Professional Documents
Culture Documents
2 - Imsn Master Cso Vso Compressed
2 - Imsn Master Cso Vso Compressed
CSO/VSO
Course
Section 1
TERRORISM
Defining Terrorism
Freedom Fighters
USS Cole on 12-Oct-00 was
attacked by 2 suicide bombers.
17 Sailors where killed
39 Sailors where injured
By Al Qaeda
The Seaborne
Spirit
5 – Nov - 05
Palestine Liberation Front (PLF)
Muhammad Abu Abbas, Oct 7th, 1985 four
PLF militants seized the “Achille-lauro”.
These terrorist killed Leon Klinghoffer, an
elderly, wheelchair bound, Jewish man,
and threatened to blow up the ship. All of
this was in effort to negotiate the release
of 50 Palestine prisoners.
The Tamil Tigers
The most powerful Tamil group in Sri Lanka, founded in 1976.
Uses overt and illegal methods to raise funds, acquire weapons,
and publicize its cause of establishing an independent Tamil
state. Began its armed conflict with the Sri Lankan Government
in 1983 and relies on a guerrilla strategy that includes the use of
terrorist tactics.
The Tamil Tigers
The world's largest unregistered navy with approximately 10,000
armed combatants in Sri Lanka; about 3,000 to 6,000 form a
trained cadre of fighters. The LTTE also has a significant overseas
support structure for fundraising, weapons procurement, and
propaganda activities.
Abu Sayyaf Group (ASG)
Smallest and most radical of the Islamic separatist groups
operating in the southern Philippines. Split from the Moro National
Liberation Front in 1991 under the leadership of Abdurajik
Abubakar Janjalani, who was killed in a clash with Philippine
police on 18 December 1998.
Abu Sayyaf Group (ASG)
Activities: Uses bombs, assassinations, kidnappings, and
extortion payments to promote an independent Islamic state in
western Mindanao and the Sulu Archipelago, areas in the
southern Philippines.
The attack of the “Limburg”
LNG tankers
Cargo ships
OSC Platforms
Maritime Transportation Threats
Could it be terrorism?
Straits of Malacca
Piracy
• Action/non-action by security
personnel
– 33 CFR § 101.400-420
– ISPS Code A/4, 6
– SOLAS Chapter XI-2
• Entering foreign jurisdictions
• Clear grounds
Legal Implications
• Law Enforcement
– Vessel, Facility & OCS owners and operators
must permit law enforcement personal, in the
performance of official duties, who show
proper ID to enter/board without delay or
obstruction.
– Upon boarding or entering, will as soon as
possible explain their mission to the master,
operator, owner or designated agent.
– This is found in 33 CFR § 101.515(c)
Handling sensitive-
related information &
communications
SSI
• Contracting Governments
• Recognized Security Organizations
• The Company
• The Ship
• The Facility
• Vessel Security Officer
• Company Security Officer
• Facility Security Officer
• Vessel and Facility personnel with specific
security duties
• All other personnel
Contracting Governments
• Specific Responsibilities
– ISPS Code A/4, B/1.6-1.8, B/4
– SOLAS , Chapter XI-2, Reg. 3
– 33 CFR, Part 101, 102
• U.S. Coast Guard
• Captain of the Port (COTP)
• Federal Maritime Security Coordinator
(FMSC)
• Area Maritime Security (AMS)
Recognized Security
Organizations
• Specific Responsibilities
– ISPS Code B/4.3-4.6
• USCG is the RSO in U.S.—No
other entities or companies
designated at this time.
The Company
– On Scene Survey
• Supervising the handling of cargo and the
delivery of ship’s stores; and
• Ensuring that vessel security
communication, information, and
equipment are readily available.
• Using the ship’s GA’s to do the OSS
should be done to make sure that parts of
the vessel have not been changed and
door ways turned into bulk heads.
Analysis and recommendations
Mitigate:
Mitigation strategies, such as security
protective measures and/or procedures,
may be developed to reduce risk for that
scenario. An appendix to the VSP may
contain the scenario(s) evaluated, the
results of the evaluation, a description of
the mitigation measures evaluated, and
the reason mitigation measures were or
were not chosen.
Mitigation definitions
Consider:
The scenario should be considered
and mitigation strategies should be
developed on a case-by-case basis.
The VSP may contain the
scenario(s) evaluated, the results of
the evaluation, and the reason
mitigation measures were or were
not chosen.
Mitigation definitions
Document:
The scenario may not need a mitigation
measure at this time and therefore needs
only to be documented. However,
mitigation measures having little cost
may still merit consideration. The
security plan may contain the scenario
evaluated and the results. This will be
beneficial in further revisions of the VSP,
to know if the underlying assumptions
have changed since the last edition of
the security assessment.
