Académique Documents
Professionnel Documents
Culture Documents
Including
Established:
This document contains Security Sensitive Information and is confidential and proprietary. Release of any information contained herein is prohibited without the express authorization of Blue Marine Management Corp. Company Security Officer (CSO) in collaboration with the Flag Administration.
Record of Revision
Version Revised Date: Revised Part: Reason of Revision
Contents
Section 0 Item Introduction Company Security Policy Definitions Security Responsibilities of Ship, Company, Port Facility, Interacting Ships Relevant Authority and Others Security Organization of the Ship and the Company Particulars of Ship and Company Organization and Responsibilities Personnel training Drills and exercises Records and documentations Response to changes in security level Procedures for interfacing with facilities and other ships Declaration of security Security related communication Ship security alert system and equipment maintenance Security measures for access control Access to the Ship Handling unaccompanied baggage Security measures for restricted area Security measures for handling cargo Security measures for delivery of ship's store, including bunkers Security measures for monitoring ship Procedures against breach of security Audit and Ship Security Plan amendment Ship Security Assessment Report Report of Ship Security Assessment Summary of Ship Security Assessment Background Information Item that is important to protect Possible Vulnerabilities Special consideration st 1 Stage: Identification of possible threat motives and potential security risks for the ship nd 2 Stage: Identification & evaluation of key shipboard operations that is important to protect rd th 3 & 5 Stage: Identification of possible threat scenario to key shipboard operations and asses the likelihood of those occurrences th 4 Stage: On-scene Security Survey Company Security Officer Checklist Ship Security Officer Duties and responsibilities Security duties at each Security Level Form for Declaration of Security Access Point Restricted Area Page
S. 0 - P.1/4 S. 0 - P.1/4 S. 0 - P.3/4 S. 0 - P.4/4 S. 1 - P.1/5 S. 1 - P.2/5 S. 2 - P.1/2 S. 3 - P.1/1 S. 4 - P.1/2 S. 5 - P.1/1 S. 6 - P.1/2 S. 7 - P.1/1 S. 8 - P.1/2 S. 9 - P.1/2 S. 10 - P.1/4 S. 10 - P.4/4 S. 11 - P.1/2 S. 12 - P.1/1 S. 13 - P.1/1 S. 14 - P.1/1 S. 15 - P.1/2 S. 16 - P.1/1 S. 17 - P.1/20 S. 17 - P.2/20 S. 17 - P.3/20 S. 17 - P.4/20 S. 17 - P.4/20 S. 17 - P.4/20 S. 17 - P.6/20 S. 17 - P.8/20 S. 17 - P.10/20
2 3 4 5 6 7 8 9 10
11 12 13 14 15 16 17
S. 17 - P.12/20 Ap. 1 - P.1/1 Ap. 2 - P.1/1 Ap. 3 - P.1/1 Ap. 4 - P.1/1 Ap. 5 - P.1/2 Ap. 6 - P.1/1 Ap. 7 - P.1/1
Section Appendix 8
Item
Contingency Plan A. Response to hijack cases B. Bomb threat (Intimidation) C. Unidentified Object/Explosive on Shipboard D. Bomb Threat/Damage and Destruction to Port Facility E. Procedures for responding to pirates attack F. Procedures for responding to stowaways cases G. Vessel Under Attack and Being Pursued H. Crew Insubordination I. Discovery of Unauthorized Weapon Evacuation Route Form of Security Incident Report Company Security Policy Contact List of States for Security (Attached C.D.) Information on Company's Special Responsibility given to Master Record of Ship Security Plan Inventory of Dangerous Goods and Materials Monthly Communication Log SSAS Installation/Operation Manual Compliance Certificates of CSO
Page
Ap. 8 - P.1/7 Ap. 8 - P.2/7 Ap. 8 - P.3/7 Ap. 8 - P.4/7
Appendix 9 Appendix 10 Annex 1 Annex 2 Annex 3 Annex 4 Annex 5 Appendix 11 Appendix 12 Appendix 13
Ap. 8 - P.4/7 Ap. 8 - P.5/7 Ap. 8 - P.6/7 Ap. 8 - P.7/7 Ap. 8 - P.7/7 Ap. 9 - P.1/1 Ap. 10 - P.1/2 An. 1 - P.1/1 An. 2 - P.1/31 An. 3 - P.1/1 An. 4 - P.1/3 An. 5 - P.1/1 Ap. 11 - P.1/1 Ap. 12 - P.1/42 Ap. 13 - P.1/2
This SSP consists of the individual sections listed in 104.405, Part 104, 33CFR issued by the USCG.
Section 0 Introduction
1. Company Security Policy
The Company has established the Ship Security Plan to detect security threats and take preventive measures against security incident that may affect safety and security of ships under management of our Company, personnel and property on those ships, in accordance with requirements of SOLAS Chapter XI-2 and ISPS Code (the International Code for the Security of Ships and Port Facilities). This Ship Security Plan has been approved by the Administration (or by Recognized Security Organization).
The master and all crewmembers should give effect to those requirements stipulated in the Ship Security Plan and should be familiar with their duties. They should also undergo necessary training given by the master or ship security officer designated by the company. On behalf of the Company, the undersigned declares as follows.
1) The master has the overriding authority and responsibility to make decisions with respect to the security of the ship; 2) The Company should give necessary support to the ship when requested by the company security officer, the master and the ship security officer with respect to the security of the ship. The above Company Security Policy is entered with the date and signature, and attached to this document as Annex 1. 2. Definitions
2.1 Ship Security Plan (SSP) means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ships stores or the ship from the risks of a security incident. (ISPS-A/2.1.4) Company Security Officer (CSO) means the person designated by the Company for ensuring that a ship security assessment is carried out; that a Ship Security Plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer. (ISPS-A/2.1.7) Ship Security Officer (SSO) means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the Ship Security Plan and for liaison with the company security officer and port facility security officers. (ISPS-A/2.1.6) Port facility is a location, as determined by the Contracting Government or by the Designated Authority, where the ship/port interface takes place. This includes areas such as anchorage, waiting berths and approaches from seaward, as appropriate. (SOLAS XI-2/1.1.9) Ship/port interface means the interactions that occur when a ship is directly and immediately affected by actions involving the movement of persons, goods or the provisions of port services to or from the ship. (SOLAS XI-2/1.1.8)
2.2
2.3
2.4
2.5
2.6
Port Facility Security Officer (PFSO) means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers. (ISPS-A/2.1.8) Designated Authority means the organizations(s) or the administration(s) identified, within the Contracting Government, as responsible for ensuring the implementation of the provisions of this chapter pertaining to port facility security and ship/port interface, from the point of view of the port facility. (SOLAS XI-2/1.1.11) Declaration of Security (DoS) means an agreement reached between a ship and either a port facility or another ship with which it interfaces specifying the security measures each will implement. (SOLAS XI-2 /1.1.15) Security level means the qualification of the degree of risk that a security incident will be attempted or will occur. (SOLAS XI-2 /1.1.14)
2.7
2.8
2.9
2.10 Security level 1 means the level for which minimum appropriate protective security measures should be maintained at all times. (ISPS-A/2.1.9) 2.11 Security level 2 means the level for which appropriate additional protective security measures should be maintained for a period of time as a result of heightened risk of a security incident. (ISPS-A/2.1.10) 2.12 Security level 3 means the level for which further specific protective security measures should be maintained for a limited period of time when a security incident is probable or imminent, although it may not be possible to identify the specific target. (ISPS-A/2.1.11)
3.
Security Responsibilities of Ship, Company, Port Facility, Interacting Ships Relevant Authority and Others Flag Administration Flag Administration should set security levels and ensure the provision of security level information to ships entitled to fly its flag. When changes in security level occur, security level information should be updated as the circumstance dictates. Contracting Government Contracting Government should set security levels and ensure the provision of security level information to port facilities within its territory, to ships operating in its territorial sea and to ships prior to entering a port or whilst in a port within its territory. When changes in security level occur, security level information should be updated as the circumstance dictates. Contact List of Countries for Security is shown on separate Annex 2. Company The Company should ensure that the master has available on board, at all times, information through which officers duly authorized by a Contracting Government can establish:
3.1
3.2
3.3
.1 Who is responsible for appointing the members of the crew or other persons currently employed or engaged on board the ship in any capacity on the business of that ship; .2 Who is responsible for deciding the employment of the ship; and .3 In cases where the ship is employed under the terms of charter party (ies), who are the parties to such charter party (ies). A relevant information of the above items is shown on Annex 3 3.4 Port Facility A port facility is required to act upon the security levels set by the Contracting Government within whose territory it is located. Security measures and procedures should be applied at the port facility in such a manner as to cause a minimum of interference with, or delay to, passengers, ship, ships personnel and visitors, goods and services. Recognized Security Organizations Contracting Governments may authorize a Recognized Security Organization (RSO) to undertake certain security-related activities, including: .1 approval of Ship Security Plans, or amendments thereto, on behalf of the Administration; .2 verification and certification of compliance of ships with the requirement of chapter XI-2 and part A of ISPS Code on behalf of the Administration
3.5
3.6 Ship 3.6.1 A ship is required to act upon the security levels set by Contracting Governments as set out below. 3.6.2 At security level 1, the following activities should be carried out, through appropriate measures, on all ships, taking into account the guidance given in part B of this Code, in order to identify and take preventive measures against security incidents: .1 .2 .3 .4 .5 .6 .7 3.6.3 ensuring the performance of all ship security duties; controlling access to the ship; controlling the embarkation of persons and their effects; monitoring restricted areas to ensure that only authorized persons have access; monitoring of deck areas and areas surrounding the ship; supervising the handling of cargo and ships stores; and ensuring that security communication is readily available.
At security level 2, the additional protective measures, specified in the ship security plan, should be implemented for each activity detailed in section 3.6.2, taking into account the guidance given in part B of this Code. At security level 3, further specific protective measures, specified in the ship security plan, should be implemented for each activity detailed in section 3.6.2, taking into account the guidance given in part B of this Code.
3.6.4
1.1
Particulars of Ship
Flag of Ship:
Name of ship:
Signal letters:
IMO number:
Type of ship:
Service area:
Length (BP):
Breadth:
Gross tonnage:
Net tonnage:
Draught (summer):
Freeboard (summer):
Displacement:
Deadweight:
Name of Company:
Address:
Telephone number:
Fax number:
The following information is given by company to the master in a separate document as shown on Annex 3. The master is to produce this document to an officer who is duly authorized by the Government, when this information is required. 1. Name of responsible person for assignment of crew members 2. Parties concerned with bareboat charter 3. Parties concerned with time charter 4. Parties concerned with voyage charter
Master
SSO / Master
Chief Engineer
Catering Crew
Engine Crew
The master has the overriding authority and the responsibility to make decisions which, in his professional judgment, is necessary to maintain the safety and security of the ship. This includes denial of access to persons (except those identified as duly authorized by a Contracting Government) or their effects and refusal to load cargo, including containers or other closed cargo transport units.
If, in the professional judgment of the master, a conflict between any safety and security requirements applicable to the ship arises during its operations, the master should give
effect to those requirements necessary to maintain the safety of the ship. In such cases, the master may implement temporary security measures and should forthwith inform the Administration and, if appropriate, the Contracting Government in whose port the ship is operating or intends to enter. Any such temporary security measures should, to the highest possible degree, be commensurate with the prevailing security level.
