ship properly, to prevent attackers pulling the wire off.
For example, attach at least every third wire ring to ship’s railings and rig a steel
cable through its core.
● Use personal protective equipment and wire hooks to move and install razor wire.
● Obtain razor wire in short sections, e.g. 10 m, so that it is easier and safer to
move.
● Keep razor wire clear of mooring fairleads when at terminals so that it does not
interfere with mooring operations.
Razor wire creates an effective barrier but only when it is carefully deployed. The barbs
on the wire are designed to have a piercing and gripping action. Care should be taken
when selecting appropriate razor wire as the quality (wire gauge and frequency of barbs)
and type will vary considerably.
Concertina razor wire (linked spirals), available in approx. 750 mm or 950 mm each coil
of 15 meter as the linked spirals make it the most effective barrier.
When deploying razor wire personal safety and protective measures are required. Using
razor wire is effective when constructed on ship structure, deployed double or treble roll
of wire, and secured the razor wire with a wire rope through the razor wire to prevent it
being dislodged.
Some measures used to harden the vessels structure against unauthorised boarding
and/or pirate attacks are:
● Sand bags on bridge front bulkhead to mitigate Rocket Propelled Grenade (RPG)
attack
Barbed wire fence
Electric fence
● Consider the use of thermal imagery optics and night vision aids as they provide
a reliable all-weather, day and night surveillance capability.
● Maintain a careful radar watch and monitor all navigational warnings and
communications, particularly VHF and GMDSS alerts.
● Consider placing well-constructed dummies at strategic locations around the ship
to give the impression of greater numbers of crew on watch.
● Consider using CCTV and fixed search lights for better monitoring. Fixed search
lights can deter approaches from the stern.
● Mount anti-piracy mirrors on the bridge wings to make looking aft easier.
Alarms
The ship’s alarms inform the ship’s crew that an attack is underway and warn the
attacker that the ship is aware and is reacting. In addition, continuous sounding of the
ship’s whistle may distract the attackers. It is important that:
● Crew members are familiar with each alarm, especially those warning of an attack
and indicating ‘all clear’.
● All alarms are backed up by an announcement over the accommodation and deck
PA system, where fitted.
● Drills are carried out to ensure that the alarm is heard throughout the ship.
● The drill will confirm the time necessary for all crew to move to a position of
safety.
Physical barriers
Physical barriers are intended to make it as difficult as possible for attackers to gain
access to ships by increasing the difficulty of the climb for those trying to illegally board.
When planning the placement of barriers special consideration should be given to ships
with sunken poop decks.
● The use of water spray and/or foam monitors is effective in deterring or delaying
any attempt to illegally board a ship. The use of water can make it difficult for an
unauthorized boat to remain alongside and makes it significantly more difficult to
climb aboard.
● It is recommended hoses and foam monitors (delivering water) are fixed in
position to cover likely access routes and are remotely operated. Manual
activation is not recommended as this may place the operator in an exposed
position.
● Improved water coverage may be achieved by using fire hoses in jet mode and
using baffle plates fixed a short distance in front of the nozzle.
● Water cannons deliver water in a vertical sweeping arc and protect a greater part
of the hull.
● Water spray rails with spray nozzles produce a water curtain covering larger
areas.
● Foam can be used, but it must be in addition to a ship’s standard fire fighting
equipment stock. Foam is disorientating and very slippery.
● The use of all available fire and general service pumps may be required to ensure
all defences operate efficiently.
● Additional power may be required when using pumps; the supporting systems
should be ready for immediate use.
● Practice, observation and drills are required to ensure the equipment provides
effective coverage of vulnerable areas.
The bridge is usually the focal point of an attack. In some situations, attackers direct
their weapon fire at the bridge to intimidate the ship’s crew to slow or stop the ship. If
pirates board the ship, they usually make for the bridge to enable them to take control.
● Bridge windows are laminated but further protection against flying glass can be
provided by the application of blast resistant film.
● Fabricated metal (steel/aluminium) plates for the side and rear bridge windows
and the bridge wing door windows, which can be quickly secured in place in the
event of an attack can greatly reduce the risk of injury from fragmentation.
● Chain link fencing can be used to reduce the effects of an RPG.
● Sandbags can provide additional protection on the bridge wings. They should be
regularly checked to ensure that they have not degraded.
Other measures
Private Maritime Security Companies (PMSC)
Armed Guard
Use of PMSCs onboard merchant ships is a decision taken by individual ship operators
where permitted by the ship’s Flag State and any littoral states. However, the use of
experienced and competent unarmed PMSCs can be a valuable protective measure,
particularly where there may be the requirement to interface and coordinate with local
law enforcement agencies, naval forces and coast guards. Any decision to engage the
services of a PMSC should consider:
● Ship speed.
● Freeboard.
● Ensure all incidents involving the use of weapons and armed force are reported at
the earliest instance to the Flag State and the Chief Security Officer (CSO).
BMP does not recommend or endorse the general use of PCASP onboard merchant ships;
this is a decision taken by individual ship operators where permitted by the ship’s Flag
State and any littoral states.
Some Flag States do not allow the deployment of PCASP or PMSC. Some Flag States
provide military Vessel Protection Detachments (VPDs) instead of PCASP. A VPD may be
provided by another State, subject to Flag State approval. In some cases, the
deployment of either PCASP or VPDs must be reported and acknowledged by the Flag
State and reported when entering the designated risk area.VRA
● CCTVs – when installing ensure there are no blind spots, requires good
monitoring, do not have to many monitoring screens
● Locks and locking equipment – may not prevent entry, they deter entry and they
must afford the same protection as the doors they are placed on
● Search’s – do not embarrass, be polite, have a witness when conducting the
search, use trained personal to conduct physical body searches
● Ship Maneuvers – do not use large alterations as speed reduces, small alterations
preferred.
● Lighting – Bright lights can reduce one’s visibility.
Risks and benefits of security equipment and systems that may be used to
prevent and suppress attacks by pirates and armed robbers
Risks and benefits of security equipment to deter pirates is as below:
● Dummies deter pirates but maintain a proper lookout for pirates in high-risk
areas.
● When constructing any physical barriers identify areas that are vulnerable to a
pirate attack, to protect them. Physical barriers deter and prevent pirate
boarding.
● The establishing of a Citadel may be beyond the capability of ship’s staff alone,
and may well require external technical advice and support. All crew must be
inside the citadel, when pirates board. This will provide vessel with time to get
help.
Ship Security Alert Systems (SSAS) are a SOLAS XI-2 requirement, and ISPS
requires that the SSP include a description of the system. Due to the sensitive security
nature of the information, ISPS allows the owner to keep the SSAS information separate
from the other parts of the SSP. This information is essential in order for the inspector to
complete the verification. ISPS also requires the equipment to be installed after the first
“survey” of the radio equipment following the deadline. Survey in this case means either
the periodical or renewal survey, whichever occurs next after the
deadline for compliance. New vessels must have the equipment installed at the initial
survey.
Specifics details will be contained in the SSP describing test procedures for the SSAS.
The inspector should follow the test procedures indicated. If the test reveals a problem
with either the test procedure or the SSAS itself, the inspector should immediately
inform the SSO. The failure of the SSAS represents a serious security deficiency and
must be addressed as soon as possible.
● Be capable of being activated from the navigation bridge and at least one other
location.
● Conform to performance standards not inferior to those adopted by the
Organization.
● Activation points shall be designed so as to prevent inadvertent initiation.
● All water cannons are in good working order and can be exhibited for operation?
● Procedures in place for the verification of ships stores and spares against
manifest?
● Crew should be familiar with the equipment and procedures, this can be done
with the required training, and reading user manuals
● Equipment must be calibrated and tested before use
● Equipment familiarization
● Equipment maintenance
● The VSP must include procedures for identifying and responding to security
system and equipment failures or malfunctions.
Since there are just too many equipment and some of the equipment are part of the
LSA/FFA list of equipment e.g., fire pump, water hoses, water tight doors etc., the VSO
can use those schedule as part of his way to maintain the security equipment; the rest of
the security equipment then can be checked at scheduled intervals, while conducting
security drills and be part of a weekly checks as normally practiced on board most deep
sea vessels.
The risks and benefits of security equipment and systems that may be used to
prevent and suppress attacks by pirates and armed robbers
Risks and benefits of security equipment to deter pirates is as below:
● Dummies deter pirates but maintain a proper lookout for pirates in high-risk
areas.
● When constructing any physical barriers identify areas that are vulnerable to a
pirate attack, to protect them. Physical barriers deter and prevent pirate
boarding.
● The establishing of a Citadel may be beyond the capability of ship’s staff alone,
and may well require external technical advice and support. All crew must be
inside the citadel, when pirates board. This will provide vessel with time to get
help.
● Crew should be familiar with the equipment and procedures, this can be done
with the required training, and reading user manuals
● Equipment must be calibrated and tested before use
All nations bear the economic costs of piracy. These costs stem from those associated
with the direct protection of the vessel and its crew; to those associated with longer
transit when pirate waters are avoided in favour of longer shipping routes.
Maritime piracy imposes both human costs and economic costs on maritime shipping.
Human costs come in the form not only of seafarers being hijacked and held hostage,
but injury during attacks and even death.
It is also important to note that the type of weapons used varies by location. Guns were
used in eight incidents in Somalia, eighteen in Nigeria, and in six in the Malacca region.
Knives (typically less lethal) remain the weapon of choice in Indonesia, Malacca and
Malaysia, used in twenty-five of the attacks in this part of the world.
Examples of economic costs include transiting at increased speeds, the costs of military
guards and equipment, insurance and labour costs, ransoms, and the costs of operating
and maintaining the international task forces. There was considerable consternation
when the cost figures were released in 2011 – up until then, most everyone who had
thought at all about piracy believed the problem was restricted to a minor segment of
the global shipping industry; few thought about calculating nearly all costs associated
with maritime piracy or realized they could amount to more than $6.5 billion globally,
with the estimated cost per ship per transit approximately $134,000.
The threat
As well as piracy, regional instability has introduced new security threats including the
use of:
● Anti-ship missiles.
● Sea mines.