Security Assessment
Documentation
• Use of Assessment checklists
• NVIC 10-02
• VSA Report—see 33 CFR §
104.305(d)
Security Equipment
Section 5
• ID scanners
Security Equipment
Key pad entries
Security Equipment
Screening equipment
Hand Held
Scanners
• Waterside Perimeter
security
Security Equipment
Testing, Calibration,
and Maintenance
• It is the duty of the VSO to ensure that the
security equipment is properly working,
operated, tested, maintained, and calibrated
• Records of all maintenance, calibration and
testing of security equipment
See 33 CFR 104.235(b)(5)
• This record must be protected from
unauthorized access or disclosure
• These records must be keep for a minimum of 2
years and must be made available to the USCG
upon request
Vessel Security Plan
VSP
Section 6
33 CFR 104.405(b)
33 CFR 104.200-104.297
Approval of the VSP
Weapon Identification
• 5.56 MM,
Uzi
PM
PM
Russian “AK” design, assassin's
Weapon
Note easy way it breaks down
Can you tell the real one?
Real
Air Soft
Can you tell the real one?
• Suspicious Mail
– Hard or ridged
– Oily marks on the
outside
– The feel of wires
– Lots of postage
– Directed to a
specific person
Methods of physical
searches and non-
intrusive inspections
Practical Exercise
• Contributing Factors
– Alcohol
– Drug Abuse
– Fear
– Hooliganism
– Poor Administration/Management
– Employee/Union Disputes
Crowd Management & Control
• Important questions are as follows:
– Who are they? What is the overarching identity of the
crowd?
– What are their goals?
– What is the composition of the crowd and are there
any known factions?
– What are they capable of doing?
– What are their traditional behaviors or cultural
repertoires?
– When and where will they assemble?
– Where will they go?
– What are the possible targets of violence?
– What is the worst case scenario?
– When and where will they disperse?
– Are there plans for subsequent gatherings?
Crowd Management & Control
• For vessels and facilities, planning
must include:
– Organizing emergency procedures
– Optimizing the use of resources
– Controlling the response to emergencies by
identifying, prioritizing and controlling the
most critical threats.
– Controlling crew, passengers and other
personnel during emergency situations
– Establishing and maintaining effective
communications
Crowd Management & Control
• Training programs should be designed
by to train crewmembers and security
personnel in:
– Vessel layout and familiarization
– Location of safety and emergency equipment
– Location of emergency exits
– Use of personal lifesaving appliances
– Compliance of the ship’s safety and
emergency procedures
– Crowd management and communications
during an emergency situation
Crowd Management & Control
• Control and Management
– Inner, Intermediate, and outer
cordons
– Enforcing cordons
• Access Control measures
• Manned Checkpoints
• Natural/Physical barriers
• Tapes “funneling persons”
– Monitoring/Communication
Equipment
– Signage
Ship Security Actions
Section 8
LOW
ELEVATED
• Hijacking
• Bomb Threat
• Unidentified objects / explosives on
vessel, in baggage, stores, or persons
• Damage to / destruction of port facility
• Piracy and other hostile boarding
• Stowaways
• Searching vessel
Security Drills and Exercises
• Must test proficiency of vessel personal
in assigned security duties at all
MARSEC Levels.
• Implementation of security measures due
to a raise in MARSEC Level can be listed
as a drill if the report is sent to the COTP.
• Will enable the VSO to Identify any
related security deficiencies that need to
be addressed.
Security Drills and Exercises
• Drills
– Must be conducted every 3 months, except
when the vessel is out of service due to
repairs.
– Must be repeated when crew change is 25%
or greater (within one week).
– Must test individual elements of the VSP
– Each drill must be recorded.
– These reports will be reviewed by the USCG
upon inspections, and must have the date,
description of drill, participants, lessons
learned which may improve the VSP.
Security Drills and Exercises
• Example of Drills
– Screening (reactive or preventative) of the
vessel, persons, baggage and vehicles
– Unauthorized entry to restricted areas
– Response to alarms
– Communications
– Notification to law enforcement authorities
Security Drills and Exercises
• Exercises
– Conducted at least once each calendar year, with no
more than 18 months between exercises
• Full scale or live;
• Tabletop simulation or seminar format;
• Combined with other appropriate exercises; or
• Combined with elements of the above mentioned
exercises.
– Vessel-specific or may be part of a cooperative
exercise
– Tests communication and notification procedures, and
elements of coordination, resource availability, and
response.
Security Drills and Exercises
• Exercises are a full test of the security
program and include the substantial and
active participation of relevant company and
ship security personnel, and include facility
security personnel and government
authorities depending on the scope and the
nature of the exercises.
• A vessel while along side or moored at a
facility it may participate in the Facility’s
scheduled drill.
Assessment of
Security Drills and Exercises
• Practical / Hands-on
– Scenario-based training and case
studies
– Build scenarios with your students.
This will help keep them always
thinking about security
– Screening and Searching
• Vessels, Persons, Baggage and stores
• Buildings, rooms
• Other unique areas