1.5 Company Security Officer
1.5.1. Designated CSO in charge of this ship is specified in appendix 1 1.5.2 Duty and responsibility
The duties and responsibilities of the CSO should include, but are not limited to: .1 advising the level of threats likely to be encountered by the ship, using appropriate security assessments and other relevant information; .2 ensuring that ship security assessments are carried out; .3 ensuring the development, the submission for approval, and thereafter the implementation and maintenance of the Ship Security Plan; .4 ensuring that the Ship Security Plan is modified, as appropriate, to correct deficiencies and satisfy the security requirements of the individual ship; .5 arranging for internal audits and reviews of security activities; .6 arranging for the initial and subsequent verifications of the ship by the Administration or the RSO; .7 ensuring that deficiencies and non-conformities identified during internal audits, periodic reviews, security inspections and verifications of compliance are promptly addressed and dealt with; .8 enhancing security awareness and vigilance; .9 ensuring adequate training for personnel responsible for the security of the ship .10 ensuring effective communication and co-operation between the SSO and the relevant PFSO; .11 ensuring consistency between security requirements and safety requirement; .12 ensuring that, if sister-ship or fleet security are used, the plan for each ship reflects the ship- specific information accurately; and .13 ensuring that any alternative or equivalent arrangements approved for a particular ship or group of ships are implemented and maintained.
1.6 Ship Security Officer
1.6.1 Designation Master is the designated Ship Security Officer of the vessel (please refer to Appendix 2).
The duties and responsibilities of the SSO should include, but are not limited to: .1 undertaking regular security inspections of the ship to ensure that appropriate security measures are maintained; .2 maintaining and supervising the implementation of the Ship Security Plan, including any amendments to the plan; .3 coordinating the security aspects of the handling of cargo and ships stores with other shipboard personnel and with the relevant PFSO; .4 proposing modifications to the Ship Security Plan; .5 reporting to the CSO any deficiencies and non-conformities identified during internal audits, periodic reviews, security inspections and verifications of compliance and implementing any corrective actions; .6 enhancing security awareness and vigilance on board; .7 ensuring that adequate training has been provided to shipboard personnel, as appropriate; .8 reporting all security incidents; .9 coordinating implementation of the Ship Security Plan with the CSO and the relevant PFSO; .10 ensuring that security equipment is properly operated, tested, calibrated and maintained, if any; and .11 verifying the consent of Declaration of Security and to carry it out.
1.6.3 SSO has responsibility to liaise with PFSO. SSO and the master are given authority to exchange Declaration of Security with PFSO. 1.6.4 SSO has responsibility along with the master to liaise with the customs and other law enforcement agencies.
1.7 Other shipboard personnel
1.7.1
Duties and Responsibilities for crewmembers Duties and responsibilities assigned to crewmembers, during this ship at sea or in port, are prescribed in Appendix 3.
1.7.2 Duty and Responsibility for other shipboard personnel All other shipboard personnel should be aware of the current security level the ship is operating at that time. They should report to duty officer of any abnormal condition of security equipment, suspicious person, material or activity.
1.8 Security duties at each Security Level
The Security duties in which the individual member of crew is required to respond at each security level is prescribed in Appendix 4.
Section
Personnel training
2.1 Ship Security Officer (SSO)
SSO should have knowledge of, and receive training, in some or all of the following, as appropriate. CSO is responsible for planning and performing of the SSO training. .1 .2 .3 .4 .5 .6 .7 .8 .9 .10 .11 .12 .13 .14 .15 .16 .17 .18 .19 .20 security administration; relevant international conventions, codes and recommendations; relevant Government legislation and regulations; responsibilities and functions of other security organizations; methodology of ship security assessment; methods of ship security surveys and inspections; ship and port operations and conditions; ship and port facility security measures; emergency preparedness and response and contingency planning; instruction techniques for security training and education, including security measures and procedures; handling sensitive security related information and security related communications; knowledge of current security threats and patterns; recognition and detection of weapons, dangerous substances and devices; recognition, on a non-discriminatory basis, of characteristics and behavioral patterns of persons who are likely to threaten security; techniques used to circumvent security measures; security equipment and systems and their operational limitations; method of conducting audits, inspection, control and monitoring; methods of physical searches and non-intrusive inspections; security drills and exercises, including drills and exercises with port facilities; and assessment of security drills and exercises.
In addition the SSO should have adequate knowledge of, and receive training, in some or all of the following, as appropriate: .1 .2 .3 .4 .5 the layout of the ship; the SSP and related procedures (including scenario-based training on how to respond); crowd management and control techniques; operations of security equipment and systems; and testing, calibration and whilst at sea maintenance of security equipment and systems.
2.2 Security training of Shipboard Personnel Shipboard personnel having specific duties should have sufficient knowledge and ability to perform their assigned duties, including, as appropriate. The training pertaining to these duties should be performed under responsibility of SSO. .1 .2 knowledge of current security threats and patterns; recognition and detection of weapons, dangerous substances and devices;
.3
threaten security; techniques used to circumvent security measures; crowd management and control techniques; security related communications; knowledge of the emergency procedures and contingency plans; operations of security equipment and systems; testing, calibration and whilst at sea maintenance of security equipment and systems, .10 inspection, control, and monitoring techniques; and .11 methods of physical searches of persons, personal effects, baggage, cargo, and ships stores. 2.3 All other Shipboard Personnel All other shipboard personnel should have sufficient knowledge of and be familiar with relevant provisions of the SSP. The training pertaining to these duties should be performed under responsibility of SSO. .4 .5 .6 .7 .8 .9 .1 .2 .3 .4 the meaning and the consequential requirements of the different security levels; knowledge of the emergency procedures and contingency plans; recognition and detection of weapons, dangerous substances and devices; recognition, on a non-discriminatory basis, of characteristics and behavioral patterns of persons who are likely to threaten security; and .5 techniques used to circumvent security measures.
Note: Supplementary Detailed Plan of Training and Drills Onboard, refer to Annex 4 Item (2) Drills and Exercises.
Section 3
3.2 Exercises CSO should participate, when requested, in exercises which should be carried out at least once each calendar year with no more than 18 months between the exercises. In addition, SSO of at least more than 1 vessel out of the fleet of the company should participate in the above exercise. When CSO participates in an exercise with the Contracting Government other than the Administration of the ships flag state, the CSO should report this matter to the Administration.
In case CSO has the SSO of the ship participate in the exercise, the CSO should dispatch the SSO the scenarios in advance which the organizer will use in the exercise. In case of no scenarios prepared, the CSO should liaise with the organizer to clarify the SSOs role and familiarize those matters to the SSO. In case the master or SSO is requested to participate in the exercise without the knowledge of the CSO, the master or the SSO should not participate at his discretion. The master or SSO should report the fact to the CSO for his advice.
Section 4
4.3 The Ship Security Plan (SSP) contains security sensitive information; and as such copies
of the plan are to be strictly controlled by the Company. A hard copy or Electronic format will be kept in the company offices by the CSO and a hard copy is held on board by the SSO in a secure location that prevents unauthorized access, disclosure, deletion, destruction or amendment. The Master, SSO and CSO should be the only persons with access to the entire plan. Ship's personnel should be made aware of the existence of the plan and their roles in the Security of the ship.
The following information contained in the plan is confidential and shall be designated as Security Sensitive Information: 1. Identification of restricted areas and measures for prevention of unauthorized access. (Appendix 7) 2. Implementation of Security Levels advised by the Flag Administration or the Contracting Government. (Appendix 10 - Annex 4)
3. Contingency procedures in responding to security threats or breaches of security, including stipulation for maintaining critical operations of the sip or ship/port interface. (Appendix 9) 4. Duties of shipboard personnel assigned; with security responsibilities. (Appendix 4) 5. Procedures for the inspection, calibration, testing, and maintenance of On Board Security Equipment, if any.
6. Identification of the locations where the ship security alert system activation points are provided.
7. Procedures, guidance and instructions for the use of ship security alert system, including the testing, activation, de-activation and re-setting to limit false alerts. Procedures to Protect Security Sensitive Information. The following procedures shall be implemented to ensure the security and integrity of Security Sensitive Information. All hard copy SSI shall be held in a security container under lock and key. All electronically transmitted SSI shall be protected by password-enabled files.
Section 5
The changes in security level occur when the degree of threat and risk has changed. At security level 2, the additional protective measures should be implemented for each activity detailed in the above paragraph. At security level 3, further specific protective measures should be implemented for each activity detailed in the above paragraph. Prior to entering a port, or whilst in a port within the territory of a Contracting Government that has set security level 2 or 3, the ship acknowledge receipt of this instruction and should confirm to the PFSO the initiation of the implementation of the appropriate measures and procedures as detailed in the SSP, and in the case of security level 3, an instruction issued by the Contracting Government which has set security level. At security level 3, the ship should follow the instruction issued by the organization, which respond to this security incident or its threat. Every security measures to be taken should be such that they would closely coordinate with the activity of those who respond to the incident and with the port facility. The ship should report to the company of the above instruction. The master is always responsible for the safety of ship. Even under security level 3, the master can request explanation or modification of instruction issued by organization who responds to the security incident or its threat, if there is an evidence to believe that implementation of instruction may endanger the safety of ship. The master should report any problems, which may occur when implementing the security measures. In this case, the master should co-ordinate to take appropriate action consulting with PFSO and SSO. If a ship is required by the Administration to set, or is already at, a higher security level than that set for the port it intends to enter or in which it is already located, then the ship should advise, without delay, the competent authority of the Contracting Government within whose territory the port facility is located and the PFSO of the situation.
Section 6
6.3 Ship to Ship Interface Prior to commencement of interface with other ship, the master should confirm if other ship holds a Ship Security Plan. a. When other ship holds SSP - CSO or SSO should liaise with SSO of other ship and confirm the security level of both sides - When a Declaration of Security is required by the other ship, the master should instruct SSO to prepare the same
When the security level is higher than that of the other ship, the master should
inform this fact to the other ship and request them to prepare a Declaration of Security in order to determine appropriate security measures between both ships b. When the other ship does not hold SSP - Confirm if other ship has implemented security measures in accordance with other regulations - Request to submit a copy of Security Certificate issued under other regulations - Request the other ship to prepare a Declaration of Security and determine appropriate security measures between both ships - Take a record of measures performed during the interface 6.4 Interface with fixed or floating platforms or a MODU Prior to commencement of interface with a fixed or floating platform or a MODU, the master should confirm if she holds a Ship Security Plan. c. When fixed or floating platform or a MODU holds SSP - CSO or SSO should liaise with SSO of fixed or floating platforms or a MODU and confirm the security level of both sides - When a Declaration of Security is required by fixed or floating platforms or a MODU, the master should instruct SSO to prepare the same - When the security level is higher than that of the fixed or floating platform or a MODU, the master should inform this fact to the fixed or floating platform or a MODU and request there SSO to prepare a Declaration of Security in order to determine appropriate security measures between both ships d. When fixed or floating platform or a MODU does not hold SSP - Confirm if fixed or floating platform or a MODU has implemented security measures in accordance with other regulations - Request to submit a copy of Security Certificate issued under other regulations - Request fixed or floating platform or a MODU to prepare a Declaration of Security and determine appropriate security measures between both ships - Take a record of measures performed during the interface
Section 7
Declaration of security
7.1 Contracting Governments should determine when a Declaration of Security is required by assessing the risk the ship/port interface or ship to ship activity poses to people, property or the environment.