Piracy
Pirates operate in Pirate Action Groups (PAG) who operate several different boat
configurations, typically using small high speed (up to 25 knots) open boats or skiffs.
● Skiffs only.
● Open whalers carrying significant quantities of fuel and often towing one or more
attack skiffs.
● Motherships, which include merchant ships and fishing vessels but, more
commonly, dhows.
Where motherships are used the crew are often held onboard as hostages. Motherships
are used to carry pirates, stores, fuel and attack skiffs to enable pirates to operate over
a much larger area and are significantly less affected by the weather. Attack skiffs are
often towed behind motherships. Where the size of the mothership allows, skiffs may be
carried onboard and camouflaged.
Pirates may use small arms fire and Rocket Propelled Grenades (RPGs) to intimidate
Masters of ships to reduce speed or stop to allow them to board. The bridge and
accommodation tend to be the main targets for these weapons.
Pirates use long lightweight ladders, knotted climbing ropes or long hooked poles to
climb up the side of the ship. Once onboard they will make their way to the bridge to try
to take control of the ship. When on the bridge they will demand the ship slows/stops to
enable other pirates to board.
Attacks can take place at any time – day or night – however experience shows attacks at
dawn and dusk are more likely.
The intent of Somali pirates is to hijack the ship and hold the crew for ransom. The usual
practice is to keep the crew onboard as negotiations progress, keeping both the crew
and the ship together. Seafarers have occasionally been separated by nationality and
taken ashore. It is in the interests of the pirates to keep their captives alive, although
cases of intimidation and torture have occurred.
Anti-ship missiles
Anti-ship missiles are long range, accurate and powerful weapons and have been used
against military ships in the region. Their use against merchant ships associated with
regional conflict cannot be discounted. Other ships may be hit if the missile controller
targets the wrong ship or the missile homes in on an unintended target.
Sea mines
Sea mines have been used to deter and deny access to key ports in Yemen. These mines
are usually tethered or anchored but may break free from moorings and drift into
shipping lanes. Transiting merchant ships are not a target and it is recommended
● WBIED used in the regional conflict have been aimed at harming those associated
with the conflict. These boats have been unmanned and operated remotely.
● WBIED used by extremists have been aimed at merchant ships. These boats have
been manned.
An attack involving a WBIED is likely to involve one or more speed boats operated by a
number of individuals approaching and firing both small arms and RPGs. Masters should
recognise the intent of these attacks is to cause damage and not necessarily to board
the ship. Mitigation measures to prevent the speed boat making contact with the ship’s
hull are limited.
Threat assessment
The threat assessment must include all regional security threats.
As part of every ship risk assessment prior to transit through the HRA the latest military
threat advice must be obtained from UKMTO www.ukmto.org and threat assessments
from MSCHOA www.mschoa.org.
Capability means attackers have the physical means to conduct an attack. Intent is
demonstrated by continued attacks. Opportunity is what is mitigated by the company,
ship and crew through application of the measures described in this guidance. In
addition to the information provided in this guidance, supplementary information about
the characteristics of the threat, specific or new tactics, and regional background factors
may be sought from regional reporting centres.
If one side of the triangle is removed, then risk is minimised. The company/Master
cannot influence either capability or intent, therefore BMP measures focus on minimising
the opportunity.
Prohibited Items, list is non-exhaustive as not possible to list all dangerous substances,
there are too many and new ones are discovered regularly, major ones listed though.
Weapons (firearms, knives, grenades, rockets); Can be fatal and will sometimes cause
damage to property.
Weapons
Concealing Explosives
Types of weapons used are ranging from knives, machetes, spears etc to firearms of
many kinds like pistols, guns, machine guns, grenades etc. Look at the pictures and
recognize them. The use of these can cause injuries of varying degrees as well as death.
They can also cause damage to assets either directly or indirectly like causing an
explosion or a fire.
Chemical, biological, and radiological devices Will cause harm to the human body
(fatal at times), and damage to property
Some examples:
Chemical - Mustard Gas, in use since World War 1 causes severe burning to the skin.
SARIN - Invented by German scientists as a nerve gas agent in preparation for World
War II is 20 times deadlier than cyanide. Described as ‘the poor man’s atomic
bomb’. One drop, the size of a pinhead, is sufficient to kill a person by crippling
the nervous system.
Biological Agents are Infectious and toxic substances like; viruses, bacteria, toxins that
are packed in vials or petri-dishes & protective containers
Chemical Agents, Nerve agents, Blister agents & Blood agents are corrosive and are in a
liquid or a syrupy form.
Radiological devices
Explosives used causes a very fast chemical reaction of substances producing gas at high
temperature and pressure with such velocity to cause damage. They kill by pressure
blast, high temperature and shrapnel used to fill the device in which it is used. Some
explosives’ examples are black powder, nitro glycerine, ammonium nitrate, C4, etc.
The device consists of the explosive, the detonator and the triggering mechanism. Some
of the very common devices are improvised from ordinary everyday use things and are
called I.E.D (improvised explosive device).
These will always be in disguise. Few other criminal acts raise as much fear and concern
as bombings, so it's no coincidence that crime and terrorist groups routinely use them as
a means to achieve their goals whether they are loss of life, intimidation, extortion or
government or commercial disruption. Most terrorist and crime groups use Improvised
Explosive Devices or IED's. Detonated on board a ship, an IED can create a serious hull
break or start a dangerous fire, both of which can lead to injury and loss of life. So what
does an IED look like?
All of these images below are clever disguises of IED's are homemade weapons that are
easily manufactured and limited in their form only by the imagination of their creator!
Because they often take the shape of everyday items, it's critical to always be on the
look-out for objects that seem out of place or out of context and to be able to recognise
the components of and IED.
Common Components
Incendiary Devices - Incendiary Devices are a commonly used type of IED. They
Vehicle Borne Devices - Car bombs are another common type if IED. They are
Letter and Parcel Bombs - Terrorists sometimes use letter and parcel bombs as
If there are signs that a package or parcel is suspicious, crew should take these
immediate actions: Make no attempt to open the envelope or package Place it in plain
view on a flat surface or move it to an open space on the ship's deck. If it is left in a
confined space ensure all doors and windows are left open. Clear the area. Cordon off
the area and, if possible, allow nobody to within 50m or 2 bulkheads of the line of sight
of the package. Notify the Duty Watch Officer.
Other dangerous substances can be gases of explosive /flammable or toxic nature which
can be in liquefied form or compressed. Some flammable gases are natural gas
(methane/ethane), LPG (propane /butane), hydrogen and acetylene. Toxic gases are
Ammonia, H2S, SO2, Cyanide, Phosgene etc. Dangerous liquids, solids, can be so due to
being flammable, toxic or having properties to cause damage to human body like
corrosion burns or cancer/mutation of cells. Substances having radioactive properties are
an example. Also, we have seen that some powders used by terrorists caused anthrax or
lung problems to people.
● Inform the subject that physical search is required of him. (see above for female)
Personal effects
● Inform the subject that you are going to search his personal effect.
● You may ask the subject to hold on to his personal effect while you scrutinize it.
● Always have another ship personnel standby and watch the search. This is to
prevent false allegation by subject on item(s) found in the bag and other undue
allegations by him. This may not be necessary if a working CCTV camera is
recording the entire process.
● Thank the subject when the search completes smoothly.
Baggage
● Inform the subject that you are going to search his baggage.
● You may ask the subject to open his bag and its various compartments, and to
clear all items to assist you in the search.
● Always have another ship personnel standby and watch the search. This is to
prevent false allegation by subject on item(s) found in the bag and other undue
allegations by him. This may not be necessary if a working CCTV camera is
recording the entire process.
● Thank the subject when the search completes smoothly.
Cargo and stores are screened at the entrance to a port facility. However cross check
with their manifests.
The above Integrated Terminal planning and monitoring system, a modular one and is
currently in operation use latest technologies for secure data collection and transmission
improves Port productivity and performance and of course the security of the port
operations.
Metal detectors - A metal detector is an electronic device, which detects the presence
of metal nearby. Metal detectors are useful for finding metal inclusions hidden within
objects.
They often consist of a handheld unit with a sensor probe, which can be swept over
objects (e.g. a person).
If the sensor comes near a piece of metal this is indicated by a changing tone in
earphones, or a needle moving on an indicator. Usually the device gives some indication
of distance; the closer the metal is, the higher the tone in the earphone or the higher the
needle goes.
Another common type are stationary "walk through" metal detectors used for security
screening at access points of a port facility.
X-Ray machines - X-Ray imaging is ideal for searching items without opening and
manually inspecting each one. The tools are quick and reliable, and produce detailed
images showing what’s inside each scanned object.
An x-ray scanner identifies harmful organic, inorganic and metal materials. Different
materials absorb rays at different levels. Security x-ray machines spot dangerous items
by looking at the mass density and atomic number of the substances of the materials
that pass through it. Metal, organic and inorganic materials show up differently on the
screen. Organic items will appear as orange. Generally, explosives are made from
organic materials, thus allowing personnel reading the x-ray scanners to identify threats.
If an object’s mass and density falls within the range of a dangerous material, x ray
scanners will warn the operator of a potential hazardous object. Security x-ray machines
use low dose penetrating radiation to detect metallic and non-metallic objects hidden
under clothing or body cavities.
X-Ray Scanners can vary in size from parcel scanners to large vehicle and cargo
scanners.
With X-Ray scanners the end user simply needs to know what objects they are looking
for.
General use X-ray screening systems deliver low doses of ionizing radiation. These
systems are also known as “backscatter” systems because they create images from the
small amounts of X-rays that bounce off the screened individual.
The reflected X-rays are detected and processed by computers to form an image for
operators to review.
Millimeter wave security screening systems use non-ionizing radiation and come in
two forms. The first are active systems that expose the screened person to small
amounts of millimeter wave energy.
The second are passive systems that detect naturally occurring millimeter wave
emissions from bodies. These machines use radio frequency waves to detect threats and
they emit thousands of times less energy than a cell phone.
Lon Scan Machine – These machines are used to detect explosives or drugs by testing
a surface where elements of the drug or explosive may have been left over – e.g. a
person’s clothing, baggage and any object.