7.2 A ship can request completion of a Declaration of Security when: .1 the ship is operating at a higher security level than the port facility or another ship it is interfacing with; .2 there is an agreement on the Declaration of Security between Contracting Governments covering certain international voyages or specific ships on those voyages; .3 there has been a security threat or a security incident involving the ship or involving the port facility, as applicable; .4 the ship is at a port which is not required to have and implement an approved port facility security plan; or .5 the ship is conducting ship to ship activities with another ship not required to have and to implement an approved Ship Security Plan.
7.3 When the request for completion of Declaration of Security made by a ship is rejected, such fact of rejection should be recorded. 7.4 The Declaration of Security should be completed by: .1 the master or SSO on behalf of the ship; and, if appropriate, .2 the PFSO or if the Contracting Government determines otherwise, by any other body responsible for shore-side security 7.5 The Declaration of Security for last 10 port calls or for the minimum period specified by the Administration should be kept onboard.
Section 8
Section 9
9.3.3 TO CANCEL ACTIVATION To cancel the alert, lift the clear cover and depress again button, ensuring that is in "out (raised)" position or the Button Protrude. If combined (both wired & wireless) system is implied on the vessel kindly refer to appendix 12. 9.3.4 TO RESET ACTIVATION To Reset the alert, the CSO can connect by means of Computer going to a particular web address referred on the manual, or utilized Mobile phone that can accommodate the GPRS connectivity pertaining to Mobile Phone Internet Connection. 9.3.5 PREVENTION AND MEASURES OF FALSE ALERTS The alert switch of SSAS is located on a secure and confidential area which the Master or the SSO is the only person permissible to access, and a switch secured with a clear plastic springs intended as a protection for false alert. The alert will only activated as per deliberate intention of the Master/SSO. 9.3.6 PROCEDURE FOR INSPECTION, TESTING, CALIBRATION AND MAINTENANCE Procedure including the interval for inspection, testing, calibration and maintenance, are provided in Makers instruction book. 9.3.7 ENSURING CONTINUED FUNCTIONING OF EQUIPMENT AND ASSESING OF EFFECTIVENESS Procedure needed to assess the continuing effectiveness of SSAS, are provided in Makers instruction book 9.3.8 IDENTIFYING AND RESPONDING TO FAILURE OR MALFUNCTION Procedure for identifying and responding to failure or malfunction, are provided in Maker's instruction book
Security Level 1 Checking the identity of all persons seeking to board the ship and confirming their reasons for doing so by checking, for example, joining instructions, passenger tickets, boarding passes, work orders etc.; In liaison with the port facility the ship should ensure that designated secure areas are established in which inspections and searching of persons, baggage (including carry on items), personal effects, vehicles and their contents can take place; Segregating checked persons and their personal effects from unchecked persons and their personal effects; Identification of access points that should be secured or attended to prevent unauthorized access; Securing, by locking or other means, access to unattended spaces adjoining areas to which passengers and visitors have access; and Providing security briefings to all ship personnel on possible threats, the procedures for reporting suspicious persons, objects or activities and the need for vigilance.
1.
Security Level 2 Assigning additional personnel to patrol deck areas during silent hours to deter unauthorized access;
1.
.2
2.
Limiting the number of access points to the ship, identifying those to be closed and the means of adequately securing them;
2.
Granting access only to those responding to the security incident or threat thereof;
.3
3.
Deterring waterside access to the ship, including, for example, in liaison with the port facility, provision of boat patrols;
3.
Directions of person
4.
.4
.5
Establishing a restricted area on the shore-side of the ship, in close co-operation with the port facility; 5. Increasing the frequency and detail of searches of persons, personal effects, and vehicles being embarked or loaded onto the ship;
4. 6. 7.
5.
.6
Escorting visitors on the ship; Providing additional specific security briefings to all ship personnel on any identified threats, reemphasizing the procedures for reporting suspicious persons, objects, or activities and the stressing the need for increased vigilance; and Preparing for a full or partial search of the ship
6. 7.
8.
8.
10.2
Access Point Gangway Pilot Ladder Crane or Other Hoisting Equipment Ships Side Port Anchor Cable Mooring Ropes post a look-out personnel* post a look-out personnel*
post a look-out personnel* post a look-out personnel* post a look-out personnel* post a look-out personnel*
Not in use* post a guard* / secure from inside* close hawse pipe*/ post a guard*/ fit a large rat guard or close by other means*/ post a guard*
10.3 Updating of Identification systems SSO should review the Identification system periodically. Where any deficiency found in the Identification system, SSO should report such deficiency and propose the improvement of the Identification system. Where shipboard personnel or shore side personnel tried, or intend to try to abuse the Identification system is found, SSO should report the fact to the PFSO and CSO for consideration of a disciplinary action. Security Level 1 All persons boarding the vessel should be checked properly identified. The SSO should establish the following identification system. 1. Port Watch/Lookout should be checking/confirming all persons embarking to have their Personal I.D. or the ones issued by the Port Facility who wish to board the vessel. NO identification NO ADMITTANCE. 2. Port watch/Lookout should check the authenticity of the I.D. Calling cards or the like is not acceptable as identification. In case calling card is presented, a personal I.D. should be checked in consonance with the calling card. 3. All visitors embarking on board for the purpose of conducting normal vessel's operation, conducting business will be issued with "Ship's Visitor Pass" by the SSO. The Visitor's Pass should be plastic laminated, color coded, and with ship's stamp and signature of the Present Master in order to avoid tampering. The color coding to be arrange are as follows or the ship crew can design whichever is appropriate: a) b) c) d) e) f) Stevedores Ship Agent Surveyors Port Authorities Ship Chandler/Suppliers Others - Blue - Yellow - Red - Orange - Green
4. All Visitors should log/sign their names, and state their purpose of visit in the visitor's logbook.
Security Level 2
1. Following the procedures from "SECURITY LEVEL 1" from Step one to four, but this time the checking will be more extensive. If SSO or ship's crew is in doubt with the presented I.D. of the visitor, or his purpose of visit, he should seek further verification from PFSO, CSO or ship agent. 2. After being fully verified can such personnel be allowed access on board.
Security Level 3 1. Access to the ship by shore personnel is temporarily suspended. The SSO should review the Identification System once every three months and every Master Change. It should be updated taking into accounts the Port Facility requirements. If there is any Visitor's Pass which is already worn out should be replaced with a new one, stamped and signed by the present Master. The SSO can also change or re-shuffle the color coding to avoid being tampered in each port of call. Where any deficiency found in the identification system, SSO should report such deficiency and propose the improvement of the Identification system. Where shipboard personnel or shore side personnel tried, or intend to try to abuse the Identification system is found, SSO should report the fact to the PFSO and CSO for consideration of a disciplinary action. 10.4 Procedures for reporting the attempt of unauthorized access to the authority Those unwilling or unable to establish their identity and/or to confirm the purpose of their visit when requested to do so should be denied access to the ship and their attempt to obtain access should be reported to the SSO. And SSO should report to the CSO, the PFSO and to the national or local authorities with security responsibilities.
Security Level 2
.1 Establishing restricted areas adjacent to access points; .2 Dedicating additional personnel to guard and patrol restricted areas.
Security Level 3
.1 Setting up of additional restricted areas on the ship in proximity to the security incident, or the believed location of the security threat, to which access is denied; and .2 Searching of restricted areas as part of a search of the ship.
.1 Locking or securing access points; .2 Ensure new crew understands Restricted Areas and Vulnerable Points. .3 Using guards or patrols; and .4 Restrict access to the accommodation and Engine Room.
11.2 List of Restricted Area and Measures to prevent unauthorized access All restricted areas should be clearly marked indicating that access to the area is restricted and that unauthorized presence within the area constitutes a breach of security.
Restricted Area
Measures
Bridge / Compass Deck Machinery Space Air-con Unit Room Crew Accommodation Emergency Generator Room Spaces containing security and surveillance equipment and systems Steering Room Battery Room Oxygen Room / Acetylene Room Provision Store / Provision Chamber Galley / Officer & Crew Mess Room Fresh Water Filling Pipe Access Hatches Escape Trunk Fire Station Deck Stores Electrical Room Paint Store Ship's Office / Tally Office Bosun's Store Room
Lock the room* / Patrol Lock the space / Watch Lock the room*/Patrol Lock the accommodation space* / Patrol Lock the room*/Patrol Not Fitted Lock the room*/Patrol Lock the room Lock* / Patrol Lock* / Patrol Lock when not in use* / Patrol Lock* / Patrol Lock* / Patrol Secure from Inside Patrol Lock* / Patrol Lock* / Patrol Lock* / Patrol Lock when not in use* / Patrol Lock* / Patrol
Section 12 Security measures for handling cargo 12.1 Handling of Cargo Security Level 1 Handling of Cargo .1 Routine checking of cargo, cargo
transport units and cargo spaces prior to, and during, cargo handling operations;
.2 Verify the inventory of dangerous goods .2 Intensified checks to ensure that only the
intended cargo is loaded; and hazardous substances carried on board, if any, and their location
12.2 Control of Dangerous Goods or Hazardous Substances When a ship has space containing dangerous goods or hazardous substances, SSO should complete inventory of them and verify their quantities at regular interval. (See Annex 5 containing inventory of Dangerous Goods and Materials). These spaces should be identified as restricted area, and should follow the procedures of above 11.2.
15.2 Breach of Security Where there is a breach of security, the master should consider to: 1. 2. 3. 4. 5. 6. 7. a. b. c. d. e. f. activate ship security alert system, issue that all crew stand on emergency station, report to the Contracting Government of the port facility, prepare to abandon ship, prepare leave the port, follow instructions issued by the Contracting Government, follow the Contingency Response Plan in Appendix 8, for: Hijack Bomb Threat Unidentified Object/Explosive on Shipboard Bomb Threat/Damage and Destruction to Port Facility Pirate Stowaway
15.3 Evacuation Procedure in Security Threats and Breach of Security General Instruction The final decision to abandon ship should be made by the master when he believed that this action was imminent after every effort to save the ship had exhausted. Many seamen returned back to ship safely after once abandoned. The master should verify that every measure to save the ship had been taken before abandoning. Nobody should abandon ship until clear instruction is given by the master. It is important to keep the order, accomplish ones duty and maintain perfect control. At Sea Everybody should follow the Muster List for abandon ship.
In Port Everybody should assemble in a place designated, and follow instruction given by PFSO. When there is no such instruction, everybody should take such action considered necessary to minimize damage to human life, properties and environment. For the details of the evacuation route, refer to Appendix 6
15.4 Reporting Procedure of Security Incident When a security incident occurred, SSO should report this incident to the Administration, Contracting Government in which port facility the ship is located and CSO, using a Form specified in Appendix 8.
1. The CSO will organize and conduct an annual security audit of the vessel. 2. Results of the audit will be forwarded to the company and retained for a period of 5 years together with the corrective measures implemented, where any deficiencies found. 3. The audit will be covering all the contents of the SSP and all reports of the SSO for deficiencies and reviews. 4. An immediate audit is also to be conducted if there is any significant security breach, initially concentrating on the reasons for the security breach. 5. The Ship Security Plan to be reviewed by the Company Security Officer (CSO) annually to ensure its continued effectiveness as a result of deficiencies found during audits, drill, exercises and/or security incidents. 6. Major deficiencies to be immediately reported by the SSO to the CSO together with the proposed corrective actions and progress of the proposal until the correct level security preparedness has been achieved.
16.2 Procedure of Periodical Review and Updating of Plan SSO should perform periodic review of the SSP to verify that the same is effectively responding to the current situations. The master should review the SSP at least once a year, together with SMS. Review of SSP should be made in consideration of necessity for improvement of its continuing effectiveness. The objectives of review are to verify that if it has possibility to improve the current procedures or it is still remaining adequate abreast of the times. Procedure should be revised at instruction of the company, or when new equipment is installed. When SSP is used under security level 2 or 3 or responding to the training, all personnel participated in the event should report to SSO of their comments about details and effectiveness of SSP. With regard to the element of the plan for which amendment need be approved by the Administration, the instruction of the Administration should be followed.
Section 17
Where the SSA has been conducted by other than the CSO; Name of CSO in charge: Date of SSA reviewed and accepted by CSO: Signature of CSO:
2nd Stage
4th Stage
Security Assessment has been conducted based on the following elements Elements
1. Navigational area 2. Ships location 3. Navigational speed 4. Cargo 5. Freeboard
Scenario considered
In port Pirates affected areas Drifting Explosives Less than 5 m Passing straight
( )
Passing channel
( )
Passing coastal
( )
Ocean going (
No special remark areas Over 12 knots Radioactive substances Over 10 m No special remark
cargo
Where the SSA has been conducted by the CSO, has the CSO obtained the following background information? Or where the SSA has been conducted by other than the CSO, has the person who conducted the SSA received the following background information from the CSO? Yes No Background Information
1. 2. 3. 4. 5. 6. 7. 8. 9. the general layout of the ship GENERAL ARRANGEMENT PLAN
the location of areas which should have restricted access, such as navigation bridge, machinery spaces of category A and other control stations as defined in SOLAS chapter II-2, etc. GANGWAY. MOORING LINES, CHAIN HAWSE PIPE, SHIP SIDES, CARGO the location and function of each actual or potential access point to the ship CRANES & PROVISION CRANE changes in the tide which may have an impact on the vulnerability or security of the ship the cargo spaces and stowage arrangements the locations where the ships stores and essential maintenance equipment is stored the locations where unaccompanied baggage is stored the emergency and stand-by equipment available to maintain essential services the number of ships personnel, any existing security duties and any existing training requirement practices of the Company
10. existing security and safety equipment for the protection of passengers and ships personnel 11. escape and evacuation routes and assembly stations which have to be maintained to ensure the orderly and safe emergency evacuation of the ship 12. existing agreements with private security companies providing ship/waterside security services (WILL ENTER INTO A CONTRACT IN TIME WHEN NECESSARY) Existing security measures and procedures in effect, including inspection and, control procedures, identification systems, surveillance and monitoring equipment, 13. personnel identification documents and communication, alarms, lighting, access control and other appropriate systems.
Yes
No
1. 2. 3. 4. 5. 6. 7.
the ships personnel passengers, visitors, vendors, repair technicians, port facility personnel the capacity to maintain safe navigation and emergency response the cargo, particularly dangerous goods or hazardous substances the ships stores the ship security communication equipment and systems, if any the ships security surveillance equipment and systems, if any
Possible Vulnerabilities
8. 9. conflict between safety and security measures conflicts between shipboard duties and security assignments
Yes
No
10. watch-keeping duties, number of ships personnel, particularly with implications on crew fatigue, alertness and performance 11. any identified security training deficiencies 12. any security equipment and systems, including communication systems
Special consideration
13. particular consideration which is given to the convenience, comfort and personal privacy of the ships personnel and their ability to maintain their effectiveness over long periods
1st stage:
Identification of possible threat motives and potential security risks for the ship
Security risks Unlikely Likely Comment
1.
1.1 1.2 1.3
Political motives
Does it exist political (incl. religious, ideological, ethnical, nationalistic) motives related to your ship (flag, owner, crew) or trade (cargo, passengers, trade area or port)? Does your ship trade in an area with unstable political situation? Add other relevant questions: Cargo (e.g. weapon parts, Norwegian whole, nuclear cargo) and trade area/port (Middle East, U.S.) Countries with elections, demonstrations, civil war, riots (West Africa, Middle East)
Sec. 17 - Page 5/20
2.
2.1 2.2 2.3
Symbolic motives
Can your ship be used as a means to harm symbolic constructions on the trade? Does your ship visit a port where international events take place? Can your ship be used as means to harm important environmental areas? Does your ship itself represent or carry a symbolic value? Does the visibility or the profile of your ship, company or brand represent a motive for unlawful acts? Add other relevant questions: Well known buildings, statues, bridges, etc.(Golden gate, Sydney opera, etc.) Exhibitions, sports, political, etc. (Olympic Games, EXPO, WTO meeting, etc.) Areas for tourism, commercial exploitation of nature (fish farming, beaches, coastal cities, etc.) Ship carries special cargo (e.g. weapons), support operations (oil to war actions, equipment to industry projects), represent attitudes at debate (cruise, natural resources, etc.) Because of your policy (exploitation of labour, political attitudes), the operations you are involved (natural resources, weapons, etc.).
2.4
2.5 2.6
3.
3.1 3.2 3.3 3.4
Economical damages
Does your ship carry special cargo? Is it likely that terror related smuggling take place from ports your ship is visiting? Is it likely that your crew can take part in or embrace terror related smuggling? Is your ship trading in an area known for piracy? Plutonium, equipment for mass destruction, etc. Smuggling of people/goods from Africa to Italy. (Intelligence) Ethnical motives and common cause. See annual Piracy Report (ICC)
Security risks
Likely
3.5 3.6
Does your ship, cargo or passengers represent risk for Hijacking? Add other relevant questions:
Valuable ship, cargo and passengers used for threats and bargaining demands.
4.
4.1
Damage to Society/Industry
Can your ship be used to damage important nodal points for trade or commercial activity? Is the trade your ship represents critical to society? Will an unlawful act against your ship or trade harm the state of the industry? Add other relevant questions: Block ports or canal, collide with bridges or offshore installations, etc. Critical equipment to industry projects (e.g. pipelines, offshore installations, etc.), or for industry production (gold, silver, silicates, etc.) Reduced market due to reduced trust (cruise, passenger transport, etc.)
5.
5.1 5.2
2nd stage:
Criticality Operations with related systems, areas and personnel Low High
3. CARGO HANDLING
3.1 3.2 3.3 3.4 Cargo access points (hatches, ports, piping) Cargo storage spaces (incl. access points)
Spaces containing dangerous goods or hazardous substances
5. SECURITY MONITORING
5.1 5.2 5.3 5.4 5.5 5.6 Lighting Watch-out (voyage) Security guards and deck watches, including patrols Automatic intrusion detection device Surveillance monitoring Security and surveillance equipment spaces Add issues you find relevant:
6. SAFETY OPERATIONS
6.1 6.2 6.3 6.4 Life boats and life belts Alarms, signals and marking Evacuation routes Fire-fighting system Add issues you find relevant:
Ship Security Assessment Report Section 17 Identification of possible threat scenario to key shipboard operations and assess the likelihood of those occurrences rd th Relevant Possible Consequences Likelihood 3 stage 5 stage
Yes No
Moderate 1 High 2 Extreme 3 Unlikely 1 Likely 2 Vulnerability score1 Measures for Mitigation2 New vulnerability score3
1. Damage to, or destruction of, the ship (Bombing, arson, sabotage, vandalism)
1. 1 1. 2 1. 3 1. 4 1. 5 2. 1 2. 2 3. 1 3. 2 3. 3
1
Conceal explosives onboard, initiate with timer or remote device Bring explosives onboard, suicidal/high risk action Place explosives in cargo, initiate with timer or remote device Attach explosives to hull, initiate with timer or remote device Open bow, side or stern ports, cargo hatch to sink or capsize Contaminate drinking water, food or air conditioning Contaminate cargo
3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th
3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th
1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6*
Note Possible consequences x Likelihood = Vulnerability score Note After verifying the effectiveness of the measures for mitigation at the On-scene security survey, new vulnerability score is to be re-evaluated as 5th stage
Note
A measure must be established for the cases where vulnerability score 4 and above (*: to be deleted as appropriate) 1: Access Control 2: Restricted Area 3: Cargo Handling 4: Ships Store Delivery 5: Unaccompanied Baggage Handling 6: Security Monitoring
Identification of possible threat scenario to key shipboard operations and assess the likelihood of those occurrences
Relevant Possible Consequences
Moderate 1 High 2 Extreme 3
3 stage
Vulnerability score1 Measures for Mitigation2
rd
th
stage
4. Smuggling weapon or equipment, including weapons of mass destruction Conceal weapons/equipment in cargo/service or 4.1 storage spaces (including containers) 4.2 4.3 4.4 Conceal weapon/equipment in crews' luggage Conceal weapons/equipment in passengers' luggage Conceal weapons/equipment in ship supplies
3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th
3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th
1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6*
5.Use of the ship itself as weapon or as a means to cause damage or destruction 5.1 5.2 5.3 5.4 Crew take control over ship Passengers take control Stowaways/boarded person take control Damage or immobilize critical systems like propulsion, steering etc. in a critical position (near terminal etc.) Take control over ship and hit another ship Take control over ship and hit a land based construction / terminal / chemical plant or similar Take control over ship and hit an offshore installation Take control over ship and hit a rock / provoke grounding
3rd 5th
3rd 5th
Yes
No
1.
1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 1.13
Ship Security Assessment Report Section 17 Observation (including possible vulnerabilities) Countermeasures to be taken
Yes
No
Observation (including possible vulnerabilities) ACCESS TO THE SHIP - RECOMMENDED ADDITIONAL MEASURES FOR SECURITY LEVEL 2
Yes
No
Countermeasures to be taken
Are additional personnel assigned to patrol deck areas during silent hours to deter unauthorized access? Is the number of access points to the ship limited, identifying those to be closed and the means of adequately securing them? Is the access to the ship deterred, including the provision of boat patrols on the waterside of the ship? Is the shore-side of the ship established as a restricted area, in close co-operation with the port facility? Are the frequency and detail of searches of people, personal effects, and vehicles increased? Are visitors to the ship being escorted? Are additional specific security briefings provided to all ship personnel on any identified threats, in order to re-emphasize the procedures for reporting suspicious persons, objects, or activities and stressing the need for increased vigilance?
Yes
Checklist for Initial On-scene Security Survey 2.
2.1 2.2 2.3 2.4 . 2.5 2.6 2.7 2.8 2.9 2.10 2.11 2.12 2.13 2.14 2.15 2.16
No
RESTRICTED AREAS
Are restricted areas defined, and, where relevant, clearly marked? Is the ships personnel (Master, SSO, crew) able to identify the restricted areas onboard? Is surveillance equipment, e.g., security alarms, used to monitor the restricted areas? Are guards or patrols used to monitor the restricted areas? Are automatic intrusion detection devices used to alert the ships personnel of unauthorized access? Are there measures to prevent unauthorized persons to access the navigational bridge? Are there measures onboard to prevent unauthorized persons to access the machinery spaces (Category A)? Are there measures onboard to prevent unauthorized persons to access the control stations (defined in ISPS Code, SOLAS Chapter II-2)? Are there measures onboard to prevent unauthorized persons to access spaces containing security and surveillance equipment and systems and their controls and lighting system controls? Are there measures onboard to prevent unauthorized persons to access ventilation and airconditioning systems and other similar spaces? Are there measures onboard to prevent unauthorized persons to access spaces with access to potable water tanks, pumps, or manifolds? Are there measures onboard to prevent unauthorized persons to access spaces containing dangerous goods or hazardous substances? Are there measures onboard to prevent unauthorized persons to access spaces containing cargo pumps and their controls? Are there measures onboard to prevent unauthorized persons to access cargo spaces and spaces containing ships stores? Are there measures onboard to prevent unauthorized persons to access crew accommodation? Are there measures onboard to prevent unauthorized persons to access any other areas as determined by the CSO, through the SSA to which access must be restricted to maintain the security of the ship?