To help keep people safe from radiation, vessel entry points may use different kinds of
screening equipment such as backscatter x-ray machines, cabinet x-ray machines,
millimeter wave machines and metal detectors.
● People may be screened with backscatter x-ray machines. They use very low
levels of ionizing radiation.
● People may be screened with millimeter wave scanners. They use radio frequency
(non-ionizing) radiation.
● Metal detectors use no radiation.
● Bags are screened with cabinet x-ray machines. No radiation leaves the machine
Luggage is scanned with cabinet x-ray systems. The thick walls and lead curtains of the
cabinets keep radiation from escaping. The machines must meet strict standards about
how much radiation can escape. The machines must also have locks, warning lights and
warning labels. Handheld scanners can detect threats such as weapons or explosives
that a person could be carrying under their clothing. There are two main types that may
be used in airports: backscatter x-ray systems and millimeter wave machines.
Backscatter machines use very low levels of x-rays. Generally, the amount of radiation
received from a backscatter machine equals the amount of cosmic radiation received
during two minutes of flight. The risk of health effects is very, very low. The machines
are effective at detecting items that would be a threat to crew. Millimeter wave
machines use radio frequency waves to detect threats. The machine bounces the waves
off the body. Millimeter wave scanners emit thousands of times less energy than a cell
phone. Threats are shown on a generic body outline rather than the person’s actual
outline. When there are no weapons or other threats, the screen turns green and shows
an “OK.”
● Level of searching and security screening is detailed in SSP and depends on the
security Level, plan the drill and search as per SSP requirements and security
level
● Searches may require searching of anyone boarding including crew, visitors,
passengers and project personnel, excluding Public Authority Officers
● Depending on the security level cargo and ship’s stores may also require to be
searched
● Searching should be done by trained crew who are aware of search procedures, in
a thorough and methodical manner, taking note of equipment & facilities needed
for the search and the requirement to consider human dignity
When planning the search decide on the possible kinds of searches to be done, these
are:
● Body search
● Luggage search
● Vessel search
A detailed knowledge of the layout of the ship is essential for a successful search; check
the effectiveness of search plan procedures after the search is completed.
On completion of individual search tasks, the cards are returned to a central control
point.
When all cards are returned, the search is known to be complete. The findings of the
search can then be discussed.
● The search should be conducted according to a specific plan or schedule and must
be carefully controlled
● Special consideration should be given to search parties working in pairs with one
searching "high" and one searching "low”
● Searchers should be able to recognize suspicious items
There are many places on board a ship to conceal weapons, dangerous substances, and
devices. Some of these are (list is non-exhaustive):
In Cabins
● Ventilator ducts
● Hollowed-out molding
Companionways
● Ducts
● Wire harnesses
● Railings
● Fire extinguishers
● Behind toilets
Deck
Engine-room
Other areas
● Duct keel
We all have the ability to recognise the display of characteristics and behavioural
patterns of people who may threaten the safety and security of the public and us.
Profiling
Profiling helps us get beneath the outer shell of an individual to obtain a more complete
picture. It has many applications. In the context of ship security, profiling will help you
identify whether and to what extent the crew and visitors to your ship pose a security
risk. Profiling techniques like document checks, questioning and observation ensure that
judgments are based on more than just appearances. Random selection of individuals for
profiling ensures that patterns are not established. It also prevents allegations that
individuals are being picked on? Whenever behaviours or items arouse suspicion, action
should always be taken to respond to the perceived threat whether that means
additional checks, searches or the cordoning off and containing of an explosive device.
Averting a security incident is worth the extra time and effort !
Criminal
Criminal profiling is used to obtain information about an individual or an offender.
Matching DNA samples and reviewing past offenders' files to establish trends and
patterns during investigations are two common profiling techniques.
Industrial
Industrial profiling is used to obtain information about rival companies and their
employees. It might include examining internet sites or employing specially trained
personnel to build up the profiles.
Commercial
Commercial profiling is used to obtain information about customers or employees. Many
organizations use focus groups, surveys and purchase information to track and target
the needs and preferences of their customers.
General
Profiling information is widely available. You can obtain a multitude of information on the
internet including the profile of a potential vacation destination, a residential area, or
even a Doctor that you may be thinking of using !
1. Check documentation;
2. Pose questions in a discreet manner; and
3. Observe body language and behaviour
Checking Documentation
Checking documentation may seem obvious, but it is important. All documents related to
the purpose of a shipboard visit should be examined and the ID of all visitors and crew
verified.
Tips on Questioning.
Use a combination of open-ended and closed-ended questions.
Open questions
They are usually preceded with "what, when, who, where, how and why" and that
require a person to give more than a “yes" or "no" answer. Examples include:
Closed questions
They can only be answered with a "yes" or "no". They can be used to establish facts or
obtain statements that may be used in evidence later. Some examples are:
Check to see that the answers to your questions match up with what you already know
about a crewmember or the purpose of a shipboard visit. And, ensure that the answers
tie in with any items being carried or transported.
● Are you coming directly from another ship or were you on leave?
● Where did you travel to while on leave?
● Did you bring any mementos from your travels?
If you are suspicious of a person's behavior, stay calm and inform someone else of your
suspicions. Do some additional checks or perform a search of the individual's belongings
or equipment.
Allow them onboard only after you are satisfied, they do not pose a security risk.
Never touch or pick anything up. If a suspicious object is an explosive it may be fitted
with an anti-handling device.
Inform someone of your suspicions, discreetly, so that they can summon assistance.
Never use a radio within 25 meters of a suspicious object. If it is an explosive with a
radio-controlled device, a transmission by your radio may activate it.
If you suspect that the package is a bomb, take these additional steps:
● Boarding from over the side (can also be from the pier or via crane)
● Forced armed entry
● Breaking and entering
● Explosives attack
● Disabling of security systems may be used in conjunction with any of the above
(cutting power, blinding CCTV, distracting guards etc.)
Overt method, forced armed entry
There is no perfect security, security is breached by; disabling alarms, bribing guards,
boarding when guards are not attentive and picking locks,
These are examples of covert methods used to circumvent security.
Methods used by pirates and armed robbers to undertake attacks against ships
1. Commonly, two small high speed (up to 25 knots) open boats or ‘skiffs’ are used
in attacks, often approaching from either quarter or the stern. Skiffs are
frequently fitted with 2 outboard engines or a larger single 60 hp or more engine.
2. Pirate Action Groups operate in a number of different boat configurations. To
date, whatever the configuration the attack phase is carried out by skiffs. Pirate
Action Group boat configurations include:
a. Skiffs only;
b. usually two;
c. Mother ships
3. The mother ships include the larger merchant ships (under pirate control), fishing
vessels and dhows. These Mother ships have been taken by the pirates and
usually have their own crew onboard as hostages. Mother ships are used to carry
pirates, stores, fuel and attack skiffs to enable pirates to operate over a much
larger area and are significantly less affected by the weather. Attack skiffs are
often towed behind the Mother ships. Where the size of the Mother ship allows it,
skiffs are increasingly being carried onboard and camouflaged to reduce chances
of interdiction by Naval/ Military forces.
4. Increasingly, pirates use small arms fire and Rocket Propelled Grenades (RPGs) in
an effort to intimidate Masters of ships to reduce speed and stop to allow the
pirates to board. The use of these weapons is generally focused on the bridge and
accommodation area. In what are difficult circumstances, it is very important to
maintain Full Sea Speed, increasing speed where possible, and using careful
maneuvering to resist the attack.
5. Pirates seek to place their skiffs alongside the ship being attacked to enable one
or more armed pirates to climb onboard. Pirates frequently use long lightweight
ladders and ropes, or a long-hooked pole with a knotted climbing rope to climb up
the side of the vessel being attacked. Once onboard the pirate (or pirates) will
generally make their way to the bridge to try to take control of the vessel. Once
on the bridge the pirate/pirates will demand that the ship slows/stops to enable
more pirates to board.
6. Attacks have taken place at most times of the day. However, many pirate attacks
have taken place early in the morning, at first light. Attacks have occurred at
night, particularly clear moonlit nights, but night time attacks are less common.
7. The majority of piracy attacks have been repelled by ship’s crew who have
planned and trained in advance of the passage and applied the Best Management
Practices contained within the various guidance books published by various
concerned sources.
Investigate until you are satisfied that all is well! Some other indicators to watch out for
are:
When a crowd gets out of control consequences could be severe, resulting in:
Emergency (pirate attack, bomb blast) Crowd control management must be addressed in
the Contingency plans because in an emergency there could be panic because:
To control a crowd simple and clear instructions are necessary. Instructions are
given with a clear mind.
When giving instructions address the persons. Request all to communicate clearly. Note
the following when giving instructions:
● Communication and provision of information about the threat, along with clear
instructions about how to exit, are vital to initiate crowd movement and enhance
the efficiency of an emergency evacuation.
● Providing more, rather than less, information about the nature of the threat or
emergency should help the crowd respond more effectively. Withholding
information only serves to increase the crowd’s mistrust of authorities, which
decreases evacuation efficiency.
● In order to be believed and interpreted accurately, warnings must be specific,
timely, historically valid, credible, comprehensible, and convey the nature and
extent of the danger.
● Warnings must also be visual and audio – sirens alone are insufficient.
Recommended actions against pirate attacks are dependent on the situation and are as
below:
Inform the nearest littoral or coastal State through the RCC, using the appropriate ships’
message format. The ship's crew should be warned and, if not already in their defensive
positions, they should move to them. Evasive manoeuvres and hoses should be
vigorously employed as detailed in the preparation phase.
● Ensure the greatest level of safety for those on board the ship;
● If possible remain in control of the navigation of the ship; and
● Try to get the pirates/robbers depart as early as possible
The options available to the master and crew will depend on the extent to which the
attackers have secured control of the ship, e.g. by have they gained access to the bridge
or engine room, have they seized crewmembers who they can threaten, to force the
master or crew to comply with their wishes.
However, even if the crew are in secure areas, the master must consider the risk to the
ship the attackers can cause, when deciding on actions to be taken. An example of a risk
that pirates they could use firebombs to start fires on a tanker or chemical carrier.
The pirates/armed robbers begin to gain control and take one or more of the
ship's crew into their custody
If the attackers have gained control of the engine room or bridge, have seized crew
members or can pose an imminent threat to the safety of a ship, the master or officer in
charge should remain calm and, if possible, seek to negotiate with the attackers.
Try and maintain control over the navigation of the ship, the safe return of any hostages
they may hold and the early departure of the attackers from the ship.
Comply with the attackers' demands may be the only safe alternative as resistance or
obstruction of any kind could be both futile and dangerous.
In the event of attackers gaining temporary control of the ship, crew members should, if
it is safe and practicable, leave Close Circuit Television (CCTV) records running.
Consider hiding equipment (especially those for communication) in areas where crew are
detained.
Security Level 1
At security level 1, the following activities shall be carried out, through appropriate
measures, on all ships, taking into account the guidance given in part B of the ISPS
Code, in order to identify and take preventive measures against security incidents:
Security Level 2
At security level 2, the additional protective measures, specified in the ship security plan
(SSP), shall be implemented for each activity detailed above, taking into account the
guidance given in part B of the ISPS Code.
Security Level 3
At security level 3, further specific protective measures, specified in the SSP, shall be
implemented for each level 1 activity, taking into account the guidance given in part B of
the ISPS Code.
Whenever security level 2 or 3 is set by the Port or Flag, the ship shall acknowledge
receipt of the instructions on change of the security level.
The ship shall report any difficulties in implementation. In such cases, the Port Facility
Security Officer and Ship Security Officer shall liaise and co-ordinate the appropriate
actions.
If a ship is required by her flag state to be at a higher security level, than the port state
she is visiting, she should advise the port state about her situation without delay (inform
PFSO), so that appropriate actions can be coordinated.
The duty of the Ship Security Officer as given in the ISPS Code Part A requires the
reporting of all security incidents. The ship security plan will have the procedures for
reporting of security incidents. In the case of piracy and armed attack there are now
very well defined procedures issued by IMO circulars in cooperation with the
organisations handling the incidents occurring in various parts of the globe.
Maritime Domain Awareness for Trade – Gulf of Guinea (MDAT-GoG): is a service
operated by the French and UK navies from centres in Brest, France, and Portsmouth,
UK and aims to develop, maintain and share details of the maritime domain picture of
the waters off Africa’s western seaboard. The MDAT-GoG administers a Voluntary
Reporting Area (VRA) scheme under which merchant ships are encouraged to report
position information while operating in the VRA. This region reports the highest incidents
of piracy attacks in 2018.
Reporting:
Ships are encouraged to send regular reports, using the MDAT-GoG reporting forms (for
Gulf of Guinea-Africa) as below:
WHEN WHAT
Another example is this UKMTO – (UK) Maritime Trade Operations. The UK Maritime
Trade Operations (UKMTO) office in Dubai acts as a point of contact for industry liaison
with the Combined Military Forces (CMF). UKMTO Dubai also administers the Voluntary
Reporting Scheme, under which merchant ships are encouraged to send daily reports,
providing their position and ETA at their next port whilst transiting the region bound by
Suez, 78°E and 5°S. UKMTO Dubai subsequently tracks ships, and the positional
information is passed to CMF and EU headquarters. Emerging and relevant information
affecting commercial traffic can then be passed directly to ships, rather than by company
offices, improving responsiveness to any incident and saving time. For further
information, or to join the Voluntary Reporting Scheme, please contact MTO Dubai:
ukmtodubai@eim.ae.
Below we give a summary of this information.
The reporting formats as below, for the initial and final reports:
● Ship's name and, callsign, IMO number, INMARSAT IDs (plus ocean region code)
and MMSI.
1. MAYDAY/DISTRESS ALERT (see note)
2. URGENCY SIGNAL
3. PIRACY/ARMED ROBBERY ATTACK
● Ship's position (and time of position UTC)
1. Latitude Longitude
2. Course Speed KTS
● Nature of event
Note: It is expected that this message will be a Distress Message because the ship or
persons will be in grave or imminent danger when under attack. Where this is not the
case, the word MAYDAY/DISTRESS ALERT is omitted.
Use of distress priority (3) in the INMARSAT system will not require MAYDAY/DISTRESS
ALERT to be included.
B. The format of ship security alerts should be compatible with the communication
system used to transmit it and, as a minimum, contain the following:
1. Ship’s identity (e.g., IMO number, Inmarsat IDs (including ocean regions code),
MMSI number, or call sign),
2. Ship’s position (latitude and longitude associated with a date and time), and
3. Ship’s security alert activation indication.
1. Ship's name and call sign, IMO number, Inmarsat ID, or MMSI number
2. Reference initial ship security alert
3. Position of incident
Latitude and longitude
Name of the area
4. Details of incident, e.g.,
• While sailing, at anchor or at berth?
• Method of attack
• Description/number of suspect craft
• Number and brief description of attackers/perpetrators
• What kind of weapons did the attackers carry?
• Any other information (e.g., language spoken)
• Injuries to crew and passengers
• Damage to ship (Which part of the ship was attacked?)
• Brief details of stolen property/cargo
• Actions taken by the master and crew
• Was incident reported to the coastal authority and to whom?
• Action taken by the coastal State
5. Last observed movements of pirate/suspect craft, e.g.,
Date/time/course/position/speed
6. Assistance required
7. Preferred communications with reporting ship, e.g.,
Appropriate Coast Radio Station
HF/MF/VHF
INMARSAT IDs (including ocean region code)
MMSI
8. Date/time of report (UTC)
Inadvertent Ship Security Alerts: The ship should report an inadvertent alert to RCC
immediately to protect system integrity and to prevent costly response that may divert
response resources from other pressing needs.
The Declaration of Security (DOS) means an agreement reached between a ship and
either a port facility or another ship with which it interfaces specifying the security
measures each will implement.
The purpose of the DOS is to address the security requirements that are to be shared
between the port facility and the ship and clearly states each one’s responsibilities.
UKMTO
UKMTO acts as the primary point of contact for merchant ships and their CSOs, providing
liaison with military forces in the region. UKMTO administers the Voluntary Reporting
Scheme, under which merchant ships are encouraged to send regular reports. These
include:
UKMTO is able to communicate with ships and CSOs directly, in order to disseminate
Warnings and Advisories of incidents within the region:
● Warnings: Simple messages describing that an incident has occurred in a
Lat/Long and with a time. This is normally accompanied by direct UKMTO-to-ship
telephone calls to all ships within a nominated radius of the incident to give ships
the earliest possible alert.
● Advisories: This is the next tier of alerts to ships, normally of sightings/reports
that are relevant within the region.
MSCHOA
The MSCHOA is the planning and coordination centre for the EU Naval Forces (EU
NAVFOR). MSCHOA encourages companies to register their ships’ movements before
entering the HRA and if participating in the group transit system via their website
www.mschoa.org.
When departing the VRA, ships should be aware of adjacent regional reporting
requirements, e.g.: NATO Shipping Centre (Mediterranean – Chart Q6010) and ReCAAP
Information Sharing Center/Singapore Information Fusion Center (SE Asia – Chart
Q6012).
EU NAVFOR and the Combined Maritime Forces (CMF) produce Industry Releasable
Threat Assessments (IRTAs) to aid risk management for companies. The threat
assessments use military knowledge and intelligence to present a common
understanding of the threats and trends in the region. The IRTAs are complimented by
Industry Releasable Threat Bulletins (IRTBs), which cover specific events. These
documents are an important resource and should be considered as part of the threat and
risk assessment process.
● Initial report.
● Daily report.
● Final report.
● Suspicious/irregular activity report.
1. Ship Name
2. Flag
3. IMO Number
4. INMARSAT Telephone Number
5. Time and Position
6. Course
7. Passage Speed
8. Freeboard
9. Cargo
10. Destination and Estimated Time of Arrival
11. Name and contact details of Company Security Officer
12. Nationality of Master and Crew
13. Armed/unarmed security team embarked
1. Ship Name
2. Ship’s Call Sign and IMO Number
3. Time of Report in UTC
4. Ship’s Position
5. Ship’s Course and Speed
6. Any other important information*
7. ETA point A/B IRTC (if applicable)
*Other important information could be change of destination or ETA, number of UK crew
on board, etc.
1. Ship’s name
2. Ship’s Call Sign and IMO Number
3. Time of Report in UTC
4. Port or position when leaving the voluntary reporting area
1. Ship’s name
2. Ship’s Call Sign and IMO Number
3. Time of Report in UTC
4. Ship’s Position
5. Ship’s Course and Speed
6. Sighting of suspicious activity. Time, position, brief description of craft and
activity witnessed
Registration with MSCHOA ensures a ship is monitored by military counter piracy forces
during its transit of the HRA. In addition, regular threat assessment updates, warnings
and the latest self-protection information are made available to shipping companies and
Masters who register.
Registration is required within the MSCHOA Vessel Registration Area as highlighted on
UKHO Chart Q6099.
The form to ‘Register a Vessel’s Movements’ is available on the MSCHOA website and
UKHO Chart Q6099. The following should be noted:
There are two principal methods to register your ship’s movement with MSCHOA.
● Online at www.mschoa.org (note you will need to register with MSCHOA for
access, this can be done following the register tab on the website).
● Offline. A downloadable form is available from www.mschoa.org or it can be
requested from postmaster@mschoa.org. This form was updated in March 2018
to make offline registration simpler for ships with sporadic internet connectivity to
register.
If the above options are not possible a ship can be registered by sending an email with
the subject heading MSCHOA Vessel Registration to postmaster@mschoa.org with the
information in the table below. Items marked with an * are mandatory.
Vessel Details
Ship Name
IMO Number
Call Sign
Primary Email
Ship contact number
Owner name
Operator address
DPA telephone
Flag State
MMSI Number
Ship’s Master
Secondary Email
Ship contact email
Operator name
DPA name
DPA email
Movement Details
Entry Point to MSCHOA vessel registration area (78°E/10°S/23°N/Suez/Port)
Entry Date/Time to MSCHOA vessel registration area (DD/MM/YYYY) (HH) (MM)
Exit Point from MSCHOA vessel registration area (78°E/10°S/23°N/Suez/Port)
Exit Date/Time to MSCHOA vessel registration area (DD/MM/YYYY) (HH) (MM)
Do you intend to transit the IRTC?