Yes No
2.
3.1 3.2 3.3 3.4 3.5 3.6 3.7
HANDLING OF CARGO
Are there routines in place for checking of cargo, cargo transport units and cargo spaces prior to, and during, cargo handling operations? Is there evidence, through records, that the procedures (cargo control) are followed? Is the handling of cargo supervised by the ship personnel (SSO)? Are there procedures for handling of dangerous goods or hazardous substances? Is an updated inventory kept on any dangerous goods or hazardous material carried on board? Are any checks carried out (procedures for) to ensure that cargo being loaded matches the cargo documentation? Is the procedures for cargo checking communicated to PFSO?
Ship Security Assessment Report Section 17 Observation (including possible vulnerabilities) Countermeasures to be taken
Yes
No
2.2.2
Yes
No
Countermeasures to be taken
SHIPS STORES
Are there procedures in place for supervision of the delivery of ship stores (to prevent acceptance without inspection)? Are there procedures for handling of ships stores to prevent acceptance unless ordered? Is there evidence, through records, that the procedures (ships store control) are followed? Is an updated inventory on any dangerous goods or hazardous material carried on board? Is ships stores and package integrity being checked? For ships regularly using the port facility; are procedures established with the port facility to cover notification and timing of deliveries and their documentation? Are stores checked if matching the order prior to being loaded on board? Is immediate secure stowage of ships stores ensured?
Yes
No
Countermeasures to be taken
UNACCOMPANIED BAGGAGE
Are there procedures in place for how to handle and where to store unaccompanied baggage? Is there evidence the procedures are followed? Is any unaccompanied baggage being appropriately screened (100%) and searched (by port or ship), before it is loaded onboard the ship? Are there procedures and measures in place for close cooperation with the port facility to ensure that unaccompanied baggage is handled securely after screening? Is 100% of unaccompanied baggage being x-ray screened?
6.
6.1 6.2 6.3 6.4 6.5 6.6
Ship Security Assessment Report Section 17 Observation (including possible vulnerabilities) Countermeasures to be taken
Yes No
6.7 6.8 6.9 6.10 6.11 6.12 6.13 6.14 6.15 6.16 6.2.1 6.2.2 6.2.3 6.2.4 6.2.5
Is an automatic intrusion detection device fitted onboard? If so, does it activate an audible and/or visual alarm at a location that is continuously attended or monitored? Is security equipment installed onboard maintained, working properly, and readily available? Are procedures established to ensure that monitoring equipment will be able to perform continuously, including consideration of the possible effects of weather conditions or of power disruptions? Are the ship's deck and access points illuminated at all times while conducting ship/port interface activities or at a port facility or anchorage? Is the ship using the maximum lighting available while underway, consistent with safe navigation? (Having regard to the provisions of the 1972 COLREGS) Is the lighting sufficient to ensure the ships personnel to be able to detect activities beyond the ship, on both the shore side and the waterside? Is the lighting coverage including the area on and around the ship? Is the lighting coverage facilitating personnel identification at access points? Is the lighting coverage provided through coordination with the port facility? Is the frequency and detail of security patrols increased? Is the coverage and intensity of lighting increased? Is the use of security and surveillance equipment increased? Is additional personnel assigned as security lookouts? Is coordination with waterside boat patrols, and foot or vehicle patrols on the shoreside, ensured when provided?
MONITORING THE SECURITY OF THE SHIP RECOMMENDED MEASURES FOR SECURITY LEVEL 2
Observation (including possible vulnerabilities) MONITORING THE SECURITY OF THE SHIP RECOMMENDED MEASURES FOR SECURITY LEVEL 3
Yes No
At security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Are all lighting switched on? Is the vicinity of the ship illuminated? Are all on board surveillance equipment capable of recording activities on, or in the vicinity of, the ship? Is the length of time such surveillance equipment can continue to record maximized? Is underwater inspection of the hull of the ship prepared for? Are measures initiated, including the slow revolution of the ships propellers, if practicable, to deter underwater access to the hull of the ship?
7.
7.1 7.2 7.3 7.4 7.5 7.6 7.7
OTHER
Is the ship fitted with a security alert system? Is the security alert system working as intended? (Not raising alarm on board, transmitting information to shore?) Are there at least 2 locations onboard where the alert system could be activated (on the bridge and at least one other location)? Is the alert system protected from inadvertent initiation? Are there procedures for the use of the ship security alert system? Are the locations for the activation of the alert system identified? (Must be kept in a restricted/confidential document) Is there any area that may, if damaged or used for illicit observation, pose a risk to persons, property, or operation onboard the ship, at this port facility?
APPENDIX
Name
COMPANY AUDITOR/TRAINOR
Contact points (Phone number during office hours): (Home - outside office hours) (632)
(63)-2
(Mobile phone)
(63)
(FAX number)
(632)
(E-mail)
com
Date of assignment
Appendix 2: Ship Security Officer Appointed Ship Security Officer of the Vessel: Period Rank Name Signature of the Master
Hours 0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs
Person in Charge Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C
0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs
0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs 0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs 0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs
Monitoring Deck area and the vicinity of the ship Monitoring cargo
0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs
Watchkeeping & monitoring Watchkeeping Watchkeeping & assist Watchkeeping & assist Assist
Securing - Watchkeeping Assist as directed by SSO Watchkeeping & assist Watchkeeping & assist Assist - Double watch
Team Leader - secure Life boats Secure Emer. Gen / Battery Rm. Secure Captain's Deck Secure Boat Deck Secure Upper Deck
Port Watch Port Watch Port Watch Port Watch Stand-by for instruction
Port Watch Port Watch Port Watch Port Watch Entrance doors securing
Secure Bridge Nav. Equipment Secure Emer. Gen/Battery rm. Secure inside accommodation Secure inside accommodation Secure inside accommodation
Radio / torch torch / tools torch / tools torch / tools torch / tools
Engine team
In-charge in Engine room Wacthkeeping & monitoring Locking & securing Watchkeeping & assist
In-charge of securing in E/R Assist as directed by C/E Watchkeeping & assist Watchkeeping & assist
Team Leader - secure E/R Assist as directed by C/E Assist as directed by C/E Assist as directed by C/E
Supervision at Engine room Secure Engine Room Secure Engine Room Secure Engine Room
Catering team
C/Cook Messman
Secure galley & Provision Rm. Secure galley & Provision Rm.
This Declaration of Security is valid from.......... until................., for the following activities under the following security levels.
Security level(s) for the ship: Security level(s) for the port facility:
The port facility and ship agree to the following security measures and responsibilities to ensure compliance with the requirements of Part A of the International Code for the Security of Ships and of Port Facilities.
The affixing of the initials of the SSO or PFSO under these columns indicates that the activity will be done, in accordance with relevant approved plan Activity Ensuring the performance of all security duties Monitoring restricted areas to ensure that only authorized personnel have access Controlling access to the port facility Controlling access to the ship Monitoring of the port facility, including berthing areas and areas surrounding the ship Monitoring of the ship, including berthing areas and areas surrounding the ship Handling of cargo Port facility: The Ship:
Delivery of ships stores Handling unaccompanied baggage Controlling the embarkation of persons and their effects Ensuring that security communication is readily available between the ship and port facility
The signatories to this agreement certify that security measures and arrangements for both the port facility and the ship during the specified activities meet the provisions of chapter XI-2 and Part A of Code that will be implemented in accordance with the provisions already stipulated in their approved plan or the specific arrangements agreed to and set out in the attached annex. Dated at On the
The ship:
(Signature of Master or Ship Security Officer)
Name and title of person who signed Name: Title: Name: Title:
Contact Details (to be completed as appropriate) (indicate the telephone numbers or the radio channels or frequencies to be used) For the port facility: For the ship:
o) Wherever and whenever possible, the hijackers should be encouraged to surrender peacefully and should be discouraged from mistreating either passengers or crew. 2. In the event or in anticipation of military action: a) Do not react to strangely dressed newcomers. b) Do not attract attention to any unusual activity. c) If shooting, or the loud command GET DOWN, is heard immediately lie face down, cover ears, close eyes and slightly open mouth. Do not move until an all clear is given. d) If the loud command STAND STILL is heard then freeze immediately. e) If the location of terrorist bombs or weapons is known, inform a member of the military assault force as soon as possible. f) Do not shelter or hide terrorists g) Do not take photographs of the military assault force. Note that the assault team may treat all people on board, including hostage, as terrorists at the initial stage. For this reason, crewmembers may be handcuffed. It is their standard procedures to ensure the arrest of all hijackers and safety/security of the scene. Following the incident, the master and his crew should avoid talking to the press and other media persons about the methods used to resolve the incidents.
obscure smattering
Have you ever heard of the voice, or it resembles somebody? Have you heard a background noise? Take note of the wording spoken correctly When ship is in port, report this telephone to the shore authority. (harbor master, police, fire fighter, etc.) Report this telephone to the company immediately.
2. Subsequent action
Activate the ship security alert system Ring emergency bell. All members of crew stand on emergency station. Organize the search group, and explain them on the bomb threat. Fire hoses set at fire station, and prepare for emergency measure against hull damage. Prepare the unloading plan Prepare the stability calculation
Clear neighborhood including above and below of the device. (6 planes) Identify restricted area, and instruct the crew to keep away. Keep the doors and openings open, so as to minimize primary damage. Obey instructions given by the company and shore authorities. 3. If a bomb explodes without warning, onboard or near the ship, the master should, Ensure watertight integrity and stability. Render first aid where/if necessary Take fire-fighting precautions Muster personnel to establish number and names of casualties. Inform company, local authorities (in port), and make distress call (at sea) if necessary. port, be prepared to handle inquiries from press and next-of-kin. D. Bomb Threat/Damage and Destruction to Port Facility Activate the ship security alert system. Issue order to stand on emergency station. Report to the Contracting Government of the port facility. Obey instructions given by personnel responding to the threat (PFSO) Prepare to evacuate from the ship/ prepare departure of ship from the port.
In any case, never expose human life to danger by challenging against violence to protect the properties on board. Evacuate in pre-determined safe place, as appropriate, and ensure that all personnel are staying there. Members of crew should pay effort to stay together. Report the circumstances using radio equipment and seek to get help, if possible. When intruder forbids use of radio, crew should pay attention on their ability to monitor the use of radio equipment. Crew should not stay in between the intruders and their boat. Because this would increase the risk of injury or violence. Priority should be given that the intruders may easily leave off alongside the ship.