ETA to IRTC (times are in UTC/ Zulu time)
Direction (East/West)
Do you intend to join a group transit?
Do you intend to join a National Convoy?
Which National Convoy are you joining?
Crew numbers and nationalities
Draught
Freeboard of lowest accessible deck in Metres(M)
Planned Transit Speed
Vessel’s Maximum Speed
Cargo (Crude Oil/Clean Oil/Arms/ Chemicals/ Gas/Passengers/Bulk Cargo/
Containers/Fishing/Ballast/ Others … Please Specify)
Hazardous cargo
Next Port of Call
Last Port of Call
Number of Armed Security personnel on board?
Nationality of armed security team?
The security measures and procedures at the three security levels required to:
The security measures and procedures to ensure security at the three security levels
are:
● For performance of all ship security duties - SSO to carry out regular checks.
● Controlling access to the ship - all means of access to the ship identified in the
SSA. After identification the SSP should establish security measures for control,
monitoring and/or limiting access to gangways, ladders, ramps, doors, shell
gates, windows and ports, mooring lines, anchor chains, cranes and hoisting gear
● Controlling the embarkation of persons and their effects - This is done
through access control, personal effect and body searches.
Identify, authenticate and then authorize all persons boarding the vessel. Record
all visitors, issue visitor passes and accompany them into the vessel. Conduct
body and personal effect searches if required.
● Monitor restricted areas to ensure only authorized persons have access -
Identify and then mark all restricted areas indicating that access to or
unauthorized presence in a restricted area constitutes a breach of security.
Regularly patrol or use CCTVs to monitor restricted areas.
● Monitor deck areas and areas surrounding the ship - Use lights at night and
have regular patrols.
● Coordinate the security aspects of the handling of cargo and ship stores
Security aspects for Cargo - Prevent tampering, prevent cargo not meant for
carriage from being accepted and stored on board the ship.
Check cargo, by doing a visual and physical examination (if possible), use
screening equipment, mechanical devices, trained dogs (at port facility), check
against cargo documentation (manifest)
Security related to ship stores – Check package integrity, do not accept stores
without inspection, prevent tampering, do not accept stores not ordered, stow
away immediately after one receives.
● Ensure that security communication is readily available - Regular tests of
Ship Security Alert System by a test call to ensure it is working, providing the
SSAS with an emergency and reserve source of power that is not dependent on
the vessels main power source.
Convoy Escorts
Convoys Advisory
Navy convoy and escort operations for ships transiting Gulf of Aden are provided by
China, India, Korea, Japan and Russia.
Contact info@intercargo.org for convoy escort schedules.
The 31 member nations are: Australia, Bahrain, Belgium, Canada, Denmark, France,
Germany, Greece, Iraq, Italy, Japan, Jordan, Republic of Korea, Kuwait, Malaysia, the
Netherlands, New Zealand, Norway, Pakistan, The Philippines, Portugal, Saudi Arabia,
Seychelles, Singapore, Spain, Thailand, Turkey, UAE, United Kingdom, United States and
Yemen.
Contingency Planning
There is an important approach to the development of a model that could be used for
crisis management. The methods that are chosen for crisis management have a chance
to deliver the intended aftermath consequences. A simulated scenario could be staged so
that the approaches that are proposed get tested. This also presents an opportunity to
establish the most ideal strategy that needs to be considered for incorporation. For
effective crisis management, it is crucial that the first decision to be made on the
approach to be used for managing the situation is implemented soon after the crisis
appears. Working with vigilance is paramount so that the adverse effects of the crisis do
not spread into all the elements of the organization. In the contingency plan chosen, it is
ideal to have information and guidance to assess the likely implications.
A planned or unplanned crisis can be managed strategically and more effectively if a ship
does its crisis management “homework.” One of the main aspects of a company that is
proactive is its obligation and ability to take responsibility for its acts. The consideration
of possible scenarios and the best possible solutions to prepare, prevent, and provide
interventions that allow a ship to be better prepared in handling a crisis is necessary.
Scenario planning may be utilized as a crisis management strategy; it provides a
mechanism for thinking through different ways whereby these scenarios may occur and
develop the most suitable business responses
Within the crisis management plan, it is important to have a clear chain of command in
place. The plan needs to be put in writing to take care of the worst-case scenario,
including total inaccessibility of the normal workplace and the inability to use and rely
upon the ship and company infrastructure and resources for an extended time period. It
is also advisable that the crisis management cross-functional team meet regularly to
hold discussions on potential crises and the means of responding to them.
1. What resources and information are required for dealing with the immediate
emergency?
2. What is the status of the emergency in the affected locations?
3. How are the employees/crew/passengers reacting?
In the event of a crisis, internal stakeholders and employees need a convenient way to
gain access to communication from the firm.
The communication channels that most firms utilize and that pro- vide the broadest
access include:
In most cases, communication experts advocate being quick, steadfast, and bold. Based
on this proposition, one can contend that a crisis often creates the need for
instantaneous and consistent information to fast-track positive responses to the
situation.
1. Pre-crisis,
2. Crisis response, and
3. Post-crisis.
The pre-crisis phase is concerned with prevention and preparation. The crisis response
phase is when the ship and the company must respond to a crisis. The post-crisis phase
looks for ways to better prepare for the next crisis and fulfills commitments made during
the crisis phase including follow-up information.
● Do not hesitate to sound the ship's general alarm in case of a threat of assault;
● Try to keep adequate lighting to permanently dazzle the opponents, in case of an
attempt by strangers to climb the ship's side;
● Raise the alarm, by VHF - channel 16, to the ships in the area and to the
permanent watch system of the authorities ashore (cite the existing structure in
the port). The efficiency of assistance by the security forces depends on an early
alarm;
● Sound the alarm with intermittent blasts on the siren and use visual alarms with
floodlights and signalling rockets;
● If appropriate, to protect the lives of those onboard, use measures to repel the
boarding by employing powerful floodlights for dazzling the aggressors or using
jets of water or signalling rockets against the areas of boarding; and
● Do not attempt any heroic acts.
Keep the contracted watchmen under the control of the officer of the watch
Demand a good watchman service. Make them identify all persons that enter and leave
the ship. Recommend that the crew co-operate with the control. Do not allow the
watchman to leave the gangway, unless he is relieved by another watchman or a crew
member.
This information will make possible the study of measures to be adopted for the
prevention and combat of these crimes, contributing to guaranteeing the safety of the
crew and the ship.
Note
Security procedures and measures specific to the security level and threat type are
available in the Ship Security Plan. The SSO must ensure that crew members are briefed
and trained on the various security contingencies as documented in the SSP.
Contingency Planning
Normally cargo will only be the object of robbery or theft if the criminals have advance
knowledge of the contents, through information collected by unscrupulous persons who
have access to the bill of lading.
Attempt to stow the containers with valuable cargo in a manner to obstruct their doors.
Isolate the means of access to the ship and also the accesses to the internal areas,
creating a sole way of entry and exit by the gangway, guaranteeing its control by the
watchman posted there.
Bomb threat
General: (this could be triggered by someone saying something, calling or writing about
an impending incident)
● Contact FSO
● Call emergency stations, and standby to evacuate if necessary
● Account for crew members
● Inform Company
● Inform Port Authority, as applicable
● Remain calm.
● Do NOT touch, tamper with, or move the package, bag, or item.
● Notify FSO, Company and Port Authority
● Follow instructions from law enforcement & Port Facility supervisors and/or law
enforcement will assess the situation and provide guidance
● Call emergency stations, and standby to evacuate if necessary
● Account for crew members
● Be aware. There could be other threats or suspicious items.
Stowaways
● Inform Master
● Restrain and control, with help from other crew
● Treat humanely
Who is a ‘Stowaway’ ?
Under the IMO’s FAL Convention (Facilitation of International Maritime Traffic
Convention), a stowaway is defined as “A person who is secreted on a ship, or in cargo
which is subsequently loaded on the ship, without the consent of the shipowner or the
master or any other responsible person and who is detected on board the ship after it
has departed from a port, or in the cargo while unloading it in the port of arrival, and is
reported as a stowaway by the master to the appropriate authorities”. Mostly stowaways
are driven by desperate economic and living conditions to try and smuggle themselves.
Sometimes the stowaway is part of an organized crime in smuggling people and drugs,
using e.g., a sealed cargo container or an empty ship's tank. This can remain hidden and
undiscovered and the people and drugs can be delivered in a destination port and
constitute a crime of human smuggling and drug trafficking.
ISPS Code
Under the ISPS Code, if there are “clear grounds” that a ship is not in compliance with
the Code, the authorities are likely to apply security control measures to ensure
compliance. Finding a stowaway onboard is “clear grounds” of non compliance. Should
stowaways be discovered on any vessel, the stowaway must be detained on board and
properly cared for until the proper authorities allow disembarkation of the stowaway.
Preventive measures
Traditionally perceived as a shipboard responsibility, stowaways are now seen as a
problem requiring the combined efforts of the Ports / Terminals, Ship Manager / Owner /
Charterer and the Ship.
Ship managers / owners: Must set up procedures for prevention of stowaways, and then
how to deal with stowaways should they be found on board. Security guards may need
to be hired to assist in high risk areas.
Prior to port entry all spaces not to be used during cargo operations should be locked
and sealed. An effective gangway watch must be maintained at all times. The crew
should remain vigilant and challenge anyone who has no business on board or appears
to be hanging around suspiciously. Ship's staff should conduct a complete stowaway
search on the completion of cargo operations and prior to departure. In a high risk area,
a further search should be conducted soon after departure.
The greatest threat from stowaways is not so much their physical presence and the
stress placed on the crew, but the consequences of their presence including heavy fines,
delays to ship, and possibly even criminal charges against the crew for mistreatment of
stowaways. It is easy to suggest that the most effective way to stop this nuisance is to
prevent the stowaways from boarding the vessel. Despite the best coordinated efforts of
the ship, terminal, and company, determined individuals will occasionally succeed in
stowing away.