As a rule, not try to arrest the attackers. This action works to induce violence. When the ship is hijacked by the intruders, liaise with them, if possible, to take command of ships operation and seek to return hostages. However, in many cases, only one option to ensure safety is to accept the requirement of the attackers. 3. Action to take after assault is over Issue pre-determined signal to announce the finish of assault. Ensure safety of personnel and the ship. Call the roll to confirm all members of crew are on board. Inspect if anyone injured. Report to RCC. Ask for medical advice over radio, if needed. F. Procedures for responding to stowaway cases When a stowaway is found, the master shall immediately inspect this person. In order to identify this person, the ship shall collect as much document as possible pertaining to him such as passport, seamens note, ID card, physical check record, letters, etc. In general, a stowaway denies his possession of document, and uses a false name and false nationality. However, in many cases, the stowaways hold their identity paper in secret, near the compartment where they were found. Therefore, the ship should perform a systematic search of document. Most important action at finding of stowaway is to report to the company, immediately, of this fact together with all information available. Also report to the authority and agent where the stowaway came onboard, and to the same of next port
Refrain from raising uproar for the stowaway. But give him a room and meal. During navigation along coastal water and in port, keep him in calm in locked room, and avoid unnecessary contact of crewmember with him, until further instruction is issued. In general, ships deviation just for disembarkation of the stowaway is not permitted in the charter party. He shall be disembarked only after approval of the company. G. Vessel Under Attack and Being Pursued Communication Procedures: In the event that vessel is under attack and being pursued by suspicious ships, Master should consider provided that Navigational Safety allows "Riding Off" Attackers craft by heavy wheel movements as they approach and increase ship's Speed. The effect of the bow wave wash may deter the attackers and stop pursuing the vessel. However, this kind of maneuvers should not be used in congested or confined waters or close inshore or by ship's constrained by their draft in the confined deep water routes, for example in Singapore straits in Malacca straits. Activate the Security Alert System. (When ship is not fitted with system) Give alert to shore authority and other ships in the vicinity, transmit the distress using the DSC device, GMDSS of INMARSAT, E-mail, Handy Phones, etc. Master should established immediate contact by any means to the following:
Report to the International Rescue Coordination Contacts (RCC) of each Coastal State. (Pls. refer to SSP / Annex 2 Contact List of Country for Security; and Records of Incidents and Breaches of Security, Pls. refer to SSP / Annex 4) Report to the nearest Maritime Safety Agency / Coast Guard of Coast Radio Stations. (Pls. refer to Emergency Contact List as per SMS Appendix C, and Ship's Message Format on Appendix D) Contracting government and other relevant authorities and likewise as per Sailing Instructions received from the Charterer/Owner.
H. Crew Insubordination In the event of crew insubordination on board wherein external intervention can be ruled out and under all probability caused by any of the crew on board, the matter is to be reported immediately to the CSO, PFSO, Port Authorities, Manning Company & Administration for proper guidance. The security actions to be taken under the supervision of the Master/SSO in accordance with actions outlined above as applicable. As an additional precautionary measure, subject crew movements should be closely monitored and limited to their areas of work. The Master/SSO should likewise conduct impartial investigation to determine specifically the root cause of such and to report to all concerned, likewise request/recommend immediate repatriation otherwise, shall request assistance to proper authorities if necessary. I. Discovery of Unauthorized Weapon When unauthorized weapon is discovered on board, report immediately to Master/SSO giving detailed location and description. Inform the CSO/PFSO and all relevant parties. Do not touch, do not attempt to cover and isolate the area. Investigate the crew who found the weapon. Follow instructions from Proper Authorities (Experts). Conduct thorough search to other areas of the ship. Intensify checked to all person intend to board vessel and refuse acceptance except to those authorities concerned, who will conduct investigation and disposal, etc.
Ship Security
ANNEX
Annex 1:
The Company has established the Ship Security Plan to detect security threats and take preventive measures against security incident that may affect safety and security of ships under management of our Company, personnel and property on those ships, in accordance with requirements of SOLAS Chapter XI2 and ISPS Code (the International Code for the Security of Ships and Port Facilities). This Ship Security Plan has been approved by the Administration (or by Recognized Security Organization).
The master and all crewmembers should give effect to those requirements stipulated in the Ship Security Plan and should be familiar with their duties. They should also undergo necessary training given by the master or ship security officer designated by the company. On behalf of the Company, the undersigned declares as follows. 3. The master has the overriding authority and responsibility to make an optimum decisions with respect to the security of the ship; 4. The Company should give necessary support to the ship when requested by the company security officer, the master and the ship security officer with respect to the security of the ship.
Date
Chairman
(Signature)
Annex 3:
The master shall provide information contain in this appendix upon the request by duly authorized officer of the government. Name Parties responsible for appointing shipboard personnel HANG WOO SHIP MANAGEMENT LIMITED Contact Details HANG WOO SHIP MANAGEMENT LIMITED
Annex 4:
This record should be kept on board for at least the minimum period specified by the Administration. Also this record should be protected from unauthorized access or disclosure.
Security Levels and special measures taken for last 10 Port calls
Voy. No. Name of Port Arrival Departure Work Security level Port Ship Special measures taken
Security Levels and special measures taken for ship to ship activities during last 10 Port calls
Voy. No. Name of Port Arrival Departure Work Security level Port Ship Special measures taken
HANG WOO SHIP MANAGEMENT LIMITED PLANS FOR EMERGENCY DRILS / EMERGENCY RESPONSE DRILLS AND OTHER ONBOARD TRAINING
SHIPS NAME YEAR : :
FORM INTERVAL JAN FEB MAR
1. Bomb Threats (in port/at sea). Sabotage and/or Arson ( by crew/others) Free 2. Hijacking or Armed Boarding Free 3. Tampering cargo or Fuel or Ships Stores or Essential Ship Equipment / System Free 4. Unauthorized Access, incl. Presence of Stowaways (territorial/International waters) Free Drills to be carried out every 5. Smuggling of Weapons or related equipment , incl. Weapons of Mass Destruction Free 3 months 6. Use of the Ship to carry those intending to cause a Security incident. Free 7. Use of the Ship as a Weapon or as a means to Cause Damage or Destruction Free 8. Attacks from seaward while at Berth Free 9. Attacks while at Sea Free NOTE: SECURIT DRILLS TO BE CARRIED OUT WITHIN ONE (1) WEEK MORE THAN 25% OF THE CREW WERE CHANGED
E.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
SHIP SECURITY TRAINING Current Security Threats and Patterns Recognition and Detection of Weapons, Dangerous Substances and Devices Characteristics and Behavioral Patterns of Persons likely to threated Security Techniques used to Circumvent Security Measures Crowd Management and Control Techniques Security related communications Emergency Procedures and Contingency plans in accordance with the SSP Operation of any Security Equipment / Systems onboard Testing, calibration and maintenance of any Security Equipment / Systems onboard Inspection, Control and Monitoring Techniques (access control) Methods of physical search of persons, personal effects, baggage cargo and ships stores
Free Free Free Free Free Free Free Free Free Free Free
REMARKS
ABOVE ALL ITEMS WHEN CARRIED OUT TO BE RECORDED IN THE LOG BOOKS
Annex 5: Inventory of Dangerous Goods and Materials Voy. No. Kinds Quantity Stowage Inspection Date Person in Charge for Inspection
OOW
Time / Date
Addressee / Destination
Telex
Phone
FAX
Coast Station
Land Line
Others
Noted :
Master
INMARSAT-C MOBILE EARTH STATION SHIP SECURITY ALERT OPTION OPERATION MANUAL
7ZPSC0141
Abbreviation
A AC ACK ACSE ADE AOR AORE AORW ALM ANT ASCII Alternative current Acknowledgement Access Control and Signaling Equipment Above Deck Equipment Atlantic Ocean Region Atlantic Ocean Region East Atlantic Ocean Region West Alarm Antenna American Standard Code for Information Interchange
B BB BBER BCD BDE BER BPS BPSK BS BUZZ Bulletin Board Bulletin Board Error Rate Binary Coded Decimal Below Deck Equipment Bit Error rate Bit per Second Binary Phase Shift Keying Back Space Buzzer
C CCC CCIR CCITT CCU CES CNID COMM CPU CR CSDN CUG CW Channel Control Circuit Comite Consultatif International des Radio communications Comite Consultatif International Telegraphique et Telephonique Central Control Unit Coast Earth Station Closed Network Identification Communication Central Processing Unit Carriage Return Circuit Switched Data Network Close User Group Continues Wave
D dB DC DCE DEC DEL DEM DOS DS DTE Decibels Direct Current Data Circuit Terminating Equipment Decoder Circuit Delete Demodulator Circuit Disk Operating System Data Source Data Terminal Equipment
E EDP EEPROM EGC EIA EIRP EME EOF EXT E/W External Data Port Electrically Erasable and Programmable ROM Enhanced Group Call Electronic Industries Association Equivalent Isotropic ally Radiated Power Externally Mounted Equipment End of File External East/West
F FD FDD FED FTU Floppy Disk Floppy Disk Drive Forward Error Correction Frequency Transfer Unit
G GMDSS GPS Global Maritime Distress Safety Devices Global Positioning System
H HPA HTTP HYB High Power Amplifier Hyper Text Transfer Protocol Hybrid
ID IF IFU IHO IME IMO IMN INFO INMARSAT I/O IOR IP IPDS ISDN ISN ISO ISPS ITA ITU JKL LCD LED LES LMSS LNA LSB LT M MES MHS MID MMSI MMSS MOD MPDS MRCC MRSII
Identify Intermediate Frequency Intermediate Frequency Unit International Hydrographic Office Internally Mounted Equipment International Maritime Organization INMARSAT Mobile Number Information International Maritime Satellite organization Input/ Output Indian Ocean Region Internet Protocol INMARSAT Packet Data Service Integrated Service Digital Network INMARSAT Serial Number International Organization for Standard International Ship and Port Facility Security International Telegraph Alphabet International Telecommunication Union
Liquid Crystal Display Light Emitting Diode Land Earth Station Land Mobile Satellite Service Low Noise Amplifier Least Significant Bit Local Time
Mobile Earth Station Message Handling System Maritime Identification Digits Maritime Mobile Service Identity Maritime Mobile Satellite Service Modulator Mobile Packet Data Service Marine Rescue Co-ordination Centres Minimum Request Sequence Initiation Interval
MSB MSI
N NAVAREA NAVTEX MF NCS NMEA NSR N/S Navigational Area Navigation Broadcast Service Network Coordination Station National Marine Electronics Association Network Status Record North/South
O OCC O-QPSK OSB OSC INMARSAT Operations Control Centre Offset Quadrature Phase Shift Keying Option Switch Box Oscillator
P PA PC PEP PIN POR PPP PROM PSDN PSPDN PSTN PSU PVT Power Amplifier Personal Computer Packet Error Probability Packet Error Rate Personal Identification Number Pacific Ocean Region Point to Point Protocol Programmable ROM Packet Switched Data Network Public Switched Telephone Network Power Supply Unit Performance Verification Test
R RAM RCC RDB REC Random Access Memory Rescue Coordination Centre Remote Distress Button Receiving Level -A4Appendix 12 - Page 5/42
ROM RX
S SAR SB SBC SDM SES SFU SOLAS SSAS SSP Search and Rescue Security Button Security Button Controller System Definition Manual Ship Earth Station Store and Forward Unit Safety of Life At Sea Ship Security Alert System Ship Security Plan
T TCP TDM TDMA TX Transmission Control Protocol Time Division Multiplex TDM Access Transmit/Transmitter
U UDP USB UTC User Datagram Protocol Universal Serial Bus Coordinated Universal Time
XYZ
CONTENTS
Page
1. Summary of Ship Security Alert System 2. Block diagram and installation place example 3. Appearances and Configuration 4. SSAS operation flow 5. Creating security message 5.1Creating security message for TELEX or FAX 5.2Creating Internet e-mail message 6. Setting up the security alert transmission 6.1Setting up sending the security message to the telex terminal on the terrestrial network 6.2Setting up sending the security message to the facsimile on the terrestrial network 6.3Setting up sending the Internet e-mail via Inmarsat service provider 7. Transmitting security alert 8. Security alert transmission test 9. Security button test
The Ship Security Alert Option connecting to INMARSAT-C JUE-75A or JUE-75C meets the following requirements for Ship Security Alert System. (1) SOLAS Chap. XI-2 Regulation 2 & 6 (2) ISPS code Part A, 9.4.18 (3) IMO MSC Resolution 136(76)/147(77) (4) IMO MSC/Circ. 1072/1073
Press the button and then release the button. The security button is latch type button, the button pressed remains pushed in. You can cancel the security alert transmission without transmitting by pressing the security button again within 30 seconds from initial pressing.