Other Emergencies
This will depend upon the type and is as below:
Use of the ship to carry persons intending to cause a security incident, or their
equipment
● Call for emergency stations
● Inform Company
● Inform Port Authority, as applicable
● Establish safe navigation, as applicable
Normally cargo will only be the object of robbery or theft if the criminals have advance
knowledge of the contents, through information collected by unscrupulous persons who
have access to the bill of lading.
Attempt to stow the containers with valuable cargo in a manner to obstruct their doors.
Isolate the means of access to the ship and also the accesses to the internal areas,
creating a sole way of entry and exit by the gangway, guaranteeing its control by the
watchman posted there.
In case of an assault
● Do not hesitate to sound the ship's general alarm in case of a threat of assault;
● Try to keep adequate lighting to permanently dazzle the opponents, in case of an
attempt by strangers to climb the ship's side;
● Raise the alarm, by VHF - channel 16, to the ships in the area and to the
permanent watch system of the authorities ashore (cite the existing structure in
the port). The efficiency of assistance by the security forces depends on an early
alarm;
● Sound the alarm with intermittent blasts on the siren and use visual alarms with
floodlights and signalling rockets;
● If appropriate, to protect the lives of those onboard, use measures to repel the
boarding by employing powerful floodlights for dazzling the aggressors or using
jets of water or signalling rockets against the areas of boarding; and
● Do not attempt any heroic acts.
Keep the contracted watchmen under the control of the officer of the watch
Demand a good watchman service. Make them identify all persons that enter and leave
the ship. Recommend that the crew co-operate with the control. Do not allow the
watchman to leave the gangway, unless he is relieved by another watchman or a crew
member.
This information will make possible the study of measures to be adopted for the
prevention and combat of these crimes, contributing to guaranteeing the safety of the
crew and the ship.
Note
Security procedures and measures specific to the security level and threat type are
available in the Ship Security Plan.
The SSO must ensure that crew members are briefed and trained on the various security
contingencies as documented in the SSP.
Damage to, or destruction of, the ship or of a port facility, e.g., by explosive
devices, arson, sabotage or vandalism
● Inform Master
● Restrain and control, with help from other crew
● Treat humanely
Use of the ship to carry persons intending to cause a security incident, or their
equipment
● Be quick and try to have initial response within the first hour.
● Be accurate by carefully checking all facts.
● Be consistent by keeping spokespeople informed of crisis events and key
message points.
● Make public safety the number one priority.
● Use all of the available communication channels including the social media, web
sits, Intranet, and mass notification systems.
● Provide some expression of concern/sympathy for victims.
● Remember to include employees in the initial response.
● Be ready to provide stress and trauma counseling to victims of the crisis and their
families, including employees.
To effectively implement the provisions of the SSP drills must be conducted at least once
every three months.
In addition, in cases where more than 25 percent of the ship's personnel have been
changed, at any one time, with personnel that have not previously participated in any
drill on that ship within the last 3 months, a drill should be conducted within one week of
the change.
Various drill types should be conducted and scheduled, a scheduling example of different
security drill types is like below:
S/N Drill Details Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
01 Piracy/ Hijacking X X X
02 Bomb Threat X X
onboard Vessel
03 Other craft X
Ramming Vessel
04 Terrorist Boarding X
Vessel
05 Bomb Threat at X
terminal
06 Bomb found X X X
onboard
07 Bomb found at X
terminal
08 Evacuation via X
terminal
Use of Citadel where provided on-board - the meaning of citadel
A citadel is strongly fortified place on the vessel where crew members can shelter from
say a pirate attack.
The Master reports to the Company Security Officer (CSO) for all security related
incidents. The drills are done every three months, but can be increased based on the
needs, decided by the CSO and SSO based on various factors, primarily to ensure that
the crew is ready in taking preventive measures under any breach or a threat to
security.
The regulations allow a company operating several similar vessels to hire new crew
members, have them participate in a drill on board one vessel, and then rotate those
crew members to any of the similar vessels within that same company’s fleet. For the
purposes of these regulations, “similar” may be interpreted to mean any vessel in the
company’s fleet that has a SSP with essentially the same security measures. A ferry line,
for example, that operates both high-speed craft and displacement vessels may have
similar SSPs, even though the vessels are not “similar” in design. It is the responsibility
of the SSO to ensure that all personnel are adequately trained, and in this case, that
new personnel from a similar vessel are familiar with the particulars of the SSP that are
unique to the vessel.
Security drills and exercises may be combined with existing non-security drill and
exercise requirements to increase efficiency. These may include safety, and disaster
preparedness drills.
Drill scenario
Master: (Raise the alarm onboard the ship.) “This is a drill. Assume that a boat, which
could be pirates, is approaching. All crew go to your stations as designated.” (Suppose
the crew are to assemble on the bridge, and confirm that the crew have assembled
there)
Master: “Declare your station, role and place where you are assigned to lock.”
Crew 1: “I am in charge of the engine room and operation of emergency fire pumps,
and I am assigned to check locks on upper deck, starboard side and on the stern.”
Crew 2: "I am in charge of the stern deck and discharging of water, and I am assigned
to check locks on the boat deck on the starboard side in case escape into the ship
becomes necessary.” (Have other crew recite their stations, roles and duties, etc.)
Master: “Later, assemble by position unit, confirm location of equipment and machinery
in about 10 minutes. After that, dismiss accordingly, and drill will be over.”
Master: (Make an onboard announcement in 10 minutes.) “Drill is over. All crew return
to your regular stations.”
It is necessary for each ship to assign basic stations and roles to crew in advance, as is
the case with general emergency operations.
Requirements for, and importance of, conducting drills and exercises, including
those relating to prevention and suppression of piracy and armed robbery
against ships.
Emergency Preparedness, Drills, and ExercisesUse of Citadel
Use of Citadel
Citadel
Citadel
A citadel is a designated area where, in the event of imminent boarding, all crew may
seek protection. A citadel is designed and constructed to resist forced entry. The use of a
citadel cannot guarantee a military or law enforcement response.Well-constructed
citadels with reliable communications (ideally satellite phone and VHF) must be supplied
with food, water and sanitation. Control of propulsion and steering can offer effective
protection during an attack. The use of the citadel must be drilled and the VSO should
define the conditions and supporting logistics for its use.
It is important to note that military forces are likely to apply the following criteria before
boarding a ship:
● All the crew must be accounted for and confirmed in the citadel.
● Two-way communication with the citadel.
Well-constructed citadels used by a well-drilled crew can offer effective protection during
an attack. The establishment of a citadel will require external technical advice and
support. As well as protection, a citadel must provide reliable means to communicate
ashore and maintain some degree of situational awareness. The ability to deny control of
propulsion to attackers is a further consideration.
The VSP should define the conditions for use of the citadel and logistics necessary to
survive e.g. food, water, medicines, first-aid kits. The use of the citadel must be drilled
to ensure the Master is able to make the correct and timely decision on whether to
retreat into it.
The whole concept of the citadel approach is lost if any of the crew are left outside
before it is secured. Therefore, plans should include a method of ensuring that the entire
crew have entered the citadel.
Citadel Equipment
Notes
Security Administration
Security Administration
Records shall be kept on board and the duration for which they should be
retained.
Records of the following must be kept on board for a period as determined by the Flag
State. Records must be protected from unauthorized access or disclosure:
● The Continuous Safety Record (CSR) that provides an on-board record of the
history of the ship (as per SOLAS Chapter XI-1 special measures to enhance
maritime safety).
● Ship Security Plan and associated records, the ship security assessment
● Record of changes to the Ship Security Plan
● General description of cargo aboard the ship;
● Passenger list; and
● Information required to be carried under SOLAS regulation XI-2/5, which is
information regarding the person responsible for appointing crew members
presently employed on the vessel, information regarding the person who decides
vessel employment and the parties to the charter party for chartered vessels
The certificate is subject to both an interim and renewal verification of the vessels
security system. The purpose of these verification (audits) are to ensure that that the
VSP and/or amendments to a previously approved VSP meet the provisions of SOLAS XI-
2 and the ISPS Code.
A shipboard audit determines (both intermediate and renewal) whether the vessel is
complying with approved VSPs on board ships. It also checks for the effectiveness of the
implementation of the VSP on board ships.
The intermediate verification is carried out between the second and third anniversary
date of the certificate.
The certificate is valid for 5 years and is issued after an initial audit (verification). A new
certificate will be issued on completion of the renewal verification. A new ISSC is issued
on board with a limited validity of a maximum 5 months (shorter periods of validity may
sometimes apply). Full Term ISSC will be issued after the assessment of the audit
report.
Interim certificates are valid for 6 months, after which the full term ISSC is issued,
provided the vessel complies with all the ISSC certification requirements.
● If the relevant verification is not completed within the required periods (time-
windows)
● Upon change of flag
● If the certificate is not endorsed as required
● Upon change of management
The International Ship & Port Facility Security (ISPS) Code is the standard for vessel
security that is applied to vessels that sail on international routes.
Any changes made related to the above mentioned points should be mentioned in the
continuous synopsis record. Officially, the record should be in English, Spanish, or
French language; however, a translation in the language of the administration may be
provided.
The continuous synopsis record shall always be kept on board ship and shall be available
for inspection all the time.
Anti-Piracy
Anti-Piracy
Ship Protection Measures
This section highlights proven SPM that provide layered protection. The BMP is based on
regional experience of attacks and will continue to evolve as methods change.
The implementation of SPM will be identified during the voyage planning process.
Companies may wish to consider making further alterations to the ship beyond the scope
of this BMP, and/or providing additional equipment and/or personnel as a means of
further reducing the risk of attack.
Manoeuvring
The Master and officers should practice manoeuvring the ship to ensure familiarity with
the ship’s handling characteristics. The Master should also practice avoidance
manoeuvres while maintaining the best possible speed. Experience has shown that such
action can defeat even a lengthy and determined attack as creation of hydrostatic
pressure can have a better defensive impact than speed.
Alarms
The ship’s alarms inform the ship’s crew that an attack is underway and warn the
attacker that the ship is aware and is reacting. In addition, continuous sounding of the
ship’s whistle may distract the attackers.