The security alert is sent to the address has been preset in. "Schedule Transmission#1"option in "Setup" dialogue box after 30 seconds from initial pressing. If another address has been setup in the Schedule Transmission#2-#5, the security alert transmission will be stared in order of transmitting setting file#2, #3, #4, and #5 at intervals of 12 minutes
The security alert transmission to the address at interval which setup in transmission setup files (Schedule Transmission #1-#5).
If the button pushed in at least a security button, the security alert will not stop.
-E5-
Message Type 1 Selection conditions: a user creating message file as security message is selected with correctly. Message: SECURITY SECURITY MES NO, 123456789 LAT,N1234.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG
Message Type 2 Selection conditions: a user creating message file as security message has not been selected. Message: NO FILE SECURITY SECURITY MES NO, 123456789 LAT,N1234.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG
Message Type 3 Selection conditions: a user creating message file selected as security message is not exist. Message: FILE 0:SSAS MSG.TLX FILE NOT EXIST SECURITY SECURITY MES NO, 123456789 LAT,N1234.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG
Message Type 4 Selection conditions: The communication between DCE and DTE has failed after initiating the security alert transmission. Message: FILE 0;SSAS MSG.TLX NO CONNECTION SECURITY SECURITY MES NO, 123456789 LAT,N1234.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG
Ready
Rec
:Good-15
04-07-01
09:00(UTC)
N35.33 E139.50 Course:120deg Speed:10.0kt Transmit read-out Edit call-Log Transmit Read-out Edit
:To transmit message :To read out received message :To edit a message or to manipulate files
Step 3
Edit
edit Telex file edit Ascii file Delete file reName file Copy file Copy to another diskette Initialize Diskette disKcopy
F10: Previous
Step 4
Select the message format type by pressing the up/down arrow keys, and then press <Enter> "edit Telex file" option should be selected for creating Telex message. "edit Ascii file" option should be selected for FAX message or Internet e-mail message.
ATTENTION
In "edit Telex file" mode; 1. The characters which can be used on the land telex line can be input. So, the following characters and the small letters are rejected in the file: ! @ # $ % ^ & * _ { [ ] } : ; " ~ and ' 2. Created telex file is assigned the extension ".TLX" as file name.
Step 5
Type the filename of the message, and then press<enter>, (File names must be 8 characters or less in length)
-E7-
ATTENTION
The following characters can be used for file name.
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z
Step 6
Ready
Rec
:Good-15
Msg print
THIS IS THE SECURITY ALERT MESSAGE. THIS SHIP IS UNDER EMERGENCY. SHIP NAME: JRC MARU MMSI: 431995000 [End of File]
F5:Del_Line F10:Others
NOTE
1. The following message is automatically added to your message when initiating security alert. SECURITY SECURITY MES NO, 123456789 LAT,N12 34.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG 2. When you edit message for internet e-mail, check message format to LES provider
Step 7
To store your message, select "Save & Quit" function by pressing function key 9 < F9>. If "Input Search String" dialogue box is appear, press function key 10 < F10> twice, and then press function key 9 < F9>.
Step 8
-E8-
NOTE
When you edit message for internet e-mail, check message format to LES service provider you want to send e-mail.
Step 1 Step 2
Press <ESC> key until the screen clear. Highlight the "Edit" function from the menu bar by pressing the right/left arrow keys.
Ready
Rec
:Good-15
Msg print
04-07-01 Updates:07-01
N35.33 E139.50 Course:120deg Speed:10.0kt Transmit read-out Transmit Read-out Edit Edit call-Log Distress
:To transmit message :To read out received message :To edit a message or to manipulate files
Step 3
Step 4 Select "edit Ascii file" by pressing the up/down arrow keys, and then press <Enter>,
Step 5
Type the filename of the message, and then press <Enter> (File names must be 8 characters or less in length) e.g. "SSAS" has been typed as the file name.
ATTENTION
The following characters can be used for fine name. 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F,G,H,I,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z
Step 6
NOTE
The following message is automatically added to your message when initiating security alert SECURITY SECURITY MES NO.123456789 LAT,N12 34.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG, 10.0KT,COG,20DEG
ATTENTION
When you edit message for internet e-mail, check message format to LES provider you want to send e-mail. If the created message could not be sent to the destination by e-mail, the message could be created by the incorrect format.
-E10-
Examples of creating message are shown below. < SERVICE PROVIDER: KDDI >
Special Access Code: 28 LES ID: AOR-W: 003,AOR-E:103,POR:203,IOR:303
Ready
Rec
:Good-15
Msg print
To:jmarine@m1.jrc.co.jp To:jmarine1@m1.jrc.co.jp Cc:jmarine2@m1.jrc.co.jp subject: Security message <One blank line> This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File] F1: Insert Off F2: Ins_Line F3: Block F4:Del_Word F5:Del_Line
Ready
Rec
:Good-15
Msg print
This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File] F1: Insert Off F2: Ins_Line F3: Block F4:Del_Word F5:Del_Line
Ready
Rec
:Good-15
Msg print
04-07-01 Update:07-01
N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1 Size:
20
TO+jmarine@m1.jrc.co.jp TO+jmarine1@m1.jrc.co.jp This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File] F1: Insert Off F6: Transmit F2: Ins_Line F7: Quit F3: Block F8: Save As F4:Del_Word F9:Save & Quit F5:Del_Line F10:Others
Ready
Rec
:Good-15
Msg print
04-07-01 Update:07-01
N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1 Size:
20
F5:Del_Line F10:Others
Ready
Rec
:Good-15
Msg print
04-07-0 1 Update:07-01
N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1 Size:
20
TO:jmarine@m1.jrc.co.jp CC:jmarine@m1.jrc.co.jp This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File]
F5:Del_Line F10:Others
Ready
Rec
:Good-15
Msg print
04-07-01 Update:07-01
N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1 Size:
20
To+marine@m1.jrc.co.jp Subj+ SSAS MESSAGE This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File]
F5:Del_Line F10:Others
Step 7
To store your message, select "Save & Quit" function by pressing function key9< F9>, If "Input Search String" dialogue box is appear, press function key10 <F10> twice, and then press function key9 <F9>
Step 8
Press <ESC> key until the screen clear. -E13Appendix 12 - Page 21/42
This section describes how to set up for sending the security message to the telex terminal on the terrestrial network. Step 1 Step 2 Press <ESC> until the screen clear. Press <ALT> + <U> to obtain "Set up" dialogue box. Set up
Date & time Date Time log-Out initiation log-In initiation Performance test initiation Scheduled transmission Land id registration for polling Closed network id selection Peripheral Function F10: Previous
Step 3
Select "Scheduled transmission" option by pressing the up/down arrow keys, and then press <Enter>, "Scheduled transmission" dialogue box will be appeared.
F10: Previous
Step 4
Press <Ctrl>+function key10 < F10>, and then "F1: SSAS TEST" will be appeared in bottom of "Scheduled transmission" dialogue box.
Step 5
To setup security alert transmission, select the "Scheduled transmission #1", "Scheduled transmission #2", "Scheduled transmission #3", "Scheduled transmission #4" or "Schedule transmission #5" by pressing the up/down arrow keys and press <Enter>.
ATTENTION
The security message transmission should be configured in order from "Scheduled transmission #1". The MES transmits security alert in order of a young file number of scheduled transmission configuration file.
e.g.
"Scheduled transmission file #1" has been selected for SSAS message transmission setup.
Step 6
Press the down arrow key to choose "requesting Interval", and then press <Enter>. ("Starting date and Time" is not used for security message transmission.)
Enter time interval (01:00 - 23:00) to the security alert transmission, and then press <Enter>. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75A/C will ignore.
Step 7
e.g.
One hour has been entered as interval to transmit the security alert. requesting Interval : 01:00
ATTENTION
1. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75A/C will ignore. 2. When "00:00" has been entered as interval to transmit the security alert, MES will transmit.
Step 8
Press <Enter>, enter LES ID, and then press <Enter>, e.g. KDDI LES has been entered as default LES in each ocean region. IEs : 003 - 103 - 203 - 303
Step 9
(a) (b) (c) (d) (a) LES ID used when MES logs in AOR-W. (b) LES ID used when MES logs in AOR-E. (c) LES ID used when MES logs in POR. (d) LES ID used when MES logs in IOR. Press <Enter>, "Network type" dialogue box will be appeared and then select "TELEX" option by pressing the up/down arrow keys, and then press <Enter>.
Step 10 Press <Enter>, and then enter the country code and subscriber's number of final destination. e.g. "072-0223344" has been entered as Destination code and subscribers number. Destination code & subscriber's number : 072 - 0223344 (a) (a) Telex Country code (b) Subscriber's number Step 11 Press <Enter>, Select "Ia5" by pressing the left/right arrow keys, and then press <Enter>. Character code : Ia5 iTa2 (b)
Step 12 Press <Enter> thrice, and then select "None" by pressing the left/right arrow keys, and then press <Enter>. dS :1 2 Both None
NOTE
"qtH" setup may be set whichever of ON and OFF, because this menu is used to add ship's position information to sending message on usual scheduled transmission. The security message is automatically added also for ON or OFF. Step 13 Press <Enter>, enter the directory number and the name of file created for SSAS message according to the following format: e.g. "SSAS.TLX" has been entered as file name of SSAS message File name :0 : SSAS.TLX (a) (b) (a) Directory number: "0" should be input (b) Message file name
NOTE
Add the extension ".TLX" to file name created by using "edit Telex file" option Step 14 Press <Enter>. Step 15 Press <Enter>, select "oFf" by pressing the left/right arrow keys, press <Enter>. Transmission : oN oFf
If "oN" has been selected, Message will be sent although nobody press the security button.
Step 16 Press <Enter>, select "oN" by pressing the left/right arrow keys, and then press <Enter>. Security Alert : oN oFf
If "oFf" has been selected, Message will NOT be sent although anyone press the security button.
Step 17 Setup is completed, and then press function key 10 <F10> to finish the setup. Step 18 Press function key 10 <F10> or <ESC> to save the setup.
6.2Setting up sending the security message to the facsimile on the terrestrial network.