It is important that:
Inform the nearest littoral or coastal State through the RCC, using the appropriate ships’
message format. The ship's crew should be warned and, if not already in their defensive
positions, they should move to them. Evasive manoeuvres and hoses should be
vigorously employed as detailed in the preparation phase.
Being certain that piracy/armed robbery will be attempted
If not already in touch with the littoral coastal State, efforts should be made to establish
contact. Crew preparations should be completed and, where a local rule of the road
allows ships under attack to do so, a combination of sound and light signals should be
made to warn other ships in the vicinity that an attack is about to take place.
Pirate /armed robbery vessel in proximity to, or in contact with, own ship
Use water jets to prevent pirate boarding, and if possible, cast off grappling hooks and
poles, provided crew not endangered.
Sound the pirate alarm, using the ship's whistle as an alarm discourages the attackers
and tells crew working in exposed areas to seek shelter.
Communicate with other vessels using distress flares and ship’s communication
equipment for help.
If possible, use evasive manoeuvering techniques e.g. heavy wheel movements to ride
of attackers.
When attackers are on board the actions of the master and crew should:
● Ensure the greatest level of safety for those on board the ship;
● If possible remain in control of the navigation of the ship; and
● Try to get the pirates/robbers depart as early as possible
The options available to the master and crew will depend on the extent to which the
attackers have secured control of the ship, e.g. by have they gained access to the bridge
or engine room, have they seized crewmembers who they can threaten, to force the
master or crew to comply with their wishes.
However, even if the crew are in secure areas, the master must consider the risk to the
ship the attackers can cause, when deciding on actions to be taken. An example of a risk
that pirates they could use firebombs to start fires on a tanker or chemical carrier.
The pirates/armed robbers begin to gain control and take one or more of the
ship's crew into their custody
If the attackers have gained control of the engine room or bridge, have seized crew
members or can pose an imminent threat to the safety of a ship, the master or officer in
charge should remain calm and, if possible, seek to negotiate with the attackers.
Try and maintain control over the navigation of the ship, the safe return of any hostages
they may hold and the early departure of the attackers from the ship.
Comply with the attackers' demands may be the only safe alternative as resistance or
obstruction of any kind could be both futile and dangerous.
In the event of attackers gaining temporary control of the ship, crew members should, if
it is safe and practicable, leave Close Circuit Television (CCTV) records running.
Consider hiding equipment (especially those for communication) in areas where crew are
detained.
Anti-PiracyPiracy Awareness
Piracy Awareness
Piracy Awareness - Prior to Entering Areas of Risk - Appraise the strengths and
vulnerabilities of crews and ships
The International Maritime Bureau has the following advice to Masters if a vessel is
intending to transit a piracy prone area. The advice is as below:
In most incidents pirates and armed robbers will abandon an attack when they know
they been spotted or feel the vessel has been secured and is a difficult target. However
Somali and Nigerian pirates tend to be more aggressive so additional precautions must
be taken.
Always Follow
Always report ALL actual, attempted or suspicious piracy and armed robbery incidents
occurring anywhere to the 24-hour manned IMB PRC. This is crucial in the response
procedures as well as broadcasting the threat to ALL vessels in the area.
● Comply with procedures in the SSP in Security Plan as required when entering a
high risk area
● Brief Crew on piracy procedures and precautions prior entry
● Prepare an emergency communication plan
● Have a piracy drill prior entry
● Single access point for entry into accommodation
● Keep doors locked
● Test communications links
● Follow BMP5 guidelines
● Harden vessel’s structure to prevent boarding – e.g. razor wires, hoses rigged,
nets etc.
● Ladders etc. stowed
● Minimise cash holding
● Raise security to higher equivalent – at least 2
● Register with MSCHOA & UKMTO (Somalia) if appropriate
● Low speed
● Low freeboard
● Inadequate planning and procedures
● Visibly low state of alert and/or lack of evident self-protective measures
● Where a slow response by the ship is evident
● Inadequate training of ship’s crew to handle pirates
● Lack of Best Management Practices
Factors such as ship size, speed, freeboard, sea state, visibility, day/night
condition affecting the vulnerability to an attack
The ships most at risk to pirate attacks are:
Note that pirate attacks have taken place at most times of the day. However, many
pirate attacks have taken place early in the morning, at first light.
Attacks have occurred at night, particularly clear moonlit nights, but night-time attacks
are less common.
Anti-PiracyAnti-piracy measures
Anti-piracy measures
Anti-piracy measures (civilian and military) - that can be adopted to make the
ship less vulnerable to pirates boarding it
Anti-piracy measures to be adopted to make the ship less vulnerable to a piracy attack
are as below:
Water curtains
Water cannon
Pirates Arrest
Anti-PiracyCommunication with the flag state, coastal authority and task force
Communication with the flag state, coastal authority and task force to update
ships position frequently - Understand the contents of the Best Management
Practices (BMP) guide as issued by industries bodies and updated from time to
time
The purpose of the Industry Best Management Practices (BMP) is to assist ships avoid,
deter or delay piracy attacks in the High Risk Area (Somalia).
This is because experience and data collected by Naval/Military forces, shows that the
application of the recommendations contained in this booklet can and will make a
significant difference in preventing a ship becoming a victim of piracy.
BMP recommends that vessels do the following prior entry into Somalia piracy area:
● Fill up Vessel movement registration form to register vessel with Maritime Safety
Centre Horn Of Africa (MSCHOA)
● Report to United Kingdom Maritime Trade Operations (UKMTO), when in high risk
area
● Implement ship protection measures
Aircraft Patrol
Maintain contact with the security authority or the Navy preferably by telephone for as
long as it is safe to do so. On receipt of information in relation to an attack, the security
authority/ the naval unit will inform the appropriate national maritime operations centre
and local authorities and will ensure all other ships in the immediate vicinity are aware of
the event.
Follow up with call to the Company Security Officer if the situation permits.
Activate the Ship Security Alert System (SSAS) which will alert your CSO and Flag State.
Make a ‘Mayday’ call on VHF Ch. 16.
Send a distress message via the Digital Selective Calling system (DSC) and Inmarsat-C,
as applicable.
A basic piracy operation requires a minimum eight to twelve militia prepared to stay at
sea for extended periods of time, in the hopes of hijacking a passing vessel.
Each team requires a minimum of two attack skiffs, weapons, equipment, provisions,
fuel and preferably a supply boat. The costs of the operation are usually borne by
investors, some of whom may also be pirates.
If a ship is successfully hijacked and brought to anchor, the pirates and the militiamen
require food, drink, living quarters, fresh clothes, cell phones, air-time, etc. The captured
crew must also be cared for.
In most cases, these services are provided by one or more suppliers, who advance the
costs in anticipation of reimbursement, with a significant margin of profit, when ransom
is eventually paid.
When ransom is received, fixed costs are the first to be paid out. These are typically:
● Reimbursement of supplier(s)
● Financier(s) and/or investor(s): 30% of the ransom
● Local elders: 5 to 10 %of the ransom (anchoring rights)
● Class B shares (approx. $15,000 each): militiamen, interpreters etc.
● The remaining sum — the profit — is divided between class-A shareholders.
Pirate Attack
Pirate Attack
Piracy and armed attacks continue to occur on an increasingly frequent basis at sea.
Armed robbery occurs mostly in port areas, while piracy occurs at sea. Piracy occurs
outside the jurisdiction of the state. In this form of terrorism well armed pirates attack,
then board a ship and then hold the officers and crew on board for ransom money. This
type of attack is common in Somalia.
Incident Statistics
IMB Piracy & Armed Robbery Map 2019
The map above shows all piracy and armed robbery incidents reported to IMB Piracy
Reporting Centre during 2019.
There were 239 global security incidents at sea in the first half of 2017, as shown in the
figure below:
Security incidents 2017
However as the figure below illustrates there was a decrease in security related incidents
at sea in 2017 compared to 2016.
Also shown are Top locations for port and anchorage crime in 2017.
Decrease in Security related incidents in 2017
According to the final report of the experts group convened in 2008 by the U.N. Special
Representative to Somalia, “poverty, lack of employment, environmental hardship,
pitifully low incomes, reduction of pastoralist and maritime resources due to drought and
illegal fishing and a volatile security and political situation all contribute to the rise and
continuance of piracy in Somalia.”
Pirate activity and ransom revenues have increased significantly in the past years, and
many now assert that Somalia’s economy and its population are increasingly dependent
on piracy. The average ransom paid in 2010 has been estimated at over $5.4 million—
with more than 50 reported hijackings per year, this places the pirates’ 2010 ransom
revenues at over $250 million. U.N. officials argue that the insecurity caused by piracy
deprives northern Somalia, which has not been as affected by the armed conflict in
central and southern Somalia, of a variety of job-creating investments, from port
operations to commercial fishing. Somali pirates interviewed by the international media
frequently link their pirate activities to trends such as illegal fishing and dumping in
Somali waters that have emerged as the country has lost its ability to patrol its waters
over time.
While these explanations may mask the opportunistic piracy of some, reports suggest
that illegal fishing and dumping have disrupted Somalia’s coastal economy. Recent
estimates by the United Nations suggest that Somalia may lose $95 million annually to
illegal fishing.
The international Contact Group on Piracy off the Coast of Somalia stated at its inaugural
meeting that “piracy is symptomatic of the overall situation in Somalia including the
prevalence of illegal fishing and toxic waste dumping off the coast of Somalia, which
adversely affects the Somali economy and marine environment.”
The CGPCS also reaffirmed “its respect for Somalia’s sovereignty, territorial integrity,
and sovereign rights over natural resources” and underscored that the group’s
participants “ensure that their flagged vessels respect these rights.” Paradoxically, the
regional fishing industry reportedly has been damaged significantly by the threat of
piracy. According to some reports, tuna catches in the Indian Ocean fell 30% in 2008, in
part because of fishing vessels’ fears of piracy. This has had a major impact on countries
like the Seychelles, which rely on the fishing industry for up to 40% of their revenues,
and on Yemen, which reported an estimated $150 million in lost fishing sector revenues
in 2009.
● Sheer poverty;
● A lack of opportunity on-shore
● Lack of faith in Government and Security Forces to support one’s livelihood e.g.,
via the ‘fishing’ industry
Piracy attack
Pirates carrying weapons do not usually open fire until they are very close to the ship,
e.g. within two cables.
Use whatever time available, no matter how short, to activate any additional protective
measures and plans. This will make it clear to the attackers that they have been seen,
the ship is prepared and will resist attempts to board.
Pirate boat
Approach stage
Effective lookouts may aid in identifying the nature of the attack, the threat profile of a
piracy or other attack may initially look similar and it will not be until the attackers are
close that the nature of the attack becomes apparent. In all cases, the following steps
should be taken:
Attack stage
As the attackers get close the following steps should be taken:
● Reconfirm all ship’s crew are in the safe muster point or citadel as instructed by
the Master.
● Ensure the SSAS has been activated.
● If not actioned, report the attack immediately to UKMTO (+44 2392 222060) by
telephone.
● As the attackers close in on the ship, Masters should commence small alterations
of helm whilst maintaining speed to deter skiffs from lying alongside the ship in
preparation for a boarding attempt. These manoeuvres will create additional wash
to impede the operation of the skiffs.
● Large amounts of helm are not recommended, as these are likely to significantly
reduce a ship’s speed.
● Check VDR data is being saved.
● PCASP, if present, will conduct themselves as governed by the RUF.
● Take all way off the ship and then stop the engines.
● All remaining crew members to proceed to the citadel or safe muster point locking
all internal doors on route.
● PCASP, if present, will follow procedures agreed with company and Master.
● Ensure all crew are present in the citadel or safe muster point. This includes the
Master, bridge team and PCASP.
● Establish communications from the citadel with UKMTO and your company and
confirm all crew are accounted for and in the citadel or safe muster point.
● Stay in the citadel until conditions force you to leave or advised by the military.
● If any member of the crew is captured it should be considered that the pirates
have full control of the ship.
● All movement should be calm, slow and very deliberate. Crew members should
keep their hands visible always and comply fully. This will greatly reduce the risk
of violence.
Experience has shown that the pirates will be aggressive, highly agitated and possibly
under the influence of drugs or alcohol.
● DO be patient.
● DO keep mentally active/occupied.
● DO keep track of time.
● DO reduce stress where possible by remaining physically active.
● DO remain calm and retain dignity.
● DO be positive (remember, authorities are working tirelessly to release you).
● DO remember to leave any CCTV or audio recording devices running.
● DO exactly what the attackers ask and comply with their instruction.
● DO NOT take photographs.
● DO NOT attempt to engage attackers.
● DO NOT make movements which could be misinterpreted as being aggressive.
● DO NOT be confrontational.
● DO NOT resist.
The model of pirate action off Somalia is to hijack the ship and hold the crew for
ransom. It should be remembered it is in the interests of the pirates to keep the
ship and crew safe.
Each company or organisation should have a policy in place to cover the eventualities of
kidnap and ransom. The following principles serve as guidelines to surviving a
kidnapping.
WBIED attacks may result in a breach of the ship’s hull. The use of the safe muster point
is recommended before entering a citadel located below the waterline.
The threat and risk assessment will identify areas where these threats occur which, if
successful, may result in an explosion (commonly referred to as a blast). The Master
should communicate to the crew prior to entering a threat area what position to take if a
blast threat is detected. The Master may consider telling the crew to:
● Lie flat on the deck, as this may minimise exposure and may reduce the impact
on the body from the blast.
● Adopt a brace position (arms/legs bent, hands holding onto something solid and
feet firmly planted on the deck) to protect personnel from shock waves.
● Move away from a particular area, such as the port side, starboard side, poop
deck or engine room.
How to defend the crew and the ship - Highlight relevant methods provided
in the BMP and the contingency measures as given in the Ship's Security
Plan in the event of an attack
Procedures to follow when a vessel is boarded by pirates is as below:
Inform the nearest littoral or coastal State through the RCC, using the appropriate ships’
message format. The ship's crew should be warned and, if not already in their defensive
positions, they should move to them. Evasive manoeuvres and hoses should be
vigorously employed as detailed in the preparation phase.
When attackers are on board the actions of the master and crew should:
● ensure the greatest level of safety for those on board the ship;
● if possible remain in control of the navigation of the ship; and
● try to get the pirates/robbers depart as early as possible
The options available to the master and crew will depend on the extent to which the
attackers have secured control of the ship, e.g. by have they gained access to the bridge
or engine room, have they seized crewmembers who they can threaten, to force the
master or crew to comply with their wishes.
However, even if the crew are in secure areas, the master must consider the risk to the
ship the attackers can cause, when deciding on actions to be taken. An example of a risk
that pirates they could use firebombs to start fires on a tanker or chemical carrier.
The pirates/armed robbers begin to gain control and take one or more of the
ship's crew into their custody
If the attackers have gained control of the engine room or bridge, have seized crew
members or can pose an imminent threat to the safety of a ship, the master or officer in
charge should remain calm and, if possible, seek to negotiate with the attackers.
Try and maintain control over the navigation of the ship, the safe return of any hostages
they may hold and the early departure of the attackers from the ship.
Comply with the attackers' demands may be the only safe alternative as resistance or
obstruction of any kind could be both futile and dangerous.
In the event of attackers gaining temporary control of the ship, crew members should, if
it is safe and practicable, leave Close Circuit Television (CCTV) records running.
Consider hiding equipment (especially those for communication) in areas where crew are
detained.
The importance of retreating to the citadel in the event pirates board the ship -
Communication channels must be kept open with task forces and local co-
ordination authorities to update situation periodically.
● It is important to get into the citadel when pirates board for the following
reasons:
● An ideal place for the crew to hide as it is not marked and is fortified
● It has food and water supplies and effective communication channels to be able
to communicate with the outside world, a proper system of ventilation and a first
aid kit
● It can be fitted with CCTV cameras and normally has control for switching off the
engines – both main and auxiliary
Know some of the recent cases of ship hijack and crew being hostage
Example of recent pirate attacks is as below:
They subsequently held the crew at gunpoint and robbed them of cash and personal
belongings.
Local agents contacted the port authority, but the security boat did not arrive until an
hour later when the attackers had already left the vessel.
When Nigerian Navy personnel boarded, they killed one of the attackers and arrested six
others. Sixteen crew members who remained onboard were freed, but two attackers had
already left the vessel and taken two kidnapped crew members with them, one Indian
and one Pakistani.
Both were held for several weeks by a Nigerian criminal gang before they could finally
return home.
According to the ship’s Third Engineer, Santosh Bharadwaj, the crew kept their morale
high by praying and remembering good times with their families.
Negotiations were delayed by the complications involved in the pirates having captured
seafarers of multiple nationalities.
The crew’s release was also hampered by a negotiation breakdown that reportedly
occurred when the company attempted to settle for a lower amount than the pirates
demanded.
Immediate crisis
● Try to gain control over your shock, fear and agitation as soon as possible:
● stay calm;
● follow the instructions of the offenders, taking a passive role;
● do not make any sudden movements — ask first even when, for example, you
just want to pick up something;
● do not argue;
● do not make direct eye contact.
Post crises
● Eat, drink and sleep regularly. Take every opportunity to exercise your body and
mind. Keep fit for your release.
● If you need medical treatment, inform the offenders as early as possible.
● Develop a daily routine and offer to help with the daily chores like preparing
meals and cleaning up.
● Try to occupy yourself mentally, e.g. by keeping a diary, memorising the place
you are being kept, how the kidnappers are organised or any other details about
your captivity. Ask for a pen and paper, books or a radio. You can also do
relaxation techniques or similar, and mental exercises by doing maths, etc.
● Be patient. Do not give up and think positively! You can be assured that
everything possible is being done for you.
Provocations from pirates and possible techniques to cope with the ensuing
hostage situation
Pirate provocation methods are as below:
● Follow the instructions of the offenders if you are allowed to make a phone call,
even if they tell you to lie.
● If the offenders want to take photographs or a video of you, or ask you personal
questions, do not feel bad about cooperating; this may help progress the
negotiations.
● Keep in mind that the offenders may lie to you to demoralise, subdue and
discourage you.
● Do not negotiate with the offenders — this will be done by others. The offenders
will make their demands to a third party. Promises you make may be hard for
others to keep.
● Encourage the offenders to establish contact with your organisation/company at
an early stage and on a regular basis.
● If it is allowed, request to talk personally to your family or others.
The shipowner should offer advice from professionals if the seafarer wishes such
assistance. An important first step in reducing the risk from trauma is for masters to
debrief crew immediately after the attack or release of a vessel in order to get crew to
confront their experiences.
State agencies that social and mental support must also do their bit to help the seafarer.
In addition to ensuring access, conscious efforts to address the stigma associated with
seeking mental health care may be important in allowing seafarers to use the systems in
place.
Seafarers' Family
Seafarers' Family
Advantages of seeking employment with reputed shipowner/ manager
Advantages of employment with a reputed company in relation to piracy is as below:
● The company provides pre-departure training to seafarers expected to transit
these areas
● The company provides armed guards for vessel support when they transit high
risk areas
● The company has firm policies in relation to trading in high risk areas
Enable seafarers to consider what they may wish to share with their family
concerning the risks of piracy
Seafarers must inform their families about piracy risks at sea today. Seafarers families
must know that pirates take seafarers as hostages for a ransom.
Even though piracy at sea has reduced today, family members must know the areas of
sea piracy and their associated risks.
● The ability to cope with the knowledge that their loved one has been captured
● Knowing that information about the well-being of a seafarer hostage is hard to
come by, this acts as a significant stressor
Seafarers own specific responsibility towards his family and the importance of
correct information being passed on to them
Seafarers must inform their families when their vessel is going to transit a high-risk
piracy area, informing them that the vessel has taken adequate precautions to prevent a
pirate attack. These could be:
Reactions of the family members when informed about the seafarer being taken
hostage.
Family members of seafarer hostages will:
● Show high levels of concern and anxiety regarding the well-being of their loved
one
● Be distressed by threats to their loved ones