This section describes how to set up for sending the security message to the facsimile on the terrestrial network. Step 1 Step 2 Press <ESC> until the screen clear. Press <ALT> + <U> to obtain "Set up" dialogue box.
Step 3
Select "Scheduled transmission" function by pressing the up/down arrow keys, and then press <Enter>. "Scheduled transmission" dialogue box will be appeared.
Step 4
Press <Ctrl> + function key10<F10>, and then "F1: SSAS" will be appeared in the bottom of "Scheduled transmission" dialogue box.
Step 5
To setup SSAS message transmission, select the "Scheduled transmission #1", "Scheduled transmission #2", "Scheduled transmission #3", "Scheduled transmission #4" or "Schedule transmission #5" by pressing the up/down arrow keys and press <Enter>.
ATTENTION
The security alert transmission should be configured in order from "Scheduled transmission #1". The MES transmits the security alert in order of a young file number of scheduled transmission configuration file.
e.g. "Scheduled transmission file #1" has been selected for security alert transmission setup.
Step 6
Press the down arrow key to choose "requesting Interval", and then press <Enter>. ("Starting date and Time" is not used for security alert transmission.)
Step 7
Enter time interval (01:00-23:00) to transmit the security alert, and then press <Enter>. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75C will ignore. e.g. One hour has been entered as interval to transmit the SSAS message. requesting Interval : 01:00
ATTENTION
1. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75C will ignore. 2. When "00:00" has been entered as interval to transmit the security alert, MES will transmit the security alert one time. Step 8 Press <Enter>, enter LES ID, and then press <Enter>. e.g. KDDI LES has been entered as default LES in each ocean region. 1Es : 003 - 103 - 203 - 303 (a) (b) (c) (d)
(a) LES ID used when MES logs in AOR-W. (b) LES ID used when MES logs in AOR-E. (c) LES ID used when MES logs in POR. (d) LES ID used when MES logs in IOR.
Step 9
Press <Enter>, "Network type" dialogue box will be appeared and then select "PSTN" option and by pressing the up/down arrow keys, and then press <Enter>, and then "Modem type" dialogue box will be appeared.
Step 10
Select "others" by pressing the up/down arrow keys, and then press <Enter>, and then "Others" dialogue box will be appeared.
Step 11
Step 12
Press <Enter>, and then enter the country code and subscriber's number of final destination. e.g. "081-422459111" has been entered as Destination code and subscriber's number. Destination code & Subscriber's number : 081 - 422459111 (a) (a) Telephone Country Code (b)
Step 13
(b) Subscriber's number Press <Enter>, Select "Ia5" by pressing the left/right arrow keys, and then press <Enter>. Character code : Ia5 Data
Step 14
Press <Enter>, thrice, and then select "None" by pressing the left/right arrow keys, and then press <Enter>. dS :1 2 Both None
NOTE
"qtH" setup may be set whichever of ON and OFF, because this menu is used to add ship's position information to sending message on usual scheduled transmission. The security message is automatically added also for ON or OFF.
Step 15 Press <Enter>, enter the directory number and the name of file created for SSAS message according to the following format: e.g. "SSAS" has been entered as file name of SSAS message File name : 0 (a) (b) Message file name : SSAS (b)
ATTENTION
Add the extension ".TLX" to file name created by using "edit Telex file" option.
Step 16 Step 17
Press <Enter>. Press <Enter>, select "oFf" by pressing the left/right arrow keys, press <Enter>/ Transmission : oN oFf
If "oN" has been selected, Message will be sent although nobody press the security button. Step 18 Press <Enter>, select "oN" by pressing the left/right arrow keys, and then press <Enter>. Security Alert : oN oFf
If "oFf" has been selected, Message will NOT be sent although anyone press the security button.
-E22-
Step 19 Setup is completed, and then press function key10<F10> to finish the setup. Step 20 Press function key10<F10> or <ESC> to save the setup.
-E23-
6.3
This section describes how to set up for sending the internet e-mail via Inmarsat service provider.
NOTE
When you edit message for internet e-mail, check message format to LES service provider you want to send e-mail.
Step 1 Step 2
Press <ESC> until the screen clear. Press <ALT> + <U> to obtain "Set up" dialogue box.
Step 3
Select "Scheduled transmission" option by pressing the up/down arrow keys, and then press <Enter>. "Scheduled transmission" dialogue box will be appeared.
Step 4
Press <Ctrl> + function key10< F10>, and then "F1:SSAS TESt" will be appeared in the bottom of "Scheduled transmission" dialogue box.
Step 5
To setup SSAS message transmission, select the "Scheduled transmission #1", "Scheduled transmission #2", "Scheduled transmission #3", "Scheduled transmission #4" or "Scheduled transmission #5" by pressing the up/down arrow keys and press <Enter>.
ATTENTION
The SSAS message transmission should be configured in order from "Scheduled transmission #1". The MES transmits the security alert in order of a young file number of scheduled
transmission configuration file. e.g "Scheduled transmission file #1" has been selected for SSAS message transmission setup.
Step 6
Press the down arrow key to choose "requesting Interval", and then press <Enter>. ("Starting date and Time" is not used for SSAS message transmission.)
Step 7
Enter time interval ( 01:00 - 23:00 ) to transmit the SSAS message, and then press <Enter>. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75A/C will ignore. e.g. One hour has been entered as interval to transmit the security alert. requesting Interval :01:00
ATTENTION
1. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75A/C will ignore 2. When "00:00" has been entered as interval to transmit the security alert, MES will transmit
the security alert only one time.
-E25-
Step 8
Press <Enter>, enter LES ID, and then press <Enter>. e.g. KDDI LES has been entered as default LES in each ocean region. IEs (a) (b) (c) (d) :003 - 103 - 203 - 303 (a) (b) (c) (d) LES ID used when MES logs in AOR-W. LES ID used when MES logs in AOR-E. LES ID used when MES logs in POR. LES ID used when MES logs in IOR.
Step 9
Press <Enter>, "Network type" dialogue box will be appeared and then select "Special access" option by pressing the up/down arrow keys, and then press <Enter>.
Step 10 Press <Enter>, and then enter the country code and subscriber's number of final destination. e.g. "28" has been entered as the special access code for KDDI inmarsat-C internet e-mail service. Destination code & subscriber's number (a) Special access code : 28 (a)
NOTE
Check the special access code number for LES you want to send internet e-mail.
Step 11 Press <Enter>, Select "Ia5" by pressing the left/right arrow keys, and then press <Enter>. Character code : Ia5 Data
NOTE
Check character code can be used for LES you want to send internet e-mail.
Step 12 Press <Enter> thrice, and then select "None" by pressing the left/right arrow keys, and then press <Enter>. dS :1 2 Both None
NOTE
"qtH" setup may be set whichever of ON and OFF, because this menu is used to add ship's position information to sending message on usual scheduled transmission. The security message is automatically added also for ON or OFF.
Step 13 Press <Enter>, enter the directory number and the name of file created for SSAS message according to the following format: e.g. "SSAS" has been entered as file name of SSAS message File name :0 : SSAS (a) (b) (a) Directory number: "0" should be input (b) Message file name Step 14 Press <Enter>. Step 15 Press <Enter>, select "oFf" by pressing the left/right arrow keys, press <Enter>. Transmission : oN oFf
If "oN" has been selected, Message will be sent although nobody press the security button.
Step 16 Press <Enter>, select "oN" by pressing the left/right arrow keys, and then press <Enter>. Security Alert : oN oFf
If "oFf" has been selected, Message will NOT be sent although anyone press the security button.
Step 17 Setup is completed, and then press function key 10 <F10> to finish the setup. Step 18 Press function key 10 <F10> or <ESC> to save the setup.
ATTENTION
The communication status indication, Buzzer sounding and message printout for security alert are not executed under transmitting the security message. Step 1 Open the hinged cover of the Security Alert Button.
Cover
Step 2
<Top View>
<Side View>
Ths SSAS message will be transmitted after 30 seconds from the button is pushed in.
NOTE
1. Your creating message and the following message are transmitted to pre-designed destinations. SECURITY SECURITY MES NO, 123456789 LAT,N12 34.56LON,E123 45.56, UTC,07.01.2004 12:34, SOG, 10.0KT,COG,20DEG
ATTENTION
To cancel security alert transmission if you accidentally push the button, push the button again within 30 seconds. When security alert transmission has canceled, the following window will be displayed on DTE screen.
Cancelled Security Alert by No.1 SA button F10:Previous
Step 3
MES transmits SSAS message in order of a young file number of scheduled transmission configuration file.
Step 4
ATTENTION
If you turn on the MES with any security button has been pushed in, the MES resumes the security alert transmission.
ATTENTION
Setup the security alert setup menu beforehand transmit security alert test messages.
Step 1 Step 2
Press <ESC> until the screen clear. Press <ALT> + <ALT> to obtain "Set up" dialogue box.
Step 3
Select "Scheduled transmission" opinion by pressing the up/down arrow keys, and then press <Enter>. "Scheduled transmission" dialogue box will be appeared.
Step 4
Press <Ctrl> + function key 10<F10>, and then "F1:SSAS TEST" will be appeared in the bottom of "Scheduled transmission" dialogue box.
Step 5
Press function key 1<F1> to start the security alert transmission test.
NOTE
1. The MES starts transmission with setup of "Scheduled transmission #1" immediately after pressing function key 1 <F1>, If the another setup has been configured, The MES starts transmission with setup of "Scheduled transmission #2" at 12 minutes after pressing function key 1 <F1>, starts transmission with setup of "Scheduled transmission #3" at 24 minutes after pressing function key 1 <F1>, starts transmission with setup of "Scheduled transmission #4" at 36 minutes after pressing function key 1<F1>, and starts transmission with setup of "Scheduled transmission #5" at 48 minutes after pressing function key <F1>. 2. This test mode remains for 1 hour. 3. Your creating message and the following message are transmitted to pre-designed destinations. TEST TEST MES NO, 123456789 LAT,N12 34.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG, 10.0KT,COG,20DEG
Step 6
The test mode is finished after one hour from pressing function key 1 <F1>.
NOTE
The security alert transmission test mode is cancelable if the power switch on the IME to OFF and ON within one hour from pressing function key 1<F1>.
-E31-
Step 3
Press <Ctrl> + function key10<F10>, and then "security button Test" will be appeared in the dialogue box.
Step 4
Select "security button Test" option by pressing the up/down arrow keys.
Step 5
Press <Enter>, and then "Security Button test mode" window is appeared.
Step 6
Cover
Step 7
Push the button. "Security Button Test" status window is appeared. e.g. No.1 Security button has been pushed in.
-------Security Button Test ------Now security button testing . . If real security alert to be sent, Cancel the test mode
Step 8
When the test is passed, the following window is appeared 30 seconds after pushing in the button.
-------Security Button Test ------Security button test succeeded. If real security alert to be sent, Cancel the test mode F10:Previous
Step 9
Push button again to pop up the pushed button, and then press function 10 key <F10>, and then the following window is appeared. If you test another button, repeat from Step 6 to Step 9. If you cancel the security button test, go to Step 10. Security buttons test mode
Security buttons are under test now. Press the security button to test it. if real security alert to be sent, Cancel the test mode F10:Previous
Step 10
ATTENTION
If you turn on the MES with any security button has been pushed in, The MES resumes the security alert transmission.